Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- ========================== AUTO DUMP ANALYZER ==========================
- Auto Dump Analyzer by gardenman
- Time to debug file(s): 00 hours and 14 minutes and 54 seconds
- ================================= BIOS =================================
- VENDOR: American Megatrends Inc.
- VERSION: 2501
- DATE: 04/07/2014
- ============================= MOTHERBOARD ==============================
- MANUFACTURER: ASUSTeK COMPUTER INC.
- PRODUCT: M5A99FX PRO R2.0
- VERSION: Rev 1.xx
- ================================= RAM ==================================
- Size Speed Manufacturer Part No.
- -------------- -------------- ------------------- ----------------------
- 0MHz Manufacturer0 Array1_PartNumber0
- 8192MB 1333MHz Undefined F3-1866C9-8GXM
- 0MHz Manufacturer2 Array1_PartNumber2
- 8192MB 1333MHz Undefined F3-1866C9-8GXM
- ================================= CPU ==================================
- Processor Version: AMD FX(tm)-8350 Eight-Core Processor
- COUNT: 8
- MHZ: 4334
- VENDOR: AuthenticAMD
- FAMILY: 15
- MODEL: 2
- STEPPING: 0
- ================================== OS ==================================
- Product: WinNt, suite: TerminalServer SingleUserTS
- BUILD_VERSION: 10.0.15063.540 (WinBuild.160101.0800)
- BUILD: 15063
- SERVICEPACK: 540
- PLATFORM_TYPE: x64
- NAME: Windows 10
- EDITION: Windows 10 WinNt TerminalServer SingleUserTS
- BUILD_TIMESTAMP: 2017-07-31 21:23:25
- BUILDDATESTAMP: 160101.0800
- BUILDLAB: WinBuild
- BUILDOSVER: 10.0.15063.540
- =============================== DEBUGGER ===============================
- Microsoft (R) Windows Debugger Version 10.0.14321.1024 X86
- Copyright (c) Microsoft Corporation. All rights reserved.
- =============================== COMMENTS ===============================
- * Information gathered from different dump files may be different. If
- Windows updates between two dump files, two or more OS's versions may
- be shown above.
- * If the user updates the BIOS between dump files, two or more versions
- and dates may be shown above.
- * More RAM information can be found below in the full BIOS section.
- ========================================================================
- ==================== Dump File: 082617-11171-01.dmp ====================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 15063 MP (8 procs) Free x64
- Kernel base = 0xfffff801`65a07000 PsLoadedModuleList = 0xfffff801`65d535c0
- Debug session time: Sat Aug 26 15:42:58.731 2017 (UTC - 4:00)
- System Uptime: 0 days 0:06:13.453
- BugCheck 101, {18, 0, ffffce815ab40180, 7}
- Probably caused by : Unknown_Image ( ANALYSIS_INCONCLUSIVE )
- Followup: MachineOwner
- CLOCK_WATCHDOG_TIMEOUT (101)
- An expected clock interrupt was not received on a secondary processor in an
- MP system within the allocated interval. This indicates that the specified
- processor is hung and not processing interrupts.
- Arguments:
- Arg1: 0000000000000018, Clock interrupt time out interval in nominal clock ticks.
- Arg2: 0000000000000000, 0.
- Arg3: ffffce815ab40180, The PRCB address of the hung processor.
- Arg4: 0000000000000007, The index of the hung processor.
- Debugging Details:
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- DUMP_TYPE: 2
- DUMP_FILE_ATTRIBUTES: 0x8
- Kernel Generated Triage Dump
- BUGCHECK_STR: CLOCK_WATCHDOG_TIMEOUT_8_PROC
- CUSTOMER_CRASH_COUNT: 1
- PROCESS_NAME: chrome.exe
- CURRENT_IRQL: d
- STACK_TEXT:
- fffff801`67a46bc8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
- STACK_COMMAND: kb
- THREAD_SHA1_HASH_MOD_FUNC: 81a83ae0317433a47fcc36991983df3b6e638b71
- THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 6e16edd8c7dd677734fdbcd2397a2e35e9fae964
- THREAD_SHA1_HASH_MOD: 76cd06466d098060a9eb26e5fd2a25cb1f3fe0a3
- SYMBOL_NAME: ANALYSIS_INCONCLUSIVE
- FOLLOWUP_NAME: MachineOwner
- MODULE_NAME: Unknown_Module
- IMAGE_NAME: Unknown_Image
- DEBUG_FLR_IMAGE_TIMESTAMP: 0
- BUCKET_ID: ZEROED_STACK_CLOCK_WATCHDOG_TIMEOUT_8_PROC
- DEFAULT_BUCKET_ID: ZEROED_STACK_CLOCK_WATCHDOG_TIMEOUT_8_PROC
- PRIMARY_PROBLEM_CLASS: ZEROED_STACK
- FAILURE_BUCKET_ID: ZEROED_STACK_CLOCK_WATCHDOG_TIMEOUT_8_PROC
- TARGET_TIME: 2017-08-26T19:42:58.000Z
- SUITE_MASK: 272
- PRODUCT_TYPE: 1
- USER_LCID: 0
- FAILURE_ID_HASH_STRING: km:zeroed_stack_clock_watchdog_timeout_8_proc
- FAILURE_ID_HASH: {19e7e96e-9b82-56a8-a247-c2b766198fd7}
- Followup: MachineOwner
- ========================================================================
- ===================== 3RD PARTY DRIVER QUICK LIST ======================
- ========================================================================
- Jun 05 2008 - FSPFltd.sys - FSPro File System Filter Driver https://fspro.net/
- Jun 25 2010 - npf.sys - NetGroup Packet Filter driver, a component of WinPCap by Riverbed
- Aug 02 2010 - AsUpIO.sys - Asus Update Input Output Driver http://www.asus.com/
- Apr 11 2012 - amd_sata.sys - AMD SATA Controller AHCI Device Driver http://support.amd.com/
- Apr 11 2012 - amd_xata.sys - AMD Stor Filter Driver http://support.amd.com/
- Aug 22 2012 - AsIO.sys - Asus Input Output driver http://www.asus.com/
- Aug 28 2012 - usbfilter.sys - AMD USB Filter driver
- Dec 25 2012 - ambakdrv.sys - Aomei driver (Aomei Technology Co)
- Dec 25 2012 - ammntdrv.sys - AOMEI Backupper driver (Aomei Technology Co.) http://www.aomeitech.com/
- Dec 25 2012 - amwrtdrv.sys - AOMEI Backupper driver (Aomei Technology Co.) http://www.aomeitech.com/
- Mar 31 2015 - HWiNFO64A.SYS - HWiNFO AMD64 Kernel Driver https://www.hwinfo.com/
- Jun 16 2015 - asstor64.sys - Asmedia 106x SATA Host Controller Driver
- Jun 16 2015 - dump_asstor64.sys - (Generic Description) dump_*.sys drivers usually provide disk access during a crash to write dump files.
- Aug 11 2015 - rzendpt.sys - Razer RzEndPt driver https://www.razerzone.com/
- Aug 11 2015 - rzudd.sys - Razer Rzudd Engine Driver https://www.razerzone.com/
- Sep 16 2015 - rzpnk.sys - Razer Overlay Support https://www.razerzone.com/
- Sep 17 2015 - rzpmgrk.sys - Razer Overlay Support https://www.razerzone.com/
- Feb 15 2016 - RzSurroundVAD.sys - RazerSurround VAD Audio driver http://www.razersupport.com/
- Jun 14 2016 - RTKVHD64.sys - Realtek Audio Driver system driver http://www.realtek.com.tw/
- Mar 23 2017 - rt640x64.sys - Realtek NICDRV 8169 PCIe GBE Family Controller driver http://www.realtek.com.tw/
- Jun 12 2017 - atikmdag.sys - ATI Radeon Kernel Mode Driver Package
- Jun 12 2017 - atikmpag.sys - ATI video card driver
- ========================================================================
- ========================== 3RD PARTY DRIVERS ===========================
- ========================================================================
- Image name: FSPFltd.sys
- Search : https://www.google.com/search?q=FSPFltd.sys
- ADA Info : FSPro File System Filter Driver https://fspro.net/
- Timestamp : Thu Jun 5 2008
- Image name: npf.sys
- Search : https://www.google.com/search?q=npf.sys
- ADA Info : NetGroup Packet Filter driver, a component of WinPCap by Riverbed
- Timestamp : Fri Jun 25 2010
- Image name: AsUpIO.sys
- Search : https://www.google.com/search?q=AsUpIO.sys
- ADA Info : Asus Update Input Output Driver http://www.asus.com/
- Timestamp : Mon Aug 2 2010
- Image name: amd_sata.sys
- Search : https://www.google.com/search?q=amd_sata.sys
- ADA Info : AMD SATA Controller AHCI Device Driver http://support.amd.com/
- Timestamp : Wed Apr 11 2012
- Image name: amd_xata.sys
- Search : https://www.google.com/search?q=amd_xata.sys
- ADA Info : AMD Stor Filter Driver http://support.amd.com/
- Timestamp : Wed Apr 11 2012
- Image name: AsIO.sys
- Search : https://www.google.com/search?q=AsIO.sys
- ADA Info : Asus Input Output driver http://www.asus.com/
- Timestamp : Wed Aug 22 2012
- Image name: usbfilter.sys
- Search : https://www.google.com/search?q=usbfilter.sys
- ADA Info : AMD USB Filter driver
- Timestamp : Tue Aug 28 2012
- Image name: ambakdrv.sys
- Search : https://www.google.com/search?q=ambakdrv.sys
- ADA Info : Aomei driver (Aomei Technology Co)
- Timestamp : Tue Dec 25 2012
- Image name: ammntdrv.sys
- Search : https://www.google.com/search?q=ammntdrv.sys
- ADA Info : AOMEI Backupper driver (Aomei Technology Co.) http://www.aomeitech.com/
- Timestamp : Tue Dec 25 2012
- Image name: amwrtdrv.sys
- Search : https://www.google.com/search?q=amwrtdrv.sys
- ADA Info : AOMEI Backupper driver (Aomei Technology Co.) http://www.aomeitech.com/
- Timestamp : Tue Dec 25 2012
- Image name: HWiNFO64A.SYS
- Search : https://www.google.com/search?q=HWiNFO64A.SYS
- ADA Info : HWiNFO AMD64 Kernel Driver https://www.hwinfo.com/
- Timestamp : Tue Mar 31 2015
- Image name: asstor64.sys
- Search : https://www.google.com/search?q=asstor64.sys
- ADA Info : Asmedia 106x SATA Host Controller Driver
- Timestamp : Tue Jun 16 2015
- Image name: dump_asstor64.sys
- Search : https://www.google.com/search?q=dump_asstor64.sys
- ADA Info : (Generic Description) dump_*.sys drivers usually provide disk access during a crash to write dump files.
- Timestamp : Tue Jun 16 2015
- Image name: rzendpt.sys
- Search : https://www.google.com/search?q=rzendpt.sys
- ADA Info : Razer RzEndPt driver https://www.razerzone.com/
- Timestamp : Tue Aug 11 2015
- Image name: rzudd.sys
- Search : https://www.google.com/search?q=rzudd.sys
- ADA Info : Razer Rzudd Engine Driver https://www.razerzone.com/
- Timestamp : Tue Aug 11 2015
- Image name: rzpnk.sys
- Search : https://www.google.com/search?q=rzpnk.sys
- ADA Info : Razer Overlay Support https://www.razerzone.com/
- Timestamp : Wed Sep 16 2015
- Image name: rzpmgrk.sys
- Search : https://www.google.com/search?q=rzpmgrk.sys
- ADA Info : Razer Overlay Support https://www.razerzone.com/
- Timestamp : Thu Sep 17 2015
- Image name: RzSurroundVAD.sys
- Search : https://www.google.com/search?q=RzSurroundVAD.sys
- ADA Info : RazerSurround VAD Audio driver http://www.razersupport.com/
- Timestamp : Mon Feb 15 2016
- Image name: RTKVHD64.sys
- Search : https://www.google.com/search?q=RTKVHD64.sys
- ADA Info : Realtek Audio Driver system driver http://www.realtek.com.tw/
- Timestamp : Tue Jun 14 2016
- Image name: rt640x64.sys
- Search : https://www.google.com/search?q=rt640x64.sys
- ADA Info : Realtek NICDRV 8169 PCIe GBE Family Controller driver http://www.realtek.com.tw/
- Timestamp : Thu Mar 23 2017
- Image name: atikmdag.sys
- Search : https://www.google.com/search?q=atikmdag.sys
- ADA Info : ATI Radeon Kernel Mode Driver Package
- Timestamp : Mon Jun 12 2017
- Image name: atikmpag.sys
- Search : https://www.google.com/search?q=atikmpag.sys
- ADA Info : ATI video card driver
- Timestamp : Mon Jun 12 2017
- If any of the above drivers are from Microsoft then please let me know.
- I will have them moved to the Microsoft list on the next update.
- ========================================================================
- ========================== MICROSOFT DRIVERS ===========================
- ========================================================================
- ACPI.sys ACPI Driver for NT (Microsoft)
- acpiex.sys ACPIEx Driver (Microsoft)
- afd.sys Ancillary Function Driver for WinSock (Microsoft)
- ahcache.sys Application Compatibility Cache (Microsoft)
- amdppm.sys Processor Device Driver
- BasicDisplay.sys Basic Display driver (Microsoft)
- BasicRender.sys Basic Render driver (Microsoft)
- Beep.SYS BEEP driver (Microsoft)
- BOOTVID.dll VGA Boot Driver (Microsoft)
- bowser.sys NT Lan Manager Datagram Receiver Driver (Microsoft)
- BthEnum.sys Bluetooth Bus Extender
- bthpan.sys Bluetooth Personal Area Networking
- bthport.sys Bluetooth Bus Driver
- BTHUSB.sys Bluetooth Miniport Driver
- cdd.dll Canonical Display Driver (Microsoft)
- cdfs.sys CD-ROM File System Driver (Microsoft)
- cdrom.sys SCSI CD-ROM Driver (Microsoft)
- CEA.sys Event Aggregation Kernal Mode Library (Microsoft)
- CI.dll Code Integrity Module (Microsoft)
- CLASSPNP.SYS SCSI Class System Dll (Microsoft)
- CLFS.SYS Common Log File System Driver (Microsoft)
- clipsp.sys CLIP Service (Microsoft)
- cmimcext.sys Kernal Configuration Manager Initial Con. Driver (Microsoft)
- cng.sys Kernal Cryptography, Next Generation Driver (Microsoft)
- CompositeBus.sys Multi-Transport Composite Bus Enumerator (Microsoft)
- condrv.sys Console Driver (Microsoft)
- crashdmp.sys Crash Dump Driver
- csc.sys Windows Client Side Caching Driver
- dfsc.sys DFS Namespace Client Driver (Microsoft)
- disk.sys PnP Disk Driver (Microsoft)
- drmk.sys Digital Rights Management (DRM) driver (Microsoft)
- dump_dumpfve.sys Bitlocker Drive Encryption Crashdump Filter
- dump_storport.sys Provides disk access during crash dump file generation (Microsoft)
- dxgkrnl.sys DirectX Graphics Kernal (Microsoft)
- dxgmms2.sys DirectX Graphics MMS
- EhStorClass.sys Enhanced Storage Class driver for IEEE... (Microsoft)
- fastfat.SYS Fast FAT File System Driver (Microsoft)
- filecrypt.sys Windows sandboxing and encryption filter (Microsoft)
- fileinfo.sys FileInfo Filter Driver (Microsoft)
- FLTMGR.SYS Filesystem Filter Manager (Microsoft)
- Fs_Rec.sys File System Recognizer Driver (Microsoft)
- fvevol.sys BitLocker Driver Encryption Driver (Microsoft)
- fwpkclnt.sys FWP/IPsec Kernal-Mode API (Microsoft)
- gpuenergydrv.sys GPU Energy Kernal Driver (Microsoft)
- hal.dll Hardware Abstraction Layer DLL (Microsoft)
- HDAudBus.sys High Definition Audio Bus Driver (Microsoft)
- HIDCLASS.SYS Hid Class Library
- HIDPARSE.SYS Hid Parsing Library (Microsoft)
- hidusb.sys USB Miniport Driver for Input Devices (Microsoft)
- HTTP.sys HTTP Protocol Stack (Microsoft)
- intelpep.sys Intel Power Engine Plugin (Microsoft)
- iorate.sys I/O rate control Filter (Microsoft)
- kbdclass.sys Keyboard Class Driver (Microsoft)
- kbdhid.sys HID Mouse Filter Driver or HID Keyboard Filter Driver (Microsoft)
- kdcom.dll Kernel Debugger HW Extension DLL (Microsoft)
- kdnic.sys Microsoft Kernel Debugger Network Miniport (Microsoft)
- ks.sys Kernal CSA Library (Microsoft)
- ksecdd.sys Kernel Security Support Provider Interface (Microsoft)
- ksecpkg.sys Kernel Security Support Provider Interface Packages (Microsoft)
- ksthunk.sys Kernal Streaming WOW Thunk Service (Microsoft)
- lltdio.sys Link-Layer Topology Mapper I/O Driver (Microsoft)
- luafv.sys LUA File Virtualization Filter Driver (Microsoft)
- mcupdate.dll Media Center Update (Microsoft)
- mmcss.sys MMCSS Driver (Microsoft)
- monitor.sys Monitor Driver (Microsoft)
- mouclass.sys Mouse Class Driver (Microsoft)
- mouhid.sys HID Mouse Filter Driver (Microsoft)
- mountmgr.sys Mount Point Manager (Microsoft)
- MpKsl1b4db466.sys Microsoft Anti-malware Protection driver
- MpKsl505a3a46.sys Microsoft Anti-malware Protection driver
- mpsdrv.sys Microsoft Protection Service Driver (Microsoft)
- mqac.sys Message Queuing Device driver (Microsoft)
- mrxsmb.sys SMB MiniRedirector Wrapper and Engine (Microsoft)
- mrxsmb10.sys Longhorn SMB Downlevel SubRdr (Microsoft)
- mrxsmb20.sys Longhorn SMB 2.0 Redirector (Microsoft)
- Msfs.SYS Mailslot driver (Microsoft)
- msisadrv.sys ISA Driver (Microsoft)
- mslldp.sys Microsoft Link-Layer Discovery Protocol... (Microsoft)
- msrpc.sys Kernel Remote Procedure Call Provider (Microsoft)
- mssmbios.sys System Management BIOS driver (Microsoft)
- mup.sys Multiple UNC Provider driver (Microsoft)
- ndis.sys Network Driver Interface Specification (NDIS) driver (Microsoft)
- ndisuio.sys NDIS User mode I/O driver (Microsoft)
- NdisVirtualBus.sys Virtual Network Adapter Enumerator (Microsoft)
- Ndu.sys Network Data Usage Monitoring driver (Microsoft)
- netbios.sys NetBIOS Interface driver (Microsoft)
- netbt.sys MBT Transport driver (Microsoft)
- NETIO.SYS Network I/O Subsystem (Microsoft)
- Npfs.SYS NPFS driver (Microsoft)
- npsvctrig.sys Named pipe service triggers (Microsoft)
- nsiproxy.sys NSI Proxy driver (Microsoft)
- NTFS.sys NT File System Driver (Microsoft)
- ntkrnlmp.exe Windows NT operating system kernel (Microsoft)
- ntosext.sys NTOS Extension Host driver (Microsoft)
- Null.SYS NULL Driver (Microsoft)
- pacer.sys QoS Packet Scheduler (Microsoft)
- partmgr.sys Partition driver (Microsoft)
- pci.sys NT Plug and Play PCI Enumerator
- pcw.sys Performance Counter Driver (Microsoft)
- pdc.sys Power Dependency Coordinator Driver (Microsoft)
- peauth.sys Protected Environment Authentication and Authorization Export Driver (Microsoft)
- portcls.sys Class Driver for Port/Miniport Devices system driver (Microsoft)
- PSHED.dll Platform Specific Hardware Error driver (Microsoft)
- rdbss.sys Redirected Drive Buffering SubSystem driver (Microsoft)
- rdpbus.sys Microsoft RDP Bus Device driver (Microsoft)
- rdyboost.sys ReadyBoost Driver (Microsoft)
- registry.sys Registry Container driver (Microsoft)
- rfcomm.sys Bluetooth RFCOMM Driver
- rspndr.sys Link-Layer Topology Responder driver (Microsoft)
- serenum.sys Serial Port Enumerator (Microsoft)
- serial.sys Serial Device Driver
- serscan.sys Serial Imaging Device Driver (Microsoft)
- SleepStudyHelper.sys Sleep Study Helper driver (Microsoft)
- spaceport.sys Storage Spaces driver (Microsoft)
- srv.sys Server driver (Microsoft)
- srv2.sys Smb 2.0 Server driver (Microsoft)
- srvnet.sys Server Network driver (Microsoft)
- storport.sys Storage port driver for use with high-performance buses, such as fibre channel buses, and RAID adapters. (Microsoft)
- storqosflt.sys Storage QoS Filter driver (Microsoft)
- swenum.sys Plug and Play Software Device Enumerator (Microsoft)
- tbs.sys Export driver for kernel mode TPM API (Microsoft)
- tcpip.sys TCP/IP Protocol driver (Microsoft)
- tcpipreg.sys Microsoft Windows TCP/IP Registry Compatibility driver (Microsoft)
- TDI.SYS TDI Wrapper driver (Microsoft)
- tdx.sys NetIO Legacy TDI x-bit Support Driver (Microsoft)
- tm.sys Kernel Transaction Manager driver (Microsoft)
- TSDDD.dll Framebuffer Display Driver (Microsoft)
- tunnel.sys Microsoft Tunnel Interface driver (Microsoft)
- ucx01000.sys USB Controller Extension (Microsoft)
- umbus.sys User-Mode Bus Enumerator (Microsoft)
- usbaudio.sys USB Audio Class Driver (Microsoft)
- usbccgp.sys USB Common Class Generic Parent Driver (Microsoft)
- USBD.SYS Universal Serial Bus Driver (Microsoft)
- usbehci.sys EHCI eUSB Miniport Driver (Microsoft)
- usbhub.sys Default Hub Driver for USB (Microsoft)
- UsbHub3.sys USB3 HUB driver (Microsoft)
- usbohci.sys OHCI USB Miniport Driver (Microsoft)
- USBPORT.SYS USB 1.1 & 2.0 Port Driver (Microsoft)
- USBXHCI.SYS USB XHCI Driver
- vdrvroot.sys Virtual Drive Root Enumerator (Microsoft)
- vmbkmclr.sys Hyper-V VMBus Root KMCL (Microsoft)
- volmgr.sys Volume Manager Driver (Microsoft)
- volmgrx.sys Volume Manager Extension Driver (Microsoft)
- volsnap.sys Volume Shadow Copy driver (Microsoft)
- volume.sys Volume driver (Microsoft)
- vwififlt.sys Virtual WiFi Filter Driver (Microsoft)
- wanarp.sys MS Remote Access and Routing ARP driver (Microsoft)
- watchdog.sys Watchdog driver (Microsoft)
- wcifs.sys Windows Container Isolation FS Filter driver (Microsoft)
- Wdf01000.sys Kernel Mode Driver Framework Runtime (Microsoft)
- WdFilter.sys Microsoft Anti-malware file system filter driver (Microsoft)
- WDFLDR.SYS Kernel Mode Driver Framework Loader (Microsoft)
- WdNisDrv.sys Microsoft Network Realtime Inspection driver (Microsoft)
- werkernel.sys Windows Error Reporting Kernel driver (Microsoft)
- wfplwfs.sys WPF NDIS Lightweight Filter driver (Microsoft)
- win32k.sys Full/Desktop Multi-User Win32 driver (Microsoft)
- win32kbase.sys Base Win32k Kernel Driver (Microsoft)
- win32kfull.sys Full/Desktop Win32k Kernel Driver (Microsoft)
- WindowsTrustedRT.sys Windows Trusted Runtime Interface driver (Microsoft)
- WindowsTrustedRTProxy.sys Windows Trusted Runtime Service Proxy driver (Microsoft)
- wmiacpi.sys Windows Management Interface for ACPI (Microsoft)
- WMILIB.SYS WMILIB WMI support library DLL (Microsoft)
- Wof.sys Windows Overlay Filter (Microsoft)
- WpdUpFltr.sys Windows Portable Device Upper Class Filter Driver
- WppRecorder.sys WPP Trace Recorder (Microsoft)
- WSDPrint.sys Web Services Print Device driver (Microsoft)
- WSDScan.sys Web Service Based Scan Device driver (Microsoft)
- WudfPf.sys Windows Driver Foundation - User-mode Driver Framework Platform driver (Microsoft)
- WUDFRd.sys Windows Driver Foundation - User-mode Driver Framework Reflector driver (Microsoft)
- Unloaded modules:
- fffff801`63d70000 fffff801`63d77000 magdrvamd64.
- fffff801`63d60000 fffff801`63d67000 magdrvamd64.
- fffff80c`68e80000 fffff80c`68e8b000 cldflt.sys
- fffff80c`68e20000 fffff80c`68e5d000 WUDFRd.sys
- fffff80c`68e20000 fffff80c`68e5d000 WUDFRd.sys
- fffff80c`68e20000 fffff80c`68e5d000 WUDFRd.sys
- fffff80c`68e20000 fffff80c`68e5d000 WUDFRd.sys
- fffff80c`647a0000 fffff80c`647af000 dump_storpor
- fffff80c`647d0000 fffff80c`647e8000 dump_asstor6
- fffff80c`64810000 fffff80c`6482d000 dump_dumpfve
- fffff80c`680c0000 fffff80c`680ca000 amdkmafd.sys
- fffff80c`6b2e0000 fffff80c`6b2ea000 amdkmafd.sys
- fffff80c`64940000 fffff80c`64960000 dam.sys
- fffff80c`63680000 fffff80c`6368f000 WdBoot.sys
- fffff80c`646a0000 fffff80c`646af000 hwpolicy.sys
- ========================================================================
- ============================== BIOS INFO ===============================
- ========================================================================
- [SMBIOS Data Tables v2.7]
- [DMI Version - 0]
- [2.0 Calling Convention - No]
- [Table Size - 2403 bytes]
- [BIOS Information (Type 0) - Length 24 - Handle 0000h]
- Vendor American Megatrends Inc.
- BIOS Version 2501
- BIOS Starting Address Segment f000
- BIOS Release Date 04/07/2014
- BIOS ROM Size 800000
- BIOS Characteristics
- 07: - PCI Supported
- 11: - Upgradeable FLASH BIOS
- 12: - BIOS Shadowing Supported
- 15: - CD-Boot Supported
- 16: - Selectable Boot Supported
- 17: - BIOS ROM Socketed
- 19: - EDD Supported
- 23: - 1.2MB Floppy Supported
- 24: - 720KB Floppy Supported
- 25: - 2.88MB Floppy Supported
- 26: - Print Screen Device Supported
- 27: - Keyboard Services Supported
- 28: - Serial Services Supported
- 29: - Printer Services Supported
- 32: - BIOS Vendor Reserved
- 34: - BIOS Vendor Reserved
- BIOS Characteristic Extensions
- 00: - ACPI Supported
- 01: - USB Legacy Supported
- 08: - BIOS Boot Specification Supported
- 10: - Specification Reserved
- 11: - Specification Reserved
- BIOS Major Revision 4
- BIOS Minor Revision 6
- EC Firmware Major Revision 255
- EC Firmware Minor Revision 255
- [System Information (Type 1) - Length 27 - Handle 0001h]
- UUID 00000000-0000-0000-0000-000000000000
- Wakeup Type Power Switch
- SKUNumber SKU
- [BaseBoard Information (Type 2) - Length 15 - Handle 0002h]
- Manufacturer ASUSTeK COMPUTER INC.
- Product M5A99FX PRO R2.0
- Version Rev 1.xx
- Feature Flags 09h
- Chassis Handle 0003h
- Board Type 0ah - Processor/Memory Module
- Number of Child Handles 0
- [System Enclosure (Type 3) - Length 22 - Handle 0003h]
- Chassis Type Desktop
- Bootup State Safe
- Power Supply State Safe
- Thermal State Safe
- Security Status None
- OEM Defined 0
- Height 0U
- Number of Power Cords 1
- Number of Contained Elements 0
- Contained Element Size 0
- [Processor Information (Type 4) - Length 42 - Handle 0004h]
- Socket Designation Socket 942
- Processor Type Central Processor
- Processor Family 3fh - Specification Reserved
- Processor Manufacturer AMD
- Processor ID 200f6000fffb8b17
- Processor Version AMD FX(tm)-8350 Eight-Core Processor
- Processor Voltage 8eh - 1.4V
- External Clock 200MHz
- Max Speed 4000MHz
- Current Speed 4000MHz
- Status Enabled Populated
- Processor Upgrade Specification Reserved
- L1 Cache Handle 0005h
- L2 Cache Handle 0006h
- L3 Cache Handle 0007h
- [Cache Information (Type 7) - Length 19 - Handle 0005h]
- Socket Designation L1-Cache
- Cache Configuration 0180h - WB Enabled Int NonSocketed L1
- Maximum Cache Size 0180h - 384K
- Installed Size 0180h - 384K
- Supported SRAM Type 0010h - Pipeline-Burst
- Current SRAM Type 0010h - Pipeline-Burst
- Cache Speed 1ns
- Error Correction Type Specification Reserved
- System Cache Type Unified
- Associativity 2-way Set-Associative
- [Cache Information (Type 7) - Length 19 - Handle 0006h]
- Socket Designation L2-Cache
- Cache Configuration 0181h - WB Enabled Int NonSocketed L2
- Maximum Cache Size 2000h - 8192K
- Installed Size 2000h - 8192K
- Supported SRAM Type 0010h - Pipeline-Burst
- Current SRAM Type 0010h - Pipeline-Burst
- Cache Speed 1ns
- Error Correction Type Specification Reserved
- System Cache Type Unified
- Associativity 16-way Set-Associative
- [Cache Information (Type 7) - Length 19 - Handle 0007h]
- Socket Designation L3-Cache
- Cache Configuration 0182h - WB Enabled Int NonSocketed L3
- Maximum Cache Size 2000h - 8192K
- Installed Size 2000h - 8192K
- Supported SRAM Type 0010h - Pipeline-Burst
- Current SRAM Type 0010h - Pipeline-Burst
- Cache Speed 1ns
- Error Correction Type Specification Reserved
- System Cache Type Unified
- Associativity Specification Reserved
- [Onboard Devices Information (Type 10) - Length 6 - Handle 0025h]
- Number of Devices 1
- 01: Type Video [enabled]
- [OEM Strings (Type 11) - Length 5 - Handle 0026h]
- Number of Strings 4
- [System Configuration Options (Type 12) - Length 5 - Handle 0027h]
- [Physical Memory Array (Type 16) - Length 23 - Handle 0028h]
- Location 03h - SystemBoard/Motherboard
- Use 03h - System Memory
- Memory Error Correction 03h - None
- Maximum Capacity 33554432KB
- Number of Memory Devices 4
- [Memory Array Mapped Address (Type 19) - Length 31 - Handle 0029h]
- Starting Address 00000000h
- Ending Address 00ffffffh
- Memory Array Handle 0028h
- Partition Width 255
- [Memory Device (Type 17) - Length 34 - Handle 002ah]
- Physical Memory Array Handle 0028h
- Total Width 0 bits
- Data Width 64 bits
- Form Factor 09h - DIMM
- Device Locator DIMM0
- Bank Locator BANK0
- Memory Type 02h - Unknown
- Type Detail 0080h - Synchronous
- Speed 0MHz
- Manufacturer Manufacturer0
- Part Number Array1_PartNumber0
- [Memory Device (Type 17) - Length 34 - Handle 002ch]
- Physical Memory Array Handle 0028h
- Total Width 64 bits
- Data Width 64 bits
- Size 8192MB
- Form Factor 09h - DIMM
- Device Locator DIMM1
- Bank Locator BANK1
- Memory Type 18h - Specification Reserved
- Type Detail 4080h - Synchronous
- Speed 1333MHz
- Manufacturer Undefined
- Part Number F3-1866C9-8GXM
- [Memory Device Mapped Address (Type 20) - Length 35 - Handle 002dh]
- Starting Address 00000000h
- Ending Address 00ffffffh
- Memory Device Handle 002ch
- Mem Array Mapped Adr Handle 0029h
- [Memory Device (Type 17) - Length 34 - Handle 002eh]
- Physical Memory Array Handle 0028h
- Total Width 0 bits
- Data Width 64 bits
- Form Factor 09h - DIMM
- Device Locator DIMM2
- Bank Locator BANK2
- Memory Type 02h - Unknown
- Type Detail 0080h - Synchronous
- Speed 0MHz
- Manufacturer Manufacturer2
- Part Number Array1_PartNumber2
- [Memory Device (Type 17) - Length 34 - Handle 0030h]
- Physical Memory Array Handle 0028h
- Total Width 64 bits
- Data Width 64 bits
- Size 8192MB
- Form Factor 09h - DIMM
- Device Locator DIMM3
- Bank Locator BANK3
- Memory Type 18h - Specification Reserved
- Type Detail 4080h - Synchronous
- Speed 1333MHz
- Manufacturer Undefined
- Part Number F3-1866C9-8GXM
- [Memory Device Mapped Address (Type 20) - Length 35 - Handle 0031h]
- Starting Address 00000000h
- Ending Address 00ffffffh
- Memory Device Handle 0030h
- Mem Array Mapped Adr Handle 0029h
- ========================================================================
- ==================== Dump File: 082217-10843-01.dmp ====================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 15063 MP (8 procs) Free x64
- Kernel base = 0xfffff801`eb87f000 PsLoadedModuleList = 0xfffff801`ebbcb5c0
- Debug session time: Tue Aug 22 20:33:23.731 2017 (UTC - 4:00)
- System Uptime: 0 days 0:00:43.453
- BugCheck 101, {18, 0, ffff9f8121740180, 7}
- Probably caused by : Unknown_Image ( ANALYSIS_INCONCLUSIVE )
- Followup: MachineOwner
- CLOCK_WATCHDOG_TIMEOUT (101)
- An expected clock interrupt was not received on a secondary processor in an
- MP system within the allocated interval. This indicates that the specified
- processor is hung and not processing interrupts.
- Arguments:
- Arg1: 0000000000000018, Clock interrupt time out interval in nominal clock ticks.
- Arg2: 0000000000000000, 0.
- Arg3: ffff9f8121740180, The PRCB address of the hung processor.
- Arg4: 0000000000000007, The index of the hung processor.
- Debugging Details:
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- DUMP_TYPE: 2
- DUMP_FILE_ATTRIBUTES: 0x8
- Kernel Generated Triage Dump
- BUGCHECK_STR: CLOCK_WATCHDOG_TIMEOUT_8_PROC
- CUSTOMER_CRASH_COUNT: 1
- PROCESS_NAME: chrome.exe
- CURRENT_IRQL: d
- STACK_TEXT:
- fffff801`ed846bc8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
- STACK_COMMAND: kb
- THREAD_SHA1_HASH_MOD_FUNC: 81a83ae0317433a47fcc36991983df3b6e638b71
- THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 6e16edd8c7dd677734fdbcd2397a2e35e9fae964
- THREAD_SHA1_HASH_MOD: 76cd06466d098060a9eb26e5fd2a25cb1f3fe0a3
- SYMBOL_NAME: ANALYSIS_INCONCLUSIVE
- FOLLOWUP_NAME: MachineOwner
- MODULE_NAME: Unknown_Module
- IMAGE_NAME: Unknown_Image
- DEBUG_FLR_IMAGE_TIMESTAMP: 0
- BUCKET_ID: ZEROED_STACK_CLOCK_WATCHDOG_TIMEOUT_8_PROC
- DEFAULT_BUCKET_ID: ZEROED_STACK_CLOCK_WATCHDOG_TIMEOUT_8_PROC
- PRIMARY_PROBLEM_CLASS: ZEROED_STACK
- FAILURE_BUCKET_ID: ZEROED_STACK_CLOCK_WATCHDOG_TIMEOUT_8_PROC
- TARGET_TIME: 2017-08-23T00:33:23.000Z
- SUITE_MASK: 272
- PRODUCT_TYPE: 1
- USER_LCID: 0
- FAILURE_ID_HASH_STRING: km:zeroed_stack_clock_watchdog_timeout_8_proc
- FAILURE_ID_HASH: {19e7e96e-9b82-56a8-a247-c2b766198fd7}
- Followup: MachineOwner
- ========================================================================
- ==================== Dump File: 082117-11484-01.dmp ====================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 15063 MP (8 procs) Free x64
- Kernel base = 0xfffff800`29a0f000 PsLoadedModuleList = 0xfffff800`29d5b5c0
- Debug session time: Mon Aug 21 20:18:05.783 2017 (UTC - 4:00)
- System Uptime: 0 days 19:30:15.507
- BugCheck 1000007E, {ffffffffc0000005, fffff80029a5fc94, ffff95808a3716e8, ffff95808a370f30}
- Probably caused by : memory_corruption
- Followup: memory_corruption
- SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
- This is a very common bugcheck. Usually the exception address pinpoints
- the driver/function that caused the problem. Always note this address
- as well as the link date of the driver/image that contains this address.
- Some common problems are exception code 0x80000003. This means a hard
- coded breakpoint or assertion was hit, but this system was booted
- /NODEBUG. This is not supposed to happen as developers should never have
- hardcoded breakpoints in retail code, but ...
- If this happens, make sure a debugger gets connected, and the
- system is booted /DEBUG. This will let us see why this breakpoint is
- happening.
- Arguments:
- Arg1: ffffffffc0000005, The exception code that was not handled
- Arg2: fffff80029a5fc94, The address that the exception occurred at
- Arg3: ffff95808a3716e8, Exception Record Address
- Arg4: ffff95808a370f30, Context Record Address
- Debugging Details:
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- DUMP_TYPE: 2
- DUMP_FILE_ATTRIBUTES: 0x8
- Kernel Generated Triage Dump
- EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
- FAULTING_IP:
- nt!KxWaitForLockOwnerShip+14
- fffff800`29a5fc94 48890a mov qword ptr [rdx],rcx
- EXCEPTION_RECORD: ffff95808a3716e8 -- (.exr 0xffff95808a3716e8)
- ExceptionAddress: fffff80029a5fc94 (nt!KxWaitForLockOwnerShip+0x0000000000000014)
- ExceptionCode: c0000005 (Access violation)
- ExceptionFlags: 00000000
- NumberParameters: 2
- Parameter[0]: 0000000000000000
- Parameter[1]: ffffffffffffffff
- Attempt to read from address ffffffffffffffff
- CONTEXT: ffff95808a370f30 -- (.cxr 0xffff95808a370f30)
- rax=0000000000000000 rbx=0000000000000000 rcx=ffff95808a3719f0
- rdx=2000000000000000 rsi=00000000004491e6 rdi=ffff95808a3719f0
- rip=fffff80029a5fc94 rsp=ffff95808a371920 rbp=ffff95808a371a80
- r8=ffff95808a3719f0 r9=7fffe58b33f2d3d8 r10=7ffffffffffffffc
- r11=ffff95808a371928 r12=0000000000000000 r13=0000000000000001
- r14=ffffe58b33f2d2c0 r15=ffff95808a3a8ad0
- iopl=0 nv up ei pl zr na po nc
- cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246
- nt!KxWaitForLockOwnerShip+0x14:
- fffff800`29a5fc94 48890a mov qword ptr [rdx],rcx ds:002b:20000000`00000000=????????????????
- Resetting default scope
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: CODE_CORRUPTION
- PROCESS_NAME: System
- CURRENT_IRQL: 2
- ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
- EXCEPTION_CODE_STR: c0000005
- EXCEPTION_PARAMETER1: 0000000000000000
- EXCEPTION_PARAMETER2: ffffffffffffffff
- FOLLOWUP_IP:
- nt!KxWaitForLockOwnerShip+14
- fffff800`29a5fc94 48890a mov qword ptr [rdx],rcx
- READ_ADDRESS: fffff80029df0358: Unable to get MiVisibleState
- ffffffffffffffff
- BUGCHECK_STR: AV
- LAST_CONTROL_TRANSFER: from fffff80029a5fc64 to fffff80029a5fc94
- STACK_TEXT:
- ffff9580`8a371920 fffff800`29a5fc64 : 00000000`00000000 ffffe58b`33f2d2c0 ffffe58b`33f2d2c0 00000000`00000000 : nt!KxWaitForLockOwnerShip+0x14
- ffff9580`8a371950 fffff800`29a60be3 : 00000000`0001e000 ffff9580`8a371a80 00000000`004491e6 00000000`00020000 : nt!KeAcquireInStackQueuedSpinLock+0x44
- ffff9580`8a371980 fffff800`29a5f7fa : ffffe58b`346ad6b8 00000000`00000000 ffffe58b`00000001 00000000`00000000 : nt!CcFlushCachePriv+0x2c3
- ffff9580`8a371ac0 fffff800`29a4cca8 : 00000000`00001600 ffffe58b`38856001 fffff808`00000000 00000000`00340377 : nt!CcWriteBehindInternal+0x19a
- ffff9580`8a371b80 fffff800`29aebac7 : 00000000`00000000 00000000`00000080 ffffe58b`2c8b3300 ffffe58b`38856040 : nt!ExpWorkerThread+0xd8
- ffff9580`8a371c10 fffff800`29b809e6 : ffff9580`822c3180 ffffe58b`38856040 fffff800`29aeba80 00000000`00000000 : nt!PspSystemThreadStartup+0x47
- ffff9580`8a371c60 00000000`00000000 : ffff9580`8a372000 ffff9580`8a36c000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
- CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
- fffff80029a5f011-fffff80029a5f013 3 bytes - nt!MiReleaseSystemCacheView+99
- [ 40 fb f6:80 7f ff ]
- fffff80029a5f03c-fffff80029a5f03d 2 bytes - nt!MiReleaseSystemCacheView+c4 (+0x2b)
- [ 80 fa:00 ab ]
- fffff80029a5f162-fffff80029a5f164 3 bytes - nt!MiReleaseSystemCacheView+1ea (+0x126)
- [ 40 fb f6:80 7f ff ]
- fffff80029a5f196-fffff80029a5f197 2 bytes - nt!MiReleaseSystemCacheView+21e (+0x34)
- [ 80 fa:00 ab ]
- 10 errors : !nt (fffff80029a5f011-fffff80029a5f197)
- MODULE_NAME: memory_corruption
- IMAGE_NAME: memory_corruption
- FOLLOWUP_NAME: memory_corruption
- DEBUG_FLR_IMAGE_TIMESTAMP: 0
- MEMORY_CORRUPTOR: LARGE
- STACK_COMMAND: .cxr 0xffff95808a370f30 ; kb
- FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
- BUCKET_ID: MEMORY_CORRUPTION_LARGE
- PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
- TARGET_TIME: 2017-08-22T00:18:05.000Z
- SUITE_MASK: 272
- PRODUCT_TYPE: 1
- USER_LCID: 0
- FAILURE_ID_HASH_STRING: km:memory_corruption_large
- FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
- Followup: memory_corruption
- ========================================================================
- ==================== Dump File: 082017-11703-01.dmp ====================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 15063 MP (8 procs) Free x64
- Kernel base = 0xfffff803`d3087000 PsLoadedModuleList = 0xfffff803`d33d35c0
- Debug session time: Mon Aug 21 00:47:12.779 2017 (UTC - 4:00)
- System Uptime: 0 days 0:05:45.502
- BugCheck 124, {0, ffffce8ebdcd5028, b0800000, 40151}
- Probably caused by : AuthenticAMD
- Followup: MachineOwner
- WHEA_UNCORRECTABLE_ERROR (124)
- A fatal hardware error has occurred. Parameter 1 identifies the type of error
- source that reported the error. Parameter 2 holds the address of the
- WHEA_ERROR_RECORD structure that describes the error conditon.
- Arguments:
- Arg1: 0000000000000000, Machine Check Exception
- Arg2: ffffce8ebdcd5028, Address of the WHEA_ERROR_RECORD structure.
- Arg3: 00000000b0800000, High order 32-bits of the MCi_STATUS value.
- Arg4: 0000000000040151, Low order 32-bits of the MCi_STATUS value.
- Debugging Details:
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- DUMP_TYPE: 2
- DUMP_FILE_ATTRIBUTES: 0x8
- Kernel Generated Triage Dump
- BUGCHECK_STR: 0x124_AuthenticAMD
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
- PROCESS_NAME: chrome.exe
- CURRENT_IRQL: f
- STACK_TEXT:
- ffffa700`c74cb7e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
- STACK_COMMAND: kb
- THREAD_SHA1_HASH_MOD_FUNC: 81a83ae0317433a47fcc36991983df3b6e638b71
- THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 6e16edd8c7dd677734fdbcd2397a2e35e9fae964
- THREAD_SHA1_HASH_MOD: 76cd06466d098060a9eb26e5fd2a25cb1f3fe0a3
- FOLLOWUP_NAME: MachineOwner
- MODULE_NAME: AuthenticAMD
- IMAGE_NAME: AuthenticAMD
- DEBUG_FLR_IMAGE_TIMESTAMP: 0
- FAILURE_BUCKET_ID: 0x124_AuthenticAMD_PROCESSOR_CACHE
- BUCKET_ID: 0x124_AuthenticAMD_PROCESSOR_CACHE
- PRIMARY_PROBLEM_CLASS: 0x124_AuthenticAMD_PROCESSOR_CACHE
- TARGET_TIME: 2017-08-21T04:47:12.000Z
- SUITE_MASK: 272
- PRODUCT_TYPE: 1
- USER_LCID: 0
- FAILURE_ID_HASH_STRING: km:0x124_authenticamd_processor_cache
- FAILURE_ID_HASH: {b533751b-676e-7546-bcdc-24e6c40d0064}
- Followup: MachineOwner
- ========================================================================
- ==================== Dump File: 082017-11437-01.dmp ====================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 15063 MP (8 procs) Free x64
- Kernel base = 0xfffff803`6e409000 PsLoadedModuleList = 0xfffff803`6e7555c0
- Debug session time: Mon Aug 21 00:40:10.411 2017 (UTC - 4:00)
- System Uptime: 0 days 0:51:09.133
- BugCheck 1000007E, {ffffffffc0000005, fffff8036e49f468, ffff8900b4086478, ffff8900b4085cc0}
- Probably caused by : memory_corruption
- Followup: memory_corruption
- SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
- This is a very common bugcheck. Usually the exception address pinpoints
- the driver/function that caused the problem. Always note this address
- as well as the link date of the driver/image that contains this address.
- Some common problems are exception code 0x80000003. This means a hard
- coded breakpoint or assertion was hit, but this system was booted
- /NODEBUG. This is not supposed to happen as developers should never have
- hardcoded breakpoints in retail code, but ...
- If this happens, make sure a debugger gets connected, and the
- system is booted /DEBUG. This will let us see why this breakpoint is
- happening.
- Arguments:
- Arg1: ffffffffc0000005, The exception code that was not handled
- Arg2: fffff8036e49f468, The address that the exception occurred at
- Arg3: ffff8900b4086478, Exception Record Address
- Arg4: ffff8900b4085cc0, Context Record Address
- Debugging Details:
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- DUMP_TYPE: 2
- DUMP_FILE_ATTRIBUTES: 0x8
- Kernel Generated Triage Dump
- EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
- FAULTING_IP:
- nt!MiCoalesceFreePages+68
- fffff803`6e49f468 0fb64522 movzx eax,byte ptr [rbp+22h]
- EXCEPTION_RECORD: ffff8900b4086478 -- (.exr 0xffff8900b4086478)
- ExceptionAddress: fffff8036e49f468 (nt!MiCoalesceFreePages+0x0000000000000068)
- ExceptionCode: c0000005 (Access violation)
- ExceptionFlags: 00000000
- NumberParameters: 2
- Parameter[0]: ffffffffffffffff
- Parameter[1]: 0000000000000000
- Attempt to unknown address 0000000000000000
- CONTEXT: ffff8900b4085cc0 -- (.cxr 0xffff8900b4085cc0)
- rax=ffffea8000000000 rbx=ffffea8006560070 rcx=000000000021caad
- rdx=ffffea8000000000 rsi=0000000000000000 rdi=000000000021caa0
- rip=fffff8036e49f468 rsp=ffff8900b40866b0 rbp=fff10a968329adf0
- r8=0000000000000008 r9=2aaaaaaaaaaaaaab r10=00000000000000ad
- r11=fffff8036e7727b0 r12=0000000000000000 r13=00000000000000ad
- r14=fffff8036e786100 r15=000000000021caad
- iopl=0 nv up ei pl nz na po nc
- cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010206
- nt!MiCoalesceFreePages+0x68:
- fffff803`6e49f468 0fb64522 movzx eax,byte ptr [rbp+22h] ss:0018:fff10a96`8329ae12=??
- Resetting default scope
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: CODE_CORRUPTION
- PROCESS_NAME: System
- CURRENT_IRQL: 2
- ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
- EXCEPTION_CODE_STR: c0000005
- EXCEPTION_PARAMETER1: ffffffffffffffff
- EXCEPTION_PARAMETER2: 0000000000000000
- FOLLOWUP_IP:
- nt!MiCoalesceFreePages+68
- fffff803`6e49f468 0fb64522 movzx eax,byte ptr [rbp+22h]
- BUGCHECK_STR: AV
- LAST_CONTROL_TRANSFER: from fffff8036e49ec6e to fffff8036e49f468
- STACK_TEXT:
- ffff8900`b40866b0 fffff803`6e49ec6e : 00000000`0021caa0 00000000`00000000 ffffea80`06560070 ffffea80`06493e00 : nt!MiCoalesceFreePages+0x68
- ffff8900`b4086780 fffff803`6e49e5f2 : 00000000`0021caad fffff803`6e786100 00000000`00000000 00000000`00000000 : nt!MiInsertPageInFreeOrZeroedList+0x20e
- ffff8900`b4086880 fffff803`6e54cad2 : ffffc2c4`00000002 ffff8900`b40869c8 8a000002`1caad963 ffffc280`00000000 : nt!MiZeroSinglePage+0x132
- ffff8900`b4086920 fffff803`6e4e5ac7 : 00001020`00000020 fffff803`6e54c470 fffff803`6e786100 00000000`00000688 : nt!MiZeroPageThread+0x662
- ffff8900`b4086c10 fffff803`6e57a9e6 : ffff8900`b3e41180 ffffc588`2caec040 fffff803`6e4e5a80 00400002`00020088 : nt!PspSystemThreadStartup+0x47
- ffff8900`b4086c60 00000000`00000000 : ffff8900`b4087000 ffff8900`b4081000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
- CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
- fffff8036e49f17c - nt!MiInsertPageInFreeOrZeroedList+71c
- [ fa:ea ]
- fffff8036e49f1dc - nt!MiInsertPageInFreeOrZeroedList+77c (+0x60)
- [ fa:ea ]
- fffff8036e49f447 - nt!MiCoalesceFreePages+47 (+0x26b)
- [ fa:ea ]
- fffff8036e49f4c7 - nt!MiCoalesceFreePages+c7 (+0x80)
- [ fa:ea ]
- fffff8036e49f7b8 - nt!MiCoalesceFreePages+3b8 (+0x2f1)
- [ fa:ea ]
- fffff8036e49fa0c - nt!MiCoalesceFreePages+60c (+0x254)
- [ fa:ea ]
- fffff8036e49fbf4 - nt!MiUnlinkFreeOrZeroedPage+24 (+0x1e8)
- [ fa:ea ]
- fffff8036e49fe33 - nt!MiUnlinkFreeOrZeroedPage+263 (+0x23f)
- [ fa:ea ]
- fffff8036e49fec1 - nt!MiUnlinkFreeOrZeroedPage+2f1 (+0x8e)
- [ fa:ea ]
- fffff8036e49ff7b - nt!MiUnlinkFreeOrZeroedPage+3ab (+0xba)
- [ fa:ea ]
- fffff8036e49ffac - nt!MiUnlinkFreeOrZeroedPage+3dc (+0x31)
- [ fa:ea ]
- 11 errors : !nt (fffff8036e49f17c-fffff8036e49ffac)
- MODULE_NAME: memory_corruption
- IMAGE_NAME: memory_corruption
- FOLLOWUP_NAME: memory_corruption
- DEBUG_FLR_IMAGE_TIMESTAMP: 0
- MEMORY_CORRUPTOR: ONE_BIT_LARGE
- STACK_COMMAND: .cxr 0xffff8900b4085cc0 ; kb
- FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT_LARGE
- BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT_LARGE
- PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_ONE_BIT_LARGE
- TARGET_TIME: 2017-08-21T04:40:10.000Z
- SUITE_MASK: 272
- PRODUCT_TYPE: 1
- USER_LCID: 0
- FAILURE_ID_HASH_STRING: km:memory_corruption_one_bit_large
- FAILURE_ID_HASH: {31545515-196b-fab5-2300-9ce714226f43}
- Followup: memory_corruption
- ========================================================================
- ==================== Dump File: 082017-11390-01.dmp ====================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 15063 MP (8 procs) Free x64
- Kernel base = 0xfffff800`1ea00000 PsLoadedModuleList = 0xfffff800`1ed4c5c0
- Debug session time: Sun Aug 20 23:48:26.166 2017 (UTC - 4:00)
- System Uptime: 0 days 7:06:37.888
- BugCheck 3B, {c0000005, fffff8001ea50c94, ffffe601f27e3700, 0}
- Probably caused by : memory_corruption
- Followup: memory_corruption
- SYSTEM_SERVICE_EXCEPTION (3b)
- An exception happened while executing a system service routine.
- Arguments:
- Arg1: 00000000c0000005, Exception code that caused the bugcheck
- Arg2: fffff8001ea50c94, Address of the instruction which caused the bugcheck
- Arg3: ffffe601f27e3700, Address of the context record for the exception that caused the bugcheck
- Arg4: 0000000000000000, zero.
- Debugging Details:
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- DUMP_TYPE: 2
- DUMP_FILE_ATTRIBUTES: 0x8
- Kernel Generated Triage Dump
- EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
- FAULTING_IP:
- nt!KxWaitForLockOwnerShip+14
- fffff800`1ea50c94 48890a mov qword ptr [rdx],rcx
- CONTEXT: ffffe601f27e3700 -- (.cxr 0xffffe601f27e3700)
- rax=0000000000000307 rbx=0000000000000000 rcx=ffffe601f27e4150
- rdx=2000000000000000 rsi=0000000000000001 rdi=ffffe601f27e4150
- rip=fffff8001ea50c94 rsp=ffffe601f27e40f0 rbp=ffffe601f27e41b9
- r8=ffffa98000007000 r9=fffff8001ed7e070 r10=000000000000009b
- r11=ffffa98000007000 r12=0000000000000000 r13=0000000000000000
- r14=fffff8001ed7d100 r15=000000000029fb9b
- iopl=0 nv up ei pl zr na po nc
- cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246
- nt!KxWaitForLockOwnerShip+0x14:
- fffff800`1ea50c94 48890a mov qword ptr [rdx],rcx ds:002b:20000000`00000000=????????????????
- Resetting default scope
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: CODE_CORRUPTION
- BUGCHECK_STR: 0x3B
- PROCESS_NAME: explorer.exe
- CURRENT_IRQL: 2
- LAST_CONTROL_TRANSFER: from fffff8001ea96279 to fffff8001ea50c94
- STACK_TEXT:
- ffffe601`f27e40f0 fffff800`1ea96279 : ffffa680`07df2d10 ffff80c6`00000001 00000000`fffffffe ffffa680`07df2b00 : nt!KxWaitForLockOwnerShip+0x14
- ffffe601`f27e4120 fffff800`1ea9575c : 00000000`0029fb9b ffffa680`07bbe830 ffffa680`07bbe860 ffffa680`00000001 : nt!MiInsertPageInFreeOrZeroedList+0x819
- ffffe601`f27e4220 fffff800`1ea7c5ab : 00000000`00000010 00000000`00000202 ffffe601`efbcebc0 ffffe601`f27e4400 : nt!MiPfnShareCountIsZero+0xcc
- ffffe601`f27e4270 fffff800`1ea7c101 : 00000000`00000000 ffffa680`00000000 00000000`00000000 ffffe601`f27e4550 : nt!MiDeleteValidSystemPage+0x17b
- ffffe601`f27e4300 fffff800`1ea7b32b : 00000000`00000000 ffff8f0d`8f743580 00000000`0000009f ffffffff`ffffffff : nt!MiDeleteSystemPagableVm+0x2f1
- ffffe601`f27e44b0 fffff800`1ea6a240 : 00000000`00001ee8 ffff8d5b`49a892f0 00000000`00000000 ffff8d5b`40000f40 : nt!MiFreePagedPoolPages+0x1ab
- ffffe601`f27e4680 fffff800`1ec804ef : ffff8d5b`49800000 ffffe601`f27e4770 00000000`00000000 fffff800`00000021 : nt!ExFreeLargePool+0x5a0
- ffffe601`f27e4730 ffff8d0a`d8eab3fc : 00000000`00000000 ffff8d5b`49800000 ffff8d5b`49800000 00000000`00000000 : nt!ExFreePoolWithTag+0x4cf
- ffffe601`f27e4830 ffff8d0a`d8ea9232 : 00000000`00000001 ffff8d5b`498001c8 00000000`00000000 00000000`00000014 : win32kbase!Win32FreePool+0x1c
- ffffe601`f27e4860 ffff8d0a`d8ea8c43 : 00000000`00000000 00000000`00000001 00000000`00000001 00000000`00000000 : win32kbase!FreeObject+0x52
- ffffe601`f27e4890 ffff8d0a`d8eab3ad : 00000000`00000000 00000000`00000000 ffff8d5b`49800000 fffff800`00000000 : win32kbase!SURFACE::bDeleteSurface+0x653
- ffffe601`f27e4a50 ffff8d0a`d8e96dde : 00000000`00002999 00000000`00000000 ffffe601`f27e4b80 ffff8d0a`d8ed442b : win32kbase!bDeleteSurface+0x2d
- ffffe601`f27e4a80 fffff800`1eb77413 : ffff8f0d`8edf07c0 ffff8f0d`8edf07c0 00000000`00000000 00000000`01351000 : win32kbase!NtGdiDeleteObjectApp+0x1be
- ffffe601`f27e4b00 00007ffb`7af114e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
- 00000000`2ce9d628 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`7af114e4
- CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
- fffff8001ea50012-fffff8001ea50013 2 bytes - nt!MiReleaseSystemCacheView+9a
- [ fb f6:c0 80 ]
- fffff8001ea5003d - nt!MiReleaseSystemCacheView+c5 (+0x2b)
- [ fa:a6 ]
- fffff8001ea50163-fffff8001ea50164 2 bytes - nt!MiReleaseSystemCacheView+1eb (+0x126)
- [ fb f6:c0 80 ]
- fffff8001ea50197 - nt!MiReleaseSystemCacheView+21f (+0x34)
- [ fa:a6 ]
- 6 errors : !nt (fffff8001ea50012-fffff8001ea50197)
- MODULE_NAME: memory_corruption
- IMAGE_NAME: memory_corruption
- FOLLOWUP_NAME: memory_corruption
- DEBUG_FLR_IMAGE_TIMESTAMP: 0
- MEMORY_CORRUPTOR: LARGE
- STACK_COMMAND: .cxr 0xffffe601f27e3700 ; kb
- FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
- BUCKET_ID: MEMORY_CORRUPTION_LARGE
- PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
- TARGET_TIME: 2017-08-21T03:48:26.000Z
- SUITE_MASK: 272
- PRODUCT_TYPE: 1
- USER_LCID: 0
- FAILURE_ID_HASH_STRING: km:memory_corruption_large
- FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
- Followup: memory_corruption
- ========================================================================
- ==================== Dump File: 081517-11656-01.dmp ====================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 15063 MP (8 procs) Free x64
- Kernel base = 0xfffff803`fd60d000 PsLoadedModuleList = 0xfffff803`fd9595c0
- Debug session time: Tue Aug 15 19:10:01.022 2017 (UTC - 4:00)
- System Uptime: 0 days 19:07:45.744
- BugCheck 124, {0, ffff800c60e85028, b0800000, 40151}
- Probably caused by : AuthenticAMD
- Followup: MachineOwner
- WHEA_UNCORRECTABLE_ERROR (124)
- A fatal hardware error has occurred. Parameter 1 identifies the type of error
- source that reported the error. Parameter 2 holds the address of the
- WHEA_ERROR_RECORD structure that describes the error conditon.
- Arguments:
- Arg1: 0000000000000000, Machine Check Exception
- Arg2: ffff800c60e85028, Address of the WHEA_ERROR_RECORD structure.
- Arg3: 00000000b0800000, High order 32-bits of the MCi_STATUS value.
- Arg4: 0000000000040151, Low order 32-bits of the MCi_STATUS value.
- Debugging Details:
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- DUMP_TYPE: 2
- DUMP_FILE_ATTRIBUTES: 0x8
- Kernel Generated Triage Dump
- BUGCHECK_STR: 0x124_AuthenticAMD
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
- PROCESS_NAME: chrome.exe
- CURRENT_IRQL: f
- STACK_TEXT:
- ffffe581`4a0cb7e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
- STACK_COMMAND: kb
- THREAD_SHA1_HASH_MOD_FUNC: 81a83ae0317433a47fcc36991983df3b6e638b71
- THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 6e16edd8c7dd677734fdbcd2397a2e35e9fae964
- THREAD_SHA1_HASH_MOD: 76cd06466d098060a9eb26e5fd2a25cb1f3fe0a3
- FOLLOWUP_NAME: MachineOwner
- MODULE_NAME: AuthenticAMD
- IMAGE_NAME: AuthenticAMD
- DEBUG_FLR_IMAGE_TIMESTAMP: 0
- FAILURE_BUCKET_ID: 0x124_AuthenticAMD_PROCESSOR_CACHE
- BUCKET_ID: 0x124_AuthenticAMD_PROCESSOR_CACHE
- PRIMARY_PROBLEM_CLASS: 0x124_AuthenticAMD_PROCESSOR_CACHE
- TARGET_TIME: 2017-08-15T23:10:01.000Z
- SUITE_MASK: 272
- PRODUCT_TYPE: 1
- USER_LCID: 0
- FAILURE_ID_HASH_STRING: km:0x124_authenticamd_processor_cache
- FAILURE_ID_HASH: {b533751b-676e-7546-bcdc-24e6c40d0064}
- Followup: MachineOwner
- ========================================================================
- ==================== Dump File: 081517-11421-01.dmp ====================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 15063 MP (8 procs) Free x64
- Kernel base = 0xfffff802`0d81e000 PsLoadedModuleList = 0xfffff802`0db6a5c0
- Debug session time: Wed Aug 16 00:43:47.354 2017 (UTC - 4:00)
- System Uptime: 0 days 0:20:22.079
- BugCheck 101, {18, 0, ffffa801978c1180, 6}
- Probably caused by : Unknown_Image ( ANALYSIS_INCONCLUSIVE )
- Followup: MachineOwner
- CLOCK_WATCHDOG_TIMEOUT (101)
- An expected clock interrupt was not received on a secondary processor in an
- MP system within the allocated interval. This indicates that the specified
- processor is hung and not processing interrupts.
- Arguments:
- Arg1: 0000000000000018, Clock interrupt time out interval in nominal clock ticks.
- Arg2: 0000000000000000, 0.
- Arg3: ffffa801978c1180, The PRCB address of the hung processor.
- Arg4: 0000000000000006, The index of the hung processor.
- Debugging Details:
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- DUMP_TYPE: 2
- DUMP_FILE_ATTRIBUTES: 0x8
- Kernel Generated Triage Dump
- BUGCHECK_STR: CLOCK_WATCHDOG_TIMEOUT_8_PROC
- CUSTOMER_CRASH_COUNT: 1
- PROCESS_NAME: RzSurroundVADS
- CURRENT_IRQL: d
- STACK_TEXT:
- fffff802`0fc46bc8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
- STACK_COMMAND: kb
- THREAD_SHA1_HASH_MOD_FUNC: 81a83ae0317433a47fcc36991983df3b6e638b71
- THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 6e16edd8c7dd677734fdbcd2397a2e35e9fae964
- THREAD_SHA1_HASH_MOD: 76cd06466d098060a9eb26e5fd2a25cb1f3fe0a3
- SYMBOL_NAME: ANALYSIS_INCONCLUSIVE
- FOLLOWUP_NAME: MachineOwner
- MODULE_NAME: Unknown_Module
- IMAGE_NAME: Unknown_Image
- DEBUG_FLR_IMAGE_TIMESTAMP: 0
- BUCKET_ID: ZEROED_STACK_CLOCK_WATCHDOG_TIMEOUT_8_PROC
- DEFAULT_BUCKET_ID: ZEROED_STACK_CLOCK_WATCHDOG_TIMEOUT_8_PROC
- PRIMARY_PROBLEM_CLASS: ZEROED_STACK
- FAILURE_BUCKET_ID: ZEROED_STACK_CLOCK_WATCHDOG_TIMEOUT_8_PROC
- TARGET_TIME: 2017-08-16T04:43:47.000Z
- SUITE_MASK: 272
- PRODUCT_TYPE: 1
- USER_LCID: 0
- FAILURE_ID_HASH_STRING: km:zeroed_stack_clock_watchdog_timeout_8_proc
- FAILURE_ID_HASH: {19e7e96e-9b82-56a8-a247-c2b766198fd7}
- Followup: MachineOwner
- ========================================================================
- ==================== Dump File: 081417-11953-01.dmp ====================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 15063 MP (8 procs) Free x64
- Kernel base = 0xfffff800`50a7f000 PsLoadedModuleList = 0xfffff800`50dcb5c0
- Debug session time: Tue Aug 15 00:01:38.627 2017 (UTC - 4:00)
- System Uptime: 0 days 0:50:11.350
- BugCheck 124, {0, ffffb388d2659028, b0800000, 40151}
- Probably caused by : AuthenticAMD
- Followup: MachineOwner
- WHEA_UNCORRECTABLE_ERROR (124)
- A fatal hardware error has occurred. Parameter 1 identifies the type of error
- source that reported the error. Parameter 2 holds the address of the
- WHEA_ERROR_RECORD structure that describes the error conditon.
- Arguments:
- Arg1: 0000000000000000, Machine Check Exception
- Arg2: ffffb388d2659028, Address of the WHEA_ERROR_RECORD structure.
- Arg3: 00000000b0800000, High order 32-bits of the MCi_STATUS value.
- Arg4: 0000000000040151, Low order 32-bits of the MCi_STATUS value.
- Debugging Details:
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- DUMP_TYPE: 2
- DUMP_FILE_ATTRIBUTES: 0x8
- Kernel Generated Triage Dump
- BUGCHECK_STR: 0x124_AuthenticAMD
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
- PROCESS_NAME: firefox.exe
- CURRENT_IRQL: f
- STACK_TEXT:
- ffffa200`a8fcd7e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
- STACK_COMMAND: kb
- THREAD_SHA1_HASH_MOD_FUNC: 81a83ae0317433a47fcc36991983df3b6e638b71
- THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 6e16edd8c7dd677734fdbcd2397a2e35e9fae964
- THREAD_SHA1_HASH_MOD: 76cd06466d098060a9eb26e5fd2a25cb1f3fe0a3
- FOLLOWUP_NAME: MachineOwner
- MODULE_NAME: AuthenticAMD
- IMAGE_NAME: AuthenticAMD
- DEBUG_FLR_IMAGE_TIMESTAMP: 0
- FAILURE_BUCKET_ID: 0x124_AuthenticAMD_PROCESSOR_CACHE
- BUCKET_ID: 0x124_AuthenticAMD_PROCESSOR_CACHE
- PRIMARY_PROBLEM_CLASS: 0x124_AuthenticAMD_PROCESSOR_CACHE
- TARGET_TIME: 2017-08-15T04:01:38.000Z
- SUITE_MASK: 272
- PRODUCT_TYPE: 1
- USER_LCID: 0
- FAILURE_ID_HASH_STRING: km:0x124_authenticamd_processor_cache
- FAILURE_ID_HASH: {b533751b-676e-7546-bcdc-24e6c40d0064}
- Followup: MachineOwner
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement