Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Microsoft (R) Windows Debugger Version 10.0.14321.1024 X86
- Copyright (c) Microsoft Corporation. All rights reserved.
- Auto Dump Analyzer by gardenman
- Time to debug file(s): 00 hours and 04 minutes and 44 seconds
- ============================= SYSTEM INFO ==============================
- VERSION: 2.0
- PRODUCT_NAME: MS-7972
- MANUFACTURER: MSI
- =========================== BRIEF BIOS INFO ============================
- DATE: 04/18/2017
- VERSION: C.B0
- VENDOR: American Megatrends Inc.
- =========================== MOTHERBOARD INFO ===========================
- VERSION: 2.0
- PRODUCT: B150M MORTAR (MS-7972)
- MANUFACTURER: MSI
- =============================== CPU INFO ===============================
- Processor Version: Intel(R) Core(TM) i5-6400 CPU @ 2.70GHz
- MICROCODE: 6,5e,3,0 (F,M,S,R) SIG: A6'00000000 (cache) A6'00000000 (init)
- STEPPING: 3
- MODEL: 5e
- FAMILY: 6
- VENDOR: GenuineIntel
- MHZ: 2712
- COUNT: 4
- =============================== OS INFO ================================
- BUILDOSVER: 10.0.15063.540
- BUILDLAB: WinBuild
- BUILDDATESTAMP: 160101.0800
- BUILD_TIMESTAMP: 2017-07-31 21:23:25
- EDITION: Windows 10 WinNt TerminalServer SingleUserTS
- NAME: Windows 10
- PLATFORM_TYPE: x64
- SERVICEPACK: 540
- BUILD: 15063
- BUILD_VERSION: 10.0.15063.540 (WinBuild.160101.0800)
- Product: WinNt, suite: TerminalServer SingleUserTS
- If you see multiple OS versions listed above it's likely because the
- dump files were created at different times and Windows has updated to
- a new version. This is normal. The same goes for BIOS Versions/Dates.
- ========================================================================
- ==================== Dump File: 081717-4578-01.dmp =====================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 15063 MP (4 procs) Free x64
- Kernel base = 0xfffff802`1801f000 PsLoadedModuleList = 0xfffff802`1836b5c0
- Debug session time: Wed Aug 16 19:10:38.919 2017 (UTC - 4:00)
- System Uptime: 0 days 3:21:08.560
- BugCheck 1E, {ffffffffc0000005, fffff802184c409d, 0, 2c}
- *** WARNING: Unable to verify timestamp for rzpnk.sys
- *** ERROR: Module load completed but symbols could not be loaded for rzpnk.sys
- Probably caused by : rzpnk.sys ( rzpnk+75dd )
- Followup: MachineOwner
- KMODE_EXCEPTION_NOT_HANDLED (1e)
- This is a very common bugcheck. Usually the exception address pinpoints
- the driver/function that caused the problem. Always note this address
- as well as the link date of the driver/image that contains this address.
- Arguments:
- Arg1: ffffffffc0000005, The exception code that was not handled
- Arg2: fffff802184c409d, The address that the exception occurred at
- Arg3: 0000000000000000, Parameter 0 of the exception
- Arg4: 000000000000002c, Parameter 1 of the exception
- Debugging Details:
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- DUMP_TYPE: 2
- DUMP_FILE_ATTRIBUTES: 0x8
- Kernel Generated Triage Dump
- READ_ADDRESS: fffff80218400358: Unable to get MiVisibleState
- 000000000000002c
- EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
- FAULTING_IP:
- nt!ObpCreateHandle+39d
- fffff802`184c409d 0fb6472c movzx eax,byte ptr [rdi+2Ch]
- EXCEPTION_PARAMETER2: 000000000000002c
- BUGCHECK_STR: 0x1E_c0000005_R
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
- PROCESS_NAME: RazerIngameEng
- CURRENT_IRQL: 0
- EXCEPTION_RECORD: ffff8000872bf470 -- (.exr 0xffff8000872bf470)
- ExceptionAddress: 000000000000002c
- ExceptionCode: 00000002
- ExceptionFlags: 00000000
- NumberParameters: 1052889216
- Parameter[0]: 0000000000000000
- Parameter[1]: 0000000000000000
- Parameter[2]: 0000000000000000
- Parameter[3]: 0000000000000000
- Parameter[4]: 0000000000000000
- Parameter[5]: 0000000000000000
- Parameter[6]: 0000000000000000
- Parameter[7]: 0000000000000000
- Parameter[8]: 0000000000000000
- Parameter[9]: 0000000000000000
- Parameter[10]: 0000000000000000
- Parameter[11]: 0000000000000000
- Parameter[12]: 0000000000000000
- Parameter[13]: fffff80218194e57
- Parameter[14]: ffff8000872bf510
- LAST_CONTROL_TRANSFER: from fffff80218049b7c to fffff8021818b560
- STACK_TEXT:
- ffff8000`872bec68 fffff802`18049b7c : 00000000`0000001e ffffffff`c0000005 fffff802`184c409d 00000000`00000000 : nt!KeBugCheckEx
- ffff8000`872bec70 fffff802`1819698e : ffff8000`872bf470 00000000`00000000 00000000`00000000 ffff9582`3c3ea000 : nt!KiDispatchException+0x23c
- ffff8000`872bf320 fffff802`18194e57 : ffff8000`872bf510 00000000`00000018 ffff8000`86514340 fffff802`1829e4b0 : nt!KiExceptionDispatch+0xce
- ffff8000`872bf500 fffff802`184c409d : ffff9582`384bdf20 ffff8000`872bf7b0 ffff8000`872bf9e0 ffff8000`872bf7b0 : nt!KiPageFault+0x217
- ffff8000`872bf690 fffff802`184c9a2d : 00000000`00000000 00000000`00000000 00000000`00000001 00000000`02000000 : nt!ObpCreateHandle+0x39d
- ffff8000`872bf8d0 fffff802`1854aca3 : 00000000`000003e9 00000000`00000000 95823ec1`d080ae23 ffff9582`3ec1d080 : nt!PsOpenProcess+0x28d
- ffff8000`872bfbe0 fffff802`18196413 : 00000000`0000148c fffff802`1818ee95 ffffad00`161c8d80 fffff802`1818ccc1 : nt!NtOpenProcess+0x23
- ffff8000`872bfc20 fffff802`1818e740 : fffff802`ee3d75dd ffff8000`872bfdd0 00000000`00000018 00000000`0000148c : nt!KiSystemServiceCopyEnd+0x13
- ffff8000`872bfdb8 fffff802`ee3d75dd : ffff8000`872bfdd0 00000000`00000018 00000000`0000148c 00000000`00000000 : nt!KiServiceLinkage
- ffff8000`872bfdc0 ffff8000`872bfdd0 : 00000000`00000018 00000000`0000148c 00000000`00000000 ffff9582`3d812080 : rzpnk+0x75dd
- ffff8000`872bfdc8 00000000`00000018 : 00000000`0000148c 00000000`00000000 ffff9582`3d812080 fffff802`181195d2 : 0xffff8000`872bfdd0
- ffff8000`872bfdd0 00000000`0000148c : 00000000`00000000 ffff9582`3d812080 fffff802`181195d2 00000000`00001fe4 : 0x18
- ffff8000`872bfdd8 00000000`00000000 : ffff9582`3d812080 fffff802`181195d2 00000000`00001fe4 00000000`00000000 : 0x148c
- STACK_COMMAND: kb
- THREAD_SHA1_HASH_MOD_FUNC: 244f7bca8696bfd926172f7bd4c34384e6d18e41
- THREAD_SHA1_HASH_MOD_FUNC_OFFSET: c9f5e496e13ed80261f595cc31b8f2babdafcba8
- THREAD_SHA1_HASH_MOD: 6db1e298ca85b026daf7b61e7ad9c7692f4e315a
- FOLLOWUP_IP:
- rzpnk+75dd
- fffff802`ee3d75dd ?? ???
- SYMBOL_STACK_INDEX: 9
- SYMBOL_NAME: rzpnk+75dd
- FOLLOWUP_NAME: MachineOwner
- MODULE_NAME: rzpnk
- IMAGE_NAME: rzpnk.sys
- DEBUG_FLR_IMAGE_TIMESTAMP: 596bba87
- BUCKET_ID_FUNC_OFFSET: 75dd
- FAILURE_BUCKET_ID: 0x1E_c0000005_R_rzpnk!unknown_function
- BUCKET_ID: 0x1E_c0000005_R_rzpnk!unknown_function
- PRIMARY_PROBLEM_CLASS: 0x1E_c0000005_R_rzpnk!unknown_function
- TARGET_TIME: 2017-08-16T23:10:38.000Z
- SUITE_MASK: 272
- PRODUCT_TYPE: 1
- USER_LCID: 0
- FAILURE_ID_HASH_STRING: km:0x1e_c0000005_r_rzpnk!unknown_function
- FAILURE_ID_HASH: {d94a098a-232a-5c83-5609-ce31e35363c9}
- Followup: MachineOwner
- ========================================================================
- ========================== 3RD PARTY DRIVERS ===========================
- ============================ Sorted by Date ============================
- ========================================================================
- Image path: ndisrfl.sys
- Image name: ndisrfl.sys
- Info Link : http://www.carrona.org/drivers/driver.php?id=ndisrfl.sys
- ADA Info : Intel(R) Technology Access Filter Driver
- Timestamp : Thu Jul 9 2015
- Image path: TeeDriverW8x64.sys
- Image name: TeeDriverW8x64.sys
- Info Link : http://www.carrona.org/drivers/driver.php?id=TeeDriverW8x64.sys
- ADA Info : IntelĀ® Management Engine Interface
- Timestamp : Thu Sep 15 2016
- Image path: rzendpt.sys
- Image name: rzendpt.sys
- Info Link : http://www.carrona.org/drivers/driver.php?id=rzendpt.sys
- ADA Info : Razer RzEndPt driver https://www.razerzone.com/
- Timestamp : Wed Oct 26 2016
- Image path: rzudd.sys
- Image name: rzudd.sys
- Info Link : http://www.carrona.org/drivers/driver.php?id=rzudd.sys
- ADA Info : Razer Rzudd Engine Driver https://www.razerzone.com/
- Timestamp : Wed Oct 26 2016
- Image path: nvvhci.sys
- Image name: nvvhci.sys
- Info Link : http://www.carrona.org/drivers/driver.php?id=nvvhci.sys
- ADA Info : Nvidia Virtual USB Host Controller driver http://www.nvidia.com/
- Timestamp : Tue Dec 27 2016
- Image path: nvvad64v.sys
- Image name: nvvad64v.sys
- Info Link : http://www.carrona.org/drivers/driver.php?id=nvvad64v.sys
- ADA Info : Nvidia Virtual Audio Driver http://www.nvidia.com/
- Timestamp : Wed Apr 5 2017
- Image path: nvhda64v.sys
- Image name: nvhda64v.sys
- Info Link : http://www.carrona.org/drivers/driver.php?id=nvhda64v.sys
- ADA Info : Nvidia HDMI Audio Device http://www.nvidia.com/
- Timestamp : Tue May 16 2017
- Image path: rt640x64.sys
- Image name: rt640x64.sys
- Info Link : http://www.carrona.org/drivers/driver.php?id=rt640x64.sys
- ADA Info : Realtek NICDRV 8169 PCIe GBE Family Controller driver http://www.realtek.com.tw
- Timestamp : Fri May 26 2017
- Image path: aswbidsdrivera.sys
- Image name: aswbidsdrivera.sys
- Info Link : http://www.carrona.org/drivers/driver.php?id=aswbidsdrivera.sys
- ADA Info : Avast IDS Application Activity Monitor Driver http://www.avast.com/
- Timestamp : Tue Jun 6 2017
- Image path: aswbidsha.sys
- Image name: aswbidsha.sys
- Info Link : http://www.carrona.org/drivers/driver.php?id=aswbidsha.sys
- ADA Info : Avast Antivirus http://www.avast.com/
- Timestamp : Tue Jun 6 2017
- Image path: aswbloga.sys
- Image name: aswbloga.sys
- Info Link : http://www.carrona.org/drivers/driver.php?id=aswbloga.sys
- ADA Info : Avast Antivirus http://www.avast.com/
- Timestamp : Tue Jun 6 2017
- Image path: aswbuniva.sys
- Image name: aswbuniva.sys
- Info Link : http://www.carrona.org/drivers/driver.php?id=aswbuniva.sys
- ADA Info : Avast Antivirus http://www.avast.com/
- Timestamp : Tue Jun 6 2017
- Image path: SCDEmu.SYS
- Image name: SCDEmu.SYS
- Info Link : http://www.carrona.org/drivers/driver.php?id=SCDEmu.SYS
- Timestamp : Tue Jun 6 2017
- Image path: nvlddmkm.sys
- Image name: nvlddmkm.sys
- Info Link : http://www.carrona.org/drivers/driver.php?id=nvlddmkm.sys
- ADA Info : Nvidia Graphics Card driver http://www.nvidia.com/
- Timestamp : Wed Jun 7 2017
- Image path: aswRdr2.sys
- Image name: aswRdr2.sys
- Info Link : http://www.carrona.org/drivers/driver.php?id=aswRdr2.sys
- ADA Info : Avast Antivirus http://www.avast.com/
- Timestamp : Mon Jun 19 2017
- Image path: aswRvrt.sys
- Image name: aswRvrt.sys
- Info Link : http://www.carrona.org/drivers/driver.php?id=aswRvrt.sys
- ADA Info : Avast Antivirus http://www.avast.com/
- Timestamp : Mon Jun 19 2017
- Image path: aswSnx.sys
- Image name: aswSnx.sys
- Info Link : http://www.carrona.org/drivers/driver.php?id=aswSnx.sys
- ADA Info : Avast Antivirus http://www.avast.com/
- Timestamp : Mon Jun 19 2017
- Image path: aswStm.sys
- Image name: aswStm.sys
- Info Link : http://www.carrona.org/drivers/driver.php?id=aswStm.sys
- ADA Info : Avast Antivirus http://www.avast.com/
- Timestamp : Mon Jun 19 2017
- Image path: aswMonFlt.sys
- Image name: aswMonFlt.sys
- Info Link : http://www.carrona.org/drivers/driver.php?id=aswMonFlt.sys
- ADA Info : Avast Antivirus http://www.avast.com/
- Timestamp : Thu Jun 22 2017
- Image path: aswSP.sys
- Image name: aswSP.sys
- Info Link : http://www.carrona.org/drivers/driver.php?id=aswSP.sys
- ADA Info : Avast Antivirus http://www.avast.com/
- Timestamp : Thu Jun 22 2017
- Image path: aswVmm.sys
- Image name: aswVmm.sys
- Info Link : http://www.carrona.org/drivers/driver.php?id=aswVmm.sys
- ADA Info : Avast Antivirus http://www.avast.com/
- Timestamp : Thu Jun 29 2017
- Image path: rzpnk.sys
- Image name: rzpnk.sys
- Info Link : http://www.carrona.org/drivers/driver.php?id=rzpnk.sys
- ADA Info : Razer Overlay Support https://www.razerzone.com/
- Timestamp : Sun Jul 16 2017
- Image path: rzpmgrk.sys
- Image name: rzpmgrk.sys
- Info Link : http://www.carrona.org/drivers/driver.php?id=rzpmgrk.sys
- ADA Info : Razer Overlay Support https://www.razerzone.com/
- Timestamp : Tue Jul 18 2017
- Image path: RTKVHD64.sys
- Image name: RTKVHD64.sys
- Info Link : http://www.carrona.org/drivers/driver.php?id=RTKVHD64.sys
- ADA Info : Realtek Audio Driver system driver http://www.realtek.com.tw
- Timestamp : Wed Jul 19 2017
- ========================================================================
- ========================== MICROSOFT DRIVERS ===========================
- ========================================================================
- ACPI.sys ACPI Driver for NT (Microsoft)
- acpiex.sys ACPIEx Driver (Microsoft)
- acpipagr.sys ACPI Processor Aggregator Device Driver
- afd.sys Ancillary Function Driver for WinSock (Microsoft)
- ahcache.sys Application Compatibility Cache (Microsoft)
- BasicDisplay.sys Basic Display driver (Microsoft)
- BasicRender.sys Basic Render driver (Microsoft)
- Beep.SYS BEEP driver (Microsoft)
- BOOTVID.dll VGA Boot Driver (Microsoft)
- bowser.sys NT Lan Manager Datagram Receiver Driver (Microsoft)
- cdd.dll Canonical Display Driver (Microsoft)
- cdrom.sys SCSI CD-ROM Driver (Microsoft)
- CEA.sys Event Aggregation Kernal Mode Library (Microsoft)
- CI.dll Code Integrity Module (Microsoft)
- CLASSPNP.SYS SCSI Class System Dll (Microsoft)
- CLFS.SYS Common Log File System Driver (Microsoft)
- clipsp.sys CLIP Service (Microsoft)
- cmimcext.sys Kernal Configuration Manager Initial Con. Driver (Microsoft)
- cng.sys Kernal Cryptography, Next Generation Driver (Microsoft)
- CompositeBus.sys Multi-Transport Composite Bus Enumerator (Microsoft)
- condrv.sys Console Driver (Microsoft)
- crashdmp.sys Crash Dump Driver
- csc.sys Windows Client Side Caching Driver
- dfsc.sys DFS Namespace Client Driver (Microsoft)
- disk.sys PnP Disk Driver (Microsoft)
- drmk.sys Digital Rights Management (DRM) driver (Microsoft)
- dump_dumpfve.sys Bitlocker Drive Encryption Crashdump Filter
- dump_storahci.sys MS AHCI Storport Miniport Driver
- dump_storport.sys Provides disk access during crash dump file generation (Microsoft)
- dxgkrnl.sys DirectX Graphics Kernal (Microsoft)
- dxgmms2.sys DirectX Graphics MMS
- EhStorClass.sys Enhanced Storage Class driver for IEEE... (Microsoft)
- filecrypt.sys Windows sandboxing and encryption filter (Microsoft)
- fileinfo.sys FileInfo Filter Driver (Microsoft)
- FLTMGR.SYS Filesystem Filter Manager (Microsoft)
- Fs_Rec.sys File System Recognizer Driver (Microsoft)
- fvevol.sys BitLocker Driver Encryption Driver (Microsoft)
- fwpkclnt.sys FWP/IPsec Kernal-Mode API (Microsoft)
- gpuenergydrv.sys GPU Energy Kernal Driver (Microsoft)
- hal.dll Hardware Abstraction Layer DLL (Microsoft)
- HDAudBus.sys High Definition Audio Bus Driver (Microsoft)
- HIDCLASS.SYS Hid Class Library
- HIDPARSE.SYS Hid Parsing Library (Microsoft)
- hidusb.sys USB Miniport Driver for Input Devices (Microsoft)
- HTTP.sys HTTP Protocol Stack (Microsoft)
- intelpep.sys Intel Power Engine Plugin (Microsoft)
- intelppm.sys Processor Device Driver (Microsoft)
- iorate.sys I/O rate control Filter (Microsoft)
- kbdclass.sys Keyboard Class Driver (Microsoft)
- kbdhid.sys HID Mouse Filter Driver or HID Keyboard Filter Driver (Microsoft)
- kdcom.dll Kernel Debugger HW Extension DLL (Microsoft)
- kdnic.sys Microsoft Kernel Debugger Network Miniport (Microsoft)
- ks.sys Kernal CSA Library (Microsoft)
- ksecdd.sys Kernel Security Support Provider Interface (Microsoft)
- ksecpkg.sys Kernel Security Support Provider Interface Packages (Microsoft)
- ksthunk.sys Kernal Streaming WOW Thunk Service (Microsoft)
- lltdio.sys Link-Layer Topology Mapper I/O Driver (Microsoft)
- luafv.sys LUA File Virtualization Filter Driver (Microsoft)
- mcupdate.dll Media Center Update (Microsoft)
- mmcss.sys MMCSS Driver (Microsoft)
- monitor.sys Monitor Driver (Microsoft)
- mouclass.sys Mouse Class Driver (Microsoft)
- mouhid.sys HID Mouse Filter Driver (Microsoft)
- mountmgr.sys Mount Point Manager (Microsoft)
- mpsdrv.sys Microsoft Protection Service Driver (Microsoft)
- mrxsmb.sys SMB MiniRedirector Wrapper and Engine (Microsoft)
- mrxsmb10.sys Longhorn SMB Downlevel SubRdr (Microsoft)
- mrxsmb20.sys Longhorn SMB 2.0 Redirector (Microsoft)
- Msfs.SYS Mailslot driver (Microsoft)
- msisadrv.sys ISA Driver (Microsoft)
- mslldp.sys Microsoft Link-Layer Discovery Protocol... (Microsoft)
- msrpc.sys Kernel Remote Procedure Call Provider (Microsoft)
- mssmbios.sys System Management BIOS driver (Microsoft)
- mup.sys Multiple UNC Provider driver (Microsoft)
- ndis.sys Network Driver Interface Specification (NDIS) driver (Microsoft)
- ndisuio.sys NDIS User mode I/O driver (Microsoft)
- NdisVirtualBus.sys Virtual Network Adapter Enumerator (Microsoft)
- Ndu.sys Network Data Usage Monitoring driver (Microsoft)
- netbios.sys NetBIOS Interface driver (Microsoft)
- netbt.sys MBT Transport driver (Microsoft)
- NETIO.SYS Network I/O Subsystem (Microsoft)
- Npfs.SYS NPFS driver (Microsoft)
- npsvctrig.sys Named pipe service triggers (Microsoft)
- nsiproxy.sys NSI Proxy driver (Microsoft)
- NTFS.sys NT File System Driver (Microsoft)
- ntkrnlmp.exe Windows NT operating system kernel (Microsoft)
- ntosext.sys NTOS Extension Host driver (Microsoft)
- Null.SYS NULL Driver (Microsoft)
- pacer.sys QoS Packet Scheduler (Microsoft)
- partmgr.sys Partition driver (Microsoft)
- pci.sys NT Plug and Play PCI Enumerator
- pcw.sys Performance Counter Driver (Microsoft)
- pdc.sys Power Dependency Coordinator Driver (Microsoft)
- peauth.sys Protected Environment Authentication and Authorization Export Driver (Microsoft)
- portcls.sys Class Driver for Port/Miniport Devices system driver (Microsoft)
- PSHED.dll Platform Specific Hardware Error driver (Microsoft)
- rdbss.sys Redirected Drive Buffering SubSystem driver (Microsoft)
- rdpbus.sys Microsoft RDP Bus Device driver (Microsoft)
- rdpvideominiport.sys Microsoft RDP Video Miniport driver
- rdyboost.sys ReadyBoost Driver (Microsoft)
- registry.sys Registry Container driver (Microsoft)
- rspndr.sys Link-Layer Topology Responder driver (Microsoft)
- serenum.sys Serial Port Enumerator
- serial.sys Serial Device Driver
- SleepStudyHelper.sys Sleep Study Helper driver (Microsoft)
- spaceport.sys Storage Spaces driver (Microsoft)
- srv.sys Server driver (Microsoft)
- srv2.sys Smb 2.0 Server driver (Microsoft)
- srvnet.sys Server Network driver (Microsoft)
- storahci.sys MS AHCI Storport Miniport Driver (Microsoft)
- storport.sys A storage port driver that is especially suitable for use with high-performance buses, such as fibre channel buses, and RAID adapters. (Microsoft)
- storqosflt.sys Storage QoS Filter driver (Microsoft)
- swenum.sys Plug and Play Software Device Enumerator (Microsoft)
- tbs.sys Export driver for kernel mode TPM API (Microsoft)
- tcpip.sys TCP/IP Protocol driver (Microsoft)
- tcpipreg.sys Microsoft Windows TCP/IP Registry Compatibility driver (Microsoft)
- TDI.SYS TDI Wrapper driver (Microsoft)
- tdx.sys NetIO Legacy TDI x-bit Support Driver (Microsoft)
- tm.sys Kernel Transaction Manager driver (Microsoft)
- TSDDD.dll Framebuffer Display Driver (Microsoft)
- tunnel.sys Microsoft Tunnel Interface Driver
- ucx01000.sys USB Controller Extension
- umbus.sys User-Mode Bus Enumerator (Microsoft)
- usbccgp.sys USB Common Class Generic Parent Driver (Microsoft)
- USBD.SYS Universal Serial Bus Driver (Microsoft)
- UsbHub3.sys USB3 HUB Driver
- USBXHCI.SYS USB XHCI Driver
- vdrvroot.sys Virtual Drive Root Enumerator (Microsoft)
- vmbkmclr.sys Hyper-V VMBus Root KMCL (Microsoft)
- volmgr.sys Volume Manager Driver (Microsoft)
- volmgrx.sys Volume Manager Extension Driver (Microsoft)
- volsnap.sys Volume Shadow Copy driver (Microsoft)
- volume.sys Volume driver (Microsoft)
- vwififlt.sys Virtual WiFi Filter Driver (Microsoft)
- wanarp.sys MS Remote Access and Routing ARP driver (Microsoft)
- watchdog.sys Watchdog driver (Microsoft)
- wcifs.sys Windows Container Isolation FS Filter driver (Microsoft)
- Wdf01000.sys Kernel Mode Driver Framework Runtime (Microsoft)
- WdFilter.sys Microsoft Anti-malware file system filter driver (Microsoft)
- WDFLDR.SYS Kernel Mode Driver Framework Loader (Microsoft)
- WdNisDrv.sys Microsoft Network Realtime Inspection driver (Microsoft)
- werkernel.sys Windows Error Reporting Kernel driver (Microsoft)
- wfplwfs.sys WPF NDIS Lightweight Filter driver (Microsoft)
- win32k.sys Full/Desktop Multi-User Win32 driver (Microsoft)
- win32kbase.sys Base Win32k Kernel Driver (Microsoft)
- win32kfull.sys Full/Desktop Win32k Kernel Driver (Microsoft)
- WindowsTrustedRT.sys Windows Trusted Runtime Interface driver (Microsoft)
- WindowsTrustedRTProxy.sys Windows Trusted Runtime Service Proxy driver (Microsoft)
- wmiacpi.sys Windows Management Interface for ACPI (Microsoft)
- WMILIB.SYS WMILIB WMI support library DLL (Microsoft)
- Wof.sys Windows Overlay Filter (Microsoft)
- WORKERDD.dll Framebuffer Display Driver
- WppRecorder.sys WPP Trace Recorder (Microsoft)
- Unloaded modules:
- fffff802`ee4a0000 fffff802`ee4a7000 NTIOLib_X64.
- fffff802`ec570000 fffff802`ec57b000 cldflt.sys
- fffff802`ead60000 fffff802`ead6f000 dump_storpor
- fffff802`eada0000 fffff802`eadc7000 dump_storahc
- fffff802`eadf0000 fffff802`eae0d000 dump_dumpfve
- fffff802`ecd00000 fffff802`ecd22000 i8042prt.sys
- fffff802`ea8a0000 fffff802`ea8c0000 dam.sys
- fffff802`e9dc0000 fffff802`e9dcf000 WdBoot.sys
- fffff802`eabe0000 fffff802`eabef000 hwpolicy.sys
- ========================================================================
- ============================== BIOS INFO ===============================
- ========================================================================
- [SMBIOS Data Tables v3.0]
- [DMI Version - 0]
- [2.0 Calling Convention - No]
- [Table Size - 4068 bytes]
- [BIOS Information (Type 0) - Length 24 - Handle 0000h]
- Vendor American Megatrends Inc.
- BIOS Version C.B0
- BIOS Starting Address Segment f000
- BIOS Release Date 04/18/2017
- BIOS ROM Size 1000000
- BIOS Characteristics
- 07: - PCI Supported
- 11: - Upgradeable FLASH BIOS
- 12: - BIOS Shadowing Supported
- 15: - CD-Boot Supported
- 16: - Selectable Boot Supported
- 17: - BIOS ROM Socketed
- 19: - EDD Supported
- 23: - 1.2MB Floppy Supported
- 24: - 720KB Floppy Supported
- 25: - 2.88MB Floppy Supported
- 26: - Print Screen Device Supported
- 27: - Keyboard Services Supported
- 28: - Serial Services Supported
- 29: - Printer Services Supported
- 32: - BIOS Vendor Reserved
- BIOS Characteristic Extensions
- 00: - ACPI Supported
- 01: - USB Legacy Supported
- 08: - BIOS Boot Specification Supported
- 10: - Specification Reserved
- 11: - Specification Reserved
- BIOS Major Revision 5
- BIOS Minor Revision 12
- EC Firmware Major Revision 255
- EC Firmware Minor Revision 255
- [System Information (Type 1) - Length 27 - Handle 0001h]
- Manufacturer MSI
- Product Name MS-7972
- Version 2.0
- UUID 00000000-0000-0000-0000-000000000000
- Wakeup Type Power Switch
- SKUNumber Default string
- Family Default string
- [BaseBoard Information (Type 2) - Length 15 - Handle 0002h]
- Manufacturer MSI
- Product B150M MORTAR (MS-7972)
- Version 2.0
- Feature Flags 09h
- Location Default string
- Chassis Handle 0003h
- Board Type 0ah - Processor/Memory Module
- Number of Child Handles 0
- [System Enclosure (Type 3) - Length 22 - Handle 0003h]
- Manufacturer MSI
- Chassis Type Desktop
- Version 2.0
- Bootup State Safe
- Power Supply State Safe
- Thermal State Safe
- Security Status None
- OEM Defined 0
- Height 0U
- Number of Power Cords 1
- Number of Contained Elements 0
- Contained Element Size 3
- [OEM Strings (Type 11) - Length 5 - Handle 0021h]
- Number of Strings 1
- 1 Default string
- [System Configuration Options (Type 12) - Length 5 - Handle 0022h]
- [Physical Memory Array (Type 16) - Length 23 - Handle 003ch]
- Location 03h - SystemBoard/Motherboard
- Use 03h - System Memory
- Memory Error Correction 03h - None
- Maximum Capacity 67108864KB
- Number of Memory Devices 4
- [Memory Device (Type 17) - Length 40 - Handle 003dh]
- Physical Memory Array Handle 003ch
- Total Width 64 bits
- Data Width 64 bits
- Size 8192MB
- Form Factor 09h - DIMM
- Device Locator ChannelA-DIMM0
- Bank Locator BANK 0
- Memory Type 1ah - Specification Reserved
- Type Detail 0080h - Synchronous
- Speed 2133MHz
- Manufacturer Kingston
- Part Number KHX2133C13D4/8GX
- [Memory Device (Type 17) - Length 40 - Handle 003eh]
- Physical Memory Array Handle 003ch
- Total Width 0 bits
- Data Width 0 bits
- Form Factor 02h - Unknown
- Device Locator ChannelA-DIMM1
- Bank Locator BANK 1
- Memory Type 02h - Unknown
- Type Detail 0000h -
- Speed 0MHz
- [Memory Device (Type 17) - Length 40 - Handle 003fh]
- Physical Memory Array Handle 003ch
- Total Width 0 bits
- Data Width 0 bits
- Form Factor 02h - Unknown
- Device Locator ChannelB-DIMM0
- Bank Locator BANK 2
- Memory Type 02h - Unknown
- Type Detail 0000h -
- Speed 0MHz
- [Memory Device (Type 17) - Length 40 - Handle 0040h]
- Physical Memory Array Handle 003ch
- Total Width 0 bits
- Data Width 0 bits
- Form Factor 02h - Unknown
- Device Locator ChannelB-DIMM1
- Bank Locator BANK 3
- Memory Type 02h - Unknown
- Type Detail 0000h -
- Speed 0MHz
- [Memory Array Mapped Address (Type 19) - Length 31 - Handle 0041h]
- Starting Address 00000000h
- Ending Address 007fffffh
- Memory Array Handle 003ch
- Partition Width 01
- [Cache Information (Type 7) - Length 19 - Handle 0042h]
- Socket Designation L1 Cache
- Cache Configuration 0180h - WB Enabled Int NonSocketed L1
- Maximum Cache Size 0100h - 256K
- Installed Size 0100h - 256K
- Supported SRAM Type 0020h - Synchronous
- Current SRAM Type 0020h - Synchronous
- Cache Speed 0ns
- Error Correction Type ParitySingle-Bit ECC
- System Cache Type Unified
- Associativity 8-way Set-Associative
- [Cache Information (Type 7) - Length 19 - Handle 0043h]
- Socket Designation L2 Cache
- Cache Configuration 0181h - WB Enabled Int NonSocketed L2
- Maximum Cache Size 0400h - 1024K
- Installed Size 0400h - 1024K
- Supported SRAM Type 0020h - Synchronous
- Current SRAM Type 0020h - Synchronous
- Cache Speed 0ns
- Error Correction Type Multi-Bit ECC
- System Cache Type Unified
- Associativity 4-way Set-Associative
- [Cache Information (Type 7) - Length 19 - Handle 0044h]
- Socket Designation L3 Cache
- Cache Configuration 0182h - WB Enabled Int NonSocketed L3
- Maximum Cache Size 1800h - 6144K
- Installed Size 1800h - 6144K
- Supported SRAM Type 0020h - Synchronous
- Current SRAM Type 0020h - Synchronous
- Cache Speed 0ns
- Error Correction Type Specification Reserved
- System Cache Type Unified
- Associativity Specification Reserved
- [Processor Information (Type 4) - Length 48 - Handle 0045h]
- Socket Designation U3E1
- Processor Type Central Processor
- Processor Family cdh - Specification Reserved
- Processor Manufacturer Intel(R) Corporation
- Processor ID e3060500fffbebbf
- Processor Version Intel(R) Core(TM) i5-6400 CPU @ 2.70GHz
- Processor Voltage 89h - 0.9V
- External Clock 100MHz
- Max Speed 8300MHz
- Current Speed 2700MHz
- Status Enabled Populated
- Processor Upgrade Other
- L1 Cache Handle 0042h
- L2 Cache Handle 0043h
- L3 Cache Handle 0044h
- [Memory Device Mapped Address (Type 20) - Length 35 - Handle 0046h]
- Starting Address 00000000h
- Ending Address 007fffffh
- Memory Device Handle 003dh
- Mem Array Mapped Adr Handle 0041h
- Interleave Position [None]
- Interleave Data Depth [None]
- ========================================================================
- ==================== Dump File: 081617-4390-01.dmp =====================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 15063 MP (4 procs) Free x64
- Kernel base = 0xfffff802`9a61c000 PsLoadedModuleList = 0xfffff802`9a9685c0
- Debug session time: Wed Aug 16 15:25:32.112 2017 (UTC - 4:00)
- System Uptime: 0 days 0:06:56.755
- BugCheck 154, {ffffc101043e1000, ffffad01a9d1e780, 1, 0}
- Probably caused by : ntkrnlmp.exe ( nt!SMKM_STORE<SM_TRAITS>::SmStUnmapVirtualRegion+cf )
- Followup: MachineOwner
- UNEXPECTED_STORE_EXCEPTION (154)
- The store component caught an unexpected exception.
- Arguments:
- Arg1: ffffc101043e1000, Pointer to the store context or data manager
- Arg2: ffffad01a9d1e780, Exception information
- Arg3: 0000000000000001, Reserved
- Arg4: 0000000000000000, Reserved
- Debugging Details:
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- DUMP_TYPE: 2
- DUMP_FILE_ATTRIBUTES: 0x8
- Kernel Generated Triage Dump
- EXCEPTION_RECORD: ffffad01a9d1f6c8 -- (.exr 0xffffad01a9d1f6c8)
- ExceptionAddress: fffff8029a6f543f (nt!SMKM_STORE<SM_TRAITS>::SmStUnmapVirtualRegion+0x00000000000000cf)
- ExceptionCode: c0000005 (Access violation)
- ExceptionFlags: 00000000
- NumberParameters: 2
- Parameter[0]: 0000000000000000
- Parameter[1]: 0000000000000000
- Attempt to read from address 0000000000000000
- EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
- FAULTING_IP:
- nt!SMKM_STORE<SM_TRAITS>::SmStUnmapVirtualRegion+cf
- fffff802`9a6f543f 488b08 mov rcx,qword ptr [rax]
- FOLLOWUP_IP:
- nt!SMKM_STORE<SM_TRAITS>::SmStUnmapVirtualRegion+cf
- fffff802`9a6f543f 488b08 mov rcx,qword ptr [rax]
- EXCEPTION_PARAMETER1: 0000000000000000
- EXCEPTION_PARAMETER2: 0000000000000000
- CONTEXT: ffffad01a9d1ef10 -- (.cxr 0xffffad01a9d1ef10)
- rax=0000000000000000 rbx=ffffc101043e28b0 rcx=0000000000000000
- rdx=fffff8029aa13430 rsi=0000000000000452 rdi=0000000000000000
- rip=fffff8029a6f543f rsp=ffffad01a9d1f900 rbp=ffffc101043e1000
- r8=ffffc101043e28b0 r9=ffffc101048830e0 r10=ffffc10104883090
- r11=00000000ffffffff r12=0000000000001fff r13=00000000ffffffff
- r14=ffffc1010355e000 r15=0000000000000000
- iopl=0 nv up ei pl zr na po nc
- cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246
- nt!SMKM_STORE<SM_TRAITS>::SmStUnmapVirtualRegion+0xcf:
- fffff802`9a6f543f 488b08 mov rcx,qword ptr [rax] ds:002b:00000000`00000000=????????????????
- Resetting default scope
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: NULL_DEREFERENCE
- PROCESS_NAME: MemCompression
- CURRENT_IRQL: 0
- ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
- EXCEPTION_CODE_STR: c0000005
- READ_ADDRESS: fffff8029a9fd358: Unable to get MiVisibleState
- 0000000000000000
- BUGCHECK_STR: 0x154_c0000005
- LAST_CONTROL_TRANSFER: from fffff8029a6f6d8f to fffff8029a6f543f
- STACK_TEXT:
- ffffad01`a9d1f900 fffff802`9a6f6d8f : 00000000`00000452 00000000`ffffffff 00000000`ffffffff ffffc101`043e1050 : nt!SMKM_STORE<SM_TRAITS>::SmStUnmapVirtualRegion+0xcf
- ffffad01`a9d1f930 fffff802`9a6ec71a : ffffc101`043e1050 ffffad01`a9d1f9b0 00000000`00000000 ffffc101`00000000 : nt!ST_STORE<SM_TRAITS>::StUnlockAndUnmapRegion+0x7b
- ffffad01`a9d1f970 fffff802`9a6ec65e : 00000000`00000008 00000000`00000103 ffffc101`043e1050 ffffc101`00000000 : nt!ST_STORE<SM_TRAITS>::StDmCurrentRegionSet+0x9e
- ffffad01`a9d1f9d0 fffff802`9a6e4a60 : ffffc101`043e1000 ffffad01`a9d1fa70 00000000`00000002 fffff802`00000000 : nt!ST_STORE<SM_TRAITS>::StDmInvalidateCurrentRegions+0x32
- ffffad01`a9d1fa00 fffff802`9a7362a7 : ffffc101`043e2650 ffffad01`a9d1fb18 ffffad01`a9d1fa71 fffff802`9a6ed33b : nt!ST_STORE<SM_TRAITS>::StWorkItemProcess+0x1d8
- ffffad01`a9d1fa50 fffff802`9a6e4394 : ffffc101`043e1000 ffffad01`a9d1fb18 7fffffff`fffffffc ffffc101`00000000 : nt!ST_STORE<SM_TRAITS>::StLazyWorkMgrRunExpiredWork+0xe7
- ffffad01`a9d1faa0 fffff802`9a736ff1 : 00000000`00000102 00000000`00000000 00000000`00000000 ffffad01`00000000 : nt!SMKM_STORE<SM_TRAITS>::SmStWorker+0x60c
- ffffad01`a9d1fb60 fffff802`9a6f8ac7 : ffffc101`043e1000 fffff802`9a78d967 00000000`01301b4a ffffc101`048467c0 : nt!SMKM_STORE<SM_TRAITS>::SmStWorkerThread+0x11
- ffffad01`a9d1fb90 fffff802`9a78d9e6 : ffffad01`a6608180 ffffc101`048467c0 fffff802`9a6f8a80 00000000`00000000 : nt!PspSystemThreadStartup+0x47
- ffffad01`a9d1fbe0 00000000`00000000 : ffffad01`a9d20000 ffffad01`a9d19000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
- THREAD_SHA1_HASH_MOD_FUNC: 14c4240dd99503e3cb69608e4185326668041be8
- THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 7a972e7709dac97eea6946dc5a55cd6bd78a5ad3
- THREAD_SHA1_HASH_MOD: bc100a5647b828107ac4e18055e00abcbe1ec406
- FAULT_INSTR_CODE: e8088b48
- SYMBOL_STACK_INDEX: 0
- SYMBOL_NAME: nt!SMKM_STORE<SM_TRAITS>::SmStUnmapVirtualRegion+cf
- FOLLOWUP_NAME: MachineOwner
- MODULE_NAME: nt
- IMAGE_NAME: ntkrnlmp.exe
- DEBUG_FLR_IMAGE_TIMESTAMP: 597fd80d
- IMAGE_VERSION: 10.0.15063.540
- STACK_COMMAND: .cxr 0xffffad01a9d1ef10 ; kb
- BUCKET_ID_FUNC_OFFSET: cf
- FAILURE_BUCKET_ID: 0x154_c0000005_nt!SMKM_STORE_SM_TRAITS_::SmStUnmapVirtualRegion
- BUCKET_ID: 0x154_c0000005_nt!SMKM_STORE_SM_TRAITS_::SmStUnmapVirtualRegion
- PRIMARY_PROBLEM_CLASS: 0x154_c0000005_nt!SMKM_STORE_SM_TRAITS_::SmStUnmapVirtualRegion
- TARGET_TIME: 2017-08-16T19:25:32.000Z
- SUITE_MASK: 272
- PRODUCT_TYPE: 1
- USER_LCID: 0
- FAILURE_ID_HASH_STRING: km:0x154_c0000005_nt!smkm_store_sm_traits_::smstunmapvirtualregion
- FAILURE_ID_HASH: {fd3438ee-1856-26ad-cd9b-6e57571ef255}
- Followup: MachineOwner
- ========================================================================
- ==================== Dump File: 081517-4593-01.dmp =====================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 15063 MP (4 procs) Free x64
- Kernel base = 0xfffff801`83c8d000 PsLoadedModuleList = 0xfffff801`83fd95c0
- Debug session time: Tue Aug 15 10:18:37.613 2017 (UTC - 4:00)
- System Uptime: 0 days 1:05:35.254
- BugCheck 139, {3, ffffb500ced7c7b0, ffffb500ced7c708, 0}
- Probably caused by : ntkrnlmp.exe ( nt!KiFastFailDispatch+d0 )
- Followup: MachineOwner
- KERNEL_SECURITY_CHECK_FAILURE (139)
- A kernel component has corrupted a critical data structure. The corruption
- could potentially allow a malicious user to gain control of this machine.
- Arguments:
- Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
- Arg2: ffffb500ced7c7b0, Address of the trap frame for the exception that caused the bugcheck
- Arg3: ffffb500ced7c708, Address of the exception record for the exception that caused the bugcheck
- Arg4: 0000000000000000, Reserved
- Debugging Details:
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- DUMP_TYPE: 2
- DUMP_FILE_ATTRIBUTES: 0x8
- Kernel Generated Triage Dump
- TRAP_FRAME: ffffb500ced7c7b0 -- (.trap 0xffffb500ced7c7b0)
- NOTE: The trap frame does not contain all registers.
- Some register values may be zeroed or incorrect.
- rax=ffffd789f0691158 rbx=0000000000000000 rcx=0000000000000003
- rdx=ffffb500cc68ca80 rsi=0000000000000000 rdi=0000000000000000
- rip=fffff80183e266d2 rsp=ffffb500ced7c940 rbp=fffff80182cb1180
- r8=0000000000000000 r9=0000000000000000 r10=ffffd789ebe01800
- r11=ffffa10df75be1c0 r12=0000000000000000 r13=0000000000000000
- r14=0000000000000000 r15=0000000000000000
- iopl=0 nv up ei ng nz na pe cy
- nt!KiTryUnwaitThread+0x12aac2:
- fffff801`83e266d2 cd29 int 29h
- Resetting default scope
- EXCEPTION_RECORD: ffffb500ced7c708 -- (.exr 0xffffb500ced7c708)
- ExceptionAddress: fffff80183e266d2 (nt!KiTryUnwaitThread+0x000000000012aac2)
- ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
- ExceptionFlags: 00000001
- NumberParameters: 1
- Parameter[0]: 0000000000000003
- Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: LIST_ENTRY_CORRUPT
- BUGCHECK_STR: 0x139
- PROCESS_NAME: GRW.exe
- CURRENT_IRQL: 2
- ERROR_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.
- EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.
- EXCEPTION_CODE_STR: c0000409
- EXCEPTION_PARAMETER1: 0000000000000003
- LAST_CONTROL_TRANSFER: from fffff80183e048a9 to fffff80183df9560
- STACK_TEXT:
- ffffb500`ced7c488 fffff801`83e048a9 : 00000000`00000139 00000000`00000003 ffffb500`ced7c7b0 ffffb500`ced7c708 : nt!KeBugCheckEx
- ffffb500`ced7c490 fffff801`83e04c10 : 00000000`00000000 fffff801`8412eb2e ffffd789`eb8765c0 ffffd789`eeda4a80 : nt!KiBugCheckDispatch+0x69
- ffffb500`ced7c5d0 fffff801`83e03bf7 : ffffd789`ef42c7c0 fffff801`82cb1180 fffff801`84086a40 00000000`00000000 : nt!KiFastFailDispatch+0xd0
- ffffb500`ced7c7b0 fffff801`83e266d2 : 00000000`00000000 ffffb500`00000000 ffffd789`eccee200 ffffd789`eb2e9c30 : nt!KiRaiseSecurityCheckFailure+0xf7
- ffffb500`ced7c940 fffff801`83cfa079 : ffffd789`ef438ee0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiTryUnwaitThread+0x12aac2
- ffffb500`ced7c9a0 fffff801`8413d222 : 00000000`00000000 00000000`00000000 00000000`00000000 ffffa10d`f75be1c0 : nt!KeSetEvent+0x129
- ffffb500`ced7ca30 fffff801`83e04413 : ffffd789`ef42c7c0 00000001`432b0140 00000000`00000000 ffffd789`ef438ee0 : nt!NtSetEvent+0x92
- ffffb500`ced7ca80 00007ffa`9e395564 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
- 00000000`0b95fd98 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`9e395564
- STACK_COMMAND: kb
- THREAD_SHA1_HASH_MOD_FUNC: 0850ecde5e369a3e165133a2f39695e038b8856c
- THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 18419179fcfd26f6e62297f58e55cb3dbd37912f
- THREAD_SHA1_HASH_MOD: cb5f414824c2521bcc505eaa03e92fa10922dad8
- FOLLOWUP_IP:
- nt!KiFastFailDispatch+d0
- fffff801`83e04c10 c644242000 mov byte ptr [rsp+20h],0
- FAULT_INSTR_CODE: 202444c6
- SYMBOL_STACK_INDEX: 2
- SYMBOL_NAME: nt!KiFastFailDispatch+d0
- FOLLOWUP_NAME: MachineOwner
- MODULE_NAME: nt
- IMAGE_NAME: ntkrnlmp.exe
- DEBUG_FLR_IMAGE_TIMESTAMP: 597fd80d
- IMAGE_VERSION: 10.0.15063.540
- BUCKET_ID_FUNC_OFFSET: d0
- FAILURE_BUCKET_ID: 0x139_3_nt!KiFastFailDispatch
- BUCKET_ID: 0x139_3_nt!KiFastFailDispatch
- PRIMARY_PROBLEM_CLASS: 0x139_3_nt!KiFastFailDispatch
- TARGET_TIME: 2017-08-15T14:18:37.000Z
- SUITE_MASK: 272
- PRODUCT_TYPE: 1
- USER_LCID: 0
- FAILURE_ID_HASH_STRING: km:0x139_3_nt!kifastfaildispatch
- FAILURE_ID_HASH: {36173680-6f08-995f-065a-3d368c996911}
- Followup: MachineOwner
- ========================================================================
- ==================== Dump File: 081617-4343-01.dmp =====================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 15063 MP (4 procs) Free x64
- Kernel base = 0xfffff803`d6280000 PsLoadedModuleList = 0xfffff803`d65cc5c0
- Debug session time: Wed Aug 16 15:49:08.186 2017 (UTC - 4:00)
- System Uptime: 0 days 0:23:14.827
- BugCheck 154, {ffff8d08c05b0000, ffffe10040457780, 1, 0}
- Probably caused by : ntkrnlmp.exe ( nt!SMKM_STORE<SM_TRAITS>::SmStUnmapVirtualRegion+cf )
- Followup: MachineOwner
- UNEXPECTED_STORE_EXCEPTION (154)
- The store component caught an unexpected exception.
- Arguments:
- Arg1: ffff8d08c05b0000, Pointer to the store context or data manager
- Arg2: ffffe10040457780, Exception information
- Arg3: 0000000000000001, Reserved
- Arg4: 0000000000000000, Reserved
- Debugging Details:
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- DUMP_TYPE: 2
- DUMP_FILE_ATTRIBUTES: 0x8
- Kernel Generated Triage Dump
- EXCEPTION_RECORD: ffffe100404586c8 -- (.exr 0xffffe100404586c8)
- ExceptionAddress: fffff803d635943f (nt!SMKM_STORE<SM_TRAITS>::SmStUnmapVirtualRegion+0x00000000000000cf)
- ExceptionCode: c0000005 (Access violation)
- ExceptionFlags: 00000000
- NumberParameters: 2
- Parameter[0]: 0000000000000000
- Parameter[1]: 0000000000000000
- Attempt to read from address 0000000000000000
- EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
- FAULTING_IP:
- nt!SMKM_STORE<SM_TRAITS>::SmStUnmapVirtualRegion+cf
- fffff803`d635943f 488b08 mov rcx,qword ptr [rax]
- FOLLOWUP_IP:
- nt!SMKM_STORE<SM_TRAITS>::SmStUnmapVirtualRegion+cf
- fffff803`d635943f 488b08 mov rcx,qword ptr [rax]
- EXCEPTION_PARAMETER1: 0000000000000000
- EXCEPTION_PARAMETER2: 0000000000000000
- CONTEXT: ffffe10040457f10 -- (.cxr 0xffffe10040457f10)
- rax=0000000000000000 rbx=ffff8d08c05b18b0 rcx=0000000000000000
- rdx=fffff803d6677430 rsi=000000000000141c rdi=0000000000000000
- rip=fffff803d635943f rsp=ffffe10040458900 rbp=ffff8d08c05b0000
- r8=ffff8d08c05b18b0 r9=ffff8d08bffd2b40 r10=ffff8d08bffd2af0
- r11=00000000ffffffff r12=0000000000001fff r13=00000000ffffffff
- r14=ffff8d08c10b1000 r15=0000000000000000
- iopl=0 nv up ei pl zr na po nc
- cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246
- nt!SMKM_STORE<SM_TRAITS>::SmStUnmapVirtualRegion+0xcf:
- fffff803`d635943f 488b08 mov rcx,qword ptr [rax] ds:002b:00000000`00000000=????????????????
- Resetting default scope
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: NULL_DEREFERENCE
- PROCESS_NAME: MemCompression
- CURRENT_IRQL: 0
- ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
- EXCEPTION_CODE_STR: c0000005
- READ_ADDRESS: fffff803d6661358: Unable to get MiVisibleState
- 0000000000000000
- BUGCHECK_STR: 0x154_c0000005
- LAST_CONTROL_TRANSFER: from fffff803d635ad8f to fffff803d635943f
- STACK_TEXT:
- ffffe100`40458900 fffff803`d635ad8f : 00000000`0000141c 00000000`ffffffff 00000000`ffffffff ffff8d08`c05b0050 : nt!SMKM_STORE<SM_TRAITS>::SmStUnmapVirtualRegion+0xcf
- ffffe100`40458930 fffff803`d635071a : ffff8d08`c05b0050 ffffe100`404589b0 00000000`00000000 ffff8d08`00000000 : nt!ST_STORE<SM_TRAITS>::StUnlockAndUnmapRegion+0x7b
- ffffe100`40458970 fffff803`d635065e : 00000000`00000008 00000000`00000103 ffff8d08`c05b0050 00000004`00000000 : nt!ST_STORE<SM_TRAITS>::StDmCurrentRegionSet+0x9e
- ffffe100`404589d0 fffff803`d6348a60 : ffff8d08`c05b0000 ffffe100`40458a70 00000000`00000002 fffff803`00000000 : nt!ST_STORE<SM_TRAITS>::StDmInvalidateCurrentRegions+0x32
- ffffe100`40458a00 fffff803`d639a2a7 : ffff8d08`c05b1650 ffffe100`40458b18 ffffe100`40458a71 fffff803`d635133b : nt!ST_STORE<SM_TRAITS>::StWorkItemProcess+0x1d8
- ffffe100`40458a50 fffff803`d6348394 : ffff8d08`c05b0000 ffffe100`40458b18 7fffffff`fffffffc ffff8d08`00000000 : nt!ST_STORE<SM_TRAITS>::StLazyWorkMgrRunExpiredWork+0xe7
- ffffe100`40458aa0 fffff803`d639aff1 : 00000000`00000102 00000000`00000000 00000000`00000000 ffffe100`00000000 : nt!SMKM_STORE<SM_TRAITS>::SmStWorker+0x60c
- ffffe100`40458b60 fffff803`d635cac7 : ffff8d08`c05b0000 fffff803`d63f1967 00000000`00f74a82 ffff8d08`c10287c0 : nt!SMKM_STORE<SM_TRAITS>::SmStWorkerThread+0x11
- ffffe100`40458b90 fffff803`d63f19e6 : ffffe100`3ce08180 ffff8d08`c10287c0 fffff803`d635ca80 00000000`00000000 : nt!PspSystemThreadStartup+0x47
- ffffe100`40458be0 00000000`00000000 : ffffe100`40459000 ffffe100`40452000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
- THREAD_SHA1_HASH_MOD_FUNC: 14c4240dd99503e3cb69608e4185326668041be8
- THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 7a972e7709dac97eea6946dc5a55cd6bd78a5ad3
- THREAD_SHA1_HASH_MOD: bc100a5647b828107ac4e18055e00abcbe1ec406
- FAULT_INSTR_CODE: e8088b48
- SYMBOL_STACK_INDEX: 0
- SYMBOL_NAME: nt!SMKM_STORE<SM_TRAITS>::SmStUnmapVirtualRegion+cf
- FOLLOWUP_NAME: MachineOwner
- MODULE_NAME: nt
- IMAGE_NAME: ntkrnlmp.exe
- DEBUG_FLR_IMAGE_TIMESTAMP: 597fd80d
- IMAGE_VERSION: 10.0.15063.540
- STACK_COMMAND: .cxr 0xffffe10040457f10 ; kb
- BUCKET_ID_FUNC_OFFSET: cf
- FAILURE_BUCKET_ID: 0x154_c0000005_nt!SMKM_STORE_SM_TRAITS_::SmStUnmapVirtualRegion
- BUCKET_ID: 0x154_c0000005_nt!SMKM_STORE_SM_TRAITS_::SmStUnmapVirtualRegion
- PRIMARY_PROBLEM_CLASS: 0x154_c0000005_nt!SMKM_STORE_SM_TRAITS_::SmStUnmapVirtualRegion
- TARGET_TIME: 2017-08-16T19:49:08.000Z
- SUITE_MASK: 272
- PRODUCT_TYPE: 1
- USER_LCID: 0
- FAILURE_ID_HASH_STRING: km:0x154_c0000005_nt!smkm_store_sm_traits_::smstunmapvirtualregion
- FAILURE_ID_HASH: {fd3438ee-1856-26ad-cd9b-6e57571ef255}
- Followup: MachineOwner
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement