Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Microsoft (R) Windows Debugger Version 10.0.14321.1024 AMD64
- Copyright (c) Microsoft Corporation. All rights reserved.
- Loading Dump File [C:\Users\UserName\Desktop\Dumps\052117-4578-01.dmp]
- Mini Kernel Dump File: Only registers and stack trace are available
- Symbol search path is: srv*
- Executable search path is:
- Windows 10 Kernel Version 15063 MP (4 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS
- Built by: 15063.0.amd64fre.rs2_release.170317-1834
- Machine Name:
- Kernel base = 0xfffff801`2947d000 PsLoadedModuleList = 0xfffff801`297c95a0
- Debug session time: Sun May 21 12:34:45.959 2017 (UTC - 4:00)
- System Uptime: 0 days 0:20:04.633
- Loading Kernel Symbols
- ...............................................................
- ................................................................
- ...................................
- Loading User Symbols
- Loading unloaded module list
- ........
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- Use !analyze -v to get detailed debugging information.
- BugCheck D1, {63b9, ff, 4c, 63b9}
- *** WARNING: Unable to verify timestamp for win32k.sys
- *** ERROR: Module load completed but symbols could not be loaded for win32k.sys
- Probably caused by : memory_corruption
- Followup: memory_corruption
- ---------
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
- An attempt was made to access a pageable (or completely invalid) address at an
- interrupt request level (IRQL) that is too high. This is usually
- caused by drivers using improper addresses.
- If kernel debugger is available get stack backtrace.
- Arguments:
- Arg1: 00000000000063b9, memory referenced
- Arg2: 00000000000000ff, IRQL
- Arg3: 000000000000004c, value 0 = read operation, 1 = write operation
- Arg4: 00000000000063b9, address which referenced memory
- Debugging Details:
- ------------------
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 10.0.15063.296 (WinBuild.160101.0800)
- SYSTEM_MANUFACTURER: System manufacturer
- SYSTEM_PRODUCT_NAME: System Product Name
- SYSTEM_SKU: SKU
- SYSTEM_VERSION: System Version
- BIOS_VENDOR: American Megatrends Inc.
- BIOS_VERSION: 2001
- BIOS_DATE: 09/23/2016
- BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
- BASEBOARD_PRODUCT: H110M-K D3
- BASEBOARD_VERSION: Rev X.0x
- DUMP_TYPE: 2
- BUGCHECK_P1: 63b9
- BUGCHECK_P2: ff
- BUGCHECK_P3: 4c
- BUGCHECK_P4: 63b9
- READ_ADDRESS: 00000000000063b9
- CURRENT_IRQL: 0
- FAULTING_IP:
- +0
- 00000000`000063b9 ?? ???
- PROCESS_NAME: System
- ADDITIONAL_DEBUG_TEXT: The trap occurred when interrupts are disabled on the target.
- BUGCHECK_STR: DISABLED_INTERRUPT_FAULT
- CPU_COUNT: 4
- CPU_MHZ: a98
- CPU_VENDOR: GenuineIntel
- CPU_FAMILY: 6
- CPU_MODEL: 5e
- CPU_STEPPING: 3
- CPU_MICROCODE: 6,5e,3,0 (F,M,S,R) SIG: 84'00000000 (cache) 84'00000000 (init)
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: CODE_CORRUPTION
- ANALYSIS_SESSION_HOST: UserName-PC
- ANALYSIS_SESSION_TIME: 05-22-2017 12:31:48.0225
- ANALYSIS_VERSION: 10.0.14321.1024 amd64fre
- TRAP_FRAME: ffffca81254fc5e0 -- (.trap 0xffffca81254fc5e0)
- NOTE: The trap frame does not contain all registers.
- Some register values may be zeroed or incorrect.
- rax=fffff79cc000b000 rbx=0000000000000000 rcx=0000000000000380
- rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
- rip=00000000000063b9 rsp=ffffca81254fc770 rbp=0000000000000000
- r8=0000000000000380 r9=0000000000000000 r10=0000000000000001
- r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
- r14=0000000000000000 r15=0000000000000000
- iopl=0 nv up di ng nz na po nc
- 00000000`000063b9 ?? ???
- Resetting default scope
- LAST_CONTROL_TRANSFER: from fffff801295f46a9 to fffff801295e9310
- FAILED_INSTRUCTION_ADDRESS:
- +0
- 00000000`000063b9 ?? ???
- STACK_COMMAND: kb
- CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
- fffff801294d7fa0 - nt!MiFlushTbAsNeeded+70
- [ 80:00 ]
- 1 error : !nt (fffff801294d7fa0)
- MODULE_NAME: memory_corruption
- IMAGE_NAME: memory_corruption
- FOLLOWUP_NAME: memory_corruption
- DEBUG_FLR_IMAGE_TIMESTAMP: 0
- MEMORY_CORRUPTOR: ONE_BIT
- FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
- BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
- PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_ONE_BIT
- TARGET_TIME: 2017-05-21T16:34:45.000Z
- OSBUILD: 15063
- OSSERVICEPACK: 296
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 272
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
- OS_LOCALE:
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2017-04-27 19:52:30
- BUILDDATESTAMP_STR: 160101.0800
- BUILDLAB_STR: WinBuild
- BUILDOSVER_STR: 10.0.15063.296
- ANALYSIS_SESSION_ELAPSED_TIME: 190b
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:memory_corruption_one_bit
- FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}
- Followup: memory_corruption
- ---------
- ======================================================================
- ======================================================================
- ======================================================================
- Microsoft (R) Windows Debugger Version 10.0.14321.1024 AMD64
- Copyright (c) Microsoft Corporation. All rights reserved.
- Loading Dump File [C:\Users\UserName\Desktop\Dumps\052117-4578-02.dmp]
- Mini Kernel Dump File: Only registers and stack trace are available
- Symbol search path is: srv*
- Executable search path is:
- Windows 10 Kernel Version 15063 MP (4 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS
- Built by: 15063.0.amd64fre.rs2_release.170317-1834
- Machine Name:
- Kernel base = 0xfffff800`d760e000 PsLoadedModuleList = 0xfffff800`d795a5a0
- Debug session time: Sun May 21 13:50:45.695 2017 (UTC - 4:00)
- System Uptime: 0 days 0:22:25.369
- Loading Kernel Symbols
- ...............................................................
- ................................................................
- ..................................
- Loading User Symbols
- Loading unloaded module list
- ........
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- Use !analyze -v to get detailed debugging information.
- BugCheck D1, {5c19, ff, e9, 5c19}
- Probably caused by : ntkrnlmp.exe ( nt!KiPageFault+23d )
- Followup: MachineOwner
- ---------
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
- An attempt was made to access a pageable (or completely invalid) address at an
- interrupt request level (IRQL) that is too high. This is usually
- caused by drivers using improper addresses.
- If kernel debugger is available get stack backtrace.
- Arguments:
- Arg1: 0000000000005c19, memory referenced
- Arg2: 00000000000000ff, IRQL
- Arg3: 00000000000000e9, value 0 = read operation, 1 = write operation
- Arg4: 0000000000005c19, address which referenced memory
- Debugging Details:
- ------------------
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 10.0.15063.296 (WinBuild.160101.0800)
- SYSTEM_MANUFACTURER: System manufacturer
- SYSTEM_PRODUCT_NAME: System Product Name
- SYSTEM_SKU: SKU
- SYSTEM_VERSION: System Version
- BIOS_VENDOR: American Megatrends Inc.
- BIOS_VERSION: 2001
- BIOS_DATE: 09/23/2016
- BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
- BASEBOARD_PRODUCT: H110M-K D3
- BASEBOARD_VERSION: Rev X.0x
- DUMP_TYPE: 2
- BUGCHECK_P1: 5c19
- BUGCHECK_P2: ff
- BUGCHECK_P3: e9
- BUGCHECK_P4: 5c19
- CURRENT_IRQL: 0
- FAULTING_IP:
- +0
- 00000000`00005c19 ?? ???
- PROCESS_NAME: System
- ADDITIONAL_DEBUG_TEXT: The trap occurred when interrupts are disabled on the target.
- BUGCHECK_STR: DISABLED_INTERRUPT_FAULT
- CPU_COUNT: 4
- CPU_MHZ: a98
- CPU_VENDOR: GenuineIntel
- CPU_FAMILY: 6
- CPU_MODEL: 5e
- CPU_STEPPING: 3
- CPU_MICROCODE: 6,5e,3,0 (F,M,S,R) SIG: 84'00000000 (cache) 84'00000000 (init)
- CUSTOMER_CRASH_COUNT: 2
- DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
- ANALYSIS_SESSION_HOST: UserName-PC
- ANALYSIS_SESSION_TIME: 05-22-2017 12:35:38.0685
- ANALYSIS_VERSION: 10.0.14321.1024 amd64fre
- TRAP_FRAME: ffffa88095afc680 -- (.trap 0xffffa88095afc680)
- NOTE: The trap frame does not contain all registers.
- Some register values may be zeroed or incorrect.
- rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000001
- rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
- rip=0000000000005c19 rsp=ffffa88095afc810 rbp=0000000000000000
- r8=ffffe58bacfb2cf0 r9=ffffe58bacfb2c90 r10=0000010540fca2ae
- r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
- r14=0000000000000000 r15=0000000000000000
- iopl=0 nv up di ng nz na pe nc
- 00000000`00005c19 ?? ???
- Resetting default scope
- LAST_CONTROL_TRANSFER: from fffff800d77856a9 to fffff800d777a310
- STACK_COMMAND: kb
- THREAD_SHA1_HASH_MOD_FUNC: bf99962f16aee8a6a536cfcc5454c0cd4db15ac9
- THREAD_SHA1_HASH_MOD_FUNC_OFFSET: e11032a5b0d8f823e1cbfc5959db225bec5c2b35
- THREAD_SHA1_HASH_MOD: 2a7ca9d3ab5386d53fea7498e1d81b9c4a4c036b
- FOLLOWUP_IP:
- nt!KiPageFault+23d
- fffff800`d7783c7d 33c0 xor eax,eax
- FAULT_INSTR_CODE: ffb0c033
- SYMBOL_STACK_INDEX: 2
- SYMBOL_NAME: nt!KiPageFault+23d
- FOLLOWUP_NAME: MachineOwner
- MODULE_NAME: nt
- IMAGE_NAME: ntkrnlmp.exe
- DEBUG_FLR_IMAGE_TIMESTAMP: 5902843e
- IMAGE_VERSION: 10.0.15063.296
- BUCKET_ID_FUNC_OFFSET: 23d
- FAILURE_BUCKET_ID: DISABLED_INTERRUPT_FAULT_nt!KiPageFault
- BUCKET_ID: DISABLED_INTERRUPT_FAULT_nt!KiPageFault
- PRIMARY_PROBLEM_CLASS: DISABLED_INTERRUPT_FAULT_nt!KiPageFault
- TARGET_TIME: 2017-05-21T17:50:45.000Z
- OSBUILD: 15063
- OSSERVICEPACK: 296
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 272
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
- OS_LOCALE:
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2017-04-27 19:52:30
- BUILDDATESTAMP_STR: 160101.0800
- BUILDLAB_STR: WinBuild
- BUILDOSVER_STR: 10.0.15063.296
- ANALYSIS_SESSION_ELAPSED_TIME: d88
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:disabled_interrupt_fault_nt!kipagefault
- FAILURE_ID_HASH: {4e9c41db-c8e3-cbef-73a7-1b373e8262de}
- Followup: MachineOwner
- ---------
- ======================================================================
- ======================================================================
- ======================================================================
- Microsoft (R) Windows Debugger Version 10.0.14321.1024 AMD64
- Copyright (c) Microsoft Corporation. All rights reserved.
- Loading Dump File [C:\Users\UserName\Desktop\Dumps\052117-4718-01.dmp]
- Mini Kernel Dump File: Only registers and stack trace are available
- Symbol search path is: srv*
- Executable search path is:
- Windows 10 Kernel Version 15063 MP (4 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS
- Built by: 15063.0.amd64fre.rs2_release.170317-1834
- Machine Name:
- Kernel base = 0xfffff803`3301d000 PsLoadedModuleList = 0xfffff803`333695a0
- Debug session time: Sun May 21 12:39:37.331 2017 (UTC - 4:00)
- System Uptime: 0 days 0:04:30.005
- Loading Kernel Symbols
- ...............................................................
- ................................................................
- ................................
- Loading User Symbols
- Loading unloaded module list
- ........
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- Use !analyze -v to get detailed debugging information.
- BugCheck D1, {4d66, ff, 8a, 4d66}
- *** WARNING: Unable to verify timestamp for win32k.sys
- *** ERROR: Module load completed but symbols could not be loaded for win32k.sys
- Probably caused by : memory_corruption
- Followup: memory_corruption
- ---------
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
- An attempt was made to access a pageable (or completely invalid) address at an
- interrupt request level (IRQL) that is too high. This is usually
- caused by drivers using improper addresses.
- If kernel debugger is available get stack backtrace.
- Arguments:
- Arg1: 0000000000004d66, memory referenced
- Arg2: 00000000000000ff, IRQL
- Arg3: 000000000000008a, value 0 = read operation, 1 = write operation
- Arg4: 0000000000004d66, address which referenced memory
- Debugging Details:
- ------------------
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 10.0.15063.296 (WinBuild.160101.0800)
- SYSTEM_MANUFACTURER: System manufacturer
- SYSTEM_PRODUCT_NAME: System Product Name
- SYSTEM_SKU: SKU
- SYSTEM_VERSION: System Version
- BIOS_VENDOR: American Megatrends Inc.
- BIOS_VERSION: 2001
- BIOS_DATE: 09/23/2016
- BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
- BASEBOARD_PRODUCT: H110M-K D3
- BASEBOARD_VERSION: Rev X.0x
- DUMP_TYPE: 2
- BUGCHECK_P1: 4d66
- BUGCHECK_P2: ff
- BUGCHECK_P3: 8a
- BUGCHECK_P4: 4d66
- READ_ADDRESS: 0000000000004d66
- CURRENT_IRQL: 0
- FAULTING_IP:
- +0
- 00000000`00004d66 ?? ???
- PROCESS_NAME: System
- ADDITIONAL_DEBUG_TEXT: The trap occurred when interrupts are disabled on the target.
- BUGCHECK_STR: DISABLED_INTERRUPT_FAULT
- CPU_COUNT: 4
- CPU_MHZ: a98
- CPU_VENDOR: GenuineIntel
- CPU_FAMILY: 6
- CPU_MODEL: 5e
- CPU_STEPPING: 3
- CPU_MICROCODE: 6,5e,3,0 (F,M,S,R) SIG: 84'00000000 (cache) 84'00000000 (init)
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: CODE_CORRUPTION
- ANALYSIS_SESSION_HOST: UserName-PC
- ANALYSIS_SESSION_TIME: 05-22-2017 12:38:05.0309
- ANALYSIS_VERSION: 10.0.14321.1024 amd64fre
- TRAP_FRAME: ffffd20160ef8680 -- (.trap 0xffffd20160ef8680)
- NOTE: The trap frame does not contain all registers.
- Some register values may be zeroed or incorrect.
- rax=fffff7e14000b001 rbx=0000000000000000 rcx=d32bbff612e30000
- rdx=ffffd20160eca180 rsi=0000000000000000 rdi=0000000000000000
- rip=0000000000004d66 rsp=ffffd20160ef8810 rbp=0000000000000000
- r8=0000000000000300 r9=0000000000000000 r10=0000000000000001
- r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
- r14=0000000000000000 r15=0000000000000000
- iopl=0 nv up di ng nz na po nc
- 00000000`00004d66 ?? ???
- Resetting default scope
- LAST_CONTROL_TRANSFER: from fffff803331946a9 to fffff80333189310
- FAILED_INSTRUCTION_ADDRESS:
- +0
- 00000000`00004d66 ?? ???
- STACK_COMMAND: kb
- CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
- fffff80333077fa0 - nt!MiFlushTbAsNeeded+70
- [ 80:00 ]
- 1 error : !nt (fffff80333077fa0)
- MODULE_NAME: memory_corruption
- IMAGE_NAME: memory_corruption
- FOLLOWUP_NAME: memory_corruption
- DEBUG_FLR_IMAGE_TIMESTAMP: 0
- MEMORY_CORRUPTOR: ONE_BIT
- FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
- BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
- PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_ONE_BIT
- TARGET_TIME: 2017-05-21T16:39:37.000Z
- OSBUILD: 15063
- OSSERVICEPACK: 296
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 272
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
- OS_LOCALE:
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2017-04-27 19:52:30
- BUILDDATESTAMP_STR: 160101.0800
- BUILDLAB_STR: WinBuild
- BUILDOSVER_STR: 10.0.15063.296
- ANALYSIS_SESSION_ELAPSED_TIME: 18b2
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:memory_corruption_one_bit
- FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}
- Followup: memory_corruption
- ---------
- ======================================================================
- ======================================================================
- ======================================================================
- Microsoft (R) Windows Debugger Version 10.0.14321.1024 AMD64
- Copyright (c) Microsoft Corporation. All rights reserved.
- Loading Dump File [C:\Users\UserName\Desktop\Dumps\052117-4734-01.dmp]
- Mini Kernel Dump File: Only registers and stack trace are available
- Symbol search path is: srv*
- Executable search path is:
- Windows 10 Kernel Version 15063 MP (4 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS
- Built by: 15063.0.amd64fre.rs2_release.170317-1834
- Machine Name:
- Kernel base = 0xfffff802`cf48b000 PsLoadedModuleList = 0xfffff802`cf7d75a0
- Debug session time: Sun May 21 13:27:56.030 2017 (UTC - 4:00)
- System Uptime: 0 days 0:47:57.704
- Loading Kernel Symbols
- ...............................................................
- ................................................................
- ...................................
- Loading User Symbols
- Loading unloaded module list
- ..........
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- Use !analyze -v to get detailed debugging information.
- BugCheck D1, {2d66, ff, 41, 2d66}
- *** WARNING: Unable to verify timestamp for win32k.sys
- *** ERROR: Module load completed but symbols could not be loaded for win32k.sys
- Probably caused by : memory_corruption
- Followup: memory_corruption
- ---------
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
- An attempt was made to access a pageable (or completely invalid) address at an
- interrupt request level (IRQL) that is too high. This is usually
- caused by drivers using improper addresses.
- If kernel debugger is available get stack backtrace.
- Arguments:
- Arg1: 0000000000002d66, memory referenced
- Arg2: 00000000000000ff, IRQL
- Arg3: 0000000000000041, value 0 = read operation, 1 = write operation
- Arg4: 0000000000002d66, address which referenced memory
- Debugging Details:
- ------------------
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 10.0.15063.296 (WinBuild.160101.0800)
- SYSTEM_MANUFACTURER: System manufacturer
- SYSTEM_PRODUCT_NAME: System Product Name
- SYSTEM_SKU: SKU
- SYSTEM_VERSION: System Version
- BIOS_VENDOR: American Megatrends Inc.
- BIOS_VERSION: 2001
- BIOS_DATE: 09/23/2016
- BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
- BASEBOARD_PRODUCT: H110M-K D3
- BASEBOARD_VERSION: Rev X.0x
- DUMP_TYPE: 2
- BUGCHECK_P1: 2d66
- BUGCHECK_P2: ff
- BUGCHECK_P3: 41
- BUGCHECK_P4: 2d66
- CURRENT_IRQL: 0
- FAULTING_IP:
- +0
- 00000000`00002d66 ?? ???
- PROCESS_NAME: System
- ADDITIONAL_DEBUG_TEXT: The trap occurred when interrupts are disabled on the target.
- BUGCHECK_STR: DISABLED_INTERRUPT_FAULT
- CPU_COUNT: 4
- CPU_MHZ: a98
- CPU_VENDOR: GenuineIntel
- CPU_FAMILY: 6
- CPU_MODEL: 5e
- CPU_STEPPING: 3
- CPU_MICROCODE: 6,5e,3,0 (F,M,S,R) SIG: 84'00000000 (cache) 84'00000000 (init)
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: CODE_CORRUPTION
- ANALYSIS_SESSION_HOST: UserName-PC
- ANALYSIS_SESSION_TIME: 05-22-2017 12:39:42.0732
- ANALYSIS_VERSION: 10.0.14321.1024 amd64fre
- TRAP_FRAME: ffffd10083cf7680 -- (.trap 0xffffd10083cf7680)
- NOTE: The trap frame does not contain all registers.
- Some register values may be zeroed or incorrect.
- rax=fffff7fe4000b001 rbx=0000000000000000 rcx=9ac83e172d050000
- rdx=ffffd10083cc9180 rsi=0000000000000000 rdi=0000000000000000
- rip=0000000000002d66 rsp=ffffd10083cf7810 rbp=0000000000000000
- r8=0000000000000300 r9=0000000000000000 r10=0000000000000001
- r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
- r14=0000000000000000 r15=0000000000000000
- iopl=0 nv up di ng nz na po nc
- 00000000`00002d66 ?? ???
- Resetting default scope
- LAST_CONTROL_TRANSFER: from fffff802cf6026a9 to fffff802cf5f7310
- STACK_COMMAND: kb
- CHKIMG_EXTENSION: !chkimg -lo 50 -db !nt
- 2 errors : !nt (fffff802cf593a89-fffff802cf593ab8)
- fffff802cf593a80 8b e9 48 ba 00 00 00 00 80 *f3 ff ff 4b 8d 2c 76 ..H.........K.,v
- ...
- fffff802cf593ab0 c1 48 b9 00 00 00 00 80 *fe ff ff 48 8b 0c 08 48 .H.........H...H
- MODULE_NAME: memory_corruption
- IMAGE_NAME: memory_corruption
- FOLLOWUP_NAME: memory_corruption
- DEBUG_FLR_IMAGE_TIMESTAMP: 0
- MEMORY_CORRUPTOR: STRIDE
- FAILURE_BUCKET_ID: MEMORY_CORRUPTION_STRIDE
- BUCKET_ID: MEMORY_CORRUPTION_STRIDE
- PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_STRIDE
- TARGET_TIME: 2017-05-21T17:27:56.000Z
- OSBUILD: 15063
- OSSERVICEPACK: 296
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 272
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
- OS_LOCALE:
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2017-04-27 19:52:30
- BUILDDATESTAMP_STR: 160101.0800
- BUILDLAB_STR: WinBuild
- BUILDOSVER_STR: 10.0.15063.296
- ANALYSIS_SESSION_ELAPSED_TIME: 18d9
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:memory_corruption_stride
- FAILURE_ID_HASH: {574dbc1b-92cb-fb09-cb7a-cacc1bb2c511}
- Followup: memory_corruption
- ---------
- ======================================================================
- ======================================================================
- ======================================================================
- Microsoft (R) Windows Debugger Version 10.0.14321.1024 AMD64
- Copyright (c) Microsoft Corporation. All rights reserved.
- Loading Dump File [C:\Users\UserName\Desktop\Dumps\052117-5171-01.dmp]
- Mini Kernel Dump File: Only registers and stack trace are available
- Symbol search path is: srv*
- Executable search path is:
- Windows 10 Kernel Version 15063 MP (4 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS
- Built by: 15063.0.amd64fre.rs2_release.170317-1834
- Machine Name:
- Kernel base = 0xfffff801`45a17000 PsLoadedModuleList = 0xfffff801`45d635a0
- Debug session time: Sun May 21 13:54:12.071 2017 (UTC - 4:00)
- System Uptime: 0 days 0:03:05.745
- Loading Kernel Symbols
- ...............................................................
- ................................................................
- .................................
- Loading User Symbols
- Loading unloaded module list
- .........
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- Use !analyze -v to get detailed debugging information.
- BugCheck D1, {ed66, ff, 2a, ed66}
- *** WARNING: Unable to verify timestamp for win32k.sys
- *** ERROR: Module load completed but symbols could not be loaded for win32k.sys
- Probably caused by : memory_corruption
- Followup: memory_corruption
- ---------
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
- An attempt was made to access a pageable (or completely invalid) address at an
- interrupt request level (IRQL) that is too high. This is usually
- caused by drivers using improper addresses.
- If kernel debugger is available get stack backtrace.
- Arguments:
- Arg1: 000000000000ed66, memory referenced
- Arg2: 00000000000000ff, IRQL
- Arg3: 000000000000002a, value 0 = read operation, 1 = write operation
- Arg4: 000000000000ed66, address which referenced memory
- Debugging Details:
- ------------------
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 10.0.15063.296 (WinBuild.160101.0800)
- SYSTEM_MANUFACTURER: System manufacturer
- SYSTEM_PRODUCT_NAME: System Product Name
- SYSTEM_SKU: SKU
- SYSTEM_VERSION: System Version
- BIOS_VENDOR: American Megatrends Inc.
- BIOS_VERSION: 2001
- BIOS_DATE: 09/23/2016
- BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
- BASEBOARD_PRODUCT: H110M-K D3
- BASEBOARD_VERSION: Rev X.0x
- DUMP_TYPE: 2
- BUGCHECK_P1: ed66
- BUGCHECK_P2: ff
- BUGCHECK_P3: 2a
- BUGCHECK_P4: ed66
- READ_ADDRESS: 000000000000ed66
- CURRENT_IRQL: 0
- FAULTING_IP:
- +0
- 00000000`0000ed66 ?? ???
- PROCESS_NAME: System
- ADDITIONAL_DEBUG_TEXT: The trap occurred when interrupts are disabled on the target.
- BUGCHECK_STR: DISABLED_INTERRUPT_FAULT
- CPU_COUNT: 4
- CPU_MHZ: a98
- CPU_VENDOR: GenuineIntel
- CPU_FAMILY: 6
- CPU_MODEL: 5e
- CPU_STEPPING: 3
- CPU_MICROCODE: 6,5e,3,0 (F,M,S,R) SIG: 84'00000000 (cache) 84'00000000 (init)
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: CODE_CORRUPTION
- ANALYSIS_SESSION_HOST: UserName-PC
- ANALYSIS_SESSION_TIME: 05-22-2017 12:41:29.0649
- ANALYSIS_VERSION: 10.0.14321.1024 amd64fre
- TRAP_FRAME: ffffaa01a6cb5680 -- (.trap 0xffffaa01a6cb5680)
- NOTE: The trap frame does not contain all registers.
- Some register values may be zeroed or incorrect.
- rax=0000000000000001 rbx=0000000000000000 rcx=29f9687e2f7d0000
- rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
- rip=000000000000ed66 rsp=ffffaa01a6cb5810 rbp=0000000000000000
- r8=0000008000000000 r9=ffff938fce87c9e0 r10=0000000000000001
- r11=ffffaa01a6cb5808 r12=0000000000000000 r13=0000000000000000
- r14=0000000000000000 r15=0000000000000000
- iopl=0 nv up di ng nz na po nc
- 00000000`0000ed66 ?? ???
- Resetting default scope
- LAST_CONTROL_TRANSFER: from fffff80145b8e6a9 to fffff80145b83310
- FAILED_INSTRUCTION_ADDRESS:
- +0
- 00000000`0000ed66 ?? ???
- STACK_COMMAND: kb
- CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
- fffff80145a71fa0 - nt!MiFlushTbAsNeeded+70
- [ 80:00 ]
- 1 error : !nt (fffff80145a71fa0)
- MODULE_NAME: memory_corruption
- IMAGE_NAME: memory_corruption
- FOLLOWUP_NAME: memory_corruption
- DEBUG_FLR_IMAGE_TIMESTAMP: 0
- MEMORY_CORRUPTOR: ONE_BIT
- FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
- BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
- PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_ONE_BIT
- TARGET_TIME: 2017-05-21T17:54:12.000Z
- OSBUILD: 15063
- OSSERVICEPACK: 296
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 272
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
- OS_LOCALE:
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2017-04-27 19:52:30
- BUILDDATESTAMP_STR: 160101.0800
- BUILDLAB_STR: WinBuild
- BUILDOSVER_STR: 10.0.15063.296
- ANALYSIS_SESSION_ELAPSED_TIME: 18d1
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:memory_corruption_one_bit
- FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}
- Followup: memory_corruption
- ---------
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement