Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- ========================== AUTO DUMP ANALYZER ==========================
- Auto Dump Analyzer
- Version: 0.3
- Created by: gardenman
- Time to analyze file(s): 00 hours and 23 minutes and 39 seconds
- ================================ SYSTEM ================================
- MANUFACTURER: Acer
- PRODUCT_NAME: Predator G3-571
- SKU: [Removed]
- VERSION: V1.01
- ================================= BIOS =================================
- VENDOR: Insyde Corp.
- VERSION: V1.01
- DATE: 03/29/2017
- ============================= MOTHERBOARD ==============================
- MANUFACTURER: KBL
- PRODUCT: Sienta_KLS
- VERSION: V1.01
- ================================= CPU ==================================
- COUNT: 8
- MHZ: 2808
- VENDOR: GenuineIntel
- FAMILY: 6
- MODEL: 9e
- STEPPING: 9
- MICROCODE: 6,9e,9,0 (F,M,S,R) SIG: 48'00000000 (cache) 48'00000000 (init)
- ================================== OS ==================================
- Product: WinNt, suite: TerminalServer SingleUserTS Personal
- BUILD_VERSION: 10.0.15063.608 (WinBuild.160101.0800)
- BUILD: 15063
- SERVICEPACK: 608
- PLATFORM_TYPE: x64
- NAME: Windows 10
- EDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
- BUILD_TIMESTAMP: 2017-09-05 00:09:34
- BUILDDATESTAMP: 160101.0800
- BUILDLAB: WinBuild
- BUILDOSVER: 10.0.15063.608
- Built by: 15063.0.amd64fre.rs2_release.170317-1834
- BUILD_VERSION: 10.0.15063.540 (WinBuild.160101.0800)
- SERVICEPACK: 540
- BUILD_TIMESTAMP: 2017-07-31 21:23:25
- BUILDOSVER: 10.0.15063.540
- =============================== DEBUGGER ===============================
- Microsoft (R) Windows Debugger Version 10.0.14321.1024 X86
- Copyright (c) Microsoft Corporation. All rights reserved.
- =============================== COMMENTS ===============================
- * Information gathered from different dump files may be different. If
- Windows updates between two dump files, two or more OS versions may
- be shown above.
- * If the user updates the BIOS between dump files, two or more versions
- and dates may be shown above.
- ========================================================================
- ==================== Dump File: 091817-8562-01.dmp =====================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 15063 MP (8 procs) Free x64
- Kernel base = 0xfffff801`49890000 PsLoadedModuleList = 0xfffff801`49bdc5c0
- Debug session time: Sun Sep 17 22:09:23.539 2017 (UTC - 4:00)
- System Uptime: 0 days 23:34:28.499
- BugCheck 1E, {ffffffffc0000005, fffff80149907145, 0, ffffffffffffffff}
- Probably caused by : ntkrnlmp.exe ( nt!PpmUpdatePerformanceFeedback+85 )
- Followup: MachineOwner
- KMODE_EXCEPTION_NOT_HANDLED (1e)
- This is a very common bugcheck. Usually the exception address pinpoints
- the driver/function that caused the problem. Always note this address
- as well as the link date of the driver/image that contains this address.
- Arguments:
- Arg1: ffffffffc0000005, The exception code that was not handled
- Arg2: fffff80149907145, The address that the exception occurred at
- Arg3: 0000000000000000, Parameter 0 of the exception
- Arg4: ffffffffffffffff, Parameter 1 of the exception
- Debugging Details:
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- DUMP_TYPE: 2
- DUMP_FILE_ATTRIBUTES: 0x8
- Kernel Generated Triage Dump
- READ_ADDRESS: fffff80149c71358: Unable to get MiVisibleState
- ffffffffffffffff
- EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
- FAULTING_IP:
- nt!PpmUpdatePerformanceFeedback+85
- fffff801`49907145 440fb64220 movzx r8d,byte ptr [rdx+20h]
- EXCEPTION_PARAMETER2: ffffffffffffffff
- BUGCHECK_STR: 0x1E_c0000005_R
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
- PROCESS_NAME: System
- CURRENT_IRQL: 2
- EXCEPTION_RECORD: ffffe60f9f19ea70 -- (.exr 0xffffe60f9f19ea70)
- Cannot read Exception record @ ffffe60f9f19ea70
- LAST_CONTROL_TRANSFER: from fffff80149a8b0b6 to fffff801499fc580
- STACK_TEXT:
- ffffd580`1e7f7328 fffff801`49a8b0b6 : 00000000`0000001e ffffffff`c0000005 fffff801`49907145 00000000`00000000 : nt!KeBugCheckEx
- ffffd580`1e7f7330 fffff801`49a02a5d : fffff801`49c1a000 fffff801`49890000 00053694`00889000 fffff801`4981a2ec : nt!KiFatalExceptionHandler+0x22
- ffffd580`1e7f7370 fffff801`498bc234 : 00000000`00000000 ffffd580`1e7f74a0 00000000`00000000 00000018`78c8129c : nt!RtlpExecuteHandlerForException+0xd
- ffffd580`1e7f73a0 fffff801`498bafd6 : ffffd580`1e7f8278 ffffd580`1e7f7fc0 ffffd580`1e7f8278 ffffd580`1e7f8278 : nt!RtlDispatchException+0x404
- ffffd580`1e7f7a90 fffff801`49a0798e : ffffe60f`9f19ea70 00000000`00000000 00000000`00000000 ffffe60f`92d23190 : nt!KiDispatchException+0x1f6
- ffffd580`1e7f8140 fffff801`49a05c34 : 00000000`00000001 00000000`00000001 ffffe60f`9198bbf0 00000000`00000001 : nt!KiExceptionDispatch+0xce
- ffffd580`1e7f8320 fffff801`49907145 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiGeneralProtectionFault+0xf4
- ffffd580`1e7f84b0 fffff801`49904815 : 00000000`00000000 00000000`0029d7ad 00000000`00000000 ffffd580`1e7ca180 : nt!PpmUpdatePerformanceFeedback+0x85
- ffffd580`1e7f8560 fffff801`4990432e : 00000000`00000000 00000000`00000000 00000000`00000000 ffffe60f`957ef330 : nt!PpmSnapPerformanceAccumulation+0x105
- ffffd580`1e7f8610 fffff801`4989efb0 : 00000000`00000001 00000000`00000000 fffff780`00000350 00000010`00000000 : nt!PpmCheckSnapAllDeliveredPerformance+0x10e
- ffffd580`1e7f87d0 fffff801`4990301c : ffffd580`1e7ccf80 ffffd580`1e7ccf80 ffffd580`1e7f89a0 fffff801`49bd73c0 : nt!PpmCheckStart+0x190
- ffffd580`1e7f88a0 fffff801`49902927 : ffffd580`1e7ca180 00000000`0029d7ad fffff801`48a30980 00000000`0031667c : nt!KiExecuteAllDpcs+0x1dc
- ffffd580`1e7f89e0 fffff801`499ff62a : 00000000`00000000 ffffd580`1e7ca180 00000000`00000000 ffffd580`1e7d6d80 : nt!KiRetireDpcList+0xd7
- ffffd580`1e7f8be0 00000000`00000000 : ffffd580`1e7f9000 ffffd580`1e7f2000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x5a
- STACK_COMMAND: kb
- THREAD_SHA1_HASH_MOD_FUNC: 55a4545d72827042638bfe12013257de16e7b2de
- THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 855c01848647137df717d63732fceb312a1a30d3
- THREAD_SHA1_HASH_MOD: 7f608ac2fbce9034a3386b1d51652e4911d30234
- FOLLOWUP_IP:
- nt!PpmUpdatePerformanceFeedback+85
- fffff801`49907145 440fb64220 movzx r8d,byte ptr [rdx+20h]
- FAULT_INSTR_CODE: 42b60f44
- SYMBOL_STACK_INDEX: 7
- SYMBOL_NAME: nt!PpmUpdatePerformanceFeedback+85
- FOLLOWUP_NAME: MachineOwner
- MODULE_NAME: nt
- IMAGE_NAME: ntkrnlmp.exe
- DEBUG_FLR_IMAGE_TIMESTAMP: 59ae237e
- IMAGE_VERSION: 10.0.15063.608
- BUCKET_ID_FUNC_OFFSET: 85
- FAILURE_BUCKET_ID: 0x1E_c0000005_R_nt!PpmUpdatePerformanceFeedback
- BUCKET_ID: 0x1E_c0000005_R_nt!PpmUpdatePerformanceFeedback
- PRIMARY_PROBLEM_CLASS: 0x1E_c0000005_R_nt!PpmUpdatePerformanceFeedback
- TARGET_TIME: 2017-09-18T02:09:23.000Z
- SUITE_MASK: 784
- PRODUCT_TYPE: 1
- USER_LCID: 0
- FAILURE_ID_HASH_STRING: km:0x1e_c0000005_r_nt!ppmupdateperformancefeedback
- FAILURE_ID_HASH: {9777cb25-78b8-eb9e-2b1b-7c95e6ab0c7e}
- Followup: MachineOwner
- ========================================================================
- ===================== 3RD PARTY DRIVER QUICK LIST ======================
- ========================================================================
- Jul 16 2013 - LMDriver.sys -
- Jul 16 2013 - RadioShim.sys -
- Sep 24 2015 - dtlitescsibus.sys - DAEMON Tools Lite Virtual SCSI Bus (Disc Soft Ltd)
- Dec 28 2015 - dtliteusbbus.sys - DAEMON Tools Lite Virtual USB Bus (Disc Soft Ltd)
- Jul 15 2016 - iocbios2.sys - Intel(R) Extreme Tuning Utility Performance Tuning Driver
- Aug 08 2016 - iaLPSS2i_GPIO2.sys - Intel(R) Serial IO driver http://www.intel.com/
- Aug 08 2016 - iaLPSS2i_I2C.sys - Intel(R) Serial IO I2C Host Controller driver http://www.intel.com/
- Sep 13 2016 - dump_iaStorA.sys - (Generic Description) dump_*.sys drivers usually provide disk access during a crash to write dump files.
- Sep 13 2016 - iaStorA.sys - Intel SATA Storage Device RAID Controller
- Dec 15 2016 - RtsPer.sys - Realtek RTS PCIE Reader driver http://www.realtek.com.tw/
- Dec 16 2016 - avkmgr.sys - Avira Manager driver https://www.avira.com/
- Dec 16 2016 - avnetflt.sys - Avira WFP Network Driver https://www.avira.com/
- Dec 19 2016 - ETDI2C.sys -
- Dec 27 2016 - nvvhci.sys - Nvidia Virtual USB Host Controller driver http://www.nvidia.com/
- Jan 11 2017 - btfilter.sys - Qualcomm Atheros BtFilter driver
- Jan 11 2017 - Qcamain10x64.sys - Qualcomm Atheros Network Adapter driver http://www.killernetworking.com/
- Jan 20 2017 - IntcAudioBus.sys -
- Jan 20 2017 - IntcOED.sys -
- Feb 01 2017 - igdkmd64.sys - Intel HD graphics driver
- Feb 12 2017 - TeeDriverW8x64.sys - Intel® Management Engine Interface
- Mar 23 2017 - rt640x64.sys - Realtek NICDRV 8169 PCIe GBE Family Controller driver http://www.realtek.com.tw/
- Mar 23 2017 - RTKVHD64.sys - Realtek Audio Driver system driver http://www.realtek.com.tw/
- Apr 12 2017 - nvvad64v.sys - Nvidia Virtual Audio Driver http://www.nvidia.com/
- May 03 2017 - avdevprot.sys - Avira USB Feature driver https://www.avira.com/
- May 03 2017 - avusbflt.sys - Avira USB Filter driver https://www.avira.com/
- Jul 16 2017 - rzpnk.sys - Razer Overlay Support https://www.razerzone.com/
- Jul 18 2017 - nvlddmkm.sys - Nvidia Graphics Card driver http://www.nvidia.com/
- Jul 21 2017 - avgntflt.sys - Avira AntiVir Guard Network Minifilter driver https://www.avira.com/
- Jul 24 2017 - avipbb.sys - Avira Antivirus Program Backbone driver https://www.avira.com/
- ========================================================================
- ========================== 3RD PARTY DRIVERS ===========================
- ========================================================================
- Image name: LMDriver.sys
- Search : https://www.google.com/search?q=LMDriver.sys
- Timestamp : Tue Jul 16 2013
- Image name: RadioShim.sys
- Search : https://www.google.com/search?q=RadioShim.sys
- Timestamp : Tue Jul 16 2013
- Image name: dtlitescsibus.sys
- Search : https://www.google.com/search?q=dtlitescsibus.sys
- ADA Info : DAEMON Tools Lite Virtual SCSI Bus (Disc Soft Ltd)
- Timestamp : Thu Sep 24 2015
- Image name: dtliteusbbus.sys
- Search : https://www.google.com/search?q=dtliteusbbus.sys
- ADA Info : DAEMON Tools Lite Virtual USB Bus (Disc Soft Ltd)
- Timestamp : Mon Dec 28 2015
- Image name: iocbios2.sys
- Search : https://www.google.com/search?q=iocbios2.sys
- ADA Info : Intel(R) Extreme Tuning Utility Performance Tuning Driver
- Timestamp : Fri Jul 15 2016
- Image name: iaLPSS2i_GPIO2.sys
- Search : https://www.google.com/search?q=iaLPSS2i_GPIO2.sys
- ADA Info : Intel(R) Serial IO driver http://www.intel.com/
- Timestamp : Mon Aug 8 2016
- Image name: iaLPSS2i_I2C.sys
- Search : https://www.google.com/search?q=iaLPSS2i_I2C.sys
- ADA Info : Intel(R) Serial IO I2C Host Controller driver http://www.intel.com/
- Timestamp : Mon Aug 8 2016
- Image name: dump_iaStorA.sys
- Search : https://www.google.com/search?q=dump_iaStorA.sys
- ADA Info : (Generic Description) dump_*.sys drivers usually provide disk access during a crash to write dump files.
- Timestamp : Tue Sep 13 2016
- Image name: iaStorA.sys
- Search : https://www.google.com/search?q=iaStorA.sys
- ADA Info : Intel SATA Storage Device RAID Controller
- Timestamp : Tue Sep 13 2016
- Image name: RtsPer.sys
- Search : https://www.google.com/search?q=RtsPer.sys
- ADA Info : Realtek RTS PCIE Reader driver http://www.realtek.com.tw/
- Timestamp : Thu Dec 15 2016
- Image name: avkmgr.sys
- Search : https://www.google.com/search?q=avkmgr.sys
- ADA Info : Avira Manager driver https://www.avira.com/
- Timestamp : Fri Dec 16 2016
- Image name: avnetflt.sys
- Search : https://www.google.com/search?q=avnetflt.sys
- ADA Info : Avira WFP Network Driver https://www.avira.com/
- Timestamp : Fri Dec 16 2016
- Image name: ETDI2C.sys
- Search : https://www.google.com/search?q=ETDI2C.sys
- Timestamp : Mon Dec 19 2016
- Image name: nvvhci.sys
- Search : https://www.google.com/search?q=nvvhci.sys
- ADA Info : Nvidia Virtual USB Host Controller driver http://www.nvidia.com/
- Timestamp : Tue Dec 27 2016
- Image name: btfilter.sys
- Search : https://www.google.com/search?q=btfilter.sys
- ADA Info : Qualcomm Atheros BtFilter driver
- Timestamp : Wed Jan 11 2017
- Image name: Qcamain10x64.sys
- Search : https://www.google.com/search?q=Qcamain10x64.sys
- ADA Info : Qualcomm Atheros Network Adapter driver http://www.killernetworking.com/
- Timestamp : Wed Jan 11 2017
- Image name: IntcAudioBus.sys
- Search : https://www.google.com/search?q=IntcAudioBus.sys
- Timestamp : Fri Jan 20 2017
- Image name: IntcOED.sys
- Search : https://www.google.com/search?q=IntcOED.sys
- Timestamp : Fri Jan 20 2017
- Image name: igdkmd64.sys
- Search : https://www.google.com/search?q=igdkmd64.sys
- ADA Info : Intel HD graphics driver
- Timestamp : Wed Feb 1 2017
- Image name: TeeDriverW8x64.sys
- Search : https://www.google.com/search?q=TeeDriverW8x64.sys
- ADA Info : Intel® Management Engine Interface
- Timestamp : Sun Feb 12 2017
- Image name: rt640x64.sys
- Search : https://www.google.com/search?q=rt640x64.sys
- ADA Info : Realtek NICDRV 8169 PCIe GBE Family Controller driver http://www.realtek.com.tw/
- Timestamp : Thu Mar 23 2017
- Image name: RTKVHD64.sys
- Search : https://www.google.com/search?q=RTKVHD64.sys
- ADA Info : Realtek Audio Driver system driver http://www.realtek.com.tw/
- Timestamp : Thu Mar 23 2017
- Image name: nvvad64v.sys
- Search : https://www.google.com/search?q=nvvad64v.sys
- ADA Info : Nvidia Virtual Audio Driver http://www.nvidia.com/
- Timestamp : Wed Apr 12 2017
- Image name: avdevprot.sys
- Search : https://www.google.com/search?q=avdevprot.sys
- ADA Info : Avira USB Feature driver https://www.avira.com/
- Timestamp : Wed May 3 2017
- Image name: avusbflt.sys
- Search : https://www.google.com/search?q=avusbflt.sys
- ADA Info : Avira USB Filter driver https://www.avira.com/
- Timestamp : Wed May 3 2017
- Image name: rzpnk.sys
- Search : https://www.google.com/search?q=rzpnk.sys
- ADA Info : Razer Overlay Support https://www.razerzone.com/
- Timestamp : Sun Jul 16 2017
- Image name: nvlddmkm.sys
- Search : https://www.google.com/search?q=nvlddmkm.sys
- ADA Info : Nvidia Graphics Card driver http://www.nvidia.com/
- Timestamp : Tue Jul 18 2017
- Image name: avgntflt.sys
- Search : https://www.google.com/search?q=avgntflt.sys
- ADA Info : Avira AntiVir Guard Network Minifilter driver https://www.avira.com/
- Timestamp : Fri Jul 21 2017
- Image name: avipbb.sys
- Search : https://www.google.com/search?q=avipbb.sys
- ADA Info : Avira Antivirus Program Backbone driver https://www.avira.com/
- Timestamp : Mon Jul 24 2017
- If any of the above drivers are from Microsoft then please let me know.
- I will have them moved to the Microsoft list on the next update.
- ========================================================================
- ========================== MICROSOFT DRIVERS ===========================
- ========================================================================
- ACPI.sys ACPI Driver for NT (Microsoft)
- acpiex.sys ACPIEx Driver (Microsoft)
- acpipagr.sys ACPI Processor Aggregator Device driver (Microsoft)
- afd.sys Ancillary Function Driver for WinSock (Microsoft)
- ahcache.sys Application Compatibility Cache (Microsoft)
- BasicDisplay.sys Basic Display driver (Microsoft)
- BasicRender.sys Basic Render driver (Microsoft)
- BATTC.SYS Battery Class driver (Microsoft)
- Beep.SYS BEEP driver (Microsoft)
- BOOTVID.dll VGA Boot Driver (Microsoft)
- bowser.sys NT Lan Manager Datagram Receiver Driver (Microsoft)
- BthEnum.sys Bluetooth Bus Extender
- bthpan.sys Bluetooth Personal Area Networking
- bthport.sys Bluetooth Bus driver (Microsoft)
- BTHUSB.sys Bluetooth Miniport driver (Microsoft)
- CAD.sys Charge Arbiration driver (Microsoft)
- cdd.dll Canonical Display Driver (Microsoft)
- cdrom.sys SCSI CD-ROM Driver (Microsoft)
- CEA.sys Event Aggregation Kernal Mode Library (Microsoft)
- CI.dll Code Integrity Module (Microsoft)
- CLASSPNP.SYS SCSI Class System Dll (Microsoft)
- CLFS.SYS Common Log File System Driver (Microsoft)
- clipsp.sys CLIP Service (Microsoft)
- CmBatt.sys Control Method Battery driver (Microsoft)
- cmimcext.sys Kernal Configuration Manager Initial Con. Driver (Microsoft)
- cng.sys Kernal Cryptography, Next Generation Driver (Microsoft)
- CompositeBus.sys Multi-Transport Composite Bus Enumerator (Microsoft)
- condrv.sys Console Driver (Microsoft)
- crashdmp.sys Crash Dump driver (Microsoft)
- dfsc.sys DFS Namespace Client Driver (Microsoft)
- disk.sys PnP Disk Driver (Microsoft)
- drmk.sys Digital Rights Management (DRM) driver (Microsoft)
- dump_dumpfve.sys Bitlocker Drive Encryption Crashdump Filter
- dump_storport.sys Provides disk access during crash dump file generation (Microsoft)
- dxgkrnl.sys DirectX Graphics Kernal (Microsoft)
- dxgmms2.sys DirectX Graphics MMS
- EhStorClass.sys Enhanced Storage Class driver for IEEE... (Microsoft)
- fastfat.SYS Fast FAT File System Driver (Microsoft)
- filecrypt.sys Windows sandboxing and encryption filter (Microsoft)
- fileinfo.sys FileInfo Filter Driver (Microsoft)
- FLTMGR.SYS Filesystem Filter Manager (Microsoft)
- Fs_Rec.sys File System Recognizer Driver (Microsoft)
- fvevol.sys BitLocker Driver Encryption Driver (Microsoft)
- fwpkclnt.sys FWP/IPsec Kernal-Mode API (Microsoft)
- gpuenergydrv.sys GPU Energy Kernal Driver (Microsoft)
- hal.dll Hardware Abstraction Layer DLL (Microsoft)
- HIDCLASS.SYS Hid Class Library (Microsoft)
- hidi2c.sys I2C HID Miniport Driver
- HIDPARSE.SYS Hid Parsing Library (Microsoft)
- hidusb.sys USB Miniport Driver for Input Devices (Microsoft)
- HTTP.sys HTTP Protocol Stack (Microsoft)
- i8042prt.sys i8042 Keyboard / PS/2 Mouse driver (Microsoft)
- intelpep.sys Intel Power Engine Plugin (Microsoft)
- intelppm.sys Processor Device Driver (Microsoft)
- iorate.sys I/O rate control Filter (Microsoft)
- kbdclass.sys Keyboard Class Driver (Microsoft)
- kdcom.dll Kernel Debugger HW Extension DLL (Microsoft)
- kdnic.sys Microsoft Kernel Debugger Network Miniport (Microsoft)
- ks.sys Kernal CSA Library (Microsoft)
- ksecdd.sys Kernel Security Support Provider Interface (Microsoft)
- ksecpkg.sys Kernel Security Support Provider Interface Packages (Microsoft)
- ksthunk.sys Kernal Streaming WOW Thunk Service (Microsoft)
- lltdio.sys Link-Layer Topology Mapper I/O Driver (Microsoft)
- luafv.sys LUA File Virtualization Filter Driver (Microsoft)
- mcupdate.dll Media Center Update (Microsoft)
- Microsoft.Bluetooth.Legacy.LEEnumerator.sys Legacy Bluetooth LE Bus Enumerator
- mmcss.sys MMCSS Driver (Microsoft)
- monitor.sys Monitor Driver (Microsoft)
- mouclass.sys Mouse Class Driver (Microsoft)
- mouhid.sys HID Mouse Filter Driver (Microsoft)
- mountmgr.sys Mount Point Manager (Microsoft)
- mpsdrv.sys Microsoft Protection Service Driver (Microsoft)
- mrxsmb.sys SMB MiniRedirector Wrapper and Engine (Microsoft)
- mrxsmb10.sys Longhorn SMB Downlevel SubRdr (Microsoft)
- mrxsmb20.sys Longhorn SMB 2.0 Redirector (Microsoft)
- Msfs.SYS Mailslot driver (Microsoft)
- msgpioclx.sys GPIO Class Extension Driver
- mshidkmdf.sys Pass-through HID to KMDF Filter Driver
- msisadrv.sys ISA Driver (Microsoft)
- mslldp.sys Microsoft Link-Layer Discovery Protocol... (Microsoft)
- msrpc.sys Kernel Remote Procedure Call Provider (Microsoft)
- mssmbios.sys System Management BIOS driver (Microsoft)
- MTConfig.sys Microsoft Multi-Touch HID Driver
- mup.sys Multiple UNC Provider driver (Microsoft)
- ndis.sys Network Driver Interface Specification (NDIS) driver (Microsoft)
- ndisuio.sys NDIS User mode I/O driver (Microsoft)
- NdisVirtualBus.sys Virtual Network Adapter Enumerator (Microsoft)
- Ndu.sys Network Data Usage Monitoring driver (Microsoft)
- netbios.sys NetBIOS Interface driver (Microsoft)
- netbt.sys MBT Transport driver (Microsoft)
- NETIO.SYS Network I/O Subsystem (Microsoft)
- Npfs.SYS NPFS driver (Microsoft)
- npsvctrig.sys Named pipe service triggers (Microsoft)
- nsiproxy.sys NSI Proxy driver (Microsoft)
- NTFS.sys NT File System Driver (Microsoft)
- ntkrnlmp.exe Windows NT operating system kernel (Microsoft)
- ntosext.sys NTOS Extension Host driver (Microsoft)
- Null.SYS NULL Driver (Microsoft)
- nwifi.sys NativeWiFi Miniport Driver (Microsoft)
- pacer.sys QoS Packet Scheduler (Microsoft)
- partmgr.sys Partition driver (Microsoft)
- pci.sys NT Plug and Play PCI Enumerator (Microsoft)
- pcw.sys Performance Counter Driver (Microsoft)
- pdc.sys Power Dependency Coordinator Driver (Microsoft)
- peauth.sys Protected Environment Authentication and Authorization Export Driver (Microsoft)
- portcls.sys Class Driver for Port/Miniport Devices system driver (Microsoft)
- PSHED.dll Platform Specific Hardware Error driver (Microsoft)
- rdbss.sys Redirected Drive Buffering SubSystem driver (Microsoft)
- rdpbus.sys Microsoft RDP Bus Device driver (Microsoft)
- rdpvideominiport.sys RDP Video Miniport driver (Microsoft)
- rdyboost.sys ReadyBoost Driver (Microsoft)
- registry.sys Registry Container driver (Microsoft)
- rfcomm.sys Bluetooth RFCOMM Driver
- rspndr.sys Link-Layer Topology Responder driver (Microsoft)
- SleepStudyHelper.sys Sleep Study Helper driver (Microsoft)
- spaceport.sys Storage Spaces driver (Microsoft)
- SpbCx.sys SPB Class Extension
- srv.sys Server driver (Microsoft)
- srv2.sys Smb 2.0 Server driver (Microsoft)
- srvnet.sys Server Network driver (Microsoft)
- storport.sys Storage port driver for use with high-performance buses such as fibre channel buses and RAID adapters. (Microsoft)
- storqosflt.sys Storage QoS Filter driver (Microsoft)
- swenum.sys Plug and Play Software Device Enumerator (Microsoft)
- tbs.sys Export driver for kernel mode TPM API (Microsoft)
- tcpip.sys TCP/IP Protocol driver (Microsoft)
- tcpipreg.sys Microsoft Windows TCP/IP Registry Compatibility driver (Microsoft)
- TDI.SYS TDI Wrapper driver (Microsoft)
- tdx.sys NetIO Legacy TDI x-bit Support Driver (Microsoft)
- tm.sys Kernel Transaction Manager driver (Microsoft)
- tpm.sys TPM Device Driver
- TSDDD.dll Framebuffer Display Driver (Microsoft)
- tunnel.sys Microsoft Tunnel Interface driver (Microsoft)
- ucx01000.sys USB Controller Extension (Microsoft)
- UEFI.sys UEFI NT driver (Microsoft)
- umbus.sys User-Mode Bus Enumerator (Microsoft)
- usbccgp.sys USB Common Class Generic Parent Driver (Microsoft)
- USBD.SYS Universal Serial Bus Driver (Microsoft)
- UsbHub3.sys USB3 HUB driver (Microsoft)
- usbvideo.sys USB Video Class Driver (Microsoft)
- USBXHCI.SYS USB XHCI Driver
- vdrvroot.sys Virtual Drive Root Enumerator (Microsoft)
- vmbkmclr.sys Hyper-V VMBus Root KMCL (Microsoft)
- volmgr.sys Volume Manager Driver (Microsoft)
- volmgrx.sys Volume Manager Extension Driver (Microsoft)
- volsnap.sys Volume Shadow Copy driver (Microsoft)
- volume.sys Volume driver (Microsoft)
- vwifibus.sys Virtual Wireless Bus driver (Microsoft)
- vwififlt.sys Virtual WiFi Filter Driver (Microsoft)
- vwifimp.sys Virtual WiFi Miniport Driver (Microsoft)
- wanarp.sys MS Remote Access and Routing ARP driver (Microsoft)
- watchdog.sys Watchdog driver (Microsoft)
- wcifs.sys Windows Container Isolation FS Filter driver (Microsoft)
- Wdf01000.sys Kernel Mode Driver Framework Runtime (Microsoft)
- WDFLDR.SYS Kernel Mode Driver Framework Loader (Microsoft)
- wdiwifi.sys WDI Driver Framework Driver
- werkernel.sys Windows Error Reporting Kernel driver (Microsoft)
- wfplwfs.sys WPF NDIS Lightweight Filter driver (Microsoft)
- win32k.sys Full/Desktop Multi-User Win32 driver (Microsoft)
- win32kbase.sys Base Win32k Kernel Driver (Microsoft)
- win32kfull.sys Full/Desktop Win32k Kernel Driver (Microsoft)
- WindowsTrustedRT.sys Windows Trusted Runtime Interface driver (Microsoft)
- WindowsTrustedRTProxy.sys Windows Trusted Runtime Service Proxy driver (Microsoft)
- wmiacpi.sys Windows Management Interface for ACPI (Microsoft)
- WMILIB.SYS WMILIB WMI support library DLL (Microsoft)
- Wof.sys Windows Overlay Filter (Microsoft)
- WppRecorder.sys WPP Trace Recorder (Microsoft)
- Unloaded modules:
- fffff805`2fd00000 fffff805`2fd10000 MSKSSRV.sys
- fffff805`2fcf0000 fffff805`2fcff000 hiber_storpo
- fffff801`49010000 fffff801`494df000 hiber_iaStor
- fffff801`494e0000 fffff801`494fd000 hiber_dumpfv
- fffff805`30f80000 fffff805`30f8f000 dump_storpor
- fffff805`320f0000 fffff805`325bf000 dump_iaStorA
- fffff805`31690000 fffff805`316ad000 dump_dumpfve
- fffff805`2fce0000 fffff805`2fcef000 hiber_storpo
- fffff801`60a00000 fffff801`60ecf000 hiber_iaStor
- fffff801`60ed0000 fffff801`60eed000 hiber_dumpfv
- fffff805`315f0000 fffff805`315fb000 cldflt.sys
- fffff805`2e300000 fffff805`2e30f000 dump_storpor
- fffff805`2fc00000 fffff805`300cf000 dump_iaStorA
- fffff805`300f0000 fffff805`3010d000 dump_dumpfve
- fffff805`30780000 fffff805`307a0000 dam.sys
- fffff805`2f3f0000 fffff805`2f3ff000 hwpolicy.sys
- ========================================================================
- ============================== BIOS INFO ===============================
- ========================================================================
- sysinfo: could not find necessary interfaces.
- sysinfo: note that mssmbios.sys must be loaded (XPSP2+).
- ========================================================================
- ==================== Dump File: 091717-8062-01.dmp =====================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 15063 MP (8 procs) Free x64
- Kernel base = 0xfffff801`d8492000 PsLoadedModuleList = 0xfffff801`d87de5c0
- Debug session time: Sat Sep 16 19:46:05.492 2017 (UTC - 4:00)
- System Uptime: 0 days 22:28:49.176
- BugCheck A, {1b474b, 2, 0, fffff801d8432d1b}
- *** WARNING: Unable to verify timestamp for Qcamain10x64.sys
- *** ERROR: Module load completed but symbols could not be loaded for Qcamain10x64.sys
- Probably caused by : Qcamain10x64.sys ( Qcamain10x64+fc9cc )
- Followup: MachineOwner
- IRQL_NOT_LESS_OR_EQUAL (a)
- An attempt was made to access a pageable (or completely invalid) address at an
- interrupt request level (IRQL) that is too high. This is usually
- caused by drivers using improper addresses.
- If a kernel debugger is available get the stack backtrace.
- Arguments:
- Arg1: 00000000001b474b, memory referenced
- Arg2: 0000000000000002, IRQL
- Arg3: 0000000000000000, bitfield :
- bit 0 : value 0 = read operation, 1 = write operation
- bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
- Arg4: fffff801d8432d1b, address which referenced memory
- Debugging Details:
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- DUMP_TYPE: 2
- READ_ADDRESS: fffff801d8873358: Unable to get MiVisibleState
- 00000000001b474b
- CURRENT_IRQL: 2
- FAULTING_IP:
- hal!HalPutScatterGatherList+1955b
- fffff801`d8432d1b 488b6b20 mov rbp,qword ptr [rbx+20h]
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
- BUGCHECK_STR: AV
- PROCESS_NAME: System
- TRAP_FRAME: fffff801da8f8c90 -- (.trap 0xfffff801da8f8c90)
- NOTE: The trap frame does not contain all registers.
- Some register values may be zeroed or incorrect.
- rax=0000000000000000 rbx=0000000000000000 rcx=ffffe78bf9103810
- rdx=ffffe78c09df7e60 rsi=0000000000000000 rdi=0000000000000000
- rip=fffff801d8432d1b rsp=fffff801da8f8e20 rbp=0000000000000001
- r8=0000000000000001 r9=ffffe78c09df7e60 r10=0000000000000000
- r11=fffff801da8f8f28 r12=0000000000000000 r13=0000000000000000
- r14=0000000000000000 r15=0000000000000000
- iopl=0 nv up ei pl nz na pe nc
- hal!HalPutScatterGatherList+0x1955b:
- fffff801`d8432d1b 488b6b20 mov rbp,qword ptr [rbx+20h] ds:00000000`00000020=????????????????
- Resetting default scope
- LAST_CONTROL_TRANSFER: from fffff801d86098a9 to fffff801d85fe580
- STACK_TEXT:
- fffff801`da8f8b48 fffff801`d86098a9 : 00000000`0000000a 00000000`001b474b 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
- fffff801`da8f8b50 fffff801`d8607e7d : 00000000`00000000 00000000`00000001 00000000`00000000 ffffe78b`fda81690 : nt!KiBugCheckDispatch+0x69
- fffff801`da8f8c90 fffff801`d8432d1b : fffff80e`e98a89e0 ffffe78c`0944b5d0 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x23d
- fffff801`da8f8e20 fffff80e`e82ec898 : ffffe78c`032496f0 00000000`00000001 00000000`00000000 00000000`00000000 : hal!HalPutScatterGatherList+0x1955b
- fffff801`da8f8e80 fffff80e`e984c9cc : 00000000`00000000 00000000`00000001 ffffe78b`f92ef030 00000000`00000000 : ndis!NdisMFreeNetBufferSGList+0x38
- fffff801`da8f8ec0 00000000`00000000 : 00000000`00000001 ffffe78b`f92ef030 00000000`00000000 fffff80e`e98f0102 : Qcamain10x64+0xfc9cc
- STACK_COMMAND: kb
- THREAD_SHA1_HASH_MOD_FUNC: 830cbe77ddb612ecba944625686ae88037b74cca
- THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 2c242424e383f6a1c8b7bb4b839aef112897e6e5
- THREAD_SHA1_HASH_MOD: 35775663fedbdd5e0dd10b579d6e121aac14070a
- FOLLOWUP_IP:
- Qcamain10x64+fc9cc
- fffff80e`e984c9cc 4d8b3f mov r15,qword ptr [r15]
- FAULT_INSTR_CODE: 663f8b4d
- SYMBOL_STACK_INDEX: 5
- SYMBOL_NAME: Qcamain10x64+fc9cc
- FOLLOWUP_NAME: MachineOwner
- MODULE_NAME: Qcamain10x64
- IMAGE_NAME: Qcamain10x64.sys
- DEBUG_FLR_IMAGE_TIMESTAMP: 5875da6f
- BUCKET_ID_FUNC_OFFSET: fc9cc
- FAILURE_BUCKET_ID: AV_Qcamain10x64!unknown_function
- BUCKET_ID: AV_Qcamain10x64!unknown_function
- PRIMARY_PROBLEM_CLASS: AV_Qcamain10x64!unknown_function
- TARGET_TIME: 2017-09-16T23:46:05.000Z
- SUITE_MASK: 784
- PRODUCT_TYPE: 1
- USER_LCID: 0
- FAILURE_ID_HASH_STRING: km:av_qcamain10x64!unknown_function
- FAILURE_ID_HASH: {f52cafb4-1320-aedf-2a5d-ab5464b9e487}
- Followup: MachineOwner
- ========================================================================
- ==================== Dump File: 091717-7984-01.dmp =====================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 15063 MP (8 procs) Free x64
- Kernel base = 0xfffff803`06a12000 PsLoadedModuleList = 0xfffff803`06d5e5c0
- Debug session time: Sat Sep 16 22:33:17.336 2017 (UTC - 4:00)
- System Uptime: 0 days 1:47:36.011
- BugCheck 1E, {ffffffffc0000005, fffff80f9f92777b, 0, ffffffffffffffff}
- *** WARNING: Unable to verify timestamp for Qcamain10x64.sys
- *** ERROR: Module load completed but symbols could not be loaded for Qcamain10x64.sys
- Probably caused by : Qcamain10x64.sys ( Qcamain10x64+12777b )
- Followup: MachineOwner
- KMODE_EXCEPTION_NOT_HANDLED (1e)
- This is a very common bugcheck. Usually the exception address pinpoints
- the driver/function that caused the problem. Always note this address
- as well as the link date of the driver/image that contains this address.
- Arguments:
- Arg1: ffffffffc0000005, The exception code that was not handled
- Arg2: fffff80f9f92777b, The address that the exception occurred at
- Arg3: 0000000000000000, Parameter 0 of the exception
- Arg4: ffffffffffffffff, Parameter 1 of the exception
- Debugging Details:
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- DUMP_TYPE: 2
- READ_ADDRESS: fffff80306df3358: Unable to get MiVisibleState
- ffffffffffffffff
- EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
- FAULTING_IP:
- Qcamain10x64+12777b
- fffff80f`9f92777b 488b13 mov rdx,qword ptr [rbx]
- EXCEPTION_PARAMETER2: ffffffffffffffff
- BUGCHECK_STR: 0x1E_c0000005_R
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
- PROCESS_NAME: System
- CURRENT_IRQL: 2
- EXCEPTION_RECORD: ffffe48adeaec0e0 -- (.exr 0xffffe48adeaec0e0)
- ExceptionAddress: 0000000000000002
- ExceptionCode: 00000002
- ExceptionFlags: 00000000
- NumberParameters: 0
- TRAP_FRAME: ffffe48adabf5220 -- (.trap 0xffffe48adabf5220)
- NOTE: The trap frame does not contain all registers.
- Some register values may be zeroed or incorrect.
- rax=000000000000003c rbx=0000000000000000 rcx=0000000000000000
- rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
- rip=ffffe48adabf53a0 rsp=00000000e101000d rbp=ffffe48adb0438c8
- r8=0000000000000000 r9=ffffe48ae03ee6d0 r10=0000000000000000
- r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
- r14=0000000000000000 r15=0000000000000000
- iopl=0 nv up di pl nz na pe nc
- 4890:ffffe48a`dabf53a0 0d0001e100 or eax,0E10100h
- Resetting default scope
- BAD_STACK_POINTER: 00000000e101000d
- UNALIGNED_STACK_POINTER: 00000000e101000d
- LAST_CONTROL_TRANSFER: from fffff80306c0d0b6 to fffff80306b7e580
- STACK_TEXT:
- fffff803`08ef81b8 fffff803`06c0d0b6 : 00000000`0000001e ffffffff`c0000005 fffff80f`9f92777b 00000000`00000000 : nt!KeBugCheckEx
- fffff803`08ef81c0 fffff803`06b84a5d : fffff803`06d9c000 fffff803`06a12000 00053694`00889000 fffff803`08ef82a0 : nt!KiFatalExceptionHandler+0x22
- fffff803`08ef8200 fffff803`06a3e234 : 00000000`00000000 fffff803`08ef8330 00000000`00000000 00000000`00000000 : nt!RtlpExecuteHandlerForException+0xd
- fffff803`08ef8230 fffff803`06a3cfd6 : fffff803`08ef9108 fffff803`08ef8e50 fffff803`08ef9108 fffff803`08ef9108 : nt!RtlDispatchException+0x404
- fffff803`08ef8920 fffff803`06b8998e : ffffe48a`deaec0e0 00000000`00000000 ffffe48a`dabf5220 ffffe48a`e03ee6d0 : nt!KiDispatchException+0x1f6
- fffff803`08ef8fd0 fffff803`06b87c34 : ffffe48a`df1c4a40 fffff803`06a27b49 00000000`00000002 00000000`00000000 : nt!KiExceptionDispatch+0xce
- fffff803`08ef91b0 fffff80f`9f92777b : ffffe48a`deaa2040 fffff803`08ef9370 ffffe48a`df1c4a40 fffff803`06b135b0 : nt!KiGeneralProtectionFault+0xf4
- fffff803`08ef9340 ffffe48a`deaa2040 : fffff803`08ef9370 ffffe48a`df1c4a40 fffff803`06b135b0 fffff803`08ef93d0 : Qcamain10x64+0x12777b
- fffff803`08ef9348 fffff803`08ef9370 : ffffe48a`df1c4a40 fffff803`06b135b0 fffff803`08ef93d0 fffff803`08ef93d8 : 0xffffe48a`deaa2040
- fffff803`08ef9350 ffffe48a`df1c4a40 : fffff803`06b135b0 fffff803`08ef93d0 fffff803`08ef93d8 00000000`00035400 : 0xfffff803`08ef9370
- fffff803`08ef9358 fffff803`06b135b0 : fffff803`08ef93d0 fffff803`08ef93d8 00000000`00035400 fffff80f`9f9dda48 : 0xffffe48a`df1c4a40
- fffff803`08ef9360 00000000`ffffffff : ffffe48a`dfc39d10 ffffe48a`deaa2068 fffff803`08ef9418 fffff80f`9f92a7b5 : nt!ExInterlockedInsertTailList+0x20
- fffff803`08ef9390 ffffe48a`dfc39d10 : ffffe48a`deaa2068 fffff803`08ef9418 fffff80f`9f92a7b5 ffffe48a`deaa2040 : 0xffffffff
- fffff803`08ef9398 ffffe48a`deaa2068 : fffff803`08ef9418 fffff80f`9f92a7b5 ffffe48a`deaa2040 ffffe48a`df1c4c30 : 0xffffe48a`dfc39d10
- fffff803`08ef93a0 fffff803`08ef9418 : fffff80f`9f92a7b5 ffffe48a`deaa2040 ffffe48a`df1c4c30 ffffe48a`dffca624 : 0xffffe48a`deaa2068
- fffff803`08ef93a8 fffff80f`9f92a7b5 : ffffe48a`deaa2040 ffffe48a`df1c4c30 ffffe48a`dffca624 fffff803`79a27368 : 0xfffff803`08ef9418
- fffff803`08ef93b0 ffffe48a`deaa2040 : ffffe48a`df1c4c30 ffffe48a`dffca624 fffff803`79a27368 fffff803`0000001a : Qcamain10x64+0x12a7b5
- fffff803`08ef93b8 ffffe48a`df1c4c30 : ffffe48a`dffca624 fffff803`79a27368 fffff803`0000001a fffff803`00000001 : 0xffffe48a`deaa2040
- fffff803`08ef93c0 ffffe48a`dffca624 : fffff803`79a27368 fffff803`0000001a fffff803`00000001 ffffcf01`62399608 : 0xffffe48a`df1c4c30
- fffff803`08ef93c8 fffff803`79a27368 : fffff803`0000001a fffff803`00000001 ffffcf01`62399608 ffffe48a`df0a64e0 : 0xffffe48a`dffca624
- fffff803`08ef93d0 fffff803`0000001a : fffff803`00000001 ffffcf01`62399608 ffffe48a`df0a64e0 00000000`79486400 : 0xfffff803`79a27368
- fffff803`08ef93d8 fffff803`00000001 : ffffcf01`62399608 ffffe48a`df0a64e0 00000000`79486400 00000000`cecebeef : 0xfffff803`0000001a
- fffff803`08ef93e0 ffffcf01`62399608 : ffffe48a`df0a64e0 00000000`79486400 00000000`cecebeef ffffe48a`df1c4c30 : 0xfffff803`00000001
- fffff803`08ef93e8 ffffe48a`df0a64e0 : 00000000`79486400 00000000`cecebeef ffffe48a`df1c4c30 ffffe48a`deaa2040 : 0xffffcf01`62399608
- fffff803`08ef93f0 00000000`79486400 : 00000000`cecebeef ffffe48a`df1c4c30 ffffe48a`deaa2040 ffffe48a`dfc136d0 : 0xffffe48a`df0a64e0
- fffff803`08ef93f8 00000000`cecebeef : ffffe48a`df1c4c30 ffffe48a`deaa2040 ffffe48a`dfc136d0 00000000`00000000 : 0x79486400
- fffff803`08ef9400 ffffe48a`df1c4c30 : ffffe48a`deaa2040 ffffe48a`dfc136d0 00000000`00000000 ffffe48a`dfc136d0 : 0xcecebeef
- fffff803`08ef9408 ffffe48a`deaa2040 : ffffe48a`dfc136d0 00000000`00000000 ffffe48a`dfc136d0 ffffe48a`dfc135e0 : 0xffffe48a`df1c4c30
- fffff803`08ef9410 ffffe48a`dfc136d0 : 00000000`00000000 ffffe48a`dfc136d0 ffffe48a`dfc135e0 00000000`00000001 : 0xffffe48a`deaa2040
- fffff803`08ef9418 00000000`00000000 : ffffe48a`dfc136d0 ffffe48a`dfc135e0 00000000`00000001 ffffe48a`df1c4a40 : 0xffffe48a`dfc136d0
- STACK_COMMAND: kb
- THREAD_SHA1_HASH_MOD_FUNC: df7cc52ccbd49a12fde7110ac06d83366b2241a7
- THREAD_SHA1_HASH_MOD_FUNC_OFFSET: db5c19b2027c87e0966a9649f35c47ccc08cdbc8
- THREAD_SHA1_HASH_MOD: c0188612f77f36c9401200bde49053f65d082e94
- FOLLOWUP_IP:
- Qcamain10x64+12777b
- fffff80f`9f92777b 488b13 mov rdx,qword ptr [rbx]
- FAULT_INSTR_CODE: 48138b48
- SYMBOL_STACK_INDEX: 7
- SYMBOL_NAME: Qcamain10x64+12777b
- FOLLOWUP_NAME: MachineOwner
- MODULE_NAME: Qcamain10x64
- IMAGE_NAME: Qcamain10x64.sys
- DEBUG_FLR_IMAGE_TIMESTAMP: 5875da6f
- BUCKET_ID_FUNC_OFFSET: 12777b
- FAILURE_BUCKET_ID: 0x1E_c0000005_R_STACKPTR_ERROR_Qcamain10x64!unknown_function
- BUCKET_ID: 0x1E_c0000005_R_STACKPTR_ERROR_Qcamain10x64!unknown_function
- PRIMARY_PROBLEM_CLASS: 0x1E_c0000005_R_STACKPTR_ERROR_Qcamain10x64!unknown_function
- TARGET_TIME: 2017-09-17T02:33:17.000Z
- SUITE_MASK: 784
- PRODUCT_TYPE: 1
- USER_LCID: 0
- FAILURE_ID_HASH_STRING: km:0x1e_c0000005_r_stackptr_error_qcamain10x64!unknown_function
- FAILURE_ID_HASH: {1d946fc0-3ad4-7650-77c3-117229094abb}
- Followup: MachineOwner
- ========================================================================
- ==================== Dump File: 091117-7859-01.dmp =====================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 15063 MP (8 procs) Free x64
- Kernel base = 0xfffff800`47e8d000 PsLoadedModuleList = 0xfffff800`481d95c0
- Debug session time: Sun Sep 10 16:28:40.458 2017 (UTC - 4:00)
- System Uptime: 0 days 15:51:33.131
- BugCheck 1E, {ffffffffc0000005, fffff80048088fbd, 0, ffffffffffffffff}
- *** WARNING: Unable to verify timestamp for Qcamain10x64.sys
- *** ERROR: Module load completed but symbols could not be loaded for Qcamain10x64.sys
- Probably caused by : nwifi.sys ( nwifi!Dot11PrepareEthernetPayloadPacketComplete+14 )
- Followup: MachineOwner
- KMODE_EXCEPTION_NOT_HANDLED (1e)
- This is a very common bugcheck. Usually the exception address pinpoints
- the driver/function that caused the problem. Always note this address
- as well as the link date of the driver/image that contains this address.
- Arguments:
- Arg1: ffffffffc0000005, The exception code that was not handled
- Arg2: fffff80048088fbd, The address that the exception occurred at
- Arg3: 0000000000000000, Parameter 0 of the exception
- Arg4: ffffffffffffffff, Parameter 1 of the exception
- Debugging Details:
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- DUMP_TYPE: 2
- READ_ADDRESS: fffff8004826e358: Unable to get MiVisibleState
- ffffffffffffffff
- EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
- FAULTING_IP:
- nt!KiAcquireSpinLockInstrumented+55
- fffff800`48088fbd f0480fba2900 lock bts qword ptr [rcx],0
- EXCEPTION_PARAMETER2: ffffffffffffffff
- BUGCHECK_STR: 0x1E_c0000005_R
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
- PROCESS_NAME: System
- CURRENT_IRQL: 2
- EXCEPTION_RECORD: 0000000000000002 -- (.exr 0x2)
- Cannot read Exception record @ 0000000000000002
- TRAP_FRAME: 0000000000000002 -- (.trap 0x2)
- Unable to read trap frame at 00000000`00000002
- LAST_CONTROL_TRANSFER: from fffff800480880b6 to fffff80047ff9560
- STACK_TEXT:
- fffff800`4a2f7c68 fffff800`480880b6 : 00000000`0000001e ffffffff`c0000005 fffff800`48088fbd 00000000`00000000 : nt!KeBugCheckEx
- fffff800`4a2f7c70 fffff800`47fffa3d : fffff800`48217000 fffff800`47e8d000 000536a0`00889000 00000000`00000000 : nt!KiFatalExceptionHandler+0x22
- fffff800`4a2f7cb0 fffff800`47eb8d94 : 00000000`00000000 fffff800`4a2f7de0 00000000`00000000 00000000`00000000 : nt!RtlpExecuteHandlerForException+0xd
- fffff800`4a2f7ce0 fffff800`47eb7b36 : fffff800`4a2f8bb8 fffff800`4a2f8900 fffff800`4a2f8bb8 fffff800`4a2f8bb8 : nt!RtlDispatchException+0x404
- fffff800`4a2f83d0 fffff800`4800498e : 00000000`00000002 fffff800`47ea320b 00000000`00000002 fffff800`48286a40 : nt!KiDispatchException+0x1f6
- fffff800`4a2f8a80 fffff800`48002c34 : 00000001`00000001 ffff8a0e`00000000 00000000`00000001 fffff80c`20c6e2bf : nt!KiExceptionDispatch+0xce
- fffff800`4a2f8c60 fffff800`48088fbd : ffff8a0e`d0d0a768 fffff80c`26002055 00000000`00000000 00000000`00000000 : nt!KiGeneralProtectionFault+0xf4
- fffff800`4a2f8df0 fffff800`47ea2b49 : 00000000`00000002 ffff8a0e`f2c72010 ffff8a0e`d8fa6040 00000000`00000000 : nt!KiAcquireSpinLockInstrumented+0x55
- fffff800`4a2f8e40 fffff80c`20c84fd7 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeAcquireSpinLockRaiseToDpc+0x39
- fffff800`4a2f8e70 fffff80c`20c6f58b : ffff8a0e`dcd5f270 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisFreeToNPagedPool+0x17
- fffff800`4a2f8ea0 fffff80c`26dbdc24 : ffff8a0e`e0261220 00000000`00000000 ffff8a0e`f323a030 00000000`00000000 : ndis!NdisFreeNetBuffer+0xdb
- fffff800`4a2f8ed0 fffff80c`26db8e13 : ffff8a0e`f323a2c0 00000000`00000000 ffff8a0e`f323a030 ffff8a0e`d8f4f0c0 : nwifi!Dot11PrepareEthernetPayloadPacketComplete+0x14
- fffff800`4a2f8f00 fffff80c`26dbcc2d : 00000000`00000000 ffff8a0e`d8facb80 ffff8a0e`d8f65058 fffff80c`22fd1710 : nwifi!Dot11SendCompletion+0x4b
- fffff800`4a2f8f40 fffff80c`20c61a73 : ffff8a0e`f323a030 ffff8a0e`d8f4d010 ffff8a0e`d8f65040 ffff8a0e`d8f54058 : nwifi!Pt6SendComplete+0x1d
- fffff800`4a2f8f70 fffff80c`262f1617 : ffff8a0e`d56f21a0 00000000`00000000 00000000`00000000 ffff8a0e`f323a002 : ndis!NdisMSendNetBufferListsComplete+0x183
- fffff800`4a2f9060 fffff80c`262c1cb3 : ffff8a0e`d71cacb0 fffff80c`2615d901 ffff8a0e`f323a030 00000000`00000000 : wdiwifi!CPort::SendCompleteNetBufferLists+0xef
- fffff800`4a2f90b0 fffff80c`262b68de : ffff8a0e`d5aa87d0 ffff8a0e`d56bed00 ffff8a0e`f323a030 00000000`00000000 : wdiwifi!CAdapter::SendCompleteNbl+0x123
- fffff800`4a2f9120 fffff80c`262b6553 : ffff8a0e`d173b600 ffff8a0e`d56bed30 ffff8a0e`f323a030 fffff800`00000001 : wdiwifi!CTxMgr::CompleteNdisNbl+0xbe
- fffff800`4a2f9180 fffff80c`262b3f24 : ffff8a0e`d173b620 fffff80c`26348df0 fffff80c`26348df0 fffff80c`262a7363 : wdiwifi!CTxMgr::CompleteNBLs+0x5b
- fffff800`4a2f91c0 fffff80c`260f7d05 : 00000000`00000000 00000000`00000000 ffff8a0e`d5741000 fffff800`4a2f9300 : wdiwifi!CTxMgr::TxSendCompleteInd+0x66c
- fffff800`4a2f9290 00000000`00000000 : 00000000`00000000 ffff8a0e`d5741000 fffff800`4a2f9300 00000000`00000000 : Qcamain10x64+0xf7d05
- STACK_COMMAND: kb
- THREAD_SHA1_HASH_MOD_FUNC: 3dda04472fff06d0c415298f0d3489c7cbe2d0e6
- THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 61f46d65dd711956669656a8d7ea17d06736b606
- THREAD_SHA1_HASH_MOD: ed7a88183b430d78dbdbad231d603be290777789
- FOLLOWUP_IP:
- nwifi!Dot11PrepareEthernetPayloadPacketComplete+14
- fffff80c`26dbdc24 488bcb mov rcx,rbx
- FAULT_INSTR_CODE: 48cb8b48
- SYMBOL_STACK_INDEX: b
- SYMBOL_NAME: nwifi!Dot11PrepareEthernetPayloadPacketComplete+14
- FOLLOWUP_NAME: MachineOwner
- MODULE_NAME: nwifi
- IMAGE_NAME: nwifi.sys
- DEBUG_FLR_IMAGE_TIMESTAMP: 3e4b5b01
- IMAGE_VERSION: 10.0.15052.0
- BUCKET_ID_FUNC_OFFSET: 14
- FAILURE_BUCKET_ID: OLD_IMAGE_nwifi.sys
- BUCKET_ID: OLD_IMAGE_nwifi.sys
- PRIMARY_PROBLEM_CLASS: OLD_IMAGE_nwifi.sys
- TARGET_TIME: 2017-09-10T20:28:40.000Z
- SUITE_MASK: 784
- PRODUCT_TYPE: 1
- USER_LCID: 0
- FAILURE_ID_HASH_STRING: km:old_image_nwifi.sys
- FAILURE_ID_HASH: {45c67169-ba4a-146f-5ace-fa1fd15a28a2}
- Followup: MachineOwner
- ========================================================================
- ==================== Dump File: 091017-8593-01.dmp =====================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 15063 MP (8 procs) Free x64
- Kernel base = 0xfffff801`76006000 PsLoadedModuleList = 0xfffff801`763525c0
- Debug session time: Sat Sep 9 23:41:19.135 2017 (UTC - 4:00)
- System Uptime: 1 days 1:19:20.704
- BugCheck 1E, {ffffffffc000001d, fffff80176075514, ffff8001b2facd80, 0}
- *** WARNING: Unable to verify timestamp for win32k.sys
- *** ERROR: Module load completed but symbols could not be loaded for win32k.sys
- Probably caused by : memory_corruption
- Followup: memory_corruption
- KMODE_EXCEPTION_NOT_HANDLED (1e)
- This is a very common bugcheck. Usually the exception address pinpoints
- the driver/function that caused the problem. Always note this address
- as well as the link date of the driver/image that contains this address.
- Arguments:
- Arg1: ffffffffc000001d, The exception code that was not handled
- Arg2: fffff80176075514, The address that the exception occurred at
- Arg3: ffff8001b2facd80, Parameter 0 of the exception
- Arg4: 0000000000000000, Parameter 1 of the exception
- Debugging Details:
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- DUMP_TYPE: 2
- EXCEPTION_CODE: (NTSTATUS) 0xc000001d - {EXCEPTION} Illegal Instruction An attempt was made to execute an illegal instruction.
- FAULTING_IP:
- nt!KiDirectSwitchThread+704
- fffff801`76075514 ff ???
- EXCEPTION_PARAMETER1: ffff8001b2facd80
- BUGCHECK_STR: 0x1E_c000001d
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: CODE_CORRUPTION
- PROCESS_NAME: System
- CURRENT_IRQL: 0
- EXCEPTION_RECORD: 0000000000000003 -- (.exr 0x3)
- Cannot read Exception record @ 0000000000000003
- LAST_CONTROL_TRANSFER: from fffff80176030b7c to fffff80176172560
- FAILED_INSTRUCTION_ADDRESS:
- nt!KiDirectSwitchThread+704
- fffff801`76075514 ff ???
- STACK_TEXT:
- ffff8001`b2f3b1b8 fffff801`76030b7c : 00000000`0000001e ffffffff`c000001d fffff801`76075514 ffff8001`b2facd80 : nt!KeBugCheckEx
- ffff8001`b2f3b1c0 fffff801`7617d98e : 00000000`00000003 00000000`ffffffff ffffe18a`114dc520 ffffe18a`119efeb0 : nt!KiDispatchException+0x23c
- ffff8001`b2f3b870 fffff801`7617b43d : 00000000`00000002 00000000`00000000 ffff8001`b2f3bb80 00000000`00000001 : nt!KiExceptionDispatch+0xce
- ffff8001`b2f3ba50 fffff801`76075514 : ffffffff`00000000 ffff8001`b2da0180 ffff8001`b2facd80 ffffe18a`13e3d080 : nt!KiInvalidOpcodeFault+0xfd
- ffff8001`b2f3bbe0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDirectSwitchThread+0x704
- STACK_COMMAND: kb
- CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
- fffff8017610c109 - nt!MiMakeSystemCachePteValid+3d
- [ fa:ae ]
- fffff8017610c137-fffff8017610c138 2 bytes - nt!MiMakeSystemCachePteValid+6b (+0x2e)
- [ 80 f6:00 df ]
- 3 errors : !nt (fffff8017610c109-fffff8017610c138)
- MODULE_NAME: memory_corruption
- IMAGE_NAME: memory_corruption
- FOLLOWUP_NAME: memory_corruption
- DEBUG_FLR_IMAGE_TIMESTAMP: 0
- MEMORY_CORRUPTOR: LARGE
- FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
- BUCKET_ID: MEMORY_CORRUPTION_LARGE
- PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
- TARGET_TIME: 2017-09-10T03:41:19.000Z
- SUITE_MASK: 784
- PRODUCT_TYPE: 1
- USER_LCID: 0
- FAILURE_ID_HASH_STRING: km:memory_corruption_large
- FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
- Followup: memory_corruption
- ========================================================================
- ==================== Dump File: 090917-7859-01.dmp =====================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 15063 MP (8 procs) Free x64
- Kernel base = 0xfffff803`93401000 PsLoadedModuleList = 0xfffff803`9374d5c0
- Debug session time: Fri Sep 8 22:14:05.489 2017 (UTC - 4:00)
- System Uptime: 0 days 12:14:26.164
- BugCheck A, {66477ca827, 2, 0, fffff803934538b4}
- *** WARNING: Unable to verify timestamp for win32k.sys
- *** ERROR: Module load completed but symbols could not be loaded for win32k.sys
- Probably caused by : memory_corruption ( nt!MiLocateSubsectionNode+114 )
- Followup: MachineOwner
- IRQL_NOT_LESS_OR_EQUAL (a)
- An attempt was made to access a pageable (or completely invalid) address at an
- interrupt request level (IRQL) that is too high. This is usually
- caused by drivers using improper addresses.
- If a kernel debugger is available get the stack backtrace.
- Arguments:
- Arg1: 00000066477ca827, memory referenced
- Arg2: 0000000000000002, IRQL
- Arg3: 0000000000000000, bitfield :
- bit 0 : value 0 = read operation, 1 = write operation
- bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
- Arg4: fffff803934538b4, address which referenced memory
- Debugging Details:
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- DUMP_TYPE: 2
- READ_ADDRESS: fffff803937e2358: Unable to get MiVisibleState
- 00000066477ca827
- CURRENT_IRQL: 2
- FAULTING_IP:
- nt!MiLocateSubsectionNode+114
- fffff803`934538b4 418b40ec mov eax,dword ptr [r8-14h]
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
- BUGCHECK_STR: AV
- PROCESS_NAME: System
- TRAP_FRAME: ffff95818e4fb580 -- (.trap 0xffff95818e4fb580)
- NOTE: The trap frame does not contain all registers.
- Some register values may be zeroed or incorrect.
- rax=0000000000000100 rbx=0000000000000000 rcx=0000010f0000010a
- rdx=0000010f00000109 rsi=0000000000000000 rdi=0000000000000000
- rip=fffff803934538b4 rsp=ffff95818e4fb710 rbp=ffffb88c6e121b00
- r8=00000066477ca83b r9=0000000000000000 r10=0000010f0000000a
- r11=ffff95818e4fb7a8 r12=0000000000000000 r13=0000000000000000
- r14=0000000000000000 r15=0000000000000000
- iopl=0 nv up ei pl nz na pe nc
- nt!MiLocateSubsectionNode+0x114:
- fffff803`934538b4 418b40ec mov eax,dword ptr [r8-14h] ds:00000066`477ca827=????????
- Resetting default scope
- LAST_CONTROL_TRANSFER: from fffff803935788a9 to fffff8039356d560
- STACK_TEXT:
- ffff9581`8e4fb438 fffff803`935788a9 : 00000000`0000000a 00000066`477ca827 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
- ffff9581`8e4fb440 fffff803`93576e7d : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
- ffff9581`8e4fb580 fffff803`934538b4 : 00000000`00000000 00000002`0c019540 ffffb88c`72529cb8 fffff803`934625e1 : nt!KiPageFault+0x23d
- ffff9581`8e4fb710 fffff803`9345351b : ffffb88c`6e121b00 00000000`00000000 ffff9581`8e4fb918 ffffb88c`6e121b80 : nt!MiLocateSubsectionNode+0x114
- ffff9581`8e4fb7b0 fffff803`934533b6 : ffff9581`8e4fb890 ffff9581`8e4fb890 ffff9581`8e4fb918 ffffcb89`e90c0000 : nt!MiComputeDataFlushRange+0x53
- ffff9581`8e4fb800 fffff803`9345322c : ffff9581`92cf0a50 00000000`00001000 00000000`00000000 00000000`00000000 : nt!MiComputeFlushRange+0x56
- ffff9581`8e4fb850 fffff803`93452dc5 : 00000000`00000000 00000000`00001000 00000000`00001000 00000000`00000000 : nt!MmFlushSection+0x48
- ffff9581`8e4fb900 fffff803`934517fa : ffffb88c`6e17a830 00000000`00000000 ffffb88c`00000001 ffff9581`8e4fba70 : nt!CcFlushCachePriv+0x4a5
- ffff9581`8e4fba40 fffff803`9343eca8 : 00000000`00000000 ffffb88c`7561f001 ffffb88c`00000000 7fffffff`ffffffff : nt!CcWriteBehindInternal+0x19a
- ffff9581`8e4fbb00 fffff803`934ddac7 : 61713b35`35322634 00000000`00000080 ffffb88c`698be500 ffffb88c`7561f040 : nt!ExpWorkerThread+0xd8
- ffff9581`8e4fbb90 fffff803`935729e6 : fffff803`926cf180 ffffb88c`7561f040 fffff803`934dda80 663b2932`33287961 : nt!PspSystemThreadStartup+0x47
- ffff9581`8e4fbbe0 00000000`00000000 : ffff9581`8e4fc000 ffff9581`8e4f5000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
- STACK_COMMAND: kb
- THREAD_SHA1_HASH_MOD_FUNC: 3dd8ed75c0d82a2250e718833841f4991777cda5
- THREAD_SHA1_HASH_MOD_FUNC_OFFSET: bdf689843a7d228d8f985ce4107df7be47e32dec
- THREAD_SHA1_HASH_MOD: dc844b1b94baa204d070855e43bbbd27eee98b94
- FOLLOWUP_IP:
- nt!MiLocateSubsectionNode+114
- fffff803`934538b4 418b40ec mov eax,dword ptr [r8-14h]
- FAULT_INSTR_CODE: ec408b41
- SYMBOL_STACK_INDEX: 3
- SYMBOL_NAME: nt!MiLocateSubsectionNode+114
- FOLLOWUP_NAME: MachineOwner
- MODULE_NAME: nt
- DEBUG_FLR_IMAGE_TIMESTAMP: 597fd80d
- IMAGE_VERSION: 10.0.15063.540
- IMAGE_NAME: memory_corruption
- BUCKET_ID_FUNC_OFFSET: 114
- FAILURE_BUCKET_ID: AV_nt!MiLocateSubsectionNode
- BUCKET_ID: AV_nt!MiLocateSubsectionNode
- PRIMARY_PROBLEM_CLASS: AV_nt!MiLocateSubsectionNode
- TARGET_TIME: 2017-09-09T02:14:05.000Z
- SUITE_MASK: 784
- PRODUCT_TYPE: 1
- USER_LCID: 0
- FAILURE_ID_HASH_STRING: km:av_nt!milocatesubsectionnode
- FAILURE_ID_HASH: {cfde05f4-7a6c-d1d0-079d-7fc336e5102d}
- Followup: MachineOwner
- ========================================================================
- ==================== Dump File: 090817-9328-01.dmp =====================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 15063 MP (8 procs) Free x64
- Kernel base = 0xfffff802`5b000000 PsLoadedModuleList = 0xfffff802`5b34c5c0
- Debug session time: Fri Sep 8 09:58:32.400 2017 (UTC - 4:00)
- System Uptime: 3 days 13:00:09.509
- BugCheck 139, {3, ffff8c80fcfb71c0, ffff8c80fcfb7118, 0}
- *** WARNING: Unable to verify timestamp for Qcamain10x64.sys
- *** ERROR: Module load completed but symbols could not be loaded for Qcamain10x64.sys
- Probably caused by : Qcamain10x64.sys ( Qcamain10x64+fc38c )
- Followup: MachineOwner
- KERNEL_SECURITY_CHECK_FAILURE (139)
- A kernel component has corrupted a critical data structure. The corruption
- could potentially allow a malicious user to gain control of this machine.
- Arguments:
- Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
- Arg2: ffff8c80fcfb71c0, Address of the trap frame for the exception that caused the bugcheck
- Arg3: ffff8c80fcfb7118, Address of the exception record for the exception that caused the bugcheck
- Arg4: 0000000000000000, Reserved
- Debugging Details:
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- DUMP_TYPE: 2
- TRAP_FRAME: ffff8c80fcfb71c0 -- (.trap 0xffff8c80fcfb71c0)
- NOTE: The trap frame does not contain all registers.
- Some register values may be zeroed or incorrect.
- rax=ffffdd8146a4fad8 rbx=0000000000000000 rcx=0000000000000003
- rdx=ffffdd8146a4f1a0 rsi=0000000000000000 rdi=0000000000000000
- rip=fffff8025b1c2603 rsp=ffff8c80fcfb7350 rbp=0000000000000000
- r8=ffffdd8138b0c408 r9=0000000000000000 r10=0000000000000000
- r11=ffff8c80fcfb7300 r12=0000000000000000 r13=0000000000000000
- r14=0000000000000000 r15=0000000000000000
- iopl=0 nv up di ng nz na po cy
- nt!ExInterlockedInsertTailList+0xc1523:
- fffff802`5b1c2603 cd29 int 29h
- Resetting default scope
- EXCEPTION_RECORD: ffff8c80fcfb7118 -- (.exr 0xffff8c80fcfb7118)
- ExceptionAddress: fffff8025b1c2603 (nt!ExInterlockedInsertTailList+0x00000000000c1523)
- ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
- ExceptionFlags: 00000001
- NumberParameters: 1
- Parameter[0]: 0000000000000003
- Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: LIST_ENTRY_CORRUPT
- BUGCHECK_STR: 0x139
- PROCESS_NAME: System
- CURRENT_IRQL: 2
- ERROR_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.
- EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.
- EXCEPTION_CODE_STR: c0000409
- EXCEPTION_PARAMETER1: 0000000000000003
- LAST_CONTROL_TRANSFER: from fffff8025b1778a9 to fffff8025b16c560
- STACK_TEXT:
- ffff8c80`fcfb6e98 fffff802`5b1778a9 : 00000000`00000139 00000000`00000003 ffff8c80`fcfb71c0 ffff8c80`fcfb7118 : nt!KeBugCheckEx
- ffff8c80`fcfb6ea0 fffff802`5b177c10 : 00000001`00000200 00000000`00000000 ffffdd81`376ea1a0 fffff80f`00000200 : nt!KiBugCheckDispatch+0x69
- ffff8c80`fcfb6fe0 fffff802`5b176bf7 : ffffdd81`32b0a6c8 00000000`00000000 ffffdd81`378b8000 fffff802`5b88d5d6 : nt!KiFastFailDispatch+0xd0
- ffff8c80`fcfb71c0 fffff802`5b1c2603 : ffffdd81`38b0c418 ffff8c80`00000000 ffffdd81`46a4f1a0 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0xf7
- ffff8c80`fcfb7350 fffff800`03a3c38c : ffffdd81`38b0c040 ffffdd81`46a4ef28 ffffdd81`46a4ef28 ffffdd81`46a4ef28 : nt!ExInterlockedInsertTailList+0xc1523
- ffff8c80`fcfb7380 ffffdd81`38b0c040 : ffffdd81`46a4ef28 ffffdd81`46a4ef28 ffffdd81`46a4ef28 ffffdd81`38b0c040 : Qcamain10x64+0xfc38c
- ffff8c80`fcfb7388 ffffdd81`46a4ef28 : ffffdd81`46a4ef28 ffffdd81`46a4ef28 ffffdd81`38b0c040 fffff800`0399d0d7 : 0xffffdd81`38b0c040
- ffff8c80`fcfb7390 ffffdd81`46a4ef28 : ffffdd81`46a4ef28 ffffdd81`38b0c040 fffff800`0399d0d7 ffffdd81`38b0c040 : 0xffffdd81`46a4ef28
- ffff8c80`fcfb7398 ffffdd81`46a4ef28 : ffffdd81`38b0c040 fffff800`0399d0d7 ffffdd81`38b0c040 00000000`00000000 : 0xffffdd81`46a4ef28
- ffff8c80`fcfb73a0 ffffdd81`38b0c040 : fffff800`0399d0d7 ffffdd81`38b0c040 00000000`00000000 ffffdd81`38b0c040 : 0xffffdd81`46a4ef28
- ffff8c80`fcfb73a8 fffff800`0399d0d7 : ffffdd81`38b0c040 00000000`00000000 ffffdd81`38b0c040 00000000`00000000 : 0xffffdd81`38b0c040
- ffff8c80`fcfb73b0 ffffdd81`38b0c040 : 00000000`00000000 ffffdd81`38b0c040 00000000`00000000 ffffdd81`46a4ef28 : Qcamain10x64+0x5d0d7
- ffff8c80`fcfb73b8 00000000`00000000 : ffffdd81`38b0c040 00000000`00000000 ffffdd81`46a4ef28 fffff800`03941292 : 0xffffdd81`38b0c040
- STACK_COMMAND: kb
- THREAD_SHA1_HASH_MOD_FUNC: 4ed2fddd163a6d816e80ec9db44c7ec8907dc3ef
- THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 129e132466a733efb2bc5af7677ec484d471af33
- THREAD_SHA1_HASH_MOD: 56650451dd136af79302f8c8047f918da248c25a
- FOLLOWUP_IP:
- Qcamain10x64+fc38c
- fffff800`03a3c38c f0ff83f0030000 lock inc dword ptr [rbx+3F0h]
- FAULT_INSTR_CODE: f083fff0
- SYMBOL_STACK_INDEX: 5
- SYMBOL_NAME: Qcamain10x64+fc38c
- FOLLOWUP_NAME: MachineOwner
- MODULE_NAME: Qcamain10x64
- IMAGE_NAME: Qcamain10x64.sys
- DEBUG_FLR_IMAGE_TIMESTAMP: 5875da6f
- BUCKET_ID_FUNC_OFFSET: fc38c
- FAILURE_BUCKET_ID: 0x139_3_Qcamain10x64!unknown_function
- BUCKET_ID: 0x139_3_Qcamain10x64!unknown_function
- PRIMARY_PROBLEM_CLASS: 0x139_3_Qcamain10x64!unknown_function
- TARGET_TIME: 2017-09-08T13:58:32.000Z
- SUITE_MASK: 784
- PRODUCT_TYPE: 1
- USER_LCID: 0
- FAILURE_ID_HASH_STRING: km:0x139_3_qcamain10x64!unknown_function
- FAILURE_ID_HASH: {4576ae2e-9109-1045-88f4-cb0d1a7b795f}
- Followup: MachineOwner
- ========================================================================
- ==================== Dump File: 090417-8125-01.dmp =====================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 15063 MP (8 procs) Free x64
- Kernel base = 0xfffff800`1fc8d000 PsLoadedModuleList = 0xfffff800`1ffd95c0
- Debug session time: Mon Sep 4 04:14:41.001 2017 (UTC - 4:00)
- System Uptime: 4 days 14:23:31.410
- BugCheck A, {c0000039, 2, 0, fffff8001fc2ddff}
- *** WARNING: Unable to verify timestamp for Qcamain10x64.sys
- *** ERROR: Module load completed but symbols could not be loaded for Qcamain10x64.sys
- *** WARNING: Unable to verify timestamp for win32k.sys
- *** ERROR: Module load completed but symbols could not be loaded for win32k.sys
- Probably caused by : Qcamain10x64.sys ( Qcamain10x64+fc9cc )
- Followup: MachineOwner
- IRQL_NOT_LESS_OR_EQUAL (a)
- An attempt was made to access a pageable (or completely invalid) address at an
- interrupt request level (IRQL) that is too high. This is usually
- caused by drivers using improper addresses.
- If a kernel debugger is available get the stack backtrace.
- Arguments:
- Arg1: 00000000c0000039, memory referenced
- Arg2: 0000000000000002, IRQL
- Arg3: 0000000000000000, bitfield :
- bit 0 : value 0 = read operation, 1 = write operation
- bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
- Arg4: fffff8001fc2ddff, address which referenced memory
- Debugging Details:
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- DUMP_TYPE: 2
- READ_ADDRESS: fffff8002006e358: Unable to get MiVisibleState
- 00000000c0000039
- CURRENT_IRQL: 2
- FAULTING_IP:
- hal!HalPutScatterGatherList+1963f
- fffff800`1fc2ddff 418b6e2c mov ebp,dword ptr [r14+2Ch]
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
- BUGCHECK_STR: AV
- PROCESS_NAME: System
- TRAP_FRAME: fffff800220f8c90 -- (.trap 0xfffff800220f8c90)
- NOTE: The trap frame does not contain all registers.
- Some register values may be zeroed or incorrect.
- rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000001
- rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
- rip=fffff8001fc2ddff rsp=fffff800220f8e20 rbp=ffffbb81403a0a20
- r8=ffffce0a995deb30 r9=ffffce0aafc81660 r10=ffffce0a995deb30
- r11=ffffce0aafc81620 r12=0000000000000000 r13=0000000000000000
- r14=0000000000000000 r15=0000000000000000
- iopl=0 nv up ei pl nz na pe nc
- hal!HalPutScatterGatherList+0x1963f:
- fffff800`1fc2ddff 418b6e2c mov ebp,dword ptr [r14+2Ch] ds:00000000`0000002c=????????
- Resetting default scope
- LAST_CONTROL_TRANSFER: from fffff8001fe048a9 to fffff8001fdf9560
- STACK_TEXT:
- fffff800`220f8b48 fffff800`1fe048a9 : 00000000`0000000a 00000000`c0000039 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
- fffff800`220f8b50 fffff800`1fe02e7d : 00000000`00000000 00000000`00000001 00000000`00000000 ffffce0a`d27c01a0 : nt!KiBugCheckDispatch+0x69
- fffff800`220f8c90 fffff800`1fc2ddff : ffffce0a`bdf14f30 ffffce0a`afc81660 00000000`00000001 ffffce0a`995deb30 : nt!KiPageFault+0x23d
- fffff800`220f8e20 fffff809`2d20c898 : ffffce0a`cfb267e0 00000000`00000001 00000000`00000000 00000000`00000000 : hal!HalPutScatterGatherList+0x1963f
- fffff800`220f8e80 fffff809`30b3c9cc : 00000000`00000000 00000000`00000001 ffffce0a`99680030 00000000`00000000 : ndis!NdisMFreeNetBufferSGList+0x38
- fffff800`220f8ec0 00000000`00000000 : 00000000`00000001 ffffce0a`99680030 00000000`00000000 fffff809`30be0102 : Qcamain10x64+0xfc9cc
- STACK_COMMAND: kb
- THREAD_SHA1_HASH_MOD_FUNC: 830cbe77ddb612ecba944625686ae88037b74cca
- THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 28d978a460765c1eaeb858b8801d7b70f9548ba9
- THREAD_SHA1_HASH_MOD: 35775663fedbdd5e0dd10b579d6e121aac14070a
- FOLLOWUP_IP:
- Qcamain10x64+fc9cc
- fffff809`30b3c9cc 4d8b3f mov r15,qword ptr [r15]
- FAULT_INSTR_CODE: 663f8b4d
- SYMBOL_STACK_INDEX: 5
- SYMBOL_NAME: Qcamain10x64+fc9cc
- FOLLOWUP_NAME: MachineOwner
- MODULE_NAME: Qcamain10x64
- IMAGE_NAME: Qcamain10x64.sys
- DEBUG_FLR_IMAGE_TIMESTAMP: 5875da6f
- BUCKET_ID_FUNC_OFFSET: fc9cc
- FAILURE_BUCKET_ID: AV_Qcamain10x64!unknown_function
- BUCKET_ID: AV_Qcamain10x64!unknown_function
- PRIMARY_PROBLEM_CLASS: AV_Qcamain10x64!unknown_function
- TARGET_TIME: 2017-09-04T08:14:41.000Z
- SUITE_MASK: 784
- PRODUCT_TYPE: 1
- USER_LCID: 0
- FAILURE_ID_HASH_STRING: km:av_qcamain10x64!unknown_function
- FAILURE_ID_HASH: {f52cafb4-1320-aedf-2a5d-ab5464b9e487}
- Followup: MachineOwner
- ========================================================================
- ==================== Dump File: 083117-7734-01.dmp =====================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 15063 MP (8 procs) Free x64
- Kernel base = 0xfffff802`00c7f000 PsLoadedModuleList = 0xfffff802`00fcb5c0
- Debug session time: Wed Aug 30 09:28:23.256 2017 (UTC - 4:00)
- System Uptime: 0 days 3:23:10.932
- BugCheck C2, {99, ffffbe87e242a6f0, 0, 0}
- *** WARNING: Unable to verify timestamp for Qcamain10x64.sys
- *** ERROR: Module load completed but symbols could not be loaded for Qcamain10x64.sys
- Probably caused by : nwifi.sys ( nwifi!Dot11FreeMdlAndMemForNdis6+59 )
- Followup: MachineOwner
- BAD_POOL_CALLER (c2)
- The current thread is making a bad pool request. Typically this is at a bad IRQL level or double freeing the same allocation, etc.
- Arguments:
- Arg1: 0000000000000099, Attempt to free pool with invalid address (or corruption in pool header)
- Arg2: ffffbe87e242a6f0, Address being freed
- Arg3: 0000000000000000, 0
- Arg4: 0000000000000000, 0
- Debugging Details:
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- DUMP_TYPE: 2
- FAULTING_IP:
- nwifi!Dot11FreeMdlAndMemForNdis6+59
- fffff802`009898e9 488b5c2430 mov rbx,qword ptr [rsp+30h]
- BUGCHECK_STR: 0xc2_99
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
- PROCESS_NAME: System
- CURRENT_IRQL: 2
- LAST_CONTROL_TRANSFER: from fffff802013eb03f to fffff80200deb560
- STACK_TEXT:
- fffff802`030f8ce8 fffff802`013eb03f : 00000000`000000c2 00000000`00000099 ffffbe87`e242a6f0 00000000`00000000 : nt!KeBugCheckEx
- fffff802`030f8cf0 fffff802`00e96b2d : fffff802`00c552e0 fffff802`00c552e0 ffffbe87`da89d001 fffff802`00c088f1 : nt!VerifierBugCheckIfAppropriate+0x6b
- fffff802`030f8d30 fffff802`00f00035 : 00000000`000009e0 fffff802`030f8e09 ffffbe87`e242a6e0 ffffbe87`df830030 : nt!VerifierFreeTrackedPool+0x41
- fffff802`030f8d70 fffff802`009898e9 : fffff802`0098cc10 00000000`00000000 00000000`00000000 00000000`00000001 : nt!ExFreePoolWithTag+0x1015
- fffff802`030f8e70 fffff806`d21aa91f : ffffbe87`df5af680 00000000`00000000 00000000`00000000 00000000`00000000 : nwifi!Dot11FreeMdlAndMemForNdis6+0x59
- fffff802`030f8ea0 fffff806`d21aa8e8 : ffffbe87`df5af680 ffffbe87`e3e7bad0 00000000`00000001 00000000`00000000 : ndis!NdisAdvanceNetBufferDataStart+0x253ff
- fffff802`030f8ed0 fffff802`00988e13 : ffffbe87`e3e7bd60 00000000`00000000 ffffbe87`e3e7bad0 ffffbe87`ddd8dca0 : ndis!NdisAdvanceNetBufferListDataStart+0x25418
- fffff802`030f8f00 fffff802`0098cc2d : 00000000`00000000 ffffbe87`ddd6ab00 ffffbe87`ddd8fcd8 fffff806`d4551710 : nwifi!Dot11SendCompletion+0x4b
- fffff802`030f8f40 fffff806`d2181a73 : ffffbe87`e3e7bad0 ffffbe87`ddd8d010 ffffbe87`ddd8fcc0 ffffbe87`ddd93798 : nwifi!Pt6SendComplete+0x1d
- fffff802`030f8f70 fffff806`d4ad1617 : ffffbe87`da35e1a0 00000000`00000000 00000000`00000000 ffffbe87`e3e7ba02 : ndis!NdisMSendNetBufferListsComplete+0x183
- fffff802`030f9060 fffff806`d4aa1cb3 : ffffbe87`dbff1cb0 fffff806`d493d901 ffffbe87`e3e7bad0 00000000`00000000 : wdiwifi!CPort::SendCompleteNetBufferLists+0xef
- fffff802`030f90b0 fffff806`d4a968de : ffffbe87`da8cd7d0 ffffbe87`db977200 ffffbe87`e3e7bad0 00000000`00000000 : wdiwifi!CAdapter::SendCompleteNbl+0x123
- fffff802`030f9120 fffff806`d4a96553 : ffffbe87`d63e5900 ffffbe87`db977230 ffffbe87`e3e7bad0 fffff802`00000001 : wdiwifi!CTxMgr::CompleteNdisNbl+0xbe
- fffff802`030f9180 fffff806`d4a93f24 : ffffbe87`d63e5940 fffff806`d4b28df0 fffff806`d4b28df0 fffff806`d4a87363 : wdiwifi!CTxMgr::CompleteNBLs+0x5b
- fffff802`030f91c0 fffff806`d48d7d05 : 00000000`00000000 00000000`00000000 ffffbe87`de066000 fffff802`030f9300 : wdiwifi!CTxMgr::TxSendCompleteInd+0x66c
- fffff802`030f9290 00000000`00000000 : 00000000`00000000 ffffbe87`de066000 fffff802`030f9300 00000000`00000000 : Qcamain10x64+0xf7d05
- STACK_COMMAND: kb
- THREAD_SHA1_HASH_MOD_FUNC: cb424d480c4c59aaa5079eebd7e723b8c5661867
- THREAD_SHA1_HASH_MOD_FUNC_OFFSET: c1c268c3f84fe4a7609a402a51630ec824e0db99
- THREAD_SHA1_HASH_MOD: 8b744a7043e2b2cef62ea3a0c3f879ed1ff50292
- FOLLOWUP_IP:
- nwifi!Dot11FreeMdlAndMemForNdis6+59
- fffff802`009898e9 488b5c2430 mov rbx,qword ptr [rsp+30h]
- FAULT_INSTR_CODE: 245c8b48
- SYMBOL_STACK_INDEX: 4
- SYMBOL_NAME: nwifi!Dot11FreeMdlAndMemForNdis6+59
- FOLLOWUP_NAME: MachineOwner
- MODULE_NAME: nwifi
- IMAGE_NAME: nwifi.sys
- DEBUG_FLR_IMAGE_TIMESTAMP: 3e4b5b01
- IMAGE_VERSION: 10.0.15052.0
- BUCKET_ID_FUNC_OFFSET: 59
- FAILURE_BUCKET_ID: OLD_IMAGE_nwifi.sys
- BUCKET_ID: OLD_IMAGE_nwifi.sys
- PRIMARY_PROBLEM_CLASS: OLD_IMAGE_nwifi.sys
- TARGET_TIME: 2017-08-30T13:28:23.000Z
- SUITE_MASK: 784
- PRODUCT_TYPE: 1
- USER_LCID: 0
- FAILURE_ID_HASH_STRING: km:old_image_nwifi.sys
- FAILURE_ID_HASH: {45c67169-ba4a-146f-5ace-fa1fd15a28a2}
- Followup: MachineOwner
- ========================================================================
- ==================== Dump File: 081317-8609-01.dmp =====================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 15063 MP (8 procs) Free x64
- Kernel base = 0xfffff800`f1e8a000 PsLoadedModuleList = 0xfffff800`f21d65c0
- Debug session time: Sun Aug 13 08:03:40.355 2017 (UTC - 4:00)
- System Uptime: 2 days 9:42:59.032
- BugCheck 1E, {ffffffffc0000005, fffff809053e1388, 0, ffffffffffffffff}
- *** WARNING: Unable to verify timestamp for win32k.sys
- *** ERROR: Module load completed but symbols could not be loaded for win32k.sys
- Probably caused by : memory_corruption
- Followup: memory_corruption
- KMODE_EXCEPTION_NOT_HANDLED (1e)
- This is a very common bugcheck. Usually the exception address pinpoints
- the driver/function that caused the problem. Always note this address
- as well as the link date of the driver/image that contains this address.
- Arguments:
- Arg1: ffffffffc0000005, The exception code that was not handled
- Arg2: fffff809053e1388, The address that the exception occurred at
- Arg3: 0000000000000000, Parameter 0 of the exception
- Arg4: ffffffffffffffff, Parameter 1 of the exception
- Debugging Details:
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- DUMP_TYPE: 2
- READ_ADDRESS: fffff800f226b358: Unable to get MiVisibleState
- ffffffffffffffff
- EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
- FAULTING_IP:
- intelppm!MWaitIdle+18
- fffff809`053e1388 c3 ret
- EXCEPTION_PARAMETER2: ffffffffffffffff
- BUGCHECK_STR: 0x1E_c0000005_R
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: CODE_CORRUPTION
- PROCESS_NAME: System
- CURRENT_IRQL: 0
- EXCEPTION_RECORD: 0000000000140001 -- (.exr 0x140001)
- Cannot read Exception record @ 0000000000140001
- LAST_CONTROL_TRANSFER: from fffff800f20850b6 to fffff800f1ff6560
- STACK_TEXT:
- ffffbc81`71cbc648 fffff800`f20850b6 : 00000000`0000001e ffffffff`c0000005 fffff809`053e1388 00000000`00000000 : nt!KeBugCheckEx
- ffffbc81`71cbc650 fffff800`f1ffca3d : fffff800`f2214000 fffff800`f1e8a000 000536a0`00889000 00000000`00000000 : nt!KiFatalExceptionHandler+0x22
- ffffbc81`71cbc690 fffff800`f1eb5d94 : 00000000`00000000 ffffbc81`71cbc7c0 00000000`00000000 00000000`00000000 : nt!RtlpExecuteHandlerForException+0xd
- ffffbc81`71cbc6c0 fffff800`f1eb4b36 : ffffbc81`71cbd598 ffffbc81`71cbd2e0 ffffbc81`71cbd598 ffffbc81`71cbd598 : nt!RtlDispatchException+0x404
- ffffbc81`71cbcdb0 fffff800`f200198e : 00000000`00140001 00000000`000000ff 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x1f6
- ffffbc81`71cbd460 fffff800`f1fffc34 : 00000000`00000000 00000000`000000ff 00000000`00000001 00000000`0000007e : nt!KiExceptionDispatch+0xce
- ffffbc81`71cbd640 fffff809`053e1388 : 7ffff809`053e1370 00000000`00000040 00000000`00000000 ffffe68c`e15f9000 : nt!KiGeneralProtectionFault+0xf4
- ffffbc81`71cbd7d8 7ffff809`053e1370 : 00000000`00000040 00000000`00000000 ffffe68c`e15f9000 ffffbc81`71c8f180 : intelppm!MWaitIdle+0x18
- ffffbc81`71cbd7e0 00000000`00000040 : 00000000`00000000 ffffe68c`e15f9000 ffffbc81`71c8f180 00000000`00000046 : 0x7ffff809`053e1370
- ffffbc81`71cbd7e8 00000000`00000000 : ffffe68c`e15f9000 ffffbc81`71c8f180 00000000`00000046 fffff800`f1f006f9 : 0x40
- STACK_COMMAND: kb
- CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
- fffff800f1f03b10 - nt!MiFlushTbAsNeeded+70
- [ 80:00 ]
- 1 error : !nt (fffff800f1f03b10)
- MODULE_NAME: memory_corruption
- IMAGE_NAME: memory_corruption
- FOLLOWUP_NAME: memory_corruption
- DEBUG_FLR_IMAGE_TIMESTAMP: 0
- MEMORY_CORRUPTOR: ONE_BIT
- FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
- BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
- PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_ONE_BIT
- TARGET_TIME: 2017-08-13T12:03:40.000Z
- SUITE_MASK: 784
- PRODUCT_TYPE: 1
- USER_LCID: 0
- FAILURE_ID_HASH_STRING: km:memory_corruption_one_bit
- FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}
- Followup: memory_corruption
- ========================================================================
- ==================== Dump File: 081117-9109-01.dmp =====================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 15063 MP (8 procs) Free x64
- Kernel base = 0xfffff801`5d29a000 PsLoadedModuleList = 0xfffff801`5d5e65c0
- Debug session time: Thu Aug 10 22:19:28.210 2017 (UTC - 4:00)
- System Uptime: 1 days 13:13:23.616
- BugCheck 19, {20, ffffb20a6548f000, ffffb20a6548f970, 4970000}
- fffff8015d67b358: Unable to get MiVisibleState
- *** WARNING: Unable to verify timestamp for win32k.sys
- *** ERROR: Module load completed but symbols could not be loaded for win32k.sys
- Probably caused by : memory_corruption
- Followup: memory_corruption
- BAD_POOL_HEADER (19)
- The pool is already corrupt at the time of the current request.
- This may or may not be due to the caller.
- The internal pool links must be walked to figure out a possible cause of
- the problem, and then special pool applied to the suspect tags or the driver
- verifier to a suspect driver.
- Arguments:
- Arg1: 0000000000000020, a pool block header size is corrupt.
- Arg2: ffffb20a6548f000, The pool entry we were looking for within the page.
- Arg3: ffffb20a6548f970, The next pool entry.
- Arg4: 0000000004970000, (reserved)
- Debugging Details:
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- DUMP_TYPE: 2
- BUGCHECK_STR: 0x19_20
- POOL_ADDRESS: ffffb20a6548f000
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: CODE_CORRUPTION
- PROCESS_NAME: System
- CURRENT_IRQL: 0
- LAST_CONTROL_TRANSFER: from fffff8015d51b0b2 to fffff8015d406560
- STACK_TEXT:
- ffffc480`3db17928 fffff801`5d51b0b2 : 00000000`00000019 00000000`00000020 ffffb20a`6548f000 ffffb20a`6548f970 : nt!KeBugCheckEx
- ffffc480`3db17930 fffff801`5d748076 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ExFreePoolWithTag+0x1092
- ffffc480`3db17a30 fffff801`5d2fdb86 : 00000000`00000000 00000000`00000000 fffff801`5d346610 ffffb20a`6548f080 : nt!ObpRemoveObjectRoutine+0x86
- ffffc480`3db17a90 fffff801`5d346682 : 00000000`00000000 00000000`00000000 ffffb20a`640d2f70 ffffb20a`6548f698 : nt!ObfDereferenceObjectWithTag+0xc6
- ffffc480`3db17ad0 fffff801`5d2d7ca8 : ffffb20a`65e10300 fffff801`5d5e0080 ffffb20a`65e10300 00000000`000fb000 : nt!PspReaper+0x72
- ffffc480`3db17b00 fffff801`5d376ac7 : 0019c824`000a55ea 00000000`00000080 ffffb20a`5a0be500 ffffb20a`65e10300 : nt!ExpWorkerThread+0xd8
- ffffc480`3db17b90 fffff801`5d40b9e6 : fffff801`5c4b6180 ffffb20a`65e10300 fffff801`5d376a80 000a59f4`000a592c : nt!PspSystemThreadStartup+0x47
- ffffc480`3db17be0 00000000`00000000 : ffffc480`3db18000 ffffc480`3db11000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
- STACK_COMMAND: kb
- CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
- fffff8015d32f817 - nt!MiPfnShareCountIsZero+187
- [ f6:fa ]
- 1 error : !nt (fffff8015d32f817)
- MODULE_NAME: memory_corruption
- IMAGE_NAME: memory_corruption
- FOLLOWUP_NAME: memory_corruption
- DEBUG_FLR_IMAGE_TIMESTAMP: 0
- MEMORY_CORRUPTOR: ONE_BYTE
- FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BYTE
- BUCKET_ID: MEMORY_CORRUPTION_ONE_BYTE
- PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_ONE_BYTE
- TARGET_TIME: 2017-08-11T02:19:28.000Z
- SUITE_MASK: 784
- PRODUCT_TYPE: 1
- USER_LCID: 0
- FAILURE_ID_HASH_STRING: km:memory_corruption_one_byte
- FAILURE_ID_HASH: {ad110d6a-3b33-2c0a-c931-570eae1ba92d}
- Followup: memory_corruption
Advertisement
Add Comment
Please, Sign In to add comment