Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Microsoft (R) Windows Debugger Version 10.0.14321.1024 AMD64
- Copyright (c) Microsoft Corporation. All rights reserved.
- ========================================================================
- =================== Dump File: 011017-6046-01.dmp ====================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 14393 MP (8 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS
- Built by: 14393.693.amd64fre.rs1_release.161220-1747
- Kernel base = 0xfffff802`a1c0d000 PsLoadedModuleList = 0xfffff802`a1f12060
- Debug session time: Tue Jan 10 19:54:45.973 2017 (UTC - 4:00)
- System Uptime: 0 days 0:43:52.610
- BugCheck 7F, {8, ffffcc00834c8b30, ffffcc00852e0f80, fffff802a1c9ee57}
- Probably caused by : memory_corruption
- Followup: memory_corruption
- 3: kd> !analyze -v
- UNEXPECTED_KERNEL_MODE_TRAP (7f)
- This means a trap occurred in kernel mode, and it's a trap of a kind
- that the kernel isn't allowed to have/catch (bound trap) or that
- is always instant death (double fault). The first number in the
- bugcheck params is the number of the trap (8 = double fault, etc)
- Consult an Intel x86 family manual to learn more about what these
- traps are. Here is a *portion* of those codes:
- If kv shows a taskGate
- use .tss on the part before the colon, then kv.
- Else if kv shows a trapframe
- use .trap on that value
- Else
- .trap on the appropriate frame will show where the trap was taken
- (on x86, this will be the ebp that goes with the procedure KiTrap)
- Endif
- kb will then show the corrected stack.
- Arguments:
- Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
- Arg2: ffffcc00834c8b30
- Arg3: ffffcc00852e0f80
- Arg4: fffff802a1c9ee57
- Debugging Details:
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 10.0.14393.693 (rs1_release.161220-1747)
- SYSTEM_MANUFACTURER: MSI
- SYSTEM_PRODUCT_NAME: MS-7916
- SYSTEM_SKU: To be filled by O.E.M.
- SYSTEM_VERSION: 1.0
- BIOS_VENDOR: American Megatrends Inc.
- BIOS_VERSION: V1.12
- BIOS_DATE: 02/16/2016
- BASEBOARD_MANUFACTURER: MSI
- BASEBOARD_PRODUCT: Z97 GAMING 7 (MS-7916)
- BASEBOARD_VERSION: 1.0
- DUMP_TYPE: 2
- BUGCHECK_STR: 0x7f_8
- TRAP_FRAME: ffffcc00834c8b30 -- (.trap 0xffffcc00834c8b30)
- NOTE: The trap frame does not contain all registers.
- Some register values may be zeroed or incorrect.
- rax=ffffb919f01ccde8 rbx=0000000000000000 rcx=ffffcc00852e1288
- rdx=ffffcc00852e1150 rsi=0000000000000000 rdi=0000000000000000
- rip=fffff802a1c9ee57 rsp=ffffcc00852e0f80 rbp=ffffcc00852e0fb0
- r8=ffffcc00852e1330 r9=0000000000000000 r10=0000000000000000
- r11=00007ffffffeffff r12=0000000000000000 r13=0000000000000000
- r14=0000000000000000 r15=0000000000000000
- iopl=0 nv up ei ng nz na po nc
- nt!KiDispatchException+0x37:
- fffff802`a1c9ee57 48894d40 mov qword ptr [rbp+40h],rcx ss:0018:ffffcc00`852e0ff0=????????????????
- Resetting default scope
- CPU_COUNT: 8
- CPU_MHZ: fa0
- CPU_VENDOR: GenuineIntel
- CPU_FAMILY: 6
- CPU_MODEL: 3c
- CPU_STEPPING: 3
- CPU_MICROCODE: 6,3c,3,0 (F,M,S,R) SIG: 1E'00000000 (cache) 1E'00000000 (init)
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: CODE_CORRUPTION
- PROCESS_NAME: dwm.exe
- CURRENT_IRQL: 0
- ANALYSIS_SESSION_HOST: USERNAME-PC
- ANALYSIS_SESSION_TIME: 06-06-2017 14:52:08.0042
- ANALYSIS_VERSION: 10.0.14321.1024 amd64fre
- EXCEPTION_RECORD: 01246d418a0d79c0 -- (.exr 0x1246d418a0d79c0)
- Cannot read Exception record @ 01246d418a0d79c0
- LAST_CONTROL_TRANSFER: from fffff802a1d62829 to fffff802a1d576f0
- STACK_OVERFLOW: Stack Limit: ffffcc00852e1000. Use (kF) and (!stackusage) to investigate stack usage.
- STACKUSAGE_FUNCTION: The function at address 0xFFFFF802A1CA010C was blamed for the stack overflow. It is using 8960 bytes of stack total in 5 instances (likely recursion).
- FOLLOWUP_IP:
- nt!RtlDispatchException+37c
- fffff802`a1ca010c 488b02 mov rax,qword ptr [rdx]
- STACK_TEXT:
- ffffcc00`852e0f80 fffff802`a1d62902 : 01246d41`8a0d79c0 c302c083`c01bd8f6 ccccc300`000003b8 01f98311`7401e983 : nt!KiDispatchException+0x37
- ffffcc00`852e1150 fffff802`a1d60bbd : 204d8d4c`084e8b48 e8d68b49`28458d4c 287d8b48`0000be58 4d8b44aa`74ff8548 : nt!KiExceptionDispatch+0xc2
- ffffcc00`852e1330 fffff802`a1ca010c : ffffcc00`852e7000 00000000`00000000 ffffcc00`852e1000 cb8b48d6`8b48ffff : nt!KiGeneralProtectionFault+0xfd
- ffffcc00`852e14c0 fffff802`a1c9ef64 : ffffcc00`852e1bf0 ffffcc00`852e20f0 ffffcc00`852e1bf0 ffffcc00`852e23c8 : nt!RtlDispatchException+0x37c
- ffffcc00`852e1bc0 fffff802`a1d62902 : 8b480000`02b8ae8d 00222f35`8d4c0856 8b484024`44894800 89480038`2444c6cd : nt!KiDispatchException+0x144
- ffffcc00`852e2290 fffff802`a1d60bbd : 8b49784e`8d4d0000 08a86842`8a1aeb11 73ff3c28`428b1075 ffc90348`c8b60f09 : nt!KiExceptionDispatch+0xc2
- ffffcc00`852e2470 fffff802`a1ca010c : ffffcc00`852e7000 00000000`00000000 ffffcc00`852e1000 ccccc35c`415e415f : nt!KiGeneralProtectionFault+0xfd
- ffffcc00`852e2600 fffff802`a1c9ef64 : ffffcc00`852e2d30 ffffcc00`852e3230 ffffcc00`852e2d30 ffffcc00`852e3508 : nt!RtlDispatchException+0x37c
- ffffcc00`852e2d00 fffff802`a1d62902 : 57182474`89481024 8b48ff33`20ec8348 00000810`b93948d9 000808c1`81480f74 : nt!KiDispatchException+0x144
- ffffcc00`852e33d0 fffff802`a1d60bbd : 00b8828b`486b7400 0a731010`78830000 0096e9c0`000004bf 8d4c0849`8b480000 : nt!KiExceptionDispatch+0xc2
- ffffcc00`852e35b0 fffff802`a1ca010c : ffffcc00`852e7000 00000000`00000000 ffffcc00`852e1000 00000080`302444c7 : nt!KiGeneralProtectionFault+0xfd
- ffffcc00`852e3740 fffff802`a1c9ef64 : ffffcc00`852e3e70 ffffcc00`852e4370 ffffcc00`852e3e70 ffffcc00`852e4648 : nt!RtlDispatchException+0x37c
- ffffcc00`852e3e40 fffff802`a1d62902 : fffff802`a1f31480 00000000`00000059 00000000`00000002 00000000`00000002 : nt!KiDispatchException+0x144
- ffffcc00`852e4510 fffff802`a1d60bbd : ffffb480`0120f8a0 fffff802`a1cdd830 00000000`00000000 00000000`0006052e : nt!KiExceptionDispatch+0xc2
- ffffcc00`852e46f0 fffff802`a1ca010c : ffffcc00`852e7000 00000000`00000000 ffffcc00`852e1000 00000000`00008965 : nt!KiGeneralProtectionFault+0xfd
- ffffcc00`852e4880 fffff802`a1c9ef64 : ffffcc00`852e4fb0 ffffcc00`852e54b0 ffffcc00`852e4fb0 ffffcc00`852e5788 : nt!RtlDispatchException+0x37c
- ffffcc00`852e4f80 fffff802`a1d62902 : 00000000`00000000 00000000`00000000 ffffb919`f01c9798 ffff8f0a`8a8ce840 : nt!KiDispatchException+0x144
- ffffcc00`852e5650 fffff802`a1d60bbd : ffffcc00`852e5b10 fffff802`a20e36dc 00000000`00000002 00000000`00000000 : nt!KiExceptionDispatch+0xc2
- ffffcc00`852e5830 fffff802`a1ca010c : ffffcc00`852e7000 00000000`00000000 ffffcc00`852e1000 fffff805`6d16318e : nt!KiGeneralProtectionFault+0xfd
- ffffcc00`852e59c0 fffff802`a1c9ef64 : ffffcc00`852e60f0 ffffcc00`852e65f0 ffffcc00`852e60f0 ffffcc00`852e68c8 : nt!RtlDispatchException+0x37c
- ffffcc00`852e60c0 fffff802`a1d62902 : ffffcc00`852e68c0 ffffbb0f`67ee6ef0 fffff802`a205624c 00007ffe`40a3a190 : nt!KiDispatchException+0x144
- ffffcc00`852e6790 fffff802`a1d60a8e : ffffbb0f`67eeb180 00002000`00018849 00000000`00000000 00000000`00000002 : nt!KiExceptionDispatch+0xc2
- ffffcc00`852e6970 fffff802`a1d6239b : ffffbb0f`67eeb080 0000015d`8d1b1070 80000000`00000000 ffffbb0f`67e9d9c0 : nt!KiStackFault+0x10e
- ffffcc00`852e6b00 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit
- STACK_COMMAND: .trap 0xffffcc00834c8b30 ; kb
- CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
- fffff802a1cb28ba - nt!MiCompletePrivateZeroFault+51a
- [ fa:b4 ]
- fffff802a1cb294f-fffff802a1cb2951 3 bytes - nt!MiCompletePrivateZeroFault+5af (+0x95)
- [ 40 fb f6:80 7a f5 ]
- fffff802a1cb47c3 - nt!MiGetFreeOrZeroPage+2e3 (+0x1e74)
- [ fa:b4 ]
- fffff802a1cb4819 - nt!MiGetFreeOrZeroPage+339 (+0x56)
- [ fa:b4 ]
- 6 errors : !nt (fffff802a1cb28ba-fffff802a1cb4819)
- MODULE_NAME: memory_corruption
- IMAGE_NAME: memory_corruption
- FOLLOWUP_NAME: memory_corruption
- DEBUG_FLR_IMAGE_TIMESTAMP: 0
- MEMORY_CORRUPTOR: LARGE
- FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
- BUCKET_ID: MEMORY_CORRUPTION_LARGE
- PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
- TARGET_TIME: 2017-01-10T23:54:45.000Z
- OSBUILD: 14393
- OSSERVICEPACK: 693
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 272
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2016-12-21 01:50:57
- BUILDDATESTAMP_STR: 161220-1747
- BUILDLAB_STR: rs1_release
- BUILDOSVER_STR: 10.0.14393.693
- ANALYSIS_SESSION_ELAPSED_TIME: 1969
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:memory_corruption_large
- FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
- Followup: memory_corruption
- ------------------ 3: kd> lm t n ------------------
- start end module name
- ffff855a`a4e00000 ffff855a`a5188000 win32kfull win32kfull.sys Tue Dec 13 23:21:25 2016 (5850C8C5)
- ffff855a`a5190000 ffff855a`a5310000 win32kbase win32kbase.sys Tue Dec 13 23:22:35 2016 (5850C90B)
- ffff855a`a5320000 ffff855a`a532a000 TSDDD TSDDD.dll unavailable (00000000)
- ffff855a`a5330000 ffff855a`a5370000 cdd cdd.dll Fri Dec 9 04:42:29 2016 (584A7C85)
- ffff855a`a5b50000 ffff855a`a5b8b000 win32k win32k.sys Tue Dec 13 23:46:37 2016 (5850CEAD)
- fffff802`a0e02000 fffff802`a0e0d000 kd kd.dll Fri Jul 15 22:29:16 2016 (57899BFC)
- fffff802`a1c0d000 fffff802`a242d000 nt ntkrnlmp.exe Wed Dec 21 01:50:57 2016 (585A2651)
- fffff802`a242d000 fffff802`a24a2000 hal hal.dll Thu Sep 15 12:15:22 2016 (57DAC91A)
- fffff805`67a00000 fffff805`67a5d000 msrpc msrpc.sys Fri Jul 15 22:23:06 2016 (57899A8A)
- fffff805`67a60000 fffff805`67a88000 ksecdd ksecdd.sys Wed Sep 7 01:00:34 2016 (57CF9EF2)
- fffff805`67a90000 fffff805`67b40000 clipsp clipsp.sys Wed Sep 7 00:57:27 2016 (57CF9E37)
- fffff805`67b40000 fffff805`67b4d000 cmimcext cmimcext.sys Thu Sep 15 12:15:09 2016 (57DAC90D)
- fffff805`67b50000 fffff805`67b5c000 ntosext ntosext.sys Fri Jul 15 22:10:37 2016 (5789979D)
- fffff805`67b60000 fffff805`67c00000 CI CI.dll Thu Sep 15 12:40:08 2016 (57DACEE8)
- fffff805`67c00000 fffff805`67c9e000 cng cng.sys Wed Dec 21 02:05:04 2016 (585A29A0)
- fffff805`67ca0000 fffff805`67d74000 Wdf01000 Wdf01000.sys Fri Jul 15 22:13:12 2016 (57899838)
- fffff805`67d80000 fffff805`67d93000 WDFLDR WDFLDR.SYS Fri Jul 15 22:10:39 2016 (5789979F)
- fffff805`67da0000 fffff805`67dc3000 acpiex acpiex.sys Fri Jul 15 22:28:23 2016 (57899BC7)
- fffff805`67dd0000 fffff805`67dde000 WppRecorder WppRecorder.sys Fri Jul 15 22:29:12 2016 (57899BF8)
- fffff805`67de0000 fffff805`67e93000 ACPI ACPI.sys Fri Jul 15 22:10:47 2016 (578997A7)
- fffff805`67ea0000 fffff805`67eac000 WMILIB WMILIB.SYS Fri Jul 15 22:10:37 2016 (5789979D)
- fffff805`67ec0000 fffff805`67ed1000 intelpep intelpep.sys Fri Jul 15 22:18:27 2016 (57899973)
- fffff805`67ee0000 fffff805`67eff000 WindowsTrustedRT WindowsTrustedRT.sys Fri Jul 15 22:27:05 2016 (57899B79)
- fffff805`67f00000 fffff805`67f0b000 WindowsTrustedRTProxy WindowsTrustedRTProxy.sys Fri Jul 15 22:27:05 2016 (57899B79)
- fffff805`67f10000 fffff805`67f22000 pcw pcw.sys Fri Jul 15 22:10:37 2016 (5789979D)
- fffff805`67f30000 fffff805`67f3b000 msisadrv msisadrv.sys Fri Jul 15 22:28:51 2016 (57899BE3)
- fffff805`67f40000 fffff805`67f97000 pci pci.sys Tue Dec 13 23:36:59 2016 (5850CC6B)
- fffff805`67fa0000 fffff805`67fb2000 vdrvroot vdrvroot.sys Fri Jul 15 22:25:58 2016 (57899B36)
- fffff805`67fc0000 fffff805`67fe1000 pdc pdc.sys Sat Aug 20 00:51:30 2016 (57B7E1D2)
- fffff805`67ff0000 fffff805`68009000 CEA CEA.sys Fri Jul 15 22:28:38 2016 (57899BD6)
- fffff805`68010000 fffff805`68034000 partmgr partmgr.sys Fri Nov 11 03:59:07 2016 (5825885B)
- fffff805`68040000 fffff805`680cd000 spaceport spaceport.sys Fri Oct 14 23:46:37 2016 (5801A69D)
- fffff805`680d0000 fffff805`680e8000 volmgr volmgr.sys Fri Jul 15 22:10:43 2016 (578997A3)
- fffff805`680f0000 fffff805`6814e000 volmgrx volmgrx.sys Fri Jul 15 22:10:45 2016 (578997A5)
- fffff805`68150000 fffff805`6816e000 mountmgr mountmgr.sys Fri Jul 15 22:10:42 2016 (578997A2)
- fffff805`68170000 fffff805`68194000 storahci storahci.sys Thu Sep 15 12:24:36 2016 (57DACB44)
- fffff805`681a0000 fffff805`68222000 storport storport.sys Fri Oct 14 23:45:16 2016 (5801A64C)
- fffff805`68250000 fffff805`68269000 fileinfo fileinfo.sys Fri Jul 15 22:26:05 2016 (57899B3D)
- fffff805`68270000 fffff805`682a8000 Wof Wof.sys Fri Aug 5 23:45:24 2016 (57A55D54)
- fffff805`682b0000 fffff805`68438000 avc3 avc3.sys Thu Sep 15 08:37:35 2016 (57DA960F)
- fffff805`68440000 fffff805`68477000 gzflt gzflt.sys Fri Oct 28 05:28:18 2016 (58131A32)
- fffff805`68480000 fffff805`686b2000 NTFS NTFS.sys Wed Nov 2 06:15:32 2016 (5819BCC4)
- fffff805`686c0000 fffff805`686cd000 Fs_Rec Fs_Rec.sys Fri Jul 15 22:10:37 2016 (5789979D)
- fffff805`686d0000 fffff805`687f8000 ndis ndis.sys Wed Oct 5 05:19:09 2016 (57F4C58D)
- fffff805`68820000 fffff805`688ae000 mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Fri Jul 15 22:28:05 2016 (57899BB5)
- fffff805`688b0000 fffff805`688c0000 werkernel werkernel.sys Fri Jul 15 22:28:51 2016 (57899BE3)
- fffff805`688c0000 fffff805`68923000 CLFS CLFS.SYS Fri Dec 9 04:18:07 2016 (584A76CF)
- fffff805`68930000 fffff805`68955000 tm tm.sys Wed Oct 5 05:11:00 2016 (57F4C3A4)
- fffff805`68960000 fffff805`68977000 PSHED PSHED.dll Fri Jul 15 22:10:44 2016 (578997A4)
- fffff805`68980000 fffff805`6898c000 BOOTVID BOOTVID.dll Fri Jul 15 22:10:37 2016 (5789979D)
- fffff805`68990000 fffff805`689f2000 FLTMGR FLTMGR.SYS Fri Jul 15 22:10:45 2016 (578997A5)
- fffff805`68a00000 fffff805`68c78000 tcpip tcpip.sys Fri Oct 14 23:32:46 2016 (5801A35E)
- fffff805`68c80000 fffff805`68ce9000 fwpkclnt fwpkclnt.sys Fri Oct 14 23:53:56 2016 (5801A854)
- fffff805`68cf0000 fffff805`68d1a000 wfplwfs wfplwfs.sys Fri Jul 15 22:25:57 2016 (57899B35)
- fffff805`68d20000 fffff805`68dc3000 fvevol fvevol.sys Thu Sep 15 12:36:20 2016 (57DACE04)
- fffff805`68dd0000 fffff805`68ddb000 volume volume.sys Fri Jul 15 22:10:37 2016 (5789979D)
- fffff805`68de0000 fffff805`68e44000 volsnap volsnap.sys Fri Jul 15 22:10:44 2016 (578997A4)
- fffff805`68e50000 fffff805`68e98000 rdyboost rdyboost.sys Fri Jul 15 22:25:16 2016 (57899B0C)
- fffff805`68ea0000 fffff805`68ec5000 mup mup.sys Fri Jul 15 22:11:22 2016 (578997CA)
- fffff805`68ed0000 fffff805`68ee0000 iorate iorate.sys Wed Nov 2 06:12:31 2016 (5819BC0F)
- fffff805`68ef0000 fffff805`68f0e000 disk disk.sys Fri Jul 15 22:10:52 2016 (578997AC)
- fffff805`68f10000 fffff805`68f72000 CLASSPNP CLASSPNP.SYS Wed Sep 7 00:33:32 2016 (57CF989C)
- fffff805`68fa0000 fffff805`68fb9000 crashdmp crashdmp.sys Fri Oct 14 23:46:27 2016 (5801A693)
- fffff805`68fc0000 fffff805`69011000 edrsensor edrsensor.sys Wed Aug 3 09:44:06 2016 (57A1F526)
- fffff805`69020000 fffff805`69032000 qwavedrv qwavedrv.sys Fri Jul 15 22:28:46 2016 (57899BDE)
- fffff805`69080000 fffff805`690b1000 cdrom cdrom.sys Fri Jul 15 22:10:42 2016 (578997A2)
- fffff805`690c0000 fffff805`690dd000 filecrypt filecrypt.sys Fri Jul 15 22:22:39 2016 (57899A6F)
- fffff805`690e0000 fffff805`690ee000 tbs tbs.sys Fri Jul 15 22:27:47 2016 (57899BA3)
- fffff805`690f0000 fffff805`690fa000 Null Null.SYS unavailable (00000000)
- fffff805`69100000 fffff805`6910a000 Beep Beep.SYS Fri Jul 15 22:22:02 2016 (57899A4A)
- fffff805`69110000 fffff805`69124000 BasicDisplay BasicDisplay.sys Fri Jul 15 22:28:02 2016 (57899BB2)
- fffff805`69130000 fffff805`69144000 watchdog watchdog.sys Fri Jul 15 22:27:39 2016 (57899B9B)
- fffff805`69150000 fffff805`6936f000 dxgkrnl dxgkrnl.sys Fri Dec 9 04:21:04 2016 (584A7780)
- fffff805`69370000 fffff805`69382000 BasicRender BasicRender.sys Fri Jul 15 22:28:14 2016 (57899BBE)
- fffff805`69390000 fffff805`693a9000 Npfs Npfs.SYS Fri Jul 15 22:10:38 2016 (5789979E)
- fffff805`693b0000 fffff805`693c0000 Msfs Msfs.SYS Fri Jul 15 22:10:38 2016 (5789979E)
- fffff805`693c0000 fffff805`693e3000 tdx tdx.sys Fri Jul 15 22:27:16 2016 (57899B84)
- fffff805`693f0000 fffff805`69400000 TDI TDI.SYS Fri Jul 15 22:28:10 2016 (57899BBA)
- fffff805`69400000 fffff805`6944b000 netbt netbt.sys Fri Jul 15 22:25:07 2016 (57899B03)
- fffff805`69450000 fffff805`694e5000 afd afd.sys Fri Oct 14 23:53:45 2016 (5801A849)
- fffff805`694f0000 fffff805`69509000 vwififlt vwififlt.sys Fri Jul 15 22:28:07 2016 (57899BB7)
- fffff805`69510000 fffff805`6953b000 pacer pacer.sys Fri Jul 15 22:25:21 2016 (57899B11)
- fffff805`69540000 fffff805`69552000 netbios netbios.sys Fri Jul 15 22:27:18 2016 (57899B86)
- fffff805`69560000 fffff805`695d5000 rdbss rdbss.sys Fri Nov 11 04:08:35 2016 (58258A93)
- fffff805`695e0000 fffff805`6966e000 csc csc.sys Fri Jul 15 22:22:28 2016 (57899A64)
- fffff805`69670000 fffff805`69681000 nsiproxy nsiproxy.sys Fri Jul 15 22:26:45 2016 (57899B65)
- fffff805`69690000 fffff805`6969d000 npsvctrig npsvctrig.sys Fri Jul 15 22:28:33 2016 (57899BD1)
- fffff805`696a0000 fffff805`696b0000 mssmbios mssmbios.sys Fri Jul 15 22:26:00 2016 (57899B38)
- fffff805`696b0000 fffff805`696ba000 gpuenergydrv gpuenergydrv.sys Fri Jul 15 22:28:09 2016 (57899BB9)
- fffff805`696c0000 fffff805`69700000 DuoVMDrv DuoVMDrv.sys Fri Sep 18 03:23:50 2015 (55FBBC06)
- fffff805`69700000 fffff805`6972a000 dfsc dfsc.sys Wed Oct 5 05:34:11 2016 (57F4C913)
- fffff805`69750000 fffff805`69778000 bdfwfpf bdfwfpf.sys Tue Feb 9 07:12:25 2016 (56B9D7A9)
- fffff805`69780000 fffff805`697bf000 ahcache ahcache.sys Fri Oct 14 23:31:36 2016 (5801A318)
- fffff805`697c0000 fffff805`697cd000 tap0901 tap0901.sys Thu Aug 22 08:40:01 2013 (521606A1)
- fffff805`697d0000 fffff805`697e1000 CompositeBus CompositeBus.sys Fri Jul 15 22:20:11 2016 (578999DB)
- fffff805`697f0000 fffff805`697fe000 kdnic kdnic.sys Fri Jul 15 22:28:28 2016 (57899BCC)
- fffff805`69800000 fffff805`69815000 umbus umbus.sys Fri Jul 15 22:22:33 2016 (57899A69)
- fffff805`69820000 fffff805`698e2000 peauth peauth.sys Fri Jul 15 22:24:39 2016 (57899AE7)
- fffff805`698f0000 fffff805`699a4000 srv2 srv2.sys Fri Nov 11 04:14:33 2016 (58258BF9)
- fffff805`699b0000 fffff805`69a29000 NETIO NETIO.SYS Fri Jul 15 22:26:08 2016 (57899B40)
- fffff805`69a30000 fffff805`69a60000 ksecpkg ksecpkg.sys Fri Aug 5 23:44:30 2016 (57A55D1E)
- fffff805`69a60000 fffff805`69aec000 srv srv.sys Wed Sep 7 00:49:09 2016 (57CF9C45)
- fffff805`69af0000 fffff805`69bc6000 avckf avckf.sys Thu Sep 15 08:46:29 2016 (57DA9825)
- fffff805`6ac00000 fffff805`6ac68000 ks ks.sys Fri Jul 15 22:24:18 2016 (57899AD2)
- fffff805`6ac70000 fffff805`6acd3000 USBXHCI USBXHCI.SYS Fri Jul 15 22:20:30 2016 (578999EE)
- fffff805`6ace0000 fffff805`6ad18000 ucx01000 ucx01000.sys Fri Jul 15 22:25:10 2016 (57899B06)
- fffff805`6ad20000 fffff805`6ad50000 TeeDriverW8x64 TeeDriverW8x64.sys Tue Jul 7 13:43:32 2015 (559C0FC4)
- fffff805`6ad50000 fffff805`6ad6c000 usbehci usbehci.sys Fri Jul 15 22:23:07 2016 (57899A8B)
- fffff805`6ad70000 fffff805`6ade6000 USBPORT USBPORT.SYS Fri Jul 15 22:23:09 2016 (57899A8D)
- fffff805`6adf0000 fffff805`6ae19000 e2xw10x64 e2xw10x64.sys Wed Sep 14 16:52:26 2016 (57D9B88A)
- fffff805`6ae20000 fffff805`6aed5000 wdiwifi wdiwifi.sys Thu Sep 15 12:36:57 2016 (57DACE29)
- fffff805`6aee0000 fffff805`6aeeb000 sthid sthid.sys Tue Feb 19 00:34:44 2013 (51230EF4)
- fffff805`6aef0000 fffff805`6aefb000 mshidkmdf mshidkmdf.sys Fri Jul 15 22:27:13 2016 (57899B81)
- fffff805`6af00000 fffff805`6af2f000 HIDCLASS HIDCLASS.SYS Fri Oct 14 23:55:48 2016 (5801A8C4)
- fffff805`6af30000 fffff805`6af42000 HIDPARSE HIDPARSE.SYS Fri Aug 5 23:46:37 2016 (57A55D9D)
- fffff805`6af50000 fffff805`6af5e000 rdpbus rdpbus.sys Fri Jul 15 22:11:15 2016 (578997C3)
- fffff805`6af60000 fffff805`6afe0000 usbhub usbhub.sys Fri Jul 15 22:18:19 2016 (5789996B)
- fffff805`6afe0000 fffff805`6afee000 USBD USBD.SYS Fri Jul 15 22:28:27 2016 (57899BCB)
- fffff805`6aff0000 fffff805`6b024000 nvhda64v nvhda64v.sys Thu Sep 29 09:25:06 2016 (57ED1632)
- fffff805`6b030000 fffff805`6b0b7000 UsbHub3 UsbHub3.sys Fri Jul 15 22:18:54 2016 (5789998E)
- fffff805`6b0c0000 fffff805`6b1d2000 HTTP HTTP.sys Fri Oct 14 23:41:03 2016 (5801A54F)
- fffff805`6b1e0000 fffff805`6b1f1000 vwifimp vwifimp.sys Fri Jul 15 22:27:44 2016 (57899BA0)
- fffff805`6b200000 fffff805`6b244000 srvnet srvnet.sys Wed Sep 7 00:45:09 2016 (57CF9B55)
- fffff805`6b250000 fffff805`6b29d000 mrxsmb10 mrxsmb10.sys Fri Nov 11 04:15:06 2016 (58258C1A)
- fffff805`6b2a0000 fffff805`6b2c6000 Ndu Ndu.sys Fri Jul 15 22:26:12 2016 (57899B44)
- fffff805`6b2d0000 fffff805`6b2d7280 rzpmgrk rzpmgrk.sys Thu Sep 17 14:42:44 2015 (55FB09A4)
- fffff805`6b2e0000 fffff805`6b2fe080 rzpnk rzpnk.sys Wed Sep 16 20:16:35 2015 (55FA0663)
- fffff805`6b300000 fffff805`6b314000 tcpipreg tcpipreg.sys Fri Jul 15 22:25:32 2016 (57899B1C)
- fffff805`6b320000 fffff805`6b34f000 tunnel tunnel.sys Fri Jul 15 22:26:20 2016 (57899B4C)
- fffff805`6b360000 fffff805`6c139000 nvlddmkm nvlddmkm.sys Sun Dec 11 13:13:24 2016 (584D9744)
- fffff805`6c140000 fffff805`6c15b000 HDAudBus HDAudBus.sys Fri Jul 15 22:27:11 2016 (57899B7F)
- fffff805`6c160000 fffff805`6c1c1000 portcls portcls.sys Fri Jul 15 22:25:10 2016 (57899B06)
- fffff805`6c1d0000 fffff805`6c1f1000 drmk drmk.sys Fri Jul 15 22:27:13 2016 (57899B81)
- fffff805`6c200000 fffff805`6c22b000 intelppm intelppm.sys Fri Jul 15 22:10:43 2016 (578997A3)
- fffff805`6c230000 fffff805`6c23b000 acpipagr acpipagr.sys Fri Jul 15 22:29:00 2016 (57899BEC)
- fffff805`6c240000 fffff805`6c24d000 nvvad64v nvvad64v.sys Tue Oct 4 03:20:09 2016 (57F35829)
- fffff805`6c250000 fffff805`6c25e000 ksthunk ksthunk.sys Fri Jul 15 22:28:56 2016 (57899BE8)
- fffff805`6c260000 fffff805`6c26d000 NdisVirtualBus NdisVirtualBus.sys Fri Jul 15 22:26:32 2016 (57899B58)
- fffff805`6c270000 fffff805`6c27c000 swenum swenum.sys Fri Jul 15 22:28:55 2016 (57899BE7)
- fffff805`6c280000 fffff805`6cfad000 bcmwl63a bcmwl63a.sys Sat Sep 19 03:42:15 2015 (55FD11D7)
- fffff805`6cfb0000 fffff805`6cfbe000 vwifibus vwifibus.sys Fri Jul 15 22:27:29 2016 (57899B91)
- fffff805`6cfc0000 fffff805`6cfdb000 serial serial.sys Fri Jul 15 22:28:29 2016 (57899BCD)
- fffff805`6cfe0000 fffff805`6cfef000 serenum serenum.sys Fri Jul 15 22:29:05 2016 (57899BF1)
- fffff805`6cff0000 fffff805`6cffc000 wmiacpi wmiacpi.sys Fri Jul 15 22:18:19 2016 (5789996B)
- fffff805`6d000000 fffff805`6d026000 luafv luafv.sys Fri Jul 15 22:21:48 2016 (57899A3C)
- fffff805`6d030000 fffff805`6d044000 mmcss mmcss.sys Fri Jul 15 22:20:45 2016 (578999FD)
- fffff805`6d050000 fffff805`6d069000 storqosflt storqosflt.sys Fri Jul 15 22:26:43 2016 (57899B63)
- fffff805`6d070000 fffff805`6d0f3000 trufos trufos.sys Wed Jun 15 05:43:22 2016 (5761233A)
- fffff805`6d100000 fffff805`6d118000 usbser usbser.sys Fri Jul 15 22:28:49 2016 (57899BE1)
- fffff805`6d120000 fffff805`6d136000 wcnfs wcnfs.sys Fri Jul 15 22:28:27 2016 (57899BCB)
- fffff805`6d140000 fffff805`6d150000 monitor monitor.sys Fri Jul 15 22:28:26 2016 (57899BCA)
- fffff805`6d150000 fffff805`6d168000 registry registry.sys Fri Jul 15 22:27:04 2016 (57899B78)
- fffff805`6d170000 fffff805`6d17e000 rzmpos rzmpos.sys Tue Apr 5 03:09:23 2016 (570364A3)
- fffff805`6d180000 fffff805`6d1bb000 mrxsmb20 mrxsmb20.sys Fri Nov 11 04:15:06 2016 (58258C1A)
- fffff805`6d1c0000 fffff805`6d1d2000 condrv condrv.sys Fri Jul 15 22:10:38 2016 (5789979E)
- fffff805`6d1e0000 fffff805`6d1fe000 WudfPf WudfPf.sys Fri Jul 15 22:26:10 2016 (57899B42)
- fffff805`6d210000 fffff805`6d21f000 dump_diskdump dump_diskdump.sys Fri Jul 15 22:21:57 2016 (57899A45)
- fffff805`6d250000 fffff805`6d274000 dump_storahci dump_storahci.sys Thu Sep 15 12:24:36 2016 (57DACB44)
- fffff805`6d2a0000 fffff805`6d2bd000 dump_dumpfve dump_dumpfve.sys Fri Jul 15 22:27:46 2016 (57899BA2)
- fffff805`6d2c0000 fffff805`6d2fc000 WUDFRd WUDFRd.sys Fri Jul 15 22:25:31 2016 (57899B1B)
- fffff805`6d300000 fffff805`6d30e000 WpdUpFltr WpdUpFltr.sys Fri Jul 15 22:27:41 2016 (57899B9D)
- fffff805`6d310000 fffff805`6d328000 mslldp mslldp.sys Fri Jul 15 22:28:24 2016 (57899BC8)
- fffff805`6d330000 fffff805`6d34a000 rspndr rspndr.sys Fri Jul 15 22:27:29 2016 (57899B91)
- fffff805`6d350000 fffff805`6d366000 lltdio lltdio.sys Fri Jul 15 22:27:11 2016 (57899B7F)
- fffff805`6d370000 fffff805`6d38b000 wanarp wanarp.sys Fri Jul 15 22:28:56 2016 (57899BE8)
- fffff805`6d390000 fffff805`6d3a6000 ndisuio ndisuio.sys Fri Jul 15 22:26:32 2016 (57899B58)
- fffff805`6d3b0000 fffff805`6d439000 nwifi nwifi.sys Fri Jul 15 22:25:03 2016 (57899AFF)
- fffff805`6d440000 fffff805`6d462000 bowser bowser.sys Wed Nov 2 06:23:23 2016 (5819BE9B)
- fffff805`6d470000 fffff805`6d489000 mpsdrv mpsdrv.sys Fri Jul 15 22:27:16 2016 (57899B84)
- fffff805`6d490000 fffff805`6d505000 mrxsmb mrxsmb.sys Wed Sep 7 00:48:56 2016 (57CF9C38)
- fffff805`6d510000 fffff805`6d54f000 usbvideo usbvideo.sys Fri Aug 5 23:44:20 2016 (57A55D14)
- fffff805`6d550000 fffff805`6d60de00 L6UX164 L6UX164.sys Fri Aug 21 13:13:56 2015 (55D75C54)
- fffff805`6d610000 fffff805`6d62b000 STREAM STREAM.SYS Fri Jul 15 22:19:00 2016 (57899994)
- fffff805`6d630000 fffff805`6d656000 usbaudio usbaudio.sys Fri Jul 15 22:26:48 2016 (57899B68)
- fffff805`6d660000 fffff805`6d707000 dxgmms2 dxgmms2.sys Fri Dec 9 04:39:05 2016 (584A7BB9)
- fffff805`6d710000 fffff805`6d730000 wcifs wcifs.sys Thu Sep 15 12:42:03 2016 (57DACF5B)
- fffff805`6d730000 fffff805`6dc86000 RTKVHD64 RTKVHD64.sys Tue Oct 18 07:20:52 2016 (58060594)
- fffff805`6dc90000 fffff805`6dc9e000 MBfilt64 MBfilt64.sys Thu Jul 30 23:40:32 2009 (4A7267B0)
- fffff805`6dca0000 fffff805`6dcc4000 USBSTOR USBSTOR.SYS Fri Jul 15 22:18:41 2016 (57899981)
- fffff805`6dcd0000 fffff805`6dd00000 usbccgp usbccgp.sys Fri Jul 15 22:28:03 2016 (57899BB3)
- fffff805`6dd00000 fffff805`6dd11000 hidusb hidusb.sys Fri Aug 5 23:47:49 2016 (57A55DE5)
- fffff805`6dd20000 fffff805`6dd2f000 rzendpt rzendpt.sys Tue Apr 5 03:09:18 2016 (5703649E)
- fffff805`6dd30000 fffff805`6dd40000 kbdhid kbdhid.sys Thu Sep 15 12:43:23 2016 (57DACFAB)
- fffff805`6dd40000 fffff805`6dd53000 kbdclass kbdclass.sys Fri Jul 15 22:26:27 2016 (57899B53)
- fffff805`6dd60000 fffff805`6dd94000 rzudd rzudd.sys Tue Apr 5 03:09:21 2016 (570364A1)
- fffff805`6dda0000 fffff805`6ddaf000 mouhid mouhid.sys Fri Jul 15 22:27:35 2016 (57899B97)
- fffff805`6ddb0000 fffff805`6ddc2000 mouclass mouclass.sys Fri Jul 15 22:26:40 2016 (57899B60)
- fffff805`6ddd0000 fffff805`6ddec000 btwsecfl btwsecfl.sys Wed Sep 12 20:37:48 2012 (50512ADC)
- fffff805`6ddf0000 fffff805`6ddfe380 btwusb btwusb.sys Wed Jun 22 16:26:55 2016 (576AF48F)
- Unloaded modules:
- fffff805`6b1e0000 fffff805`6b1f1000 vwifimp.sys
- Timestamp: unavailable (00000000)
- Checksum: 00000000
- ImageSize: 00011000
- fffff805`6b350000 fffff805`6b35f000 MSKSSRV.sys
- Timestamp: unavailable (00000000)
- Checksum: 00000000
- ImageSize: 0000F000
- fffff805`6d1a0000 fffff805`6d1dc000 WUDFRd.sys
- Timestamp: unavailable (00000000)
- Checksum: 00000000
- ImageSize: 0003C000
- fffff805`6d180000 fffff805`6d19c000 EhStorClass.
- Timestamp: unavailable (00000000)
- Checksum: 00000000
- ImageSize: 0001C000
- fffff805`68fd0000 fffff805`68fdf000 dump_storpor
- Timestamp: unavailable (00000000)
- Checksum: 00000000
- ImageSize: 0000F000
- fffff805`69010000 fffff805`69034000 dump_storahc
- Timestamp: unavailable (00000000)
- Checksum: 00000000
- ImageSize: 00024000
- fffff805`69060000 fffff805`6907d000 dump_dumpfve
- Timestamp: unavailable (00000000)
- Checksum: 00000000
- ImageSize: 0001D000
- fffff805`68230000 fffff805`6824c000 EhStorClass.
- Timestamp: unavailable (00000000)
- Checksum: 00000000
- ImageSize: 0001C000
- fffff805`69730000 fffff805`69744000 dam.sys
- Timestamp: unavailable (00000000)
- Checksum: 00000000
- ImageSize: 00014000
- fffff805`67eb0000 fffff805`67eb8000 bdelam.sys
- Timestamp: unavailable (00000000)
- Checksum: 00000000
- ImageSize: 00008000
- fffff805`68ee0000 fffff805`68eef000 hwpolicy.sys
- Timestamp: unavailable (00000000)
- Checksum: 00000000
- ImageSize: 0000F000
- ------------------------------ BIOS INFO -------------------------------
- [SMBIOS Data Tables v2.8]
- [DMI Version - 0]
- [2.0 Calling Convention - No]
- [Table Size - 3888 bytes]
- [BIOS Information (Type 0) - Length 24 - Handle 0000h]
- Vendor American Megatrends Inc.
- BIOS Version V1.12
- BIOS Starting Address Segment f000
- BIOS Release Date 02/16/2016
- BIOS ROM Size 800000
- BIOS Characteristics
- 07: - PCI Supported
- 11: - Upgradeable FLASH BIOS
- 12: - BIOS Shadowing Supported
- 15: - CD-Boot Supported
- 16: - Selectable Boot Supported
- 17: - BIOS ROM Socketed
- 19: - EDD Supported
- 23: - 1.2MB Floppy Supported
- 24: - 720KB Floppy Supported
- 25: - 2.88MB Floppy Supported
- 26: - Print Screen Device Supported
- 27: - Keyboard Services Supported
- 28: - Serial Services Supported
- 29: - Printer Services Supported
- 32: - BIOS Vendor Reserved
- BIOS Characteristic Extensions
- 00: - ACPI Supported
- 01: - USB Legacy Supported
- 08: - BIOS Boot Specification Supported
- 10: - Specification Reserved
- 11: - Specification Reserved
- BIOS Major Revision 4
- BIOS Minor Revision 6
- EC Firmware Major Revision 255
- EC Firmware Minor Revision 255
- [System Information (Type 1) - Length 27 - Handle 0001h]
- Manufacturer MSI
- Product Name MS-7916
- Version 1.0
- UUID 00000000-0000-0000-0000-000000000000
- Wakeup Type Power Switch
- SKUNumber To be filled by O.E.M.
- Family To be filled by O.E.M.
- [BaseBoard Information (Type 2) - Length 15 - Handle 0002h]
- Manufacturer MSI
- Product Z97 GAMING 7 (MS-7916)
- Version 1.0
- Asset Tag
- Feature Flags 09h
- -2092714272: - -2092714224: - §'·ù
- Location To be filled by O.E.M.
- Chassis Handle 0003h
- Board Type 0ah - Processor/Memory Module
- Number of Child Handles 0
- [System Enclosure (Type 3) - Length 22 - Handle 0003h]
- Manufacturer MSI
- Chassis Type Desktop
- Version 1.0
- Asset Tag Number
- Bootup State Safe
- Power Supply State Safe
- Thermal State Safe
- Security Status None
- OEM Defined 0
- Height 0U
- Number of Power Cords 1
- Number of Contained Elements 0
- Contained Element Size 3
- [OEM Strings (Type 11) - Length 5 - Handle 0021h]
- Number of Strings 1
- 1 To Be Filled By O.E.M.
- [System Configuration Options (Type 12) - Length 5 - Handle 0022h]
- [Processor Information (Type 4) - Length 42 - Handle 003dh]
- Socket Designation SOCKET 0
- Processor Type Central Processor
- Processor Family c6h - Specification Reserved
- Processor Manufacturer Intel
- Processor ID c3060300fffbebbf
- Processor Version Intel(R) Core(TM) i7-4790K CPU @ 4.00GHz
- Processor Voltage 8ch - 1.2V
- External Clock 100MHz
- Max Speed 3800MHz
- Current Speed 4000MHz
- Status Enabled Populated
- Processor Upgrade Specification Reserved
- L1 Cache Handle 003eh
- L2 Cache Handle 003fh
- L3 Cache Handle 0040h
- Asset Tag Number
- Part Number Fill By OEM
- [Cache Information (Type 7) - Length 19 - Handle 003eh]
- Socket Designation CPU Internal L1
- Cache Configuration 0180h - WB Enabled Int NonSocketed L1
- Maximum Cache Size 0100h - 256K
- Installed Size 0100h - 256K
- Supported SRAM Type 0020h - Synchronous
- Current SRAM Type 0020h - Synchronous
- Cache Speed 0ns
- Error Correction Type ParitySingle-Bit ECC
- System Cache Type Other
- Associativity 8-way Set-Associative
- [Cache Information (Type 7) - Length 19 - Handle 003fh]
- Socket Designation CPU Internal L2
- Cache Configuration 0181h - WB Enabled Int NonSocketed L2
- Maximum Cache Size 0400h - 1024K
- Installed Size 0400h - 1024K
- Supported SRAM Type 0020h - Synchronous
- Current SRAM Type 0020h - Synchronous
- Cache Speed 0ns
- Error Correction Type Multi-Bit ECC
- System Cache Type Unified
- Associativity 8-way Set-Associative
- [Cache Information (Type 7) - Length 19 - Handle 0040h]
- Socket Designation CPU Internal L3
- Cache Configuration 0182h - WB Enabled Int NonSocketed L3
- Maximum Cache Size 2000h - 8192K
- Installed Size 2000h - 8192K
- Supported SRAM Type 0020h - Synchronous
- Current SRAM Type 0020h - Synchronous
- Cache Speed 0ns
- Error Correction Type Specification Reserved
- System Cache Type Unified
- Associativity 16-way Set-Associative
- [Physical Memory Array (Type 16) - Length 23 - Handle 0042h]
- Location 03h - SystemBoard/Motherboard
- Use 03h - System Memory
- Memory Error Correction 03h - None
- Maximum Capacity 33554432KB
- Memory Error Inf Handle [Not Provided]
- Number of Memory Devices 4
- [Memory Device (Type 17) - Length 40 - Handle 0043h]
- Physical Memory Array Handle 0042h
- Memory Error Info Handle [Not Provided]
- Total Width 64 bits
- Data Width 64 bits
- Size 4096MB
- Form Factor 09h - DIMM
- Device Set [None]
- Device Locator ChannelA-DIMM0
- Bank Locator BANK 0
- Memory Type 18h - Specification Reserved
- Type Detail 0080h - Synchronous
- Speed 1600MHz
- Manufacturer 0420
- Asset Tag Number
- Part Number F3-12800CL9-4GBXL
- [Memory Device (Type 17) - Length 40 - Handle 0044h]
- Physical Memory Array Handle 0042h
- Memory Error Info Handle [Not Provided]
- Total Width 64 bits
- Data Width 64 bits
- Size 4096MB
- Form Factor 09h - DIMM
- Device Set [None]
- Device Locator ChannelA-DIMM1
- Bank Locator BANK 1
- Memory Type 18h - Specification Reserved
- Type Detail 0080h - Synchronous
- Speed 1600MHz
- Manufacturer 0420
- Asset Tag Number
- Part Number F3-12800CL9-4GBXL
- [Memory Device (Type 17) - Length 40 - Handle 0045h]
- Physical Memory Array Handle 0042h
- Memory Error Info Handle [Not Provided]
- Total Width 64 bits
- Data Width 64 bits
- Size 4096MB
- Form Factor 09h - DIMM
- Device Set [None]
- Device Locator ChannelB-DIMM0
- Bank Locator BANK 2
- Memory Type 18h - Specification Reserved
- Type Detail 0080h - Synchronous
- Speed 1600MHz
- Manufacturer 0420
- Asset Tag Number
- Part Number F3-12800CL9-4GBXL
- [Memory Device (Type 17) - Length 40 - Handle 0046h]
- Physical Memory Array Handle 0042h
- Memory Error Info Handle [Not Provided]
- Total Width 64 bits
- Data Width 64 bits
- Size 4096MB
- Form Factor 09h - DIMM
- Device Set [None]
- Device Locator ChannelB-DIMM1
- Bank Locator BANK 3
- Memory Type 18h - Specification Reserved
- Type Detail 0080h - Synchronous
- Speed 1600MHz
- Manufacturer 0420
- Asset Tag Number
- Part Number F3-12800CL9-4GBXL
- [Memory Array Mapped Address (Type 19) - Length 31 - Handle 0047h]
- Starting Address 00000000h
- Ending Address 00ffffffh
- Memory Array Handle 0042h
- Partition Width 04
- [Memory Device Mapped Address (Type 20) - Length 35 - Handle 0048h]
- Starting Address 00000000h
- Ending Address 003fffffh
- Memory Device Handle 0043h
- Mem Array Mapped Adr Handle 0047h
- Partition Row Position [Unknown]
- Interleave Position 01
- Interleave Data Depth 02
- [Memory Device Mapped Address (Type 20) - Length 35 - Handle 0049h]
- Starting Address 00800000h
- Ending Address 00bfffffh
- Memory Device Handle 0044h
- Mem Array Mapped Adr Handle 0047h
- Partition Row Position [Unknown]
- Interleave Position 01
- Interleave Data Depth 02
- [Memory Device Mapped Address (Type 20) - Length 35 - Handle 004ah]
- Starting Address 00400000h
- Ending Address 007fffffh
- Memory Device Handle 0045h
- Mem Array Mapped Adr Handle 0047h
- Partition Row Position [Unknown]
- Interleave Position 02
- Interleave Data Depth 02
- [Memory Device Mapped Address (Type 20) - Length 35 - Handle 004bh]
- Starting Address 00c00000h
- Ending Address 00ffffffh
- Memory Device Handle 0046h
- Mem Array Mapped Adr Handle 0047h
- Partition Row Position [Unknown]
- Interleave Position 02
- Interleave Data Depth 02
- ========================================================================
- =================== Dump File: 011017-11109-01.dmp ====================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 14393 MP (8 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS
- Built by: 14393.576.amd64fre.rs1_release_inmarket.161208-2252
- Kernel base = 0xfffff800`7468f000 PsLoadedModuleList = 0xfffff800`74994060
- Debug session time: Tue Jan 10 15:42:47.218 2017 (UTC - 4:00)
- System Uptime: 18 days 20:42:33.605
- BugCheck 1E, {ffffffffc0000005, fffff800746bf080, 0, ffffffffffffffff}
- Probably caused by : memory_corruption
- Followup: memory_corruption
- 0: kd> !analyze -v
- KMODE_EXCEPTION_NOT_HANDLED (1e)
- This is a very common bugcheck. Usually the exception address pinpoints
- the driver/function that caused the problem. Always note this address
- as well as the link date of the driver/image that contains this address.
- Arguments:
- Arg1: ffffffffc0000005, The exception code that was not handled
- Arg2: fffff800746bf080, The address that the exception occurred at
- Arg3: 0000000000000000, Parameter 0 of the exception
- Arg4: ffffffffffffffff, Parameter 1 of the exception
- Debugging Details:
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 10.0.14393.576 (rs1_release_inmarket.161208-2252)
- SYSTEM_MANUFACTURER: MSI
- SYSTEM_PRODUCT_NAME: MS-7916
- SYSTEM_SKU: To be filled by O.E.M.
- SYSTEM_VERSION: 1.0
- BIOS_VENDOR: American Megatrends Inc.
- BIOS_VERSION: V1.12
- BIOS_DATE: 02/16/2016
- BASEBOARD_MANUFACTURER: MSI
- BASEBOARD_PRODUCT: Z97 GAMING 7 (MS-7916)
- BASEBOARD_VERSION: 1.0
- DUMP_TYPE: 2
- READ_ADDRESS: fffff80074a36338: Unable to get MiVisibleState
- ffffffffffffffff
- EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
- FAULTING_IP:
- nt!KiIncrementConcurrencyCount+0
- fffff800`746bf080 8a01 mov al,byte ptr [rcx]
- EXCEPTION_PARAMETER2: ffffffffffffffff
- BUGCHECK_STR: 0x1E_c0000005_R
- CPU_COUNT: 8
- CPU_MHZ: fa0
- CPU_VENDOR: GenuineIntel
- CPU_FAMILY: 6
- CPU_MODEL: 3c
- CPU_STEPPING: 3
- CPU_MICROCODE: 6,3c,3,0 (F,M,S,R) SIG: 1E'00000000 (cache) 1E'00000000 (init)
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: CODE_CORRUPTION
- PROCESS_NAME: strwinclt.exe
- CURRENT_IRQL: 2
- ANALYSIS_SESSION_HOST: USERNAME-PC
- ANALYSIS_SESSION_TIME: 06-06-2017 14:55:47.0900
- ANALYSIS_VERSION: 10.0.14321.1024 amd64fre
- DPC_STACK_BASE: FFFFF8007649AFB0
- LAST_CONTROL_TRANSFER: from fffff80074861572 to fffff800747d96f0
- STACK_TEXT:
- fffff800`76499aa8 fffff800`74861572 : 00000000`0000001e ffffffff`c0000005 fffff800`746bf080 00000000`00000000 : nt!KeBugCheckEx
- fffff800`76499ab0 fffff800`747dfaed : fffff800`749e4000 fffff800`7468f000 0004f530`00820000 fffff800`746c9ee5 : nt!KiFatalExceptionHandler+0x22
- fffff800`76499af0 fffff800`747221b1 : fffff800`7649b000 00000000`00000000 fffff800`76495000 ffffdd8e`de5f21b0 : nt!RtlpExecuteHandlerForException+0xd
- fffff800`76499b20 fffff800`74720f64 : fffff800`7649a250 fffff800`7649a750 fffff800`7649a250 fffff800`7649aa28 : nt!RtlDispatchException+0x421
- fffff800`7649a220 fffff800`747e4902 : 00000000`00000000 fffff804`4d07a3a3 fffff800`7649a9a0 00000000`00000000 : nt!KiDispatchException+0x144
- fffff800`7649a8f0 fffff800`747e2bbd : 00000000`00000004 00000000`00000000 00000004`00fe86fa fffff804`5043a489 : nt!KiExceptionDispatch+0xc2
- fffff800`7649aad0 fffff800`746bf080 : fffff800`746f2cc5 00000000`00000000 00000000`000000ff fffff800`749d0000 : nt!KiGeneralProtectionFault+0xfd
- fffff800`7649ac68 fffff800`746f2cc5 : 00000000`00000000 00000000`000000ff fffff800`749d0000 ffffdd8e`00000000 : nt!KiIncrementConcurrencyCount
- fffff800`7649ac70 fffff800`746f234f : ffffdd8e`e5136180 00000000`00000000 00000000`00000000 fffff800`00000002 : nt!KiTimerWaitTest+0x2e5
- fffff800`7649ad30 fffff800`747de7a5 : 00000000`00000000 fffff800`749d1180 fffff800`746683e0 ffffae39`c7589dd0 : nt!KiRetireDpcList+0x2af
- fffff800`7649afb0 fffff800`747de5b0 : ffffdd8e`e41beb60 00000000`00000000 ffffdd8e`db4f2d40 00000000`00000000 : nt!KxRetireDpcList+0x5
- ffffb180`ea8622c0 fffff800`747dd005 : 00000000`fffffffe fffff800`747db231 00000000`0058f9b2 ffffb180`ea8623b0 : nt!KiDispatchInterruptContinue
- ffffb180`ea8622f0 fffff800`747db231 : 00000000`0058f9b2 ffffb180`ea8623b0 ffffae39`c0768e60 00000000`00000000 : nt!KiDpcInterruptBypass+0x25
- ffffb180`ea862300 ffffae24`fae9d2e3 : ffffae39`c01e49b0 00000000`00000000 ffffb7ba`4af32a1b 00000000`00000000 : nt!KiInterruptDispatchNoLockNoEtw+0xb1
- ffffb180`ea862490 ffffae24`fae8b4c7 : 00000000`00000000 ffffb180`ea862ec0 ffffae39`fffffff7 ffffb180`00000000 : win32kfull!xxxWindowEvent+0x203
- ffffb180`ea862550 ffffae24`fae96b39 : ffffae39`c01e49b0 ffffb180`ea862df8 00000000`00000002 00000000`00003dff : win32kfull!xxxScanSysQueue+0x1987
- ffffb180`ea862c80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : win32kfull!xxxRealInternalGetMessage+0x629
- STACK_COMMAND: kb
- CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
- fffff800746bf84b - nt!MiProbeAndLockPrepare+73
- [ f6:fa ]
- fffff800746bf9d4-fffff800746bf9d5 2 bytes - nt!MiInitializeProbePacketVm+b0 (+0x189)
- [ fb f6:fd fa ]
- fffff800746bf9df - nt!MiInitializeProbePacketVm+bb (+0x0b)
- [ fa:a6 ]
- fffff800746bfdfc - nt!MiSetPagingOfDriver+40 (+0x41d)
- [ f6:fa ]
- fffff800746bfe9a - nt!MiSetPagingOfDriver+de (+0x9e)
- [ fa:a6 ]
- fffff800746bffde - nt!MiDriverPageMustStayResident+26 (+0x144)
- [ f6:fa ]
- 7 errors : !nt (fffff800746bf84b-fffff800746bffde)
- MODULE_NAME: memory_corruption
- IMAGE_NAME: memory_corruption
- FOLLOWUP_NAME: memory_corruption
- DEBUG_FLR_IMAGE_TIMESTAMP: 0
- MEMORY_CORRUPTOR: LARGE
- FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
- BUCKET_ID: MEMORY_CORRUPTION_LARGE
- PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
- TARGET_TIME: 2017-01-10T19:42:47.000Z
- OSBUILD: 14393
- OSSERVICEPACK: 576
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 272
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2016-12-09 04:23:02
- BUILDDATESTAMP_STR: 161208-2252
- BUILDLAB_STR: rs1_release_inmarket
- BUILDOSVER_STR: 10.0.14393.576
- ANALYSIS_SESSION_ELAPSED_TIME: 1965
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:memory_corruption_large
- FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
- Followup: memory_corruption
- ========================================================================
- =================== Dump File: 011717-9265-01.dmp ====================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 14393 MP (8 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS
- Built by: 14393.693.amd64fre.rs1_release.161220-1747
- Kernel base = 0xfffff802`e7e79000 PsLoadedModuleList = 0xfffff802`e817e060
- Debug session time: Tue Jan 17 13:54:38.694 2017 (UTC - 4:00)
- System Uptime: 6 days 17:57:28.307
- BugCheck 139, {3, ffffd00172331c80, ffffd00172331bd8, 0}
- *** WARNING: Unable to verify timestamp for win32k.sys
- *** ERROR: Module load completed but symbols could not be loaded for win32k.sys
- Probably caused by : memory_corruption
- Followup: memory_corruption
- 3: kd> !analyze -v
- KERNEL_SECURITY_CHECK_FAILURE (139)
- A kernel component has corrupted a critical data structure. The corruption
- could potentially allow a malicious user to gain control of this machine.
- Arguments:
- Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
- Arg2: ffffd00172331c80, Address of the trap frame for the exception that caused the bugcheck
- Arg3: ffffd00172331bd8, Address of the exception record for the exception that caused the bugcheck
- Arg4: 0000000000000000, Reserved
- Debugging Details:
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 10.0.14393.693 (rs1_release.161220-1747)
- SYSTEM_MANUFACTURER: MSI
- SYSTEM_PRODUCT_NAME: MS-7916
- SYSTEM_SKU: To be filled by O.E.M.
- SYSTEM_VERSION: 1.0
- BIOS_VENDOR: American Megatrends Inc.
- BIOS_VERSION: V1.12
- BIOS_DATE: 02/16/2016
- BASEBOARD_MANUFACTURER: MSI
- BASEBOARD_PRODUCT: Z97 GAMING 7 (MS-7916)
- BASEBOARD_VERSION: 1.0
- DUMP_TYPE: 2
- TRAP_FRAME: ffffd00172331c80 -- (.trap 0xffffd00172331c80)
- NOTE: The trap frame does not contain all registers.
- Some register values may be zeroed or incorrect.
- rax=ffff9188203b4278 rbx=0000000000000000 rcx=0000000000000003
- rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
- rip=fffff802e7fe2b34 rsp=ffffd00172331e10 rbp=0000000000000008
- r8=ffffd00172331e30 r9=0000000000000007 r10=0000000000000000
- r11=fffff802e7fcf95b r12=0000000000000000 r13=0000000000000000
- r14=0000000000000000 r15=0000000000000000
- iopl=0 nv up ei ng nz na po cy
- nt! ?? ::FNODOBFM::`string'+0xffa4:
- fffff802`e7fe2b34 cd29 int 29h
- Resetting default scope
- EXCEPTION_RECORD: ffffd00172331bd8 -- (.exr 0xffffd00172331bd8)
- ExceptionAddress: fffff802e7fe2b34 (nt! ?? ::FNODOBFM::`string'+0x000000000000ffa4)
- ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
- ExceptionFlags: 00000001
- NumberParameters: 1
- Parameter[0]: 0000000000000003
- Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
- CPU_COUNT: 8
- CPU_MHZ: fa0
- CPU_VENDOR: GenuineIntel
- CPU_FAMILY: 6
- CPU_MODEL: 3c
- CPU_STEPPING: 3
- CPU_MICROCODE: 6,3c,3,0 (F,M,S,R) SIG: 1E'00000000 (cache) 1E'00000000 (init)
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: CODE_CORRUPTION
- BUGCHECK_STR: 0x139
- PROCESS_NAME: svchost.exe
- CURRENT_IRQL: 2
- ERROR_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.
- EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.
- EXCEPTION_CODE_STR: c0000409
- EXCEPTION_PARAMETER1: 0000000000000003
- ANALYSIS_SESSION_HOST: USERNAME-PC
- ANALYSIS_SESSION_TIME: 06-06-2017 14:59:47.0922
- ANALYSIS_VERSION: 10.0.14321.1024 amd64fre
- LAST_CONTROL_TRANSFER: from fffff802e7fce829 to fffff802e7fc36f0
- STACK_TEXT:
- ffffd001`72331958 fffff802`e7fce829 : 00000000`00000139 00000000`00000003 ffffd001`72331c80 ffffd001`72331bd8 : nt!KeBugCheckEx
- ffffd001`72331960 fffff802`e7fceb90 : ffffd001`72331be0 fffff802`e7f1e15d ffff9188`149eb011 00000000`00000000 : nt!KiBugCheckDispatch+0x69
- ffffd001`72331aa0 fffff802`e7fcdb73 : ffffd001`72331f60 ffffca00`0a3ff3e0 00000000`00000000 ffffcd00`000024b0 : nt!KiFastFailDispatch+0xd0
- ffffd001`72331c80 fffff802`e7fe2b34 : 00000000`00000000 00000000`003b9acc 00000000`00000801 ffff9188`26b201b0 : nt!KiRaiseSecurityCheckFailure+0xf3
- ffffd001`72331e10 fffff802`e82b331f : ffffffff`00000001 00000000`00000005 ffffba89`91428110 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0xffa4
- ffffd001`72331e90 fffff802`e832000b : 00000005`00000003 ffff9188`186f9dd0 00000000`00000002 00000000`0000000f : nt!PspAddSchedulingGroupToJobChain+0xeb
- ffffd001`72331ef0 fffff802`e7fce393 : ffff9188`1bd98080 00000000`00000000 ffff9188`19718340 ffff9188`1bd98080 : nt!NtSetInformationJobObject+0x115b
- ffffd001`72332b00 00007ffd`bd819144 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
- 000000d0`41efc8d8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`bd819144
- STACK_COMMAND: kb
- CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
- fffff802e7f1e1d2 - nt!MiResolvePrivateZeroFault+212
- [ f6:b7 ]
- fffff802e7f1e1fa-fffff802e7f1e1fc 3 bytes - nt!MiResolvePrivateZeroFault+23a (+0x28)
- [ 40 fb f6:c0 db b7 ]
- fffff802e7f1e218-fffff802e7f1e219 2 bytes - nt!MiResolvePrivateZeroFault+258 (+0x1e)
- [ 80 fa:00 ca ]
- fffff802e7f2d511 - nt!MiDeleteValidSystemPage+251 (+0xf2f9)
- [ f6:b7 ]
- fffff802e7f2d52d-fffff802e7f2d52e 2 bytes - nt!MiDeleteValidSystemPage+26d (+0x1c)
- [ 80 fa:00 ca ]
- fffff802e7f8704d-fffff802e7f8704e 2 bytes - nt!MiPurgeZeroList+6d (+0x59b20)
- [ 80 fa:00 ca ]
- fffff802e80c5387-fffff802e80c5389 3 bytes - nt!ExFreePoolWithTag+387
- [ 40 fb f6:c0 db b7 ]
- 14 errors : !nt (fffff802e7f1e1d2-fffff802e80c5389)
- MODULE_NAME: memory_corruption
- IMAGE_NAME: memory_corruption
- FOLLOWUP_NAME: memory_corruption
- DEBUG_FLR_IMAGE_TIMESTAMP: 0
- MEMORY_CORRUPTOR: LARGE
- FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
- BUCKET_ID: MEMORY_CORRUPTION_LARGE
- PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
- TARGET_TIME: 2017-01-17T17:54:38.000Z
- OSBUILD: 14393
- OSSERVICEPACK: 693
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 272
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2016-12-21 01:50:57
- BUILDDATESTAMP_STR: 161220-1747
- BUILDLAB_STR: rs1_release
- BUILDOSVER_STR: 10.0.14393.693
- ANALYSIS_SESSION_ELAPSED_TIME: 24fc
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:memory_corruption_large
- FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
- Followup: memory_corruption
- ========================================================================
- =================== Dump File: 012217-6812-01.dmp ====================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 14393 MP (8 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS
- Built by: 14393.693.amd64fre.rs1_release.161220-1747
- Kernel base = 0xfffff803`ed87d000 PsLoadedModuleList = 0xfffff803`edb82060
- Debug session time: Sun Jan 22 01:23:16.634 2017 (UTC - 4:00)
- System Uptime: 4 days 4:54:50.880
- BugCheck 1E, {ffffffffc0000005, fffff803ed9cd257, 0, ffffffffffffffff}
- *** WARNING: Unable to verify timestamp for win32k.sys
- *** ERROR: Module load completed but symbols could not be loaded for win32k.sys
- Probably caused by : memory_corruption
- Followup: memory_corruption
- 1: kd> !analyze -v
- KMODE_EXCEPTION_NOT_HANDLED (1e)
- This is a very common bugcheck. Usually the exception address pinpoints
- the driver/function that caused the problem. Always note this address
- as well as the link date of the driver/image that contains this address.
- Arguments:
- Arg1: ffffffffc0000005, The exception code that was not handled
- Arg2: fffff803ed9cd257, The address that the exception occurred at
- Arg3: 0000000000000000, Parameter 0 of the exception
- Arg4: ffffffffffffffff, Parameter 1 of the exception
- Debugging Details:
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 10.0.14393.693 (rs1_release.161220-1747)
- SYSTEM_MANUFACTURER: MSI
- SYSTEM_PRODUCT_NAME: MS-7916
- SYSTEM_SKU: To be filled by O.E.M.
- SYSTEM_VERSION: 1.0
- BIOS_VENDOR: American Megatrends Inc.
- BIOS_VERSION: V1.12
- BIOS_DATE: 02/16/2016
- BASEBOARD_MANUFACTURER: MSI
- BASEBOARD_PRODUCT: Z97 GAMING 7 (MS-7916)
- BASEBOARD_VERSION: 1.0
- DUMP_TYPE: 2
- READ_ADDRESS: fffff803edc24338: Unable to get MiVisibleState
- ffffffffffffffff
- EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
- FAULTING_IP:
- nt!ExpInterlockedPopEntrySListFault+0
- fffff803`ed9cd257 498b08 mov rcx,qword ptr [r8]
- EXCEPTION_PARAMETER2: ffffffffffffffff
- BUGCHECK_STR: 0x1E_c0000005_R
- CPU_COUNT: 8
- CPU_MHZ: fa0
- CPU_VENDOR: GenuineIntel
- CPU_FAMILY: 6
- CPU_MODEL: 3c
- CPU_STEPPING: 3
- CPU_MICROCODE: 6,3c,3,0 (F,M,S,R) SIG: 1E'00000000 (cache) 1E'00000000 (init)
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: CODE_CORRUPTION
- PROCESS_NAME: WildStar.exe
- CURRENT_IRQL: 2
- ANALYSIS_SESSION_HOST: USERNAME-PC
- ANALYSIS_SESSION_TIME: 06-06-2017 15:02:14.0690
- ANALYSIS_VERSION: 10.0.14321.1024 amd64fre
- LAST_CONTROL_TRANSFER: from fffff803eda0c710 to fffff803ed9c76f0
- STACK_TEXT:
- ffffe080`9729ca78 fffff803`eda0c710 : 00000000`0000001e ffffffff`c0000005 fffff803`ed9cd257 00000000`00000000 : nt!KeBugCheckEx
- ffffe080`9729ca80 fffff803`ed9d2902 : 00000000`ff3fffff 00000000`00000016 00000000`00013676 fffff480`00000000 : nt! ?? ::FNODOBFM::`string'+0x35b80
- ffffe080`9729d150 fffff803`ed9d0bbd : ffffffff`ffffffd1 00000000`00000016 00000000`00000002 00000000`00000003 : nt!KiExceptionDispatch+0xc2
- ffffe080`9729d330 fffff803`ed9cd257 : 00000000`0000000a fffff803`ed924544 00000000`00000002 fffff803`edba1480 : nt!KiGeneralProtectionFault+0xfd
- ffffe080`9729d4c0 fffff803`ed924544 : 00000000`00000002 fffff803`edba1480 00000000`00000002 00000000`00000000 : nt!ExpInterlockedPopEntrySListFault
- ffffe080`9729d4d0 fffff803`ed924330 : fffff803`edba1480 7f7f7f7f`0000000a 87878787`00000002 00000000`00000002 : nt!MiGetFreeOrZeroPage+0x64
- ffffe080`9729d5a0 fffff803`ed923f26 : fffff803`edba1480 00000000`00000000 00000000`00000000 fffff803`00000000 : nt!MiGetPage+0x80
- ffffe080`9729d620 fffff803`ed9220e8 : 00000000`00000011 00000000`00000000 ffffe080`9729d880 fffff803`00000010 : nt!MiGetPageChain+0x156
- ffffe080`9729d750 fffff803`ed921a87 : 00000000`00000000 ffffe080`9729d8b1 00000000`00000000 00000000`00000000 : nt!MiResolvePrivateZeroFault+0x128
- ffffe080`9729d810 fffff803`ed9255b5 : fffff480`00098b20 00000000`00000002 00000000`c0000016 ffffe080`9729db00 : nt!MiResolveDemandZeroFault+0x1d7
- ffffe080`9729d900 fffff803`ed9d0cfc : ffffcc05`69f53400 ffffcc05`5d7d5080 00000000`00000000 ffffcc05`66fc8fe0 : nt!MmAccessFault+0x7c5
- ffffe080`9729db00 00000000`50620c10 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x13c
- 00000000`11c2fa60 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x50620c10
- STACK_COMMAND: kb
- CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
- fffff803ed923f3a - nt!MiGetPageChain+16a
- [ fa:b7 ]
- fffff803ed924348 - nt!MiGetPage+98 (+0x40e)
- [ fa:b7 ]
- fffff803ed92455b - nt!MiGetFreeOrZeroPage+7b (+0x213)
- [ fa:b7 ]
- fffff803ed95f7e3-fffff803ed95f7e4 2 bytes - nt!MiPfnShareCountIsZero+193 (+0x3b288)
- [ fb f6:fa f4 ]
- fffff803ed95f807 - nt!MiPfnShareCountIsZero+1b7 (+0x24)
- [ f6:f4 ]
- fffff803ed95f826 - nt!MiPfnShareCountIsZero+1d6 (+0x1f)
- [ a0:20 ]
- fffff803ed98b04e - nt!MiPurgeZeroList+6e (+0x2b828)
- [ fa:b7 ]
- 8 errors : !nt (fffff803ed923f3a-fffff803ed98b04e)
- MODULE_NAME: memory_corruption
- IMAGE_NAME: memory_corruption
- FOLLOWUP_NAME: memory_corruption
- DEBUG_FLR_IMAGE_TIMESTAMP: 0
- MEMORY_CORRUPTOR: LARGE
- FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
- BUCKET_ID: MEMORY_CORRUPTION_LARGE
- PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
- TARGET_TIME: 2017-01-22T05:23:16.000Z
- OSBUILD: 14393
- OSSERVICEPACK: 693
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 272
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2016-12-21 01:50:57
- BUILDDATESTAMP_STR: 161220-1747
- BUILDLAB_STR: rs1_release
- BUILDOSVER_STR: 10.0.14393.693
- ANALYSIS_SESSION_ELAPSED_TIME: 2128
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:memory_corruption_large
- FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
- Followup: memory_corruption
- ========================================================================
- =================== Dump File: 012317-5546-01.dmp ====================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 14393 MP (8 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS
- Built by: 14393.693.amd64fre.rs1_release.161220-1747
- Kernel base = 0xfffff803`26093000 PsLoadedModuleList = 0xfffff803`26398060
- Debug session time: Mon Jan 23 13:19:35.566 2017 (UTC - 4:00)
- System Uptime: 1 days 2:22:27.006
- BugCheck A, {ffffb80823ae8fff, 2, 0, fffff803261e29c8}
- Probably caused by : memory_corruption
- Followup: memory_corruption
- 2: kd> !analyze -v
- IRQL_NOT_LESS_OR_EQUAL (a)
- An attempt was made to access a pageable (or completely invalid) address at an
- interrupt request level (IRQL) that is too high. This is usually
- caused by drivers using improper addresses.
- If a kernel debugger is available get the stack backtrace.
- Arguments:
- Arg1: ffffb80823ae8fff, memory referenced
- Arg2: 0000000000000002, IRQL
- Arg3: 0000000000000000, bitfield :
- bit 0 : value 0 = read operation, 1 = write operation
- bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
- Arg4: fffff803261e29c8, address which referenced memory
- Debugging Details:
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 10.0.14393.693 (rs1_release.161220-1747)
- SYSTEM_MANUFACTURER: MSI
- SYSTEM_PRODUCT_NAME: MS-7916
- SYSTEM_SKU: To be filled by O.E.M.
- SYSTEM_VERSION: 1.0
- BIOS_VENDOR: American Megatrends Inc.
- BIOS_VERSION: V1.12
- BIOS_DATE: 02/16/2016
- BASEBOARD_MANUFACTURER: MSI
- BASEBOARD_PRODUCT: Z97 GAMING 7 (MS-7916)
- BASEBOARD_VERSION: 1.0
- DUMP_TYPE: 2
- READ_ADDRESS: fffff8032643a338: Unable to get MiVisibleState
- ffffb80823ae8fff
- CURRENT_IRQL: 2
- FAULTING_IP:
- nt!SwapContext+208
- fffff803`261e29c8 0fae29 xrstor [rcx]
- CPU_COUNT: 8
- CPU_MHZ: fa0
- CPU_VENDOR: GenuineIntel
- CPU_FAMILY: 6
- CPU_MODEL: 3c
- CPU_STEPPING: 3
- CPU_MICROCODE: 6,3c,3,0 (F,M,S,R) SIG: 1E'00000000 (cache) 1E'00000000 (init)
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: CODE_CORRUPTION
- BUGCHECK_STR: AV
- PROCESS_NAME: svchost.exe
- ANALYSIS_SESSION_HOST: USERNAME-PC
- ANALYSIS_SESSION_TIME: 06-06-2017 15:05:21.0401
- ANALYSIS_VERSION: 10.0.14321.1024 amd64fre
- TRAP_FRAME: ffffb80023ae8310 -- (.trap 0xffffb80023ae8310)
- NOTE: The trap frame does not contain all registers.
- Some register values may be zeroed or incorrect.
- rax=0000000000000005 rbx=0000000000000000 rcx=ffffb80823ae8cc0
- rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
- rip=fffff803261e29c8 rsp=ffffb80023ae84a0 rbp=00000025bd9bbfff
- r8=0000000000000000 r9=0000000000000004 r10=0000000000000000
- r11=fffff803261e994f r12=0000000000000000 r13=0000000000000000
- r14=0000000000000000 r15=0000000000000000
- iopl=0 nv up ei pl zr na po cy
- nt!SwapContext+0x208:
- fffff803`261e29c8 0fae29 xrstor [rcx]
- Resetting default scope
- LAST_CONTROL_TRANSFER: from fffff803261e8829 to fffff803261dd6f0
- STACK_TEXT:
- ffffb800`23ae81c8 fffff803`261e8829 : 00000000`0000000a ffffb808`23ae8fff 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
- ffffb800`23ae81d0 fffff803`261e6e07 : ffffb800`23ae8440 ffffca0f`70450000 00000000`00004dd0 ffffca0f`68597f78 : nt!KiBugCheckDispatch+0x69
- ffffb800`23ae8310 fffff803`261e29c8 : ffffa251`28944018 ffffbd9d`5383baa7 ffffca0f`6c2e93e0 fffff803`2616dbcd : nt!KiPageFault+0x247
- ffffb800`23ae84a0 fffff803`261e2506 : 00000000`00000000 fffff803`261824f5 00000000`00000001 fffff803`26151fa0 : nt!SwapContext+0x208
- ffffb800`23ae84e0 fffff803`260f8f5c : ffffca0f`00000000 00000000`00000001 ffffca0f`6c2e94c0 ffffb800`23ae88b0 : nt!KiSwapContext+0x76
- ffffb800`23ae8620 fffff803`260f89ff : ffffbd9d`5383bb47 ffffb800`23ae86d0 00000000`00000000 fffff803`262df34b : nt!KiSwapThread+0x17c
- ffffb800`23ae86d0 fffff803`260fa7c7 : 00000000`00000000 ffffffff`00000000 ffffffff`ffffffef 00000000`00000000 : nt!KiCommitThreadWait+0x14f
- ffffb800`23ae8770 fffff803`260c0d06 : ffffca0f`6c0996c0 fffff803`00000010 ffffdb8c`a2147c00 00000000`00000000 : nt!KeWaitForSingleObject+0x377
- ffffb800`23ae8820 fffff803`26571fdd : ffffffff`ffffffff ffffca0f`6c096c60 ffffca0f`6c096b00 ffffca0f`6c096b00 : nt!AlpcpWaitForSingleObject+0x3e
- ffffb800`23ae8860 fffff803`2656fd5d : ffffca0f`6c099080 00000000`00004a01 00000000`00000000 ffffb800`23ae8930 : nt!AlpcpReceiveMessagePort+0x44d
- ffffb800`23ae88f0 fffff803`2656f903 : 00000000`00010001 00000000`00000000 00000071`0fdff798 00000185`6ac08470 : nt!AlpcpReceiveMessage+0x2fd
- ffffb800`23ae89d0 fffff803`261e8393 : ffffb800`23ae8aa8 ffffca0f`6c099080 ffffb800`23ae8b80 00000071`0fdff6e8 : nt!NtAlpcSendWaitReceivePort+0x103
- ffffb800`23ae8a90 00007ffc`bb0571c4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
- 00000071`0fdff6c8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`bb0571c4
- STACK_COMMAND: kb
- CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
- fffff8032616dc42-fffff8032616dc44 3 bytes - nt!MI_IS_PHYSICAL_ADDRESS+22
- [ 40 fb f6:00 51 a2 ]
- fffff8032616dc50-fffff8032616dc51 2 bytes - nt!MI_IS_PHYSICAL_ADDRESS+30 (+0x0e)
- [ 80 f6:00 a2 ]
- 5 errors : !nt (fffff8032616dc42-fffff8032616dc51)
- MODULE_NAME: memory_corruption
- IMAGE_NAME: memory_corruption
- FOLLOWUP_NAME: memory_corruption
- DEBUG_FLR_IMAGE_TIMESTAMP: 0
- MEMORY_CORRUPTOR: LARGE
- FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
- BUCKET_ID: MEMORY_CORRUPTION_LARGE
- PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
- TARGET_TIME: 2017-01-23T17:19:35.000Z
- OSBUILD: 14393
- OSSERVICEPACK: 693
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 272
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2016-12-21 01:50:57
- BUILDDATESTAMP_STR: 161220-1747
- BUILDLAB_STR: rs1_release
- BUILDOSVER_STR: 10.0.14393.693
- ANALYSIS_SESSION_ELAPSED_TIME: 1999
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:memory_corruption_large
- FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
- Followup: memory_corruption
- ========================================================================
- =================== Dump File: 012417-6781-01.dmp ====================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 14393 MP (8 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS
- Built by: 14393.693.amd64fre.rs1_release.161220-1747
- Kernel base = 0xfffff803`b7a79000 PsLoadedModuleList = 0xfffff803`b7d7e060
- Debug session time: Tue Jan 24 20:45:27.942 2017 (UTC - 4:00)
- System Uptime: 1 days 7:24:47.581
- BugCheck 109, {a39fca5a41089891, b3b6d6e0938a7943, ffff8b01a1371080, 5}
- Probably caused by : Unknown_Image ( ANALYSIS_INCONCLUSIVE )
- Followup: MachineOwner
- 4: kd> !analyze -v
- CRITICAL_STRUCTURE_CORRUPTION (109)
- This bugcheck is generated when the kernel detects that critical kernel code or
- data have been corrupted. There are generally three causes for a corruption:
- 1) A driver has inadvertently or deliberately modified critical kernel code
- or data. See http://www.microsoft.com/whdc/driver/kernel/64bitPatching.mspx
- 2) A developer attempted to set a normal kernel breakpoint using a kernel
- debugger that was not attached when the system was booted. Normal breakpoints,
- "bp", can only be set if the debugger is attached at boot time. Hardware
- breakpoints, "ba", can be set at any time.
- 3) A hardware corruption occurred, e.g. failing RAM holding kernel code or data.
- Arguments:
- Arg1: a39fca5a41089891, Reserved
- Arg2: b3b6d6e0938a7943, Reserved
- Arg3: ffff8b01a1371080, Failure type dependent information
- Arg4: 0000000000000005, Type of corrupted region, can be
- 0 : A generic data region
- 1 : Modification of a function or .pdata
- 2 : A processor IDT
- 3 : A processor GDT
- 4 : Type 1 process list corruption
- 5 : Type 2 process list corruption
- 6 : Debug routine modification
- 7 : Critical MSR modification
- 8 : Object type
- 9 : A processor IVT
- a : Modification of a system service function
- b : A generic session data region
- c : Modification of a session function or .pdata
- d : Modification of an import table
- e : Modification of a session import table
- f : Ps Win32 callout modification
- 10 : Debug switch routine modification
- 11 : IRP allocator modification
- 12 : Driver call dispatcher modification
- 13 : IRP completion dispatcher modification
- 14 : IRP deallocator modification
- 15 : A processor control register
- 16 : Critical floating point control register modification
- 17 : Local APIC modification
- 18 : Kernel notification callout modification
- 19 : Loaded module list modification
- 1a : Type 3 process list corruption
- 1b : Type 4 process list corruption
- 1c : Driver object corruption
- 1d : Executive callback object modification
- 1e : Modification of module padding
- 1f : Modification of a protected process
- 20 : A generic data region
- 21 : A page hash mismatch
- 22 : A session page hash mismatch
- 23 : Load config directory modification
- 24 : Inverted function table modification
- 25 : Session configuration modification
- 26 : An extended processor control register
- 27 : Type 1 pool corruption
- 28 : Type 2 pool corruption
- 29 : Type 3 pool corruption
- 101 : General pool corruption
- 102 : Modification of win32k.sys
- Debugging Details:
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 10.0.14393.693 (rs1_release.161220-1747)
- SYSTEM_MANUFACTURER: MSI
- SYSTEM_PRODUCT_NAME: MS-7916
- SYSTEM_SKU: To be filled by O.E.M.
- SYSTEM_VERSION: 1.0
- BIOS_VENDOR: American Megatrends Inc.
- BIOS_VERSION: V1.12
- BIOS_DATE: 02/16/2016
- BASEBOARD_MANUFACTURER: MSI
- BASEBOARD_PRODUCT: Z97 GAMING 7 (MS-7916)
- BASEBOARD_VERSION: 1.0
- DUMP_TYPE: 2
- CPU_COUNT: 8
- CPU_MHZ: fa0
- CPU_VENDOR: GenuineIntel
- CPU_FAMILY: 6
- CPU_MODEL: 3c
- CPU_STEPPING: 3
- CPU_MICROCODE: 6,3c,3,0 (F,M,S,R) SIG: 1E'00000000 (cache) 1E'00000000 (init)
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: BAD_STACK_0x109
- BUGCHECK_STR: 0x109
- PROCESS_NAME: csrss.exe
- CURRENT_IRQL: 2
- ANALYSIS_SESSION_HOST: USERNAME-PC
- ANALYSIS_SESSION_TIME: 06-06-2017 15:07:28.0649
- ANALYSIS_VERSION: 10.0.14321.1024 amd64fre
- STACK_TEXT:
- ffffa280`14b1e038 00000000`00000000 : 00000000`00000109 a39fca5a`41089891 b3b6d6e0`938a7943 ffff8b01`a1371080 : nt!KeBugCheckEx
- STACK_COMMAND: kb
- CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
- fffff803b7cc5387-fffff803b7cc5389 3 bytes - nt!ExFreePoolWithTag+387
- [ 40 fb f6:80 4d 9b ]
- 3 errors : !nt (fffff803b7cc5387-fffff803b7cc5389)
- THREAD_SHA1_HASH_MOD_FUNC: 81a83ae0317433a47fcc36991983df3b6e638b71
- THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 6e16edd8c7dd677734fdbcd2397a2e35e9fae964
- THREAD_SHA1_HASH_MOD: 76cd06466d098060a9eb26e5fd2a25cb1f3fe0a3
- SYMBOL_NAME: ANALYSIS_INCONCLUSIVE
- FOLLOWUP_NAME: MachineOwner
- MODULE_NAME: Unknown_Module
- IMAGE_NAME: Unknown_Image
- DEBUG_FLR_IMAGE_TIMESTAMP: 0
- BUCKET_ID: BAD_STACK_0x109
- PRIMARY_PROBLEM_CLASS: BAD_STACK
- FAILURE_BUCKET_ID: BAD_STACK_0x109
- TARGET_TIME: 2017-01-25T00:45:27.000Z
- OSBUILD: 14393
- OSSERVICEPACK: 693
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 272
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2016-12-21 01:50:57
- BUILDDATESTAMP_STR: 161220-1747
- BUILDLAB_STR: rs1_release
- BUILDOSVER_STR: 10.0.14393.693
- ANALYSIS_SESSION_ELAPSED_TIME: 1b88
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:bad_stack_0x109
- FAILURE_ID_HASH: {b4d7023a-05c3-49b2-3ea4-6240fe57d90e}
- Followup: MachineOwner
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement