Advertisement
Guest User

Untitled

a guest
Aug 1st, 2017
118
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 44.65 KB | None | 0 0
  1. Microsoft (R) Windows Debugger Version 10.0.14321.1024 X86
  2. Copyright (c) Microsoft Corporation. All rights reserved.
  3.  
  4. Auto Dump Analyzer by gardenman
  5. Time to debug file(s): 00 hours and 06 minutes and 51 seconds
  6.  
  7. ========================================================================
  8. =================== Dump File: 073117-4906-01.dmp ====================
  9. ========================================================================
  10. Mini Kernel Dump File: Only registers and stack trace are available
  11. Windows 10 Kernel Version 15063 MP (4 procs) Free x64
  12. Product: WinNt, suite: TerminalServer SingleUserTS
  13. Built by: 15063.0.amd64fre.rs2_release.170317-1834
  14. Kernel base = 0xfffff802`0f013000 PsLoadedModuleList = 0xfffff802`0f35f5e0
  15. Debug session time: Mon Jul 31 06:24:08.660 2017 (UTC - 4:00)
  16. System Uptime: 0 days 0:58:23.301
  17.  
  18. BugCheck 3B, {c0000005, fffff8020f4c7e18, ffffc300119b41f0, 0}
  19. Probably caused by : memory_corruption
  20. Followup: memory_corruption
  21.  
  22. SYSTEM_SERVICE_EXCEPTION (3b)
  23. An exception happened while executing a system service routine.
  24.  
  25. Arguments:
  26. Arg1: 00000000c0000005, Exception code that caused the bugcheck
  27. Arg2: fffff8020f4c7e18, Address of the instruction which caused the bugcheck
  28. Arg3: ffffc300119b41f0, Address of the context record for the exception that caused the bugcheck
  29. Arg4: 0000000000000000, zero.
  30.  
  31. Debugging Details:
  32. DUMP_CLASS: 1
  33. DUMP_QUALIFIER: 400
  34. BUILD_VERSION_STRING: 10.0.15063.483 (WinBuild.160101.0800)
  35. SYSTEM_MANUFACTURER: MSI
  36. SYSTEM_PRODUCT_NAME: MS-7972
  37. SYSTEM_SKU: Default string
  38. SYSTEM_VERSION: 2.0
  39. BIOS_VENDOR: American Megatrends Inc.
  40. BIOS_VERSION: C.A0
  41. BIOS_DATE: 12/13/2016
  42. BASEBOARD_MANUFACTURER: MSI
  43. BASEBOARD_PRODUCT: B150M MORTAR (MS-7972)
  44. BASEBOARD_VERSION: 2.0
  45. DUMP_TYPE: 2
  46. EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
  47. FAULTING_IP:
  48. nt!MiRemoveSharedCommitNode+d8
  49. fffff802`0f4c7e18 48836f2001 sub qword ptr [rdi+20h],1
  50. CONTEXT: ffffc300119b41f0 -- (.cxr 0xffffc300119b41f0)
  51. rax=ffff96054603d7c0 rbx=ffff9605425cb6e1 rcx=ffffe70a8e00fe40
  52. rdx=0000000000000000 rsi=ffff960544fa3010 rdi=0000000000000000
  53. rip=fffff8020f4c7e18 rsp=ffffc300119b4be0 rbp=ffff960542797080
  54. r8=ffffe70a8e00fe88 r9=0000000000000000 r10=0000000000000003
  55. r11=0000000000000000 r12=0000000000000002 r13=0000000000000000
  56. r14=0000000000007fff r15=0000000000000000
  57. iopl=0 nv up ei pl zr na po nc
  58. cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246
  59. nt!MiRemoveSharedCommitNode+0xd8:
  60. fffff802`0f4c7e18 48836f2001 sub qword ptr [rdi+20h],1 ds:002b:00000000`00000020=????????????????
  61. Resetting default scope
  62. CPU_COUNT: 4
  63. CPU_MHZ: a98
  64. CPU_VENDOR: GenuineIntel
  65. CPU_FAMILY: 6
  66. CPU_MODEL: 5e
  67. CPU_STEPPING: 3
  68. CPU_MICROCODE: 6,5e,3,0 (F,M,S,R) SIG: A6'00000000 (cache) A6'00000000 (init)
  69. CUSTOMER_CRASH_COUNT: 1
  70. DEFAULT_BUCKET_ID: CODE_CORRUPTION
  71. BUGCHECK_STR: 0x3B
  72.  
  73. PROCESS_NAME: Wow-64.exe
  74.  
  75. CURRENT_IRQL: 0
  76. LAST_CONTROL_TRANSFER: from fffff8020f4c7e9c to fffff8020f4c7e18
  77. STACK_TEXT:
  78. ffffc300`119b4be0 fffff802`0f4c7e9c : ffff9605`42797080 00000000`00000002 ffff9605`00000003 ffff9605`00000001 : nt!MiRemoveSharedCommitNode+0xd8
  79. ffffc300`119b4c40 fffff802`0f4b6e48 : ffffe70a`8ed7a3f0 fffff802`00000000 00000000`00000000 ffffe70a`00000000 : nt!MiRemoveSharedCommitNode+0x15c
  80. ffffc300`119b4ca0 fffff802`0f4b8e6b : 00000000`00000000 fffff802`0f53d9d7 00000000`00000000 00000213`00150000 : nt!ObCloseHandleTableEntry+0x228
  81. ffffc300`119b4de0 fffff802`0f18a413 : ffff9605`42797080 00000000`00000000 00000000`00000000 00000000`000103ee : nt!NtClose+0xcb
  82. ffffc300`119b4e40 00007fff`35675584 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
  83. 00000099`7a2ff3d8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`35675584
  84. CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
  85. fffff8020f0a0d28 - nt!MiResolvePageTablePage+3b8
  86. [ f6:be ]
  87. fffff8020f0a0d49-fffff8020f0a0d4c 4 bytes - nt!MiResolvePageTablePage+3d9 (+0x21)
  88. [ be 7d fb f6:b7 6f df be ]
  89. fffff8020f0a4cc2-fffff8020f0a4cc3 2 bytes - nt!MiGetFreeOrZeroPage+72 (+0x3f79)
  90. [ 80 fa:00 ac ]
  91. fffff8020f293384-fffff8020f293385 2 bytes - nt!ExFreePoolWithTag+364
  92. [ fb f6:df be ]
  93. 9 errors : !nt (fffff8020f0a0d28-fffff8020f293385)
  94. MODULE_NAME: memory_corruption
  95.  
  96. IMAGE_NAME: memory_corruption
  97.  
  98. FOLLOWUP_NAME: memory_corruption
  99. DEBUG_FLR_IMAGE_TIMESTAMP: 0
  100. MEMORY_CORRUPTOR: LARGE
  101. STACK_COMMAND: .cxr 0xffffc300119b41f0 ; kb
  102. FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
  103. BUCKET_ID: MEMORY_CORRUPTION_LARGE
  104. PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
  105. TARGET_TIME: 2017-07-31T10:24:08.000Z
  106. OSBUILD: 15063
  107. OSSERVICEPACK: 483
  108. SERVICEPACK_NUMBER: 0
  109. OS_REVISION: 0
  110. SUITE_MASK: 272
  111. PRODUCT_TYPE: 1
  112. OSPLATFORM_TYPE: x64
  113. OSNAME: Windows 10
  114. OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
  115. USER_LCID: 0
  116. OSBUILD_TIMESTAMP: 2017-07-07 02:06:35
  117. BUILDDATESTAMP_STR: 160101.0800
  118. BUILDLAB_STR: WinBuild
  119. BUILDOSVER_STR: 10.0.15063.483
  120. ANALYSIS_SESSION_ELAPSED_TIME: 2a95
  121. ANALYSIS_SOURCE: KM
  122. FAILURE_ID_HASH_STRING: km:memory_corruption_large
  123. FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
  124. Followup: memory_corruption
  125.  
  126. =============================== Drivers ================================
  127. Image path: \SystemRoot\system32\drivers\peauth.sys
  128. Image name: peauth.sys
  129. Possible Info Link: http://www.carrona.org/drivers/driver.php?id=peauth.sys
  130. Possible Driver Info: Protected Environment Authentication and Authorization Export Driver (Microsoft)
  131. Timestamp: Sat Dec 9 1989
  132.  
  133. Image path: \??\C:\Windows\system32\drivers\rzpmgrk.sys
  134. Image name: rzpmgrk.sys
  135. Possible Info Link: http://www.carrona.org/drivers/driver.php?id=rzpmgrk.sys
  136. Timestamp: Thu Sep 17 2015
  137.  
  138. Image path: \??\C:\Windows\system32\drivers\rzpnk.sys
  139. Image name: rzpnk.sys
  140. Possible Info Link: http://www.carrona.org/drivers/driver.php?id=rzpnk.sys
  141. Possible Driver Info: Razer Overlay Support https://www.razerzone.com/
  142. Timestamp: Wed Sep 16 2015
  143.  
  144. Image path: \??\C:\ProgramData\Microsoft\Windows Defender\Definition Updates\{1B2D4795-2441-43D5-9D30-9B4A6E23672E}\MpKsl259562db.sys
  145. Image name: MpKsl259562db.sys
  146. Possible Info Link: http://www.carrona.org/drivers/driver.php?id=MpKsl259562db.sys
  147. Timestamp: Tue May 19 2015
  148.  
  149. Image path: \SystemRoot\system32\drivers\aswSnx.sys
  150. Image name: aswSnx.sys
  151. Possible Info Link: http://www.carrona.org/drivers/driver.php?id=aswSnx.sys
  152. Possible Driver Info: Avast Antivirus http://www.avast.com/
  153. Timestamp: Mon Jun 19 2017
  154.  
  155. Image path: \SystemRoot\system32\drivers\aswVmm.sys
  156. Image name: aswVmm.sys
  157. Possible Info Link: http://www.carrona.org/drivers/driver.php?id=aswVmm.sys
  158. Possible Driver Info: Avast Antivirus http://www.avast.com/
  159. Timestamp: Thu Jun 29 2017
  160.  
  161. Image path: \SystemRoot\system32\drivers\aswRvrt.sys
  162. Image name: aswRvrt.sys
  163. Possible Info Link: http://www.carrona.org/drivers/driver.php?id=aswRvrt.sys
  164. Possible Driver Info: Avast Antivirus http://www.avast.com/
  165. Timestamp: Mon Jun 19 2017
  166.  
  167. Image path: \SystemRoot\system32\drivers\aswbuniva.sys
  168. Image name: aswbuniva.sys
  169. Possible Info Link: http://www.carrona.org/drivers/driver.php?id=aswbuniva.sys
  170. Possible Driver Info: Avast Antivirus http://www.avast.com/
  171. Timestamp: Tue Jun 6 2017
  172.  
  173. Image path: \SystemRoot\system32\drivers\aswbloga.sys
  174. Image name: aswbloga.sys
  175. Possible Info Link: http://www.carrona.org/drivers/driver.php?id=aswbloga.sys
  176. Possible Driver Info: Avast Antivirus http://www.avast.com/
  177. Timestamp: Tue Jun 6 2017
  178.  
  179. Image path: \SystemRoot\system32\drivers\aswbidsha.sys
  180. Image name: aswbidsha.sys
  181. Possible Info Link: http://www.carrona.org/drivers/driver.php?id=aswbidsha.sys
  182. Possible Driver Info: Avast Antivirus http://www.avast.com/
  183. Timestamp: Tue Jun 6 2017
  184.  
  185. Image path: \SystemRoot\system32\drivers\aswStm.sys
  186. Image name: aswStm.sys
  187. Possible Info Link: http://www.carrona.org/drivers/driver.php?id=aswStm.sys
  188. Possible Driver Info: Avast Antivirus http://www.avast.com/
  189. Timestamp: Mon Jun 19 2017
  190.  
  191. Image path: \SystemRoot\system32\drivers\aswSP.sys
  192. Image name: aswSP.sys
  193. Possible Info Link: http://www.carrona.org/drivers/driver.php?id=aswSP.sys
  194. Possible Driver Info: Avast Antivirus http://www.avast.com/
  195. Timestamp: Thu Jun 22 2017
  196.  
  197. Image path: \SystemRoot\System32\Drivers\Null.SYS
  198. Image name: Null.SYS
  199. Possible Info Link: http://www.carrona.org/drivers/driver.php?id=Null.SYS
  200. Timestamp: unavailable (00000000)
  201.  
  202. Image path: \SystemRoot\system32\drivers\aswRdr2.sys
  203. Image name: aswRdr2.sys
  204. Possible Info Link: http://www.carrona.org/drivers/driver.php?id=aswRdr2.sys
  205. Possible Driver Info: Avast Antivirus http://www.avast.com/
  206. Timestamp: Mon Jun 19 2017
  207.  
  208. Image path: \SystemRoot\System32\Drivers\SCDEmu.SYS
  209. Image name: SCDEmu.SYS
  210. Possible Info Link: http://www.carrona.org/drivers/driver.php?id=SCDEmu.SYS
  211. Timestamp: Tue Jun 6 2017
  212.  
  213. Image path: \SystemRoot\system32\drivers\aswbidsdrivera.sys
  214. Image name: aswbidsdrivera.sys
  215. Possible Info Link: http://www.carrona.org/drivers/driver.php?id=aswbidsdrivera.sys
  216. Possible Driver Info: Avast IDS Application Activity Monitor Driver http://www.avast.com/
  217. Timestamp: Tue Jun 6 2017
  218.  
  219. Image path: \SystemRoot\System32\drivers\rzudd.sys
  220. Image name: rzudd.sys
  221. Possible Info Link: http://www.carrona.org/drivers/driver.php?id=rzudd.sys
  222. Timestamp: Wed Oct 26 2016
  223.  
  224. Image path: \SystemRoot\system32\drivers\aswMonFlt.sys
  225. Image name: aswMonFlt.sys
  226. Possible Info Link: http://www.carrona.org/drivers/driver.php?id=aswMonFlt.sys
  227. Timestamp: Thu Jun 22 2017
  228.  
  229. Image path: \SystemRoot\System32\drivers\TeeDriverW8x64.sys
  230. Image name: TeeDriverW8x64.sys
  231. Possible Info Link: http://www.carrona.org/drivers/driver.php?id=TeeDriverW8x64.sys
  232. Timestamp: Wed Nov 16 2016
  233.  
  234. Image path: \SystemRoot\System32\drivers\rt640x64.sys
  235. Image name: rt640x64.sys
  236. Possible Info Link: http://www.carrona.org/drivers/driver.php?id=rt640x64.sys
  237. Timestamp: Wed Oct 5 2016
  238.  
  239. Image path: \SystemRoot\system32\drivers\nvvad64v.sys
  240. Image name: nvvad64v.sys
  241. Possible Info Link: http://www.carrona.org/drivers/driver.php?id=nvvad64v.sys
  242. Timestamp: Wed Apr 5 2017
  243.  
  244. Image path: \SystemRoot\System32\drivers\nvvhci.sys
  245. Image name: nvvhci.sys
  246. Possible Info Link: http://www.carrona.org/drivers/driver.php?id=nvvhci.sys
  247. Timestamp: Tue Dec 27 2016
  248.  
  249. Image path: \SystemRoot\system32\drivers\nvhda64v.sys
  250. Image name: nvhda64v.sys
  251. Possible Info Link: http://www.carrona.org/drivers/driver.php?id=nvhda64v.sys
  252. Timestamp: Tue May 16 2017
  253.  
  254. Image path: \SystemRoot\System32\drivers\rzendpt.sys
  255. Image name: rzendpt.sys
  256. Possible Info Link: http://www.carrona.org/drivers/driver.php?id=rzendpt.sys
  257. Timestamp: Wed Oct 26 2016
  258.  
  259. Image path: \SystemRoot\System32\DriverStore\FileRepository\nv_dispi.inf_amd64_2d81f3535ced17c6\nvlddmkm.sys
  260. Image name: nvlddmkm.sys
  261. Possible Info Link: http://www.carrona.org/drivers/driver.php?id=nvlddmkm.sys
  262. Timestamp: Wed Jun 7 2017
  263.  
  264. Image path: \SystemRoot\System32\drivers\drmk.sys
  265. Image name: drmk.sys
  266. Possible Info Link: http://www.carrona.org/drivers/driver.php?id=drmk.sys
  267. Timestamp: ***** Invalid (A01C1986)
  268.  
  269. Image path: \SystemRoot\System32\TSDDD.dll
  270. Image name: TSDDD.dll
  271. Possible Info Link: http://www.carrona.org/drivers/driver.php?id=TSDDD.dll
  272. Timestamp: unavailable (00000000)
  273.  
  274. Unloaded modules:
  275. fffff80f`63af0000 fffff80f`63afb000 cldflt.sys
  276. fffff80f`62920000 fffff80f`6292f000 dump_storpor
  277. fffff80f`62960000 fffff80f`62987000 dump_storahc
  278. fffff80f`629b0000 fffff80f`629cd000 dump_dumpfve
  279. fffff80f`65f90000 fffff80f`65fb2000 i8042prt.sys
  280. fffff80f`637c0000 fffff80f`637e0000 dam.sys
  281. fffff80f`61720000 fffff80f`6172f000 WdBoot.sys
  282. fffff80f`627a0000 fffff80f`627af000 hwpolicy.sys
  283.  
  284. ============================= BIOS INFO ================================
  285. [SMBIOS Data Tables v3.0]
  286. [DMI Version - 0]
  287. [2.0 Calling Convention - No]
  288. [Table Size - 4067 bytes]
  289. [BIOS Information (Type 0) - Length 24 - Handle 0000h]
  290. Vendor American Megatrends Inc.
  291. BIOS Version C.A0
  292. BIOS Starting Address Segment f000
  293. BIOS Release Date 12/13/2016
  294. BIOS ROM Size 1000000
  295. BIOS Characteristics
  296. 07: - PCI Supported
  297. 11: - Upgradeable FLASH BIOS
  298. 12: - BIOS Shadowing Supported
  299. 15: - CD-Boot Supported
  300. 16: - Selectable Boot Supported
  301. 17: - BIOS ROM Socketed
  302. 19: - EDD Supported
  303. 23: - 1.2MB Floppy Supported
  304. 24: - 720KB Floppy Supported
  305. 25: - 2.88MB Floppy Supported
  306. 26: - Print Screen Device Supported
  307. 27: - Keyboard Services Supported
  308. 28: - Serial Services Supported
  309. 29: - Printer Services Supported
  310. 32: - BIOS Vendor Reserved
  311. BIOS Characteristic Extensions
  312. 00: - ACPI Supported
  313. 01: - USB Legacy Supported
  314. 08: - BIOS Boot Specification Supported
  315. 10: - Specification Reserved
  316. 11: - Specification Reserved
  317. BIOS Major Revision 5
  318. BIOS Minor Revision 12
  319. EC Firmware Major Revision 255
  320. EC Firmware Minor Revision 255
  321. [System Information (Type 1) - Length 27 - Handle 0001h]
  322. Manufacturer MSI
  323. Product Name MS-7972
  324. Version 2.0
  325. UUID 00000000-0000-0000-0000-000000000000
  326. Wakeup Type Power Switch
  327. SKUNumber Default string
  328. Family Default string
  329. [BaseBoard Information (Type 2) - Length 15 - Handle 0002h]
  330. Manufacturer MSI
  331. Product B150M MORTAR (MS-7972)
  332. Version 2.0
  333. Feature Flags 09h
  334. 1641226760: - ?ÿU?ì?ì¡H.æa3Å?Eü3ÀW?}?Eô?Eø?ÿu
  335. ¸@
  336. 1641226800: - ?ÿU?ì?ì¡H.æa3Å?Eü3ÀW?}?Eô?Eø?ÿu
  337. ¸@
  338. Location Default string
  339. Chassis Handle 0003h
  340. Board Type 0ah - Processor/Memory Module
  341. Number of Child Handles 0
  342. [System Enclosure (Type 3) - Length 22 - Handle 0003h]
  343. Manufacturer MSI
  344. Chassis Type Desktop
  345. Version 2.0
  346. Bootup State Safe
  347. Power Supply State Safe
  348. Thermal State Safe
  349. Security Status None
  350. OEM Defined 0
  351. Height 0U
  352. Number of Power Cords 1
  353. Number of Contained Elements 0
  354. Contained Element Size 3
  355. [OEM Strings (Type 11) - Length 5 - Handle 0021h]
  356. Number of Strings 1
  357. 1 Default string
  358. [System Configuration Options (Type 12) - Length 5 - Handle 0022h]
  359. [Physical Memory Array (Type 16) - Length 23 - Handle 003ch]
  360. Location 03h - SystemBoard/Motherboard
  361. Use 03h - System Memory
  362. Memory Error Correction 03h - None
  363. Maximum Capacity 67108864KB
  364. Number of Memory Devices 4
  365. [Memory Device (Type 17) - Length 40 - Handle 003dh]
  366. Physical Memory Array Handle 003ch
  367. Total Width 0 bits
  368. Data Width 0 bits
  369. Form Factor 02h - Unknown
  370. Device Locator ChannelA-DIMM0
  371. Bank Locator BANK 0
  372. Memory Type 02h - Unknown
  373. Type Detail 0000h -
  374. Speed 0MHz
  375. [Memory Device (Type 17) - Length 40 - Handle 003eh]
  376. Physical Memory Array Handle 003ch
  377. Total Width 0 bits
  378. Data Width 0 bits
  379. Form Factor 02h - Unknown
  380. Device Locator ChannelA-DIMM1
  381. Bank Locator BANK 1
  382. Memory Type 02h - Unknown
  383. Type Detail 0000h -
  384. Speed 0MHz
  385. [Memory Device (Type 17) - Length 40 - Handle 003fh]
  386. Physical Memory Array Handle 003ch
  387. Total Width 64 bits
  388. Data Width 64 bits
  389. Size 8192MB
  390. Form Factor 09h - DIMM
  391. Device Locator ChannelB-DIMM0
  392. Bank Locator BANK 2
  393. Memory Type 1ah - Specification Reserved
  394. Type Detail 0080h - Synchronous
  395. Speed 2133MHz
  396. Manufacturer Kingston
  397. Part Number 9905625-062.A00G
  398. [Memory Device (Type 17) - Length 40 - Handle 0040h]
  399. Physical Memory Array Handle 003ch
  400. Total Width 0 bits
  401. Data Width 0 bits
  402. Form Factor 02h - Unknown
  403. Device Locator ChannelB-DIMM1
  404. Bank Locator BANK 3
  405. Memory Type 02h - Unknown
  406. Type Detail 0000h -
  407. Speed 0MHz
  408. [Memory Array Mapped Address (Type 19) - Length 31 - Handle 0041h]
  409. Starting Address 00000000h
  410. Ending Address 007fffffh
  411. Memory Array Handle 003ch
  412. Partition Width 01
  413. [Cache Information (Type 7) - Length 19 - Handle 0042h]
  414. Socket Designation L1 Cache
  415. Cache Configuration 0180h - WB Enabled Int NonSocketed L1
  416. Maximum Cache Size 0100h - 256K
  417. Installed Size 0100h - 256K
  418. Supported SRAM Type 0020h - Synchronous
  419. Current SRAM Type 0020h - Synchronous
  420. Cache Speed 0ns
  421. Error Correction Type ParitySingle-Bit ECC
  422. System Cache Type Unified
  423. Associativity 8-way Set-Associative
  424. [Cache Information (Type 7) - Length 19 - Handle 0043h]
  425. Socket Designation L2 Cache
  426. Cache Configuration 0181h - WB Enabled Int NonSocketed L2
  427. Maximum Cache Size 0400h - 1024K
  428. Installed Size 0400h - 1024K
  429. Supported SRAM Type 0020h - Synchronous
  430. Current SRAM Type 0020h - Synchronous
  431. Cache Speed 0ns
  432. Error Correction Type Multi-Bit ECC
  433. System Cache Type Unified
  434. Associativity 4-way Set-Associative
  435. [Cache Information (Type 7) - Length 19 - Handle 0044h]
  436. Socket Designation L3 Cache
  437. Cache Configuration 0182h - WB Enabled Int NonSocketed L3
  438. Maximum Cache Size 1800h - 6144K
  439. Installed Size 1800h - 6144K
  440. Supported SRAM Type 0020h - Synchronous
  441. Current SRAM Type 0020h - Synchronous
  442. Cache Speed 0ns
  443. Error Correction Type Specification Reserved
  444. System Cache Type Unified
  445. Associativity Specification Reserved
  446. [Processor Information (Type 4) - Length 48 - Handle 0045h]
  447. Socket Designation U3E1
  448. Processor Type Central Processor
  449. Processor Family cdh - Specification Reserved
  450. Processor Manufacturer Intel(R) Corporation
  451. Processor ID e3060500fffbebbf
  452. Processor Version Intel(R) Core(TM) i5-6400 CPU @ 2.70GHz
  453. Processor Voltage 89h - 0.9V
  454. External Clock 100MHz
  455. Max Speed 8300MHz
  456. Current Speed 2700MHz
  457. Status Enabled Populated
  458. Processor Upgrade Other
  459. L1 Cache Handle 0042h
  460. L2 Cache Handle 0043h
  461. L3 Cache Handle 0044h
  462. [Memory Device Mapped Address (Type 20) - Length 35 - Handle 0046h]
  463. Starting Address 00000000h
  464. Ending Address 007fffffh
  465. Memory Device Handle 003fh
  466. Mem Array Mapped Adr Handle 0041h
  467. Interleave Position [None]
  468. Interleave Data Depth [None]
  469.  
  470. ========================================================================
  471. =================== Dump File: 080117-4328-01.dmp ====================
  472. ========================================================================
  473. Mini Kernel Dump File: Only registers and stack trace are available
  474. Windows 10 Kernel Version 15063 MP (4 procs) Free x64
  475. Product: WinNt, suite: TerminalServer SingleUserTS
  476. Built by: 15063.0.amd64fre.rs2_release.170317-1834
  477. Kernel base = 0xfffff801`b509b000 PsLoadedModuleList = 0xfffff801`b53e75e0
  478. Debug session time: Tue Aug 1 09:33:16.399 2017 (UTC - 4:00)
  479. System Uptime: 0 days 0:12:21.040
  480.  
  481. BugCheck 139, {3, ffff8680b21fa500, ffff8680b21fa458, 0}
  482. Probably caused by : ntkrnlmp.exe ( nt!KiSwapThread+156d3e )
  483. Followup: MachineOwner
  484.  
  485. KERNEL_SECURITY_CHECK_FAILURE (139)
  486. A kernel component has corrupted a critical data structure. The corruption
  487. could potentially allow a malicious user to gain control of this machine.
  488.  
  489. Arguments:
  490. Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
  491. Arg2: ffff8680b21fa500, Address of the trap frame for the exception that caused the bugcheck
  492. Arg3: ffff8680b21fa458, Address of the exception record for the exception that caused the bugcheck
  493. Arg4: 0000000000000000, Reserved
  494.  
  495. Debugging Details:
  496. DUMP_CLASS: 1
  497. DUMP_QUALIFIER: 400
  498. BUILD_VERSION_STRING: 10.0.15063.483 (WinBuild.160101.0800)
  499. SYSTEM_MANUFACTURER: MSI
  500. SYSTEM_PRODUCT_NAME: MS-7972
  501. SYSTEM_SKU: Default string
  502. SYSTEM_VERSION: 2.0
  503. BIOS_VENDOR: American Megatrends Inc.
  504. BIOS_VERSION: C.A0
  505. BIOS_DATE: 12/13/2016
  506. BASEBOARD_MANUFACTURER: MSI
  507. BASEBOARD_PRODUCT: B150M MORTAR (MS-7972)
  508. BASEBOARD_VERSION: 2.0
  509. DUMP_TYPE: 2
  510. TRAP_FRAME: ffff8680b21fa500 -- (.trap 0xffff8680b21fa500)
  511. NOTE: The trap frame does not contain all registers.
  512. Some register values may be zeroed or incorrect.
  513. rax=ffffdb8b475861a0 rbx=0000000000000000 rcx=0000000000000003
  514. rdx=ffffdb8b48fb71a0 rsi=0000000000000000 rdi=0000000000000000
  515. rip=fffff801b522566e rsp=ffff8680b21fa690 rbp=0000000000000000
  516. r8=00000000000011e0 r9=000000000000007f r10=fffff801b427e800
  517. r11=fffff801b509b000 r12=0000000000000000 r13=0000000000000000
  518. r14=0000000000000000 r15=0000000000000000
  519. iopl=0 nv up ei ng nz na po cy
  520. nt!KiSwapThread+0x156d3e:
  521. fffff801`b522566e cd29 int 29h
  522. Resetting default scope
  523. EXCEPTION_RECORD: ffff8680b21fa458 -- (.exr 0xffff8680b21fa458)
  524. ExceptionAddress: fffff801b522566e (nt!KiSwapThread+0x0000000000156d3e)
  525. ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  526. ExceptionFlags: 00000001
  527. NumberParameters: 1
  528. Parameter[0]: 0000000000000003
  529. Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
  530. CPU_COUNT: 4
  531. CPU_MHZ: a98
  532. CPU_VENDOR: GenuineIntel
  533. CPU_FAMILY: 6
  534. CPU_MODEL: 5e
  535. CPU_STEPPING: 3
  536. CPU_MICROCODE: 6,5e,3,0 (F,M,S,R) SIG: A6'00000000 (cache) A6'00000000 (init)
  537. CUSTOMER_CRASH_COUNT: 1
  538. DEFAULT_BUCKET_ID: LIST_ENTRY_CORRUPT
  539. BUGCHECK_STR: 0x139
  540.  
  541. PROCESS_NAME: RazerIngameEngine.exe
  542.  
  543. CURRENT_IRQL: 2
  544. ERROR_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.
  545. EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.
  546. EXCEPTION_CODE_STR: c0000409
  547. EXCEPTION_PARAMETER1: 0000000000000003
  548. LAST_CONTROL_TRANSFER: from fffff801b52128a9 to fffff801b52074c0
  549. STACK_TEXT:
  550. ffff8680`b21fa1d8 fffff801`b52128a9 : 00000000`00000139 00000000`00000003 ffff8680`b21fa500 ffff8680`b21fa458 : nt!KeBugCheckEx
  551. ffff8680`b21fa1e0 fffff801`b5212c10 : ffff8680`b21fa3e4 00000000`00000001 00000000`00000000 fffff801`b553cd98 : nt!KiBugCheckDispatch+0x69
  552. ffff8680`b21fa320 fffff801`b5211bf7 : 00000000`00000206 fffff801`b520c62f 00000000`00000000 ffffdb8b`4732e080 : nt!KiFastFailDispatch+0xd0
  553. ffff8680`b21fa500 fffff801`b522566e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0xf7
  554. ffff8680`b21fa690 fffff801`b50ce461 : ffffdb8b`48fb7080 ffff8680`b21fa8d8 ffffdb8b`48a60f98 00000000`00000000 : nt!KiSwapThread+0x156d3e
  555. ffff8680`b21fa740 fffff801`b50cb717 : cb8b4816`0000007f ffff8680`00000000 00000000`00000200 ffff8680`b21fa900 : nt!KiCommitThreadWait+0x101
  556. ffff8680`b21fa7e0 fffff801`b50fd24a : ffffdb8b`45824e60 ffff8680`b21fa8f0 ffffdb8b`00010224 fffff801`b51b0e60 : nt!ExpWaitForResource+0x207
  557. ffff8680`b21fa890 fffff801`b50fc7ff : ffff8680`b60aa902 ffff8680`b0687180 ffffdb8b`47666080 ffff8680`b60aa960 : nt!ExpAcquireResourceExclusiveLite+0x2da
  558. ffff8680`b21fa960 fffffc9d`403d1f1c : ffffdb8b`47a561a0 00000000`00286978 00000000`0258fda0 00000000`65404600 : nt!ExEnterCriticalRegionAndAcquireResourceExclusive+0x3f
  559. ffff8680`b21fa9a0 fffffc9d`4004df18 : ffffdb8b`48fb7080 00000000`00000000 00000000`00000000 fffffc9d`00000000 : win32kbase!EnterCrit+0x3c
  560. ffff8680`b21fa9e0 fffff801`b5212413 : ffffdb8b`48fb7080 00000000`654179c0 00000000`00000020 ffffdb8b`48fb7080 : win32kfull!NtUserGetMessage+0x48
  561. ffff8680`b21faa80 00000000`65421944 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
  562. 00000000`0258e388 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x65421944
  563. STACK_COMMAND: kb
  564. THREAD_SHA1_HASH_MOD_FUNC: ba9132b879f60185aba6620b04184951d0474243
  565. THREAD_SHA1_HASH_MOD_FUNC_OFFSET: a534fba0b95f062817f71b7f5119ead814716250
  566. THREAD_SHA1_HASH_MOD: 1de07d66ed7162da15ace3085054b552e9d9297f
  567. FOLLOWUP_IP:
  568. nt!KiSwapThread+156d3e
  569. fffff801`b522566e cd29 int 29h
  570. FAULT_INSTR_CODE: 844529cd
  571. SYMBOL_STACK_INDEX: 4
  572. SYMBOL_NAME: nt!KiSwapThread+156d3e
  573. FOLLOWUP_NAME: MachineOwner
  574. MODULE_NAME: nt
  575.  
  576. IMAGE_NAME: ntkrnlmp.exe
  577.  
  578. DEBUG_FLR_IMAGE_TIMESTAMP: 595f24eb
  579. IMAGE_VERSION: 10.0.15063.483
  580. BUCKET_ID_FUNC_OFFSET: 156d3e
  581. FAILURE_BUCKET_ID: 0x139_3_KTIMER_LIST_CORRUPTION_nt!KiSwapThread
  582. BUCKET_ID: 0x139_3_KTIMER_LIST_CORRUPTION_nt!KiSwapThread
  583. PRIMARY_PROBLEM_CLASS: 0x139_3_KTIMER_LIST_CORRUPTION_nt!KiSwapThread
  584. TARGET_TIME: 2017-08-01T13:33:16.000Z
  585. OSBUILD: 15063
  586. OSSERVICEPACK: 483
  587. SERVICEPACK_NUMBER: 0
  588. OS_REVISION: 0
  589. SUITE_MASK: 272
  590. PRODUCT_TYPE: 1
  591. OSPLATFORM_TYPE: x64
  592. OSNAME: Windows 10
  593. OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
  594. USER_LCID: 0
  595. OSBUILD_TIMESTAMP: 2017-07-07 02:06:35
  596. BUILDDATESTAMP_STR: 160101.0800
  597. BUILDLAB_STR: WinBuild
  598. BUILDOSVER_STR: 10.0.15063.483
  599. ANALYSIS_SESSION_ELAPSED_TIME: 2a0d
  600. ANALYSIS_SOURCE: KM
  601. FAILURE_ID_HASH_STRING: km:0x139_3_ktimer_list_corruption_nt!kiswapthread
  602. FAILURE_ID_HASH: {028233d4-8e10-bd5f-102e-97b9e820be9f}
  603. Followup: MachineOwner
  604.  
  605. ========================================================================
  606. =================== Dump File: 080117-4500-01.dmp ====================
  607. ========================================================================
  608. Mini Kernel Dump File: Only registers and stack trace are available
  609. Windows 10 Kernel Version 15063 MP (4 procs) Free x64
  610. Product: WinNt, suite: TerminalServer SingleUserTS
  611. Built by: 15063.0.amd64fre.rs2_release.170317-1834
  612. Kernel base = 0xfffff802`de801000 PsLoadedModuleList = 0xfffff802`deb4d5e0
  613. Debug session time: Tue Aug 1 09:20:28.891 2017 (UTC - 4:00)
  614. System Uptime: 0 days 18:48:39.532
  615.  
  616. BugCheck 139, {3, ffffe7815c75c930, ffffe7815c75c888, 0}
  617. Probably caused by : ntkrnlmp.exe ( nt!KiSwapThread+156d3e )
  618. Followup: MachineOwner
  619.  
  620. KERNEL_SECURITY_CHECK_FAILURE (139)
  621. A kernel component has corrupted a critical data structure. The corruption
  622. could potentially allow a malicious user to gain control of this machine.
  623.  
  624. Arguments:
  625. Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
  626. Arg2: ffffe7815c75c930, Address of the trap frame for the exception that caused the bugcheck
  627. Arg3: ffffe7815c75c888, Address of the exception record for the exception that caused the bugcheck
  628. Arg4: 0000000000000000, Reserved
  629.  
  630. Debugging Details:
  631. DUMP_CLASS: 1
  632. DUMP_QUALIFIER: 400
  633. BUILD_VERSION_STRING: 10.0.15063.483 (WinBuild.160101.0800)
  634. SYSTEM_MANUFACTURER: MSI
  635. SYSTEM_PRODUCT_NAME: MS-7972
  636. SYSTEM_SKU: Default string
  637. SYSTEM_VERSION: 2.0
  638. BIOS_VENDOR: American Megatrends Inc.
  639. BIOS_VERSION: C.A0
  640. BIOS_DATE: 12/13/2016
  641. BASEBOARD_MANUFACTURER: MSI
  642. BASEBOARD_PRODUCT: B150M MORTAR (MS-7972)
  643. BASEBOARD_VERSION: 2.0
  644. DUMP_TYPE: 2
  645. TRAP_FRAME: ffffe7815c75c930 -- (.trap 0xffffe7815c75c930)
  646. NOTE: The trap frame does not contain all registers.
  647. Some register values may be zeroed or incorrect.
  648. rax=ffff96002b8fd1a0 rbx=0000000000000000 rcx=0000000000000003
  649. rdx=ffff9600306078e0 rsi=0000000000000000 rdi=0000000000000000
  650. rip=fffff802de98b66e rsp=ffffe7815c75cac0 rbp=0000000000000000
  651. r8=0000000000000440 r9=0000000000000012 r10=fffff802ddab4800
  652. r11=fffff802de801000 r12=0000000000000000 r13=0000000000000000
  653. r14=0000000000000000 r15=0000000000000000
  654. iopl=0 nv up ei pl nz na po nc
  655. nt!KiSwapThread+0x156d3e:
  656. fffff802`de98b66e cd29 int 29h
  657. Resetting default scope
  658. EXCEPTION_RECORD: ffffe7815c75c888 -- (.exr 0xffffe7815c75c888)
  659. ExceptionAddress: fffff802de98b66e (nt!KiSwapThread+0x0000000000156d3e)
  660. ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  661. ExceptionFlags: 00000001
  662. NumberParameters: 1
  663. Parameter[0]: 0000000000000003
  664. Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
  665. CPU_COUNT: 4
  666. CPU_MHZ: a98
  667. CPU_VENDOR: GenuineIntel
  668. CPU_FAMILY: 6
  669. CPU_MODEL: 5e
  670. CPU_STEPPING: 3
  671. CPU_MICROCODE: 6,5e,3,0 (F,M,S,R) SIG: A6'00000000 (cache) A6'00000000 (init)
  672. CUSTOMER_CRASH_COUNT: 1
  673. DEFAULT_BUCKET_ID: LIST_ENTRY_CORRUPT
  674. BUGCHECK_STR: 0x139
  675.  
  676. PROCESS_NAME: RazerIngameEngine.exe
  677.  
  678. CURRENT_IRQL: 2
  679. ERROR_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.
  680. EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.
  681. EXCEPTION_CODE_STR: c0000409
  682. EXCEPTION_PARAMETER1: 0000000000000003
  683. LAST_CONTROL_TRANSFER: from fffff802de9788a9 to fffff802de96d4c0
  684. STACK_TEXT:
  685. ffffe781`5c75c608 fffff802`de9788a9 : 00000000`00000139 00000000`00000003 ffffe781`5c75c930 ffffe781`5c75c888 : nt!KeBugCheckEx
  686. ffffe781`5c75c610 fffff802`de978c10 : ffff9600`00000000 ffffd18f`00000000 ffff9600`2b4314c0 00000000`00000000 : nt!KiBugCheckDispatch+0x69
  687. ffffe781`5c75c750 fffff802`de977bf7 : 00000000`00000206 fffff802`de97262f 00000000`00000000 fffff802`decb8147 : nt!KiFastFailDispatch+0xd0
  688. ffffe781`5c75c930 fffff802`de98b66e : ffffd18f`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0xf7
  689. ffffe781`5c75cac0 fffff802`de834461 : ffff9600`306077c0 ffffe781`5c75cd48 ffff9600`2f0fd198 ffffd18f`00000000 : nt!KiSwapThread+0x156d3e
  690. ffffe781`5c75cb70 fffff802`de831717 : 00000000`00000012 ffffe781`00000000 00000004`eed00000 ffffe781`5c75cd30 : nt!KiCommitThreadWait+0x101
  691. ffffe781`5c75cc10 fffff802`de86324a : ffff9600`2f02b5c0 ffffe781`5c75cd20 ffffd18f`00010224 fffff802`de916e60 : nt!ExpWaitForResource+0x207
  692. ffffe781`5c75ccc0 fffff802`de8627ff : 00000000`0322f402 00000000`0303cbc8 00000000`00f4a000 00000000`0303cc30 : nt!ExpAcquireResourceExclusiveLite+0x2da
  693. ffffe781`5c75cd90 ffffa95e`08dd1f1c : ffff9600`2e126390 00000000`0028697a 00000000`0303cc30 00000000`00000401 : nt!ExEnterCriticalRegionAndAcquireResourceExclusive+0x3f
  694. ffffe781`5c75cdd0 ffffa95e`08a3d3df : 00000000`0000004a 00000000`716168f0 00000000`0303fda0 00000000`00f4a000 : win32kbase!EnterCrit+0x3c
  695. ffffe781`5c75ce10 fffff802`de978413 : ffff9600`306077c0 ffffe781`5c75cec0 00000000`00000006 ffff9600`306077c0 : win32kfull!NtUserCallOneParam+0x1f
  696. ffffe781`5c75ce40 00000000`716218c4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
  697. 00000000`0303cc38 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x716218c4
  698. STACK_COMMAND: kb
  699. THREAD_SHA1_HASH_MOD_FUNC: 730fa72e5935382b6bef8db1f6f5821dd1d418cf
  700. THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 09e78b6312bc4c15c7cf3f5def76e8f2861dff23
  701. THREAD_SHA1_HASH_MOD: 1de07d66ed7162da15ace3085054b552e9d9297f
  702. FOLLOWUP_IP:
  703. nt!KiSwapThread+156d3e
  704. fffff802`de98b66e cd29 int 29h
  705. FAULT_INSTR_CODE: 844529cd
  706. SYMBOL_STACK_INDEX: 4
  707. SYMBOL_NAME: nt!KiSwapThread+156d3e
  708. FOLLOWUP_NAME: MachineOwner
  709. MODULE_NAME: nt
  710.  
  711. IMAGE_NAME: ntkrnlmp.exe
  712.  
  713. DEBUG_FLR_IMAGE_TIMESTAMP: 595f24eb
  714. IMAGE_VERSION: 10.0.15063.483
  715. BUCKET_ID_FUNC_OFFSET: 156d3e
  716. FAILURE_BUCKET_ID: 0x139_3_KTIMER_LIST_CORRUPTION_nt!KiSwapThread
  717. BUCKET_ID: 0x139_3_KTIMER_LIST_CORRUPTION_nt!KiSwapThread
  718. PRIMARY_PROBLEM_CLASS: 0x139_3_KTIMER_LIST_CORRUPTION_nt!KiSwapThread
  719. TARGET_TIME: 2017-08-01T13:20:28.000Z
  720. OSBUILD: 15063
  721. OSSERVICEPACK: 483
  722. SERVICEPACK_NUMBER: 0
  723. OS_REVISION: 0
  724. SUITE_MASK: 272
  725. PRODUCT_TYPE: 1
  726. OSPLATFORM_TYPE: x64
  727. OSNAME: Windows 10
  728. OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
  729. USER_LCID: 0
  730. OSBUILD_TIMESTAMP: 2017-07-07 02:06:35
  731. BUILDDATESTAMP_STR: 160101.0800
  732. BUILDLAB_STR: WinBuild
  733. BUILDOSVER_STR: 10.0.15063.483
  734. ANALYSIS_SESSION_ELAPSED_TIME: 26a2
  735. ANALYSIS_SOURCE: KM
  736. FAILURE_ID_HASH_STRING: km:0x139_3_ktimer_list_corruption_nt!kiswapthread
  737. FAILURE_ID_HASH: {028233d4-8e10-bd5f-102e-97b9e820be9f}
  738. Followup: MachineOwner
  739.  
  740. ========================================================================
  741. =================== Dump File: 072817-4187-01.dmp ====================
  742. ========================================================================
  743. Mini Kernel Dump File: Only registers and stack trace are available
  744. Windows 10 Kernel Version 15063 MP (4 procs) Free x64
  745. Product: WinNt, suite: TerminalServer SingleUserTS
  746. Built by: 15063.0.amd64fre.rs2_release.170317-1834
  747. Kernel base = 0xfffff803`92408000 PsLoadedModuleList = 0xfffff803`927545e0
  748. Debug session time: Fri Jul 28 10:43:41.592 2017 (UTC - 4:00)
  749. System Uptime: 0 days 0:17:19.233
  750.  
  751. BugCheck 154, {ffffb80e2c788000, ffff918085b62780, 1, 0}
  752. *** WARNING: Unable to verify timestamp for win32k.sys
  753. *** ERROR: Module load completed but symbols could not be loaded for win32k.sys
  754. Probably caused by : memory_corruption
  755. Followup: memory_corruption
  756.  
  757. UNEXPECTED_STORE_EXCEPTION (154)
  758. The store component caught an unexpected exception.
  759.  
  760. Arguments:
  761. Arg1: ffffb80e2c788000, Pointer to the store context or data manager
  762. Arg2: ffff918085b62780, Exception information
  763. Arg3: 0000000000000001, Reserved
  764. Arg4: 0000000000000000, Reserved
  765.  
  766. Debugging Details:
  767. DUMP_CLASS: 1
  768. DUMP_QUALIFIER: 400
  769. BUILD_VERSION_STRING: 10.0.15063.483 (WinBuild.160101.0800)
  770. SYSTEM_MANUFACTURER: MSI
  771. SYSTEM_PRODUCT_NAME: MS-7972
  772. SYSTEM_SKU: Default string
  773. SYSTEM_VERSION: 2.0
  774. BIOS_VENDOR: American Megatrends Inc.
  775. BIOS_VERSION: C.A0
  776. BIOS_DATE: 12/13/2016
  777. BASEBOARD_MANUFACTURER: MSI
  778. BASEBOARD_PRODUCT: B150M MORTAR (MS-7972)
  779. BASEBOARD_VERSION: 2.0
  780. DUMP_TYPE: 2
  781. EXCEPTION_RECORD: ffff918085b636c8 -- (.exr 0xffff918085b636c8)
  782. ExceptionAddress: fffff803924e143f (nt!SMKM_STORE<SM_TRAITS>::SmStUnmapVirtualRegion+0x00000000000000cf)
  783. ExceptionCode: c0000005 (Access violation)
  784. ExceptionFlags: 00000000
  785. NumberParameters: 2
  786. Parameter[0]: 0000000000000000
  787. Parameter[1]: 0000000000000000
  788. Attempt to read from address 0000000000000000
  789. EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
  790. FAULTING_IP:
  791. nt!SMKM_STORE<SM_TRAITS>::SmStUnmapVirtualRegion+cf
  792. fffff803`924e143f 488b08 mov rcx,qword ptr [rax]
  793. FOLLOWUP_IP:
  794. nt!SMKM_STORE<SM_TRAITS>::SmStUnmapVirtualRegion+cf
  795. fffff803`924e143f 488b08 mov rcx,qword ptr [rax]
  796. EXCEPTION_PARAMETER1: 0000000000000000
  797. EXCEPTION_PARAMETER2: 0000000000000000
  798. CONTEXT: ffff918085b62f10 -- (.cxr 0xffff918085b62f10)
  799. rax=0000000000000000 rbx=ffffb80e2c7898b0 rcx=0000000000000000
  800. rdx=fffff803927ff430 rsi=0000000000000a56 rdi=0000000000000000
  801. rip=fffff803924e143f rsp=ffff918085b63900 rbp=ffffb80e2c788000
  802. r8=ffffb80e2c7898b0 r9=ffffb80e2c7b3100 r10=ffffb80e2c7b30b0
  803. r11=00000000ffffffff r12=0000000000001fff r13=00000000ffffffff
  804. r14=ffffb80e2b95e000 r15=0000000000000000
  805. iopl=0 nv up ei pl zr na po nc
  806. cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246
  807. nt!SMKM_STORE<SM_TRAITS>::SmStUnmapVirtualRegion+0xcf:
  808. fffff803`924e143f 488b08 mov rcx,qword ptr [rax] ds:002b:00000000`00000000=????????????????
  809. Resetting default scope
  810. CPU_COUNT: 4
  811. CPU_MHZ: a98
  812. CPU_VENDOR: GenuineIntel
  813. CPU_FAMILY: 6
  814. CPU_MODEL: 5e
  815. CPU_STEPPING: 3
  816. CPU_MICROCODE: 6,5e,3,0 (F,M,S,R) SIG: A6'00000000 (cache) A6'00000000 (init)
  817. CUSTOMER_CRASH_COUNT: 1
  818. DEFAULT_BUCKET_ID: CODE_CORRUPTION
  819.  
  820. PROCESS_NAME: MemCompression
  821.  
  822. CURRENT_IRQL: 0
  823. ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
  824. EXCEPTION_CODE_STR: c0000005
  825. READ_ADDRESS: fffff803927e9358: Unable to get MiVisibleState
  826. 0000000000000000
  827. BUGCHECK_STR: 0x154_c0000005
  828. LAST_CONTROL_TRANSFER: from fffff803924e2d8f to fffff803924e143f
  829. STACK_TEXT:
  830. ffff9180`85b63900 fffff803`924e2d8f : 00000000`00000a56 00000000`ffffffff 00000000`ffffffff ffffb80e`2c788050 : nt!SMKM_STORE<SM_TRAITS>::SmStUnmapVirtualRegion+0xcf
  831. ffff9180`85b63930 fffff803`924d871a : ffffb80e`2c788050 ffff9180`85b639b0 00000000`00000000 ffffb80e`00000000 : nt!ST_STORE<SM_TRAITS>::StUnlockAndUnmapRegion+0x7b
  832. ffff9180`85b63970 fffff803`924d865e : 00000000`00000008 00000000`00000103 ffffb80e`2c788050 00000004`00000000 : nt!ST_STORE<SM_TRAITS>::StDmCurrentRegionSet+0x9e
  833. ffff9180`85b639d0 fffff803`924d0a60 : ffffb80e`2c788000 ffff9180`85b63a70 00000000`00000002 fffff803`00000000 : nt!ST_STORE<SM_TRAITS>::StDmInvalidateCurrentRegions+0x32
  834. ffff9180`85b63a00 fffff803`92522297 : ffffb80e`2c789650 ffff9180`85b63b18 ffff9180`85b63a71 fffff803`924d933b : nt!ST_STORE<SM_TRAITS>::StWorkItemProcess+0x1d8
  835. ffff9180`85b63a50 fffff803`924d0394 : ffffb80e`2c788000 ffff9180`85b63b18 7fffffff`fffffffc ffffb80e`00000000 : nt!ST_STORE<SM_TRAITS>::StLazyWorkMgrRunExpiredWork+0xe7
  836. ffff9180`85b63aa0 fffff803`92522fe1 : 00000000`00000102 00000000`00000000 00000000`00000000 00000000`00000000 : nt!SMKM_STORE<SM_TRAITS>::SmStWorker+0x60c
  837. ffff9180`85b63b60 fffff803`924e4ac7 : ffffb80e`2c788000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!SMKM_STORE<SM_TRAITS>::SmStWorkerThread+0x11
  838. ffff9180`85b63b90 fffff803`92579946 : fffff803`916eb180 ffffb80e`2b9d7080 fffff803`924e4a80 00000000`00000000 : nt!PspSystemThreadStartup+0x47
  839. ffff9180`85b63be0 00000000`00000000 : ffff9180`85b64000 ffff9180`85b5d000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
  840. CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
  841. fffff803924900ef - nt!MiGetNextPageTable+19f
  842. [ f6:d9 ]
  843. fffff80392490122 - nt!MiGetNextPageTable+1d2 (+0x33)
  844. [ f6:d9 ]
  845. fffff8039249d817 - nt!MiPfnShareCountIsZero+187 (+0xd6f5)
  846. [ f6:d9 ]
  847. fffff8039249ffd2-fffff8039249ffd3 2 bytes - nt!MiDeletePteList+592 (+0x27bb)
  848. [ 80 fa:00 85 ]
  849. 5 errors : !nt (fffff803924900ef-fffff8039249ffd3)
  850. MODULE_NAME: memory_corruption
  851.  
  852. IMAGE_NAME: memory_corruption
  853.  
  854. FOLLOWUP_NAME: memory_corruption
  855. DEBUG_FLR_IMAGE_TIMESTAMP: 0
  856. MEMORY_CORRUPTOR: LARGE
  857. STACK_COMMAND: .cxr 0xffff918085b62f10 ; kb
  858. FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
  859. BUCKET_ID: MEMORY_CORRUPTION_LARGE
  860. PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
  861. TARGET_TIME: 2017-07-28T14:43:41.000Z
  862. OSBUILD: 15063
  863. OSSERVICEPACK: 483
  864. SERVICEPACK_NUMBER: 0
  865. OS_REVISION: 0
  866. SUITE_MASK: 272
  867. PRODUCT_TYPE: 1
  868. OSPLATFORM_TYPE: x64
  869. OSNAME: Windows 10
  870. OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
  871. USER_LCID: 0
  872. OSBUILD_TIMESTAMP: 2017-07-07 02:06:35
  873. BUILDDATESTAMP_STR: 160101.0800
  874. BUILDLAB_STR: WinBuild
  875. BUILDOSVER_STR: 10.0.15063.483
  876. ANALYSIS_SESSION_ELAPSED_TIME: 28fc
  877. ANALYSIS_SOURCE: KM
  878. FAILURE_ID_HASH_STRING: km:memory_corruption_large
  879. FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
  880. Followup: memory_corruption
  881.  
  882. ========================================================================
  883. =================== Dump File: 073117-4296-01.dmp ====================
  884. ========================================================================
  885. Mini Kernel Dump File: Only registers and stack trace are available
  886. Windows 10 Kernel Version 15063 MP (4 procs) Free x64
  887. Product: WinNt, suite: TerminalServer SingleUserTS
  888. Built by: 15063.0.amd64fre.rs2_release.170317-1834
  889. Kernel base = 0xfffff801`96681000 PsLoadedModuleList = 0xfffff801`969cd5e0
  890. Debug session time: Mon Jul 31 14:31:26.823 2017 (UTC - 4:00)
  891. System Uptime: 0 days 8:06:51.464
  892.  
  893. BugCheck 18, {0, ffffbd82eef20a70, 2, ffffffffffffffff}
  894. Probably caused by : memory_corruption
  895. Followup: memory_corruption
  896.  
  897. REFERENCE_BY_POINTER (18)
  898.  
  899. Arguments:
  900. Arg1: 0000000000000000, Object type of the object whose reference count is being lowered
  901. Arg2: ffffbd82eef20a70, Object whose reference count is being lowered
  902. Arg3: 0000000000000002, Reserved
  903. Arg4: ffffffffffffffff, Reserved
  904. The reference count of an object is illegal for the current state of the object.
  905. Each time a driver uses a pointer to an object the driver calls a kernel routine
  906. to increment the reference count of the object. When the driver is done with the
  907. pointer the driver calls another kernel routine to decrement the reference count.
  908. Drivers must match calls to the increment and decrement routines. This bugcheck
  909. can occur because an object's reference count goes to zero while there are still
  910. open handles to the object, in which case the fourth parameter indicates the number
  911. of opened handles. It may also occur when the object?s reference count drops below zero
  912. whether or not there are open handles to the object, and in that case the fourth parameter
  913. contains the actual value of the pointer references count.
  914.  
  915. Debugging Details:
  916. DUMP_CLASS: 1
  917. DUMP_QUALIFIER: 400
  918. BUILD_VERSION_STRING: 10.0.15063.483 (WinBuild.160101.0800)
  919. SYSTEM_MANUFACTURER: MSI
  920. SYSTEM_PRODUCT_NAME: MS-7972
  921. SYSTEM_SKU: Default string
  922. SYSTEM_VERSION: 2.0
  923. BIOS_VENDOR: American Megatrends Inc.
  924. BIOS_VERSION: C.A0
  925. BIOS_DATE: 12/13/2016
  926. BASEBOARD_MANUFACTURER: MSI
  927. BASEBOARD_PRODUCT: B150M MORTAR (MS-7972)
  928. BASEBOARD_VERSION: 2.0
  929. DUMP_TYPE: 2
  930. CPU_COUNT: 4
  931. CPU_MHZ: a98
  932. CPU_VENDOR: GenuineIntel
  933. CPU_FAMILY: 6
  934. CPU_MODEL: 5e
  935. CPU_STEPPING: 3
  936. CPU_MICROCODE: 6,5e,3,0 (F,M,S,R) SIG: A6'00000000 (cache) A6'00000000 (init)
  937. CUSTOMER_CRASH_COUNT: 1
  938. DEFAULT_BUCKET_ID: CODE_CORRUPTION
  939. BUGCHECK_STR: 0x18
  940.  
  941. PROCESS_NAME: WmiPrvSE.exe
  942.  
  943. CURRENT_IRQL: 0
  944. LAST_CONTROL_TRANSFER: from fffff801967fd8da to fffff801967ed4c0
  945. STACK_TEXT:
  946. ffffa601`3efe2298 fffff801`967fd8da : 00000000`00000018 00000000`00000000 ffffbd82`eef20a70 00000000`00000002 : nt!KeBugCheckEx
  947. ffffa601`3efe22a0 fffff801`96b188a4 : 00000000`00000001 00000000`00000000 ffffa601`3efe2820 ffffa601`00000001 : nt!ObfDereferenceObject+0x118cda
  948. ffffa601`3efe22e0 fffff801`96b2361b : fffff801`96b17a50 fffff801`96b17a50 ffffa601`00000000 ffffbd82`ec2a8c50 : nt!IopParseDevice+0xe54
  949. ffffa601`3efe24c0 fffff801`96b27150 : ffffbd82`eb9c8000 ffffa601`3efe2728 00000000`00000040 ffffbd82`eaf49f20 : nt!ObpLookupObjectName+0x46b
  950. ffffa601`3efe2690 fffff801`96abce90 : 00000000`00000001 00000000`00000028 0000013b`bd8bc076 00000020`f60fba30 : nt!ObOpenObjectByNameEx+0x1e0
  951. ffffa601`3efe27d0 fffff801`967f8413 : ffffbd82`f0a37440 00000000`00000410 ffffbd82`f0a37440 ffffbd82`ee3f17c0 : nt!NtQueryAttributesFile+0x180
  952. ffffa601`3efe2a80 00007fff`12015b44 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
  953. 00000020`f60fb9b8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`12015b44
  954. STACK_COMMAND: kb
  955. CHKIMG_EXTENSION: !chkimg -lo 50 -db !nt
  956. 4 errors : !nt (fffff80196718fd2-fffff80196901385)
  957. fffff80196718fd0 00 00 *00 *e8 ff ff 48 c1 e1 04 49 8b c6 48 03 c8 ......H...I..H..
  958. fffff80196901380 00 00 00 40 *f7 *ee ff ff 4a 8b 04 10 84 c0 0f 89 [email protected].......
  959. MODULE_NAME: memory_corruption
  960.  
  961. IMAGE_NAME: memory_corruption
  962.  
  963. FOLLOWUP_NAME: memory_corruption
  964. DEBUG_FLR_IMAGE_TIMESTAMP: 0
  965. MEMORY_CORRUPTOR: STRIDE
  966. FAILURE_BUCKET_ID: MEMORY_CORRUPTION_STRIDE
  967. BUCKET_ID: MEMORY_CORRUPTION_STRIDE
  968. PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_STRIDE
  969. TARGET_TIME: 2017-07-31T18:31:26.000Z
  970. OSBUILD: 15063
  971. OSSERVICEPACK: 483
  972. SERVICEPACK_NUMBER: 0
  973. OS_REVISION: 0
  974. SUITE_MASK: 272
  975. PRODUCT_TYPE: 1
  976. OSPLATFORM_TYPE: x64
  977. OSNAME: Windows 10
  978. OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
  979. USER_LCID: 0
  980. OSBUILD_TIMESTAMP: 2017-07-07 02:06:35
  981. BUILDDATESTAMP_STR: 160101.0800
  982. BUILDLAB_STR: WinBuild
  983. BUILDOSVER_STR: 10.0.15063.483
  984. ANALYSIS_SESSION_ELAPSED_TIME: 3e68
  985. ANALYSIS_SOURCE: KM
  986. FAILURE_ID_HASH_STRING: km:memory_corruption_stride
  987. FAILURE_ID_HASH: {574dbc1b-92cb-fb09-cb7a-cacc1bb2c511}
  988. Followup: memory_corruption
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement