Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Microsoft (R) Windows Debugger Version 10.0.14321.1024 X86
- Copyright (c) Microsoft Corporation. All rights reserved.
- ========================================================================
- =================== Dump File: 072017-12593-01.dmp ===================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 15063 MP (4 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS Personal
- Built by: 15063.0.amd64fre.rs2_release.170317-1834
- Kernel base = 0xfffff802`a1601000 PsLoadedModuleList = 0xfffff802`a194d5e0
- Debug session time: Thu Jul 20 04:51:52.788 2017 (UTC - 4:00)
- System Uptime: 0 days 10:16:30.542
- BugCheck 4E, {2, 38a51, 41ffff, 1}
- Probably caused by : memory_corruption
- Followup: memory_corruption
- PFN_LIST_CORRUPT (4e)
- Typically caused by drivers passing bad memory descriptor lists (ie: calling
- MmUnlockPages twice with the same list, etc). If a kernel debugger is
- available get the stack trace.
- Arguments:
- Arg1: 0000000000000002, A list entry was corrupt
- Arg2: 0000000000038a51, entry in list being removed
- Arg3: 000000000041ffff, highest physical page number
- Arg4: 0000000000000001, reference count of entry being removed
- Debugging Details:
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 10.0.15063.483 (WinBuild.160101.0800)
- SYSTEM_MANUFACTURER: HP-Pavilion
- SYSTEM_PRODUCT_NAME: AY614AAR-ABA p6347c
- SYSTEM_SKU: AY614AAR#ABA
- BIOS_VENDOR: American Megatrends Inc.
- BIOS_VERSION: 5.12
- BIOS_DATE: 05/21/2010
- BASEBOARD_MANUFACTURER: FOXCONN
- BASEBOARD_PRODUCT: ALOE
- BASEBOARD_VERSION: 1.01
- DUMP_TYPE: 2
- BUGCHECK_STR: 0x4E_2
- CPU_COUNT: 4
- CPU_MHZ: af0
- CPU_VENDOR: AuthenticAMD
- CPU_FAMILY: 10
- CPU_MODEL: 5
- CPU_STEPPING: 2
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: CODE_CORRUPTION
- PROCESS_NAME: bztransmit64.exe
- CURRENT_IRQL: 2
- LAST_CONTROL_TRANSFER: from fffff802a17a749b to fffff802a176d4c0
- STACK_TEXT:
- ffffc100`72148758 fffff802`a17a749b : 00000000`0000004e 00000000`00000002 00000000`00038a51 00000000`0041ffff : nt!KeBugCheckEx
- ffffc100`72148760 fffff802`a169a02c : ffffd50f`9d7c2d90 ffffd50f`00000000 fffff802`a197e100 ffffd50f`9d7c2d90 : nt!MiUnlinkPageFromList+0x10c8cb
- ffffc100`72148800 fffff802`a168fa38 : 00000000`04d6be38 ffffba00`00026b58 ffffd50f`9d9d83f8 ffffd50f`9d45f580 : nt!MiResolveTransitionFault+0x16c
- ffffc100`721488d0 fffff802`a168de63 : 80000000`38a51820 00000000`04d6be38 ffffc100`72148bb0 00000000`00000000 : nt!MiDispatchFault+0xc88
- ffffc100`72148a50 fffff802`a1776d72 : ffffd50f`985137c0 00000000`00000000 00000000`00000000 00000000`001a0ee0 : nt!MmAccessFault+0x673
- ffffc100`72148c40 00000001`40183820 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x132
- 00000000`009fe9b0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00000001`40183820
- STACK_COMMAND: kb
- CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
- fffff802a168fac8 - nt!MiDispatchFault+d18
- [ fa:b1 ]
- fffff802a169a119-fffff802a169a11a 2 bytes - nt!MiResolveTransitionFault+259 (+0xa651)
- [ 80 f6:00 ba ]
- 3 errors : !nt (fffff802a168fac8-fffff802a169a11a)
- MODULE_NAME: memory_corruption
- IMAGE_NAME: memory_corruption
- FOLLOWUP_NAME: memory_corruption
- DEBUG_FLR_IMAGE_TIMESTAMP: 0
- MEMORY_CORRUPTOR: LARGE
- FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
- BUCKET_ID: MEMORY_CORRUPTION_LARGE
- PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
- TARGET_TIME: 2017-07-20T08:51:52.000Z
- OSBUILD: 15063
- OSSERVICEPACK: 483
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 784
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2017-07-07 02:06:35
- BUILDDATESTAMP_STR: 160101.0800
- BUILDLAB_STR: WinBuild
- BUILDOSVER_STR: 10.0.15063.483
- ANALYSIS_SESSION_ELAPSED_TIME: 29d9
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:memory_corruption_large
- FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
- Followup: memory_corruption
- =============================== Drivers ================================
- ffffe51c`bafd0000 ffffe51c`bb011000 cdd (deferred)
- Image path: \SystemRoot\System32\cdd.dll
- Image name: cdd.dll
- Timestamp: unavailable (00000000)
- ffffe51c`bb020000 ffffe51c`bb082000 ATMFD (deferred)
- Image path: \SystemRoot\System32\ATMFD.DLL
- Image name: ATMFD.DLL
- Timestamp: unavailable (00000000)
- fffff802`a0cc0000 fffff802`a0d86000 peauth (deferred)
- Image path: \SystemRoot\system32\drivers\peauth.sys
- Image name: peauth.sys
- Timestamp: Sat Dec 9 21:03:08 1989 (2581B95C)
- fffff802`a0ef0000 fffff802`a0efe000 MpKslba214679 (deferred)
- Image path: \??\C:\ProgramData\Microsoft\Windows Defender\Definition Updates\{6B0F939C-1767-46DF-B2B8-91B3E0940F17}\MpKslba214679.sys
- Image name: MpKslba214679.sys
- Timestamp: Tue May 19 21:50:37 2015 (555BE86D)
- fffff802`a0f40000 fffff802`a0faf000 dump_ahcix64s (deferred)
- Image path: \SystemRoot\System32\Drivers\dump_ahcix64s.sys
- Image name: dump_ahcix64s.sys
- Timestamp: Fri Apr 4 03:56:04 2008 (47F5DF14)
- fffff80f`96af0000 fffff80f`96afbe00 PxHlpa64 (deferred)
- Image path: \SystemRoot\System32\Drivers\PxHlpa64.sys
- Image name: PxHlpa64.sys
- Timestamp: Tue Jun 23 19:16:35 2009 (4A416253)
- fffff80f`970c0000 fffff80f`970dc000 mcupdate_AuthenticAMD (deferred)
- Image path: \SystemRoot\system32\mcupdate_AuthenticAMD.dll
- Image name: mcupdate_AuthenticAMD.dll
- Timestamp: Tue Jan 31 06:16:29 1978 (0F346A8D)
- fffff80f`97540000 fffff80f`975af000 ahcix64s (deferred)
- Image path: \SystemRoot\System32\drivers\ahcix64s.sys
- Image name: ahcix64s.sys
- Timestamp: Fri Apr 4 03:56:04 2008 (47F5DF14)
- fffff80f`97850000 fffff80f`9785a000 Null (deferred)
- Image path: \SystemRoot\System32\Drivers\Null.SYS
- Image name: Null.SYS
- Timestamp: unavailable (00000000)
- fffff80f`98190000 fffff80f`9819a000 SASKUTIL64 (deferred)
- Image path: \??\C:\Program Files\SUPERAntiSpyware\SASKUTIL64.SYS
- Image name: SASKUTIL64.SYS
- Timestamp: Tue Jul 12 17:00:01 2011 (4E1CB5D1)
- fffff80f`981a0000 fffff80f`981aa000 SASDIFSV64 (deferred)
- Image path: \??\C:\Program Files\SUPERAntiSpyware\SASDIFSV64.SYS
- Image name: SASDIFSV64.SYS
- Timestamp: Thu Jul 21 19:03:00 2011 (4E28B024)
- fffff80f`981f0000 fffff80f`981fe000 MpKslf27c42fa (deferred)
- Image path: \??\C:\ProgramData\Microsoft\Windows Defender\Definition Updates\{01B80F9B-85D2-4DB0-990A-36D7C35449F7}\MpKslf27c42fa.sys
- Image name: MpKslf27c42fa.sys
- Timestamp: Tue May 19 21:50:37 2015 (555BE86D)
- fffff80f`98200000 fffff80f`9820e000 MpKsled2e402c (deferred)
- Image path: \??\C:\ProgramData\Microsoft\Windows Defender\Definition Updates\{169092EE-1439-4C3C-808A-6C965F9ED1F7}\MpKsled2e402c.sys
- Image name: MpKsled2e402c.sys
- Timestamp: Tue May 19 21:50:37 2015 (555BE86D)
- fffff80f`98210000 fffff80f`9821e000 MpKsldaaa8b1f (deferred)
- Image path: \??\C:\ProgramData\Microsoft\Windows Defender\Definition Updates\{077C5A6B-D9ED-4051-B5C4-A0BE8869DEEB}\MpKsldaaa8b1f.sys
- Image name: MpKsldaaa8b1f.sys
- Timestamp: Tue May 19 21:50:37 2015 (555BE86D)
- fffff80f`98220000 fffff80f`9822e000 MpKslbb0407e9 (deferred)
- Image path: \??\C:\ProgramData\Microsoft\Windows Defender\Definition Updates\{195B3084-1C56-46DE-B3D1-6AA393D5F3A0}\MpKslbb0407e9.sys
- Image name: MpKslbb0407e9.sys
- Timestamp: Tue May 19 21:50:37 2015 (555BE86D)
- fffff80f`98230000 fffff80f`9823e000 MpKslb0c8cfeb (deferred)
- Image path: \??\C:\ProgramData\Microsoft\Windows Defender\Definition Updates\{D48EEE93-BF6F-433A-BDF3-BE4D9BE6A867}\MpKslb0c8cfeb.sys
- Image name: MpKslb0c8cfeb.sys
- Timestamp: Tue May 19 21:50:37 2015 (555BE86D)
- fffff80f`98240000 fffff80f`9824e000 MpKsla1911328 (deferred)
- Image path: \??\C:\ProgramData\Microsoft\Windows Defender\Definition Updates\{58DF769D-C35A-4939-8909-B2F42BE2163A}\MpKsla1911328.sys
- Image name: MpKsla1911328.sys
- Timestamp: Tue May 19 21:50:37 2015 (555BE86D)
- fffff80f`98250000 fffff80f`9825e000 MpKsl5ab50aff (deferred)
- Image path: \??\C:\ProgramData\Microsoft\Windows Defender\Definition Updates\{567CFB22-4587-4745-9756-43E6DF3F4DE4}\MpKsl5ab50aff.sys
- Image name: MpKsl5ab50aff.sys
- Timestamp: Tue May 19 21:50:37 2015 (555BE86D)
- fffff80f`98260000 fffff80f`9826e000 MpKsl4633795b (deferred)
- Image path: \??\C:\ProgramData\Microsoft\Windows Defender\Definition Updates\{8FDFD769-9728-4356-B9E3-A6598CBA6CE1}\MpKsl4633795b.sys
- Image name: MpKsl4633795b.sys
- Timestamp: Tue May 19 21:50:37 2015 (555BE86D)
- fffff80f`98270000 fffff80f`9827e000 MpKsl20d2fb22 (deferred)
- Image path: \??\C:\ProgramData\Microsoft\Windows Defender\Definition Updates\{F85C5305-1F53-4842-BD5A-6CF64FC01C82}\MpKsl20d2fb22.sys
- Image name: MpKsl20d2fb22.sys
- Timestamp: Tue May 19 21:50:37 2015 (555BE86D)
- fffff80f`98280000 fffff80f`9828e000 MpKsl15a31c6b (deferred)
- Image path: \??\C:\ProgramData\Microsoft\Windows Defender\Definition Updates\{8FDFD769-9728-4356-B9E3-A6598CBA6CE1}\MpKsl15a31c6b.sys
- Image name: MpKsl15a31c6b.sys
- Timestamp: Tue May 19 21:50:37 2015 (555BE86D)
- fffff80f`983f0000 fffff80f`9844f000 atikmpag (deferred)
- Image path: \SystemRoot\system32\DRIVERS\atikmpag.sys
- Image name: atikmpag.sys
- Timestamp: Tue Jan 13 11:20:43 2015 (54B545DB)
- fffff80f`98450000 fffff80f`9882ed80 RTKVHD64 (deferred)
- Image path: \SystemRoot\system32\drivers\RTKVHD64.sys
- Image name: RTKVHD64.sys
- Timestamp: Tue Jun 19 04:50:56 2012 (4FE03D70)
- fffff80f`98cf0000 fffff80f`98d04000 fortknoxfw (deferred)
- Image path: \SystemRoot\system32\drivers\fortknoxfw.sys
- Image name: fortknoxfw.sys
- Timestamp: Tue Dec 23 10:01:38 2014 (549983D2)
- fffff80f`99a00000 fffff80f`99a98000 rt640x64 (deferred)
- Image path: \SystemRoot\System32\drivers\rt640x64.sys
- Image name: rt640x64.sys
- Timestamp: Wed Oct 5 09:32:55 2016 (57F50107)
- fffff80f`99be0000 fffff80f`99c01000 drmk (deferred)
- Image path: \SystemRoot\System32\drivers\drmk.sys
- Image name: drmk.sys
- Timestamp: ***** Invalid (A01C1986)
- fffff80f`99dc0000 fffff80f`9a973000 atikmdag (deferred)
- Image path: \SystemRoot\system32\DRIVERS\atikmdag.sys
- Image name: atikmdag.sys
- Timestamp: Tue Jan 13 11:48:21 2015 (54B54C55)
- Unloaded modules:
- fffff802`a0ff0000 fffff802`a1013000 WdNisDrv.sys
- Timestamp: unavailable (00000000)
- Checksum: 00000000
- ImageSize: 00023000
- fffff802`a0ff0000 fffff802`a1013000 WdNisDrv.sys
- Timestamp: unavailable (00000000)
- Checksum: 00000000
- ImageSize: 00023000
- fffff802`a1000000 fffff802`a1023000 WdNisDrv.sys
- Timestamp: unavailable (00000000)
- Checksum: 00000000
- ImageSize: 00023000
- fffff802`a0ff0000 fffff802`a0ffe000 MpKslc7de30d
- Timestamp: unavailable (00000000)
- Checksum: 00000000
- ImageSize: 0000E000
- fffff802`a1000000 fffff802`a103d000 WUDFRd.sys
- Timestamp: unavailable (00000000)
- Checksum: 00000000
- ImageSize: 0003D000
- fffff802`a0fc0000 fffff802`a0ffd000 WUDFRd.sys
- Timestamp: unavailable (00000000)
- Checksum: 00000000
- ImageSize: 0003D000
- fffff802`a0f80000 fffff802`a0fbd000 WUDFRd.sys
- Timestamp: unavailable (00000000)
- Checksum: 00000000
- ImageSize: 0003D000
- fffff802`a0f40000 fffff802`a0f7d000 WUDFRd.sys
- Timestamp: unavailable (00000000)
- Checksum: 00000000
- ImageSize: 0003D000
- fffff802`a0ee0000 fffff802`a0f1d000 WUDFRd.sys
- Timestamp: unavailable (00000000)
- Checksum: 00000000
- ImageSize: 0003D000
- fffff802`a0ea0000 fffff802`a0edd000 WUDFRd.sys
- Timestamp: unavailable (00000000)
- Checksum: 00000000
- ImageSize: 0003D000
- fffff802`a0e60000 fffff802`a0e9d000 WUDFRd.sys
- Timestamp: unavailable (00000000)
- Checksum: 00000000
- ImageSize: 0003D000
- fffff80f`98df0000 fffff80f`98dfb000 cldflt.sys
- Timestamp: unavailable (00000000)
- Checksum: 00000000
- ImageSize: 0000B000
- fffff80f`989a0000 fffff80f`989bc000 EhStorClass.
- Timestamp: unavailable (00000000)
- Checksum: 00000000
- ImageSize: 0001C000
- fffff80f`98910000 fffff80f`9892c000 EhStorClass.
- Timestamp: unavailable (00000000)
- Checksum: 00000000
- ImageSize: 0001C000
- fffff80f`988f0000 fffff80f`9890c000 EhStorClass.
- Timestamp: unavailable (00000000)
- Checksum: 00000000
- ImageSize: 0001C000
- fffff80f`988d0000 fffff80f`988ec000 EhStorClass.
- Timestamp: unavailable (00000000)
- Checksum: 00000000
- ImageSize: 0001C000
- fffff80f`988b0000 fffff80f`988cc000 EhStorClass.
- Timestamp: unavailable (00000000)
- Checksum: 00000000
- ImageSize: 0001C000
- fffff80f`976c0000 fffff80f`976cf000 dump_storpor
- Timestamp: unavailable (00000000)
- Checksum: 00000000
- ImageSize: 0000F000
- fffff80f`97740000 fffff80f`977af000 dump_ahcix64
- Timestamp: unavailable (00000000)
- Checksum: 00000000
- ImageSize: 0006F000
- fffff80f`977d0000 fffff80f`977ed000 dump_dumpfve
- Timestamp: unavailable (00000000)
- Checksum: 00000000
- ImageSize: 0001D000
- fffff80f`9a9b0000 fffff80f`9a9cc000 EhStorClass.
- Timestamp: unavailable (00000000)
- Checksum: 00000000
- ImageSize: 0001C000
- fffff80f`96a20000 fffff80f`96a3c000 EhStorClass.
- Timestamp: unavailable (00000000)
- Checksum: 00000000
- ImageSize: 0001C000
- fffff80f`982d0000 fffff80f`982f0000 dam.sys
- Timestamp: unavailable (00000000)
- Checksum: 00000000
- ImageSize: 00020000
- fffff80f`96750000 fffff80f`9675f000 WdBoot.sys
- Timestamp: unavailable (00000000)
- Checksum: 00000000
- ImageSize: 0000F000
- fffff80f`979d0000 fffff80f`979df000 hwpolicy.sys
- Timestamp: unavailable (00000000)
- Checksum: 00000000
- ImageSize: 0000F000
- ============================= BIOS INFO ================================
- [SMBIOS Data Tables v2.6]
- [DMI Version - 0]
- [2.0 Calling Convention - No]
- [Table Size - 3291 bytes]
- [BIOS Information (Type 0) - Length 24 - Handle 0000h]
- Vendor American Megatrends Inc.
- BIOS Version 5.12
- BIOS Starting Address Segment f000
- BIOS Release Date 05/21/2010
- BIOS ROM Size 100000
- BIOS Characteristics
- 04: - ISA Supported
- 07: - PCI Supported
- 09: - Plug and Play Supported
- 11: - Upgradeable FLASH BIOS
- 12: - BIOS Shadowing Supported
- 14: - ESCD Supported
- 15: - CD-Boot Supported
- 16: - Selectable Boot Supported
- 17: - BIOS ROM Socketed
- 19: - EDD Supported
- 23: - 1.2MB Floppy Supported
- 24: - 720KB Floppy Supported
- 25: - 2.88MB Floppy Supported
- 26: - Print Screen Device Supported
- 27: - Keyboard Services Supported
- 28: - Serial Services Supported
- 29: - Printer Services Supported
- 30: - CGA/Mono Services Supported
- 32: - BIOS Vendor Reserved
- 48: - System Vendor Reserved
- BIOS Characteristic Extensions
- 00: - ACPI Supported
- 01: - USB Legacy Supported
- 04: - LS120-Boot Supported
- 05: - ATAPI ZIP-Boot Supported
- 08: - BIOS Boot Specification Supported
- 09: - Fn-Key NET-Boot Supported
- 10: - Specification Reserved
- BIOS Major Revision 5
- BIOS Minor Revision 18
- EC Firmware Major Revision 255
- EC Firmware Minor Revision 255
- [System Information (Type 1) - Length 27 - Handle 0001h]
- Manufacturer HP-Pavilion
- Product Name AY614AAR-ABA p6347c
- Version
- UUID 00000000-0000-0000-0000-000000000000
- Wakeup Type Power Switch
- SKUNumber AY614AAR#ABA
- Family 103C_53316J
- [BaseBoard Information (Type 2) - Length 15 - Handle 0002h]
- Manufacturer FOXCONN
- Product ALOE
- Version 1.01
- Feature Flags 09h
- 1750016520: - ?ÿU?ì?ì¡H.bh3Å?Eü3ÀW?}?Eô?Eø?ÿu
- ¸@
- 1750016560: - ?ÿU?ì?ì¡H.bh3Å?Eü3ÀW?}?Eô?Eø?ÿu
- ¸@
- Location
- Chassis Handle 0003h
- Board Type 0ah - Processor/Memory Module
- Number of Child Handles 0
- [System Enclosure (Type 3) - Length 21 - Handle 0003h]
- Manufacturer Hewlett-Packard
- Chassis Type Desktop
- Version
- Bootup State Safe
- Power Supply State Safe
- Thermal State Safe
- Security Status None
- OEM Defined 0
- Height 0U
- Number of Power Cords 1
- Number of Contained Elements 0
- Contained Element Size 0
- [Processor Information (Type 4) - Length 42 - Handle 0004h]
- Socket Designation CPU 1
- Processor Type Central Processor
- Processor Family edh - Specification Reserved
- Processor Manufacturer AMD
- Processor ID 520f1000fffb8b17
- Processor Version AMD Athlon(tm) II X4 630 Processor
- Processor Voltage 8fh - 1.5V
- External Clock 200MHz
- Max Speed 2800MHz
- Current Speed 2800MHz
- Status Enabled Populated
- Processor Upgrade Other
- L1 Cache Handle 0005h
- L2 Cache Handle 0006h
- L3 Cache Handle 0007h
- Part Number
- [Cache Information (Type 7) - Length 19 - Handle 0005h]
- Socket Designation L1-Cache
- Cache Configuration 0280h - Varies Enabled Int NonSocketed L1
- Maximum Cache Size 0200h - 512K
- Installed Size 0200h - 512K
- Supported SRAM Type 0010h - Pipeline-Burst
- Current SRAM Type 0010h - Pipeline-Burst
- Cache Speed 0ns
- Error Correction Type Multi-Bit ECC
- System Cache Type Specification Reserved
- Associativity 4-way Set-Associative
- [Cache Information (Type 7) - Length 19 - Handle 0006h]
- Socket Designation L2-Cache
- Cache Configuration 0281h - Varies Enabled Int NonSocketed L2
- Maximum Cache Size 0800h - 2048K
- Installed Size 0800h - 2048K
- Supported SRAM Type 0010h - Pipeline-Burst
- Current SRAM Type 0010h - Pipeline-Burst
- Cache Speed 0ns
- Error Correction Type Multi-Bit ECC
- System Cache Type Specification Reserved
- Associativity 4-way Set-Associative
- [Cache Information (Type 7) - Length 19 - Handle 0007h]
- Socket Designation L3-Cache
- Cache Configuration 0302h - Unknown Disabled Int NonSocketed L3
- Maximum Cache Size 0000h - 0K
- Installed Size 0000h - 0K
- Supported SRAM Type 0002h - Unknown
- Current SRAM Type 0002h - Unknown
- Cache Speed 0ns
- Error Correction Type Unknown
- System Cache Type Unknown
- Associativity Unknown
- [OEM Strings (Type 11) - Length 5 - Handle 000dh]
- Number of Strings 32
- 1 bid=A1NAv6PrA3;PROD_MSWORKS;SFCHK;DLED;IS.N60d;ACPwrFail=Off;Cha
- 2 n=Refurb;CPUFan=On;DVDRW;LegacyFloppy=No;TVout=NTSC;PCBRAND=Pavi
- 3 lion;OS=MSV;LScribe;DVDP_STD;Vos.P;PROD_MSOFFHST;FPA=HM;C_VEN2;C
- 4 DS_D;SW_Main;.B2;##HPCPC=00000000<900000060200000004200002535141
- 5 30040000010001000;5;:0665<;85>18>1<2=1:<55>?4;;=?=19:<8494;>:801
- 6 1<=31953=?76?>378139;594701:=;34:;55;9128<7937==0<722<:<1:2489>:
- 7 088=6:?1;2>8=8>12691>>286:9?;4454>3<3>89909>=738375;02951<;>=??2
- 8 ?70>75;04<815:33<20846?312127;?24876>7488457<0;0?39>9;?407;8;8;0
- 9 9>=;==>231>;?456:100000006;00000000002000840515?454=435<49434=23
- 10 405347594>444?47535021000200000000000000000000000000000000000176
- 11 0:<4;1?6??6:=:30393:=<:8>0733583=1;7=7:?6417;:83==335:93?179=82=
- 12 3<6<7:36018=:=05>2<7:76>9><?3=?3326<44;;515?5:05223?9=731563>:5>
- 13 :>:3?;752183168?<4641;15?1?:6;<46:36<39?682>03534:144>:?44867648
- 14 =32?5=6=56:3246?<8338;8?=?=<2:3?3<237?=6>8;=91=3;>??;>?0;<37=
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- [Physical Memory Array (Type 16) - Length 15 - Handle 0010h]
- Location 03h - SystemBoard/Motherboard
- Use 03h - System Memory
- Memory Error Correction 03h - None
- Maximum Capacity 16777216KB
- Number of Memory Devices 4
- [Memory Array Mapped Address (Type 19) - Length 15 - Handle 0011h]
- Starting Address 00000000h
- Ending Address 0103ffffh
- Memory Array Handle 0010h
- Partition Width 01
- [Memory Device (Type 17) - Length 28 - Handle 0012h]
- Physical Memory Array Handle 0010h
- Total Width 64 bits
- Data Width 64 bits
- Size 4096MB
- Form Factor 09h - DIMM
- Device Locator DIMM1
- Bank Locator BANK0
- Memory Type 18h - Specification Reserved
- Type Detail 0080h - Synchronous
- Speed 1066MHz
- Manufacturer Manufacturer00
- Part Number CT51264BD160B.C16F
- [Memory Device (Type 17) - Length 28 - Handle 0013h]
- Physical Memory Array Handle 0010h
- Total Width 64 bits
- Data Width 64 bits
- Size 4096MB
- Form Factor 09h - DIMM
- Device Locator DIMM2
- Bank Locator BANK1
- Memory Type 18h - Specification Reserved
- Type Detail 0080h - Synchronous
- Speed 1066MHz
- Manufacturer Manufacturer01
- Part Number CT51264BD160B.C16F
- [Memory Device (Type 17) - Length 28 - Handle 0014h]
- Physical Memory Array Handle 0010h
- Total Width 64 bits
- Data Width 64 bits
- Size 4096MB
- Form Factor 09h - DIMM
- Device Locator DIMM3
- Bank Locator BANK2
- Memory Type 18h - Specification Reserved
- Type Detail 0080h - Synchronous
- Speed 1066MHz
- Manufacturer Manufacturer02
- Part Number CT51264BD160B.C16F
- [Memory Device (Type 17) - Length 28 - Handle 0015h]
- Physical Memory Array Handle 0010h
- Total Width 64 bits
- Data Width 64 bits
- Size 4096MB
- Form Factor 09h - DIMM
- Device Locator DIMM4
- Bank Locator BANK3
- Memory Type 18h - Specification Reserved
- Type Detail 0080h - Synchronous
- Speed 1066MHz
- Manufacturer Manufacturer03
- Part Number CT51264BD160B.C16F
- bztransmit64.exe
- ========================================================================
- =================== Dump File: 071817-14812-01.dmp ===================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 15063 MP (4 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS Personal
- Built by: 15063.0.amd64fre.rs2_release.170317-1834
- Kernel base = 0xfffff800`4fe1b000 PsLoadedModuleList = 0xfffff800`501675e0
- Debug session time: Tue Jul 18 23:02:22.178 2017 (UTC - 4:00)
- System Uptime: 0 days 6:16:44.608
- BugCheck 1E, {ffffffffc0000005, fffff805cb3763a5, 0, 7802c6}
- Probably caused by : memory_corruption
- Followup: memory_corruption
- KMODE_EXCEPTION_NOT_HANDLED (1e)
- This is a very common bugcheck. Usually the exception address pinpoints
- the driver/function that caused the problem. Always note this address
- as well as the link date of the driver/image that contains this address.
- Arguments:
- Arg1: ffffffffc0000005, The exception code that was not handled
- Arg2: fffff805cb3763a5, The address that the exception occurred at
- Arg3: 0000000000000000, Parameter 0 of the exception
- Arg4: 00000000007802c6, Parameter 1 of the exception
- Debugging Details:
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 10.0.15063.483 (WinBuild.160101.0800)
- SYSTEM_MANUFACTURER: HP-Pavilion
- SYSTEM_PRODUCT_NAME: AY614AAR-ABA p6347c
- SYSTEM_SKU: AY614AAR#ABA
- BIOS_VENDOR: American Megatrends Inc.
- BIOS_VERSION: 5.12
- BIOS_DATE: 05/21/2010
- BASEBOARD_MANUFACTURER: FOXCONN
- BASEBOARD_PRODUCT: ALOE
- BASEBOARD_VERSION: 1.01
- DUMP_TYPE: 2
- READ_ADDRESS: fffff800501fc358: Unable to get MiVisibleState
- 00000000007802c6
- EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
- FAULTING_IP:
- NTFS!NtfsFindPrefixHashEntry+215
- fffff805`cb3763a5 0fb78678020000 movzx eax,word ptr [rsi+278h]
- EXCEPTION_PARAMETER2: 00000000007802c6
- BUGCHECK_STR: 0x1E_c0000005_R
- CPU_COUNT: 4
- CPU_MHZ: af0
- CPU_VENDOR: AuthenticAMD
- CPU_FAMILY: 10
- CPU_MODEL: 5
- CPU_STEPPING: 2
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: CODE_CORRUPTION
- PROCESS_NAME: bzfilelist.exe
- CURRENT_IRQL: 0
- EXCEPTION_RECORD: ffff80008f629910 -- (.exr 0xffff80008f629910)
- ExceptionAddress: 00000000007802c6
- ExceptionCode: 00000002
- ExceptionFlags: 00000000
- NumberParameters: 0
- TRAP_FRAME: ffff800000000000 -- (.trap 0xffff800000000000)
- Unable to read trap frame at ffff8000`00000000
- LAST_CONTROL_TRANSFER: from fffff8004fe45b7c to fffff8004ff874c0
- STACK_TEXT:
- ffff8000`8f629108 fffff800`4fe45b7c : 00000000`0000001e ffffffff`c0000005 fffff805`cb3763a5 00000000`00000000 : nt!KeBugCheckEx
- ffff8000`8f629110 fffff800`4ff9298e : ffff8000`8f629910 ffffd988`00000000 ffff8000`00000000 ffff8000`8f629800 : nt!KiDispatchException+0x23c
- ffff8000`8f6297c0 fffff800`4ff90e57 : 00000000`00000000 ffff8000`902876c0 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0xce
- ffff8000`8f6299a0 fffff805`cb3763a5 : ffffc781`bd5a5180 ffffd988`00000000 ffffc781`00000001 ffffc781`bd5a6528 : nt!KiPageFault+0x217
- ffff8000`8f629b30 fffff805`cb3770ab : ffffc781`cdfbcb98 ffffc781`bd5a6528 ffffd988`8e311b40 fffff800`4fe7c901 : NTFS!NtfsFindPrefixHashEntry+0x215
- ffff8000`8f629c50 fffff805`cb377ff7 : ffffc781`cdfbcb98 ffffc781`c0e85a60 00000000`00000000 ffff8000`8f629e80 : NTFS!NtfsFindStartingNode+0x2cb
- ffff8000`8f629d10 fffff805`cb376d9d : ffffc781`cdfbcb98 ffffc781`c0e85a60 ffff8000`90287330 ffffc781`c83ba700 : NTFS!NtfsCommonCreate+0x487
- ffff8000`8f629f50 fffff800`4ff8a377 : ffff8000`902872c0 ffffc781`d04f7440 ffff8000`8f629fd0 ffffc781`d0e10080 : NTFS!NtfsCommonCreateCallout+0x1d
- ffff8000`8f629f80 fffff800`4ff8a33d : 00000000`00000012 ffffc781`c83ba7c0 ffff8000`8f62a000 fffff800`4fe314ac : nt!KxSwitchKernelStackCallout+0x27
- ffff8000`902870e0 fffff800`4fe314ac : 00000000`00000012 00000000`00000000 00000000`00000000 00000000`00000006 : nt!KiSwitchKernelStackContinue
- ffff8000`90287100 fffff800`4fe312ee : 00000000`00000005 00000000`00006000 00000000`00000000 ffff8000`90287180 : nt!KiExpandKernelStackAndCalloutOnStackSegment+0x12c
- ffff8000`90287180 fffff800`4fe311af : 00000000`00000008 ffff8000`902872c0 00000000`00000001 ffffc781`c0e85a60 : nt!KiExpandKernelStackAndCalloutSwitchStack+0x9e
- ffff8000`902871f0 fffff805`cb37b4ab : 00000000`00000000 00000000`00000000 ffffc781`cdfbcb98 ffffc781`c0e85a60 : nt!KeExpandKernelStackAndCalloutInternal+0x2f
- ffff8000`90287240 fffff805`c9d8563d : ffffc781`bd5a5030 ffffc781`c0e85a60 ffffc781`c0e85f00 fffff805`c9da6060 : NTFS!NtfsFsdCreate+0x1cb
- ffff8000`90287490 fffff805`c9db612b : ffff8000`90287540 ffffc781`c0e85f68 ffff8000`902875c8 00000000`00000011 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x18d
- ffff8000`90287500 fffff800`502b2265 : 00000000`00000000 00000000`00000005 ffffc781`bfa47060 ffffc781`00000000 : FLTMGR!FltpCreate+0x2eb
- ffff8000`902875b0 fffff800`502bd61b : fffff800`502b1a50 fffff800`502b1a50 ffff8000`00000000 ffffc781`bd574c50 : nt!IopParseDevice+0x815
- ffff8000`90287790 fffff800`502c1150 : ffffc781`d0a52000 ffff8000`902879f8 00000000`00000040 ffffc781`bd34ec60 : nt!ObpLookupObjectName+0x46b
- ffff8000`90287960 fffff800`502c50ca : ffffc781`00000001 ffffc781`c0f720b0 00000000`0009eeb0 00000000`00000000 : nt!ObOpenObjectByNameEx+0x1e0
- ffff8000`90287aa0 fffff800`503143a8 : 00000000`0009e658 20202020`00000000 00000000`0009eeb0 00000000`0009e5f8 : nt!IopCreateFile+0x3aa
- ffff8000`90287b40 fffff800`4ff92413 : 00000000`00000334 fffff800`502c0e6b 00000000`00000000 00000000`00000000 : nt!NtOpenFile+0x58
- ffff8000`90287bd0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
- STACK_COMMAND: kb
- CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
- fffff8004fe314e7 - nt!KiExpandKernelStackAndCalloutOnStackSegment+167
- [ f6:c3 ]
- fffff8004fe31517 - nt!KiExpandKernelStackAndCalloutOnStackSegment+197 (+0x30)
- [ fa:95 ]
- fffff8004fe3156b - nt!KiExpandKernelStackAndCalloutOnStackSegment+1eb (+0x54)
- [ fa:95 ]
- fffff8004fea8d28 - nt!MiResolvePageTablePage+3b8 (+0x777bd)
- [ f6:c3 ]
- fffff8004fea8d48-fffff8004fea8d4c 5 bytes - nt!MiResolvePageTablePage+3d8 (+0x20)
- [ df be 7d fb f6:7f f8 f0 e1 c3 ]
- fffff8005009b383-fffff8005009b385 3 bytes - nt!ExFreePoolWithTag+363
- [ 40 fb f6:c0 e1 c3 ]
- 12 errors : !nt (fffff8004fe314e7-fffff8005009b385)
- MODULE_NAME: memory_corruption
- IMAGE_NAME: memory_corruption
- FOLLOWUP_NAME: memory_corruption
- DEBUG_FLR_IMAGE_TIMESTAMP: 0
- MEMORY_CORRUPTOR: LARGE
- FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
- BUCKET_ID: MEMORY_CORRUPTION_LARGE
- PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
- TARGET_TIME: 2017-07-19T03:02:22.000Z
- OSBUILD: 15063
- OSSERVICEPACK: 483
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 784
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2017-07-07 02:06:35
- BUILDDATESTAMP_STR: 160101.0800
- BUILDLAB_STR: WinBuild
- BUILDOSVER_STR: 10.0.15063.483
- ANALYSIS_SESSION_ELAPSED_TIME: 2b0c
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:memory_corruption_large
- FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
- Followup: memory_corruption
- ========================================================================
- =================== Dump File: 071917-15500-01.dmp ===================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 15063 MP (4 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS Personal
- Built by: 15063.0.amd64fre.rs2_release.170317-1834
- Kernel base = 0xfffff802`2a493000 PsLoadedModuleList = 0xfffff802`2a7df5e0
- Debug session time: Wed Jul 19 18:33:59.219 2017 (UTC - 4:00)
- System Uptime: 0 days 19:28:23.970
- BugCheck 50, {ffff95a20903b020, 0, fffff8022a60a2dd, 2}
- Could not read faulting driver name
- *** WARNING: Unable to verify timestamp for win32k.sys
- *** ERROR: Module load completed but symbols could not be loaded for win32k.sys
- Probably caused by : memory_corruption
- Followup: memory_corruption
- PAGE_FAULT_IN_NONPAGED_AREA (50)
- Invalid system memory was referenced. This cannot be protected by try-except.
- Typically the address is just plain bad or it is pointing at freed memory.
- Arguments:
- Arg1: ffff95a20903b020, memory referenced.
- Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
- Arg3: fffff8022a60a2dd, If non-zero, the instruction address which referenced the bad memory
- address.
- Arg4: 0000000000000002, (reserved)
- Debugging Details:
- Could not read faulting driver name
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 10.0.15063.483 (WinBuild.160101.0800)
- SYSTEM_MANUFACTURER: HP-Pavilion
- SYSTEM_PRODUCT_NAME: AY614AAR-ABA p6347c
- SYSTEM_SKU: AY614AAR#ABA
- BIOS_VENDOR: American Megatrends Inc.
- BIOS_VERSION: 5.12
- BIOS_DATE: 05/21/2010
- BASEBOARD_MANUFACTURER: FOXCONN
- BASEBOARD_PRODUCT: ALOE
- BASEBOARD_VERSION: 1.01
- DUMP_TYPE: 2
- READ_ADDRESS: fffff8022a874358: Unable to get MiVisibleState
- ffff95a20903b020
- FAULTING_IP:
- nt!KiSystemServiceRepeat+39
- fffff802`2a60a2dd 4d631c82 movsxd r11,dword ptr [r10+rax*4]
- MM_INTERNAL_CODE: 2
- CPU_COUNT: 4
- CPU_MHZ: af0
- CPU_VENDOR: AuthenticAMD
- CPU_FAMILY: 10
- CPU_MODEL: 5
- CPU_STEPPING: 2
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: CODE_CORRUPTION
- BUGCHECK_STR: AV
- PROCESS_NAME: bzserv.exe
- CURRENT_IRQL: 0
- TRAP_FRAME: ffffc100ea80fab0 -- (.trap 0xffffc100ea80fab0)
- NOTE: The trap frame does not contain all registers.
- Some register values may be zeroed or incorrect.
- rax=0000000000000008 rbx=0000000000000000 rcx=0000000000000004
- rdx=0000000000000008 rsi=0000000000000000 rdi=0000000000000000
- rip=fffff8022a60a2dd rsp=ffffc100ea80fc40 rbp=ffffc100ea80fcc0
- r8=0000000000000001 r9=0000000000000006 r10=ffff95a20903b000
- r11=fffff8022a875500 r12=0000000000000000 r13=0000000000000000
- r14=0000000000000000 r15=0000000000000000
- iopl=0 nv up ei ng nz ac po cy
- nt!KiSystemServiceRepeat+0x39:
- fffff802`2a60a2dd 4d631c82 movsxd r11,dword ptr [r10+rax*4] ds:ffff95a2`0903b020=????????
- Resetting default scope
- LAST_CONTROL_TRANSFER: from fffff8022a634fb4 to fffff8022a5ff4c0
- STACK_TEXT:
- ffffc100`ea80f818 fffff802`2a634fb4 : 00000000`00000050 ffff95a2`0903b020 00000000`00000000 ffffc100`ea80fab0 : nt!KeBugCheckEx
- ffffc100`ea80f820 fffff802`2a5202d6 : 00000000`00000000 ffff95a2`0903b020 ffffc100`ea80fab0 ffffe68a`164fb700 : nt!MiSystemFault+0x116e84
- ffffc100`ea80f8c0 fffff802`2a608d72 : 00000000`002af001 fffff802`2a4f3b42 00000000`746c6644 00000000`00000000 : nt!MmAccessFault+0xae6
- ffffc100`ea80fab0 fffff802`2a60a2dd : ffffe68a`1599b300 00000000`00d8ea40 ffffe68a`1599b300 00000000`002af000 : nt!KiPageFault+0x132
- ffffc100`ea80fc40 00000000`6b1f1924 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceRepeat+0x39
- 00000000`00d8ea48 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x6b1f1924
- STACK_COMMAND: kb
- CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
- fffff8022a5203af-fffff8022a5203b0 2 bytes - nt!MmAccessFault+bbf
- [ 80 f6:00 8b ]
- fffff8022a634fd8-fffff8022a634fd9 2 bytes - nt!MiValidFault+1160f8 (+0x114c29)
- [ ff f6:7f 8b ]
- 4 errors : !nt (fffff8022a5203af-fffff8022a634fd9)
- MODULE_NAME: memory_corruption
- IMAGE_NAME: memory_corruption
- FOLLOWUP_NAME: memory_corruption
- DEBUG_FLR_IMAGE_TIMESTAMP: 0
- MEMORY_CORRUPTOR: LARGE
- FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
- BUCKET_ID: MEMORY_CORRUPTION_LARGE
- PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
- TARGET_TIME: 2017-07-19T22:33:59.000Z
- OSBUILD: 15063
- OSSERVICEPACK: 483
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 784
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2017-07-07 02:06:35
- BUILDDATESTAMP_STR: 160101.0800
- BUILDLAB_STR: WinBuild
- BUILDOSVER_STR: 10.0.15063.483
- ANALYSIS_SESSION_ELAPSED_TIME: 2b5a
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:memory_corruption_large
- FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
- Followup: memory_corruption
- ========================================================================
- =================== Dump File: 072117-12468-01.dmp ===================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 15063 MP (4 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS Personal
- Built by: 15063.0.amd64fre.rs2_release.170317-1834
- Kernel base = 0xfffff801`fd409000 PsLoadedModuleList = 0xfffff801`fd7555e0
- Debug session time: Fri Jul 21 12:18:54.413 2017 (UTC - 4:00)
- System Uptime: 1 days 7:25:15.166
- BugCheck 4E, {2, 33b8ab, 41ffff, 1}
- *** WARNING: Unable to verify timestamp for win32k.sys
- *** ERROR: Module load completed but symbols could not be loaded for win32k.sys
- Probably caused by : memory_corruption
- Followup: memory_corruption
- PFN_LIST_CORRUPT (4e)
- Typically caused by drivers passing bad memory descriptor lists (ie: calling
- MmUnlockPages twice with the same list, etc). If a kernel debugger is
- available get the stack trace.
- Arguments:
- Arg1: 0000000000000002, A list entry was corrupt
- Arg2: 000000000033b8ab, entry in list being removed
- Arg3: 000000000041ffff, highest physical page number
- Arg4: 0000000000000001, reference count of entry being removed
- Debugging Details:
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 10.0.15063.483 (WinBuild.160101.0800)
- SYSTEM_MANUFACTURER: HP-Pavilion
- SYSTEM_PRODUCT_NAME: AY614AAR-ABA p6347c
- SYSTEM_SKU: AY614AAR#ABA
- BIOS_VENDOR: American Megatrends Inc.
- BIOS_VERSION: 5.12
- BIOS_DATE: 05/21/2010
- BASEBOARD_MANUFACTURER: FOXCONN
- BASEBOARD_PRODUCT: ALOE
- BASEBOARD_VERSION: 1.01
- DUMP_TYPE: 2
- BUGCHECK_STR: 0x4E_2
- CPU_COUNT: 4
- CPU_MHZ: af0
- CPU_VENDOR: AuthenticAMD
- CPU_FAMILY: 10
- CPU_MODEL: 5
- CPU_STEPPING: 2
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: CODE_CORRUPTION
- PROCESS_NAME: bztransmit64.exe
- CURRENT_IRQL: 2
- LAST_CONTROL_TRANSFER: from fffff801fd5af49b to fffff801fd5754c0
- STACK_TEXT:
- ffffe781`42ca5758 fffff801`fd5af49b : 00000000`0000004e 00000000`00000002 00000000`0033b8ab 00000000`0041ffff : nt!KeBugCheckEx
- ffffe781`42ca5760 fffff801`fd4a202c : ffff8f82`a9142690 fffff800`00000000 00000000`00000000 ffff8f82`a9142690 : nt!MiUnlinkPageFromList+0x10c8cb
- ffffe781`42ca5800 fffff801`fd497a38 : 00000000`4a5cb340 ffffc080`00252e58 ffffc181`c2a23e70 ffff8f82`a2da7580 : nt!MiResolveTransitionFault+0x16c
- ffffe781`42ca58d0 fffff801`fd495e63 : 80000003`3b8ab830 00000000`4a5cb340 ffffe781`42ca5bb0 00000000`00000000 : nt!MiDispatchFault+0xc88
- ffffe781`42ca5a50 fffff801`fd57ed72 : ffff8f82`a236f080 00000000`00000000 00000000`00000000 00000000`02c26d20 : nt!MmAccessFault+0x673
- ffffe781`42ca5c40 00000001`40183d86 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x132
- 00000000`009fea30 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00000001`40183d86
- STACK_COMMAND: kb
- CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
- fffff801fd497ac7-fffff801fd497ac8 2 bytes - nt!MiDispatchFault+d17
- [ 80 fa:00 fb ]
- fffff801fd4a211a - nt!MiResolveTransitionFault+25a (+0xa653)
- [ f6:c0 ]
- 3 errors : !nt (fffff801fd497ac7-fffff801fd4a211a)
- MODULE_NAME: memory_corruption
- IMAGE_NAME: memory_corruption
- FOLLOWUP_NAME: memory_corruption
- DEBUG_FLR_IMAGE_TIMESTAMP: 0
- MEMORY_CORRUPTOR: LARGE
- FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
- BUCKET_ID: MEMORY_CORRUPTION_LARGE
- PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
- TARGET_TIME: 2017-07-21T16:18:54.000Z
- OSBUILD: 15063
- OSSERVICEPACK: 483
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 784
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2017-07-07 02:06:35
- BUILDDATESTAMP_STR: 160101.0800
- BUILDLAB_STR: WinBuild
- BUILDOSVER_STR: 10.0.15063.483
- ANALYSIS_SESSION_ELAPSED_TIME: 3541
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:memory_corruption_large
- FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
- Followup: memory_corruption
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement