Guest User

Untitled

a guest
Sep 18th, 2017
662
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 75.75 KB | None | 0 0
  1. ========================== AUTO DUMP ANALYZER ==========================
  2. Auto Dump Analyzer
  3. Version: 0.3
  4. Created by: gardenman
  5. Time to analyze file(s): 00 hours and 23 minutes and 39 seconds
  6.  
  7. ================================ SYSTEM ================================
  8. MANUFACTURER: Acer
  9. PRODUCT_NAME: Predator G3-571
  10. SKU: [Removed]
  11. VERSION: V1.01
  12.  
  13. ================================= BIOS =================================
  14. VENDOR: Insyde Corp.
  15. VERSION: V1.01
  16. DATE: 03/29/2017
  17.  
  18. ============================= MOTHERBOARD ==============================
  19. MANUFACTURER: KBL
  20. PRODUCT: Sienta_KLS
  21. VERSION: V1.01
  22.  
  23. ================================= CPU ==================================
  24. COUNT: 8
  25. MHZ: 2808
  26. VENDOR: GenuineIntel
  27. FAMILY: 6
  28. MODEL: 9e
  29. STEPPING: 9
  30. MICROCODE: 6,9e,9,0 (F,M,S,R) SIG: 48'00000000 (cache) 48'00000000 (init)
  31.  
  32. ================================== OS ==================================
  33. Product: WinNt, suite: TerminalServer SingleUserTS Personal
  34. BUILD_VERSION: 10.0.15063.608 (WinBuild.160101.0800)
  35. BUILD: 15063
  36. SERVICEPACK: 608
  37. PLATFORM_TYPE: x64
  38. NAME: Windows 10
  39. EDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
  40. BUILD_TIMESTAMP: 2017-09-05 00:09:34
  41. BUILDDATESTAMP: 160101.0800
  42. BUILDLAB: WinBuild
  43. BUILDOSVER: 10.0.15063.608
  44. Built by: 15063.0.amd64fre.rs2_release.170317-1834
  45. BUILD_VERSION: 10.0.15063.540 (WinBuild.160101.0800)
  46. SERVICEPACK: 540
  47. BUILD_TIMESTAMP: 2017-07-31 21:23:25
  48. BUILDOSVER: 10.0.15063.540
  49.  
  50. =============================== DEBUGGER ===============================
  51. Microsoft (R) Windows Debugger Version 10.0.14321.1024 X86
  52. Copyright (c) Microsoft Corporation. All rights reserved.
  53.  
  54. =============================== COMMENTS ===============================
  55. * Information gathered from different dump files may be different. If
  56. Windows updates between two dump files, two or more OS versions may
  57. be shown above.
  58. * If the user updates the BIOS between dump files, two or more versions
  59. and dates may be shown above.
  60.  
  61.  
  62. ========================================================================
  63. ==================== Dump File: 091817-8562-01.dmp =====================
  64. ========================================================================
  65. Mini Kernel Dump File: Only registers and stack trace are available
  66. Windows 10 Kernel Version 15063 MP (8 procs) Free x64
  67. Kernel base = 0xfffff801`49890000 PsLoadedModuleList = 0xfffff801`49bdc5c0
  68. Debug session time: Sun Sep 17 22:09:23.539 2017 (UTC - 4:00)
  69. System Uptime: 0 days 23:34:28.499
  70.  
  71. BugCheck 1E, {ffffffffc0000005, fffff80149907145, 0, ffffffffffffffff}
  72. Probably caused by : ntkrnlmp.exe ( nt!PpmUpdatePerformanceFeedback+85 )
  73. Followup: MachineOwner
  74.  
  75. KMODE_EXCEPTION_NOT_HANDLED (1e)
  76. This is a very common bugcheck. Usually the exception address pinpoints
  77. the driver/function that caused the problem. Always note this address
  78. as well as the link date of the driver/image that contains this address.
  79.  
  80. Arguments:
  81. Arg1: ffffffffc0000005, The exception code that was not handled
  82. Arg2: fffff80149907145, The address that the exception occurred at
  83. Arg3: 0000000000000000, Parameter 0 of the exception
  84. Arg4: ffffffffffffffff, Parameter 1 of the exception
  85.  
  86. Debugging Details:
  87. DUMP_CLASS: 1
  88. DUMP_QUALIFIER: 400
  89. DUMP_TYPE: 2
  90. DUMP_FILE_ATTRIBUTES: 0x8
  91. Kernel Generated Triage Dump
  92. READ_ADDRESS: fffff80149c71358: Unable to get MiVisibleState
  93. ffffffffffffffff
  94. EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
  95. FAULTING_IP:
  96. nt!PpmUpdatePerformanceFeedback+85
  97. fffff801`49907145 440fb64220 movzx r8d,byte ptr [rdx+20h]
  98. EXCEPTION_PARAMETER2: ffffffffffffffff
  99. BUGCHECK_STR: 0x1E_c0000005_R
  100. CUSTOMER_CRASH_COUNT: 1
  101. DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
  102.  
  103. PROCESS_NAME: System
  104.  
  105. CURRENT_IRQL: 2
  106. EXCEPTION_RECORD: ffffe60f9f19ea70 -- (.exr 0xffffe60f9f19ea70)
  107. Cannot read Exception record @ ffffe60f9f19ea70
  108. LAST_CONTROL_TRANSFER: from fffff80149a8b0b6 to fffff801499fc580
  109. STACK_TEXT:
  110. ffffd580`1e7f7328 fffff801`49a8b0b6 : 00000000`0000001e ffffffff`c0000005 fffff801`49907145 00000000`00000000 : nt!KeBugCheckEx
  111. ffffd580`1e7f7330 fffff801`49a02a5d : fffff801`49c1a000 fffff801`49890000 00053694`00889000 fffff801`4981a2ec : nt!KiFatalExceptionHandler+0x22
  112. ffffd580`1e7f7370 fffff801`498bc234 : 00000000`00000000 ffffd580`1e7f74a0 00000000`00000000 00000018`78c8129c : nt!RtlpExecuteHandlerForException+0xd
  113. ffffd580`1e7f73a0 fffff801`498bafd6 : ffffd580`1e7f8278 ffffd580`1e7f7fc0 ffffd580`1e7f8278 ffffd580`1e7f8278 : nt!RtlDispatchException+0x404
  114. ffffd580`1e7f7a90 fffff801`49a0798e : ffffe60f`9f19ea70 00000000`00000000 00000000`00000000 ffffe60f`92d23190 : nt!KiDispatchException+0x1f6
  115. ffffd580`1e7f8140 fffff801`49a05c34 : 00000000`00000001 00000000`00000001 ffffe60f`9198bbf0 00000000`00000001 : nt!KiExceptionDispatch+0xce
  116. ffffd580`1e7f8320 fffff801`49907145 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiGeneralProtectionFault+0xf4
  117. ffffd580`1e7f84b0 fffff801`49904815 : 00000000`00000000 00000000`0029d7ad 00000000`00000000 ffffd580`1e7ca180 : nt!PpmUpdatePerformanceFeedback+0x85
  118. ffffd580`1e7f8560 fffff801`4990432e : 00000000`00000000 00000000`00000000 00000000`00000000 ffffe60f`957ef330 : nt!PpmSnapPerformanceAccumulation+0x105
  119. ffffd580`1e7f8610 fffff801`4989efb0 : 00000000`00000001 00000000`00000000 fffff780`00000350 00000010`00000000 : nt!PpmCheckSnapAllDeliveredPerformance+0x10e
  120. ffffd580`1e7f87d0 fffff801`4990301c : ffffd580`1e7ccf80 ffffd580`1e7ccf80 ffffd580`1e7f89a0 fffff801`49bd73c0 : nt!PpmCheckStart+0x190
  121. ffffd580`1e7f88a0 fffff801`49902927 : ffffd580`1e7ca180 00000000`0029d7ad fffff801`48a30980 00000000`0031667c : nt!KiExecuteAllDpcs+0x1dc
  122. ffffd580`1e7f89e0 fffff801`499ff62a : 00000000`00000000 ffffd580`1e7ca180 00000000`00000000 ffffd580`1e7d6d80 : nt!KiRetireDpcList+0xd7
  123. ffffd580`1e7f8be0 00000000`00000000 : ffffd580`1e7f9000 ffffd580`1e7f2000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x5a
  124. STACK_COMMAND: kb
  125. THREAD_SHA1_HASH_MOD_FUNC: 55a4545d72827042638bfe12013257de16e7b2de
  126. THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 855c01848647137df717d63732fceb312a1a30d3
  127. THREAD_SHA1_HASH_MOD: 7f608ac2fbce9034a3386b1d51652e4911d30234
  128. FOLLOWUP_IP:
  129. nt!PpmUpdatePerformanceFeedback+85
  130. fffff801`49907145 440fb64220 movzx r8d,byte ptr [rdx+20h]
  131. FAULT_INSTR_CODE: 42b60f44
  132. SYMBOL_STACK_INDEX: 7
  133. SYMBOL_NAME: nt!PpmUpdatePerformanceFeedback+85
  134. FOLLOWUP_NAME: MachineOwner
  135. MODULE_NAME: nt
  136.  
  137. IMAGE_NAME: ntkrnlmp.exe
  138.  
  139. DEBUG_FLR_IMAGE_TIMESTAMP: 59ae237e
  140. IMAGE_VERSION: 10.0.15063.608
  141. BUCKET_ID_FUNC_OFFSET: 85
  142. FAILURE_BUCKET_ID: 0x1E_c0000005_R_nt!PpmUpdatePerformanceFeedback
  143. BUCKET_ID: 0x1E_c0000005_R_nt!PpmUpdatePerformanceFeedback
  144. PRIMARY_PROBLEM_CLASS: 0x1E_c0000005_R_nt!PpmUpdatePerformanceFeedback
  145. TARGET_TIME: 2017-09-18T02:09:23.000Z
  146. SUITE_MASK: 784
  147. PRODUCT_TYPE: 1
  148. USER_LCID: 0
  149. FAILURE_ID_HASH_STRING: km:0x1e_c0000005_r_nt!ppmupdateperformancefeedback
  150. FAILURE_ID_HASH: {9777cb25-78b8-eb9e-2b1b-7c95e6ab0c7e}
  151. Followup: MachineOwner
  152.  
  153. ========================================================================
  154. ===================== 3RD PARTY DRIVER QUICK LIST ======================
  155. ========================================================================
  156. Jul 16 2013 - LMDriver.sys -
  157. Jul 16 2013 - RadioShim.sys -
  158. Sep 24 2015 - dtlitescsibus.sys - DAEMON Tools Lite Virtual SCSI Bus (Disc Soft Ltd)
  159. Dec 28 2015 - dtliteusbbus.sys - DAEMON Tools Lite Virtual USB Bus (Disc Soft Ltd)
  160. Jul 15 2016 - iocbios2.sys - Intel(R) Extreme Tuning Utility Performance Tuning Driver
  161. Aug 08 2016 - iaLPSS2i_GPIO2.sys - Intel(R) Serial IO driver http://www.intel.com/
  162. Aug 08 2016 - iaLPSS2i_I2C.sys - Intel(R) Serial IO I2C Host Controller driver http://www.intel.com/
  163. Sep 13 2016 - dump_iaStorA.sys - (Generic Description) dump_*.sys drivers usually provide disk access during a crash to write dump files.
  164. Sep 13 2016 - iaStorA.sys - Intel SATA Storage Device RAID Controller
  165. Dec 15 2016 - RtsPer.sys - Realtek RTS PCIE Reader driver http://www.realtek.com.tw/
  166. Dec 16 2016 - avkmgr.sys - Avira Manager driver https://www.avira.com/
  167. Dec 16 2016 - avnetflt.sys - Avira WFP Network Driver https://www.avira.com/
  168. Dec 19 2016 - ETDI2C.sys -
  169. Dec 27 2016 - nvvhci.sys - Nvidia Virtual USB Host Controller driver http://www.nvidia.com/
  170. Jan 11 2017 - btfilter.sys - Qualcomm Atheros BtFilter driver
  171. Jan 11 2017 - Qcamain10x64.sys - Qualcomm Atheros Network Adapter driver http://www.killernetworking.com/
  172. Jan 20 2017 - IntcAudioBus.sys -
  173. Jan 20 2017 - IntcOED.sys -
  174. Feb 01 2017 - igdkmd64.sys - Intel HD graphics driver
  175. Feb 12 2017 - TeeDriverW8x64.sys - Intel® Management Engine Interface
  176. Mar 23 2017 - rt640x64.sys - Realtek NICDRV 8169 PCIe GBE Family Controller driver http://www.realtek.com.tw/
  177. Mar 23 2017 - RTKVHD64.sys - Realtek Audio Driver system driver http://www.realtek.com.tw/
  178. Apr 12 2017 - nvvad64v.sys - Nvidia Virtual Audio Driver http://www.nvidia.com/
  179. May 03 2017 - avdevprot.sys - Avira USB Feature driver https://www.avira.com/
  180. May 03 2017 - avusbflt.sys - Avira USB Filter driver https://www.avira.com/
  181. Jul 16 2017 - rzpnk.sys - Razer Overlay Support https://www.razerzone.com/
  182. Jul 18 2017 - nvlddmkm.sys - Nvidia Graphics Card driver http://www.nvidia.com/
  183. Jul 21 2017 - avgntflt.sys - Avira AntiVir Guard Network Minifilter driver https://www.avira.com/
  184. Jul 24 2017 - avipbb.sys - Avira Antivirus Program Backbone driver https://www.avira.com/
  185.  
  186. ========================================================================
  187. ========================== 3RD PARTY DRIVERS ===========================
  188. ========================================================================
  189. Image name: LMDriver.sys
  190. Search : https://www.google.com/search?q=LMDriver.sys
  191. Timestamp : Tue Jul 16 2013
  192.  
  193. Image name: RadioShim.sys
  194. Search : https://www.google.com/search?q=RadioShim.sys
  195. Timestamp : Tue Jul 16 2013
  196.  
  197. Image name: dtlitescsibus.sys
  198. Search : https://www.google.com/search?q=dtlitescsibus.sys
  199. ADA Info : DAEMON Tools Lite Virtual SCSI Bus (Disc Soft Ltd)
  200. Timestamp : Thu Sep 24 2015
  201.  
  202. Image name: dtliteusbbus.sys
  203. Search : https://www.google.com/search?q=dtliteusbbus.sys
  204. ADA Info : DAEMON Tools Lite Virtual USB Bus (Disc Soft Ltd)
  205. Timestamp : Mon Dec 28 2015
  206.  
  207. Image name: iocbios2.sys
  208. Search : https://www.google.com/search?q=iocbios2.sys
  209. ADA Info : Intel(R) Extreme Tuning Utility Performance Tuning Driver
  210. Timestamp : Fri Jul 15 2016
  211.  
  212. Image name: iaLPSS2i_GPIO2.sys
  213. Search : https://www.google.com/search?q=iaLPSS2i_GPIO2.sys
  214. ADA Info : Intel(R) Serial IO driver http://www.intel.com/
  215. Timestamp : Mon Aug 8 2016
  216.  
  217. Image name: iaLPSS2i_I2C.sys
  218. Search : https://www.google.com/search?q=iaLPSS2i_I2C.sys
  219. ADA Info : Intel(R) Serial IO I2C Host Controller driver http://www.intel.com/
  220. Timestamp : Mon Aug 8 2016
  221.  
  222. Image name: dump_iaStorA.sys
  223. Search : https://www.google.com/search?q=dump_iaStorA.sys
  224. ADA Info : (Generic Description) dump_*.sys drivers usually provide disk access during a crash to write dump files.
  225. Timestamp : Tue Sep 13 2016
  226.  
  227. Image name: iaStorA.sys
  228. Search : https://www.google.com/search?q=iaStorA.sys
  229. ADA Info : Intel SATA Storage Device RAID Controller
  230. Timestamp : Tue Sep 13 2016
  231.  
  232. Image name: RtsPer.sys
  233. Search : https://www.google.com/search?q=RtsPer.sys
  234. ADA Info : Realtek RTS PCIE Reader driver http://www.realtek.com.tw/
  235. Timestamp : Thu Dec 15 2016
  236.  
  237. Image name: avkmgr.sys
  238. Search : https://www.google.com/search?q=avkmgr.sys
  239. ADA Info : Avira Manager driver https://www.avira.com/
  240. Timestamp : Fri Dec 16 2016
  241.  
  242. Image name: avnetflt.sys
  243. Search : https://www.google.com/search?q=avnetflt.sys
  244. ADA Info : Avira WFP Network Driver https://www.avira.com/
  245. Timestamp : Fri Dec 16 2016
  246.  
  247. Image name: ETDI2C.sys
  248. Search : https://www.google.com/search?q=ETDI2C.sys
  249. Timestamp : Mon Dec 19 2016
  250.  
  251. Image name: nvvhci.sys
  252. Search : https://www.google.com/search?q=nvvhci.sys
  253. ADA Info : Nvidia Virtual USB Host Controller driver http://www.nvidia.com/
  254. Timestamp : Tue Dec 27 2016
  255.  
  256. Image name: btfilter.sys
  257. Search : https://www.google.com/search?q=btfilter.sys
  258. ADA Info : Qualcomm Atheros BtFilter driver
  259. Timestamp : Wed Jan 11 2017
  260.  
  261. Image name: Qcamain10x64.sys
  262. Search : https://www.google.com/search?q=Qcamain10x64.sys
  263. ADA Info : Qualcomm Atheros Network Adapter driver http://www.killernetworking.com/
  264. Timestamp : Wed Jan 11 2017
  265.  
  266. Image name: IntcAudioBus.sys
  267. Search : https://www.google.com/search?q=IntcAudioBus.sys
  268. Timestamp : Fri Jan 20 2017
  269.  
  270. Image name: IntcOED.sys
  271. Search : https://www.google.com/search?q=IntcOED.sys
  272. Timestamp : Fri Jan 20 2017
  273.  
  274. Image name: igdkmd64.sys
  275. Search : https://www.google.com/search?q=igdkmd64.sys
  276. ADA Info : Intel HD graphics driver
  277. Timestamp : Wed Feb 1 2017
  278.  
  279. Image name: TeeDriverW8x64.sys
  280. Search : https://www.google.com/search?q=TeeDriverW8x64.sys
  281. ADA Info : Intel® Management Engine Interface
  282. Timestamp : Sun Feb 12 2017
  283.  
  284. Image name: rt640x64.sys
  285. Search : https://www.google.com/search?q=rt640x64.sys
  286. ADA Info : Realtek NICDRV 8169 PCIe GBE Family Controller driver http://www.realtek.com.tw/
  287. Timestamp : Thu Mar 23 2017
  288.  
  289. Image name: RTKVHD64.sys
  290. Search : https://www.google.com/search?q=RTKVHD64.sys
  291. ADA Info : Realtek Audio Driver system driver http://www.realtek.com.tw/
  292. Timestamp : Thu Mar 23 2017
  293.  
  294. Image name: nvvad64v.sys
  295. Search : https://www.google.com/search?q=nvvad64v.sys
  296. ADA Info : Nvidia Virtual Audio Driver http://www.nvidia.com/
  297. Timestamp : Wed Apr 12 2017
  298.  
  299. Image name: avdevprot.sys
  300. Search : https://www.google.com/search?q=avdevprot.sys
  301. ADA Info : Avira USB Feature driver https://www.avira.com/
  302. Timestamp : Wed May 3 2017
  303.  
  304. Image name: avusbflt.sys
  305. Search : https://www.google.com/search?q=avusbflt.sys
  306. ADA Info : Avira USB Filter driver https://www.avira.com/
  307. Timestamp : Wed May 3 2017
  308.  
  309. Image name: rzpnk.sys
  310. Search : https://www.google.com/search?q=rzpnk.sys
  311. ADA Info : Razer Overlay Support https://www.razerzone.com/
  312. Timestamp : Sun Jul 16 2017
  313.  
  314. Image name: nvlddmkm.sys
  315. Search : https://www.google.com/search?q=nvlddmkm.sys
  316. ADA Info : Nvidia Graphics Card driver http://www.nvidia.com/
  317. Timestamp : Tue Jul 18 2017
  318.  
  319. Image name: avgntflt.sys
  320. Search : https://www.google.com/search?q=avgntflt.sys
  321. ADA Info : Avira AntiVir Guard Network Minifilter driver https://www.avira.com/
  322. Timestamp : Fri Jul 21 2017
  323.  
  324. Image name: avipbb.sys
  325. Search : https://www.google.com/search?q=avipbb.sys
  326. ADA Info : Avira Antivirus Program Backbone driver https://www.avira.com/
  327. Timestamp : Mon Jul 24 2017
  328.  
  329. If any of the above drivers are from Microsoft then please let me know.
  330. I will have them moved to the Microsoft list on the next update.
  331.  
  332. ========================================================================
  333. ========================== MICROSOFT DRIVERS ===========================
  334. ========================================================================
  335. ACPI.sys ACPI Driver for NT (Microsoft)
  336. acpiex.sys ACPIEx Driver (Microsoft)
  337. acpipagr.sys ACPI Processor Aggregator Device driver (Microsoft)
  338. afd.sys Ancillary Function Driver for WinSock (Microsoft)
  339. ahcache.sys Application Compatibility Cache (Microsoft)
  340. BasicDisplay.sys Basic Display driver (Microsoft)
  341. BasicRender.sys Basic Render driver (Microsoft)
  342. BATTC.SYS Battery Class driver (Microsoft)
  343. Beep.SYS BEEP driver (Microsoft)
  344. BOOTVID.dll VGA Boot Driver (Microsoft)
  345. bowser.sys NT Lan Manager Datagram Receiver Driver (Microsoft)
  346. BthEnum.sys Bluetooth Bus Extender
  347. bthpan.sys Bluetooth Personal Area Networking
  348. bthport.sys Bluetooth Bus driver (Microsoft)
  349. BTHUSB.sys Bluetooth Miniport driver (Microsoft)
  350. CAD.sys Charge Arbiration driver (Microsoft)
  351. cdd.dll Canonical Display Driver (Microsoft)
  352. cdrom.sys SCSI CD-ROM Driver (Microsoft)
  353. CEA.sys Event Aggregation Kernal Mode Library (Microsoft)
  354. CI.dll Code Integrity Module (Microsoft)
  355. CLASSPNP.SYS SCSI Class System Dll (Microsoft)
  356. CLFS.SYS Common Log File System Driver (Microsoft)
  357. clipsp.sys CLIP Service (Microsoft)
  358. CmBatt.sys Control Method Battery driver (Microsoft)
  359. cmimcext.sys Kernal Configuration Manager Initial Con. Driver (Microsoft)
  360. cng.sys Kernal Cryptography, Next Generation Driver (Microsoft)
  361. CompositeBus.sys Multi-Transport Composite Bus Enumerator (Microsoft)
  362. condrv.sys Console Driver (Microsoft)
  363. crashdmp.sys Crash Dump driver (Microsoft)
  364. dfsc.sys DFS Namespace Client Driver (Microsoft)
  365. disk.sys PnP Disk Driver (Microsoft)
  366. drmk.sys Digital Rights Management (DRM) driver (Microsoft)
  367. dump_dumpfve.sys Bitlocker Drive Encryption Crashdump Filter
  368. dump_storport.sys Provides disk access during crash dump file generation (Microsoft)
  369. dxgkrnl.sys DirectX Graphics Kernal (Microsoft)
  370. dxgmms2.sys DirectX Graphics MMS
  371. EhStorClass.sys Enhanced Storage Class driver for IEEE... (Microsoft)
  372. fastfat.SYS Fast FAT File System Driver (Microsoft)
  373. filecrypt.sys Windows sandboxing and encryption filter (Microsoft)
  374. fileinfo.sys FileInfo Filter Driver (Microsoft)
  375. FLTMGR.SYS Filesystem Filter Manager (Microsoft)
  376. Fs_Rec.sys File System Recognizer Driver (Microsoft)
  377. fvevol.sys BitLocker Driver Encryption Driver (Microsoft)
  378. fwpkclnt.sys FWP/IPsec Kernal-Mode API (Microsoft)
  379. gpuenergydrv.sys GPU Energy Kernal Driver (Microsoft)
  380. hal.dll Hardware Abstraction Layer DLL (Microsoft)
  381. HIDCLASS.SYS Hid Class Library (Microsoft)
  382. hidi2c.sys I2C HID Miniport Driver
  383. HIDPARSE.SYS Hid Parsing Library (Microsoft)
  384. hidusb.sys USB Miniport Driver for Input Devices (Microsoft)
  385. HTTP.sys HTTP Protocol Stack (Microsoft)
  386. i8042prt.sys i8042 Keyboard / PS/2 Mouse driver (Microsoft)
  387. intelpep.sys Intel Power Engine Plugin (Microsoft)
  388. intelppm.sys Processor Device Driver (Microsoft)
  389. iorate.sys I/O rate control Filter (Microsoft)
  390. kbdclass.sys Keyboard Class Driver (Microsoft)
  391. kdcom.dll Kernel Debugger HW Extension DLL (Microsoft)
  392. kdnic.sys Microsoft Kernel Debugger Network Miniport (Microsoft)
  393. ks.sys Kernal CSA Library (Microsoft)
  394. ksecdd.sys Kernel Security Support Provider Interface (Microsoft)
  395. ksecpkg.sys Kernel Security Support Provider Interface Packages (Microsoft)
  396. ksthunk.sys Kernal Streaming WOW Thunk Service (Microsoft)
  397. lltdio.sys Link-Layer Topology Mapper I/O Driver (Microsoft)
  398. luafv.sys LUA File Virtualization Filter Driver (Microsoft)
  399. mcupdate.dll Media Center Update (Microsoft)
  400. Microsoft.Bluetooth.Legacy.LEEnumerator.sys Legacy Bluetooth LE Bus Enumerator
  401. mmcss.sys MMCSS Driver (Microsoft)
  402. monitor.sys Monitor Driver (Microsoft)
  403. mouclass.sys Mouse Class Driver (Microsoft)
  404. mouhid.sys HID Mouse Filter Driver (Microsoft)
  405. mountmgr.sys Mount Point Manager (Microsoft)
  406. mpsdrv.sys Microsoft Protection Service Driver (Microsoft)
  407. mrxsmb.sys SMB MiniRedirector Wrapper and Engine (Microsoft)
  408. mrxsmb10.sys Longhorn SMB Downlevel SubRdr (Microsoft)
  409. mrxsmb20.sys Longhorn SMB 2.0 Redirector (Microsoft)
  410. Msfs.SYS Mailslot driver (Microsoft)
  411. msgpioclx.sys GPIO Class Extension Driver
  412. mshidkmdf.sys Pass-through HID to KMDF Filter Driver
  413. msisadrv.sys ISA Driver (Microsoft)
  414. mslldp.sys Microsoft Link-Layer Discovery Protocol... (Microsoft)
  415. msrpc.sys Kernel Remote Procedure Call Provider (Microsoft)
  416. mssmbios.sys System Management BIOS driver (Microsoft)
  417. MTConfig.sys Microsoft Multi-Touch HID Driver
  418. mup.sys Multiple UNC Provider driver (Microsoft)
  419. ndis.sys Network Driver Interface Specification (NDIS) driver (Microsoft)
  420. ndisuio.sys NDIS User mode I/O driver (Microsoft)
  421. NdisVirtualBus.sys Virtual Network Adapter Enumerator (Microsoft)
  422. Ndu.sys Network Data Usage Monitoring driver (Microsoft)
  423. netbios.sys NetBIOS Interface driver (Microsoft)
  424. netbt.sys MBT Transport driver (Microsoft)
  425. NETIO.SYS Network I/O Subsystem (Microsoft)
  426. Npfs.SYS NPFS driver (Microsoft)
  427. npsvctrig.sys Named pipe service triggers (Microsoft)
  428. nsiproxy.sys NSI Proxy driver (Microsoft)
  429. NTFS.sys NT File System Driver (Microsoft)
  430. ntkrnlmp.exe Windows NT operating system kernel (Microsoft)
  431. ntosext.sys NTOS Extension Host driver (Microsoft)
  432. Null.SYS NULL Driver (Microsoft)
  433. nwifi.sys NativeWiFi Miniport Driver (Microsoft)
  434. pacer.sys QoS Packet Scheduler (Microsoft)
  435. partmgr.sys Partition driver (Microsoft)
  436. pci.sys NT Plug and Play PCI Enumerator (Microsoft)
  437. pcw.sys Performance Counter Driver (Microsoft)
  438. pdc.sys Power Dependency Coordinator Driver (Microsoft)
  439. peauth.sys Protected Environment Authentication and Authorization Export Driver (Microsoft)
  440. portcls.sys Class Driver for Port/Miniport Devices system driver (Microsoft)
  441. PSHED.dll Platform Specific Hardware Error driver (Microsoft)
  442. rdbss.sys Redirected Drive Buffering SubSystem driver (Microsoft)
  443. rdpbus.sys Microsoft RDP Bus Device driver (Microsoft)
  444. rdpvideominiport.sys RDP Video Miniport driver (Microsoft)
  445. rdyboost.sys ReadyBoost Driver (Microsoft)
  446. registry.sys Registry Container driver (Microsoft)
  447. rfcomm.sys Bluetooth RFCOMM Driver
  448. rspndr.sys Link-Layer Topology Responder driver (Microsoft)
  449. SleepStudyHelper.sys Sleep Study Helper driver (Microsoft)
  450. spaceport.sys Storage Spaces driver (Microsoft)
  451. SpbCx.sys SPB Class Extension
  452. srv.sys Server driver (Microsoft)
  453. srv2.sys Smb 2.0 Server driver (Microsoft)
  454. srvnet.sys Server Network driver (Microsoft)
  455. storport.sys Storage port driver for use with high-performance buses such as fibre channel buses and RAID adapters. (Microsoft)
  456. storqosflt.sys Storage QoS Filter driver (Microsoft)
  457. swenum.sys Plug and Play Software Device Enumerator (Microsoft)
  458. tbs.sys Export driver for kernel mode TPM API (Microsoft)
  459. tcpip.sys TCP/IP Protocol driver (Microsoft)
  460. tcpipreg.sys Microsoft Windows TCP/IP Registry Compatibility driver (Microsoft)
  461. TDI.SYS TDI Wrapper driver (Microsoft)
  462. tdx.sys NetIO Legacy TDI x-bit Support Driver (Microsoft)
  463. tm.sys Kernel Transaction Manager driver (Microsoft)
  464. tpm.sys TPM Device Driver
  465. TSDDD.dll Framebuffer Display Driver (Microsoft)
  466. tunnel.sys Microsoft Tunnel Interface driver (Microsoft)
  467. ucx01000.sys USB Controller Extension (Microsoft)
  468. UEFI.sys UEFI NT driver (Microsoft)
  469. umbus.sys User-Mode Bus Enumerator (Microsoft)
  470. usbccgp.sys USB Common Class Generic Parent Driver (Microsoft)
  471. USBD.SYS Universal Serial Bus Driver (Microsoft)
  472. UsbHub3.sys USB3 HUB driver (Microsoft)
  473. usbvideo.sys USB Video Class Driver (Microsoft)
  474. USBXHCI.SYS USB XHCI Driver
  475. vdrvroot.sys Virtual Drive Root Enumerator (Microsoft)
  476. vmbkmclr.sys Hyper-V VMBus Root KMCL (Microsoft)
  477. volmgr.sys Volume Manager Driver (Microsoft)
  478. volmgrx.sys Volume Manager Extension Driver (Microsoft)
  479. volsnap.sys Volume Shadow Copy driver (Microsoft)
  480. volume.sys Volume driver (Microsoft)
  481. vwifibus.sys Virtual Wireless Bus driver (Microsoft)
  482. vwififlt.sys Virtual WiFi Filter Driver (Microsoft)
  483. vwifimp.sys Virtual WiFi Miniport Driver (Microsoft)
  484. wanarp.sys MS Remote Access and Routing ARP driver (Microsoft)
  485. watchdog.sys Watchdog driver (Microsoft)
  486. wcifs.sys Windows Container Isolation FS Filter driver (Microsoft)
  487. Wdf01000.sys Kernel Mode Driver Framework Runtime (Microsoft)
  488. WDFLDR.SYS Kernel Mode Driver Framework Loader (Microsoft)
  489. wdiwifi.sys WDI Driver Framework Driver
  490. werkernel.sys Windows Error Reporting Kernel driver (Microsoft)
  491. wfplwfs.sys WPF NDIS Lightweight Filter driver (Microsoft)
  492. win32k.sys Full/Desktop Multi-User Win32 driver (Microsoft)
  493. win32kbase.sys Base Win32k Kernel Driver (Microsoft)
  494. win32kfull.sys Full/Desktop Win32k Kernel Driver (Microsoft)
  495. WindowsTrustedRT.sys Windows Trusted Runtime Interface driver (Microsoft)
  496. WindowsTrustedRTProxy.sys Windows Trusted Runtime Service Proxy driver (Microsoft)
  497. wmiacpi.sys Windows Management Interface for ACPI (Microsoft)
  498. WMILIB.SYS WMILIB WMI support library DLL (Microsoft)
  499. Wof.sys Windows Overlay Filter (Microsoft)
  500. WppRecorder.sys WPP Trace Recorder (Microsoft)
  501.  
  502. Unloaded modules:
  503. fffff805`2fd00000 fffff805`2fd10000 MSKSSRV.sys
  504. fffff805`2fcf0000 fffff805`2fcff000 hiber_storpo
  505. fffff801`49010000 fffff801`494df000 hiber_iaStor
  506. fffff801`494e0000 fffff801`494fd000 hiber_dumpfv
  507. fffff805`30f80000 fffff805`30f8f000 dump_storpor
  508. fffff805`320f0000 fffff805`325bf000 dump_iaStorA
  509. fffff805`31690000 fffff805`316ad000 dump_dumpfve
  510. fffff805`2fce0000 fffff805`2fcef000 hiber_storpo
  511. fffff801`60a00000 fffff801`60ecf000 hiber_iaStor
  512. fffff801`60ed0000 fffff801`60eed000 hiber_dumpfv
  513. fffff805`315f0000 fffff805`315fb000 cldflt.sys
  514. fffff805`2e300000 fffff805`2e30f000 dump_storpor
  515. fffff805`2fc00000 fffff805`300cf000 dump_iaStorA
  516. fffff805`300f0000 fffff805`3010d000 dump_dumpfve
  517. fffff805`30780000 fffff805`307a0000 dam.sys
  518. fffff805`2f3f0000 fffff805`2f3ff000 hwpolicy.sys
  519.  
  520. ========================================================================
  521. ============================== BIOS INFO ===============================
  522. ========================================================================
  523. sysinfo: could not find necessary interfaces.
  524. sysinfo: note that mssmbios.sys must be loaded (XPSP2+).
  525.  
  526. ========================================================================
  527. ==================== Dump File: 091717-8062-01.dmp =====================
  528. ========================================================================
  529. Mini Kernel Dump File: Only registers and stack trace are available
  530. Windows 10 Kernel Version 15063 MP (8 procs) Free x64
  531. Kernel base = 0xfffff801`d8492000 PsLoadedModuleList = 0xfffff801`d87de5c0
  532. Debug session time: Sat Sep 16 19:46:05.492 2017 (UTC - 4:00)
  533. System Uptime: 0 days 22:28:49.176
  534.  
  535. BugCheck A, {1b474b, 2, 0, fffff801d8432d1b}
  536. *** WARNING: Unable to verify timestamp for Qcamain10x64.sys
  537. *** ERROR: Module load completed but symbols could not be loaded for Qcamain10x64.sys
  538. Probably caused by : Qcamain10x64.sys ( Qcamain10x64+fc9cc )
  539. Followup: MachineOwner
  540.  
  541. IRQL_NOT_LESS_OR_EQUAL (a)
  542. An attempt was made to access a pageable (or completely invalid) address at an
  543. interrupt request level (IRQL) that is too high. This is usually
  544. caused by drivers using improper addresses.
  545. If a kernel debugger is available get the stack backtrace.
  546.  
  547. Arguments:
  548. Arg1: 00000000001b474b, memory referenced
  549. Arg2: 0000000000000002, IRQL
  550. Arg3: 0000000000000000, bitfield :
  551. bit 0 : value 0 = read operation, 1 = write operation
  552. bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
  553. Arg4: fffff801d8432d1b, address which referenced memory
  554.  
  555. Debugging Details:
  556. DUMP_CLASS: 1
  557. DUMP_QUALIFIER: 400
  558. DUMP_TYPE: 2
  559. READ_ADDRESS: fffff801d8873358: Unable to get MiVisibleState
  560. 00000000001b474b
  561. CURRENT_IRQL: 2
  562. FAULTING_IP:
  563. hal!HalPutScatterGatherList+1955b
  564. fffff801`d8432d1b 488b6b20 mov rbp,qword ptr [rbx+20h]
  565. CUSTOMER_CRASH_COUNT: 1
  566. DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
  567. BUGCHECK_STR: AV
  568.  
  569. PROCESS_NAME: System
  570.  
  571. TRAP_FRAME: fffff801da8f8c90 -- (.trap 0xfffff801da8f8c90)
  572. NOTE: The trap frame does not contain all registers.
  573. Some register values may be zeroed or incorrect.
  574. rax=0000000000000000 rbx=0000000000000000 rcx=ffffe78bf9103810
  575. rdx=ffffe78c09df7e60 rsi=0000000000000000 rdi=0000000000000000
  576. rip=fffff801d8432d1b rsp=fffff801da8f8e20 rbp=0000000000000001
  577. r8=0000000000000001 r9=ffffe78c09df7e60 r10=0000000000000000
  578. r11=fffff801da8f8f28 r12=0000000000000000 r13=0000000000000000
  579. r14=0000000000000000 r15=0000000000000000
  580. iopl=0 nv up ei pl nz na pe nc
  581. hal!HalPutScatterGatherList+0x1955b:
  582. fffff801`d8432d1b 488b6b20 mov rbp,qword ptr [rbx+20h] ds:00000000`00000020=????????????????
  583. Resetting default scope
  584. LAST_CONTROL_TRANSFER: from fffff801d86098a9 to fffff801d85fe580
  585. STACK_TEXT:
  586. fffff801`da8f8b48 fffff801`d86098a9 : 00000000`0000000a 00000000`001b474b 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
  587. fffff801`da8f8b50 fffff801`d8607e7d : 00000000`00000000 00000000`00000001 00000000`00000000 ffffe78b`fda81690 : nt!KiBugCheckDispatch+0x69
  588. fffff801`da8f8c90 fffff801`d8432d1b : fffff80e`e98a89e0 ffffe78c`0944b5d0 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x23d
  589. fffff801`da8f8e20 fffff80e`e82ec898 : ffffe78c`032496f0 00000000`00000001 00000000`00000000 00000000`00000000 : hal!HalPutScatterGatherList+0x1955b
  590. fffff801`da8f8e80 fffff80e`e984c9cc : 00000000`00000000 00000000`00000001 ffffe78b`f92ef030 00000000`00000000 : ndis!NdisMFreeNetBufferSGList+0x38
  591. fffff801`da8f8ec0 00000000`00000000 : 00000000`00000001 ffffe78b`f92ef030 00000000`00000000 fffff80e`e98f0102 : Qcamain10x64+0xfc9cc
  592. STACK_COMMAND: kb
  593. THREAD_SHA1_HASH_MOD_FUNC: 830cbe77ddb612ecba944625686ae88037b74cca
  594. THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 2c242424e383f6a1c8b7bb4b839aef112897e6e5
  595. THREAD_SHA1_HASH_MOD: 35775663fedbdd5e0dd10b579d6e121aac14070a
  596. FOLLOWUP_IP:
  597. Qcamain10x64+fc9cc
  598. fffff80e`e984c9cc 4d8b3f mov r15,qword ptr [r15]
  599. FAULT_INSTR_CODE: 663f8b4d
  600. SYMBOL_STACK_INDEX: 5
  601. SYMBOL_NAME: Qcamain10x64+fc9cc
  602. FOLLOWUP_NAME: MachineOwner
  603. MODULE_NAME: Qcamain10x64
  604.  
  605. IMAGE_NAME: Qcamain10x64.sys
  606.  
  607. DEBUG_FLR_IMAGE_TIMESTAMP: 5875da6f
  608. BUCKET_ID_FUNC_OFFSET: fc9cc
  609. FAILURE_BUCKET_ID: AV_Qcamain10x64!unknown_function
  610. BUCKET_ID: AV_Qcamain10x64!unknown_function
  611. PRIMARY_PROBLEM_CLASS: AV_Qcamain10x64!unknown_function
  612. TARGET_TIME: 2017-09-16T23:46:05.000Z
  613. SUITE_MASK: 784
  614. PRODUCT_TYPE: 1
  615. USER_LCID: 0
  616. FAILURE_ID_HASH_STRING: km:av_qcamain10x64!unknown_function
  617. FAILURE_ID_HASH: {f52cafb4-1320-aedf-2a5d-ab5464b9e487}
  618. Followup: MachineOwner
  619.  
  620. ========================================================================
  621. ==================== Dump File: 091717-7984-01.dmp =====================
  622. ========================================================================
  623. Mini Kernel Dump File: Only registers and stack trace are available
  624. Windows 10 Kernel Version 15063 MP (8 procs) Free x64
  625. Kernel base = 0xfffff803`06a12000 PsLoadedModuleList = 0xfffff803`06d5e5c0
  626. Debug session time: Sat Sep 16 22:33:17.336 2017 (UTC - 4:00)
  627. System Uptime: 0 days 1:47:36.011
  628.  
  629. BugCheck 1E, {ffffffffc0000005, fffff80f9f92777b, 0, ffffffffffffffff}
  630. *** WARNING: Unable to verify timestamp for Qcamain10x64.sys
  631. *** ERROR: Module load completed but symbols could not be loaded for Qcamain10x64.sys
  632. Probably caused by : Qcamain10x64.sys ( Qcamain10x64+12777b )
  633. Followup: MachineOwner
  634.  
  635. KMODE_EXCEPTION_NOT_HANDLED (1e)
  636. This is a very common bugcheck. Usually the exception address pinpoints
  637. the driver/function that caused the problem. Always note this address
  638. as well as the link date of the driver/image that contains this address.
  639.  
  640. Arguments:
  641. Arg1: ffffffffc0000005, The exception code that was not handled
  642. Arg2: fffff80f9f92777b, The address that the exception occurred at
  643. Arg3: 0000000000000000, Parameter 0 of the exception
  644. Arg4: ffffffffffffffff, Parameter 1 of the exception
  645.  
  646. Debugging Details:
  647. DUMP_CLASS: 1
  648. DUMP_QUALIFIER: 400
  649. DUMP_TYPE: 2
  650. READ_ADDRESS: fffff80306df3358: Unable to get MiVisibleState
  651. ffffffffffffffff
  652. EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
  653. FAULTING_IP:
  654. Qcamain10x64+12777b
  655. fffff80f`9f92777b 488b13 mov rdx,qword ptr [rbx]
  656. EXCEPTION_PARAMETER2: ffffffffffffffff
  657. BUGCHECK_STR: 0x1E_c0000005_R
  658. CUSTOMER_CRASH_COUNT: 1
  659. DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
  660.  
  661. PROCESS_NAME: System
  662.  
  663. CURRENT_IRQL: 2
  664. EXCEPTION_RECORD: ffffe48adeaec0e0 -- (.exr 0xffffe48adeaec0e0)
  665. ExceptionAddress: 0000000000000002
  666. ExceptionCode: 00000002
  667. ExceptionFlags: 00000000
  668. NumberParameters: 0
  669. TRAP_FRAME: ffffe48adabf5220 -- (.trap 0xffffe48adabf5220)
  670. NOTE: The trap frame does not contain all registers.
  671. Some register values may be zeroed or incorrect.
  672. rax=000000000000003c rbx=0000000000000000 rcx=0000000000000000
  673. rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
  674. rip=ffffe48adabf53a0 rsp=00000000e101000d rbp=ffffe48adb0438c8
  675. r8=0000000000000000 r9=ffffe48ae03ee6d0 r10=0000000000000000
  676. r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
  677. r14=0000000000000000 r15=0000000000000000
  678. iopl=0 nv up di pl nz na pe nc
  679. 4890:ffffe48a`dabf53a0 0d0001e100 or eax,0E10100h
  680. Resetting default scope
  681. BAD_STACK_POINTER: 00000000e101000d
  682. UNALIGNED_STACK_POINTER: 00000000e101000d
  683. LAST_CONTROL_TRANSFER: from fffff80306c0d0b6 to fffff80306b7e580
  684. STACK_TEXT:
  685. fffff803`08ef81b8 fffff803`06c0d0b6 : 00000000`0000001e ffffffff`c0000005 fffff80f`9f92777b 00000000`00000000 : nt!KeBugCheckEx
  686. fffff803`08ef81c0 fffff803`06b84a5d : fffff803`06d9c000 fffff803`06a12000 00053694`00889000 fffff803`08ef82a0 : nt!KiFatalExceptionHandler+0x22
  687. fffff803`08ef8200 fffff803`06a3e234 : 00000000`00000000 fffff803`08ef8330 00000000`00000000 00000000`00000000 : nt!RtlpExecuteHandlerForException+0xd
  688. fffff803`08ef8230 fffff803`06a3cfd6 : fffff803`08ef9108 fffff803`08ef8e50 fffff803`08ef9108 fffff803`08ef9108 : nt!RtlDispatchException+0x404
  689. fffff803`08ef8920 fffff803`06b8998e : ffffe48a`deaec0e0 00000000`00000000 ffffe48a`dabf5220 ffffe48a`e03ee6d0 : nt!KiDispatchException+0x1f6
  690. fffff803`08ef8fd0 fffff803`06b87c34 : ffffe48a`df1c4a40 fffff803`06a27b49 00000000`00000002 00000000`00000000 : nt!KiExceptionDispatch+0xce
  691. fffff803`08ef91b0 fffff80f`9f92777b : ffffe48a`deaa2040 fffff803`08ef9370 ffffe48a`df1c4a40 fffff803`06b135b0 : nt!KiGeneralProtectionFault+0xf4
  692. fffff803`08ef9340 ffffe48a`deaa2040 : fffff803`08ef9370 ffffe48a`df1c4a40 fffff803`06b135b0 fffff803`08ef93d0 : Qcamain10x64+0x12777b
  693. fffff803`08ef9348 fffff803`08ef9370 : ffffe48a`df1c4a40 fffff803`06b135b0 fffff803`08ef93d0 fffff803`08ef93d8 : 0xffffe48a`deaa2040
  694. fffff803`08ef9350 ffffe48a`df1c4a40 : fffff803`06b135b0 fffff803`08ef93d0 fffff803`08ef93d8 00000000`00035400 : 0xfffff803`08ef9370
  695. fffff803`08ef9358 fffff803`06b135b0 : fffff803`08ef93d0 fffff803`08ef93d8 00000000`00035400 fffff80f`9f9dda48 : 0xffffe48a`df1c4a40
  696. fffff803`08ef9360 00000000`ffffffff : ffffe48a`dfc39d10 ffffe48a`deaa2068 fffff803`08ef9418 fffff80f`9f92a7b5 : nt!ExInterlockedInsertTailList+0x20
  697. fffff803`08ef9390 ffffe48a`dfc39d10 : ffffe48a`deaa2068 fffff803`08ef9418 fffff80f`9f92a7b5 ffffe48a`deaa2040 : 0xffffffff
  698. fffff803`08ef9398 ffffe48a`deaa2068 : fffff803`08ef9418 fffff80f`9f92a7b5 ffffe48a`deaa2040 ffffe48a`df1c4c30 : 0xffffe48a`dfc39d10
  699. fffff803`08ef93a0 fffff803`08ef9418 : fffff80f`9f92a7b5 ffffe48a`deaa2040 ffffe48a`df1c4c30 ffffe48a`dffca624 : 0xffffe48a`deaa2068
  700. fffff803`08ef93a8 fffff80f`9f92a7b5 : ffffe48a`deaa2040 ffffe48a`df1c4c30 ffffe48a`dffca624 fffff803`79a27368 : 0xfffff803`08ef9418
  701. fffff803`08ef93b0 ffffe48a`deaa2040 : ffffe48a`df1c4c30 ffffe48a`dffca624 fffff803`79a27368 fffff803`0000001a : Qcamain10x64+0x12a7b5
  702. fffff803`08ef93b8 ffffe48a`df1c4c30 : ffffe48a`dffca624 fffff803`79a27368 fffff803`0000001a fffff803`00000001 : 0xffffe48a`deaa2040
  703. fffff803`08ef93c0 ffffe48a`dffca624 : fffff803`79a27368 fffff803`0000001a fffff803`00000001 ffffcf01`62399608 : 0xffffe48a`df1c4c30
  704. fffff803`08ef93c8 fffff803`79a27368 : fffff803`0000001a fffff803`00000001 ffffcf01`62399608 ffffe48a`df0a64e0 : 0xffffe48a`dffca624
  705. fffff803`08ef93d0 fffff803`0000001a : fffff803`00000001 ffffcf01`62399608 ffffe48a`df0a64e0 00000000`79486400 : 0xfffff803`79a27368
  706. fffff803`08ef93d8 fffff803`00000001 : ffffcf01`62399608 ffffe48a`df0a64e0 00000000`79486400 00000000`cecebeef : 0xfffff803`0000001a
  707. fffff803`08ef93e0 ffffcf01`62399608 : ffffe48a`df0a64e0 00000000`79486400 00000000`cecebeef ffffe48a`df1c4c30 : 0xfffff803`00000001
  708. fffff803`08ef93e8 ffffe48a`df0a64e0 : 00000000`79486400 00000000`cecebeef ffffe48a`df1c4c30 ffffe48a`deaa2040 : 0xffffcf01`62399608
  709. fffff803`08ef93f0 00000000`79486400 : 00000000`cecebeef ffffe48a`df1c4c30 ffffe48a`deaa2040 ffffe48a`dfc136d0 : 0xffffe48a`df0a64e0
  710. fffff803`08ef93f8 00000000`cecebeef : ffffe48a`df1c4c30 ffffe48a`deaa2040 ffffe48a`dfc136d0 00000000`00000000 : 0x79486400
  711. fffff803`08ef9400 ffffe48a`df1c4c30 : ffffe48a`deaa2040 ffffe48a`dfc136d0 00000000`00000000 ffffe48a`dfc136d0 : 0xcecebeef
  712. fffff803`08ef9408 ffffe48a`deaa2040 : ffffe48a`dfc136d0 00000000`00000000 ffffe48a`dfc136d0 ffffe48a`dfc135e0 : 0xffffe48a`df1c4c30
  713. fffff803`08ef9410 ffffe48a`dfc136d0 : 00000000`00000000 ffffe48a`dfc136d0 ffffe48a`dfc135e0 00000000`00000001 : 0xffffe48a`deaa2040
  714. fffff803`08ef9418 00000000`00000000 : ffffe48a`dfc136d0 ffffe48a`dfc135e0 00000000`00000001 ffffe48a`df1c4a40 : 0xffffe48a`dfc136d0
  715. STACK_COMMAND: kb
  716. THREAD_SHA1_HASH_MOD_FUNC: df7cc52ccbd49a12fde7110ac06d83366b2241a7
  717. THREAD_SHA1_HASH_MOD_FUNC_OFFSET: db5c19b2027c87e0966a9649f35c47ccc08cdbc8
  718. THREAD_SHA1_HASH_MOD: c0188612f77f36c9401200bde49053f65d082e94
  719. FOLLOWUP_IP:
  720. Qcamain10x64+12777b
  721. fffff80f`9f92777b 488b13 mov rdx,qword ptr [rbx]
  722. FAULT_INSTR_CODE: 48138b48
  723. SYMBOL_STACK_INDEX: 7
  724. SYMBOL_NAME: Qcamain10x64+12777b
  725. FOLLOWUP_NAME: MachineOwner
  726. MODULE_NAME: Qcamain10x64
  727.  
  728. IMAGE_NAME: Qcamain10x64.sys
  729.  
  730. DEBUG_FLR_IMAGE_TIMESTAMP: 5875da6f
  731. BUCKET_ID_FUNC_OFFSET: 12777b
  732. FAILURE_BUCKET_ID: 0x1E_c0000005_R_STACKPTR_ERROR_Qcamain10x64!unknown_function
  733. BUCKET_ID: 0x1E_c0000005_R_STACKPTR_ERROR_Qcamain10x64!unknown_function
  734. PRIMARY_PROBLEM_CLASS: 0x1E_c0000005_R_STACKPTR_ERROR_Qcamain10x64!unknown_function
  735. TARGET_TIME: 2017-09-17T02:33:17.000Z
  736. SUITE_MASK: 784
  737. PRODUCT_TYPE: 1
  738. USER_LCID: 0
  739. FAILURE_ID_HASH_STRING: km:0x1e_c0000005_r_stackptr_error_qcamain10x64!unknown_function
  740. FAILURE_ID_HASH: {1d946fc0-3ad4-7650-77c3-117229094abb}
  741. Followup: MachineOwner
  742.  
  743. ========================================================================
  744. ==================== Dump File: 091117-7859-01.dmp =====================
  745. ========================================================================
  746. Mini Kernel Dump File: Only registers and stack trace are available
  747. Windows 10 Kernel Version 15063 MP (8 procs) Free x64
  748. Kernel base = 0xfffff800`47e8d000 PsLoadedModuleList = 0xfffff800`481d95c0
  749. Debug session time: Sun Sep 10 16:28:40.458 2017 (UTC - 4:00)
  750. System Uptime: 0 days 15:51:33.131
  751.  
  752. BugCheck 1E, {ffffffffc0000005, fffff80048088fbd, 0, ffffffffffffffff}
  753. *** WARNING: Unable to verify timestamp for Qcamain10x64.sys
  754. *** ERROR: Module load completed but symbols could not be loaded for Qcamain10x64.sys
  755. Probably caused by : nwifi.sys ( nwifi!Dot11PrepareEthernetPayloadPacketComplete+14 )
  756. Followup: MachineOwner
  757.  
  758. KMODE_EXCEPTION_NOT_HANDLED (1e)
  759. This is a very common bugcheck. Usually the exception address pinpoints
  760. the driver/function that caused the problem. Always note this address
  761. as well as the link date of the driver/image that contains this address.
  762.  
  763. Arguments:
  764. Arg1: ffffffffc0000005, The exception code that was not handled
  765. Arg2: fffff80048088fbd, The address that the exception occurred at
  766. Arg3: 0000000000000000, Parameter 0 of the exception
  767. Arg4: ffffffffffffffff, Parameter 1 of the exception
  768.  
  769. Debugging Details:
  770. DUMP_CLASS: 1
  771. DUMP_QUALIFIER: 400
  772. DUMP_TYPE: 2
  773. READ_ADDRESS: fffff8004826e358: Unable to get MiVisibleState
  774. ffffffffffffffff
  775. EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
  776. FAULTING_IP:
  777. nt!KiAcquireSpinLockInstrumented+55
  778. fffff800`48088fbd f0480fba2900 lock bts qword ptr [rcx],0
  779. EXCEPTION_PARAMETER2: ffffffffffffffff
  780. BUGCHECK_STR: 0x1E_c0000005_R
  781. CUSTOMER_CRASH_COUNT: 1
  782. DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
  783.  
  784. PROCESS_NAME: System
  785.  
  786. CURRENT_IRQL: 2
  787. EXCEPTION_RECORD: 0000000000000002 -- (.exr 0x2)
  788. Cannot read Exception record @ 0000000000000002
  789. TRAP_FRAME: 0000000000000002 -- (.trap 0x2)
  790. Unable to read trap frame at 00000000`00000002
  791. LAST_CONTROL_TRANSFER: from fffff800480880b6 to fffff80047ff9560
  792. STACK_TEXT:
  793. fffff800`4a2f7c68 fffff800`480880b6 : 00000000`0000001e ffffffff`c0000005 fffff800`48088fbd 00000000`00000000 : nt!KeBugCheckEx
  794. fffff800`4a2f7c70 fffff800`47fffa3d : fffff800`48217000 fffff800`47e8d000 000536a0`00889000 00000000`00000000 : nt!KiFatalExceptionHandler+0x22
  795. fffff800`4a2f7cb0 fffff800`47eb8d94 : 00000000`00000000 fffff800`4a2f7de0 00000000`00000000 00000000`00000000 : nt!RtlpExecuteHandlerForException+0xd
  796. fffff800`4a2f7ce0 fffff800`47eb7b36 : fffff800`4a2f8bb8 fffff800`4a2f8900 fffff800`4a2f8bb8 fffff800`4a2f8bb8 : nt!RtlDispatchException+0x404
  797. fffff800`4a2f83d0 fffff800`4800498e : 00000000`00000002 fffff800`47ea320b 00000000`00000002 fffff800`48286a40 : nt!KiDispatchException+0x1f6
  798. fffff800`4a2f8a80 fffff800`48002c34 : 00000001`00000001 ffff8a0e`00000000 00000000`00000001 fffff80c`20c6e2bf : nt!KiExceptionDispatch+0xce
  799. fffff800`4a2f8c60 fffff800`48088fbd : ffff8a0e`d0d0a768 fffff80c`26002055 00000000`00000000 00000000`00000000 : nt!KiGeneralProtectionFault+0xf4
  800. fffff800`4a2f8df0 fffff800`47ea2b49 : 00000000`00000002 ffff8a0e`f2c72010 ffff8a0e`d8fa6040 00000000`00000000 : nt!KiAcquireSpinLockInstrumented+0x55
  801. fffff800`4a2f8e40 fffff80c`20c84fd7 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeAcquireSpinLockRaiseToDpc+0x39
  802. fffff800`4a2f8e70 fffff80c`20c6f58b : ffff8a0e`dcd5f270 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisFreeToNPagedPool+0x17
  803. fffff800`4a2f8ea0 fffff80c`26dbdc24 : ffff8a0e`e0261220 00000000`00000000 ffff8a0e`f323a030 00000000`00000000 : ndis!NdisFreeNetBuffer+0xdb
  804. fffff800`4a2f8ed0 fffff80c`26db8e13 : ffff8a0e`f323a2c0 00000000`00000000 ffff8a0e`f323a030 ffff8a0e`d8f4f0c0 : nwifi!Dot11PrepareEthernetPayloadPacketComplete+0x14
  805. fffff800`4a2f8f00 fffff80c`26dbcc2d : 00000000`00000000 ffff8a0e`d8facb80 ffff8a0e`d8f65058 fffff80c`22fd1710 : nwifi!Dot11SendCompletion+0x4b
  806. fffff800`4a2f8f40 fffff80c`20c61a73 : ffff8a0e`f323a030 ffff8a0e`d8f4d010 ffff8a0e`d8f65040 ffff8a0e`d8f54058 : nwifi!Pt6SendComplete+0x1d
  807. fffff800`4a2f8f70 fffff80c`262f1617 : ffff8a0e`d56f21a0 00000000`00000000 00000000`00000000 ffff8a0e`f323a002 : ndis!NdisMSendNetBufferListsComplete+0x183
  808. fffff800`4a2f9060 fffff80c`262c1cb3 : ffff8a0e`d71cacb0 fffff80c`2615d901 ffff8a0e`f323a030 00000000`00000000 : wdiwifi!CPort::SendCompleteNetBufferLists+0xef
  809. fffff800`4a2f90b0 fffff80c`262b68de : ffff8a0e`d5aa87d0 ffff8a0e`d56bed00 ffff8a0e`f323a030 00000000`00000000 : wdiwifi!CAdapter::SendCompleteNbl+0x123
  810. fffff800`4a2f9120 fffff80c`262b6553 : ffff8a0e`d173b600 ffff8a0e`d56bed30 ffff8a0e`f323a030 fffff800`00000001 : wdiwifi!CTxMgr::CompleteNdisNbl+0xbe
  811. fffff800`4a2f9180 fffff80c`262b3f24 : ffff8a0e`d173b620 fffff80c`26348df0 fffff80c`26348df0 fffff80c`262a7363 : wdiwifi!CTxMgr::CompleteNBLs+0x5b
  812. fffff800`4a2f91c0 fffff80c`260f7d05 : 00000000`00000000 00000000`00000000 ffff8a0e`d5741000 fffff800`4a2f9300 : wdiwifi!CTxMgr::TxSendCompleteInd+0x66c
  813. fffff800`4a2f9290 00000000`00000000 : 00000000`00000000 ffff8a0e`d5741000 fffff800`4a2f9300 00000000`00000000 : Qcamain10x64+0xf7d05
  814. STACK_COMMAND: kb
  815. THREAD_SHA1_HASH_MOD_FUNC: 3dda04472fff06d0c415298f0d3489c7cbe2d0e6
  816. THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 61f46d65dd711956669656a8d7ea17d06736b606
  817. THREAD_SHA1_HASH_MOD: ed7a88183b430d78dbdbad231d603be290777789
  818. FOLLOWUP_IP:
  819. nwifi!Dot11PrepareEthernetPayloadPacketComplete+14
  820. fffff80c`26dbdc24 488bcb mov rcx,rbx
  821. FAULT_INSTR_CODE: 48cb8b48
  822. SYMBOL_STACK_INDEX: b
  823. SYMBOL_NAME: nwifi!Dot11PrepareEthernetPayloadPacketComplete+14
  824. FOLLOWUP_NAME: MachineOwner
  825. MODULE_NAME: nwifi
  826.  
  827. IMAGE_NAME: nwifi.sys
  828.  
  829. DEBUG_FLR_IMAGE_TIMESTAMP: 3e4b5b01
  830. IMAGE_VERSION: 10.0.15052.0
  831. BUCKET_ID_FUNC_OFFSET: 14
  832. FAILURE_BUCKET_ID: OLD_IMAGE_nwifi.sys
  833. BUCKET_ID: OLD_IMAGE_nwifi.sys
  834. PRIMARY_PROBLEM_CLASS: OLD_IMAGE_nwifi.sys
  835. TARGET_TIME: 2017-09-10T20:28:40.000Z
  836. SUITE_MASK: 784
  837. PRODUCT_TYPE: 1
  838. USER_LCID: 0
  839. FAILURE_ID_HASH_STRING: km:old_image_nwifi.sys
  840. FAILURE_ID_HASH: {45c67169-ba4a-146f-5ace-fa1fd15a28a2}
  841. Followup: MachineOwner
  842.  
  843. ========================================================================
  844. ==================== Dump File: 091017-8593-01.dmp =====================
  845. ========================================================================
  846. Mini Kernel Dump File: Only registers and stack trace are available
  847. Windows 10 Kernel Version 15063 MP (8 procs) Free x64
  848. Kernel base = 0xfffff801`76006000 PsLoadedModuleList = 0xfffff801`763525c0
  849. Debug session time: Sat Sep 9 23:41:19.135 2017 (UTC - 4:00)
  850. System Uptime: 1 days 1:19:20.704
  851.  
  852. BugCheck 1E, {ffffffffc000001d, fffff80176075514, ffff8001b2facd80, 0}
  853. *** WARNING: Unable to verify timestamp for win32k.sys
  854. *** ERROR: Module load completed but symbols could not be loaded for win32k.sys
  855. Probably caused by : memory_corruption
  856. Followup: memory_corruption
  857.  
  858. KMODE_EXCEPTION_NOT_HANDLED (1e)
  859. This is a very common bugcheck. Usually the exception address pinpoints
  860. the driver/function that caused the problem. Always note this address
  861. as well as the link date of the driver/image that contains this address.
  862.  
  863. Arguments:
  864. Arg1: ffffffffc000001d, The exception code that was not handled
  865. Arg2: fffff80176075514, The address that the exception occurred at
  866. Arg3: ffff8001b2facd80, Parameter 0 of the exception
  867. Arg4: 0000000000000000, Parameter 1 of the exception
  868.  
  869. Debugging Details:
  870. DUMP_CLASS: 1
  871. DUMP_QUALIFIER: 400
  872. DUMP_TYPE: 2
  873. EXCEPTION_CODE: (NTSTATUS) 0xc000001d - {EXCEPTION} Illegal Instruction An attempt was made to execute an illegal instruction.
  874. FAULTING_IP:
  875. nt!KiDirectSwitchThread+704
  876. fffff801`76075514 ff ???
  877. EXCEPTION_PARAMETER1: ffff8001b2facd80
  878. BUGCHECK_STR: 0x1E_c000001d
  879. CUSTOMER_CRASH_COUNT: 1
  880. DEFAULT_BUCKET_ID: CODE_CORRUPTION
  881.  
  882. PROCESS_NAME: System
  883.  
  884. CURRENT_IRQL: 0
  885. EXCEPTION_RECORD: 0000000000000003 -- (.exr 0x3)
  886. Cannot read Exception record @ 0000000000000003
  887. LAST_CONTROL_TRANSFER: from fffff80176030b7c to fffff80176172560
  888. FAILED_INSTRUCTION_ADDRESS:
  889. nt!KiDirectSwitchThread+704
  890. fffff801`76075514 ff ???
  891. STACK_TEXT:
  892. ffff8001`b2f3b1b8 fffff801`76030b7c : 00000000`0000001e ffffffff`c000001d fffff801`76075514 ffff8001`b2facd80 : nt!KeBugCheckEx
  893. ffff8001`b2f3b1c0 fffff801`7617d98e : 00000000`00000003 00000000`ffffffff ffffe18a`114dc520 ffffe18a`119efeb0 : nt!KiDispatchException+0x23c
  894. ffff8001`b2f3b870 fffff801`7617b43d : 00000000`00000002 00000000`00000000 ffff8001`b2f3bb80 00000000`00000001 : nt!KiExceptionDispatch+0xce
  895. ffff8001`b2f3ba50 fffff801`76075514 : ffffffff`00000000 ffff8001`b2da0180 ffff8001`b2facd80 ffffe18a`13e3d080 : nt!KiInvalidOpcodeFault+0xfd
  896. ffff8001`b2f3bbe0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDirectSwitchThread+0x704
  897. STACK_COMMAND: kb
  898. CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
  899. fffff8017610c109 - nt!MiMakeSystemCachePteValid+3d
  900. [ fa:ae ]
  901. fffff8017610c137-fffff8017610c138 2 bytes - nt!MiMakeSystemCachePteValid+6b (+0x2e)
  902. [ 80 f6:00 df ]
  903. 3 errors : !nt (fffff8017610c109-fffff8017610c138)
  904. MODULE_NAME: memory_corruption
  905.  
  906. IMAGE_NAME: memory_corruption
  907.  
  908. FOLLOWUP_NAME: memory_corruption
  909. DEBUG_FLR_IMAGE_TIMESTAMP: 0
  910. MEMORY_CORRUPTOR: LARGE
  911. FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
  912. BUCKET_ID: MEMORY_CORRUPTION_LARGE
  913. PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
  914. TARGET_TIME: 2017-09-10T03:41:19.000Z
  915. SUITE_MASK: 784
  916. PRODUCT_TYPE: 1
  917. USER_LCID: 0
  918. FAILURE_ID_HASH_STRING: km:memory_corruption_large
  919. FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
  920. Followup: memory_corruption
  921.  
  922. ========================================================================
  923. ==================== Dump File: 090917-7859-01.dmp =====================
  924. ========================================================================
  925. Mini Kernel Dump File: Only registers and stack trace are available
  926. Windows 10 Kernel Version 15063 MP (8 procs) Free x64
  927. Kernel base = 0xfffff803`93401000 PsLoadedModuleList = 0xfffff803`9374d5c0
  928. Debug session time: Fri Sep 8 22:14:05.489 2017 (UTC - 4:00)
  929. System Uptime: 0 days 12:14:26.164
  930.  
  931. BugCheck A, {66477ca827, 2, 0, fffff803934538b4}
  932. *** WARNING: Unable to verify timestamp for win32k.sys
  933. *** ERROR: Module load completed but symbols could not be loaded for win32k.sys
  934. Probably caused by : memory_corruption ( nt!MiLocateSubsectionNode+114 )
  935. Followup: MachineOwner
  936.  
  937. IRQL_NOT_LESS_OR_EQUAL (a)
  938. An attempt was made to access a pageable (or completely invalid) address at an
  939. interrupt request level (IRQL) that is too high. This is usually
  940. caused by drivers using improper addresses.
  941. If a kernel debugger is available get the stack backtrace.
  942.  
  943. Arguments:
  944. Arg1: 00000066477ca827, memory referenced
  945. Arg2: 0000000000000002, IRQL
  946. Arg3: 0000000000000000, bitfield :
  947. bit 0 : value 0 = read operation, 1 = write operation
  948. bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
  949. Arg4: fffff803934538b4, address which referenced memory
  950.  
  951. Debugging Details:
  952. DUMP_CLASS: 1
  953. DUMP_QUALIFIER: 400
  954. DUMP_TYPE: 2
  955. READ_ADDRESS: fffff803937e2358: Unable to get MiVisibleState
  956. 00000066477ca827
  957. CURRENT_IRQL: 2
  958. FAULTING_IP:
  959. nt!MiLocateSubsectionNode+114
  960. fffff803`934538b4 418b40ec mov eax,dword ptr [r8-14h]
  961. CUSTOMER_CRASH_COUNT: 1
  962. DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
  963. BUGCHECK_STR: AV
  964.  
  965. PROCESS_NAME: System
  966.  
  967. TRAP_FRAME: ffff95818e4fb580 -- (.trap 0xffff95818e4fb580)
  968. NOTE: The trap frame does not contain all registers.
  969. Some register values may be zeroed or incorrect.
  970. rax=0000000000000100 rbx=0000000000000000 rcx=0000010f0000010a
  971. rdx=0000010f00000109 rsi=0000000000000000 rdi=0000000000000000
  972. rip=fffff803934538b4 rsp=ffff95818e4fb710 rbp=ffffb88c6e121b00
  973. r8=00000066477ca83b r9=0000000000000000 r10=0000010f0000000a
  974. r11=ffff95818e4fb7a8 r12=0000000000000000 r13=0000000000000000
  975. r14=0000000000000000 r15=0000000000000000
  976. iopl=0 nv up ei pl nz na pe nc
  977. nt!MiLocateSubsectionNode+0x114:
  978. fffff803`934538b4 418b40ec mov eax,dword ptr [r8-14h] ds:00000066`477ca827=????????
  979. Resetting default scope
  980. LAST_CONTROL_TRANSFER: from fffff803935788a9 to fffff8039356d560
  981. STACK_TEXT:
  982. ffff9581`8e4fb438 fffff803`935788a9 : 00000000`0000000a 00000066`477ca827 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
  983. ffff9581`8e4fb440 fffff803`93576e7d : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
  984. ffff9581`8e4fb580 fffff803`934538b4 : 00000000`00000000 00000002`0c019540 ffffb88c`72529cb8 fffff803`934625e1 : nt!KiPageFault+0x23d
  985. ffff9581`8e4fb710 fffff803`9345351b : ffffb88c`6e121b00 00000000`00000000 ffff9581`8e4fb918 ffffb88c`6e121b80 : nt!MiLocateSubsectionNode+0x114
  986. ffff9581`8e4fb7b0 fffff803`934533b6 : ffff9581`8e4fb890 ffff9581`8e4fb890 ffff9581`8e4fb918 ffffcb89`e90c0000 : nt!MiComputeDataFlushRange+0x53
  987. ffff9581`8e4fb800 fffff803`9345322c : ffff9581`92cf0a50 00000000`00001000 00000000`00000000 00000000`00000000 : nt!MiComputeFlushRange+0x56
  988. ffff9581`8e4fb850 fffff803`93452dc5 : 00000000`00000000 00000000`00001000 00000000`00001000 00000000`00000000 : nt!MmFlushSection+0x48
  989. ffff9581`8e4fb900 fffff803`934517fa : ffffb88c`6e17a830 00000000`00000000 ffffb88c`00000001 ffff9581`8e4fba70 : nt!CcFlushCachePriv+0x4a5
  990. ffff9581`8e4fba40 fffff803`9343eca8 : 00000000`00000000 ffffb88c`7561f001 ffffb88c`00000000 7fffffff`ffffffff : nt!CcWriteBehindInternal+0x19a
  991. ffff9581`8e4fbb00 fffff803`934ddac7 : 61713b35`35322634 00000000`00000080 ffffb88c`698be500 ffffb88c`7561f040 : nt!ExpWorkerThread+0xd8
  992. ffff9581`8e4fbb90 fffff803`935729e6 : fffff803`926cf180 ffffb88c`7561f040 fffff803`934dda80 663b2932`33287961 : nt!PspSystemThreadStartup+0x47
  993. ffff9581`8e4fbbe0 00000000`00000000 : ffff9581`8e4fc000 ffff9581`8e4f5000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
  994. STACK_COMMAND: kb
  995. THREAD_SHA1_HASH_MOD_FUNC: 3dd8ed75c0d82a2250e718833841f4991777cda5
  996. THREAD_SHA1_HASH_MOD_FUNC_OFFSET: bdf689843a7d228d8f985ce4107df7be47e32dec
  997. THREAD_SHA1_HASH_MOD: dc844b1b94baa204d070855e43bbbd27eee98b94
  998. FOLLOWUP_IP:
  999. nt!MiLocateSubsectionNode+114
  1000. fffff803`934538b4 418b40ec mov eax,dword ptr [r8-14h]
  1001. FAULT_INSTR_CODE: ec408b41
  1002. SYMBOL_STACK_INDEX: 3
  1003. SYMBOL_NAME: nt!MiLocateSubsectionNode+114
  1004. FOLLOWUP_NAME: MachineOwner
  1005. MODULE_NAME: nt
  1006. DEBUG_FLR_IMAGE_TIMESTAMP: 597fd80d
  1007. IMAGE_VERSION: 10.0.15063.540
  1008.  
  1009. IMAGE_NAME: memory_corruption
  1010.  
  1011. BUCKET_ID_FUNC_OFFSET: 114
  1012. FAILURE_BUCKET_ID: AV_nt!MiLocateSubsectionNode
  1013. BUCKET_ID: AV_nt!MiLocateSubsectionNode
  1014. PRIMARY_PROBLEM_CLASS: AV_nt!MiLocateSubsectionNode
  1015. TARGET_TIME: 2017-09-09T02:14:05.000Z
  1016. SUITE_MASK: 784
  1017. PRODUCT_TYPE: 1
  1018. USER_LCID: 0
  1019. FAILURE_ID_HASH_STRING: km:av_nt!milocatesubsectionnode
  1020. FAILURE_ID_HASH: {cfde05f4-7a6c-d1d0-079d-7fc336e5102d}
  1021. Followup: MachineOwner
  1022.  
  1023. ========================================================================
  1024. ==================== Dump File: 090817-9328-01.dmp =====================
  1025. ========================================================================
  1026. Mini Kernel Dump File: Only registers and stack trace are available
  1027. Windows 10 Kernel Version 15063 MP (8 procs) Free x64
  1028. Kernel base = 0xfffff802`5b000000 PsLoadedModuleList = 0xfffff802`5b34c5c0
  1029. Debug session time: Fri Sep 8 09:58:32.400 2017 (UTC - 4:00)
  1030. System Uptime: 3 days 13:00:09.509
  1031.  
  1032. BugCheck 139, {3, ffff8c80fcfb71c0, ffff8c80fcfb7118, 0}
  1033. *** WARNING: Unable to verify timestamp for Qcamain10x64.sys
  1034. *** ERROR: Module load completed but symbols could not be loaded for Qcamain10x64.sys
  1035. Probably caused by : Qcamain10x64.sys ( Qcamain10x64+fc38c )
  1036. Followup: MachineOwner
  1037.  
  1038. KERNEL_SECURITY_CHECK_FAILURE (139)
  1039. A kernel component has corrupted a critical data structure. The corruption
  1040. could potentially allow a malicious user to gain control of this machine.
  1041.  
  1042. Arguments:
  1043. Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
  1044. Arg2: ffff8c80fcfb71c0, Address of the trap frame for the exception that caused the bugcheck
  1045. Arg3: ffff8c80fcfb7118, Address of the exception record for the exception that caused the bugcheck
  1046. Arg4: 0000000000000000, Reserved
  1047.  
  1048. Debugging Details:
  1049. DUMP_CLASS: 1
  1050. DUMP_QUALIFIER: 400
  1051. DUMP_TYPE: 2
  1052. TRAP_FRAME: ffff8c80fcfb71c0 -- (.trap 0xffff8c80fcfb71c0)
  1053. NOTE: The trap frame does not contain all registers.
  1054. Some register values may be zeroed or incorrect.
  1055. rax=ffffdd8146a4fad8 rbx=0000000000000000 rcx=0000000000000003
  1056. rdx=ffffdd8146a4f1a0 rsi=0000000000000000 rdi=0000000000000000
  1057. rip=fffff8025b1c2603 rsp=ffff8c80fcfb7350 rbp=0000000000000000
  1058. r8=ffffdd8138b0c408 r9=0000000000000000 r10=0000000000000000
  1059. r11=ffff8c80fcfb7300 r12=0000000000000000 r13=0000000000000000
  1060. r14=0000000000000000 r15=0000000000000000
  1061. iopl=0 nv up di ng nz na po cy
  1062. nt!ExInterlockedInsertTailList+0xc1523:
  1063. fffff802`5b1c2603 cd29 int 29h
  1064. Resetting default scope
  1065. EXCEPTION_RECORD: ffff8c80fcfb7118 -- (.exr 0xffff8c80fcfb7118)
  1066. ExceptionAddress: fffff8025b1c2603 (nt!ExInterlockedInsertTailList+0x00000000000c1523)
  1067. ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  1068. ExceptionFlags: 00000001
  1069. NumberParameters: 1
  1070. Parameter[0]: 0000000000000003
  1071. Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
  1072. CUSTOMER_CRASH_COUNT: 1
  1073. DEFAULT_BUCKET_ID: LIST_ENTRY_CORRUPT
  1074. BUGCHECK_STR: 0x139
  1075.  
  1076. PROCESS_NAME: System
  1077.  
  1078. CURRENT_IRQL: 2
  1079. ERROR_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.
  1080. EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.
  1081. EXCEPTION_CODE_STR: c0000409
  1082. EXCEPTION_PARAMETER1: 0000000000000003
  1083. LAST_CONTROL_TRANSFER: from fffff8025b1778a9 to fffff8025b16c560
  1084. STACK_TEXT:
  1085. ffff8c80`fcfb6e98 fffff802`5b1778a9 : 00000000`00000139 00000000`00000003 ffff8c80`fcfb71c0 ffff8c80`fcfb7118 : nt!KeBugCheckEx
  1086. ffff8c80`fcfb6ea0 fffff802`5b177c10 : 00000001`00000200 00000000`00000000 ffffdd81`376ea1a0 fffff80f`00000200 : nt!KiBugCheckDispatch+0x69
  1087. ffff8c80`fcfb6fe0 fffff802`5b176bf7 : ffffdd81`32b0a6c8 00000000`00000000 ffffdd81`378b8000 fffff802`5b88d5d6 : nt!KiFastFailDispatch+0xd0
  1088. ffff8c80`fcfb71c0 fffff802`5b1c2603 : ffffdd81`38b0c418 ffff8c80`00000000 ffffdd81`46a4f1a0 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0xf7
  1089. ffff8c80`fcfb7350 fffff800`03a3c38c : ffffdd81`38b0c040 ffffdd81`46a4ef28 ffffdd81`46a4ef28 ffffdd81`46a4ef28 : nt!ExInterlockedInsertTailList+0xc1523
  1090. ffff8c80`fcfb7380 ffffdd81`38b0c040 : ffffdd81`46a4ef28 ffffdd81`46a4ef28 ffffdd81`46a4ef28 ffffdd81`38b0c040 : Qcamain10x64+0xfc38c
  1091. ffff8c80`fcfb7388 ffffdd81`46a4ef28 : ffffdd81`46a4ef28 ffffdd81`46a4ef28 ffffdd81`38b0c040 fffff800`0399d0d7 : 0xffffdd81`38b0c040
  1092. ffff8c80`fcfb7390 ffffdd81`46a4ef28 : ffffdd81`46a4ef28 ffffdd81`38b0c040 fffff800`0399d0d7 ffffdd81`38b0c040 : 0xffffdd81`46a4ef28
  1093. ffff8c80`fcfb7398 ffffdd81`46a4ef28 : ffffdd81`38b0c040 fffff800`0399d0d7 ffffdd81`38b0c040 00000000`00000000 : 0xffffdd81`46a4ef28
  1094. ffff8c80`fcfb73a0 ffffdd81`38b0c040 : fffff800`0399d0d7 ffffdd81`38b0c040 00000000`00000000 ffffdd81`38b0c040 : 0xffffdd81`46a4ef28
  1095. ffff8c80`fcfb73a8 fffff800`0399d0d7 : ffffdd81`38b0c040 00000000`00000000 ffffdd81`38b0c040 00000000`00000000 : 0xffffdd81`38b0c040
  1096. ffff8c80`fcfb73b0 ffffdd81`38b0c040 : 00000000`00000000 ffffdd81`38b0c040 00000000`00000000 ffffdd81`46a4ef28 : Qcamain10x64+0x5d0d7
  1097. ffff8c80`fcfb73b8 00000000`00000000 : ffffdd81`38b0c040 00000000`00000000 ffffdd81`46a4ef28 fffff800`03941292 : 0xffffdd81`38b0c040
  1098. STACK_COMMAND: kb
  1099. THREAD_SHA1_HASH_MOD_FUNC: 4ed2fddd163a6d816e80ec9db44c7ec8907dc3ef
  1100. THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 129e132466a733efb2bc5af7677ec484d471af33
  1101. THREAD_SHA1_HASH_MOD: 56650451dd136af79302f8c8047f918da248c25a
  1102. FOLLOWUP_IP:
  1103. Qcamain10x64+fc38c
  1104. fffff800`03a3c38c f0ff83f0030000 lock inc dword ptr [rbx+3F0h]
  1105. FAULT_INSTR_CODE: f083fff0
  1106. SYMBOL_STACK_INDEX: 5
  1107. SYMBOL_NAME: Qcamain10x64+fc38c
  1108. FOLLOWUP_NAME: MachineOwner
  1109. MODULE_NAME: Qcamain10x64
  1110.  
  1111. IMAGE_NAME: Qcamain10x64.sys
  1112.  
  1113. DEBUG_FLR_IMAGE_TIMESTAMP: 5875da6f
  1114. BUCKET_ID_FUNC_OFFSET: fc38c
  1115. FAILURE_BUCKET_ID: 0x139_3_Qcamain10x64!unknown_function
  1116. BUCKET_ID: 0x139_3_Qcamain10x64!unknown_function
  1117. PRIMARY_PROBLEM_CLASS: 0x139_3_Qcamain10x64!unknown_function
  1118. TARGET_TIME: 2017-09-08T13:58:32.000Z
  1119. SUITE_MASK: 784
  1120. PRODUCT_TYPE: 1
  1121. USER_LCID: 0
  1122. FAILURE_ID_HASH_STRING: km:0x139_3_qcamain10x64!unknown_function
  1123. FAILURE_ID_HASH: {4576ae2e-9109-1045-88f4-cb0d1a7b795f}
  1124. Followup: MachineOwner
  1125.  
  1126. ========================================================================
  1127. ==================== Dump File: 090417-8125-01.dmp =====================
  1128. ========================================================================
  1129. Mini Kernel Dump File: Only registers and stack trace are available
  1130. Windows 10 Kernel Version 15063 MP (8 procs) Free x64
  1131. Kernel base = 0xfffff800`1fc8d000 PsLoadedModuleList = 0xfffff800`1ffd95c0
  1132. Debug session time: Mon Sep 4 04:14:41.001 2017 (UTC - 4:00)
  1133. System Uptime: 4 days 14:23:31.410
  1134.  
  1135. BugCheck A, {c0000039, 2, 0, fffff8001fc2ddff}
  1136. *** WARNING: Unable to verify timestamp for Qcamain10x64.sys
  1137. *** ERROR: Module load completed but symbols could not be loaded for Qcamain10x64.sys
  1138. *** WARNING: Unable to verify timestamp for win32k.sys
  1139. *** ERROR: Module load completed but symbols could not be loaded for win32k.sys
  1140. Probably caused by : Qcamain10x64.sys ( Qcamain10x64+fc9cc )
  1141. Followup: MachineOwner
  1142.  
  1143. IRQL_NOT_LESS_OR_EQUAL (a)
  1144. An attempt was made to access a pageable (or completely invalid) address at an
  1145. interrupt request level (IRQL) that is too high. This is usually
  1146. caused by drivers using improper addresses.
  1147. If a kernel debugger is available get the stack backtrace.
  1148.  
  1149. Arguments:
  1150. Arg1: 00000000c0000039, memory referenced
  1151. Arg2: 0000000000000002, IRQL
  1152. Arg3: 0000000000000000, bitfield :
  1153. bit 0 : value 0 = read operation, 1 = write operation
  1154. bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
  1155. Arg4: fffff8001fc2ddff, address which referenced memory
  1156.  
  1157. Debugging Details:
  1158. DUMP_CLASS: 1
  1159. DUMP_QUALIFIER: 400
  1160. DUMP_TYPE: 2
  1161. READ_ADDRESS: fffff8002006e358: Unable to get MiVisibleState
  1162. 00000000c0000039
  1163. CURRENT_IRQL: 2
  1164. FAULTING_IP:
  1165. hal!HalPutScatterGatherList+1963f
  1166. fffff800`1fc2ddff 418b6e2c mov ebp,dword ptr [r14+2Ch]
  1167. CUSTOMER_CRASH_COUNT: 1
  1168. DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
  1169. BUGCHECK_STR: AV
  1170.  
  1171. PROCESS_NAME: System
  1172.  
  1173. TRAP_FRAME: fffff800220f8c90 -- (.trap 0xfffff800220f8c90)
  1174. NOTE: The trap frame does not contain all registers.
  1175. Some register values may be zeroed or incorrect.
  1176. rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000001
  1177. rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
  1178. rip=fffff8001fc2ddff rsp=fffff800220f8e20 rbp=ffffbb81403a0a20
  1179. r8=ffffce0a995deb30 r9=ffffce0aafc81660 r10=ffffce0a995deb30
  1180. r11=ffffce0aafc81620 r12=0000000000000000 r13=0000000000000000
  1181. r14=0000000000000000 r15=0000000000000000
  1182. iopl=0 nv up ei pl nz na pe nc
  1183. hal!HalPutScatterGatherList+0x1963f:
  1184. fffff800`1fc2ddff 418b6e2c mov ebp,dword ptr [r14+2Ch] ds:00000000`0000002c=????????
  1185. Resetting default scope
  1186. LAST_CONTROL_TRANSFER: from fffff8001fe048a9 to fffff8001fdf9560
  1187. STACK_TEXT:
  1188. fffff800`220f8b48 fffff800`1fe048a9 : 00000000`0000000a 00000000`c0000039 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
  1189. fffff800`220f8b50 fffff800`1fe02e7d : 00000000`00000000 00000000`00000001 00000000`00000000 ffffce0a`d27c01a0 : nt!KiBugCheckDispatch+0x69
  1190. fffff800`220f8c90 fffff800`1fc2ddff : ffffce0a`bdf14f30 ffffce0a`afc81660 00000000`00000001 ffffce0a`995deb30 : nt!KiPageFault+0x23d
  1191. fffff800`220f8e20 fffff809`2d20c898 : ffffce0a`cfb267e0 00000000`00000001 00000000`00000000 00000000`00000000 : hal!HalPutScatterGatherList+0x1963f
  1192. fffff800`220f8e80 fffff809`30b3c9cc : 00000000`00000000 00000000`00000001 ffffce0a`99680030 00000000`00000000 : ndis!NdisMFreeNetBufferSGList+0x38
  1193. fffff800`220f8ec0 00000000`00000000 : 00000000`00000001 ffffce0a`99680030 00000000`00000000 fffff809`30be0102 : Qcamain10x64+0xfc9cc
  1194. STACK_COMMAND: kb
  1195. THREAD_SHA1_HASH_MOD_FUNC: 830cbe77ddb612ecba944625686ae88037b74cca
  1196. THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 28d978a460765c1eaeb858b8801d7b70f9548ba9
  1197. THREAD_SHA1_HASH_MOD: 35775663fedbdd5e0dd10b579d6e121aac14070a
  1198. FOLLOWUP_IP:
  1199. Qcamain10x64+fc9cc
  1200. fffff809`30b3c9cc 4d8b3f mov r15,qword ptr [r15]
  1201. FAULT_INSTR_CODE: 663f8b4d
  1202. SYMBOL_STACK_INDEX: 5
  1203. SYMBOL_NAME: Qcamain10x64+fc9cc
  1204. FOLLOWUP_NAME: MachineOwner
  1205. MODULE_NAME: Qcamain10x64
  1206.  
  1207. IMAGE_NAME: Qcamain10x64.sys
  1208.  
  1209. DEBUG_FLR_IMAGE_TIMESTAMP: 5875da6f
  1210. BUCKET_ID_FUNC_OFFSET: fc9cc
  1211. FAILURE_BUCKET_ID: AV_Qcamain10x64!unknown_function
  1212. BUCKET_ID: AV_Qcamain10x64!unknown_function
  1213. PRIMARY_PROBLEM_CLASS: AV_Qcamain10x64!unknown_function
  1214. TARGET_TIME: 2017-09-04T08:14:41.000Z
  1215. SUITE_MASK: 784
  1216. PRODUCT_TYPE: 1
  1217. USER_LCID: 0
  1218. FAILURE_ID_HASH_STRING: km:av_qcamain10x64!unknown_function
  1219. FAILURE_ID_HASH: {f52cafb4-1320-aedf-2a5d-ab5464b9e487}
  1220. Followup: MachineOwner
  1221.  
  1222. ========================================================================
  1223. ==================== Dump File: 083117-7734-01.dmp =====================
  1224. ========================================================================
  1225. Mini Kernel Dump File: Only registers and stack trace are available
  1226. Windows 10 Kernel Version 15063 MP (8 procs) Free x64
  1227. Kernel base = 0xfffff802`00c7f000 PsLoadedModuleList = 0xfffff802`00fcb5c0
  1228. Debug session time: Wed Aug 30 09:28:23.256 2017 (UTC - 4:00)
  1229. System Uptime: 0 days 3:23:10.932
  1230.  
  1231. BugCheck C2, {99, ffffbe87e242a6f0, 0, 0}
  1232. *** WARNING: Unable to verify timestamp for Qcamain10x64.sys
  1233. *** ERROR: Module load completed but symbols could not be loaded for Qcamain10x64.sys
  1234. Probably caused by : nwifi.sys ( nwifi!Dot11FreeMdlAndMemForNdis6+59 )
  1235. Followup: MachineOwner
  1236.  
  1237. BAD_POOL_CALLER (c2)
  1238. The current thread is making a bad pool request. Typically this is at a bad IRQL level or double freeing the same allocation, etc.
  1239.  
  1240. Arguments:
  1241. Arg1: 0000000000000099, Attempt to free pool with invalid address (or corruption in pool header)
  1242. Arg2: ffffbe87e242a6f0, Address being freed
  1243. Arg3: 0000000000000000, 0
  1244. Arg4: 0000000000000000, 0
  1245.  
  1246. Debugging Details:
  1247. DUMP_CLASS: 1
  1248. DUMP_QUALIFIER: 400
  1249. DUMP_TYPE: 2
  1250. FAULTING_IP:
  1251. nwifi!Dot11FreeMdlAndMemForNdis6+59
  1252. fffff802`009898e9 488b5c2430 mov rbx,qword ptr [rsp+30h]
  1253. BUGCHECK_STR: 0xc2_99
  1254. CUSTOMER_CRASH_COUNT: 1
  1255. DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
  1256.  
  1257. PROCESS_NAME: System
  1258.  
  1259. CURRENT_IRQL: 2
  1260. LAST_CONTROL_TRANSFER: from fffff802013eb03f to fffff80200deb560
  1261. STACK_TEXT:
  1262. fffff802`030f8ce8 fffff802`013eb03f : 00000000`000000c2 00000000`00000099 ffffbe87`e242a6f0 00000000`00000000 : nt!KeBugCheckEx
  1263. fffff802`030f8cf0 fffff802`00e96b2d : fffff802`00c552e0 fffff802`00c552e0 ffffbe87`da89d001 fffff802`00c088f1 : nt!VerifierBugCheckIfAppropriate+0x6b
  1264. fffff802`030f8d30 fffff802`00f00035 : 00000000`000009e0 fffff802`030f8e09 ffffbe87`e242a6e0 ffffbe87`df830030 : nt!VerifierFreeTrackedPool+0x41
  1265. fffff802`030f8d70 fffff802`009898e9 : fffff802`0098cc10 00000000`00000000 00000000`00000000 00000000`00000001 : nt!ExFreePoolWithTag+0x1015
  1266. fffff802`030f8e70 fffff806`d21aa91f : ffffbe87`df5af680 00000000`00000000 00000000`00000000 00000000`00000000 : nwifi!Dot11FreeMdlAndMemForNdis6+0x59
  1267. fffff802`030f8ea0 fffff806`d21aa8e8 : ffffbe87`df5af680 ffffbe87`e3e7bad0 00000000`00000001 00000000`00000000 : ndis!NdisAdvanceNetBufferDataStart+0x253ff
  1268. fffff802`030f8ed0 fffff802`00988e13 : ffffbe87`e3e7bd60 00000000`00000000 ffffbe87`e3e7bad0 ffffbe87`ddd8dca0 : ndis!NdisAdvanceNetBufferListDataStart+0x25418
  1269. fffff802`030f8f00 fffff802`0098cc2d : 00000000`00000000 ffffbe87`ddd6ab00 ffffbe87`ddd8fcd8 fffff806`d4551710 : nwifi!Dot11SendCompletion+0x4b
  1270. fffff802`030f8f40 fffff806`d2181a73 : ffffbe87`e3e7bad0 ffffbe87`ddd8d010 ffffbe87`ddd8fcc0 ffffbe87`ddd93798 : nwifi!Pt6SendComplete+0x1d
  1271. fffff802`030f8f70 fffff806`d4ad1617 : ffffbe87`da35e1a0 00000000`00000000 00000000`00000000 ffffbe87`e3e7ba02 : ndis!NdisMSendNetBufferListsComplete+0x183
  1272. fffff802`030f9060 fffff806`d4aa1cb3 : ffffbe87`dbff1cb0 fffff806`d493d901 ffffbe87`e3e7bad0 00000000`00000000 : wdiwifi!CPort::SendCompleteNetBufferLists+0xef
  1273. fffff802`030f90b0 fffff806`d4a968de : ffffbe87`da8cd7d0 ffffbe87`db977200 ffffbe87`e3e7bad0 00000000`00000000 : wdiwifi!CAdapter::SendCompleteNbl+0x123
  1274. fffff802`030f9120 fffff806`d4a96553 : ffffbe87`d63e5900 ffffbe87`db977230 ffffbe87`e3e7bad0 fffff802`00000001 : wdiwifi!CTxMgr::CompleteNdisNbl+0xbe
  1275. fffff802`030f9180 fffff806`d4a93f24 : ffffbe87`d63e5940 fffff806`d4b28df0 fffff806`d4b28df0 fffff806`d4a87363 : wdiwifi!CTxMgr::CompleteNBLs+0x5b
  1276. fffff802`030f91c0 fffff806`d48d7d05 : 00000000`00000000 00000000`00000000 ffffbe87`de066000 fffff802`030f9300 : wdiwifi!CTxMgr::TxSendCompleteInd+0x66c
  1277. fffff802`030f9290 00000000`00000000 : 00000000`00000000 ffffbe87`de066000 fffff802`030f9300 00000000`00000000 : Qcamain10x64+0xf7d05
  1278. STACK_COMMAND: kb
  1279. THREAD_SHA1_HASH_MOD_FUNC: cb424d480c4c59aaa5079eebd7e723b8c5661867
  1280. THREAD_SHA1_HASH_MOD_FUNC_OFFSET: c1c268c3f84fe4a7609a402a51630ec824e0db99
  1281. THREAD_SHA1_HASH_MOD: 8b744a7043e2b2cef62ea3a0c3f879ed1ff50292
  1282. FOLLOWUP_IP:
  1283. nwifi!Dot11FreeMdlAndMemForNdis6+59
  1284. fffff802`009898e9 488b5c2430 mov rbx,qword ptr [rsp+30h]
  1285. FAULT_INSTR_CODE: 245c8b48
  1286. SYMBOL_STACK_INDEX: 4
  1287. SYMBOL_NAME: nwifi!Dot11FreeMdlAndMemForNdis6+59
  1288. FOLLOWUP_NAME: MachineOwner
  1289. MODULE_NAME: nwifi
  1290.  
  1291. IMAGE_NAME: nwifi.sys
  1292.  
  1293. DEBUG_FLR_IMAGE_TIMESTAMP: 3e4b5b01
  1294. IMAGE_VERSION: 10.0.15052.0
  1295. BUCKET_ID_FUNC_OFFSET: 59
  1296. FAILURE_BUCKET_ID: OLD_IMAGE_nwifi.sys
  1297. BUCKET_ID: OLD_IMAGE_nwifi.sys
  1298. PRIMARY_PROBLEM_CLASS: OLD_IMAGE_nwifi.sys
  1299. TARGET_TIME: 2017-08-30T13:28:23.000Z
  1300. SUITE_MASK: 784
  1301. PRODUCT_TYPE: 1
  1302. USER_LCID: 0
  1303. FAILURE_ID_HASH_STRING: km:old_image_nwifi.sys
  1304. FAILURE_ID_HASH: {45c67169-ba4a-146f-5ace-fa1fd15a28a2}
  1305. Followup: MachineOwner
  1306.  
  1307. ========================================================================
  1308. ==================== Dump File: 081317-8609-01.dmp =====================
  1309. ========================================================================
  1310. Mini Kernel Dump File: Only registers and stack trace are available
  1311. Windows 10 Kernel Version 15063 MP (8 procs) Free x64
  1312. Kernel base = 0xfffff800`f1e8a000 PsLoadedModuleList = 0xfffff800`f21d65c0
  1313. Debug session time: Sun Aug 13 08:03:40.355 2017 (UTC - 4:00)
  1314. System Uptime: 2 days 9:42:59.032
  1315.  
  1316. BugCheck 1E, {ffffffffc0000005, fffff809053e1388, 0, ffffffffffffffff}
  1317. *** WARNING: Unable to verify timestamp for win32k.sys
  1318. *** ERROR: Module load completed but symbols could not be loaded for win32k.sys
  1319. Probably caused by : memory_corruption
  1320. Followup: memory_corruption
  1321.  
  1322. KMODE_EXCEPTION_NOT_HANDLED (1e)
  1323. This is a very common bugcheck. Usually the exception address pinpoints
  1324. the driver/function that caused the problem. Always note this address
  1325. as well as the link date of the driver/image that contains this address.
  1326.  
  1327. Arguments:
  1328. Arg1: ffffffffc0000005, The exception code that was not handled
  1329. Arg2: fffff809053e1388, The address that the exception occurred at
  1330. Arg3: 0000000000000000, Parameter 0 of the exception
  1331. Arg4: ffffffffffffffff, Parameter 1 of the exception
  1332.  
  1333. Debugging Details:
  1334. DUMP_CLASS: 1
  1335. DUMP_QUALIFIER: 400
  1336. DUMP_TYPE: 2
  1337. READ_ADDRESS: fffff800f226b358: Unable to get MiVisibleState
  1338. ffffffffffffffff
  1339. EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
  1340. FAULTING_IP:
  1341. intelppm!MWaitIdle+18
  1342. fffff809`053e1388 c3 ret
  1343. EXCEPTION_PARAMETER2: ffffffffffffffff
  1344. BUGCHECK_STR: 0x1E_c0000005_R
  1345. CUSTOMER_CRASH_COUNT: 1
  1346. DEFAULT_BUCKET_ID: CODE_CORRUPTION
  1347.  
  1348. PROCESS_NAME: System
  1349.  
  1350. CURRENT_IRQL: 0
  1351. EXCEPTION_RECORD: 0000000000140001 -- (.exr 0x140001)
  1352. Cannot read Exception record @ 0000000000140001
  1353. LAST_CONTROL_TRANSFER: from fffff800f20850b6 to fffff800f1ff6560
  1354. STACK_TEXT:
  1355. ffffbc81`71cbc648 fffff800`f20850b6 : 00000000`0000001e ffffffff`c0000005 fffff809`053e1388 00000000`00000000 : nt!KeBugCheckEx
  1356. ffffbc81`71cbc650 fffff800`f1ffca3d : fffff800`f2214000 fffff800`f1e8a000 000536a0`00889000 00000000`00000000 : nt!KiFatalExceptionHandler+0x22
  1357. ffffbc81`71cbc690 fffff800`f1eb5d94 : 00000000`00000000 ffffbc81`71cbc7c0 00000000`00000000 00000000`00000000 : nt!RtlpExecuteHandlerForException+0xd
  1358. ffffbc81`71cbc6c0 fffff800`f1eb4b36 : ffffbc81`71cbd598 ffffbc81`71cbd2e0 ffffbc81`71cbd598 ffffbc81`71cbd598 : nt!RtlDispatchException+0x404
  1359. ffffbc81`71cbcdb0 fffff800`f200198e : 00000000`00140001 00000000`000000ff 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x1f6
  1360. ffffbc81`71cbd460 fffff800`f1fffc34 : 00000000`00000000 00000000`000000ff 00000000`00000001 00000000`0000007e : nt!KiExceptionDispatch+0xce
  1361. ffffbc81`71cbd640 fffff809`053e1388 : 7ffff809`053e1370 00000000`00000040 00000000`00000000 ffffe68c`e15f9000 : nt!KiGeneralProtectionFault+0xf4
  1362. ffffbc81`71cbd7d8 7ffff809`053e1370 : 00000000`00000040 00000000`00000000 ffffe68c`e15f9000 ffffbc81`71c8f180 : intelppm!MWaitIdle+0x18
  1363. ffffbc81`71cbd7e0 00000000`00000040 : 00000000`00000000 ffffe68c`e15f9000 ffffbc81`71c8f180 00000000`00000046 : 0x7ffff809`053e1370
  1364. ffffbc81`71cbd7e8 00000000`00000000 : ffffe68c`e15f9000 ffffbc81`71c8f180 00000000`00000046 fffff800`f1f006f9 : 0x40
  1365. STACK_COMMAND: kb
  1366. CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
  1367. fffff800f1f03b10 - nt!MiFlushTbAsNeeded+70
  1368. [ 80:00 ]
  1369. 1 error : !nt (fffff800f1f03b10)
  1370. MODULE_NAME: memory_corruption
  1371.  
  1372. IMAGE_NAME: memory_corruption
  1373.  
  1374. FOLLOWUP_NAME: memory_corruption
  1375. DEBUG_FLR_IMAGE_TIMESTAMP: 0
  1376. MEMORY_CORRUPTOR: ONE_BIT
  1377. FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
  1378. BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
  1379. PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_ONE_BIT
  1380. TARGET_TIME: 2017-08-13T12:03:40.000Z
  1381. SUITE_MASK: 784
  1382. PRODUCT_TYPE: 1
  1383. USER_LCID: 0
  1384. FAILURE_ID_HASH_STRING: km:memory_corruption_one_bit
  1385. FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}
  1386. Followup: memory_corruption
  1387.  
  1388. ========================================================================
  1389. ==================== Dump File: 081117-9109-01.dmp =====================
  1390. ========================================================================
  1391. Mini Kernel Dump File: Only registers and stack trace are available
  1392. Windows 10 Kernel Version 15063 MP (8 procs) Free x64
  1393. Kernel base = 0xfffff801`5d29a000 PsLoadedModuleList = 0xfffff801`5d5e65c0
  1394. Debug session time: Thu Aug 10 22:19:28.210 2017 (UTC - 4:00)
  1395. System Uptime: 1 days 13:13:23.616
  1396.  
  1397. BugCheck 19, {20, ffffb20a6548f000, ffffb20a6548f970, 4970000}
  1398. fffff8015d67b358: Unable to get MiVisibleState
  1399. *** WARNING: Unable to verify timestamp for win32k.sys
  1400. *** ERROR: Module load completed but symbols could not be loaded for win32k.sys
  1401. Probably caused by : memory_corruption
  1402. Followup: memory_corruption
  1403.  
  1404. BAD_POOL_HEADER (19)
  1405. The pool is already corrupt at the time of the current request.
  1406. This may or may not be due to the caller.
  1407. The internal pool links must be walked to figure out a possible cause of
  1408. the problem, and then special pool applied to the suspect tags or the driver
  1409. verifier to a suspect driver.
  1410.  
  1411. Arguments:
  1412. Arg1: 0000000000000020, a pool block header size is corrupt.
  1413. Arg2: ffffb20a6548f000, The pool entry we were looking for within the page.
  1414. Arg3: ffffb20a6548f970, The next pool entry.
  1415. Arg4: 0000000004970000, (reserved)
  1416.  
  1417. Debugging Details:
  1418. DUMP_CLASS: 1
  1419. DUMP_QUALIFIER: 400
  1420. DUMP_TYPE: 2
  1421. BUGCHECK_STR: 0x19_20
  1422. POOL_ADDRESS: ffffb20a6548f000
  1423. CUSTOMER_CRASH_COUNT: 1
  1424. DEFAULT_BUCKET_ID: CODE_CORRUPTION
  1425.  
  1426. PROCESS_NAME: System
  1427.  
  1428. CURRENT_IRQL: 0
  1429. LAST_CONTROL_TRANSFER: from fffff8015d51b0b2 to fffff8015d406560
  1430. STACK_TEXT:
  1431. ffffc480`3db17928 fffff801`5d51b0b2 : 00000000`00000019 00000000`00000020 ffffb20a`6548f000 ffffb20a`6548f970 : nt!KeBugCheckEx
  1432. ffffc480`3db17930 fffff801`5d748076 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ExFreePoolWithTag+0x1092
  1433. ffffc480`3db17a30 fffff801`5d2fdb86 : 00000000`00000000 00000000`00000000 fffff801`5d346610 ffffb20a`6548f080 : nt!ObpRemoveObjectRoutine+0x86
  1434. ffffc480`3db17a90 fffff801`5d346682 : 00000000`00000000 00000000`00000000 ffffb20a`640d2f70 ffffb20a`6548f698 : nt!ObfDereferenceObjectWithTag+0xc6
  1435. ffffc480`3db17ad0 fffff801`5d2d7ca8 : ffffb20a`65e10300 fffff801`5d5e0080 ffffb20a`65e10300 00000000`000fb000 : nt!PspReaper+0x72
  1436. ffffc480`3db17b00 fffff801`5d376ac7 : 0019c824`000a55ea 00000000`00000080 ffffb20a`5a0be500 ffffb20a`65e10300 : nt!ExpWorkerThread+0xd8
  1437. ffffc480`3db17b90 fffff801`5d40b9e6 : fffff801`5c4b6180 ffffb20a`65e10300 fffff801`5d376a80 000a59f4`000a592c : nt!PspSystemThreadStartup+0x47
  1438. ffffc480`3db17be0 00000000`00000000 : ffffc480`3db18000 ffffc480`3db11000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
  1439. STACK_COMMAND: kb
  1440. CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
  1441. fffff8015d32f817 - nt!MiPfnShareCountIsZero+187
  1442. [ f6:fa ]
  1443. 1 error : !nt (fffff8015d32f817)
  1444. MODULE_NAME: memory_corruption
  1445.  
  1446. IMAGE_NAME: memory_corruption
  1447.  
  1448. FOLLOWUP_NAME: memory_corruption
  1449. DEBUG_FLR_IMAGE_TIMESTAMP: 0
  1450. MEMORY_CORRUPTOR: ONE_BYTE
  1451. FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BYTE
  1452. BUCKET_ID: MEMORY_CORRUPTION_ONE_BYTE
  1453. PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_ONE_BYTE
  1454. TARGET_TIME: 2017-08-11T02:19:28.000Z
  1455. SUITE_MASK: 784
  1456. PRODUCT_TYPE: 1
  1457. USER_LCID: 0
  1458. FAILURE_ID_HASH_STRING: km:memory_corruption_one_byte
  1459. FAILURE_ID_HASH: {ad110d6a-3b33-2c0a-c931-570eae1ba92d}
  1460. Followup: memory_corruption
Advertisement
Add Comment
Please, Sign In to add comment