Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Microsoft (R) Windows Debugger Version 10.0.14321.1024 X86
- Copyright (c) Microsoft Corporation. All rights reserved.
- Auto Dump Analyzer by gardenman
- Time to debug file(s): 00 hours and 06 minutes and 51 seconds
- ========================================================================
- =================== Dump File: 073117-4906-01.dmp ====================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 15063 MP (4 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS
- Built by: 15063.0.amd64fre.rs2_release.170317-1834
- Kernel base = 0xfffff802`0f013000 PsLoadedModuleList = 0xfffff802`0f35f5e0
- Debug session time: Mon Jul 31 06:24:08.660 2017 (UTC - 4:00)
- System Uptime: 0 days 0:58:23.301
- BugCheck 3B, {c0000005, fffff8020f4c7e18, ffffc300119b41f0, 0}
- Probably caused by : memory_corruption
- Followup: memory_corruption
- SYSTEM_SERVICE_EXCEPTION (3b)
- An exception happened while executing a system service routine.
- Arguments:
- Arg1: 00000000c0000005, Exception code that caused the bugcheck
- Arg2: fffff8020f4c7e18, Address of the instruction which caused the bugcheck
- Arg3: ffffc300119b41f0, Address of the context record for the exception that caused the bugcheck
- Arg4: 0000000000000000, zero.
- Debugging Details:
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 10.0.15063.483 (WinBuild.160101.0800)
- SYSTEM_MANUFACTURER: MSI
- SYSTEM_PRODUCT_NAME: MS-7972
- SYSTEM_SKU: Default string
- SYSTEM_VERSION: 2.0
- BIOS_VENDOR: American Megatrends Inc.
- BIOS_VERSION: C.A0
- BIOS_DATE: 12/13/2016
- BASEBOARD_MANUFACTURER: MSI
- BASEBOARD_PRODUCT: B150M MORTAR (MS-7972)
- BASEBOARD_VERSION: 2.0
- DUMP_TYPE: 2
- EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
- FAULTING_IP:
- nt!MiRemoveSharedCommitNode+d8
- fffff802`0f4c7e18 48836f2001 sub qword ptr [rdi+20h],1
- CONTEXT: ffffc300119b41f0 -- (.cxr 0xffffc300119b41f0)
- rax=ffff96054603d7c0 rbx=ffff9605425cb6e1 rcx=ffffe70a8e00fe40
- rdx=0000000000000000 rsi=ffff960544fa3010 rdi=0000000000000000
- rip=fffff8020f4c7e18 rsp=ffffc300119b4be0 rbp=ffff960542797080
- r8=ffffe70a8e00fe88 r9=0000000000000000 r10=0000000000000003
- r11=0000000000000000 r12=0000000000000002 r13=0000000000000000
- r14=0000000000007fff r15=0000000000000000
- iopl=0 nv up ei pl zr na po nc
- cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246
- nt!MiRemoveSharedCommitNode+0xd8:
- fffff802`0f4c7e18 48836f2001 sub qword ptr [rdi+20h],1 ds:002b:00000000`00000020=????????????????
- Resetting default scope
- CPU_COUNT: 4
- CPU_MHZ: a98
- CPU_VENDOR: GenuineIntel
- CPU_FAMILY: 6
- CPU_MODEL: 5e
- CPU_STEPPING: 3
- CPU_MICROCODE: 6,5e,3,0 (F,M,S,R) SIG: A6'00000000 (cache) A6'00000000 (init)
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: CODE_CORRUPTION
- BUGCHECK_STR: 0x3B
- PROCESS_NAME: Wow-64.exe
- CURRENT_IRQL: 0
- LAST_CONTROL_TRANSFER: from fffff8020f4c7e9c to fffff8020f4c7e18
- STACK_TEXT:
- ffffc300`119b4be0 fffff802`0f4c7e9c : ffff9605`42797080 00000000`00000002 ffff9605`00000003 ffff9605`00000001 : nt!MiRemoveSharedCommitNode+0xd8
- ffffc300`119b4c40 fffff802`0f4b6e48 : ffffe70a`8ed7a3f0 fffff802`00000000 00000000`00000000 ffffe70a`00000000 : nt!MiRemoveSharedCommitNode+0x15c
- ffffc300`119b4ca0 fffff802`0f4b8e6b : 00000000`00000000 fffff802`0f53d9d7 00000000`00000000 00000213`00150000 : nt!ObCloseHandleTableEntry+0x228
- ffffc300`119b4de0 fffff802`0f18a413 : ffff9605`42797080 00000000`00000000 00000000`00000000 00000000`000103ee : nt!NtClose+0xcb
- ffffc300`119b4e40 00007fff`35675584 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
- 00000099`7a2ff3d8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`35675584
- CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
- fffff8020f0a0d28 - nt!MiResolvePageTablePage+3b8
- [ f6:be ]
- fffff8020f0a0d49-fffff8020f0a0d4c 4 bytes - nt!MiResolvePageTablePage+3d9 (+0x21)
- [ be 7d fb f6:b7 6f df be ]
- fffff8020f0a4cc2-fffff8020f0a4cc3 2 bytes - nt!MiGetFreeOrZeroPage+72 (+0x3f79)
- [ 80 fa:00 ac ]
- fffff8020f293384-fffff8020f293385 2 bytes - nt!ExFreePoolWithTag+364
- [ fb f6:df be ]
- 9 errors : !nt (fffff8020f0a0d28-fffff8020f293385)
- MODULE_NAME: memory_corruption
- IMAGE_NAME: memory_corruption
- FOLLOWUP_NAME: memory_corruption
- DEBUG_FLR_IMAGE_TIMESTAMP: 0
- MEMORY_CORRUPTOR: LARGE
- STACK_COMMAND: .cxr 0xffffc300119b41f0 ; kb
- FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
- BUCKET_ID: MEMORY_CORRUPTION_LARGE
- PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
- TARGET_TIME: 2017-07-31T10:24:08.000Z
- OSBUILD: 15063
- OSSERVICEPACK: 483
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 272
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2017-07-07 02:06:35
- BUILDDATESTAMP_STR: 160101.0800
- BUILDLAB_STR: WinBuild
- BUILDOSVER_STR: 10.0.15063.483
- ANALYSIS_SESSION_ELAPSED_TIME: 2a95
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:memory_corruption_large
- FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
- Followup: memory_corruption
- =============================== Drivers ================================
- Image path: \SystemRoot\system32\drivers\peauth.sys
- Image name: peauth.sys
- Possible Info Link: http://www.carrona.org/drivers/driver.php?id=peauth.sys
- Possible Driver Info: Protected Environment Authentication and Authorization Export Driver (Microsoft)
- Timestamp: Sat Dec 9 1989
- Image path: \??\C:\Windows\system32\drivers\rzpmgrk.sys
- Image name: rzpmgrk.sys
- Possible Info Link: http://www.carrona.org/drivers/driver.php?id=rzpmgrk.sys
- Timestamp: Thu Sep 17 2015
- Image path: \??\C:\Windows\system32\drivers\rzpnk.sys
- Image name: rzpnk.sys
- Possible Info Link: http://www.carrona.org/drivers/driver.php?id=rzpnk.sys
- Possible Driver Info: Razer Overlay Support https://www.razerzone.com/
- Timestamp: Wed Sep 16 2015
- Image path: \??\C:\ProgramData\Microsoft\Windows Defender\Definition Updates\{1B2D4795-2441-43D5-9D30-9B4A6E23672E}\MpKsl259562db.sys
- Image name: MpKsl259562db.sys
- Possible Info Link: http://www.carrona.org/drivers/driver.php?id=MpKsl259562db.sys
- Timestamp: Tue May 19 2015
- Image path: \SystemRoot\system32\drivers\aswSnx.sys
- Image name: aswSnx.sys
- Possible Info Link: http://www.carrona.org/drivers/driver.php?id=aswSnx.sys
- Possible Driver Info: Avast Antivirus http://www.avast.com/
- Timestamp: Mon Jun 19 2017
- Image path: \SystemRoot\system32\drivers\aswVmm.sys
- Image name: aswVmm.sys
- Possible Info Link: http://www.carrona.org/drivers/driver.php?id=aswVmm.sys
- Possible Driver Info: Avast Antivirus http://www.avast.com/
- Timestamp: Thu Jun 29 2017
- Image path: \SystemRoot\system32\drivers\aswRvrt.sys
- Image name: aswRvrt.sys
- Possible Info Link: http://www.carrona.org/drivers/driver.php?id=aswRvrt.sys
- Possible Driver Info: Avast Antivirus http://www.avast.com/
- Timestamp: Mon Jun 19 2017
- Image path: \SystemRoot\system32\drivers\aswbuniva.sys
- Image name: aswbuniva.sys
- Possible Info Link: http://www.carrona.org/drivers/driver.php?id=aswbuniva.sys
- Possible Driver Info: Avast Antivirus http://www.avast.com/
- Timestamp: Tue Jun 6 2017
- Image path: \SystemRoot\system32\drivers\aswbloga.sys
- Image name: aswbloga.sys
- Possible Info Link: http://www.carrona.org/drivers/driver.php?id=aswbloga.sys
- Possible Driver Info: Avast Antivirus http://www.avast.com/
- Timestamp: Tue Jun 6 2017
- Image path: \SystemRoot\system32\drivers\aswbidsha.sys
- Image name: aswbidsha.sys
- Possible Info Link: http://www.carrona.org/drivers/driver.php?id=aswbidsha.sys
- Possible Driver Info: Avast Antivirus http://www.avast.com/
- Timestamp: Tue Jun 6 2017
- Image path: \SystemRoot\system32\drivers\aswStm.sys
- Image name: aswStm.sys
- Possible Info Link: http://www.carrona.org/drivers/driver.php?id=aswStm.sys
- Possible Driver Info: Avast Antivirus http://www.avast.com/
- Timestamp: Mon Jun 19 2017
- Image path: \SystemRoot\system32\drivers\aswSP.sys
- Image name: aswSP.sys
- Possible Info Link: http://www.carrona.org/drivers/driver.php?id=aswSP.sys
- Possible Driver Info: Avast Antivirus http://www.avast.com/
- Timestamp: Thu Jun 22 2017
- Image path: \SystemRoot\System32\Drivers\Null.SYS
- Image name: Null.SYS
- Possible Info Link: http://www.carrona.org/drivers/driver.php?id=Null.SYS
- Timestamp: unavailable (00000000)
- Image path: \SystemRoot\system32\drivers\aswRdr2.sys
- Image name: aswRdr2.sys
- Possible Info Link: http://www.carrona.org/drivers/driver.php?id=aswRdr2.sys
- Possible Driver Info: Avast Antivirus http://www.avast.com/
- Timestamp: Mon Jun 19 2017
- Image path: \SystemRoot\System32\Drivers\SCDEmu.SYS
- Image name: SCDEmu.SYS
- Possible Info Link: http://www.carrona.org/drivers/driver.php?id=SCDEmu.SYS
- Timestamp: Tue Jun 6 2017
- Image path: \SystemRoot\system32\drivers\aswbidsdrivera.sys
- Image name: aswbidsdrivera.sys
- Possible Info Link: http://www.carrona.org/drivers/driver.php?id=aswbidsdrivera.sys
- Possible Driver Info: Avast IDS Application Activity Monitor Driver http://www.avast.com/
- Timestamp: Tue Jun 6 2017
- Image path: \SystemRoot\System32\drivers\rzudd.sys
- Image name: rzudd.sys
- Possible Info Link: http://www.carrona.org/drivers/driver.php?id=rzudd.sys
- Timestamp: Wed Oct 26 2016
- Image path: \SystemRoot\system32\drivers\aswMonFlt.sys
- Image name: aswMonFlt.sys
- Possible Info Link: http://www.carrona.org/drivers/driver.php?id=aswMonFlt.sys
- Timestamp: Thu Jun 22 2017
- Image path: \SystemRoot\System32\drivers\TeeDriverW8x64.sys
- Image name: TeeDriverW8x64.sys
- Possible Info Link: http://www.carrona.org/drivers/driver.php?id=TeeDriverW8x64.sys
- Timestamp: Wed Nov 16 2016
- Image path: \SystemRoot\System32\drivers\rt640x64.sys
- Image name: rt640x64.sys
- Possible Info Link: http://www.carrona.org/drivers/driver.php?id=rt640x64.sys
- Timestamp: Wed Oct 5 2016
- Image path: \SystemRoot\system32\drivers\nvvad64v.sys
- Image name: nvvad64v.sys
- Possible Info Link: http://www.carrona.org/drivers/driver.php?id=nvvad64v.sys
- Timestamp: Wed Apr 5 2017
- Image path: \SystemRoot\System32\drivers\nvvhci.sys
- Image name: nvvhci.sys
- Possible Info Link: http://www.carrona.org/drivers/driver.php?id=nvvhci.sys
- Timestamp: Tue Dec 27 2016
- Image path: \SystemRoot\system32\drivers\nvhda64v.sys
- Image name: nvhda64v.sys
- Possible Info Link: http://www.carrona.org/drivers/driver.php?id=nvhda64v.sys
- Timestamp: Tue May 16 2017
- Image path: \SystemRoot\System32\drivers\rzendpt.sys
- Image name: rzendpt.sys
- Possible Info Link: http://www.carrona.org/drivers/driver.php?id=rzendpt.sys
- Timestamp: Wed Oct 26 2016
- Image path: \SystemRoot\System32\DriverStore\FileRepository\nv_dispi.inf_amd64_2d81f3535ced17c6\nvlddmkm.sys
- Image name: nvlddmkm.sys
- Possible Info Link: http://www.carrona.org/drivers/driver.php?id=nvlddmkm.sys
- Timestamp: Wed Jun 7 2017
- Image path: \SystemRoot\System32\drivers\drmk.sys
- Image name: drmk.sys
- Possible Info Link: http://www.carrona.org/drivers/driver.php?id=drmk.sys
- Timestamp: ***** Invalid (A01C1986)
- Image path: \SystemRoot\System32\TSDDD.dll
- Image name: TSDDD.dll
- Possible Info Link: http://www.carrona.org/drivers/driver.php?id=TSDDD.dll
- Timestamp: unavailable (00000000)
- Unloaded modules:
- fffff80f`63af0000 fffff80f`63afb000 cldflt.sys
- fffff80f`62920000 fffff80f`6292f000 dump_storpor
- fffff80f`62960000 fffff80f`62987000 dump_storahc
- fffff80f`629b0000 fffff80f`629cd000 dump_dumpfve
- fffff80f`65f90000 fffff80f`65fb2000 i8042prt.sys
- fffff80f`637c0000 fffff80f`637e0000 dam.sys
- fffff80f`61720000 fffff80f`6172f000 WdBoot.sys
- fffff80f`627a0000 fffff80f`627af000 hwpolicy.sys
- ============================= BIOS INFO ================================
- [SMBIOS Data Tables v3.0]
- [DMI Version - 0]
- [2.0 Calling Convention - No]
- [Table Size - 4067 bytes]
- [BIOS Information (Type 0) - Length 24 - Handle 0000h]
- Vendor American Megatrends Inc.
- BIOS Version C.A0
- BIOS Starting Address Segment f000
- BIOS Release Date 12/13/2016
- BIOS ROM Size 1000000
- BIOS Characteristics
- 07: - PCI Supported
- 11: - Upgradeable FLASH BIOS
- 12: - BIOS Shadowing Supported
- 15: - CD-Boot Supported
- 16: - Selectable Boot Supported
- 17: - BIOS ROM Socketed
- 19: - EDD Supported
- 23: - 1.2MB Floppy Supported
- 24: - 720KB Floppy Supported
- 25: - 2.88MB Floppy Supported
- 26: - Print Screen Device Supported
- 27: - Keyboard Services Supported
- 28: - Serial Services Supported
- 29: - Printer Services Supported
- 32: - BIOS Vendor Reserved
- BIOS Characteristic Extensions
- 00: - ACPI Supported
- 01: - USB Legacy Supported
- 08: - BIOS Boot Specification Supported
- 10: - Specification Reserved
- 11: - Specification Reserved
- BIOS Major Revision 5
- BIOS Minor Revision 12
- EC Firmware Major Revision 255
- EC Firmware Minor Revision 255
- [System Information (Type 1) - Length 27 - Handle 0001h]
- Manufacturer MSI
- Product Name MS-7972
- Version 2.0
- UUID 00000000-0000-0000-0000-000000000000
- Wakeup Type Power Switch
- SKUNumber Default string
- Family Default string
- [BaseBoard Information (Type 2) - Length 15 - Handle 0002h]
- Manufacturer MSI
- Product B150M MORTAR (MS-7972)
- Version 2.0
- Feature Flags 09h
- 1641226760: - ?ÿU?ì?ì¡H.æa3Å?Eü3ÀW?}?Eô?Eø?ÿu
- ¸@
- 1641226800: - ?ÿU?ì?ì¡H.æa3Å?Eü3ÀW?}?Eô?Eø?ÿu
- ¸@
- Location Default string
- Chassis Handle 0003h
- Board Type 0ah - Processor/Memory Module
- Number of Child Handles 0
- [System Enclosure (Type 3) - Length 22 - Handle 0003h]
- Manufacturer MSI
- Chassis Type Desktop
- Version 2.0
- Bootup State Safe
- Power Supply State Safe
- Thermal State Safe
- Security Status None
- OEM Defined 0
- Height 0U
- Number of Power Cords 1
- Number of Contained Elements 0
- Contained Element Size 3
- [OEM Strings (Type 11) - Length 5 - Handle 0021h]
- Number of Strings 1
- 1 Default string
- [System Configuration Options (Type 12) - Length 5 - Handle 0022h]
- [Physical Memory Array (Type 16) - Length 23 - Handle 003ch]
- Location 03h - SystemBoard/Motherboard
- Use 03h - System Memory
- Memory Error Correction 03h - None
- Maximum Capacity 67108864KB
- Number of Memory Devices 4
- [Memory Device (Type 17) - Length 40 - Handle 003dh]
- Physical Memory Array Handle 003ch
- Total Width 0 bits
- Data Width 0 bits
- Form Factor 02h - Unknown
- Device Locator ChannelA-DIMM0
- Bank Locator BANK 0
- Memory Type 02h - Unknown
- Type Detail 0000h -
- Speed 0MHz
- [Memory Device (Type 17) - Length 40 - Handle 003eh]
- Physical Memory Array Handle 003ch
- Total Width 0 bits
- Data Width 0 bits
- Form Factor 02h - Unknown
- Device Locator ChannelA-DIMM1
- Bank Locator BANK 1
- Memory Type 02h - Unknown
- Type Detail 0000h -
- Speed 0MHz
- [Memory Device (Type 17) - Length 40 - Handle 003fh]
- Physical Memory Array Handle 003ch
- Total Width 64 bits
- Data Width 64 bits
- Size 8192MB
- Form Factor 09h - DIMM
- Device Locator ChannelB-DIMM0
- Bank Locator BANK 2
- Memory Type 1ah - Specification Reserved
- Type Detail 0080h - Synchronous
- Speed 2133MHz
- Manufacturer Kingston
- Part Number 9905625-062.A00G
- [Memory Device (Type 17) - Length 40 - Handle 0040h]
- Physical Memory Array Handle 003ch
- Total Width 0 bits
- Data Width 0 bits
- Form Factor 02h - Unknown
- Device Locator ChannelB-DIMM1
- Bank Locator BANK 3
- Memory Type 02h - Unknown
- Type Detail 0000h -
- Speed 0MHz
- [Memory Array Mapped Address (Type 19) - Length 31 - Handle 0041h]
- Starting Address 00000000h
- Ending Address 007fffffh
- Memory Array Handle 003ch
- Partition Width 01
- [Cache Information (Type 7) - Length 19 - Handle 0042h]
- Socket Designation L1 Cache
- Cache Configuration 0180h - WB Enabled Int NonSocketed L1
- Maximum Cache Size 0100h - 256K
- Installed Size 0100h - 256K
- Supported SRAM Type 0020h - Synchronous
- Current SRAM Type 0020h - Synchronous
- Cache Speed 0ns
- Error Correction Type ParitySingle-Bit ECC
- System Cache Type Unified
- Associativity 8-way Set-Associative
- [Cache Information (Type 7) - Length 19 - Handle 0043h]
- Socket Designation L2 Cache
- Cache Configuration 0181h - WB Enabled Int NonSocketed L2
- Maximum Cache Size 0400h - 1024K
- Installed Size 0400h - 1024K
- Supported SRAM Type 0020h - Synchronous
- Current SRAM Type 0020h - Synchronous
- Cache Speed 0ns
- Error Correction Type Multi-Bit ECC
- System Cache Type Unified
- Associativity 4-way Set-Associative
- [Cache Information (Type 7) - Length 19 - Handle 0044h]
- Socket Designation L3 Cache
- Cache Configuration 0182h - WB Enabled Int NonSocketed L3
- Maximum Cache Size 1800h - 6144K
- Installed Size 1800h - 6144K
- Supported SRAM Type 0020h - Synchronous
- Current SRAM Type 0020h - Synchronous
- Cache Speed 0ns
- Error Correction Type Specification Reserved
- System Cache Type Unified
- Associativity Specification Reserved
- [Processor Information (Type 4) - Length 48 - Handle 0045h]
- Socket Designation U3E1
- Processor Type Central Processor
- Processor Family cdh - Specification Reserved
- Processor Manufacturer Intel(R) Corporation
- Processor ID e3060500fffbebbf
- Processor Version Intel(R) Core(TM) i5-6400 CPU @ 2.70GHz
- Processor Voltage 89h - 0.9V
- External Clock 100MHz
- Max Speed 8300MHz
- Current Speed 2700MHz
- Status Enabled Populated
- Processor Upgrade Other
- L1 Cache Handle 0042h
- L2 Cache Handle 0043h
- L3 Cache Handle 0044h
- [Memory Device Mapped Address (Type 20) - Length 35 - Handle 0046h]
- Starting Address 00000000h
- Ending Address 007fffffh
- Memory Device Handle 003fh
- Mem Array Mapped Adr Handle 0041h
- Interleave Position [None]
- Interleave Data Depth [None]
- ========================================================================
- =================== Dump File: 080117-4328-01.dmp ====================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 15063 MP (4 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS
- Built by: 15063.0.amd64fre.rs2_release.170317-1834
- Kernel base = 0xfffff801`b509b000 PsLoadedModuleList = 0xfffff801`b53e75e0
- Debug session time: Tue Aug 1 09:33:16.399 2017 (UTC - 4:00)
- System Uptime: 0 days 0:12:21.040
- BugCheck 139, {3, ffff8680b21fa500, ffff8680b21fa458, 0}
- Probably caused by : ntkrnlmp.exe ( nt!KiSwapThread+156d3e )
- Followup: MachineOwner
- KERNEL_SECURITY_CHECK_FAILURE (139)
- A kernel component has corrupted a critical data structure. The corruption
- could potentially allow a malicious user to gain control of this machine.
- Arguments:
- Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
- Arg2: ffff8680b21fa500, Address of the trap frame for the exception that caused the bugcheck
- Arg3: ffff8680b21fa458, Address of the exception record for the exception that caused the bugcheck
- Arg4: 0000000000000000, Reserved
- Debugging Details:
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 10.0.15063.483 (WinBuild.160101.0800)
- SYSTEM_MANUFACTURER: MSI
- SYSTEM_PRODUCT_NAME: MS-7972
- SYSTEM_SKU: Default string
- SYSTEM_VERSION: 2.0
- BIOS_VENDOR: American Megatrends Inc.
- BIOS_VERSION: C.A0
- BIOS_DATE: 12/13/2016
- BASEBOARD_MANUFACTURER: MSI
- BASEBOARD_PRODUCT: B150M MORTAR (MS-7972)
- BASEBOARD_VERSION: 2.0
- DUMP_TYPE: 2
- TRAP_FRAME: ffff8680b21fa500 -- (.trap 0xffff8680b21fa500)
- NOTE: The trap frame does not contain all registers.
- Some register values may be zeroed or incorrect.
- rax=ffffdb8b475861a0 rbx=0000000000000000 rcx=0000000000000003
- rdx=ffffdb8b48fb71a0 rsi=0000000000000000 rdi=0000000000000000
- rip=fffff801b522566e rsp=ffff8680b21fa690 rbp=0000000000000000
- r8=00000000000011e0 r9=000000000000007f r10=fffff801b427e800
- r11=fffff801b509b000 r12=0000000000000000 r13=0000000000000000
- r14=0000000000000000 r15=0000000000000000
- iopl=0 nv up ei ng nz na po cy
- nt!KiSwapThread+0x156d3e:
- fffff801`b522566e cd29 int 29h
- Resetting default scope
- EXCEPTION_RECORD: ffff8680b21fa458 -- (.exr 0xffff8680b21fa458)
- ExceptionAddress: fffff801b522566e (nt!KiSwapThread+0x0000000000156d3e)
- ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
- ExceptionFlags: 00000001
- NumberParameters: 1
- Parameter[0]: 0000000000000003
- Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
- CPU_COUNT: 4
- CPU_MHZ: a98
- CPU_VENDOR: GenuineIntel
- CPU_FAMILY: 6
- CPU_MODEL: 5e
- CPU_STEPPING: 3
- CPU_MICROCODE: 6,5e,3,0 (F,M,S,R) SIG: A6'00000000 (cache) A6'00000000 (init)
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: LIST_ENTRY_CORRUPT
- BUGCHECK_STR: 0x139
- PROCESS_NAME: RazerIngameEngine.exe
- CURRENT_IRQL: 2
- ERROR_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.
- EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.
- EXCEPTION_CODE_STR: c0000409
- EXCEPTION_PARAMETER1: 0000000000000003
- LAST_CONTROL_TRANSFER: from fffff801b52128a9 to fffff801b52074c0
- STACK_TEXT:
- ffff8680`b21fa1d8 fffff801`b52128a9 : 00000000`00000139 00000000`00000003 ffff8680`b21fa500 ffff8680`b21fa458 : nt!KeBugCheckEx
- ffff8680`b21fa1e0 fffff801`b5212c10 : ffff8680`b21fa3e4 00000000`00000001 00000000`00000000 fffff801`b553cd98 : nt!KiBugCheckDispatch+0x69
- ffff8680`b21fa320 fffff801`b5211bf7 : 00000000`00000206 fffff801`b520c62f 00000000`00000000 ffffdb8b`4732e080 : nt!KiFastFailDispatch+0xd0
- ffff8680`b21fa500 fffff801`b522566e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0xf7
- ffff8680`b21fa690 fffff801`b50ce461 : ffffdb8b`48fb7080 ffff8680`b21fa8d8 ffffdb8b`48a60f98 00000000`00000000 : nt!KiSwapThread+0x156d3e
- ffff8680`b21fa740 fffff801`b50cb717 : cb8b4816`0000007f ffff8680`00000000 00000000`00000200 ffff8680`b21fa900 : nt!KiCommitThreadWait+0x101
- ffff8680`b21fa7e0 fffff801`b50fd24a : ffffdb8b`45824e60 ffff8680`b21fa8f0 ffffdb8b`00010224 fffff801`b51b0e60 : nt!ExpWaitForResource+0x207
- ffff8680`b21fa890 fffff801`b50fc7ff : ffff8680`b60aa902 ffff8680`b0687180 ffffdb8b`47666080 ffff8680`b60aa960 : nt!ExpAcquireResourceExclusiveLite+0x2da
- ffff8680`b21fa960 fffffc9d`403d1f1c : ffffdb8b`47a561a0 00000000`00286978 00000000`0258fda0 00000000`65404600 : nt!ExEnterCriticalRegionAndAcquireResourceExclusive+0x3f
- ffff8680`b21fa9a0 fffffc9d`4004df18 : ffffdb8b`48fb7080 00000000`00000000 00000000`00000000 fffffc9d`00000000 : win32kbase!EnterCrit+0x3c
- ffff8680`b21fa9e0 fffff801`b5212413 : ffffdb8b`48fb7080 00000000`654179c0 00000000`00000020 ffffdb8b`48fb7080 : win32kfull!NtUserGetMessage+0x48
- ffff8680`b21faa80 00000000`65421944 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
- 00000000`0258e388 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x65421944
- STACK_COMMAND: kb
- THREAD_SHA1_HASH_MOD_FUNC: ba9132b879f60185aba6620b04184951d0474243
- THREAD_SHA1_HASH_MOD_FUNC_OFFSET: a534fba0b95f062817f71b7f5119ead814716250
- THREAD_SHA1_HASH_MOD: 1de07d66ed7162da15ace3085054b552e9d9297f
- FOLLOWUP_IP:
- nt!KiSwapThread+156d3e
- fffff801`b522566e cd29 int 29h
- FAULT_INSTR_CODE: 844529cd
- SYMBOL_STACK_INDEX: 4
- SYMBOL_NAME: nt!KiSwapThread+156d3e
- FOLLOWUP_NAME: MachineOwner
- MODULE_NAME: nt
- IMAGE_NAME: ntkrnlmp.exe
- DEBUG_FLR_IMAGE_TIMESTAMP: 595f24eb
- IMAGE_VERSION: 10.0.15063.483
- BUCKET_ID_FUNC_OFFSET: 156d3e
- FAILURE_BUCKET_ID: 0x139_3_KTIMER_LIST_CORRUPTION_nt!KiSwapThread
- BUCKET_ID: 0x139_3_KTIMER_LIST_CORRUPTION_nt!KiSwapThread
- PRIMARY_PROBLEM_CLASS: 0x139_3_KTIMER_LIST_CORRUPTION_nt!KiSwapThread
- TARGET_TIME: 2017-08-01T13:33:16.000Z
- OSBUILD: 15063
- OSSERVICEPACK: 483
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 272
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2017-07-07 02:06:35
- BUILDDATESTAMP_STR: 160101.0800
- BUILDLAB_STR: WinBuild
- BUILDOSVER_STR: 10.0.15063.483
- ANALYSIS_SESSION_ELAPSED_TIME: 2a0d
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:0x139_3_ktimer_list_corruption_nt!kiswapthread
- FAILURE_ID_HASH: {028233d4-8e10-bd5f-102e-97b9e820be9f}
- Followup: MachineOwner
- ========================================================================
- =================== Dump File: 080117-4500-01.dmp ====================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 15063 MP (4 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS
- Built by: 15063.0.amd64fre.rs2_release.170317-1834
- Kernel base = 0xfffff802`de801000 PsLoadedModuleList = 0xfffff802`deb4d5e0
- Debug session time: Tue Aug 1 09:20:28.891 2017 (UTC - 4:00)
- System Uptime: 0 days 18:48:39.532
- BugCheck 139, {3, ffffe7815c75c930, ffffe7815c75c888, 0}
- Probably caused by : ntkrnlmp.exe ( nt!KiSwapThread+156d3e )
- Followup: MachineOwner
- KERNEL_SECURITY_CHECK_FAILURE (139)
- A kernel component has corrupted a critical data structure. The corruption
- could potentially allow a malicious user to gain control of this machine.
- Arguments:
- Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
- Arg2: ffffe7815c75c930, Address of the trap frame for the exception that caused the bugcheck
- Arg3: ffffe7815c75c888, Address of the exception record for the exception that caused the bugcheck
- Arg4: 0000000000000000, Reserved
- Debugging Details:
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 10.0.15063.483 (WinBuild.160101.0800)
- SYSTEM_MANUFACTURER: MSI
- SYSTEM_PRODUCT_NAME: MS-7972
- SYSTEM_SKU: Default string
- SYSTEM_VERSION: 2.0
- BIOS_VENDOR: American Megatrends Inc.
- BIOS_VERSION: C.A0
- BIOS_DATE: 12/13/2016
- BASEBOARD_MANUFACTURER: MSI
- BASEBOARD_PRODUCT: B150M MORTAR (MS-7972)
- BASEBOARD_VERSION: 2.0
- DUMP_TYPE: 2
- TRAP_FRAME: ffffe7815c75c930 -- (.trap 0xffffe7815c75c930)
- NOTE: The trap frame does not contain all registers.
- Some register values may be zeroed or incorrect.
- rax=ffff96002b8fd1a0 rbx=0000000000000000 rcx=0000000000000003
- rdx=ffff9600306078e0 rsi=0000000000000000 rdi=0000000000000000
- rip=fffff802de98b66e rsp=ffffe7815c75cac0 rbp=0000000000000000
- r8=0000000000000440 r9=0000000000000012 r10=fffff802ddab4800
- r11=fffff802de801000 r12=0000000000000000 r13=0000000000000000
- r14=0000000000000000 r15=0000000000000000
- iopl=0 nv up ei pl nz na po nc
- nt!KiSwapThread+0x156d3e:
- fffff802`de98b66e cd29 int 29h
- Resetting default scope
- EXCEPTION_RECORD: ffffe7815c75c888 -- (.exr 0xffffe7815c75c888)
- ExceptionAddress: fffff802de98b66e (nt!KiSwapThread+0x0000000000156d3e)
- ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
- ExceptionFlags: 00000001
- NumberParameters: 1
- Parameter[0]: 0000000000000003
- Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
- CPU_COUNT: 4
- CPU_MHZ: a98
- CPU_VENDOR: GenuineIntel
- CPU_FAMILY: 6
- CPU_MODEL: 5e
- CPU_STEPPING: 3
- CPU_MICROCODE: 6,5e,3,0 (F,M,S,R) SIG: A6'00000000 (cache) A6'00000000 (init)
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: LIST_ENTRY_CORRUPT
- BUGCHECK_STR: 0x139
- PROCESS_NAME: RazerIngameEngine.exe
- CURRENT_IRQL: 2
- ERROR_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.
- EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.
- EXCEPTION_CODE_STR: c0000409
- EXCEPTION_PARAMETER1: 0000000000000003
- LAST_CONTROL_TRANSFER: from fffff802de9788a9 to fffff802de96d4c0
- STACK_TEXT:
- ffffe781`5c75c608 fffff802`de9788a9 : 00000000`00000139 00000000`00000003 ffffe781`5c75c930 ffffe781`5c75c888 : nt!KeBugCheckEx
- ffffe781`5c75c610 fffff802`de978c10 : ffff9600`00000000 ffffd18f`00000000 ffff9600`2b4314c0 00000000`00000000 : nt!KiBugCheckDispatch+0x69
- ffffe781`5c75c750 fffff802`de977bf7 : 00000000`00000206 fffff802`de97262f 00000000`00000000 fffff802`decb8147 : nt!KiFastFailDispatch+0xd0
- ffffe781`5c75c930 fffff802`de98b66e : ffffd18f`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0xf7
- ffffe781`5c75cac0 fffff802`de834461 : ffff9600`306077c0 ffffe781`5c75cd48 ffff9600`2f0fd198 ffffd18f`00000000 : nt!KiSwapThread+0x156d3e
- ffffe781`5c75cb70 fffff802`de831717 : 00000000`00000012 ffffe781`00000000 00000004`eed00000 ffffe781`5c75cd30 : nt!KiCommitThreadWait+0x101
- ffffe781`5c75cc10 fffff802`de86324a : ffff9600`2f02b5c0 ffffe781`5c75cd20 ffffd18f`00010224 fffff802`de916e60 : nt!ExpWaitForResource+0x207
- ffffe781`5c75ccc0 fffff802`de8627ff : 00000000`0322f402 00000000`0303cbc8 00000000`00f4a000 00000000`0303cc30 : nt!ExpAcquireResourceExclusiveLite+0x2da
- ffffe781`5c75cd90 ffffa95e`08dd1f1c : ffff9600`2e126390 00000000`0028697a 00000000`0303cc30 00000000`00000401 : nt!ExEnterCriticalRegionAndAcquireResourceExclusive+0x3f
- ffffe781`5c75cdd0 ffffa95e`08a3d3df : 00000000`0000004a 00000000`716168f0 00000000`0303fda0 00000000`00f4a000 : win32kbase!EnterCrit+0x3c
- ffffe781`5c75ce10 fffff802`de978413 : ffff9600`306077c0 ffffe781`5c75cec0 00000000`00000006 ffff9600`306077c0 : win32kfull!NtUserCallOneParam+0x1f
- ffffe781`5c75ce40 00000000`716218c4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
- 00000000`0303cc38 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x716218c4
- STACK_COMMAND: kb
- THREAD_SHA1_HASH_MOD_FUNC: 730fa72e5935382b6bef8db1f6f5821dd1d418cf
- THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 09e78b6312bc4c15c7cf3f5def76e8f2861dff23
- THREAD_SHA1_HASH_MOD: 1de07d66ed7162da15ace3085054b552e9d9297f
- FOLLOWUP_IP:
- nt!KiSwapThread+156d3e
- fffff802`de98b66e cd29 int 29h
- FAULT_INSTR_CODE: 844529cd
- SYMBOL_STACK_INDEX: 4
- SYMBOL_NAME: nt!KiSwapThread+156d3e
- FOLLOWUP_NAME: MachineOwner
- MODULE_NAME: nt
- IMAGE_NAME: ntkrnlmp.exe
- DEBUG_FLR_IMAGE_TIMESTAMP: 595f24eb
- IMAGE_VERSION: 10.0.15063.483
- BUCKET_ID_FUNC_OFFSET: 156d3e
- FAILURE_BUCKET_ID: 0x139_3_KTIMER_LIST_CORRUPTION_nt!KiSwapThread
- BUCKET_ID: 0x139_3_KTIMER_LIST_CORRUPTION_nt!KiSwapThread
- PRIMARY_PROBLEM_CLASS: 0x139_3_KTIMER_LIST_CORRUPTION_nt!KiSwapThread
- TARGET_TIME: 2017-08-01T13:20:28.000Z
- OSBUILD: 15063
- OSSERVICEPACK: 483
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 272
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2017-07-07 02:06:35
- BUILDDATESTAMP_STR: 160101.0800
- BUILDLAB_STR: WinBuild
- BUILDOSVER_STR: 10.0.15063.483
- ANALYSIS_SESSION_ELAPSED_TIME: 26a2
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:0x139_3_ktimer_list_corruption_nt!kiswapthread
- FAILURE_ID_HASH: {028233d4-8e10-bd5f-102e-97b9e820be9f}
- Followup: MachineOwner
- ========================================================================
- =================== Dump File: 072817-4187-01.dmp ====================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 15063 MP (4 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS
- Built by: 15063.0.amd64fre.rs2_release.170317-1834
- Kernel base = 0xfffff803`92408000 PsLoadedModuleList = 0xfffff803`927545e0
- Debug session time: Fri Jul 28 10:43:41.592 2017 (UTC - 4:00)
- System Uptime: 0 days 0:17:19.233
- BugCheck 154, {ffffb80e2c788000, ffff918085b62780, 1, 0}
- *** WARNING: Unable to verify timestamp for win32k.sys
- *** ERROR: Module load completed but symbols could not be loaded for win32k.sys
- Probably caused by : memory_corruption
- Followup: memory_corruption
- UNEXPECTED_STORE_EXCEPTION (154)
- The store component caught an unexpected exception.
- Arguments:
- Arg1: ffffb80e2c788000, Pointer to the store context or data manager
- Arg2: ffff918085b62780, Exception information
- Arg3: 0000000000000001, Reserved
- Arg4: 0000000000000000, Reserved
- Debugging Details:
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 10.0.15063.483 (WinBuild.160101.0800)
- SYSTEM_MANUFACTURER: MSI
- SYSTEM_PRODUCT_NAME: MS-7972
- SYSTEM_SKU: Default string
- SYSTEM_VERSION: 2.0
- BIOS_VENDOR: American Megatrends Inc.
- BIOS_VERSION: C.A0
- BIOS_DATE: 12/13/2016
- BASEBOARD_MANUFACTURER: MSI
- BASEBOARD_PRODUCT: B150M MORTAR (MS-7972)
- BASEBOARD_VERSION: 2.0
- DUMP_TYPE: 2
- EXCEPTION_RECORD: ffff918085b636c8 -- (.exr 0xffff918085b636c8)
- ExceptionAddress: fffff803924e143f (nt!SMKM_STORE<SM_TRAITS>::SmStUnmapVirtualRegion+0x00000000000000cf)
- ExceptionCode: c0000005 (Access violation)
- ExceptionFlags: 00000000
- NumberParameters: 2
- Parameter[0]: 0000000000000000
- Parameter[1]: 0000000000000000
- Attempt to read from address 0000000000000000
- EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
- FAULTING_IP:
- nt!SMKM_STORE<SM_TRAITS>::SmStUnmapVirtualRegion+cf
- fffff803`924e143f 488b08 mov rcx,qword ptr [rax]
- FOLLOWUP_IP:
- nt!SMKM_STORE<SM_TRAITS>::SmStUnmapVirtualRegion+cf
- fffff803`924e143f 488b08 mov rcx,qword ptr [rax]
- EXCEPTION_PARAMETER1: 0000000000000000
- EXCEPTION_PARAMETER2: 0000000000000000
- CONTEXT: ffff918085b62f10 -- (.cxr 0xffff918085b62f10)
- rax=0000000000000000 rbx=ffffb80e2c7898b0 rcx=0000000000000000
- rdx=fffff803927ff430 rsi=0000000000000a56 rdi=0000000000000000
- rip=fffff803924e143f rsp=ffff918085b63900 rbp=ffffb80e2c788000
- r8=ffffb80e2c7898b0 r9=ffffb80e2c7b3100 r10=ffffb80e2c7b30b0
- r11=00000000ffffffff r12=0000000000001fff r13=00000000ffffffff
- r14=ffffb80e2b95e000 r15=0000000000000000
- iopl=0 nv up ei pl zr na po nc
- cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246
- nt!SMKM_STORE<SM_TRAITS>::SmStUnmapVirtualRegion+0xcf:
- fffff803`924e143f 488b08 mov rcx,qword ptr [rax] ds:002b:00000000`00000000=????????????????
- Resetting default scope
- CPU_COUNT: 4
- CPU_MHZ: a98
- CPU_VENDOR: GenuineIntel
- CPU_FAMILY: 6
- CPU_MODEL: 5e
- CPU_STEPPING: 3
- CPU_MICROCODE: 6,5e,3,0 (F,M,S,R) SIG: A6'00000000 (cache) A6'00000000 (init)
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: CODE_CORRUPTION
- PROCESS_NAME: MemCompression
- CURRENT_IRQL: 0
- ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
- EXCEPTION_CODE_STR: c0000005
- READ_ADDRESS: fffff803927e9358: Unable to get MiVisibleState
- 0000000000000000
- BUGCHECK_STR: 0x154_c0000005
- LAST_CONTROL_TRANSFER: from fffff803924e2d8f to fffff803924e143f
- STACK_TEXT:
- ffff9180`85b63900 fffff803`924e2d8f : 00000000`00000a56 00000000`ffffffff 00000000`ffffffff ffffb80e`2c788050 : nt!SMKM_STORE<SM_TRAITS>::SmStUnmapVirtualRegion+0xcf
- ffff9180`85b63930 fffff803`924d871a : ffffb80e`2c788050 ffff9180`85b639b0 00000000`00000000 ffffb80e`00000000 : nt!ST_STORE<SM_TRAITS>::StUnlockAndUnmapRegion+0x7b
- ffff9180`85b63970 fffff803`924d865e : 00000000`00000008 00000000`00000103 ffffb80e`2c788050 00000004`00000000 : nt!ST_STORE<SM_TRAITS>::StDmCurrentRegionSet+0x9e
- ffff9180`85b639d0 fffff803`924d0a60 : ffffb80e`2c788000 ffff9180`85b63a70 00000000`00000002 fffff803`00000000 : nt!ST_STORE<SM_TRAITS>::StDmInvalidateCurrentRegions+0x32
- ffff9180`85b63a00 fffff803`92522297 : ffffb80e`2c789650 ffff9180`85b63b18 ffff9180`85b63a71 fffff803`924d933b : nt!ST_STORE<SM_TRAITS>::StWorkItemProcess+0x1d8
- ffff9180`85b63a50 fffff803`924d0394 : ffffb80e`2c788000 ffff9180`85b63b18 7fffffff`fffffffc ffffb80e`00000000 : nt!ST_STORE<SM_TRAITS>::StLazyWorkMgrRunExpiredWork+0xe7
- ffff9180`85b63aa0 fffff803`92522fe1 : 00000000`00000102 00000000`00000000 00000000`00000000 00000000`00000000 : nt!SMKM_STORE<SM_TRAITS>::SmStWorker+0x60c
- ffff9180`85b63b60 fffff803`924e4ac7 : ffffb80e`2c788000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!SMKM_STORE<SM_TRAITS>::SmStWorkerThread+0x11
- ffff9180`85b63b90 fffff803`92579946 : fffff803`916eb180 ffffb80e`2b9d7080 fffff803`924e4a80 00000000`00000000 : nt!PspSystemThreadStartup+0x47
- ffff9180`85b63be0 00000000`00000000 : ffff9180`85b64000 ffff9180`85b5d000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
- CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
- fffff803924900ef - nt!MiGetNextPageTable+19f
- [ f6:d9 ]
- fffff80392490122 - nt!MiGetNextPageTable+1d2 (+0x33)
- [ f6:d9 ]
- fffff8039249d817 - nt!MiPfnShareCountIsZero+187 (+0xd6f5)
- [ f6:d9 ]
- fffff8039249ffd2-fffff8039249ffd3 2 bytes - nt!MiDeletePteList+592 (+0x27bb)
- [ 80 fa:00 85 ]
- 5 errors : !nt (fffff803924900ef-fffff8039249ffd3)
- MODULE_NAME: memory_corruption
- IMAGE_NAME: memory_corruption
- FOLLOWUP_NAME: memory_corruption
- DEBUG_FLR_IMAGE_TIMESTAMP: 0
- MEMORY_CORRUPTOR: LARGE
- STACK_COMMAND: .cxr 0xffff918085b62f10 ; kb
- FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
- BUCKET_ID: MEMORY_CORRUPTION_LARGE
- PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
- TARGET_TIME: 2017-07-28T14:43:41.000Z
- OSBUILD: 15063
- OSSERVICEPACK: 483
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 272
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2017-07-07 02:06:35
- BUILDDATESTAMP_STR: 160101.0800
- BUILDLAB_STR: WinBuild
- BUILDOSVER_STR: 10.0.15063.483
- ANALYSIS_SESSION_ELAPSED_TIME: 28fc
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:memory_corruption_large
- FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
- Followup: memory_corruption
- ========================================================================
- =================== Dump File: 073117-4296-01.dmp ====================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 15063 MP (4 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS
- Built by: 15063.0.amd64fre.rs2_release.170317-1834
- Kernel base = 0xfffff801`96681000 PsLoadedModuleList = 0xfffff801`969cd5e0
- Debug session time: Mon Jul 31 14:31:26.823 2017 (UTC - 4:00)
- System Uptime: 0 days 8:06:51.464
- BugCheck 18, {0, ffffbd82eef20a70, 2, ffffffffffffffff}
- Probably caused by : memory_corruption
- Followup: memory_corruption
- REFERENCE_BY_POINTER (18)
- Arguments:
- Arg1: 0000000000000000, Object type of the object whose reference count is being lowered
- Arg2: ffffbd82eef20a70, Object whose reference count is being lowered
- Arg3: 0000000000000002, Reserved
- Arg4: ffffffffffffffff, Reserved
- The reference count of an object is illegal for the current state of the object.
- Each time a driver uses a pointer to an object the driver calls a kernel routine
- to increment the reference count of the object. When the driver is done with the
- pointer the driver calls another kernel routine to decrement the reference count.
- Drivers must match calls to the increment and decrement routines. This bugcheck
- can occur because an object's reference count goes to zero while there are still
- open handles to the object, in which case the fourth parameter indicates the number
- of opened handles. It may also occur when the object?s reference count drops below zero
- whether or not there are open handles to the object, and in that case the fourth parameter
- contains the actual value of the pointer references count.
- Debugging Details:
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 10.0.15063.483 (WinBuild.160101.0800)
- SYSTEM_MANUFACTURER: MSI
- SYSTEM_PRODUCT_NAME: MS-7972
- SYSTEM_SKU: Default string
- SYSTEM_VERSION: 2.0
- BIOS_VENDOR: American Megatrends Inc.
- BIOS_VERSION: C.A0
- BIOS_DATE: 12/13/2016
- BASEBOARD_MANUFACTURER: MSI
- BASEBOARD_PRODUCT: B150M MORTAR (MS-7972)
- BASEBOARD_VERSION: 2.0
- DUMP_TYPE: 2
- CPU_COUNT: 4
- CPU_MHZ: a98
- CPU_VENDOR: GenuineIntel
- CPU_FAMILY: 6
- CPU_MODEL: 5e
- CPU_STEPPING: 3
- CPU_MICROCODE: 6,5e,3,0 (F,M,S,R) SIG: A6'00000000 (cache) A6'00000000 (init)
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: CODE_CORRUPTION
- BUGCHECK_STR: 0x18
- PROCESS_NAME: WmiPrvSE.exe
- CURRENT_IRQL: 0
- LAST_CONTROL_TRANSFER: from fffff801967fd8da to fffff801967ed4c0
- STACK_TEXT:
- ffffa601`3efe2298 fffff801`967fd8da : 00000000`00000018 00000000`00000000 ffffbd82`eef20a70 00000000`00000002 : nt!KeBugCheckEx
- ffffa601`3efe22a0 fffff801`96b188a4 : 00000000`00000001 00000000`00000000 ffffa601`3efe2820 ffffa601`00000001 : nt!ObfDereferenceObject+0x118cda
- ffffa601`3efe22e0 fffff801`96b2361b : fffff801`96b17a50 fffff801`96b17a50 ffffa601`00000000 ffffbd82`ec2a8c50 : nt!IopParseDevice+0xe54
- ffffa601`3efe24c0 fffff801`96b27150 : ffffbd82`eb9c8000 ffffa601`3efe2728 00000000`00000040 ffffbd82`eaf49f20 : nt!ObpLookupObjectName+0x46b
- ffffa601`3efe2690 fffff801`96abce90 : 00000000`00000001 00000000`00000028 0000013b`bd8bc076 00000020`f60fba30 : nt!ObOpenObjectByNameEx+0x1e0
- ffffa601`3efe27d0 fffff801`967f8413 : ffffbd82`f0a37440 00000000`00000410 ffffbd82`f0a37440 ffffbd82`ee3f17c0 : nt!NtQueryAttributesFile+0x180
- ffffa601`3efe2a80 00007fff`12015b44 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
- 00000020`f60fb9b8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`12015b44
- STACK_COMMAND: kb
- CHKIMG_EXTENSION: !chkimg -lo 50 -db !nt
- 4 errors : !nt (fffff80196718fd2-fffff80196901385)
- fffff80196718fd0 00 00 *00 *e8 ff ff 48 c1 e1 04 49 8b c6 48 03 c8 ......H...I..H..
- fffff80196901380 00 00 00 40 *f7 *ee ff ff 4a 8b 04 10 84 c0 0f 89 [email protected].......
- MODULE_NAME: memory_corruption
- IMAGE_NAME: memory_corruption
- FOLLOWUP_NAME: memory_corruption
- DEBUG_FLR_IMAGE_TIMESTAMP: 0
- MEMORY_CORRUPTOR: STRIDE
- FAILURE_BUCKET_ID: MEMORY_CORRUPTION_STRIDE
- BUCKET_ID: MEMORY_CORRUPTION_STRIDE
- PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_STRIDE
- TARGET_TIME: 2017-07-31T18:31:26.000Z
- OSBUILD: 15063
- OSSERVICEPACK: 483
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 272
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2017-07-07 02:06:35
- BUILDDATESTAMP_STR: 160101.0800
- BUILDLAB_STR: WinBuild
- BUILDOSVER_STR: 10.0.15063.483
- ANALYSIS_SESSION_ELAPSED_TIME: 3e68
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:memory_corruption_stride
- FAILURE_ID_HASH: {574dbc1b-92cb-fb09-cb7a-cacc1bb2c511}
- Followup: memory_corruption
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement