Advertisement
Guest User

Untitled

a guest
Aug 27th, 2017
312
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 58.99 KB | None | 0 0
  1. ========================== AUTO DUMP ANALYZER ==========================
  2. Auto Dump Analyzer by gardenman
  3. Time to debug file(s): 00 hours and 14 minutes and 54 seconds
  4.  
  5. ================================= BIOS =================================
  6. VENDOR: American Megatrends Inc.
  7. VERSION: 2501
  8. DATE: 04/07/2014
  9.  
  10. ============================= MOTHERBOARD ==============================
  11. MANUFACTURER: ASUSTeK COMPUTER INC.
  12. PRODUCT: M5A99FX PRO R2.0
  13. VERSION: Rev 1.xx
  14.  
  15. ================================= RAM ==================================
  16. Size Speed Manufacturer Part No.
  17. -------------- -------------- ------------------- ----------------------
  18. 0MHz Manufacturer0 Array1_PartNumber0
  19. 8192MB 1333MHz Undefined F3-1866C9-8GXM
  20. 0MHz Manufacturer2 Array1_PartNumber2
  21. 8192MB 1333MHz Undefined F3-1866C9-8GXM
  22.  
  23. ================================= CPU ==================================
  24. Processor Version: AMD FX(tm)-8350 Eight-Core Processor
  25. COUNT: 8
  26. MHZ: 4334
  27. VENDOR: AuthenticAMD
  28. FAMILY: 15
  29. MODEL: 2
  30. STEPPING: 0
  31.  
  32. ================================== OS ==================================
  33. Product: WinNt, suite: TerminalServer SingleUserTS
  34. BUILD_VERSION: 10.0.15063.540 (WinBuild.160101.0800)
  35. BUILD: 15063
  36. SERVICEPACK: 540
  37. PLATFORM_TYPE: x64
  38. NAME: Windows 10
  39. EDITION: Windows 10 WinNt TerminalServer SingleUserTS
  40. BUILD_TIMESTAMP: 2017-07-31 21:23:25
  41. BUILDDATESTAMP: 160101.0800
  42. BUILDLAB: WinBuild
  43. BUILDOSVER: 10.0.15063.540
  44.  
  45. =============================== DEBUGGER ===============================
  46. Microsoft (R) Windows Debugger Version 10.0.14321.1024 X86
  47. Copyright (c) Microsoft Corporation. All rights reserved.
  48.  
  49. =============================== COMMENTS ===============================
  50. * Information gathered from different dump files may be different. If
  51. Windows updates between two dump files, two or more OS's versions may
  52. be shown above.
  53. * If the user updates the BIOS between dump files, two or more versions
  54. and dates may be shown above.
  55. * More RAM information can be found below in the full BIOS section.
  56.  
  57.  
  58. ========================================================================
  59. ==================== Dump File: 082617-11171-01.dmp ====================
  60. ========================================================================
  61. Mini Kernel Dump File: Only registers and stack trace are available
  62. Windows 10 Kernel Version 15063 MP (8 procs) Free x64
  63. Kernel base = 0xfffff801`65a07000 PsLoadedModuleList = 0xfffff801`65d535c0
  64. Debug session time: Sat Aug 26 15:42:58.731 2017 (UTC - 4:00)
  65. System Uptime: 0 days 0:06:13.453
  66.  
  67. BugCheck 101, {18, 0, ffffce815ab40180, 7}
  68. Probably caused by : Unknown_Image ( ANALYSIS_INCONCLUSIVE )
  69. Followup: MachineOwner
  70.  
  71. CLOCK_WATCHDOG_TIMEOUT (101)
  72. An expected clock interrupt was not received on a secondary processor in an
  73. MP system within the allocated interval. This indicates that the specified
  74. processor is hung and not processing interrupts.
  75.  
  76. Arguments:
  77. Arg1: 0000000000000018, Clock interrupt time out interval in nominal clock ticks.
  78. Arg2: 0000000000000000, 0.
  79. Arg3: ffffce815ab40180, The PRCB address of the hung processor.
  80. Arg4: 0000000000000007, The index of the hung processor.
  81.  
  82. Debugging Details:
  83. DUMP_CLASS: 1
  84. DUMP_QUALIFIER: 400
  85. DUMP_TYPE: 2
  86. DUMP_FILE_ATTRIBUTES: 0x8
  87. Kernel Generated Triage Dump
  88. BUGCHECK_STR: CLOCK_WATCHDOG_TIMEOUT_8_PROC
  89. CUSTOMER_CRASH_COUNT: 1
  90.  
  91. PROCESS_NAME: chrome.exe
  92.  
  93. CURRENT_IRQL: d
  94. STACK_TEXT:
  95. fffff801`67a46bc8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
  96. STACK_COMMAND: kb
  97. THREAD_SHA1_HASH_MOD_FUNC: 81a83ae0317433a47fcc36991983df3b6e638b71
  98. THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 6e16edd8c7dd677734fdbcd2397a2e35e9fae964
  99. THREAD_SHA1_HASH_MOD: 76cd06466d098060a9eb26e5fd2a25cb1f3fe0a3
  100. SYMBOL_NAME: ANALYSIS_INCONCLUSIVE
  101. FOLLOWUP_NAME: MachineOwner
  102. MODULE_NAME: Unknown_Module
  103.  
  104. IMAGE_NAME: Unknown_Image
  105.  
  106. DEBUG_FLR_IMAGE_TIMESTAMP: 0
  107. BUCKET_ID: ZEROED_STACK_CLOCK_WATCHDOG_TIMEOUT_8_PROC
  108. DEFAULT_BUCKET_ID: ZEROED_STACK_CLOCK_WATCHDOG_TIMEOUT_8_PROC
  109. PRIMARY_PROBLEM_CLASS: ZEROED_STACK
  110. FAILURE_BUCKET_ID: ZEROED_STACK_CLOCK_WATCHDOG_TIMEOUT_8_PROC
  111. TARGET_TIME: 2017-08-26T19:42:58.000Z
  112. SUITE_MASK: 272
  113. PRODUCT_TYPE: 1
  114. USER_LCID: 0
  115. FAILURE_ID_HASH_STRING: km:zeroed_stack_clock_watchdog_timeout_8_proc
  116. FAILURE_ID_HASH: {19e7e96e-9b82-56a8-a247-c2b766198fd7}
  117. Followup: MachineOwner
  118.  
  119. ========================================================================
  120. ===================== 3RD PARTY DRIVER QUICK LIST ======================
  121. ========================================================================
  122. Jun 05 2008 - FSPFltd.sys - FSPro File System Filter Driver https://fspro.net/
  123. Jun 25 2010 - npf.sys - NetGroup Packet Filter driver, a component of WinPCap by Riverbed
  124. Aug 02 2010 - AsUpIO.sys - Asus Update Input Output Driver http://www.asus.com/
  125. Apr 11 2012 - amd_sata.sys - AMD SATA Controller AHCI Device Driver http://support.amd.com/
  126. Apr 11 2012 - amd_xata.sys - AMD Stor Filter Driver http://support.amd.com/
  127. Aug 22 2012 - AsIO.sys - Asus Input Output driver http://www.asus.com/
  128. Aug 28 2012 - usbfilter.sys - AMD USB Filter driver
  129. Dec 25 2012 - ambakdrv.sys - Aomei driver (Aomei Technology Co)
  130. Dec 25 2012 - ammntdrv.sys - AOMEI Backupper driver (Aomei Technology Co.) http://www.aomeitech.com/
  131. Dec 25 2012 - amwrtdrv.sys - AOMEI Backupper driver (Aomei Technology Co.) http://www.aomeitech.com/
  132. Mar 31 2015 - HWiNFO64A.SYS - HWiNFO AMD64 Kernel Driver https://www.hwinfo.com/
  133. Jun 16 2015 - asstor64.sys - Asmedia 106x SATA Host Controller Driver
  134. Jun 16 2015 - dump_asstor64.sys - (Generic Description) dump_*.sys drivers usually provide disk access during a crash to write dump files.
  135. Aug 11 2015 - rzendpt.sys - Razer RzEndPt driver https://www.razerzone.com/
  136. Aug 11 2015 - rzudd.sys - Razer Rzudd Engine Driver https://www.razerzone.com/
  137. Sep 16 2015 - rzpnk.sys - Razer Overlay Support https://www.razerzone.com/
  138. Sep 17 2015 - rzpmgrk.sys - Razer Overlay Support https://www.razerzone.com/
  139. Feb 15 2016 - RzSurroundVAD.sys - RazerSurround VAD Audio driver http://www.razersupport.com/
  140. Jun 14 2016 - RTKVHD64.sys - Realtek Audio Driver system driver http://www.realtek.com.tw/
  141. Mar 23 2017 - rt640x64.sys - Realtek NICDRV 8169 PCIe GBE Family Controller driver http://www.realtek.com.tw/
  142. Jun 12 2017 - atikmdag.sys - ATI Radeon Kernel Mode Driver Package
  143. Jun 12 2017 - atikmpag.sys - ATI video card driver
  144.  
  145. ========================================================================
  146. ========================== 3RD PARTY DRIVERS ===========================
  147. ========================================================================
  148. Image name: FSPFltd.sys
  149. Search : https://www.google.com/search?q=FSPFltd.sys
  150. ADA Info : FSPro File System Filter Driver https://fspro.net/
  151. Timestamp : Thu Jun 5 2008
  152.  
  153. Image name: npf.sys
  154. Search : https://www.google.com/search?q=npf.sys
  155. ADA Info : NetGroup Packet Filter driver, a component of WinPCap by Riverbed
  156. Timestamp : Fri Jun 25 2010
  157.  
  158. Image name: AsUpIO.sys
  159. Search : https://www.google.com/search?q=AsUpIO.sys
  160. ADA Info : Asus Update Input Output Driver http://www.asus.com/
  161. Timestamp : Mon Aug 2 2010
  162.  
  163. Image name: amd_sata.sys
  164. Search : https://www.google.com/search?q=amd_sata.sys
  165. ADA Info : AMD SATA Controller AHCI Device Driver http://support.amd.com/
  166. Timestamp : Wed Apr 11 2012
  167.  
  168. Image name: amd_xata.sys
  169. Search : https://www.google.com/search?q=amd_xata.sys
  170. ADA Info : AMD Stor Filter Driver http://support.amd.com/
  171. Timestamp : Wed Apr 11 2012
  172.  
  173. Image name: AsIO.sys
  174. Search : https://www.google.com/search?q=AsIO.sys
  175. ADA Info : Asus Input Output driver http://www.asus.com/
  176. Timestamp : Wed Aug 22 2012
  177.  
  178. Image name: usbfilter.sys
  179. Search : https://www.google.com/search?q=usbfilter.sys
  180. ADA Info : AMD USB Filter driver
  181. Timestamp : Tue Aug 28 2012
  182.  
  183. Image name: ambakdrv.sys
  184. Search : https://www.google.com/search?q=ambakdrv.sys
  185. ADA Info : Aomei driver (Aomei Technology Co)
  186. Timestamp : Tue Dec 25 2012
  187.  
  188. Image name: ammntdrv.sys
  189. Search : https://www.google.com/search?q=ammntdrv.sys
  190. ADA Info : AOMEI Backupper driver (Aomei Technology Co.) http://www.aomeitech.com/
  191. Timestamp : Tue Dec 25 2012
  192.  
  193. Image name: amwrtdrv.sys
  194. Search : https://www.google.com/search?q=amwrtdrv.sys
  195. ADA Info : AOMEI Backupper driver (Aomei Technology Co.) http://www.aomeitech.com/
  196. Timestamp : Tue Dec 25 2012
  197.  
  198. Image name: HWiNFO64A.SYS
  199. Search : https://www.google.com/search?q=HWiNFO64A.SYS
  200. ADA Info : HWiNFO AMD64 Kernel Driver https://www.hwinfo.com/
  201. Timestamp : Tue Mar 31 2015
  202.  
  203. Image name: asstor64.sys
  204. Search : https://www.google.com/search?q=asstor64.sys
  205. ADA Info : Asmedia 106x SATA Host Controller Driver
  206. Timestamp : Tue Jun 16 2015
  207.  
  208. Image name: dump_asstor64.sys
  209. Search : https://www.google.com/search?q=dump_asstor64.sys
  210. ADA Info : (Generic Description) dump_*.sys drivers usually provide disk access during a crash to write dump files.
  211. Timestamp : Tue Jun 16 2015
  212.  
  213. Image name: rzendpt.sys
  214. Search : https://www.google.com/search?q=rzendpt.sys
  215. ADA Info : Razer RzEndPt driver https://www.razerzone.com/
  216. Timestamp : Tue Aug 11 2015
  217.  
  218. Image name: rzudd.sys
  219. Search : https://www.google.com/search?q=rzudd.sys
  220. ADA Info : Razer Rzudd Engine Driver https://www.razerzone.com/
  221. Timestamp : Tue Aug 11 2015
  222.  
  223. Image name: rzpnk.sys
  224. Search : https://www.google.com/search?q=rzpnk.sys
  225. ADA Info : Razer Overlay Support https://www.razerzone.com/
  226. Timestamp : Wed Sep 16 2015
  227.  
  228. Image name: rzpmgrk.sys
  229. Search : https://www.google.com/search?q=rzpmgrk.sys
  230. ADA Info : Razer Overlay Support https://www.razerzone.com/
  231. Timestamp : Thu Sep 17 2015
  232.  
  233. Image name: RzSurroundVAD.sys
  234. Search : https://www.google.com/search?q=RzSurroundVAD.sys
  235. ADA Info : RazerSurround VAD Audio driver http://www.razersupport.com/
  236. Timestamp : Mon Feb 15 2016
  237.  
  238. Image name: RTKVHD64.sys
  239. Search : https://www.google.com/search?q=RTKVHD64.sys
  240. ADA Info : Realtek Audio Driver system driver http://www.realtek.com.tw/
  241. Timestamp : Tue Jun 14 2016
  242.  
  243. Image name: rt640x64.sys
  244. Search : https://www.google.com/search?q=rt640x64.sys
  245. ADA Info : Realtek NICDRV 8169 PCIe GBE Family Controller driver http://www.realtek.com.tw/
  246. Timestamp : Thu Mar 23 2017
  247.  
  248. Image name: atikmdag.sys
  249. Search : https://www.google.com/search?q=atikmdag.sys
  250. ADA Info : ATI Radeon Kernel Mode Driver Package
  251. Timestamp : Mon Jun 12 2017
  252.  
  253. Image name: atikmpag.sys
  254. Search : https://www.google.com/search?q=atikmpag.sys
  255. ADA Info : ATI video card driver
  256. Timestamp : Mon Jun 12 2017
  257.  
  258. If any of the above drivers are from Microsoft then please let me know.
  259. I will have them moved to the Microsoft list on the next update.
  260.  
  261. ========================================================================
  262. ========================== MICROSOFT DRIVERS ===========================
  263. ========================================================================
  264. ACPI.sys ACPI Driver for NT (Microsoft)
  265. acpiex.sys ACPIEx Driver (Microsoft)
  266. afd.sys Ancillary Function Driver for WinSock (Microsoft)
  267. ahcache.sys Application Compatibility Cache (Microsoft)
  268. amdppm.sys Processor Device Driver
  269. BasicDisplay.sys Basic Display driver (Microsoft)
  270. BasicRender.sys Basic Render driver (Microsoft)
  271. Beep.SYS BEEP driver (Microsoft)
  272. BOOTVID.dll VGA Boot Driver (Microsoft)
  273. bowser.sys NT Lan Manager Datagram Receiver Driver (Microsoft)
  274. BthEnum.sys Bluetooth Bus Extender
  275. bthpan.sys Bluetooth Personal Area Networking
  276. bthport.sys Bluetooth Bus Driver
  277. BTHUSB.sys Bluetooth Miniport Driver
  278. cdd.dll Canonical Display Driver (Microsoft)
  279. cdfs.sys CD-ROM File System Driver (Microsoft)
  280. cdrom.sys SCSI CD-ROM Driver (Microsoft)
  281. CEA.sys Event Aggregation Kernal Mode Library (Microsoft)
  282. CI.dll Code Integrity Module (Microsoft)
  283. CLASSPNP.SYS SCSI Class System Dll (Microsoft)
  284. CLFS.SYS Common Log File System Driver (Microsoft)
  285. clipsp.sys CLIP Service (Microsoft)
  286. cmimcext.sys Kernal Configuration Manager Initial Con. Driver (Microsoft)
  287. cng.sys Kernal Cryptography, Next Generation Driver (Microsoft)
  288. CompositeBus.sys Multi-Transport Composite Bus Enumerator (Microsoft)
  289. condrv.sys Console Driver (Microsoft)
  290. crashdmp.sys Crash Dump Driver
  291. csc.sys Windows Client Side Caching Driver
  292. dfsc.sys DFS Namespace Client Driver (Microsoft)
  293. disk.sys PnP Disk Driver (Microsoft)
  294. drmk.sys Digital Rights Management (DRM) driver (Microsoft)
  295. dump_dumpfve.sys Bitlocker Drive Encryption Crashdump Filter
  296. dump_storport.sys Provides disk access during crash dump file generation (Microsoft)
  297. dxgkrnl.sys DirectX Graphics Kernal (Microsoft)
  298. dxgmms2.sys DirectX Graphics MMS
  299. EhStorClass.sys Enhanced Storage Class driver for IEEE... (Microsoft)
  300. fastfat.SYS Fast FAT File System Driver (Microsoft)
  301. filecrypt.sys Windows sandboxing and encryption filter (Microsoft)
  302. fileinfo.sys FileInfo Filter Driver (Microsoft)
  303. FLTMGR.SYS Filesystem Filter Manager (Microsoft)
  304. Fs_Rec.sys File System Recognizer Driver (Microsoft)
  305. fvevol.sys BitLocker Driver Encryption Driver (Microsoft)
  306. fwpkclnt.sys FWP/IPsec Kernal-Mode API (Microsoft)
  307. gpuenergydrv.sys GPU Energy Kernal Driver (Microsoft)
  308. hal.dll Hardware Abstraction Layer DLL (Microsoft)
  309. HDAudBus.sys High Definition Audio Bus Driver (Microsoft)
  310. HIDCLASS.SYS Hid Class Library
  311. HIDPARSE.SYS Hid Parsing Library (Microsoft)
  312. hidusb.sys USB Miniport Driver for Input Devices (Microsoft)
  313. HTTP.sys HTTP Protocol Stack (Microsoft)
  314. intelpep.sys Intel Power Engine Plugin (Microsoft)
  315. iorate.sys I/O rate control Filter (Microsoft)
  316. kbdclass.sys Keyboard Class Driver (Microsoft)
  317. kbdhid.sys HID Mouse Filter Driver or HID Keyboard Filter Driver (Microsoft)
  318. kdcom.dll Kernel Debugger HW Extension DLL (Microsoft)
  319. kdnic.sys Microsoft Kernel Debugger Network Miniport (Microsoft)
  320. ks.sys Kernal CSA Library (Microsoft)
  321. ksecdd.sys Kernel Security Support Provider Interface (Microsoft)
  322. ksecpkg.sys Kernel Security Support Provider Interface Packages (Microsoft)
  323. ksthunk.sys Kernal Streaming WOW Thunk Service (Microsoft)
  324. lltdio.sys Link-Layer Topology Mapper I/O Driver (Microsoft)
  325. luafv.sys LUA File Virtualization Filter Driver (Microsoft)
  326. mcupdate.dll Media Center Update (Microsoft)
  327. mmcss.sys MMCSS Driver (Microsoft)
  328. monitor.sys Monitor Driver (Microsoft)
  329. mouclass.sys Mouse Class Driver (Microsoft)
  330. mouhid.sys HID Mouse Filter Driver (Microsoft)
  331. mountmgr.sys Mount Point Manager (Microsoft)
  332. MpKsl1b4db466.sys Microsoft Anti-malware Protection driver
  333. MpKsl505a3a46.sys Microsoft Anti-malware Protection driver
  334. mpsdrv.sys Microsoft Protection Service Driver (Microsoft)
  335. mqac.sys Message Queuing Device driver (Microsoft)
  336. mrxsmb.sys SMB MiniRedirector Wrapper and Engine (Microsoft)
  337. mrxsmb10.sys Longhorn SMB Downlevel SubRdr (Microsoft)
  338. mrxsmb20.sys Longhorn SMB 2.0 Redirector (Microsoft)
  339. Msfs.SYS Mailslot driver (Microsoft)
  340. msisadrv.sys ISA Driver (Microsoft)
  341. mslldp.sys Microsoft Link-Layer Discovery Protocol... (Microsoft)
  342. msrpc.sys Kernel Remote Procedure Call Provider (Microsoft)
  343. mssmbios.sys System Management BIOS driver (Microsoft)
  344. mup.sys Multiple UNC Provider driver (Microsoft)
  345. ndis.sys Network Driver Interface Specification (NDIS) driver (Microsoft)
  346. ndisuio.sys NDIS User mode I/O driver (Microsoft)
  347. NdisVirtualBus.sys Virtual Network Adapter Enumerator (Microsoft)
  348. Ndu.sys Network Data Usage Monitoring driver (Microsoft)
  349. netbios.sys NetBIOS Interface driver (Microsoft)
  350. netbt.sys MBT Transport driver (Microsoft)
  351. NETIO.SYS Network I/O Subsystem (Microsoft)
  352. Npfs.SYS NPFS driver (Microsoft)
  353. npsvctrig.sys Named pipe service triggers (Microsoft)
  354. nsiproxy.sys NSI Proxy driver (Microsoft)
  355. NTFS.sys NT File System Driver (Microsoft)
  356. ntkrnlmp.exe Windows NT operating system kernel (Microsoft)
  357. ntosext.sys NTOS Extension Host driver (Microsoft)
  358. Null.SYS NULL Driver (Microsoft)
  359. pacer.sys QoS Packet Scheduler (Microsoft)
  360. partmgr.sys Partition driver (Microsoft)
  361. pci.sys NT Plug and Play PCI Enumerator
  362. pcw.sys Performance Counter Driver (Microsoft)
  363. pdc.sys Power Dependency Coordinator Driver (Microsoft)
  364. peauth.sys Protected Environment Authentication and Authorization Export Driver (Microsoft)
  365. portcls.sys Class Driver for Port/Miniport Devices system driver (Microsoft)
  366. PSHED.dll Platform Specific Hardware Error driver (Microsoft)
  367. rdbss.sys Redirected Drive Buffering SubSystem driver (Microsoft)
  368. rdpbus.sys Microsoft RDP Bus Device driver (Microsoft)
  369. rdyboost.sys ReadyBoost Driver (Microsoft)
  370. registry.sys Registry Container driver (Microsoft)
  371. rfcomm.sys Bluetooth RFCOMM Driver
  372. rspndr.sys Link-Layer Topology Responder driver (Microsoft)
  373. serenum.sys Serial Port Enumerator (Microsoft)
  374. serial.sys Serial Device Driver
  375. serscan.sys Serial Imaging Device Driver (Microsoft)
  376. SleepStudyHelper.sys Sleep Study Helper driver (Microsoft)
  377. spaceport.sys Storage Spaces driver (Microsoft)
  378. srv.sys Server driver (Microsoft)
  379. srv2.sys Smb 2.0 Server driver (Microsoft)
  380. srvnet.sys Server Network driver (Microsoft)
  381. storport.sys Storage port driver for use with high-performance buses, such as fibre channel buses, and RAID adapters. (Microsoft)
  382. storqosflt.sys Storage QoS Filter driver (Microsoft)
  383. swenum.sys Plug and Play Software Device Enumerator (Microsoft)
  384. tbs.sys Export driver for kernel mode TPM API (Microsoft)
  385. tcpip.sys TCP/IP Protocol driver (Microsoft)
  386. tcpipreg.sys Microsoft Windows TCP/IP Registry Compatibility driver (Microsoft)
  387. TDI.SYS TDI Wrapper driver (Microsoft)
  388. tdx.sys NetIO Legacy TDI x-bit Support Driver (Microsoft)
  389. tm.sys Kernel Transaction Manager driver (Microsoft)
  390. TSDDD.dll Framebuffer Display Driver (Microsoft)
  391. tunnel.sys Microsoft Tunnel Interface driver (Microsoft)
  392. ucx01000.sys USB Controller Extension (Microsoft)
  393. umbus.sys User-Mode Bus Enumerator (Microsoft)
  394. usbaudio.sys USB Audio Class Driver (Microsoft)
  395. usbccgp.sys USB Common Class Generic Parent Driver (Microsoft)
  396. USBD.SYS Universal Serial Bus Driver (Microsoft)
  397. usbehci.sys EHCI eUSB Miniport Driver (Microsoft)
  398. usbhub.sys Default Hub Driver for USB (Microsoft)
  399. UsbHub3.sys USB3 HUB driver (Microsoft)
  400. usbohci.sys OHCI USB Miniport Driver (Microsoft)
  401. USBPORT.SYS USB 1.1 & 2.0 Port Driver (Microsoft)
  402. USBXHCI.SYS USB XHCI Driver
  403. vdrvroot.sys Virtual Drive Root Enumerator (Microsoft)
  404. vmbkmclr.sys Hyper-V VMBus Root KMCL (Microsoft)
  405. volmgr.sys Volume Manager Driver (Microsoft)
  406. volmgrx.sys Volume Manager Extension Driver (Microsoft)
  407. volsnap.sys Volume Shadow Copy driver (Microsoft)
  408. volume.sys Volume driver (Microsoft)
  409. vwififlt.sys Virtual WiFi Filter Driver (Microsoft)
  410. wanarp.sys MS Remote Access and Routing ARP driver (Microsoft)
  411. watchdog.sys Watchdog driver (Microsoft)
  412. wcifs.sys Windows Container Isolation FS Filter driver (Microsoft)
  413. Wdf01000.sys Kernel Mode Driver Framework Runtime (Microsoft)
  414. WdFilter.sys Microsoft Anti-malware file system filter driver (Microsoft)
  415. WDFLDR.SYS Kernel Mode Driver Framework Loader (Microsoft)
  416. WdNisDrv.sys Microsoft Network Realtime Inspection driver (Microsoft)
  417. werkernel.sys Windows Error Reporting Kernel driver (Microsoft)
  418. wfplwfs.sys WPF NDIS Lightweight Filter driver (Microsoft)
  419. win32k.sys Full/Desktop Multi-User Win32 driver (Microsoft)
  420. win32kbase.sys Base Win32k Kernel Driver (Microsoft)
  421. win32kfull.sys Full/Desktop Win32k Kernel Driver (Microsoft)
  422. WindowsTrustedRT.sys Windows Trusted Runtime Interface driver (Microsoft)
  423. WindowsTrustedRTProxy.sys Windows Trusted Runtime Service Proxy driver (Microsoft)
  424. wmiacpi.sys Windows Management Interface for ACPI (Microsoft)
  425. WMILIB.SYS WMILIB WMI support library DLL (Microsoft)
  426. Wof.sys Windows Overlay Filter (Microsoft)
  427. WpdUpFltr.sys Windows Portable Device Upper Class Filter Driver
  428. WppRecorder.sys WPP Trace Recorder (Microsoft)
  429. WSDPrint.sys Web Services Print Device driver (Microsoft)
  430. WSDScan.sys Web Service Based Scan Device driver (Microsoft)
  431. WudfPf.sys Windows Driver Foundation - User-mode Driver Framework Platform driver (Microsoft)
  432. WUDFRd.sys Windows Driver Foundation - User-mode Driver Framework Reflector driver (Microsoft)
  433.  
  434. Unloaded modules:
  435. fffff801`63d70000 fffff801`63d77000 magdrvamd64.
  436. fffff801`63d60000 fffff801`63d67000 magdrvamd64.
  437. fffff80c`68e80000 fffff80c`68e8b000 cldflt.sys
  438. fffff80c`68e20000 fffff80c`68e5d000 WUDFRd.sys
  439. fffff80c`68e20000 fffff80c`68e5d000 WUDFRd.sys
  440. fffff80c`68e20000 fffff80c`68e5d000 WUDFRd.sys
  441. fffff80c`68e20000 fffff80c`68e5d000 WUDFRd.sys
  442. fffff80c`647a0000 fffff80c`647af000 dump_storpor
  443. fffff80c`647d0000 fffff80c`647e8000 dump_asstor6
  444. fffff80c`64810000 fffff80c`6482d000 dump_dumpfve
  445. fffff80c`680c0000 fffff80c`680ca000 amdkmafd.sys
  446. fffff80c`6b2e0000 fffff80c`6b2ea000 amdkmafd.sys
  447. fffff80c`64940000 fffff80c`64960000 dam.sys
  448. fffff80c`63680000 fffff80c`6368f000 WdBoot.sys
  449. fffff80c`646a0000 fffff80c`646af000 hwpolicy.sys
  450.  
  451. ========================================================================
  452. ============================== BIOS INFO ===============================
  453. ========================================================================
  454. [SMBIOS Data Tables v2.7]
  455. [DMI Version - 0]
  456. [2.0 Calling Convention - No]
  457. [Table Size - 2403 bytes]
  458. [BIOS Information (Type 0) - Length 24 - Handle 0000h]
  459. Vendor American Megatrends Inc.
  460. BIOS Version 2501
  461. BIOS Starting Address Segment f000
  462. BIOS Release Date 04/07/2014
  463. BIOS ROM Size 800000
  464. BIOS Characteristics
  465. 07: - PCI Supported
  466. 11: - Upgradeable FLASH BIOS
  467. 12: - BIOS Shadowing Supported
  468. 15: - CD-Boot Supported
  469. 16: - Selectable Boot Supported
  470. 17: - BIOS ROM Socketed
  471. 19: - EDD Supported
  472. 23: - 1.2MB Floppy Supported
  473. 24: - 720KB Floppy Supported
  474. 25: - 2.88MB Floppy Supported
  475. 26: - Print Screen Device Supported
  476. 27: - Keyboard Services Supported
  477. 28: - Serial Services Supported
  478. 29: - Printer Services Supported
  479. 32: - BIOS Vendor Reserved
  480. 34: - BIOS Vendor Reserved
  481. BIOS Characteristic Extensions
  482. 00: - ACPI Supported
  483. 01: - USB Legacy Supported
  484. 08: - BIOS Boot Specification Supported
  485. 10: - Specification Reserved
  486. 11: - Specification Reserved
  487. BIOS Major Revision 4
  488. BIOS Minor Revision 6
  489. EC Firmware Major Revision 255
  490. EC Firmware Minor Revision 255
  491. [System Information (Type 1) - Length 27 - Handle 0001h]
  492. UUID 00000000-0000-0000-0000-000000000000
  493. Wakeup Type Power Switch
  494. SKUNumber SKU
  495. [BaseBoard Information (Type 2) - Length 15 - Handle 0002h]
  496. Manufacturer ASUSTeK COMPUTER INC.
  497. Product M5A99FX PRO R2.0
  498. Version Rev 1.xx
  499. Feature Flags 09h
  500. Chassis Handle 0003h
  501. Board Type 0ah - Processor/Memory Module
  502. Number of Child Handles 0
  503. [System Enclosure (Type 3) - Length 22 - Handle 0003h]
  504. Chassis Type Desktop
  505. Bootup State Safe
  506. Power Supply State Safe
  507. Thermal State Safe
  508. Security Status None
  509. OEM Defined 0
  510. Height 0U
  511. Number of Power Cords 1
  512. Number of Contained Elements 0
  513. Contained Element Size 0
  514. [Processor Information (Type 4) - Length 42 - Handle 0004h]
  515. Socket Designation Socket 942
  516. Processor Type Central Processor
  517. Processor Family 3fh - Specification Reserved
  518. Processor Manufacturer AMD
  519. Processor ID 200f6000fffb8b17
  520. Processor Version AMD FX(tm)-8350 Eight-Core Processor
  521. Processor Voltage 8eh - 1.4V
  522. External Clock 200MHz
  523. Max Speed 4000MHz
  524. Current Speed 4000MHz
  525. Status Enabled Populated
  526. Processor Upgrade Specification Reserved
  527. L1 Cache Handle 0005h
  528. L2 Cache Handle 0006h
  529. L3 Cache Handle 0007h
  530. [Cache Information (Type 7) - Length 19 - Handle 0005h]
  531. Socket Designation L1-Cache
  532. Cache Configuration 0180h - WB Enabled Int NonSocketed L1
  533. Maximum Cache Size 0180h - 384K
  534. Installed Size 0180h - 384K
  535. Supported SRAM Type 0010h - Pipeline-Burst
  536. Current SRAM Type 0010h - Pipeline-Burst
  537. Cache Speed 1ns
  538. Error Correction Type Specification Reserved
  539. System Cache Type Unified
  540. Associativity 2-way Set-Associative
  541. [Cache Information (Type 7) - Length 19 - Handle 0006h]
  542. Socket Designation L2-Cache
  543. Cache Configuration 0181h - WB Enabled Int NonSocketed L2
  544. Maximum Cache Size 2000h - 8192K
  545. Installed Size 2000h - 8192K
  546. Supported SRAM Type 0010h - Pipeline-Burst
  547. Current SRAM Type 0010h - Pipeline-Burst
  548. Cache Speed 1ns
  549. Error Correction Type Specification Reserved
  550. System Cache Type Unified
  551. Associativity 16-way Set-Associative
  552. [Cache Information (Type 7) - Length 19 - Handle 0007h]
  553. Socket Designation L3-Cache
  554. Cache Configuration 0182h - WB Enabled Int NonSocketed L3
  555. Maximum Cache Size 2000h - 8192K
  556. Installed Size 2000h - 8192K
  557. Supported SRAM Type 0010h - Pipeline-Burst
  558. Current SRAM Type 0010h - Pipeline-Burst
  559. Cache Speed 1ns
  560. Error Correction Type Specification Reserved
  561. System Cache Type Unified
  562. Associativity Specification Reserved
  563. [Onboard Devices Information (Type 10) - Length 6 - Handle 0025h]
  564. Number of Devices 1
  565. 01: Type Video [enabled]
  566. [OEM Strings (Type 11) - Length 5 - Handle 0026h]
  567. Number of Strings 4
  568. [System Configuration Options (Type 12) - Length 5 - Handle 0027h]
  569. [Physical Memory Array (Type 16) - Length 23 - Handle 0028h]
  570. Location 03h - SystemBoard/Motherboard
  571. Use 03h - System Memory
  572. Memory Error Correction 03h - None
  573. Maximum Capacity 33554432KB
  574. Number of Memory Devices 4
  575. [Memory Array Mapped Address (Type 19) - Length 31 - Handle 0029h]
  576. Starting Address 00000000h
  577. Ending Address 00ffffffh
  578. Memory Array Handle 0028h
  579. Partition Width 255
  580. [Memory Device (Type 17) - Length 34 - Handle 002ah]
  581. Physical Memory Array Handle 0028h
  582. Total Width 0 bits
  583. Data Width 64 bits
  584. Form Factor 09h - DIMM
  585. Device Locator DIMM0
  586. Bank Locator BANK0
  587. Memory Type 02h - Unknown
  588. Type Detail 0080h - Synchronous
  589. Speed 0MHz
  590. Manufacturer Manufacturer0
  591. Part Number Array1_PartNumber0
  592. [Memory Device (Type 17) - Length 34 - Handle 002ch]
  593. Physical Memory Array Handle 0028h
  594. Total Width 64 bits
  595. Data Width 64 bits
  596. Size 8192MB
  597. Form Factor 09h - DIMM
  598. Device Locator DIMM1
  599. Bank Locator BANK1
  600. Memory Type 18h - Specification Reserved
  601. Type Detail 4080h - Synchronous
  602. Speed 1333MHz
  603. Manufacturer Undefined
  604. Part Number F3-1866C9-8GXM
  605. [Memory Device Mapped Address (Type 20) - Length 35 - Handle 002dh]
  606. Starting Address 00000000h
  607. Ending Address 00ffffffh
  608. Memory Device Handle 002ch
  609. Mem Array Mapped Adr Handle 0029h
  610. [Memory Device (Type 17) - Length 34 - Handle 002eh]
  611. Physical Memory Array Handle 0028h
  612. Total Width 0 bits
  613. Data Width 64 bits
  614. Form Factor 09h - DIMM
  615. Device Locator DIMM2
  616. Bank Locator BANK2
  617. Memory Type 02h - Unknown
  618. Type Detail 0080h - Synchronous
  619. Speed 0MHz
  620. Manufacturer Manufacturer2
  621. Part Number Array1_PartNumber2
  622. [Memory Device (Type 17) - Length 34 - Handle 0030h]
  623. Physical Memory Array Handle 0028h
  624. Total Width 64 bits
  625. Data Width 64 bits
  626. Size 8192MB
  627. Form Factor 09h - DIMM
  628. Device Locator DIMM3
  629. Bank Locator BANK3
  630. Memory Type 18h - Specification Reserved
  631. Type Detail 4080h - Synchronous
  632. Speed 1333MHz
  633. Manufacturer Undefined
  634. Part Number F3-1866C9-8GXM
  635. [Memory Device Mapped Address (Type 20) - Length 35 - Handle 0031h]
  636. Starting Address 00000000h
  637. Ending Address 00ffffffh
  638. Memory Device Handle 0030h
  639. Mem Array Mapped Adr Handle 0029h
  640.  
  641. ========================================================================
  642. ==================== Dump File: 082217-10843-01.dmp ====================
  643. ========================================================================
  644. Mini Kernel Dump File: Only registers and stack trace are available
  645. Windows 10 Kernel Version 15063 MP (8 procs) Free x64
  646. Kernel base = 0xfffff801`eb87f000 PsLoadedModuleList = 0xfffff801`ebbcb5c0
  647. Debug session time: Tue Aug 22 20:33:23.731 2017 (UTC - 4:00)
  648. System Uptime: 0 days 0:00:43.453
  649.  
  650. BugCheck 101, {18, 0, ffff9f8121740180, 7}
  651. Probably caused by : Unknown_Image ( ANALYSIS_INCONCLUSIVE )
  652. Followup: MachineOwner
  653.  
  654. CLOCK_WATCHDOG_TIMEOUT (101)
  655. An expected clock interrupt was not received on a secondary processor in an
  656. MP system within the allocated interval. This indicates that the specified
  657. processor is hung and not processing interrupts.
  658.  
  659. Arguments:
  660. Arg1: 0000000000000018, Clock interrupt time out interval in nominal clock ticks.
  661. Arg2: 0000000000000000, 0.
  662. Arg3: ffff9f8121740180, The PRCB address of the hung processor.
  663. Arg4: 0000000000000007, The index of the hung processor.
  664.  
  665. Debugging Details:
  666. DUMP_CLASS: 1
  667. DUMP_QUALIFIER: 400
  668. DUMP_TYPE: 2
  669. DUMP_FILE_ATTRIBUTES: 0x8
  670. Kernel Generated Triage Dump
  671. BUGCHECK_STR: CLOCK_WATCHDOG_TIMEOUT_8_PROC
  672. CUSTOMER_CRASH_COUNT: 1
  673.  
  674. PROCESS_NAME: chrome.exe
  675.  
  676. CURRENT_IRQL: d
  677. STACK_TEXT:
  678. fffff801`ed846bc8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
  679. STACK_COMMAND: kb
  680. THREAD_SHA1_HASH_MOD_FUNC: 81a83ae0317433a47fcc36991983df3b6e638b71
  681. THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 6e16edd8c7dd677734fdbcd2397a2e35e9fae964
  682. THREAD_SHA1_HASH_MOD: 76cd06466d098060a9eb26e5fd2a25cb1f3fe0a3
  683. SYMBOL_NAME: ANALYSIS_INCONCLUSIVE
  684. FOLLOWUP_NAME: MachineOwner
  685. MODULE_NAME: Unknown_Module
  686.  
  687. IMAGE_NAME: Unknown_Image
  688.  
  689. DEBUG_FLR_IMAGE_TIMESTAMP: 0
  690. BUCKET_ID: ZEROED_STACK_CLOCK_WATCHDOG_TIMEOUT_8_PROC
  691. DEFAULT_BUCKET_ID: ZEROED_STACK_CLOCK_WATCHDOG_TIMEOUT_8_PROC
  692. PRIMARY_PROBLEM_CLASS: ZEROED_STACK
  693. FAILURE_BUCKET_ID: ZEROED_STACK_CLOCK_WATCHDOG_TIMEOUT_8_PROC
  694. TARGET_TIME: 2017-08-23T00:33:23.000Z
  695. SUITE_MASK: 272
  696. PRODUCT_TYPE: 1
  697. USER_LCID: 0
  698. FAILURE_ID_HASH_STRING: km:zeroed_stack_clock_watchdog_timeout_8_proc
  699. FAILURE_ID_HASH: {19e7e96e-9b82-56a8-a247-c2b766198fd7}
  700. Followup: MachineOwner
  701.  
  702. ========================================================================
  703. ==================== Dump File: 082117-11484-01.dmp ====================
  704. ========================================================================
  705. Mini Kernel Dump File: Only registers and stack trace are available
  706. Windows 10 Kernel Version 15063 MP (8 procs) Free x64
  707. Kernel base = 0xfffff800`29a0f000 PsLoadedModuleList = 0xfffff800`29d5b5c0
  708. Debug session time: Mon Aug 21 20:18:05.783 2017 (UTC - 4:00)
  709. System Uptime: 0 days 19:30:15.507
  710.  
  711. BugCheck 1000007E, {ffffffffc0000005, fffff80029a5fc94, ffff95808a3716e8, ffff95808a370f30}
  712. Probably caused by : memory_corruption
  713. Followup: memory_corruption
  714.  
  715. SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
  716. This is a very common bugcheck. Usually the exception address pinpoints
  717. the driver/function that caused the problem. Always note this address
  718. as well as the link date of the driver/image that contains this address.
  719. Some common problems are exception code 0x80000003. This means a hard
  720. coded breakpoint or assertion was hit, but this system was booted
  721. /NODEBUG. This is not supposed to happen as developers should never have
  722. hardcoded breakpoints in retail code, but ...
  723. If this happens, make sure a debugger gets connected, and the
  724. system is booted /DEBUG. This will let us see why this breakpoint is
  725. happening.
  726.  
  727. Arguments:
  728. Arg1: ffffffffc0000005, The exception code that was not handled
  729. Arg2: fffff80029a5fc94, The address that the exception occurred at
  730. Arg3: ffff95808a3716e8, Exception Record Address
  731. Arg4: ffff95808a370f30, Context Record Address
  732.  
  733. Debugging Details:
  734. DUMP_CLASS: 1
  735. DUMP_QUALIFIER: 400
  736. DUMP_TYPE: 2
  737. DUMP_FILE_ATTRIBUTES: 0x8
  738. Kernel Generated Triage Dump
  739. EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
  740. FAULTING_IP:
  741. nt!KxWaitForLockOwnerShip+14
  742. fffff800`29a5fc94 48890a mov qword ptr [rdx],rcx
  743. EXCEPTION_RECORD: ffff95808a3716e8 -- (.exr 0xffff95808a3716e8)
  744. ExceptionAddress: fffff80029a5fc94 (nt!KxWaitForLockOwnerShip+0x0000000000000014)
  745. ExceptionCode: c0000005 (Access violation)
  746. ExceptionFlags: 00000000
  747. NumberParameters: 2
  748. Parameter[0]: 0000000000000000
  749. Parameter[1]: ffffffffffffffff
  750. Attempt to read from address ffffffffffffffff
  751. CONTEXT: ffff95808a370f30 -- (.cxr 0xffff95808a370f30)
  752. rax=0000000000000000 rbx=0000000000000000 rcx=ffff95808a3719f0
  753. rdx=2000000000000000 rsi=00000000004491e6 rdi=ffff95808a3719f0
  754. rip=fffff80029a5fc94 rsp=ffff95808a371920 rbp=ffff95808a371a80
  755. r8=ffff95808a3719f0 r9=7fffe58b33f2d3d8 r10=7ffffffffffffffc
  756. r11=ffff95808a371928 r12=0000000000000000 r13=0000000000000001
  757. r14=ffffe58b33f2d2c0 r15=ffff95808a3a8ad0
  758. iopl=0 nv up ei pl zr na po nc
  759. cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246
  760. nt!KxWaitForLockOwnerShip+0x14:
  761. fffff800`29a5fc94 48890a mov qword ptr [rdx],rcx ds:002b:20000000`00000000=????????????????
  762. Resetting default scope
  763. CUSTOMER_CRASH_COUNT: 1
  764. DEFAULT_BUCKET_ID: CODE_CORRUPTION
  765.  
  766. PROCESS_NAME: System
  767.  
  768. CURRENT_IRQL: 2
  769. ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
  770. EXCEPTION_CODE_STR: c0000005
  771. EXCEPTION_PARAMETER1: 0000000000000000
  772. EXCEPTION_PARAMETER2: ffffffffffffffff
  773. FOLLOWUP_IP:
  774. nt!KxWaitForLockOwnerShip+14
  775. fffff800`29a5fc94 48890a mov qword ptr [rdx],rcx
  776. READ_ADDRESS: fffff80029df0358: Unable to get MiVisibleState
  777. ffffffffffffffff
  778. BUGCHECK_STR: AV
  779. LAST_CONTROL_TRANSFER: from fffff80029a5fc64 to fffff80029a5fc94
  780. STACK_TEXT:
  781. ffff9580`8a371920 fffff800`29a5fc64 : 00000000`00000000 ffffe58b`33f2d2c0 ffffe58b`33f2d2c0 00000000`00000000 : nt!KxWaitForLockOwnerShip+0x14
  782. ffff9580`8a371950 fffff800`29a60be3 : 00000000`0001e000 ffff9580`8a371a80 00000000`004491e6 00000000`00020000 : nt!KeAcquireInStackQueuedSpinLock+0x44
  783. ffff9580`8a371980 fffff800`29a5f7fa : ffffe58b`346ad6b8 00000000`00000000 ffffe58b`00000001 00000000`00000000 : nt!CcFlushCachePriv+0x2c3
  784. ffff9580`8a371ac0 fffff800`29a4cca8 : 00000000`00001600 ffffe58b`38856001 fffff808`00000000 00000000`00340377 : nt!CcWriteBehindInternal+0x19a
  785. ffff9580`8a371b80 fffff800`29aebac7 : 00000000`00000000 00000000`00000080 ffffe58b`2c8b3300 ffffe58b`38856040 : nt!ExpWorkerThread+0xd8
  786. ffff9580`8a371c10 fffff800`29b809e6 : ffff9580`822c3180 ffffe58b`38856040 fffff800`29aeba80 00000000`00000000 : nt!PspSystemThreadStartup+0x47
  787. ffff9580`8a371c60 00000000`00000000 : ffff9580`8a372000 ffff9580`8a36c000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
  788. CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
  789. fffff80029a5f011-fffff80029a5f013 3 bytes - nt!MiReleaseSystemCacheView+99
  790. [ 40 fb f6:80 7f ff ]
  791. fffff80029a5f03c-fffff80029a5f03d 2 bytes - nt!MiReleaseSystemCacheView+c4 (+0x2b)
  792. [ 80 fa:00 ab ]
  793. fffff80029a5f162-fffff80029a5f164 3 bytes - nt!MiReleaseSystemCacheView+1ea (+0x126)
  794. [ 40 fb f6:80 7f ff ]
  795. fffff80029a5f196-fffff80029a5f197 2 bytes - nt!MiReleaseSystemCacheView+21e (+0x34)
  796. [ 80 fa:00 ab ]
  797. 10 errors : !nt (fffff80029a5f011-fffff80029a5f197)
  798. MODULE_NAME: memory_corruption
  799.  
  800. IMAGE_NAME: memory_corruption
  801.  
  802. FOLLOWUP_NAME: memory_corruption
  803. DEBUG_FLR_IMAGE_TIMESTAMP: 0
  804. MEMORY_CORRUPTOR: LARGE
  805. STACK_COMMAND: .cxr 0xffff95808a370f30 ; kb
  806. FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
  807. BUCKET_ID: MEMORY_CORRUPTION_LARGE
  808. PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
  809. TARGET_TIME: 2017-08-22T00:18:05.000Z
  810. SUITE_MASK: 272
  811. PRODUCT_TYPE: 1
  812. USER_LCID: 0
  813. FAILURE_ID_HASH_STRING: km:memory_corruption_large
  814. FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
  815. Followup: memory_corruption
  816.  
  817. ========================================================================
  818. ==================== Dump File: 082017-11703-01.dmp ====================
  819. ========================================================================
  820. Mini Kernel Dump File: Only registers and stack trace are available
  821. Windows 10 Kernel Version 15063 MP (8 procs) Free x64
  822. Kernel base = 0xfffff803`d3087000 PsLoadedModuleList = 0xfffff803`d33d35c0
  823. Debug session time: Mon Aug 21 00:47:12.779 2017 (UTC - 4:00)
  824. System Uptime: 0 days 0:05:45.502
  825.  
  826. BugCheck 124, {0, ffffce8ebdcd5028, b0800000, 40151}
  827. Probably caused by : AuthenticAMD
  828. Followup: MachineOwner
  829.  
  830. WHEA_UNCORRECTABLE_ERROR (124)
  831. A fatal hardware error has occurred. Parameter 1 identifies the type of error
  832. source that reported the error. Parameter 2 holds the address of the
  833. WHEA_ERROR_RECORD structure that describes the error conditon.
  834.  
  835. Arguments:
  836. Arg1: 0000000000000000, Machine Check Exception
  837. Arg2: ffffce8ebdcd5028, Address of the WHEA_ERROR_RECORD structure.
  838. Arg3: 00000000b0800000, High order 32-bits of the MCi_STATUS value.
  839. Arg4: 0000000000040151, Low order 32-bits of the MCi_STATUS value.
  840.  
  841. Debugging Details:
  842. DUMP_CLASS: 1
  843. DUMP_QUALIFIER: 400
  844. DUMP_TYPE: 2
  845. DUMP_FILE_ATTRIBUTES: 0x8
  846. Kernel Generated Triage Dump
  847. BUGCHECK_STR: 0x124_AuthenticAMD
  848. CUSTOMER_CRASH_COUNT: 1
  849. DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
  850.  
  851. PROCESS_NAME: chrome.exe
  852.  
  853. CURRENT_IRQL: f
  854. STACK_TEXT:
  855. ffffa700`c74cb7e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
  856. STACK_COMMAND: kb
  857. THREAD_SHA1_HASH_MOD_FUNC: 81a83ae0317433a47fcc36991983df3b6e638b71
  858. THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 6e16edd8c7dd677734fdbcd2397a2e35e9fae964
  859. THREAD_SHA1_HASH_MOD: 76cd06466d098060a9eb26e5fd2a25cb1f3fe0a3
  860. FOLLOWUP_NAME: MachineOwner
  861. MODULE_NAME: AuthenticAMD
  862.  
  863. IMAGE_NAME: AuthenticAMD
  864.  
  865. DEBUG_FLR_IMAGE_TIMESTAMP: 0
  866. FAILURE_BUCKET_ID: 0x124_AuthenticAMD_PROCESSOR_CACHE
  867. BUCKET_ID: 0x124_AuthenticAMD_PROCESSOR_CACHE
  868. PRIMARY_PROBLEM_CLASS: 0x124_AuthenticAMD_PROCESSOR_CACHE
  869. TARGET_TIME: 2017-08-21T04:47:12.000Z
  870. SUITE_MASK: 272
  871. PRODUCT_TYPE: 1
  872. USER_LCID: 0
  873. FAILURE_ID_HASH_STRING: km:0x124_authenticamd_processor_cache
  874. FAILURE_ID_HASH: {b533751b-676e-7546-bcdc-24e6c40d0064}
  875. Followup: MachineOwner
  876.  
  877. ========================================================================
  878. ==================== Dump File: 082017-11437-01.dmp ====================
  879. ========================================================================
  880. Mini Kernel Dump File: Only registers and stack trace are available
  881. Windows 10 Kernel Version 15063 MP (8 procs) Free x64
  882. Kernel base = 0xfffff803`6e409000 PsLoadedModuleList = 0xfffff803`6e7555c0
  883. Debug session time: Mon Aug 21 00:40:10.411 2017 (UTC - 4:00)
  884. System Uptime: 0 days 0:51:09.133
  885.  
  886. BugCheck 1000007E, {ffffffffc0000005, fffff8036e49f468, ffff8900b4086478, ffff8900b4085cc0}
  887. Probably caused by : memory_corruption
  888. Followup: memory_corruption
  889.  
  890. SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
  891. This is a very common bugcheck. Usually the exception address pinpoints
  892. the driver/function that caused the problem. Always note this address
  893. as well as the link date of the driver/image that contains this address.
  894. Some common problems are exception code 0x80000003. This means a hard
  895. coded breakpoint or assertion was hit, but this system was booted
  896. /NODEBUG. This is not supposed to happen as developers should never have
  897. hardcoded breakpoints in retail code, but ...
  898. If this happens, make sure a debugger gets connected, and the
  899. system is booted /DEBUG. This will let us see why this breakpoint is
  900. happening.
  901.  
  902. Arguments:
  903. Arg1: ffffffffc0000005, The exception code that was not handled
  904. Arg2: fffff8036e49f468, The address that the exception occurred at
  905. Arg3: ffff8900b4086478, Exception Record Address
  906. Arg4: ffff8900b4085cc0, Context Record Address
  907.  
  908. Debugging Details:
  909. DUMP_CLASS: 1
  910. DUMP_QUALIFIER: 400
  911. DUMP_TYPE: 2
  912. DUMP_FILE_ATTRIBUTES: 0x8
  913. Kernel Generated Triage Dump
  914. EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
  915. FAULTING_IP:
  916. nt!MiCoalesceFreePages+68
  917. fffff803`6e49f468 0fb64522 movzx eax,byte ptr [rbp+22h]
  918. EXCEPTION_RECORD: ffff8900b4086478 -- (.exr 0xffff8900b4086478)
  919. ExceptionAddress: fffff8036e49f468 (nt!MiCoalesceFreePages+0x0000000000000068)
  920. ExceptionCode: c0000005 (Access violation)
  921. ExceptionFlags: 00000000
  922. NumberParameters: 2
  923. Parameter[0]: ffffffffffffffff
  924. Parameter[1]: 0000000000000000
  925. Attempt to unknown address 0000000000000000
  926. CONTEXT: ffff8900b4085cc0 -- (.cxr 0xffff8900b4085cc0)
  927. rax=ffffea8000000000 rbx=ffffea8006560070 rcx=000000000021caad
  928. rdx=ffffea8000000000 rsi=0000000000000000 rdi=000000000021caa0
  929. rip=fffff8036e49f468 rsp=ffff8900b40866b0 rbp=fff10a968329adf0
  930. r8=0000000000000008 r9=2aaaaaaaaaaaaaab r10=00000000000000ad
  931. r11=fffff8036e7727b0 r12=0000000000000000 r13=00000000000000ad
  932. r14=fffff8036e786100 r15=000000000021caad
  933. iopl=0 nv up ei pl nz na po nc
  934. cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010206
  935. nt!MiCoalesceFreePages+0x68:
  936. fffff803`6e49f468 0fb64522 movzx eax,byte ptr [rbp+22h] ss:0018:fff10a96`8329ae12=??
  937. Resetting default scope
  938. CUSTOMER_CRASH_COUNT: 1
  939. DEFAULT_BUCKET_ID: CODE_CORRUPTION
  940.  
  941. PROCESS_NAME: System
  942.  
  943. CURRENT_IRQL: 2
  944. ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
  945. EXCEPTION_CODE_STR: c0000005
  946. EXCEPTION_PARAMETER1: ffffffffffffffff
  947. EXCEPTION_PARAMETER2: 0000000000000000
  948. FOLLOWUP_IP:
  949. nt!MiCoalesceFreePages+68
  950. fffff803`6e49f468 0fb64522 movzx eax,byte ptr [rbp+22h]
  951. BUGCHECK_STR: AV
  952. LAST_CONTROL_TRANSFER: from fffff8036e49ec6e to fffff8036e49f468
  953. STACK_TEXT:
  954. ffff8900`b40866b0 fffff803`6e49ec6e : 00000000`0021caa0 00000000`00000000 ffffea80`06560070 ffffea80`06493e00 : nt!MiCoalesceFreePages+0x68
  955. ffff8900`b4086780 fffff803`6e49e5f2 : 00000000`0021caad fffff803`6e786100 00000000`00000000 00000000`00000000 : nt!MiInsertPageInFreeOrZeroedList+0x20e
  956. ffff8900`b4086880 fffff803`6e54cad2 : ffffc2c4`00000002 ffff8900`b40869c8 8a000002`1caad963 ffffc280`00000000 : nt!MiZeroSinglePage+0x132
  957. ffff8900`b4086920 fffff803`6e4e5ac7 : 00001020`00000020 fffff803`6e54c470 fffff803`6e786100 00000000`00000688 : nt!MiZeroPageThread+0x662
  958. ffff8900`b4086c10 fffff803`6e57a9e6 : ffff8900`b3e41180 ffffc588`2caec040 fffff803`6e4e5a80 00400002`00020088 : nt!PspSystemThreadStartup+0x47
  959. ffff8900`b4086c60 00000000`00000000 : ffff8900`b4087000 ffff8900`b4081000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
  960. CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
  961. fffff8036e49f17c - nt!MiInsertPageInFreeOrZeroedList+71c
  962. [ fa:ea ]
  963. fffff8036e49f1dc - nt!MiInsertPageInFreeOrZeroedList+77c (+0x60)
  964. [ fa:ea ]
  965. fffff8036e49f447 - nt!MiCoalesceFreePages+47 (+0x26b)
  966. [ fa:ea ]
  967. fffff8036e49f4c7 - nt!MiCoalesceFreePages+c7 (+0x80)
  968. [ fa:ea ]
  969. fffff8036e49f7b8 - nt!MiCoalesceFreePages+3b8 (+0x2f1)
  970. [ fa:ea ]
  971. fffff8036e49fa0c - nt!MiCoalesceFreePages+60c (+0x254)
  972. [ fa:ea ]
  973. fffff8036e49fbf4 - nt!MiUnlinkFreeOrZeroedPage+24 (+0x1e8)
  974. [ fa:ea ]
  975. fffff8036e49fe33 - nt!MiUnlinkFreeOrZeroedPage+263 (+0x23f)
  976. [ fa:ea ]
  977. fffff8036e49fec1 - nt!MiUnlinkFreeOrZeroedPage+2f1 (+0x8e)
  978. [ fa:ea ]
  979. fffff8036e49ff7b - nt!MiUnlinkFreeOrZeroedPage+3ab (+0xba)
  980. [ fa:ea ]
  981. fffff8036e49ffac - nt!MiUnlinkFreeOrZeroedPage+3dc (+0x31)
  982. [ fa:ea ]
  983. 11 errors : !nt (fffff8036e49f17c-fffff8036e49ffac)
  984. MODULE_NAME: memory_corruption
  985.  
  986. IMAGE_NAME: memory_corruption
  987.  
  988. FOLLOWUP_NAME: memory_corruption
  989. DEBUG_FLR_IMAGE_TIMESTAMP: 0
  990. MEMORY_CORRUPTOR: ONE_BIT_LARGE
  991. STACK_COMMAND: .cxr 0xffff8900b4085cc0 ; kb
  992. FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT_LARGE
  993. BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT_LARGE
  994. PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_ONE_BIT_LARGE
  995. TARGET_TIME: 2017-08-21T04:40:10.000Z
  996. SUITE_MASK: 272
  997. PRODUCT_TYPE: 1
  998. USER_LCID: 0
  999. FAILURE_ID_HASH_STRING: km:memory_corruption_one_bit_large
  1000. FAILURE_ID_HASH: {31545515-196b-fab5-2300-9ce714226f43}
  1001. Followup: memory_corruption
  1002.  
  1003. ========================================================================
  1004. ==================== Dump File: 082017-11390-01.dmp ====================
  1005. ========================================================================
  1006. Mini Kernel Dump File: Only registers and stack trace are available
  1007. Windows 10 Kernel Version 15063 MP (8 procs) Free x64
  1008. Kernel base = 0xfffff800`1ea00000 PsLoadedModuleList = 0xfffff800`1ed4c5c0
  1009. Debug session time: Sun Aug 20 23:48:26.166 2017 (UTC - 4:00)
  1010. System Uptime: 0 days 7:06:37.888
  1011.  
  1012. BugCheck 3B, {c0000005, fffff8001ea50c94, ffffe601f27e3700, 0}
  1013. Probably caused by : memory_corruption
  1014. Followup: memory_corruption
  1015.  
  1016. SYSTEM_SERVICE_EXCEPTION (3b)
  1017. An exception happened while executing a system service routine.
  1018.  
  1019. Arguments:
  1020. Arg1: 00000000c0000005, Exception code that caused the bugcheck
  1021. Arg2: fffff8001ea50c94, Address of the instruction which caused the bugcheck
  1022. Arg3: ffffe601f27e3700, Address of the context record for the exception that caused the bugcheck
  1023. Arg4: 0000000000000000, zero.
  1024.  
  1025. Debugging Details:
  1026. DUMP_CLASS: 1
  1027. DUMP_QUALIFIER: 400
  1028. DUMP_TYPE: 2
  1029. DUMP_FILE_ATTRIBUTES: 0x8
  1030. Kernel Generated Triage Dump
  1031. EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
  1032. FAULTING_IP:
  1033. nt!KxWaitForLockOwnerShip+14
  1034. fffff800`1ea50c94 48890a mov qword ptr [rdx],rcx
  1035. CONTEXT: ffffe601f27e3700 -- (.cxr 0xffffe601f27e3700)
  1036. rax=0000000000000307 rbx=0000000000000000 rcx=ffffe601f27e4150
  1037. rdx=2000000000000000 rsi=0000000000000001 rdi=ffffe601f27e4150
  1038. rip=fffff8001ea50c94 rsp=ffffe601f27e40f0 rbp=ffffe601f27e41b9
  1039. r8=ffffa98000007000 r9=fffff8001ed7e070 r10=000000000000009b
  1040. r11=ffffa98000007000 r12=0000000000000000 r13=0000000000000000
  1041. r14=fffff8001ed7d100 r15=000000000029fb9b
  1042. iopl=0 nv up ei pl zr na po nc
  1043. cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246
  1044. nt!KxWaitForLockOwnerShip+0x14:
  1045. fffff800`1ea50c94 48890a mov qword ptr [rdx],rcx ds:002b:20000000`00000000=????????????????
  1046. Resetting default scope
  1047. CUSTOMER_CRASH_COUNT: 1
  1048. DEFAULT_BUCKET_ID: CODE_CORRUPTION
  1049. BUGCHECK_STR: 0x3B
  1050.  
  1051. PROCESS_NAME: explorer.exe
  1052.  
  1053. CURRENT_IRQL: 2
  1054. LAST_CONTROL_TRANSFER: from fffff8001ea96279 to fffff8001ea50c94
  1055. STACK_TEXT:
  1056. ffffe601`f27e40f0 fffff800`1ea96279 : ffffa680`07df2d10 ffff80c6`00000001 00000000`fffffffe ffffa680`07df2b00 : nt!KxWaitForLockOwnerShip+0x14
  1057. ffffe601`f27e4120 fffff800`1ea9575c : 00000000`0029fb9b ffffa680`07bbe830 ffffa680`07bbe860 ffffa680`00000001 : nt!MiInsertPageInFreeOrZeroedList+0x819
  1058. ffffe601`f27e4220 fffff800`1ea7c5ab : 00000000`00000010 00000000`00000202 ffffe601`efbcebc0 ffffe601`f27e4400 : nt!MiPfnShareCountIsZero+0xcc
  1059. ffffe601`f27e4270 fffff800`1ea7c101 : 00000000`00000000 ffffa680`00000000 00000000`00000000 ffffe601`f27e4550 : nt!MiDeleteValidSystemPage+0x17b
  1060. ffffe601`f27e4300 fffff800`1ea7b32b : 00000000`00000000 ffff8f0d`8f743580 00000000`0000009f ffffffff`ffffffff : nt!MiDeleteSystemPagableVm+0x2f1
  1061. ffffe601`f27e44b0 fffff800`1ea6a240 : 00000000`00001ee8 ffff8d5b`49a892f0 00000000`00000000 ffff8d5b`40000f40 : nt!MiFreePagedPoolPages+0x1ab
  1062. ffffe601`f27e4680 fffff800`1ec804ef : ffff8d5b`49800000 ffffe601`f27e4770 00000000`00000000 fffff800`00000021 : nt!ExFreeLargePool+0x5a0
  1063. ffffe601`f27e4730 ffff8d0a`d8eab3fc : 00000000`00000000 ffff8d5b`49800000 ffff8d5b`49800000 00000000`00000000 : nt!ExFreePoolWithTag+0x4cf
  1064. ffffe601`f27e4830 ffff8d0a`d8ea9232 : 00000000`00000001 ffff8d5b`498001c8 00000000`00000000 00000000`00000014 : win32kbase!Win32FreePool+0x1c
  1065. ffffe601`f27e4860 ffff8d0a`d8ea8c43 : 00000000`00000000 00000000`00000001 00000000`00000001 00000000`00000000 : win32kbase!FreeObject+0x52
  1066. ffffe601`f27e4890 ffff8d0a`d8eab3ad : 00000000`00000000 00000000`00000000 ffff8d5b`49800000 fffff800`00000000 : win32kbase!SURFACE::bDeleteSurface+0x653
  1067. ffffe601`f27e4a50 ffff8d0a`d8e96dde : 00000000`00002999 00000000`00000000 ffffe601`f27e4b80 ffff8d0a`d8ed442b : win32kbase!bDeleteSurface+0x2d
  1068. ffffe601`f27e4a80 fffff800`1eb77413 : ffff8f0d`8edf07c0 ffff8f0d`8edf07c0 00000000`00000000 00000000`01351000 : win32kbase!NtGdiDeleteObjectApp+0x1be
  1069. ffffe601`f27e4b00 00007ffb`7af114e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
  1070. 00000000`2ce9d628 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`7af114e4
  1071. CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
  1072. fffff8001ea50012-fffff8001ea50013 2 bytes - nt!MiReleaseSystemCacheView+9a
  1073. [ fb f6:c0 80 ]
  1074. fffff8001ea5003d - nt!MiReleaseSystemCacheView+c5 (+0x2b)
  1075. [ fa:a6 ]
  1076. fffff8001ea50163-fffff8001ea50164 2 bytes - nt!MiReleaseSystemCacheView+1eb (+0x126)
  1077. [ fb f6:c0 80 ]
  1078. fffff8001ea50197 - nt!MiReleaseSystemCacheView+21f (+0x34)
  1079. [ fa:a6 ]
  1080. 6 errors : !nt (fffff8001ea50012-fffff8001ea50197)
  1081. MODULE_NAME: memory_corruption
  1082.  
  1083. IMAGE_NAME: memory_corruption
  1084.  
  1085. FOLLOWUP_NAME: memory_corruption
  1086. DEBUG_FLR_IMAGE_TIMESTAMP: 0
  1087. MEMORY_CORRUPTOR: LARGE
  1088. STACK_COMMAND: .cxr 0xffffe601f27e3700 ; kb
  1089. FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
  1090. BUCKET_ID: MEMORY_CORRUPTION_LARGE
  1091. PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
  1092. TARGET_TIME: 2017-08-21T03:48:26.000Z
  1093. SUITE_MASK: 272
  1094. PRODUCT_TYPE: 1
  1095. USER_LCID: 0
  1096. FAILURE_ID_HASH_STRING: km:memory_corruption_large
  1097. FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
  1098. Followup: memory_corruption
  1099.  
  1100. ========================================================================
  1101. ==================== Dump File: 081517-11656-01.dmp ====================
  1102. ========================================================================
  1103. Mini Kernel Dump File: Only registers and stack trace are available
  1104. Windows 10 Kernel Version 15063 MP (8 procs) Free x64
  1105. Kernel base = 0xfffff803`fd60d000 PsLoadedModuleList = 0xfffff803`fd9595c0
  1106. Debug session time: Tue Aug 15 19:10:01.022 2017 (UTC - 4:00)
  1107. System Uptime: 0 days 19:07:45.744
  1108.  
  1109. BugCheck 124, {0, ffff800c60e85028, b0800000, 40151}
  1110. Probably caused by : AuthenticAMD
  1111. Followup: MachineOwner
  1112.  
  1113. WHEA_UNCORRECTABLE_ERROR (124)
  1114. A fatal hardware error has occurred. Parameter 1 identifies the type of error
  1115. source that reported the error. Parameter 2 holds the address of the
  1116. WHEA_ERROR_RECORD structure that describes the error conditon.
  1117.  
  1118. Arguments:
  1119. Arg1: 0000000000000000, Machine Check Exception
  1120. Arg2: ffff800c60e85028, Address of the WHEA_ERROR_RECORD structure.
  1121. Arg3: 00000000b0800000, High order 32-bits of the MCi_STATUS value.
  1122. Arg4: 0000000000040151, Low order 32-bits of the MCi_STATUS value.
  1123.  
  1124. Debugging Details:
  1125. DUMP_CLASS: 1
  1126. DUMP_QUALIFIER: 400
  1127. DUMP_TYPE: 2
  1128. DUMP_FILE_ATTRIBUTES: 0x8
  1129. Kernel Generated Triage Dump
  1130. BUGCHECK_STR: 0x124_AuthenticAMD
  1131. CUSTOMER_CRASH_COUNT: 1
  1132. DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
  1133.  
  1134. PROCESS_NAME: chrome.exe
  1135.  
  1136. CURRENT_IRQL: f
  1137. STACK_TEXT:
  1138. ffffe581`4a0cb7e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
  1139. STACK_COMMAND: kb
  1140. THREAD_SHA1_HASH_MOD_FUNC: 81a83ae0317433a47fcc36991983df3b6e638b71
  1141. THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 6e16edd8c7dd677734fdbcd2397a2e35e9fae964
  1142. THREAD_SHA1_HASH_MOD: 76cd06466d098060a9eb26e5fd2a25cb1f3fe0a3
  1143. FOLLOWUP_NAME: MachineOwner
  1144. MODULE_NAME: AuthenticAMD
  1145.  
  1146. IMAGE_NAME: AuthenticAMD
  1147.  
  1148. DEBUG_FLR_IMAGE_TIMESTAMP: 0
  1149. FAILURE_BUCKET_ID: 0x124_AuthenticAMD_PROCESSOR_CACHE
  1150. BUCKET_ID: 0x124_AuthenticAMD_PROCESSOR_CACHE
  1151. PRIMARY_PROBLEM_CLASS: 0x124_AuthenticAMD_PROCESSOR_CACHE
  1152. TARGET_TIME: 2017-08-15T23:10:01.000Z
  1153. SUITE_MASK: 272
  1154. PRODUCT_TYPE: 1
  1155. USER_LCID: 0
  1156. FAILURE_ID_HASH_STRING: km:0x124_authenticamd_processor_cache
  1157. FAILURE_ID_HASH: {b533751b-676e-7546-bcdc-24e6c40d0064}
  1158. Followup: MachineOwner
  1159.  
  1160. ========================================================================
  1161. ==================== Dump File: 081517-11421-01.dmp ====================
  1162. ========================================================================
  1163. Mini Kernel Dump File: Only registers and stack trace are available
  1164. Windows 10 Kernel Version 15063 MP (8 procs) Free x64
  1165. Kernel base = 0xfffff802`0d81e000 PsLoadedModuleList = 0xfffff802`0db6a5c0
  1166. Debug session time: Wed Aug 16 00:43:47.354 2017 (UTC - 4:00)
  1167. System Uptime: 0 days 0:20:22.079
  1168.  
  1169. BugCheck 101, {18, 0, ffffa801978c1180, 6}
  1170. Probably caused by : Unknown_Image ( ANALYSIS_INCONCLUSIVE )
  1171. Followup: MachineOwner
  1172.  
  1173. CLOCK_WATCHDOG_TIMEOUT (101)
  1174. An expected clock interrupt was not received on a secondary processor in an
  1175. MP system within the allocated interval. This indicates that the specified
  1176. processor is hung and not processing interrupts.
  1177.  
  1178. Arguments:
  1179. Arg1: 0000000000000018, Clock interrupt time out interval in nominal clock ticks.
  1180. Arg2: 0000000000000000, 0.
  1181. Arg3: ffffa801978c1180, The PRCB address of the hung processor.
  1182. Arg4: 0000000000000006, The index of the hung processor.
  1183.  
  1184. Debugging Details:
  1185. DUMP_CLASS: 1
  1186. DUMP_QUALIFIER: 400
  1187. DUMP_TYPE: 2
  1188. DUMP_FILE_ATTRIBUTES: 0x8
  1189. Kernel Generated Triage Dump
  1190. BUGCHECK_STR: CLOCK_WATCHDOG_TIMEOUT_8_PROC
  1191. CUSTOMER_CRASH_COUNT: 1
  1192.  
  1193. PROCESS_NAME: RzSurroundVADS
  1194.  
  1195. CURRENT_IRQL: d
  1196. STACK_TEXT:
  1197. fffff802`0fc46bc8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
  1198. STACK_COMMAND: kb
  1199. THREAD_SHA1_HASH_MOD_FUNC: 81a83ae0317433a47fcc36991983df3b6e638b71
  1200. THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 6e16edd8c7dd677734fdbcd2397a2e35e9fae964
  1201. THREAD_SHA1_HASH_MOD: 76cd06466d098060a9eb26e5fd2a25cb1f3fe0a3
  1202. SYMBOL_NAME: ANALYSIS_INCONCLUSIVE
  1203. FOLLOWUP_NAME: MachineOwner
  1204. MODULE_NAME: Unknown_Module
  1205.  
  1206. IMAGE_NAME: Unknown_Image
  1207.  
  1208. DEBUG_FLR_IMAGE_TIMESTAMP: 0
  1209. BUCKET_ID: ZEROED_STACK_CLOCK_WATCHDOG_TIMEOUT_8_PROC
  1210. DEFAULT_BUCKET_ID: ZEROED_STACK_CLOCK_WATCHDOG_TIMEOUT_8_PROC
  1211. PRIMARY_PROBLEM_CLASS: ZEROED_STACK
  1212. FAILURE_BUCKET_ID: ZEROED_STACK_CLOCK_WATCHDOG_TIMEOUT_8_PROC
  1213. TARGET_TIME: 2017-08-16T04:43:47.000Z
  1214. SUITE_MASK: 272
  1215. PRODUCT_TYPE: 1
  1216. USER_LCID: 0
  1217. FAILURE_ID_HASH_STRING: km:zeroed_stack_clock_watchdog_timeout_8_proc
  1218. FAILURE_ID_HASH: {19e7e96e-9b82-56a8-a247-c2b766198fd7}
  1219. Followup: MachineOwner
  1220.  
  1221. ========================================================================
  1222. ==================== Dump File: 081417-11953-01.dmp ====================
  1223. ========================================================================
  1224. Mini Kernel Dump File: Only registers and stack trace are available
  1225. Windows 10 Kernel Version 15063 MP (8 procs) Free x64
  1226. Kernel base = 0xfffff800`50a7f000 PsLoadedModuleList = 0xfffff800`50dcb5c0
  1227. Debug session time: Tue Aug 15 00:01:38.627 2017 (UTC - 4:00)
  1228. System Uptime: 0 days 0:50:11.350
  1229.  
  1230. BugCheck 124, {0, ffffb388d2659028, b0800000, 40151}
  1231. Probably caused by : AuthenticAMD
  1232. Followup: MachineOwner
  1233.  
  1234. WHEA_UNCORRECTABLE_ERROR (124)
  1235. A fatal hardware error has occurred. Parameter 1 identifies the type of error
  1236. source that reported the error. Parameter 2 holds the address of the
  1237. WHEA_ERROR_RECORD structure that describes the error conditon.
  1238.  
  1239. Arguments:
  1240. Arg1: 0000000000000000, Machine Check Exception
  1241. Arg2: ffffb388d2659028, Address of the WHEA_ERROR_RECORD structure.
  1242. Arg3: 00000000b0800000, High order 32-bits of the MCi_STATUS value.
  1243. Arg4: 0000000000040151, Low order 32-bits of the MCi_STATUS value.
  1244.  
  1245. Debugging Details:
  1246. DUMP_CLASS: 1
  1247. DUMP_QUALIFIER: 400
  1248. DUMP_TYPE: 2
  1249. DUMP_FILE_ATTRIBUTES: 0x8
  1250. Kernel Generated Triage Dump
  1251. BUGCHECK_STR: 0x124_AuthenticAMD
  1252. CUSTOMER_CRASH_COUNT: 1
  1253. DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
  1254.  
  1255. PROCESS_NAME: firefox.exe
  1256.  
  1257. CURRENT_IRQL: f
  1258. STACK_TEXT:
  1259. ffffa200`a8fcd7e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
  1260. STACK_COMMAND: kb
  1261. THREAD_SHA1_HASH_MOD_FUNC: 81a83ae0317433a47fcc36991983df3b6e638b71
  1262. THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 6e16edd8c7dd677734fdbcd2397a2e35e9fae964
  1263. THREAD_SHA1_HASH_MOD: 76cd06466d098060a9eb26e5fd2a25cb1f3fe0a3
  1264. FOLLOWUP_NAME: MachineOwner
  1265. MODULE_NAME: AuthenticAMD
  1266.  
  1267. IMAGE_NAME: AuthenticAMD
  1268.  
  1269. DEBUG_FLR_IMAGE_TIMESTAMP: 0
  1270. FAILURE_BUCKET_ID: 0x124_AuthenticAMD_PROCESSOR_CACHE
  1271. BUCKET_ID: 0x124_AuthenticAMD_PROCESSOR_CACHE
  1272. PRIMARY_PROBLEM_CLASS: 0x124_AuthenticAMD_PROCESSOR_CACHE
  1273. TARGET_TIME: 2017-08-15T04:01:38.000Z
  1274. SUITE_MASK: 272
  1275. PRODUCT_TYPE: 1
  1276. USER_LCID: 0
  1277. FAILURE_ID_HASH_STRING: km:0x124_authenticamd_processor_cache
  1278. FAILURE_ID_HASH: {b533751b-676e-7546-bcdc-24e6c40d0064}
  1279. Followup: MachineOwner
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement