Advertisement
Guest User

Untitled

a guest
Jun 6th, 2017
477
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 69.55 KB | None | 0 0
  1. Microsoft (R) Windows Debugger Version 10.0.14321.1024 AMD64
  2. Copyright (c) Microsoft Corporation. All rights reserved.
  3.  
  4. ========================================================================
  5. =================== Dump File: 011017-6046-01.dmp ====================
  6. ========================================================================
  7. Mini Kernel Dump File: Only registers and stack trace are available
  8. Windows 10 Kernel Version 14393 MP (8 procs) Free x64
  9. Product: WinNt, suite: TerminalServer SingleUserTS
  10. Built by: 14393.693.amd64fre.rs1_release.161220-1747
  11. Kernel base = 0xfffff802`a1c0d000 PsLoadedModuleList = 0xfffff802`a1f12060
  12. Debug session time: Tue Jan 10 19:54:45.973 2017 (UTC - 4:00)
  13. System Uptime: 0 days 0:43:52.610
  14.  
  15. BugCheck 7F, {8, ffffcc00834c8b30, ffffcc00852e0f80, fffff802a1c9ee57}
  16. Probably caused by : memory_corruption
  17. Followup: memory_corruption
  18. 3: kd> !analyze -v
  19.  
  20. UNEXPECTED_KERNEL_MODE_TRAP (7f)
  21. This means a trap occurred in kernel mode, and it's a trap of a kind
  22. that the kernel isn't allowed to have/catch (bound trap) or that
  23. is always instant death (double fault). The first number in the
  24. bugcheck params is the number of the trap (8 = double fault, etc)
  25. Consult an Intel x86 family manual to learn more about what these
  26. traps are. Here is a *portion* of those codes:
  27. If kv shows a taskGate
  28. use .tss on the part before the colon, then kv.
  29. Else if kv shows a trapframe
  30. use .trap on that value
  31. Else
  32. .trap on the appropriate frame will show where the trap was taken
  33. (on x86, this will be the ebp that goes with the procedure KiTrap)
  34. Endif
  35. kb will then show the corrected stack.
  36.  
  37. Arguments:
  38. Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
  39. Arg2: ffffcc00834c8b30
  40. Arg3: ffffcc00852e0f80
  41. Arg4: fffff802a1c9ee57
  42.  
  43. Debugging Details:
  44. DUMP_CLASS: 1
  45. DUMP_QUALIFIER: 400
  46. BUILD_VERSION_STRING: 10.0.14393.693 (rs1_release.161220-1747)
  47. SYSTEM_MANUFACTURER: MSI
  48. SYSTEM_PRODUCT_NAME: MS-7916
  49. SYSTEM_SKU: To be filled by O.E.M.
  50. SYSTEM_VERSION: 1.0
  51. BIOS_VENDOR: American Megatrends Inc.
  52. BIOS_VERSION: V1.12
  53. BIOS_DATE: 02/16/2016
  54. BASEBOARD_MANUFACTURER: MSI
  55. BASEBOARD_PRODUCT: Z97 GAMING 7 (MS-7916)
  56. BASEBOARD_VERSION: 1.0
  57. DUMP_TYPE: 2
  58. BUGCHECK_STR: 0x7f_8
  59. TRAP_FRAME: ffffcc00834c8b30 -- (.trap 0xffffcc00834c8b30)
  60. NOTE: The trap frame does not contain all registers.
  61. Some register values may be zeroed or incorrect.
  62. rax=ffffb919f01ccde8 rbx=0000000000000000 rcx=ffffcc00852e1288
  63. rdx=ffffcc00852e1150 rsi=0000000000000000 rdi=0000000000000000
  64. rip=fffff802a1c9ee57 rsp=ffffcc00852e0f80 rbp=ffffcc00852e0fb0
  65. r8=ffffcc00852e1330 r9=0000000000000000 r10=0000000000000000
  66. r11=00007ffffffeffff r12=0000000000000000 r13=0000000000000000
  67. r14=0000000000000000 r15=0000000000000000
  68. iopl=0 nv up ei ng nz na po nc
  69. nt!KiDispatchException+0x37:
  70. fffff802`a1c9ee57 48894d40 mov qword ptr [rbp+40h],rcx ss:0018:ffffcc00`852e0ff0=????????????????
  71. Resetting default scope
  72. CPU_COUNT: 8
  73. CPU_MHZ: fa0
  74. CPU_VENDOR: GenuineIntel
  75. CPU_FAMILY: 6
  76. CPU_MODEL: 3c
  77. CPU_STEPPING: 3
  78. CPU_MICROCODE: 6,3c,3,0 (F,M,S,R) SIG: 1E'00000000 (cache) 1E'00000000 (init)
  79. CUSTOMER_CRASH_COUNT: 1
  80. DEFAULT_BUCKET_ID: CODE_CORRUPTION
  81.  
  82. PROCESS_NAME: dwm.exe
  83.  
  84. CURRENT_IRQL: 0
  85. ANALYSIS_SESSION_HOST: USERNAME-PC
  86. ANALYSIS_SESSION_TIME: 06-06-2017 14:52:08.0042
  87. ANALYSIS_VERSION: 10.0.14321.1024 amd64fre
  88. EXCEPTION_RECORD: 01246d418a0d79c0 -- (.exr 0x1246d418a0d79c0)
  89. Cannot read Exception record @ 01246d418a0d79c0
  90. LAST_CONTROL_TRANSFER: from fffff802a1d62829 to fffff802a1d576f0
  91. STACK_OVERFLOW: Stack Limit: ffffcc00852e1000. Use (kF) and (!stackusage) to investigate stack usage.
  92. STACKUSAGE_FUNCTION: The function at address 0xFFFFF802A1CA010C was blamed for the stack overflow. It is using 8960 bytes of stack total in 5 instances (likely recursion).
  93. FOLLOWUP_IP:
  94. nt!RtlDispatchException+37c
  95. fffff802`a1ca010c 488b02 mov rax,qword ptr [rdx]
  96. STACK_TEXT:
  97. ffffcc00`852e0f80 fffff802`a1d62902 : 01246d41`8a0d79c0 c302c083`c01bd8f6 ccccc300`000003b8 01f98311`7401e983 : nt!KiDispatchException+0x37
  98. ffffcc00`852e1150 fffff802`a1d60bbd : 204d8d4c`084e8b48 e8d68b49`28458d4c 287d8b48`0000be58 4d8b44aa`74ff8548 : nt!KiExceptionDispatch+0xc2
  99. ffffcc00`852e1330 fffff802`a1ca010c : ffffcc00`852e7000 00000000`00000000 ffffcc00`852e1000 cb8b48d6`8b48ffff : nt!KiGeneralProtectionFault+0xfd
  100. ffffcc00`852e14c0 fffff802`a1c9ef64 : ffffcc00`852e1bf0 ffffcc00`852e20f0 ffffcc00`852e1bf0 ffffcc00`852e23c8 : nt!RtlDispatchException+0x37c
  101. ffffcc00`852e1bc0 fffff802`a1d62902 : 8b480000`02b8ae8d 00222f35`8d4c0856 8b484024`44894800 89480038`2444c6cd : nt!KiDispatchException+0x144
  102. ffffcc00`852e2290 fffff802`a1d60bbd : 8b49784e`8d4d0000 08a86842`8a1aeb11 73ff3c28`428b1075 ffc90348`c8b60f09 : nt!KiExceptionDispatch+0xc2
  103. ffffcc00`852e2470 fffff802`a1ca010c : ffffcc00`852e7000 00000000`00000000 ffffcc00`852e1000 ccccc35c`415e415f : nt!KiGeneralProtectionFault+0xfd
  104. ffffcc00`852e2600 fffff802`a1c9ef64 : ffffcc00`852e2d30 ffffcc00`852e3230 ffffcc00`852e2d30 ffffcc00`852e3508 : nt!RtlDispatchException+0x37c
  105. ffffcc00`852e2d00 fffff802`a1d62902 : 57182474`89481024 8b48ff33`20ec8348 00000810`b93948d9 000808c1`81480f74 : nt!KiDispatchException+0x144
  106. ffffcc00`852e33d0 fffff802`a1d60bbd : 00b8828b`486b7400 0a731010`78830000 0096e9c0`000004bf 8d4c0849`8b480000 : nt!KiExceptionDispatch+0xc2
  107. ffffcc00`852e35b0 fffff802`a1ca010c : ffffcc00`852e7000 00000000`00000000 ffffcc00`852e1000 00000080`302444c7 : nt!KiGeneralProtectionFault+0xfd
  108. ffffcc00`852e3740 fffff802`a1c9ef64 : ffffcc00`852e3e70 ffffcc00`852e4370 ffffcc00`852e3e70 ffffcc00`852e4648 : nt!RtlDispatchException+0x37c
  109. ffffcc00`852e3e40 fffff802`a1d62902 : fffff802`a1f31480 00000000`00000059 00000000`00000002 00000000`00000002 : nt!KiDispatchException+0x144
  110. ffffcc00`852e4510 fffff802`a1d60bbd : ffffb480`0120f8a0 fffff802`a1cdd830 00000000`00000000 00000000`0006052e : nt!KiExceptionDispatch+0xc2
  111. ffffcc00`852e46f0 fffff802`a1ca010c : ffffcc00`852e7000 00000000`00000000 ffffcc00`852e1000 00000000`00008965 : nt!KiGeneralProtectionFault+0xfd
  112. ffffcc00`852e4880 fffff802`a1c9ef64 : ffffcc00`852e4fb0 ffffcc00`852e54b0 ffffcc00`852e4fb0 ffffcc00`852e5788 : nt!RtlDispatchException+0x37c
  113. ffffcc00`852e4f80 fffff802`a1d62902 : 00000000`00000000 00000000`00000000 ffffb919`f01c9798 ffff8f0a`8a8ce840 : nt!KiDispatchException+0x144
  114. ffffcc00`852e5650 fffff802`a1d60bbd : ffffcc00`852e5b10 fffff802`a20e36dc 00000000`00000002 00000000`00000000 : nt!KiExceptionDispatch+0xc2
  115. ffffcc00`852e5830 fffff802`a1ca010c : ffffcc00`852e7000 00000000`00000000 ffffcc00`852e1000 fffff805`6d16318e : nt!KiGeneralProtectionFault+0xfd
  116. ffffcc00`852e59c0 fffff802`a1c9ef64 : ffffcc00`852e60f0 ffffcc00`852e65f0 ffffcc00`852e60f0 ffffcc00`852e68c8 : nt!RtlDispatchException+0x37c
  117. ffffcc00`852e60c0 fffff802`a1d62902 : ffffcc00`852e68c0 ffffbb0f`67ee6ef0 fffff802`a205624c 00007ffe`40a3a190 : nt!KiDispatchException+0x144
  118. ffffcc00`852e6790 fffff802`a1d60a8e : ffffbb0f`67eeb180 00002000`00018849 00000000`00000000 00000000`00000002 : nt!KiExceptionDispatch+0xc2
  119. ffffcc00`852e6970 fffff802`a1d6239b : ffffbb0f`67eeb080 0000015d`8d1b1070 80000000`00000000 ffffbb0f`67e9d9c0 : nt!KiStackFault+0x10e
  120. ffffcc00`852e6b00 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit
  121. STACK_COMMAND: .trap 0xffffcc00834c8b30 ; kb
  122. CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
  123. fffff802a1cb28ba - nt!MiCompletePrivateZeroFault+51a
  124. [ fa:b4 ]
  125. fffff802a1cb294f-fffff802a1cb2951 3 bytes - nt!MiCompletePrivateZeroFault+5af (+0x95)
  126. [ 40 fb f6:80 7a f5 ]
  127. fffff802a1cb47c3 - nt!MiGetFreeOrZeroPage+2e3 (+0x1e74)
  128. [ fa:b4 ]
  129. fffff802a1cb4819 - nt!MiGetFreeOrZeroPage+339 (+0x56)
  130. [ fa:b4 ]
  131. 6 errors : !nt (fffff802a1cb28ba-fffff802a1cb4819)
  132. MODULE_NAME: memory_corruption
  133.  
  134. IMAGE_NAME: memory_corruption
  135.  
  136. FOLLOWUP_NAME: memory_corruption
  137. DEBUG_FLR_IMAGE_TIMESTAMP: 0
  138. MEMORY_CORRUPTOR: LARGE
  139. FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
  140. BUCKET_ID: MEMORY_CORRUPTION_LARGE
  141. PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
  142. TARGET_TIME: 2017-01-10T23:54:45.000Z
  143. OSBUILD: 14393
  144. OSSERVICEPACK: 693
  145. SERVICEPACK_NUMBER: 0
  146. OS_REVISION: 0
  147. SUITE_MASK: 272
  148. PRODUCT_TYPE: 1
  149. OSPLATFORM_TYPE: x64
  150. OSNAME: Windows 10
  151. OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
  152. USER_LCID: 0
  153. OSBUILD_TIMESTAMP: 2016-12-21 01:50:57
  154. BUILDDATESTAMP_STR: 161220-1747
  155. BUILDLAB_STR: rs1_release
  156. BUILDOSVER_STR: 10.0.14393.693
  157. ANALYSIS_SESSION_ELAPSED_TIME: 1969
  158. ANALYSIS_SOURCE: KM
  159. FAILURE_ID_HASH_STRING: km:memory_corruption_large
  160. FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
  161. Followup: memory_corruption
  162.  
  163. ------------------ 3: kd> lm t n ------------------
  164. start end module name
  165. ffff855a`a4e00000 ffff855a`a5188000 win32kfull win32kfull.sys Tue Dec 13 23:21:25 2016 (5850C8C5)
  166. ffff855a`a5190000 ffff855a`a5310000 win32kbase win32kbase.sys Tue Dec 13 23:22:35 2016 (5850C90B)
  167. ffff855a`a5320000 ffff855a`a532a000 TSDDD TSDDD.dll unavailable (00000000)
  168. ffff855a`a5330000 ffff855a`a5370000 cdd cdd.dll Fri Dec 9 04:42:29 2016 (584A7C85)
  169. ffff855a`a5b50000 ffff855a`a5b8b000 win32k win32k.sys Tue Dec 13 23:46:37 2016 (5850CEAD)
  170. fffff802`a0e02000 fffff802`a0e0d000 kd kd.dll Fri Jul 15 22:29:16 2016 (57899BFC)
  171. fffff802`a1c0d000 fffff802`a242d000 nt ntkrnlmp.exe Wed Dec 21 01:50:57 2016 (585A2651)
  172. fffff802`a242d000 fffff802`a24a2000 hal hal.dll Thu Sep 15 12:15:22 2016 (57DAC91A)
  173. fffff805`67a00000 fffff805`67a5d000 msrpc msrpc.sys Fri Jul 15 22:23:06 2016 (57899A8A)
  174. fffff805`67a60000 fffff805`67a88000 ksecdd ksecdd.sys Wed Sep 7 01:00:34 2016 (57CF9EF2)
  175. fffff805`67a90000 fffff805`67b40000 clipsp clipsp.sys Wed Sep 7 00:57:27 2016 (57CF9E37)
  176. fffff805`67b40000 fffff805`67b4d000 cmimcext cmimcext.sys Thu Sep 15 12:15:09 2016 (57DAC90D)
  177. fffff805`67b50000 fffff805`67b5c000 ntosext ntosext.sys Fri Jul 15 22:10:37 2016 (5789979D)
  178. fffff805`67b60000 fffff805`67c00000 CI CI.dll Thu Sep 15 12:40:08 2016 (57DACEE8)
  179. fffff805`67c00000 fffff805`67c9e000 cng cng.sys Wed Dec 21 02:05:04 2016 (585A29A0)
  180. fffff805`67ca0000 fffff805`67d74000 Wdf01000 Wdf01000.sys Fri Jul 15 22:13:12 2016 (57899838)
  181. fffff805`67d80000 fffff805`67d93000 WDFLDR WDFLDR.SYS Fri Jul 15 22:10:39 2016 (5789979F)
  182. fffff805`67da0000 fffff805`67dc3000 acpiex acpiex.sys Fri Jul 15 22:28:23 2016 (57899BC7)
  183. fffff805`67dd0000 fffff805`67dde000 WppRecorder WppRecorder.sys Fri Jul 15 22:29:12 2016 (57899BF8)
  184. fffff805`67de0000 fffff805`67e93000 ACPI ACPI.sys Fri Jul 15 22:10:47 2016 (578997A7)
  185. fffff805`67ea0000 fffff805`67eac000 WMILIB WMILIB.SYS Fri Jul 15 22:10:37 2016 (5789979D)
  186. fffff805`67ec0000 fffff805`67ed1000 intelpep intelpep.sys Fri Jul 15 22:18:27 2016 (57899973)
  187. fffff805`67ee0000 fffff805`67eff000 WindowsTrustedRT WindowsTrustedRT.sys Fri Jul 15 22:27:05 2016 (57899B79)
  188. fffff805`67f00000 fffff805`67f0b000 WindowsTrustedRTProxy WindowsTrustedRTProxy.sys Fri Jul 15 22:27:05 2016 (57899B79)
  189. fffff805`67f10000 fffff805`67f22000 pcw pcw.sys Fri Jul 15 22:10:37 2016 (5789979D)
  190. fffff805`67f30000 fffff805`67f3b000 msisadrv msisadrv.sys Fri Jul 15 22:28:51 2016 (57899BE3)
  191. fffff805`67f40000 fffff805`67f97000 pci pci.sys Tue Dec 13 23:36:59 2016 (5850CC6B)
  192. fffff805`67fa0000 fffff805`67fb2000 vdrvroot vdrvroot.sys Fri Jul 15 22:25:58 2016 (57899B36)
  193. fffff805`67fc0000 fffff805`67fe1000 pdc pdc.sys Sat Aug 20 00:51:30 2016 (57B7E1D2)
  194. fffff805`67ff0000 fffff805`68009000 CEA CEA.sys Fri Jul 15 22:28:38 2016 (57899BD6)
  195. fffff805`68010000 fffff805`68034000 partmgr partmgr.sys Fri Nov 11 03:59:07 2016 (5825885B)
  196. fffff805`68040000 fffff805`680cd000 spaceport spaceport.sys Fri Oct 14 23:46:37 2016 (5801A69D)
  197. fffff805`680d0000 fffff805`680e8000 volmgr volmgr.sys Fri Jul 15 22:10:43 2016 (578997A3)
  198. fffff805`680f0000 fffff805`6814e000 volmgrx volmgrx.sys Fri Jul 15 22:10:45 2016 (578997A5)
  199. fffff805`68150000 fffff805`6816e000 mountmgr mountmgr.sys Fri Jul 15 22:10:42 2016 (578997A2)
  200. fffff805`68170000 fffff805`68194000 storahci storahci.sys Thu Sep 15 12:24:36 2016 (57DACB44)
  201. fffff805`681a0000 fffff805`68222000 storport storport.sys Fri Oct 14 23:45:16 2016 (5801A64C)
  202. fffff805`68250000 fffff805`68269000 fileinfo fileinfo.sys Fri Jul 15 22:26:05 2016 (57899B3D)
  203. fffff805`68270000 fffff805`682a8000 Wof Wof.sys Fri Aug 5 23:45:24 2016 (57A55D54)
  204. fffff805`682b0000 fffff805`68438000 avc3 avc3.sys Thu Sep 15 08:37:35 2016 (57DA960F)
  205. fffff805`68440000 fffff805`68477000 gzflt gzflt.sys Fri Oct 28 05:28:18 2016 (58131A32)
  206. fffff805`68480000 fffff805`686b2000 NTFS NTFS.sys Wed Nov 2 06:15:32 2016 (5819BCC4)
  207. fffff805`686c0000 fffff805`686cd000 Fs_Rec Fs_Rec.sys Fri Jul 15 22:10:37 2016 (5789979D)
  208. fffff805`686d0000 fffff805`687f8000 ndis ndis.sys Wed Oct 5 05:19:09 2016 (57F4C58D)
  209. fffff805`68820000 fffff805`688ae000 mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Fri Jul 15 22:28:05 2016 (57899BB5)
  210. fffff805`688b0000 fffff805`688c0000 werkernel werkernel.sys Fri Jul 15 22:28:51 2016 (57899BE3)
  211. fffff805`688c0000 fffff805`68923000 CLFS CLFS.SYS Fri Dec 9 04:18:07 2016 (584A76CF)
  212. fffff805`68930000 fffff805`68955000 tm tm.sys Wed Oct 5 05:11:00 2016 (57F4C3A4)
  213. fffff805`68960000 fffff805`68977000 PSHED PSHED.dll Fri Jul 15 22:10:44 2016 (578997A4)
  214. fffff805`68980000 fffff805`6898c000 BOOTVID BOOTVID.dll Fri Jul 15 22:10:37 2016 (5789979D)
  215. fffff805`68990000 fffff805`689f2000 FLTMGR FLTMGR.SYS Fri Jul 15 22:10:45 2016 (578997A5)
  216. fffff805`68a00000 fffff805`68c78000 tcpip tcpip.sys Fri Oct 14 23:32:46 2016 (5801A35E)
  217. fffff805`68c80000 fffff805`68ce9000 fwpkclnt fwpkclnt.sys Fri Oct 14 23:53:56 2016 (5801A854)
  218. fffff805`68cf0000 fffff805`68d1a000 wfplwfs wfplwfs.sys Fri Jul 15 22:25:57 2016 (57899B35)
  219. fffff805`68d20000 fffff805`68dc3000 fvevol fvevol.sys Thu Sep 15 12:36:20 2016 (57DACE04)
  220. fffff805`68dd0000 fffff805`68ddb000 volume volume.sys Fri Jul 15 22:10:37 2016 (5789979D)
  221. fffff805`68de0000 fffff805`68e44000 volsnap volsnap.sys Fri Jul 15 22:10:44 2016 (578997A4)
  222. fffff805`68e50000 fffff805`68e98000 rdyboost rdyboost.sys Fri Jul 15 22:25:16 2016 (57899B0C)
  223. fffff805`68ea0000 fffff805`68ec5000 mup mup.sys Fri Jul 15 22:11:22 2016 (578997CA)
  224. fffff805`68ed0000 fffff805`68ee0000 iorate iorate.sys Wed Nov 2 06:12:31 2016 (5819BC0F)
  225. fffff805`68ef0000 fffff805`68f0e000 disk disk.sys Fri Jul 15 22:10:52 2016 (578997AC)
  226. fffff805`68f10000 fffff805`68f72000 CLASSPNP CLASSPNP.SYS Wed Sep 7 00:33:32 2016 (57CF989C)
  227. fffff805`68fa0000 fffff805`68fb9000 crashdmp crashdmp.sys Fri Oct 14 23:46:27 2016 (5801A693)
  228. fffff805`68fc0000 fffff805`69011000 edrsensor edrsensor.sys Wed Aug 3 09:44:06 2016 (57A1F526)
  229. fffff805`69020000 fffff805`69032000 qwavedrv qwavedrv.sys Fri Jul 15 22:28:46 2016 (57899BDE)
  230. fffff805`69080000 fffff805`690b1000 cdrom cdrom.sys Fri Jul 15 22:10:42 2016 (578997A2)
  231. fffff805`690c0000 fffff805`690dd000 filecrypt filecrypt.sys Fri Jul 15 22:22:39 2016 (57899A6F)
  232. fffff805`690e0000 fffff805`690ee000 tbs tbs.sys Fri Jul 15 22:27:47 2016 (57899BA3)
  233. fffff805`690f0000 fffff805`690fa000 Null Null.SYS unavailable (00000000)
  234. fffff805`69100000 fffff805`6910a000 Beep Beep.SYS Fri Jul 15 22:22:02 2016 (57899A4A)
  235. fffff805`69110000 fffff805`69124000 BasicDisplay BasicDisplay.sys Fri Jul 15 22:28:02 2016 (57899BB2)
  236. fffff805`69130000 fffff805`69144000 watchdog watchdog.sys Fri Jul 15 22:27:39 2016 (57899B9B)
  237. fffff805`69150000 fffff805`6936f000 dxgkrnl dxgkrnl.sys Fri Dec 9 04:21:04 2016 (584A7780)
  238. fffff805`69370000 fffff805`69382000 BasicRender BasicRender.sys Fri Jul 15 22:28:14 2016 (57899BBE)
  239. fffff805`69390000 fffff805`693a9000 Npfs Npfs.SYS Fri Jul 15 22:10:38 2016 (5789979E)
  240. fffff805`693b0000 fffff805`693c0000 Msfs Msfs.SYS Fri Jul 15 22:10:38 2016 (5789979E)
  241. fffff805`693c0000 fffff805`693e3000 tdx tdx.sys Fri Jul 15 22:27:16 2016 (57899B84)
  242. fffff805`693f0000 fffff805`69400000 TDI TDI.SYS Fri Jul 15 22:28:10 2016 (57899BBA)
  243. fffff805`69400000 fffff805`6944b000 netbt netbt.sys Fri Jul 15 22:25:07 2016 (57899B03)
  244. fffff805`69450000 fffff805`694e5000 afd afd.sys Fri Oct 14 23:53:45 2016 (5801A849)
  245. fffff805`694f0000 fffff805`69509000 vwififlt vwififlt.sys Fri Jul 15 22:28:07 2016 (57899BB7)
  246. fffff805`69510000 fffff805`6953b000 pacer pacer.sys Fri Jul 15 22:25:21 2016 (57899B11)
  247. fffff805`69540000 fffff805`69552000 netbios netbios.sys Fri Jul 15 22:27:18 2016 (57899B86)
  248. fffff805`69560000 fffff805`695d5000 rdbss rdbss.sys Fri Nov 11 04:08:35 2016 (58258A93)
  249. fffff805`695e0000 fffff805`6966e000 csc csc.sys Fri Jul 15 22:22:28 2016 (57899A64)
  250. fffff805`69670000 fffff805`69681000 nsiproxy nsiproxy.sys Fri Jul 15 22:26:45 2016 (57899B65)
  251. fffff805`69690000 fffff805`6969d000 npsvctrig npsvctrig.sys Fri Jul 15 22:28:33 2016 (57899BD1)
  252. fffff805`696a0000 fffff805`696b0000 mssmbios mssmbios.sys Fri Jul 15 22:26:00 2016 (57899B38)
  253. fffff805`696b0000 fffff805`696ba000 gpuenergydrv gpuenergydrv.sys Fri Jul 15 22:28:09 2016 (57899BB9)
  254. fffff805`696c0000 fffff805`69700000 DuoVMDrv DuoVMDrv.sys Fri Sep 18 03:23:50 2015 (55FBBC06)
  255. fffff805`69700000 fffff805`6972a000 dfsc dfsc.sys Wed Oct 5 05:34:11 2016 (57F4C913)
  256. fffff805`69750000 fffff805`69778000 bdfwfpf bdfwfpf.sys Tue Feb 9 07:12:25 2016 (56B9D7A9)
  257. fffff805`69780000 fffff805`697bf000 ahcache ahcache.sys Fri Oct 14 23:31:36 2016 (5801A318)
  258. fffff805`697c0000 fffff805`697cd000 tap0901 tap0901.sys Thu Aug 22 08:40:01 2013 (521606A1)
  259. fffff805`697d0000 fffff805`697e1000 CompositeBus CompositeBus.sys Fri Jul 15 22:20:11 2016 (578999DB)
  260. fffff805`697f0000 fffff805`697fe000 kdnic kdnic.sys Fri Jul 15 22:28:28 2016 (57899BCC)
  261. fffff805`69800000 fffff805`69815000 umbus umbus.sys Fri Jul 15 22:22:33 2016 (57899A69)
  262. fffff805`69820000 fffff805`698e2000 peauth peauth.sys Fri Jul 15 22:24:39 2016 (57899AE7)
  263. fffff805`698f0000 fffff805`699a4000 srv2 srv2.sys Fri Nov 11 04:14:33 2016 (58258BF9)
  264. fffff805`699b0000 fffff805`69a29000 NETIO NETIO.SYS Fri Jul 15 22:26:08 2016 (57899B40)
  265. fffff805`69a30000 fffff805`69a60000 ksecpkg ksecpkg.sys Fri Aug 5 23:44:30 2016 (57A55D1E)
  266. fffff805`69a60000 fffff805`69aec000 srv srv.sys Wed Sep 7 00:49:09 2016 (57CF9C45)
  267. fffff805`69af0000 fffff805`69bc6000 avckf avckf.sys Thu Sep 15 08:46:29 2016 (57DA9825)
  268. fffff805`6ac00000 fffff805`6ac68000 ks ks.sys Fri Jul 15 22:24:18 2016 (57899AD2)
  269. fffff805`6ac70000 fffff805`6acd3000 USBXHCI USBXHCI.SYS Fri Jul 15 22:20:30 2016 (578999EE)
  270. fffff805`6ace0000 fffff805`6ad18000 ucx01000 ucx01000.sys Fri Jul 15 22:25:10 2016 (57899B06)
  271. fffff805`6ad20000 fffff805`6ad50000 TeeDriverW8x64 TeeDriverW8x64.sys Tue Jul 7 13:43:32 2015 (559C0FC4)
  272. fffff805`6ad50000 fffff805`6ad6c000 usbehci usbehci.sys Fri Jul 15 22:23:07 2016 (57899A8B)
  273. fffff805`6ad70000 fffff805`6ade6000 USBPORT USBPORT.SYS Fri Jul 15 22:23:09 2016 (57899A8D)
  274. fffff805`6adf0000 fffff805`6ae19000 e2xw10x64 e2xw10x64.sys Wed Sep 14 16:52:26 2016 (57D9B88A)
  275. fffff805`6ae20000 fffff805`6aed5000 wdiwifi wdiwifi.sys Thu Sep 15 12:36:57 2016 (57DACE29)
  276. fffff805`6aee0000 fffff805`6aeeb000 sthid sthid.sys Tue Feb 19 00:34:44 2013 (51230EF4)
  277. fffff805`6aef0000 fffff805`6aefb000 mshidkmdf mshidkmdf.sys Fri Jul 15 22:27:13 2016 (57899B81)
  278. fffff805`6af00000 fffff805`6af2f000 HIDCLASS HIDCLASS.SYS Fri Oct 14 23:55:48 2016 (5801A8C4)
  279. fffff805`6af30000 fffff805`6af42000 HIDPARSE HIDPARSE.SYS Fri Aug 5 23:46:37 2016 (57A55D9D)
  280. fffff805`6af50000 fffff805`6af5e000 rdpbus rdpbus.sys Fri Jul 15 22:11:15 2016 (578997C3)
  281. fffff805`6af60000 fffff805`6afe0000 usbhub usbhub.sys Fri Jul 15 22:18:19 2016 (5789996B)
  282. fffff805`6afe0000 fffff805`6afee000 USBD USBD.SYS Fri Jul 15 22:28:27 2016 (57899BCB)
  283. fffff805`6aff0000 fffff805`6b024000 nvhda64v nvhda64v.sys Thu Sep 29 09:25:06 2016 (57ED1632)
  284. fffff805`6b030000 fffff805`6b0b7000 UsbHub3 UsbHub3.sys Fri Jul 15 22:18:54 2016 (5789998E)
  285. fffff805`6b0c0000 fffff805`6b1d2000 HTTP HTTP.sys Fri Oct 14 23:41:03 2016 (5801A54F)
  286. fffff805`6b1e0000 fffff805`6b1f1000 vwifimp vwifimp.sys Fri Jul 15 22:27:44 2016 (57899BA0)
  287. fffff805`6b200000 fffff805`6b244000 srvnet srvnet.sys Wed Sep 7 00:45:09 2016 (57CF9B55)
  288. fffff805`6b250000 fffff805`6b29d000 mrxsmb10 mrxsmb10.sys Fri Nov 11 04:15:06 2016 (58258C1A)
  289. fffff805`6b2a0000 fffff805`6b2c6000 Ndu Ndu.sys Fri Jul 15 22:26:12 2016 (57899B44)
  290. fffff805`6b2d0000 fffff805`6b2d7280 rzpmgrk rzpmgrk.sys Thu Sep 17 14:42:44 2015 (55FB09A4)
  291. fffff805`6b2e0000 fffff805`6b2fe080 rzpnk rzpnk.sys Wed Sep 16 20:16:35 2015 (55FA0663)
  292. fffff805`6b300000 fffff805`6b314000 tcpipreg tcpipreg.sys Fri Jul 15 22:25:32 2016 (57899B1C)
  293. fffff805`6b320000 fffff805`6b34f000 tunnel tunnel.sys Fri Jul 15 22:26:20 2016 (57899B4C)
  294. fffff805`6b360000 fffff805`6c139000 nvlddmkm nvlddmkm.sys Sun Dec 11 13:13:24 2016 (584D9744)
  295. fffff805`6c140000 fffff805`6c15b000 HDAudBus HDAudBus.sys Fri Jul 15 22:27:11 2016 (57899B7F)
  296. fffff805`6c160000 fffff805`6c1c1000 portcls portcls.sys Fri Jul 15 22:25:10 2016 (57899B06)
  297. fffff805`6c1d0000 fffff805`6c1f1000 drmk drmk.sys Fri Jul 15 22:27:13 2016 (57899B81)
  298. fffff805`6c200000 fffff805`6c22b000 intelppm intelppm.sys Fri Jul 15 22:10:43 2016 (578997A3)
  299. fffff805`6c230000 fffff805`6c23b000 acpipagr acpipagr.sys Fri Jul 15 22:29:00 2016 (57899BEC)
  300. fffff805`6c240000 fffff805`6c24d000 nvvad64v nvvad64v.sys Tue Oct 4 03:20:09 2016 (57F35829)
  301. fffff805`6c250000 fffff805`6c25e000 ksthunk ksthunk.sys Fri Jul 15 22:28:56 2016 (57899BE8)
  302. fffff805`6c260000 fffff805`6c26d000 NdisVirtualBus NdisVirtualBus.sys Fri Jul 15 22:26:32 2016 (57899B58)
  303. fffff805`6c270000 fffff805`6c27c000 swenum swenum.sys Fri Jul 15 22:28:55 2016 (57899BE7)
  304. fffff805`6c280000 fffff805`6cfad000 bcmwl63a bcmwl63a.sys Sat Sep 19 03:42:15 2015 (55FD11D7)
  305. fffff805`6cfb0000 fffff805`6cfbe000 vwifibus vwifibus.sys Fri Jul 15 22:27:29 2016 (57899B91)
  306. fffff805`6cfc0000 fffff805`6cfdb000 serial serial.sys Fri Jul 15 22:28:29 2016 (57899BCD)
  307. fffff805`6cfe0000 fffff805`6cfef000 serenum serenum.sys Fri Jul 15 22:29:05 2016 (57899BF1)
  308. fffff805`6cff0000 fffff805`6cffc000 wmiacpi wmiacpi.sys Fri Jul 15 22:18:19 2016 (5789996B)
  309. fffff805`6d000000 fffff805`6d026000 luafv luafv.sys Fri Jul 15 22:21:48 2016 (57899A3C)
  310. fffff805`6d030000 fffff805`6d044000 mmcss mmcss.sys Fri Jul 15 22:20:45 2016 (578999FD)
  311. fffff805`6d050000 fffff805`6d069000 storqosflt storqosflt.sys Fri Jul 15 22:26:43 2016 (57899B63)
  312. fffff805`6d070000 fffff805`6d0f3000 trufos trufos.sys Wed Jun 15 05:43:22 2016 (5761233A)
  313. fffff805`6d100000 fffff805`6d118000 usbser usbser.sys Fri Jul 15 22:28:49 2016 (57899BE1)
  314. fffff805`6d120000 fffff805`6d136000 wcnfs wcnfs.sys Fri Jul 15 22:28:27 2016 (57899BCB)
  315. fffff805`6d140000 fffff805`6d150000 monitor monitor.sys Fri Jul 15 22:28:26 2016 (57899BCA)
  316. fffff805`6d150000 fffff805`6d168000 registry registry.sys Fri Jul 15 22:27:04 2016 (57899B78)
  317. fffff805`6d170000 fffff805`6d17e000 rzmpos rzmpos.sys Tue Apr 5 03:09:23 2016 (570364A3)
  318. fffff805`6d180000 fffff805`6d1bb000 mrxsmb20 mrxsmb20.sys Fri Nov 11 04:15:06 2016 (58258C1A)
  319. fffff805`6d1c0000 fffff805`6d1d2000 condrv condrv.sys Fri Jul 15 22:10:38 2016 (5789979E)
  320. fffff805`6d1e0000 fffff805`6d1fe000 WudfPf WudfPf.sys Fri Jul 15 22:26:10 2016 (57899B42)
  321. fffff805`6d210000 fffff805`6d21f000 dump_diskdump dump_diskdump.sys Fri Jul 15 22:21:57 2016 (57899A45)
  322. fffff805`6d250000 fffff805`6d274000 dump_storahci dump_storahci.sys Thu Sep 15 12:24:36 2016 (57DACB44)
  323. fffff805`6d2a0000 fffff805`6d2bd000 dump_dumpfve dump_dumpfve.sys Fri Jul 15 22:27:46 2016 (57899BA2)
  324. fffff805`6d2c0000 fffff805`6d2fc000 WUDFRd WUDFRd.sys Fri Jul 15 22:25:31 2016 (57899B1B)
  325. fffff805`6d300000 fffff805`6d30e000 WpdUpFltr WpdUpFltr.sys Fri Jul 15 22:27:41 2016 (57899B9D)
  326. fffff805`6d310000 fffff805`6d328000 mslldp mslldp.sys Fri Jul 15 22:28:24 2016 (57899BC8)
  327. fffff805`6d330000 fffff805`6d34a000 rspndr rspndr.sys Fri Jul 15 22:27:29 2016 (57899B91)
  328. fffff805`6d350000 fffff805`6d366000 lltdio lltdio.sys Fri Jul 15 22:27:11 2016 (57899B7F)
  329. fffff805`6d370000 fffff805`6d38b000 wanarp wanarp.sys Fri Jul 15 22:28:56 2016 (57899BE8)
  330. fffff805`6d390000 fffff805`6d3a6000 ndisuio ndisuio.sys Fri Jul 15 22:26:32 2016 (57899B58)
  331. fffff805`6d3b0000 fffff805`6d439000 nwifi nwifi.sys Fri Jul 15 22:25:03 2016 (57899AFF)
  332. fffff805`6d440000 fffff805`6d462000 bowser bowser.sys Wed Nov 2 06:23:23 2016 (5819BE9B)
  333. fffff805`6d470000 fffff805`6d489000 mpsdrv mpsdrv.sys Fri Jul 15 22:27:16 2016 (57899B84)
  334. fffff805`6d490000 fffff805`6d505000 mrxsmb mrxsmb.sys Wed Sep 7 00:48:56 2016 (57CF9C38)
  335. fffff805`6d510000 fffff805`6d54f000 usbvideo usbvideo.sys Fri Aug 5 23:44:20 2016 (57A55D14)
  336. fffff805`6d550000 fffff805`6d60de00 L6UX164 L6UX164.sys Fri Aug 21 13:13:56 2015 (55D75C54)
  337. fffff805`6d610000 fffff805`6d62b000 STREAM STREAM.SYS Fri Jul 15 22:19:00 2016 (57899994)
  338. fffff805`6d630000 fffff805`6d656000 usbaudio usbaudio.sys Fri Jul 15 22:26:48 2016 (57899B68)
  339. fffff805`6d660000 fffff805`6d707000 dxgmms2 dxgmms2.sys Fri Dec 9 04:39:05 2016 (584A7BB9)
  340. fffff805`6d710000 fffff805`6d730000 wcifs wcifs.sys Thu Sep 15 12:42:03 2016 (57DACF5B)
  341. fffff805`6d730000 fffff805`6dc86000 RTKVHD64 RTKVHD64.sys Tue Oct 18 07:20:52 2016 (58060594)
  342. fffff805`6dc90000 fffff805`6dc9e000 MBfilt64 MBfilt64.sys Thu Jul 30 23:40:32 2009 (4A7267B0)
  343. fffff805`6dca0000 fffff805`6dcc4000 USBSTOR USBSTOR.SYS Fri Jul 15 22:18:41 2016 (57899981)
  344. fffff805`6dcd0000 fffff805`6dd00000 usbccgp usbccgp.sys Fri Jul 15 22:28:03 2016 (57899BB3)
  345. fffff805`6dd00000 fffff805`6dd11000 hidusb hidusb.sys Fri Aug 5 23:47:49 2016 (57A55DE5)
  346. fffff805`6dd20000 fffff805`6dd2f000 rzendpt rzendpt.sys Tue Apr 5 03:09:18 2016 (5703649E)
  347. fffff805`6dd30000 fffff805`6dd40000 kbdhid kbdhid.sys Thu Sep 15 12:43:23 2016 (57DACFAB)
  348. fffff805`6dd40000 fffff805`6dd53000 kbdclass kbdclass.sys Fri Jul 15 22:26:27 2016 (57899B53)
  349. fffff805`6dd60000 fffff805`6dd94000 rzudd rzudd.sys Tue Apr 5 03:09:21 2016 (570364A1)
  350. fffff805`6dda0000 fffff805`6ddaf000 mouhid mouhid.sys Fri Jul 15 22:27:35 2016 (57899B97)
  351. fffff805`6ddb0000 fffff805`6ddc2000 mouclass mouclass.sys Fri Jul 15 22:26:40 2016 (57899B60)
  352. fffff805`6ddd0000 fffff805`6ddec000 btwsecfl btwsecfl.sys Wed Sep 12 20:37:48 2012 (50512ADC)
  353. fffff805`6ddf0000 fffff805`6ddfe380 btwusb btwusb.sys Wed Jun 22 16:26:55 2016 (576AF48F)
  354. Unloaded modules:
  355. fffff805`6b1e0000 fffff805`6b1f1000 vwifimp.sys
  356. Timestamp: unavailable (00000000)
  357. Checksum: 00000000
  358. ImageSize: 00011000
  359. fffff805`6b350000 fffff805`6b35f000 MSKSSRV.sys
  360. Timestamp: unavailable (00000000)
  361. Checksum: 00000000
  362. ImageSize: 0000F000
  363. fffff805`6d1a0000 fffff805`6d1dc000 WUDFRd.sys
  364. Timestamp: unavailable (00000000)
  365. Checksum: 00000000
  366. ImageSize: 0003C000
  367. fffff805`6d180000 fffff805`6d19c000 EhStorClass.
  368. Timestamp: unavailable (00000000)
  369. Checksum: 00000000
  370. ImageSize: 0001C000
  371. fffff805`68fd0000 fffff805`68fdf000 dump_storpor
  372. Timestamp: unavailable (00000000)
  373. Checksum: 00000000
  374. ImageSize: 0000F000
  375. fffff805`69010000 fffff805`69034000 dump_storahc
  376. Timestamp: unavailable (00000000)
  377. Checksum: 00000000
  378. ImageSize: 00024000
  379. fffff805`69060000 fffff805`6907d000 dump_dumpfve
  380. Timestamp: unavailable (00000000)
  381. Checksum: 00000000
  382. ImageSize: 0001D000
  383. fffff805`68230000 fffff805`6824c000 EhStorClass.
  384. Timestamp: unavailable (00000000)
  385. Checksum: 00000000
  386. ImageSize: 0001C000
  387. fffff805`69730000 fffff805`69744000 dam.sys
  388. Timestamp: unavailable (00000000)
  389. Checksum: 00000000
  390. ImageSize: 00014000
  391. fffff805`67eb0000 fffff805`67eb8000 bdelam.sys
  392. Timestamp: unavailable (00000000)
  393. Checksum: 00000000
  394. ImageSize: 00008000
  395. fffff805`68ee0000 fffff805`68eef000 hwpolicy.sys
  396. Timestamp: unavailable (00000000)
  397. Checksum: 00000000
  398. ImageSize: 0000F000
  399.  
  400. ------------------------------ BIOS INFO -------------------------------
  401. [SMBIOS Data Tables v2.8]
  402. [DMI Version - 0]
  403. [2.0 Calling Convention - No]
  404. [Table Size - 3888 bytes]
  405. [BIOS Information (Type 0) - Length 24 - Handle 0000h]
  406. Vendor American Megatrends Inc.
  407. BIOS Version V1.12
  408. BIOS Starting Address Segment f000
  409. BIOS Release Date 02/16/2016
  410. BIOS ROM Size 800000
  411. BIOS Characteristics
  412. 07: - PCI Supported
  413. 11: - Upgradeable FLASH BIOS
  414. 12: - BIOS Shadowing Supported
  415. 15: - CD-Boot Supported
  416. 16: - Selectable Boot Supported
  417. 17: - BIOS ROM Socketed
  418. 19: - EDD Supported
  419. 23: - 1.2MB Floppy Supported
  420. 24: - 720KB Floppy Supported
  421. 25: - 2.88MB Floppy Supported
  422. 26: - Print Screen Device Supported
  423. 27: - Keyboard Services Supported
  424. 28: - Serial Services Supported
  425. 29: - Printer Services Supported
  426. 32: - BIOS Vendor Reserved
  427. BIOS Characteristic Extensions
  428. 00: - ACPI Supported
  429. 01: - USB Legacy Supported
  430. 08: - BIOS Boot Specification Supported
  431. 10: - Specification Reserved
  432. 11: - Specification Reserved
  433. BIOS Major Revision 4
  434. BIOS Minor Revision 6
  435. EC Firmware Major Revision 255
  436. EC Firmware Minor Revision 255
  437. [System Information (Type 1) - Length 27 - Handle 0001h]
  438. Manufacturer MSI
  439. Product Name MS-7916
  440. Version 1.0
  441. UUID 00000000-0000-0000-0000-000000000000
  442. Wakeup Type Power Switch
  443. SKUNumber To be filled by O.E.M.
  444. Family To be filled by O.E.M.
  445. [BaseBoard Information (Type 2) - Length 15 - Handle 0002h]
  446. Manufacturer MSI
  447. Product Z97 GAMING 7 (MS-7916)
  448. Version 1.0
  449. Asset Tag
  450. Feature Flags 09h
  451. -2092714272: - -2092714224: - §'·ù
  452. Location To be filled by O.E.M.
  453. Chassis Handle 0003h
  454. Board Type 0ah - Processor/Memory Module
  455. Number of Child Handles 0
  456. [System Enclosure (Type 3) - Length 22 - Handle 0003h]
  457. Manufacturer MSI
  458. Chassis Type Desktop
  459. Version 1.0
  460. Asset Tag Number
  461. Bootup State Safe
  462. Power Supply State Safe
  463. Thermal State Safe
  464. Security Status None
  465. OEM Defined 0
  466. Height 0U
  467. Number of Power Cords 1
  468. Number of Contained Elements 0
  469. Contained Element Size 3
  470. [OEM Strings (Type 11) - Length 5 - Handle 0021h]
  471. Number of Strings 1
  472. 1 To Be Filled By O.E.M.
  473. [System Configuration Options (Type 12) - Length 5 - Handle 0022h]
  474. [Processor Information (Type 4) - Length 42 - Handle 003dh]
  475. Socket Designation SOCKET 0
  476. Processor Type Central Processor
  477. Processor Family c6h - Specification Reserved
  478. Processor Manufacturer Intel
  479. Processor ID c3060300fffbebbf
  480. Processor Version Intel(R) Core(TM) i7-4790K CPU @ 4.00GHz
  481. Processor Voltage 8ch - 1.2V
  482. External Clock 100MHz
  483. Max Speed 3800MHz
  484. Current Speed 4000MHz
  485. Status Enabled Populated
  486. Processor Upgrade Specification Reserved
  487. L1 Cache Handle 003eh
  488. L2 Cache Handle 003fh
  489. L3 Cache Handle 0040h
  490. Asset Tag Number
  491. Part Number Fill By OEM
  492. [Cache Information (Type 7) - Length 19 - Handle 003eh]
  493. Socket Designation CPU Internal L1
  494. Cache Configuration 0180h - WB Enabled Int NonSocketed L1
  495. Maximum Cache Size 0100h - 256K
  496. Installed Size 0100h - 256K
  497. Supported SRAM Type 0020h - Synchronous
  498. Current SRAM Type 0020h - Synchronous
  499. Cache Speed 0ns
  500. Error Correction Type ParitySingle-Bit ECC
  501. System Cache Type Other
  502. Associativity 8-way Set-Associative
  503. [Cache Information (Type 7) - Length 19 - Handle 003fh]
  504. Socket Designation CPU Internal L2
  505. Cache Configuration 0181h - WB Enabled Int NonSocketed L2
  506. Maximum Cache Size 0400h - 1024K
  507. Installed Size 0400h - 1024K
  508. Supported SRAM Type 0020h - Synchronous
  509. Current SRAM Type 0020h - Synchronous
  510. Cache Speed 0ns
  511. Error Correction Type Multi-Bit ECC
  512. System Cache Type Unified
  513. Associativity 8-way Set-Associative
  514. [Cache Information (Type 7) - Length 19 - Handle 0040h]
  515. Socket Designation CPU Internal L3
  516. Cache Configuration 0182h - WB Enabled Int NonSocketed L3
  517. Maximum Cache Size 2000h - 8192K
  518. Installed Size 2000h - 8192K
  519. Supported SRAM Type 0020h - Synchronous
  520. Current SRAM Type 0020h - Synchronous
  521. Cache Speed 0ns
  522. Error Correction Type Specification Reserved
  523. System Cache Type Unified
  524. Associativity 16-way Set-Associative
  525. [Physical Memory Array (Type 16) - Length 23 - Handle 0042h]
  526. Location 03h - SystemBoard/Motherboard
  527. Use 03h - System Memory
  528. Memory Error Correction 03h - None
  529. Maximum Capacity 33554432KB
  530. Memory Error Inf Handle [Not Provided]
  531. Number of Memory Devices 4
  532. [Memory Device (Type 17) - Length 40 - Handle 0043h]
  533. Physical Memory Array Handle 0042h
  534. Memory Error Info Handle [Not Provided]
  535. Total Width 64 bits
  536. Data Width 64 bits
  537. Size 4096MB
  538. Form Factor 09h - DIMM
  539. Device Set [None]
  540. Device Locator ChannelA-DIMM0
  541. Bank Locator BANK 0
  542. Memory Type 18h - Specification Reserved
  543. Type Detail 0080h - Synchronous
  544. Speed 1600MHz
  545. Manufacturer 0420
  546. Asset Tag Number
  547. Part Number F3-12800CL9-4GBXL
  548. [Memory Device (Type 17) - Length 40 - Handle 0044h]
  549. Physical Memory Array Handle 0042h
  550. Memory Error Info Handle [Not Provided]
  551. Total Width 64 bits
  552. Data Width 64 bits
  553. Size 4096MB
  554. Form Factor 09h - DIMM
  555. Device Set [None]
  556. Device Locator ChannelA-DIMM1
  557. Bank Locator BANK 1
  558. Memory Type 18h - Specification Reserved
  559. Type Detail 0080h - Synchronous
  560. Speed 1600MHz
  561. Manufacturer 0420
  562. Asset Tag Number
  563. Part Number F3-12800CL9-4GBXL
  564. [Memory Device (Type 17) - Length 40 - Handle 0045h]
  565. Physical Memory Array Handle 0042h
  566. Memory Error Info Handle [Not Provided]
  567. Total Width 64 bits
  568. Data Width 64 bits
  569. Size 4096MB
  570. Form Factor 09h - DIMM
  571. Device Set [None]
  572. Device Locator ChannelB-DIMM0
  573. Bank Locator BANK 2
  574. Memory Type 18h - Specification Reserved
  575. Type Detail 0080h - Synchronous
  576. Speed 1600MHz
  577. Manufacturer 0420
  578. Asset Tag Number
  579. Part Number F3-12800CL9-4GBXL
  580. [Memory Device (Type 17) - Length 40 - Handle 0046h]
  581. Physical Memory Array Handle 0042h
  582. Memory Error Info Handle [Not Provided]
  583. Total Width 64 bits
  584. Data Width 64 bits
  585. Size 4096MB
  586. Form Factor 09h - DIMM
  587. Device Set [None]
  588. Device Locator ChannelB-DIMM1
  589. Bank Locator BANK 3
  590. Memory Type 18h - Specification Reserved
  591. Type Detail 0080h - Synchronous
  592. Speed 1600MHz
  593. Manufacturer 0420
  594. Asset Tag Number
  595. Part Number F3-12800CL9-4GBXL
  596. [Memory Array Mapped Address (Type 19) - Length 31 - Handle 0047h]
  597. Starting Address 00000000h
  598. Ending Address 00ffffffh
  599. Memory Array Handle 0042h
  600. Partition Width 04
  601. [Memory Device Mapped Address (Type 20) - Length 35 - Handle 0048h]
  602. Starting Address 00000000h
  603. Ending Address 003fffffh
  604. Memory Device Handle 0043h
  605. Mem Array Mapped Adr Handle 0047h
  606. Partition Row Position [Unknown]
  607. Interleave Position 01
  608. Interleave Data Depth 02
  609. [Memory Device Mapped Address (Type 20) - Length 35 - Handle 0049h]
  610. Starting Address 00800000h
  611. Ending Address 00bfffffh
  612. Memory Device Handle 0044h
  613. Mem Array Mapped Adr Handle 0047h
  614. Partition Row Position [Unknown]
  615. Interleave Position 01
  616. Interleave Data Depth 02
  617. [Memory Device Mapped Address (Type 20) - Length 35 - Handle 004ah]
  618. Starting Address 00400000h
  619. Ending Address 007fffffh
  620. Memory Device Handle 0045h
  621. Mem Array Mapped Adr Handle 0047h
  622. Partition Row Position [Unknown]
  623. Interleave Position 02
  624. Interleave Data Depth 02
  625. [Memory Device Mapped Address (Type 20) - Length 35 - Handle 004bh]
  626. Starting Address 00c00000h
  627. Ending Address 00ffffffh
  628. Memory Device Handle 0046h
  629. Mem Array Mapped Adr Handle 0047h
  630. Partition Row Position [Unknown]
  631. Interleave Position 02
  632. Interleave Data Depth 02
  633.  
  634. ========================================================================
  635. =================== Dump File: 011017-11109-01.dmp ====================
  636. ========================================================================
  637. Mini Kernel Dump File: Only registers and stack trace are available
  638. Windows 10 Kernel Version 14393 MP (8 procs) Free x64
  639. Product: WinNt, suite: TerminalServer SingleUserTS
  640. Built by: 14393.576.amd64fre.rs1_release_inmarket.161208-2252
  641. Kernel base = 0xfffff800`7468f000 PsLoadedModuleList = 0xfffff800`74994060
  642. Debug session time: Tue Jan 10 15:42:47.218 2017 (UTC - 4:00)
  643. System Uptime: 18 days 20:42:33.605
  644.  
  645. BugCheck 1E, {ffffffffc0000005, fffff800746bf080, 0, ffffffffffffffff}
  646. Probably caused by : memory_corruption
  647. Followup: memory_corruption
  648. 0: kd> !analyze -v
  649.  
  650. KMODE_EXCEPTION_NOT_HANDLED (1e)
  651. This is a very common bugcheck. Usually the exception address pinpoints
  652. the driver/function that caused the problem. Always note this address
  653. as well as the link date of the driver/image that contains this address.
  654.  
  655. Arguments:
  656. Arg1: ffffffffc0000005, The exception code that was not handled
  657. Arg2: fffff800746bf080, The address that the exception occurred at
  658. Arg3: 0000000000000000, Parameter 0 of the exception
  659. Arg4: ffffffffffffffff, Parameter 1 of the exception
  660.  
  661. Debugging Details:
  662. DUMP_CLASS: 1
  663. DUMP_QUALIFIER: 400
  664. BUILD_VERSION_STRING: 10.0.14393.576 (rs1_release_inmarket.161208-2252)
  665. SYSTEM_MANUFACTURER: MSI
  666. SYSTEM_PRODUCT_NAME: MS-7916
  667. SYSTEM_SKU: To be filled by O.E.M.
  668. SYSTEM_VERSION: 1.0
  669. BIOS_VENDOR: American Megatrends Inc.
  670. BIOS_VERSION: V1.12
  671. BIOS_DATE: 02/16/2016
  672. BASEBOARD_MANUFACTURER: MSI
  673. BASEBOARD_PRODUCT: Z97 GAMING 7 (MS-7916)
  674. BASEBOARD_VERSION: 1.0
  675. DUMP_TYPE: 2
  676. READ_ADDRESS: fffff80074a36338: Unable to get MiVisibleState
  677. ffffffffffffffff
  678. EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
  679. FAULTING_IP:
  680. nt!KiIncrementConcurrencyCount+0
  681. fffff800`746bf080 8a01 mov al,byte ptr [rcx]
  682. EXCEPTION_PARAMETER2: ffffffffffffffff
  683. BUGCHECK_STR: 0x1E_c0000005_R
  684. CPU_COUNT: 8
  685. CPU_MHZ: fa0
  686. CPU_VENDOR: GenuineIntel
  687. CPU_FAMILY: 6
  688. CPU_MODEL: 3c
  689. CPU_STEPPING: 3
  690. CPU_MICROCODE: 6,3c,3,0 (F,M,S,R) SIG: 1E'00000000 (cache) 1E'00000000 (init)
  691. CUSTOMER_CRASH_COUNT: 1
  692. DEFAULT_BUCKET_ID: CODE_CORRUPTION
  693.  
  694. PROCESS_NAME: strwinclt.exe
  695.  
  696. CURRENT_IRQL: 2
  697. ANALYSIS_SESSION_HOST: USERNAME-PC
  698. ANALYSIS_SESSION_TIME: 06-06-2017 14:55:47.0900
  699. ANALYSIS_VERSION: 10.0.14321.1024 amd64fre
  700. DPC_STACK_BASE: FFFFF8007649AFB0
  701. LAST_CONTROL_TRANSFER: from fffff80074861572 to fffff800747d96f0
  702. STACK_TEXT:
  703. fffff800`76499aa8 fffff800`74861572 : 00000000`0000001e ffffffff`c0000005 fffff800`746bf080 00000000`00000000 : nt!KeBugCheckEx
  704. fffff800`76499ab0 fffff800`747dfaed : fffff800`749e4000 fffff800`7468f000 0004f530`00820000 fffff800`746c9ee5 : nt!KiFatalExceptionHandler+0x22
  705. fffff800`76499af0 fffff800`747221b1 : fffff800`7649b000 00000000`00000000 fffff800`76495000 ffffdd8e`de5f21b0 : nt!RtlpExecuteHandlerForException+0xd
  706. fffff800`76499b20 fffff800`74720f64 : fffff800`7649a250 fffff800`7649a750 fffff800`7649a250 fffff800`7649aa28 : nt!RtlDispatchException+0x421
  707. fffff800`7649a220 fffff800`747e4902 : 00000000`00000000 fffff804`4d07a3a3 fffff800`7649a9a0 00000000`00000000 : nt!KiDispatchException+0x144
  708. fffff800`7649a8f0 fffff800`747e2bbd : 00000000`00000004 00000000`00000000 00000004`00fe86fa fffff804`5043a489 : nt!KiExceptionDispatch+0xc2
  709. fffff800`7649aad0 fffff800`746bf080 : fffff800`746f2cc5 00000000`00000000 00000000`000000ff fffff800`749d0000 : nt!KiGeneralProtectionFault+0xfd
  710. fffff800`7649ac68 fffff800`746f2cc5 : 00000000`00000000 00000000`000000ff fffff800`749d0000 ffffdd8e`00000000 : nt!KiIncrementConcurrencyCount
  711. fffff800`7649ac70 fffff800`746f234f : ffffdd8e`e5136180 00000000`00000000 00000000`00000000 fffff800`00000002 : nt!KiTimerWaitTest+0x2e5
  712. fffff800`7649ad30 fffff800`747de7a5 : 00000000`00000000 fffff800`749d1180 fffff800`746683e0 ffffae39`c7589dd0 : nt!KiRetireDpcList+0x2af
  713. fffff800`7649afb0 fffff800`747de5b0 : ffffdd8e`e41beb60 00000000`00000000 ffffdd8e`db4f2d40 00000000`00000000 : nt!KxRetireDpcList+0x5
  714. ffffb180`ea8622c0 fffff800`747dd005 : 00000000`fffffffe fffff800`747db231 00000000`0058f9b2 ffffb180`ea8623b0 : nt!KiDispatchInterruptContinue
  715. ffffb180`ea8622f0 fffff800`747db231 : 00000000`0058f9b2 ffffb180`ea8623b0 ffffae39`c0768e60 00000000`00000000 : nt!KiDpcInterruptBypass+0x25
  716. ffffb180`ea862300 ffffae24`fae9d2e3 : ffffae39`c01e49b0 00000000`00000000 ffffb7ba`4af32a1b 00000000`00000000 : nt!KiInterruptDispatchNoLockNoEtw+0xb1
  717. ffffb180`ea862490 ffffae24`fae8b4c7 : 00000000`00000000 ffffb180`ea862ec0 ffffae39`fffffff7 ffffb180`00000000 : win32kfull!xxxWindowEvent+0x203
  718. ffffb180`ea862550 ffffae24`fae96b39 : ffffae39`c01e49b0 ffffb180`ea862df8 00000000`00000002 00000000`00003dff : win32kfull!xxxScanSysQueue+0x1987
  719. ffffb180`ea862c80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : win32kfull!xxxRealInternalGetMessage+0x629
  720. STACK_COMMAND: kb
  721. CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
  722. fffff800746bf84b - nt!MiProbeAndLockPrepare+73
  723. [ f6:fa ]
  724. fffff800746bf9d4-fffff800746bf9d5 2 bytes - nt!MiInitializeProbePacketVm+b0 (+0x189)
  725. [ fb f6:fd fa ]
  726. fffff800746bf9df - nt!MiInitializeProbePacketVm+bb (+0x0b)
  727. [ fa:a6 ]
  728. fffff800746bfdfc - nt!MiSetPagingOfDriver+40 (+0x41d)
  729. [ f6:fa ]
  730. fffff800746bfe9a - nt!MiSetPagingOfDriver+de (+0x9e)
  731. [ fa:a6 ]
  732. fffff800746bffde - nt!MiDriverPageMustStayResident+26 (+0x144)
  733. [ f6:fa ]
  734. 7 errors : !nt (fffff800746bf84b-fffff800746bffde)
  735. MODULE_NAME: memory_corruption
  736.  
  737. IMAGE_NAME: memory_corruption
  738.  
  739. FOLLOWUP_NAME: memory_corruption
  740. DEBUG_FLR_IMAGE_TIMESTAMP: 0
  741. MEMORY_CORRUPTOR: LARGE
  742. FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
  743. BUCKET_ID: MEMORY_CORRUPTION_LARGE
  744. PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
  745. TARGET_TIME: 2017-01-10T19:42:47.000Z
  746. OSBUILD: 14393
  747. OSSERVICEPACK: 576
  748. SERVICEPACK_NUMBER: 0
  749. OS_REVISION: 0
  750. SUITE_MASK: 272
  751. PRODUCT_TYPE: 1
  752. OSPLATFORM_TYPE: x64
  753. OSNAME: Windows 10
  754. OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
  755. USER_LCID: 0
  756. OSBUILD_TIMESTAMP: 2016-12-09 04:23:02
  757. BUILDDATESTAMP_STR: 161208-2252
  758. BUILDLAB_STR: rs1_release_inmarket
  759. BUILDOSVER_STR: 10.0.14393.576
  760. ANALYSIS_SESSION_ELAPSED_TIME: 1965
  761. ANALYSIS_SOURCE: KM
  762. FAILURE_ID_HASH_STRING: km:memory_corruption_large
  763. FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
  764. Followup: memory_corruption
  765.  
  766. ========================================================================
  767. =================== Dump File: 011717-9265-01.dmp ====================
  768. ========================================================================
  769. Mini Kernel Dump File: Only registers and stack trace are available
  770. Windows 10 Kernel Version 14393 MP (8 procs) Free x64
  771. Product: WinNt, suite: TerminalServer SingleUserTS
  772. Built by: 14393.693.amd64fre.rs1_release.161220-1747
  773. Kernel base = 0xfffff802`e7e79000 PsLoadedModuleList = 0xfffff802`e817e060
  774. Debug session time: Tue Jan 17 13:54:38.694 2017 (UTC - 4:00)
  775. System Uptime: 6 days 17:57:28.307
  776.  
  777. BugCheck 139, {3, ffffd00172331c80, ffffd00172331bd8, 0}
  778. *** WARNING: Unable to verify timestamp for win32k.sys
  779. *** ERROR: Module load completed but symbols could not be loaded for win32k.sys
  780. Probably caused by : memory_corruption
  781. Followup: memory_corruption
  782. 3: kd> !analyze -v
  783.  
  784. KERNEL_SECURITY_CHECK_FAILURE (139)
  785. A kernel component has corrupted a critical data structure. The corruption
  786. could potentially allow a malicious user to gain control of this machine.
  787.  
  788. Arguments:
  789. Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
  790. Arg2: ffffd00172331c80, Address of the trap frame for the exception that caused the bugcheck
  791. Arg3: ffffd00172331bd8, Address of the exception record for the exception that caused the bugcheck
  792. Arg4: 0000000000000000, Reserved
  793.  
  794. Debugging Details:
  795. DUMP_CLASS: 1
  796. DUMP_QUALIFIER: 400
  797. BUILD_VERSION_STRING: 10.0.14393.693 (rs1_release.161220-1747)
  798. SYSTEM_MANUFACTURER: MSI
  799. SYSTEM_PRODUCT_NAME: MS-7916
  800. SYSTEM_SKU: To be filled by O.E.M.
  801. SYSTEM_VERSION: 1.0
  802. BIOS_VENDOR: American Megatrends Inc.
  803. BIOS_VERSION: V1.12
  804. BIOS_DATE: 02/16/2016
  805. BASEBOARD_MANUFACTURER: MSI
  806. BASEBOARD_PRODUCT: Z97 GAMING 7 (MS-7916)
  807. BASEBOARD_VERSION: 1.0
  808. DUMP_TYPE: 2
  809. TRAP_FRAME: ffffd00172331c80 -- (.trap 0xffffd00172331c80)
  810. NOTE: The trap frame does not contain all registers.
  811. Some register values may be zeroed or incorrect.
  812. rax=ffff9188203b4278 rbx=0000000000000000 rcx=0000000000000003
  813. rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
  814. rip=fffff802e7fe2b34 rsp=ffffd00172331e10 rbp=0000000000000008
  815. r8=ffffd00172331e30 r9=0000000000000007 r10=0000000000000000
  816. r11=fffff802e7fcf95b r12=0000000000000000 r13=0000000000000000
  817. r14=0000000000000000 r15=0000000000000000
  818. iopl=0 nv up ei ng nz na po cy
  819. nt! ?? ::FNODOBFM::`string'+0xffa4:
  820. fffff802`e7fe2b34 cd29 int 29h
  821. Resetting default scope
  822. EXCEPTION_RECORD: ffffd00172331bd8 -- (.exr 0xffffd00172331bd8)
  823. ExceptionAddress: fffff802e7fe2b34 (nt! ?? ::FNODOBFM::`string'+0x000000000000ffa4)
  824. ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  825. ExceptionFlags: 00000001
  826. NumberParameters: 1
  827. Parameter[0]: 0000000000000003
  828. Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
  829. CPU_COUNT: 8
  830. CPU_MHZ: fa0
  831. CPU_VENDOR: GenuineIntel
  832. CPU_FAMILY: 6
  833. CPU_MODEL: 3c
  834. CPU_STEPPING: 3
  835. CPU_MICROCODE: 6,3c,3,0 (F,M,S,R) SIG: 1E'00000000 (cache) 1E'00000000 (init)
  836. CUSTOMER_CRASH_COUNT: 1
  837. DEFAULT_BUCKET_ID: CODE_CORRUPTION
  838. BUGCHECK_STR: 0x139
  839.  
  840. PROCESS_NAME: svchost.exe
  841.  
  842. CURRENT_IRQL: 2
  843. ERROR_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.
  844. EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.
  845. EXCEPTION_CODE_STR: c0000409
  846. EXCEPTION_PARAMETER1: 0000000000000003
  847. ANALYSIS_SESSION_HOST: USERNAME-PC
  848. ANALYSIS_SESSION_TIME: 06-06-2017 14:59:47.0922
  849. ANALYSIS_VERSION: 10.0.14321.1024 amd64fre
  850. LAST_CONTROL_TRANSFER: from fffff802e7fce829 to fffff802e7fc36f0
  851. STACK_TEXT:
  852. ffffd001`72331958 fffff802`e7fce829 : 00000000`00000139 00000000`00000003 ffffd001`72331c80 ffffd001`72331bd8 : nt!KeBugCheckEx
  853. ffffd001`72331960 fffff802`e7fceb90 : ffffd001`72331be0 fffff802`e7f1e15d ffff9188`149eb011 00000000`00000000 : nt!KiBugCheckDispatch+0x69
  854. ffffd001`72331aa0 fffff802`e7fcdb73 : ffffd001`72331f60 ffffca00`0a3ff3e0 00000000`00000000 ffffcd00`000024b0 : nt!KiFastFailDispatch+0xd0
  855. ffffd001`72331c80 fffff802`e7fe2b34 : 00000000`00000000 00000000`003b9acc 00000000`00000801 ffff9188`26b201b0 : nt!KiRaiseSecurityCheckFailure+0xf3
  856. ffffd001`72331e10 fffff802`e82b331f : ffffffff`00000001 00000000`00000005 ffffba89`91428110 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0xffa4
  857. ffffd001`72331e90 fffff802`e832000b : 00000005`00000003 ffff9188`186f9dd0 00000000`00000002 00000000`0000000f : nt!PspAddSchedulingGroupToJobChain+0xeb
  858. ffffd001`72331ef0 fffff802`e7fce393 : ffff9188`1bd98080 00000000`00000000 ffff9188`19718340 ffff9188`1bd98080 : nt!NtSetInformationJobObject+0x115b
  859. ffffd001`72332b00 00007ffd`bd819144 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
  860. 000000d0`41efc8d8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`bd819144
  861. STACK_COMMAND: kb
  862. CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
  863. fffff802e7f1e1d2 - nt!MiResolvePrivateZeroFault+212
  864. [ f6:b7 ]
  865. fffff802e7f1e1fa-fffff802e7f1e1fc 3 bytes - nt!MiResolvePrivateZeroFault+23a (+0x28)
  866. [ 40 fb f6:c0 db b7 ]
  867. fffff802e7f1e218-fffff802e7f1e219 2 bytes - nt!MiResolvePrivateZeroFault+258 (+0x1e)
  868. [ 80 fa:00 ca ]
  869. fffff802e7f2d511 - nt!MiDeleteValidSystemPage+251 (+0xf2f9)
  870. [ f6:b7 ]
  871. fffff802e7f2d52d-fffff802e7f2d52e 2 bytes - nt!MiDeleteValidSystemPage+26d (+0x1c)
  872. [ 80 fa:00 ca ]
  873. fffff802e7f8704d-fffff802e7f8704e 2 bytes - nt!MiPurgeZeroList+6d (+0x59b20)
  874. [ 80 fa:00 ca ]
  875. fffff802e80c5387-fffff802e80c5389 3 bytes - nt!ExFreePoolWithTag+387
  876. [ 40 fb f6:c0 db b7 ]
  877. 14 errors : !nt (fffff802e7f1e1d2-fffff802e80c5389)
  878. MODULE_NAME: memory_corruption
  879.  
  880. IMAGE_NAME: memory_corruption
  881.  
  882. FOLLOWUP_NAME: memory_corruption
  883. DEBUG_FLR_IMAGE_TIMESTAMP: 0
  884. MEMORY_CORRUPTOR: LARGE
  885. FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
  886. BUCKET_ID: MEMORY_CORRUPTION_LARGE
  887. PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
  888. TARGET_TIME: 2017-01-17T17:54:38.000Z
  889. OSBUILD: 14393
  890. OSSERVICEPACK: 693
  891. SERVICEPACK_NUMBER: 0
  892. OS_REVISION: 0
  893. SUITE_MASK: 272
  894. PRODUCT_TYPE: 1
  895. OSPLATFORM_TYPE: x64
  896. OSNAME: Windows 10
  897. OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
  898. USER_LCID: 0
  899. OSBUILD_TIMESTAMP: 2016-12-21 01:50:57
  900. BUILDDATESTAMP_STR: 161220-1747
  901. BUILDLAB_STR: rs1_release
  902. BUILDOSVER_STR: 10.0.14393.693
  903. ANALYSIS_SESSION_ELAPSED_TIME: 24fc
  904. ANALYSIS_SOURCE: KM
  905. FAILURE_ID_HASH_STRING: km:memory_corruption_large
  906. FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
  907. Followup: memory_corruption
  908.  
  909. ========================================================================
  910. =================== Dump File: 012217-6812-01.dmp ====================
  911. ========================================================================
  912. Mini Kernel Dump File: Only registers and stack trace are available
  913. Windows 10 Kernel Version 14393 MP (8 procs) Free x64
  914. Product: WinNt, suite: TerminalServer SingleUserTS
  915. Built by: 14393.693.amd64fre.rs1_release.161220-1747
  916. Kernel base = 0xfffff803`ed87d000 PsLoadedModuleList = 0xfffff803`edb82060
  917. Debug session time: Sun Jan 22 01:23:16.634 2017 (UTC - 4:00)
  918. System Uptime: 4 days 4:54:50.880
  919.  
  920. BugCheck 1E, {ffffffffc0000005, fffff803ed9cd257, 0, ffffffffffffffff}
  921. *** WARNING: Unable to verify timestamp for win32k.sys
  922. *** ERROR: Module load completed but symbols could not be loaded for win32k.sys
  923. Probably caused by : memory_corruption
  924. Followup: memory_corruption
  925. 1: kd> !analyze -v
  926.  
  927. KMODE_EXCEPTION_NOT_HANDLED (1e)
  928. This is a very common bugcheck. Usually the exception address pinpoints
  929. the driver/function that caused the problem. Always note this address
  930. as well as the link date of the driver/image that contains this address.
  931.  
  932. Arguments:
  933. Arg1: ffffffffc0000005, The exception code that was not handled
  934. Arg2: fffff803ed9cd257, The address that the exception occurred at
  935. Arg3: 0000000000000000, Parameter 0 of the exception
  936. Arg4: ffffffffffffffff, Parameter 1 of the exception
  937.  
  938. Debugging Details:
  939. DUMP_CLASS: 1
  940. DUMP_QUALIFIER: 400
  941. BUILD_VERSION_STRING: 10.0.14393.693 (rs1_release.161220-1747)
  942. SYSTEM_MANUFACTURER: MSI
  943. SYSTEM_PRODUCT_NAME: MS-7916
  944. SYSTEM_SKU: To be filled by O.E.M.
  945. SYSTEM_VERSION: 1.0
  946. BIOS_VENDOR: American Megatrends Inc.
  947. BIOS_VERSION: V1.12
  948. BIOS_DATE: 02/16/2016
  949. BASEBOARD_MANUFACTURER: MSI
  950. BASEBOARD_PRODUCT: Z97 GAMING 7 (MS-7916)
  951. BASEBOARD_VERSION: 1.0
  952. DUMP_TYPE: 2
  953. READ_ADDRESS: fffff803edc24338: Unable to get MiVisibleState
  954. ffffffffffffffff
  955. EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
  956. FAULTING_IP:
  957. nt!ExpInterlockedPopEntrySListFault+0
  958. fffff803`ed9cd257 498b08 mov rcx,qword ptr [r8]
  959. EXCEPTION_PARAMETER2: ffffffffffffffff
  960. BUGCHECK_STR: 0x1E_c0000005_R
  961. CPU_COUNT: 8
  962. CPU_MHZ: fa0
  963. CPU_VENDOR: GenuineIntel
  964. CPU_FAMILY: 6
  965. CPU_MODEL: 3c
  966. CPU_STEPPING: 3
  967. CPU_MICROCODE: 6,3c,3,0 (F,M,S,R) SIG: 1E'00000000 (cache) 1E'00000000 (init)
  968. CUSTOMER_CRASH_COUNT: 1
  969. DEFAULT_BUCKET_ID: CODE_CORRUPTION
  970.  
  971. PROCESS_NAME: WildStar.exe
  972.  
  973. CURRENT_IRQL: 2
  974. ANALYSIS_SESSION_HOST: USERNAME-PC
  975. ANALYSIS_SESSION_TIME: 06-06-2017 15:02:14.0690
  976. ANALYSIS_VERSION: 10.0.14321.1024 amd64fre
  977. LAST_CONTROL_TRANSFER: from fffff803eda0c710 to fffff803ed9c76f0
  978. STACK_TEXT:
  979. ffffe080`9729ca78 fffff803`eda0c710 : 00000000`0000001e ffffffff`c0000005 fffff803`ed9cd257 00000000`00000000 : nt!KeBugCheckEx
  980. ffffe080`9729ca80 fffff803`ed9d2902 : 00000000`ff3fffff 00000000`00000016 00000000`00013676 fffff480`00000000 : nt! ?? ::FNODOBFM::`string'+0x35b80
  981. ffffe080`9729d150 fffff803`ed9d0bbd : ffffffff`ffffffd1 00000000`00000016 00000000`00000002 00000000`00000003 : nt!KiExceptionDispatch+0xc2
  982. ffffe080`9729d330 fffff803`ed9cd257 : 00000000`0000000a fffff803`ed924544 00000000`00000002 fffff803`edba1480 : nt!KiGeneralProtectionFault+0xfd
  983. ffffe080`9729d4c0 fffff803`ed924544 : 00000000`00000002 fffff803`edba1480 00000000`00000002 00000000`00000000 : nt!ExpInterlockedPopEntrySListFault
  984. ffffe080`9729d4d0 fffff803`ed924330 : fffff803`edba1480 7f7f7f7f`0000000a 87878787`00000002 00000000`00000002 : nt!MiGetFreeOrZeroPage+0x64
  985. ffffe080`9729d5a0 fffff803`ed923f26 : fffff803`edba1480 00000000`00000000 00000000`00000000 fffff803`00000000 : nt!MiGetPage+0x80
  986. ffffe080`9729d620 fffff803`ed9220e8 : 00000000`00000011 00000000`00000000 ffffe080`9729d880 fffff803`00000010 : nt!MiGetPageChain+0x156
  987. ffffe080`9729d750 fffff803`ed921a87 : 00000000`00000000 ffffe080`9729d8b1 00000000`00000000 00000000`00000000 : nt!MiResolvePrivateZeroFault+0x128
  988. ffffe080`9729d810 fffff803`ed9255b5 : fffff480`00098b20 00000000`00000002 00000000`c0000016 ffffe080`9729db00 : nt!MiResolveDemandZeroFault+0x1d7
  989. ffffe080`9729d900 fffff803`ed9d0cfc : ffffcc05`69f53400 ffffcc05`5d7d5080 00000000`00000000 ffffcc05`66fc8fe0 : nt!MmAccessFault+0x7c5
  990. ffffe080`9729db00 00000000`50620c10 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x13c
  991. 00000000`11c2fa60 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x50620c10
  992. STACK_COMMAND: kb
  993. CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
  994. fffff803ed923f3a - nt!MiGetPageChain+16a
  995. [ fa:b7 ]
  996. fffff803ed924348 - nt!MiGetPage+98 (+0x40e)
  997. [ fa:b7 ]
  998. fffff803ed92455b - nt!MiGetFreeOrZeroPage+7b (+0x213)
  999. [ fa:b7 ]
  1000. fffff803ed95f7e3-fffff803ed95f7e4 2 bytes - nt!MiPfnShareCountIsZero+193 (+0x3b288)
  1001. [ fb f6:fa f4 ]
  1002. fffff803ed95f807 - nt!MiPfnShareCountIsZero+1b7 (+0x24)
  1003. [ f6:f4 ]
  1004. fffff803ed95f826 - nt!MiPfnShareCountIsZero+1d6 (+0x1f)
  1005. [ a0:20 ]
  1006. fffff803ed98b04e - nt!MiPurgeZeroList+6e (+0x2b828)
  1007. [ fa:b7 ]
  1008. 8 errors : !nt (fffff803ed923f3a-fffff803ed98b04e)
  1009. MODULE_NAME: memory_corruption
  1010.  
  1011. IMAGE_NAME: memory_corruption
  1012.  
  1013. FOLLOWUP_NAME: memory_corruption
  1014. DEBUG_FLR_IMAGE_TIMESTAMP: 0
  1015. MEMORY_CORRUPTOR: LARGE
  1016. FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
  1017. BUCKET_ID: MEMORY_CORRUPTION_LARGE
  1018. PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
  1019. TARGET_TIME: 2017-01-22T05:23:16.000Z
  1020. OSBUILD: 14393
  1021. OSSERVICEPACK: 693
  1022. SERVICEPACK_NUMBER: 0
  1023. OS_REVISION: 0
  1024. SUITE_MASK: 272
  1025. PRODUCT_TYPE: 1
  1026. OSPLATFORM_TYPE: x64
  1027. OSNAME: Windows 10
  1028. OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
  1029. USER_LCID: 0
  1030. OSBUILD_TIMESTAMP: 2016-12-21 01:50:57
  1031. BUILDDATESTAMP_STR: 161220-1747
  1032. BUILDLAB_STR: rs1_release
  1033. BUILDOSVER_STR: 10.0.14393.693
  1034. ANALYSIS_SESSION_ELAPSED_TIME: 2128
  1035. ANALYSIS_SOURCE: KM
  1036. FAILURE_ID_HASH_STRING: km:memory_corruption_large
  1037. FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
  1038. Followup: memory_corruption
  1039.  
  1040. ========================================================================
  1041. =================== Dump File: 012317-5546-01.dmp ====================
  1042. ========================================================================
  1043. Mini Kernel Dump File: Only registers and stack trace are available
  1044. Windows 10 Kernel Version 14393 MP (8 procs) Free x64
  1045. Product: WinNt, suite: TerminalServer SingleUserTS
  1046. Built by: 14393.693.amd64fre.rs1_release.161220-1747
  1047. Kernel base = 0xfffff803`26093000 PsLoadedModuleList = 0xfffff803`26398060
  1048. Debug session time: Mon Jan 23 13:19:35.566 2017 (UTC - 4:00)
  1049. System Uptime: 1 days 2:22:27.006
  1050.  
  1051. BugCheck A, {ffffb80823ae8fff, 2, 0, fffff803261e29c8}
  1052. Probably caused by : memory_corruption
  1053. Followup: memory_corruption
  1054. 2: kd> !analyze -v
  1055.  
  1056. IRQL_NOT_LESS_OR_EQUAL (a)
  1057. An attempt was made to access a pageable (or completely invalid) address at an
  1058. interrupt request level (IRQL) that is too high. This is usually
  1059. caused by drivers using improper addresses.
  1060. If a kernel debugger is available get the stack backtrace.
  1061.  
  1062. Arguments:
  1063. Arg1: ffffb80823ae8fff, memory referenced
  1064. Arg2: 0000000000000002, IRQL
  1065. Arg3: 0000000000000000, bitfield :
  1066. bit 0 : value 0 = read operation, 1 = write operation
  1067. bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
  1068. Arg4: fffff803261e29c8, address which referenced memory
  1069.  
  1070. Debugging Details:
  1071. DUMP_CLASS: 1
  1072. DUMP_QUALIFIER: 400
  1073. BUILD_VERSION_STRING: 10.0.14393.693 (rs1_release.161220-1747)
  1074. SYSTEM_MANUFACTURER: MSI
  1075. SYSTEM_PRODUCT_NAME: MS-7916
  1076. SYSTEM_SKU: To be filled by O.E.M.
  1077. SYSTEM_VERSION: 1.0
  1078. BIOS_VENDOR: American Megatrends Inc.
  1079. BIOS_VERSION: V1.12
  1080. BIOS_DATE: 02/16/2016
  1081. BASEBOARD_MANUFACTURER: MSI
  1082. BASEBOARD_PRODUCT: Z97 GAMING 7 (MS-7916)
  1083. BASEBOARD_VERSION: 1.0
  1084. DUMP_TYPE: 2
  1085. READ_ADDRESS: fffff8032643a338: Unable to get MiVisibleState
  1086. ffffb80823ae8fff
  1087. CURRENT_IRQL: 2
  1088. FAULTING_IP:
  1089. nt!SwapContext+208
  1090. fffff803`261e29c8 0fae29 xrstor [rcx]
  1091. CPU_COUNT: 8
  1092. CPU_MHZ: fa0
  1093. CPU_VENDOR: GenuineIntel
  1094. CPU_FAMILY: 6
  1095. CPU_MODEL: 3c
  1096. CPU_STEPPING: 3
  1097. CPU_MICROCODE: 6,3c,3,0 (F,M,S,R) SIG: 1E'00000000 (cache) 1E'00000000 (init)
  1098. CUSTOMER_CRASH_COUNT: 1
  1099. DEFAULT_BUCKET_ID: CODE_CORRUPTION
  1100. BUGCHECK_STR: AV
  1101.  
  1102. PROCESS_NAME: svchost.exe
  1103.  
  1104. ANALYSIS_SESSION_HOST: USERNAME-PC
  1105. ANALYSIS_SESSION_TIME: 06-06-2017 15:05:21.0401
  1106. ANALYSIS_VERSION: 10.0.14321.1024 amd64fre
  1107. TRAP_FRAME: ffffb80023ae8310 -- (.trap 0xffffb80023ae8310)
  1108. NOTE: The trap frame does not contain all registers.
  1109. Some register values may be zeroed or incorrect.
  1110. rax=0000000000000005 rbx=0000000000000000 rcx=ffffb80823ae8cc0
  1111. rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
  1112. rip=fffff803261e29c8 rsp=ffffb80023ae84a0 rbp=00000025bd9bbfff
  1113. r8=0000000000000000 r9=0000000000000004 r10=0000000000000000
  1114. r11=fffff803261e994f r12=0000000000000000 r13=0000000000000000
  1115. r14=0000000000000000 r15=0000000000000000
  1116. iopl=0 nv up ei pl zr na po cy
  1117. nt!SwapContext+0x208:
  1118. fffff803`261e29c8 0fae29 xrstor [rcx]
  1119. Resetting default scope
  1120. LAST_CONTROL_TRANSFER: from fffff803261e8829 to fffff803261dd6f0
  1121. STACK_TEXT:
  1122. ffffb800`23ae81c8 fffff803`261e8829 : 00000000`0000000a ffffb808`23ae8fff 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
  1123. ffffb800`23ae81d0 fffff803`261e6e07 : ffffb800`23ae8440 ffffca0f`70450000 00000000`00004dd0 ffffca0f`68597f78 : nt!KiBugCheckDispatch+0x69
  1124. ffffb800`23ae8310 fffff803`261e29c8 : ffffa251`28944018 ffffbd9d`5383baa7 ffffca0f`6c2e93e0 fffff803`2616dbcd : nt!KiPageFault+0x247
  1125. ffffb800`23ae84a0 fffff803`261e2506 : 00000000`00000000 fffff803`261824f5 00000000`00000001 fffff803`26151fa0 : nt!SwapContext+0x208
  1126. ffffb800`23ae84e0 fffff803`260f8f5c : ffffca0f`00000000 00000000`00000001 ffffca0f`6c2e94c0 ffffb800`23ae88b0 : nt!KiSwapContext+0x76
  1127. ffffb800`23ae8620 fffff803`260f89ff : ffffbd9d`5383bb47 ffffb800`23ae86d0 00000000`00000000 fffff803`262df34b : nt!KiSwapThread+0x17c
  1128. ffffb800`23ae86d0 fffff803`260fa7c7 : 00000000`00000000 ffffffff`00000000 ffffffff`ffffffef 00000000`00000000 : nt!KiCommitThreadWait+0x14f
  1129. ffffb800`23ae8770 fffff803`260c0d06 : ffffca0f`6c0996c0 fffff803`00000010 ffffdb8c`a2147c00 00000000`00000000 : nt!KeWaitForSingleObject+0x377
  1130. ffffb800`23ae8820 fffff803`26571fdd : ffffffff`ffffffff ffffca0f`6c096c60 ffffca0f`6c096b00 ffffca0f`6c096b00 : nt!AlpcpWaitForSingleObject+0x3e
  1131. ffffb800`23ae8860 fffff803`2656fd5d : ffffca0f`6c099080 00000000`00004a01 00000000`00000000 ffffb800`23ae8930 : nt!AlpcpReceiveMessagePort+0x44d
  1132. ffffb800`23ae88f0 fffff803`2656f903 : 00000000`00010001 00000000`00000000 00000071`0fdff798 00000185`6ac08470 : nt!AlpcpReceiveMessage+0x2fd
  1133. ffffb800`23ae89d0 fffff803`261e8393 : ffffb800`23ae8aa8 ffffca0f`6c099080 ffffb800`23ae8b80 00000071`0fdff6e8 : nt!NtAlpcSendWaitReceivePort+0x103
  1134. ffffb800`23ae8a90 00007ffc`bb0571c4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
  1135. 00000071`0fdff6c8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`bb0571c4
  1136. STACK_COMMAND: kb
  1137. CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
  1138. fffff8032616dc42-fffff8032616dc44 3 bytes - nt!MI_IS_PHYSICAL_ADDRESS+22
  1139. [ 40 fb f6:00 51 a2 ]
  1140. fffff8032616dc50-fffff8032616dc51 2 bytes - nt!MI_IS_PHYSICAL_ADDRESS+30 (+0x0e)
  1141. [ 80 f6:00 a2 ]
  1142. 5 errors : !nt (fffff8032616dc42-fffff8032616dc51)
  1143. MODULE_NAME: memory_corruption
  1144.  
  1145. IMAGE_NAME: memory_corruption
  1146.  
  1147. FOLLOWUP_NAME: memory_corruption
  1148. DEBUG_FLR_IMAGE_TIMESTAMP: 0
  1149. MEMORY_CORRUPTOR: LARGE
  1150. FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
  1151. BUCKET_ID: MEMORY_CORRUPTION_LARGE
  1152. PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
  1153. TARGET_TIME: 2017-01-23T17:19:35.000Z
  1154. OSBUILD: 14393
  1155. OSSERVICEPACK: 693
  1156. SERVICEPACK_NUMBER: 0
  1157. OS_REVISION: 0
  1158. SUITE_MASK: 272
  1159. PRODUCT_TYPE: 1
  1160. OSPLATFORM_TYPE: x64
  1161. OSNAME: Windows 10
  1162. OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
  1163. USER_LCID: 0
  1164. OSBUILD_TIMESTAMP: 2016-12-21 01:50:57
  1165. BUILDDATESTAMP_STR: 161220-1747
  1166. BUILDLAB_STR: rs1_release
  1167. BUILDOSVER_STR: 10.0.14393.693
  1168. ANALYSIS_SESSION_ELAPSED_TIME: 1999
  1169. ANALYSIS_SOURCE: KM
  1170. FAILURE_ID_HASH_STRING: km:memory_corruption_large
  1171. FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
  1172. Followup: memory_corruption
  1173.  
  1174. ========================================================================
  1175. =================== Dump File: 012417-6781-01.dmp ====================
  1176. ========================================================================
  1177. Mini Kernel Dump File: Only registers and stack trace are available
  1178. Windows 10 Kernel Version 14393 MP (8 procs) Free x64
  1179. Product: WinNt, suite: TerminalServer SingleUserTS
  1180. Built by: 14393.693.amd64fre.rs1_release.161220-1747
  1181. Kernel base = 0xfffff803`b7a79000 PsLoadedModuleList = 0xfffff803`b7d7e060
  1182. Debug session time: Tue Jan 24 20:45:27.942 2017 (UTC - 4:00)
  1183. System Uptime: 1 days 7:24:47.581
  1184.  
  1185. BugCheck 109, {a39fca5a41089891, b3b6d6e0938a7943, ffff8b01a1371080, 5}
  1186. Probably caused by : Unknown_Image ( ANALYSIS_INCONCLUSIVE )
  1187. Followup: MachineOwner
  1188. 4: kd> !analyze -v
  1189.  
  1190. CRITICAL_STRUCTURE_CORRUPTION (109)
  1191. This bugcheck is generated when the kernel detects that critical kernel code or
  1192. data have been corrupted. There are generally three causes for a corruption:
  1193. 1) A driver has inadvertently or deliberately modified critical kernel code
  1194. or data. See http://www.microsoft.com/whdc/driver/kernel/64bitPatching.mspx
  1195. 2) A developer attempted to set a normal kernel breakpoint using a kernel
  1196. debugger that was not attached when the system was booted. Normal breakpoints,
  1197. "bp", can only be set if the debugger is attached at boot time. Hardware
  1198. breakpoints, "ba", can be set at any time.
  1199. 3) A hardware corruption occurred, e.g. failing RAM holding kernel code or data.
  1200.  
  1201. Arguments:
  1202. Arg1: a39fca5a41089891, Reserved
  1203. Arg2: b3b6d6e0938a7943, Reserved
  1204. Arg3: ffff8b01a1371080, Failure type dependent information
  1205. Arg4: 0000000000000005, Type of corrupted region, can be
  1206. 0 : A generic data region
  1207. 1 : Modification of a function or .pdata
  1208. 2 : A processor IDT
  1209. 3 : A processor GDT
  1210. 4 : Type 1 process list corruption
  1211. 5 : Type 2 process list corruption
  1212. 6 : Debug routine modification
  1213. 7 : Critical MSR modification
  1214. 8 : Object type
  1215. 9 : A processor IVT
  1216. a : Modification of a system service function
  1217. b : A generic session data region
  1218. c : Modification of a session function or .pdata
  1219. d : Modification of an import table
  1220. e : Modification of a session import table
  1221. f : Ps Win32 callout modification
  1222. 10 : Debug switch routine modification
  1223. 11 : IRP allocator modification
  1224. 12 : Driver call dispatcher modification
  1225. 13 : IRP completion dispatcher modification
  1226. 14 : IRP deallocator modification
  1227. 15 : A processor control register
  1228. 16 : Critical floating point control register modification
  1229. 17 : Local APIC modification
  1230. 18 : Kernel notification callout modification
  1231. 19 : Loaded module list modification
  1232. 1a : Type 3 process list corruption
  1233. 1b : Type 4 process list corruption
  1234. 1c : Driver object corruption
  1235. 1d : Executive callback object modification
  1236. 1e : Modification of module padding
  1237. 1f : Modification of a protected process
  1238. 20 : A generic data region
  1239. 21 : A page hash mismatch
  1240. 22 : A session page hash mismatch
  1241. 23 : Load config directory modification
  1242. 24 : Inverted function table modification
  1243. 25 : Session configuration modification
  1244. 26 : An extended processor control register
  1245. 27 : Type 1 pool corruption
  1246. 28 : Type 2 pool corruption
  1247. 29 : Type 3 pool corruption
  1248. 101 : General pool corruption
  1249. 102 : Modification of win32k.sys
  1250.  
  1251. Debugging Details:
  1252. DUMP_CLASS: 1
  1253. DUMP_QUALIFIER: 400
  1254. BUILD_VERSION_STRING: 10.0.14393.693 (rs1_release.161220-1747)
  1255. SYSTEM_MANUFACTURER: MSI
  1256. SYSTEM_PRODUCT_NAME: MS-7916
  1257. SYSTEM_SKU: To be filled by O.E.M.
  1258. SYSTEM_VERSION: 1.0
  1259. BIOS_VENDOR: American Megatrends Inc.
  1260. BIOS_VERSION: V1.12
  1261. BIOS_DATE: 02/16/2016
  1262. BASEBOARD_MANUFACTURER: MSI
  1263. BASEBOARD_PRODUCT: Z97 GAMING 7 (MS-7916)
  1264. BASEBOARD_VERSION: 1.0
  1265. DUMP_TYPE: 2
  1266. CPU_COUNT: 8
  1267. CPU_MHZ: fa0
  1268. CPU_VENDOR: GenuineIntel
  1269. CPU_FAMILY: 6
  1270. CPU_MODEL: 3c
  1271. CPU_STEPPING: 3
  1272. CPU_MICROCODE: 6,3c,3,0 (F,M,S,R) SIG: 1E'00000000 (cache) 1E'00000000 (init)
  1273. CUSTOMER_CRASH_COUNT: 1
  1274. DEFAULT_BUCKET_ID: BAD_STACK_0x109
  1275. BUGCHECK_STR: 0x109
  1276.  
  1277. PROCESS_NAME: csrss.exe
  1278.  
  1279. CURRENT_IRQL: 2
  1280. ANALYSIS_SESSION_HOST: USERNAME-PC
  1281. ANALYSIS_SESSION_TIME: 06-06-2017 15:07:28.0649
  1282. ANALYSIS_VERSION: 10.0.14321.1024 amd64fre
  1283. STACK_TEXT:
  1284. ffffa280`14b1e038 00000000`00000000 : 00000000`00000109 a39fca5a`41089891 b3b6d6e0`938a7943 ffff8b01`a1371080 : nt!KeBugCheckEx
  1285. STACK_COMMAND: kb
  1286. CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
  1287. fffff803b7cc5387-fffff803b7cc5389 3 bytes - nt!ExFreePoolWithTag+387
  1288. [ 40 fb f6:80 4d 9b ]
  1289. 3 errors : !nt (fffff803b7cc5387-fffff803b7cc5389)
  1290. THREAD_SHA1_HASH_MOD_FUNC: 81a83ae0317433a47fcc36991983df3b6e638b71
  1291. THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 6e16edd8c7dd677734fdbcd2397a2e35e9fae964
  1292. THREAD_SHA1_HASH_MOD: 76cd06466d098060a9eb26e5fd2a25cb1f3fe0a3
  1293. SYMBOL_NAME: ANALYSIS_INCONCLUSIVE
  1294. FOLLOWUP_NAME: MachineOwner
  1295. MODULE_NAME: Unknown_Module
  1296.  
  1297. IMAGE_NAME: Unknown_Image
  1298.  
  1299. DEBUG_FLR_IMAGE_TIMESTAMP: 0
  1300. BUCKET_ID: BAD_STACK_0x109
  1301. PRIMARY_PROBLEM_CLASS: BAD_STACK
  1302. FAILURE_BUCKET_ID: BAD_STACK_0x109
  1303. TARGET_TIME: 2017-01-25T00:45:27.000Z
  1304. OSBUILD: 14393
  1305. OSSERVICEPACK: 693
  1306. SERVICEPACK_NUMBER: 0
  1307. OS_REVISION: 0
  1308. SUITE_MASK: 272
  1309. PRODUCT_TYPE: 1
  1310. OSPLATFORM_TYPE: x64
  1311. OSNAME: Windows 10
  1312. OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
  1313. USER_LCID: 0
  1314. OSBUILD_TIMESTAMP: 2016-12-21 01:50:57
  1315. BUILDDATESTAMP_STR: 161220-1747
  1316. BUILDLAB_STR: rs1_release
  1317. BUILDOSVER_STR: 10.0.14393.693
  1318. ANALYSIS_SESSION_ELAPSED_TIME: 1b88
  1319. ANALYSIS_SOURCE: KM
  1320. FAILURE_ID_HASH_STRING: km:bad_stack_0x109
  1321. FAILURE_ID_HASH: {b4d7023a-05c3-49b2-3ea4-6240fe57d90e}
  1322. Followup: MachineOwner
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement