Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Microsoft (R) Windows Debugger Version 10.0.14321.1024 X86
- Copyright (c) Microsoft Corporation. All rights reserved.
- Auto Dump Analyzer by gardenman
- Time to debug file(s): 00 hours and 08 minutes and 32 seconds
- ========================================================================
- =================== Dump File: 073117-9921-01.dmp ====================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 15063 MP (4 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS Personal
- Built by: 15063.0.amd64fre.rs2_release.170317-1834
- Kernel base = 0xfffff802`b288c000 PsLoadedModuleList = 0xfffff802`b2bd85e0
- Debug session time: Mon Jul 31 08:13:28.050 2017 (UTC - 4:00)
- System Uptime: 0 days 13:06:29.803
- BugCheck A, {ffffa2883991a204, 2, 1, fffff802b28fc383}
- Probably caused by : memory_corruption
- Followup: memory_corruption
- IRQL_NOT_LESS_OR_EQUAL (a)
- An attempt was made to access a pageable (or completely invalid) address at an
- interrupt request level (IRQL) that is too high. This is usually
- caused by drivers using improper addresses.
- If a kernel debugger is available get the stack backtrace.
- Arguments:
- Arg1: ffffa2883991a204, memory referenced
- Arg2: 0000000000000002, IRQL
- Arg3: 0000000000000001, bitfield :
- bit 0 : value 0 = read operation, 1 = write operation
- bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
- Arg4: fffff802b28fc383, address which referenced memory
- Debugging Details:
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 10.0.15063.483 (WinBuild.160101.0800)
- SYSTEM_MANUFACTURER: HP-Pavilion
- SYSTEM_PRODUCT_NAME: AY614AAR-ABA p6347c
- SYSTEM_SKU: AY614AAR#ABA
- BIOS_VENDOR: American Megatrends Inc.
- BIOS_VERSION: 5.12
- BIOS_DATE: 05/21/2010
- BASEBOARD_MANUFACTURER: FOXCONN
- BASEBOARD_PRODUCT: ALOE
- BASEBOARD_VERSION: 1.01
- DUMP_TYPE: 2
- WRITE_ADDRESS: fffff802b2c6d358: Unable to get MiVisibleState
- ffffa2883991a204
- CURRENT_IRQL: 2
- FAULTING_IP:
- nt!KiSignalThread+b3
- fffff802`b28fc383 c6838401000007 mov byte ptr [rbx+184h],7
- CPU_COUNT: 4
- CPU_MHZ: af0
- CPU_VENDOR: AuthenticAMD
- CPU_FAMILY: 10
- CPU_MODEL: 5
- CPU_STEPPING: 2
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: CODE_CORRUPTION
- BUGCHECK_STR: AV
- PROCESS_NAME: bzfilelist.exe
- TRAP_FRAME: ffffd600a7fde030 -- (.trap 0xffffd600a7fde030)
- NOTE: The trap frame does not contain all registers.
- Some register values may be zeroed or incorrect.
- rax=ffffa287e991a158 rbx=0000000000000000 rcx=ffffa287eaf8c898
- rdx=ffffd600a2fa1a80 rsi=0000000000000000 rdi=0000000000000000
- rip=fffff802b28fc383 rsp=ffffd600a7fde1c0 rbp=ffffa287e9965988
- r8=ffffa287e9965988 r9=ffffa287e991a1c0 r10=ffffd600a3019180
- r11=ffffd600a7fde1d0 r12=0000000000000000 r13=0000000000000000
- r14=0000000000000000 r15=0000000000000000
- iopl=0 nv up ei pl zr na po nc
- nt!KiSignalThread+0xb3:
- fffff802`b28fc383 c6838401000007 mov byte ptr [rbx+184h],7 ds:00000000`00000184=??
- Resetting default scope
- LAST_CONTROL_TRANSFER: from fffff802b2a038a9 to fffff802b29f84c0
- STACK_TEXT:
- ffffd600`a7fddee8 fffff802`b2a038a9 : 00000000`0000000a ffffa288`3991a204 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
- ffffd600`a7fddef0 fffff802`b2a01e7d : ffffa287`e4427080 ffffa287`00000008 00000000`00000000 ffffa287`eaf6d350 : nt!KiBugCheckDispatch+0x69
- ffffd600`a7fde030 fffff802`b28fc383 : fffff9e3`9edc9c1f 00000000`00000000 00000000`00000000 ffffffff`5ffffffd : nt!KiPageFault+0x23d
- ffffd600`a7fde1c0 fffff802`b28f895f : ffffa287`e99658e0 00000000`00000000 ffffd600`a7fde300 00000000`00400201 : nt!KiSignalThread+0xb3
- ffffd600`a7fde200 fffff80d`6be0a7f5 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IopfCompleteRequest+0x96f
- ffffd600`a7fde330 fffff80d`6c66551b : 00000000`00000000 ffffc20c`cc541780 ffffc20c`cc20e370 ffffc20c`0000029a : FLTMGR!FltSendMessage+0x455
- ffffd600`a7fde470 fffff80d`6c660942 : ffffd600`a7fde870 ffffd600`a7fde899 ffffc20c`cc541780 ffffd600`a7fde870 : WdFilter!MpScanFile+0x7fb
- ffffd600`a7fde620 fffff80d`6be04b4c : ffffd600`a7fde899 fffff80d`00000000 ffffa287`f898f520 ffffa287`fab27c00 : WdFilter!MpPreCleanup+0x782
- ffffd600`a7fde7e0 fffff80d`6be046ec : ffffd600`a7fde9d0 00000000`00000000 ffffa287`fab0d700 ffffa287`ec253612 : FLTMGR!FltpPerformPreCallbacks+0x2ec
- ffffd600`a7fde900 fffff80d`6be036d8 : ffffa287`ec2536d0 ffffd600`a7fde9d0 ffffa287`ec2536d0 ffffd600`a7fde9e0 : FLTMGR!FltpPassThroughInternal+0x8c
- ffffd600`a7fde930 fffff80d`6be034be : ffffffff`fffe7960 ffffa287`e5e66d70 00000000`00000000 00000000`00000000 : FLTMGR!FltpPassThrough+0x168
- ffffd600`a7fde9b0 fffff802`b2d2083f : ffffa287`f898f520 00000000`00000000 00000000`00000000 fffff802`b2d4beee : FLTMGR!FltpDispatch+0x9e
- ffffd600`a7fdea10 fffff802`b2d2fe48 : 00000000`00007fff ffffa287`e4551080 00000000`00000000 ffffa287`f898f500 : nt!IopCloseFile+0x14f
- ffffd600`a7fdeaa0 fffff802`b2d31e6b : 00000000`00000000 00000000`00000000 00000000`0009ef58 00000000`0453e020 : nt!ObCloseHandleTableEntry+0x228
- ffffd600`a7fdebe0 fffff802`b2a03413 : ffffa287`e8c3a080 00000000`77447b60 00000000`00000000 00000000`002d9000 : nt!NtClose+0xcb
- ffffd600`a7fdec40 00000000`572f21cc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
- 00000000`0009ef08 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x572f21cc
- STACK_COMMAND: kb
- CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
- fffff802b28ff84f - nt!MmMapLockedPagesSpecifyCache+ff
- [ f6:d5 ]
- fffff802b28ff8f4 - nt!MmMapLockedPagesSpecifyCache+1a4 (+0xa5)
- [ f6:d5 ]
- fffff802b28ff904-fffff802b28ff906 3 bytes - nt!MmMapLockedPagesSpecifyCache+1b4 (+0x10)
- [ 40 fb f6:c0 ea d5 ]
- 5 errors : !nt (fffff802b28ff84f-fffff802b28ff906)
- MODULE_NAME: memory_corruption
- IMAGE_NAME: memory_corruption
- FOLLOWUP_NAME: memory_corruption
- DEBUG_FLR_IMAGE_TIMESTAMP: 0
- MEMORY_CORRUPTOR: LARGE
- FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
- BUCKET_ID: MEMORY_CORRUPTION_LARGE
- PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
- TARGET_TIME: 2017-07-31T12:13:28.000Z
- OSBUILD: 15063
- OSSERVICEPACK: 483
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 784
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2017-07-07 02:06:35
- BUILDDATESTAMP_STR: 160101.0800
- BUILDLAB_STR: WinBuild
- BUILDOSVER_STR: 10.0.15063.483
- ANALYSIS_SESSION_ELAPSED_TIME: 293b
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:memory_corruption_large
- FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
- Followup: memory_corruption
- ========================================================================
- ============================== Drivers ===============================
- ========================================================================
- Image path: \SystemRoot\System32\Drivers\PxHlpa64.sys
- Image name: PxHlpa64.sys
- Info Link : http://www.carrona.org/drivers/driver.php?id=PxHlpa64.sys
- ADA Info : Sonic CD/DVD driver
- Timestamp : Tue Jun 23 2009
- Image path: \SystemRoot\System32\Drivers\dump_ahcix64s.sys
- Image name: dump_ahcix64s.sys
- Info Link : http://www.carrona.org/drivers/driver.php?id=dump_ahcix64s.sys
- Timestamp : Fri Apr 4 2008
- Image path: \SystemRoot\System32\drivers\ahcix64s.sys
- Image name: ahcix64s.sys
- Info Link : http://www.carrona.org/drivers/driver.php?id=ahcix64s.sys
- Timestamp : Fri Apr 4 2008
- Image path: \SystemRoot\system32\drivers\fortknoxfw.sys
- Image name: fortknoxfw.sys
- Info Link : http://www.carrona.org/drivers/driver.php?id=fortknoxfw.sys
- Timestamp : Tue Dec 23 2014
- Image path: \??\C:\ProgramData\Microsoft\Windows Defender\Definition Updates\{872245D0-50CF-46A6-BD0B-93BA1C490A24}\MpKsl1c788baa.sys
- Image name: MpKsl1c788baa.sys
- Info Link : http://www.carrona.org/drivers/driver.php?id=MpKsl1c788baa.sys
- Timestamp : Tue May 19 2015
- Image path: \??\C:\ProgramData\Microsoft\Windows Defender\Definition Updates\{872245D0-50CF-46A6-BD0B-93BA1C490A24}\MpKsl00ef5985.sys
- Image name: MpKsl00ef5985.sys
- Info Link : http://www.carrona.org/drivers/driver.php?id=MpKsl00ef5985.sys
- Timestamp : Tue May 19 2015
- Image path: \??\C:\ProgramData\Microsoft\Windows Defender\Definition Updates\{7B7D70AB-684B-4356-9F9E-090DEE574C10}\MpKsl71070fb6.sys
- Image name: MpKsl71070fb6.sys
- Info Link : http://www.carrona.org/drivers/driver.php?id=MpKsl71070fb6.sys
- Timestamp : Tue May 19 2015
- Image path: \SystemRoot\system32\DRIVERS\atikmpag.sys
- Image name: atikmpag.sys
- Info Link : http://www.carrona.org/drivers/driver.php?id=atikmpag.sys
- ADA Info : ATI video card driver
- Timestamp : Tue Jan 13 2015
- Image path: \SystemRoot\System32\drivers\rt640x64.sys
- Image name: rt640x64.sys
- Info Link : http://www.carrona.org/drivers/driver.php?id=rt640x64.sys
- ADA Info : Realtek NICDRV 8169 PCIe GBE Family Controller driver http://www.realtek.com.tw
- Timestamp : Fri May 26 2017
- Image path: \SystemRoot\system32\drivers\RTKVHD64.sys
- Image name: RTKVHD64.sys
- Info Link : http://www.carrona.org/drivers/driver.php?id=RTKVHD64.sys
- ADA Info : Realtek Audio Driver system driver http://www.realtek.com.tw
- Timestamp : Tue Jun 19 2012
- Image path: \SystemRoot\system32\DRIVERS\atikmdag.sys
- Image name: atikmdag.sys
- Info Link : http://www.carrona.org/drivers/driver.php?id=atikmdag.sys
- Timestamp : Tue Jan 13 2015
- Unloaded modules:
- fffff80d`6e5a0000 fffff80d`6e5dd000 WUDFRd.sys
- fffff80d`6e510000 fffff80d`6e54d000 WUDFRd.sys
- fffff80d`6e7c0000 fffff80d`6e7fd000 WUDFRd.sys
- fffff80d`6e780000 fffff80d`6e7bd000 WUDFRd.sys
- fffff80d`6e5b0000 fffff80d`6e5ed000 WUDFRd.sys
- fffff80d`6e570000 fffff80d`6e5ad000 WUDFRd.sys
- fffff80d`6e510000 fffff80d`6e54d000 WUDFRd.sys
- fffff80d`6e4c0000 fffff80d`6e4dc000 EhStorClass.
- fffff80d`70190000 fffff80d`7019b000 cldflt.sys
- fffff80d`6d310000 fffff80d`6d31f000 dump_storpor
- fffff80d`6c6a0000 fffff80d`6c70f000 dump_ahcix64
- fffff80d`6c730000 fffff80d`6c74d000 dump_dumpfve
- fffff80d`6fd70000 fffff80d`6fd8c000 EhStorClass.
- fffff80d`6fc90000 fffff80d`6fcac000 EhStorClass.
- fffff80d`6fc70000 fffff80d`6fc8c000 EhStorClass.
- fffff80d`6fc50000 fffff80d`6fc6c000 EhStorClass.
- fffff80d`6fc30000 fffff80d`6fc4c000 EhStorClass.
- fffff80d`6c5c0000 fffff80d`6c5dc000 EhStorClass.
- fffff80d`6deb0000 fffff80d`6ded0000 dam.sys
- fffff80d`6c2f0000 fffff80d`6c2ff000 WdBoot.sys
- fffff80d`6d220000 fffff80d`6d22f000 hwpolicy.sys
- ========================================================================
- ============================== BIOS INFO =============================
- ========================================================================
- [SMBIOS Data Tables v2.6]
- [DMI Version - 0]
- [2.0 Calling Convention - No]
- [Table Size - 3291 bytes]
- [BIOS Information (Type 0) - Length 24 - Handle 0000h]
- Vendor American Megatrends Inc.
- BIOS Version 5.12
- BIOS Starting Address Segment f000
- BIOS Release Date 05/21/2010
- BIOS ROM Size 100000
- BIOS Characteristics
- 04: - ISA Supported
- 07: - PCI Supported
- 09: - Plug and Play Supported
- 11: - Upgradeable FLASH BIOS
- 12: - BIOS Shadowing Supported
- 14: - ESCD Supported
- 15: - CD-Boot Supported
- 16: - Selectable Boot Supported
- 17: - BIOS ROM Socketed
- 19: - EDD Supported
- 23: - 1.2MB Floppy Supported
- 24: - 720KB Floppy Supported
- 25: - 2.88MB Floppy Supported
- 26: - Print Screen Device Supported
- 27: - Keyboard Services Supported
- 28: - Serial Services Supported
- 29: - Printer Services Supported
- 30: - CGA/Mono Services Supported
- 32: - BIOS Vendor Reserved
- 48: - System Vendor Reserved
- BIOS Characteristic Extensions
- 00: - ACPI Supported
- 01: - USB Legacy Supported
- 04: - LS120-Boot Supported
- 05: - ATAPI ZIP-Boot Supported
- 08: - BIOS Boot Specification Supported
- 09: - Fn-Key NET-Boot Supported
- 10: - Specification Reserved
- BIOS Major Revision 5
- BIOS Minor Revision 18
- EC Firmware Major Revision 255
- EC Firmware Minor Revision 255
- [System Information (Type 1) - Length 27 - Handle 0001h]
- Manufacturer HP-Pavilion
- Product Name AY614AAR-ABA p6347c
- UUID 00000000-0000-0000-0000-000000000000
- Wakeup Type Power Switch
- SKUNumber AY614AAR#ABA
- Family 103C_53316J
- [BaseBoard Information (Type 2) - Length 15 - Handle 0002h]
- Manufacturer FOXCONN
- Product ALOE
- Version 1.01
- Feature Flags 09h
- Location
- Chassis Handle 0003h
- Board Type 0ah - Processor/Memory Module
- Number of Child Handles 0
- [System Enclosure (Type 3) - Length 21 - Handle 0003h]
- Manufacturer Hewlett-Packard
- Chassis Type Desktop
- Bootup State Safe
- Power Supply State Safe
- Thermal State Safe
- Security Status None
- OEM Defined 0
- Height 0U
- Number of Power Cords 1
- Number of Contained Elements 0
- Contained Element Size 0
- [Processor Information (Type 4) - Length 42 - Handle 0004h]
- Socket Designation CPU 1
- Processor Type Central Processor
- Processor Family edh - Specification Reserved
- Processor Manufacturer AMD
- Processor ID 520f1000fffb8b17
- Processor Version AMD Athlon(tm) II X4 630 Processor
- Processor Voltage 8fh - 1.5V
- External Clock 200MHz
- Max Speed 2800MHz
- Current Speed 2800MHz
- Status Enabled Populated
- Processor Upgrade Other
- L1 Cache Handle 0005h
- L2 Cache Handle 0006h
- L3 Cache Handle 0007h
- Part Number
- [Cache Information (Type 7) - Length 19 - Handle 0005h]
- Socket Designation L1-Cache
- Cache Configuration 0280h - Varies Enabled Int NonSocketed L1
- Maximum Cache Size 0200h - 512K
- Installed Size 0200h - 512K
- Supported SRAM Type 0010h - Pipeline-Burst
- Current SRAM Type 0010h - Pipeline-Burst
- Cache Speed 0ns
- Error Correction Type Multi-Bit ECC
- System Cache Type Specification Reserved
- Associativity 4-way Set-Associative
- [Cache Information (Type 7) - Length 19 - Handle 0006h]
- Socket Designation L2-Cache
- Cache Configuration 0281h - Varies Enabled Int NonSocketed L2
- Maximum Cache Size 0800h - 2048K
- Installed Size 0800h - 2048K
- Supported SRAM Type 0010h - Pipeline-Burst
- Current SRAM Type 0010h - Pipeline-Burst
- Cache Speed 0ns
- Error Correction Type Multi-Bit ECC
- System Cache Type Specification Reserved
- Associativity 4-way Set-Associative
- [Cache Information (Type 7) - Length 19 - Handle 0007h]
- Socket Designation L3-Cache
- Cache Configuration 0302h - Unknown Disabled Int NonSocketed L3
- Maximum Cache Size 0000h - 0K
- Installed Size 0000h - 0K
- Supported SRAM Type 0002h - Unknown
- Current SRAM Type 0002h - Unknown
- Cache Speed 0ns
- Error Correction Type Unknown
- System Cache Type Unknown
- Associativity Unknown
- [OEM Strings (Type 11) - Length 5 - Handle 000dh]
- Number of Strings 32
- 1 bid=A1NAv6PrA3;PROD_MSWORKS;SFCHK;DLED;IS.N60d;ACPwrFail=Off;Cha
- 2 n=Refurb;CPUFan=On;DVDRW;LegacyFloppy=No;TVout=NTSC;PCBRAND=Pavi
- 3 lion;OS=MSV;LScribe;DVDP_STD;Vos.P;PROD_MSOFFHST;FPA=HM;C_VEN2;C
- 4 DS_D;SW_Main;.B2;##HPCPC=00000000<900000060200000004200002535141
- 5 30040000010001000;5;:0665<;85>18>1<2=1:<55>?4;;=?=19:<8494;>:801
- 6 1<=31953=?76?>378139;594701:=;34:;55;9128<7937==0<722<:<1:2489>:
- 7 088=6:?1;2>8=8>12691>>286:9?;4454>3<3>89909>=738375;02951<;>=??2
- 8 ?70>75;04<815:33<20846?312127;?24876>7488457<0;0?39>9;?407;8;8;0
- 9 9>=;==>231>;?456:100000006;00000000002000840515?454=435<49434=23
- 10 405347594>444?47535021000200000000000000000000000000000000000176
- 11 0:<4;1?6??6:=:30393:=<:8>0733583=1;7=7:?6417;:83==335:93?179=82=
- 12 3<6<7:36018=:=05>2<7:76>9><?3=?3326<44;;515?5:05223?9=731563>:5>
- 13 :>:3?;752183168?<4641;15?1?:6;<46:36<39?682>03534:144>:?44867648
- 14 =32?5=6=56:3246?<8338;8?=?=<2:3?3<237?=6>8;=91=3;>??;>?0;<37=
- [Physical Memory Array (Type 16) - Length 15 - Handle 0010h]
- Location 03h - SystemBoard/Motherboard
- Use 03h - System Memory
- Memory Error Correction 03h - None
- Maximum Capacity 16777216KB
- Number of Memory Devices 4
- [Memory Array Mapped Address (Type 19) - Length 15 - Handle 0011h]
- Starting Address 00000000h
- Ending Address 0103ffffh
- Memory Array Handle 0010h
- Partition Width 01
- [Memory Device (Type 17) - Length 28 - Handle 0012h]
- Physical Memory Array Handle 0010h
- Total Width 64 bits
- Data Width 64 bits
- Size 4096MB
- Form Factor 09h - DIMM
- Device Locator DIMM1
- Bank Locator BANK0
- Memory Type 18h - Specification Reserved
- Type Detail 0080h - Synchronous
- Speed 1066MHz
- Manufacturer Manufacturer00
- Part Number CT51264BD160B.C16F
- [Memory Device (Type 17) - Length 28 - Handle 0013h]
- Physical Memory Array Handle 0010h
- Total Width 64 bits
- Data Width 64 bits
- Size 4096MB
- Form Factor 09h - DIMM
- Device Locator DIMM2
- Bank Locator BANK1
- Memory Type 18h - Specification Reserved
- Type Detail 0080h - Synchronous
- Speed 1066MHz
- Manufacturer Manufacturer01
- Part Number CT51264BD160B.C16F
- [Memory Device (Type 17) - Length 28 - Handle 0014h]
- Physical Memory Array Handle 0010h
- Total Width 64 bits
- Data Width 64 bits
- Size 4096MB
- Form Factor 09h - DIMM
- Device Locator DIMM3
- Bank Locator BANK2
- Memory Type 18h - Specification Reserved
- Type Detail 0080h - Synchronous
- Speed 1066MHz
- Manufacturer Manufacturer02
- Part Number CT51264BD160B.C16F
- [Memory Device (Type 17) - Length 28 - Handle 0015h]
- Physical Memory Array Handle 0010h
- Total Width 64 bits
- Data Width 64 bits
- Size 4096MB
- Form Factor 09h - DIMM
- Device Locator DIMM4
- Bank Locator BANK3
- Memory Type 18h - Specification Reserved
- Type Detail 0080h - Synchronous
- Speed 1066MHz
- Manufacturer Manufacturer03
- Part Number CT51264BD160B.C16F
- ========================================================================
- =================== Dump File: 080117-8875-01.dmp ====================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 15063 MP (4 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS Personal
- Built by: 15063.0.amd64fre.rs2_release.170317-1834
- Kernel base = 0xfffff800`5480b000 PsLoadedModuleList = 0xfffff800`54b575e0
- Debug session time: Tue Aug 1 00:52:43.902 2017 (UTC - 4:00)
- System Uptime: 0 days 13:40:43.655
- BugCheck A, {1, ff, 86, fffff8005486c9ff}
- Probably caused by : win32kbase.sys ( win32kbase!EnterSharedCrit+41 )
- Followup: MachineOwner
- IRQL_NOT_LESS_OR_EQUAL (a)
- An attempt was made to access a pageable (or completely invalid) address at an
- interrupt request level (IRQL) that is too high. This is usually
- caused by drivers using improper addresses.
- If a kernel debugger is available get the stack backtrace.
- Arguments:
- Arg1: 0000000000000001, memory referenced
- Arg2: 00000000000000ff, IRQL
- Arg3: 0000000000000086, bitfield :
- bit 0 : value 0 = read operation, 1 = write operation
- bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
- Arg4: fffff8005486c9ff, address which referenced memory
- Debugging Details:
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 10.0.15063.483 (WinBuild.160101.0800)
- SYSTEM_MANUFACTURER: HP-Pavilion
- SYSTEM_PRODUCT_NAME: AY614AAR-ABA p6347c
- SYSTEM_SKU: AY614AAR#ABA
- BIOS_VENDOR: American Megatrends Inc.
- BIOS_VERSION: 5.12
- BIOS_DATE: 05/21/2010
- BASEBOARD_MANUFACTURER: FOXCONN
- BASEBOARD_PRODUCT: ALOE
- BASEBOARD_VERSION: 1.01
- DUMP_TYPE: 2
- READ_ADDRESS: fffff80054bec358: Unable to get MiVisibleState
- 0000000000000001
- CURRENT_IRQL: 0
- FAULTING_IP:
- nt!ExpAcquireResourceSharedLite+9f
- fffff800`5486c9ff 8b4b40 mov ecx,dword ptr [rbx+40h]
- CPU_COUNT: 4
- CPU_MHZ: af0
- CPU_VENDOR: AuthenticAMD
- CPU_FAMILY: 10
- CPU_MODEL: 5
- CPU_STEPPING: 2
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
- BUGCHECK_STR: AV
- PROCESS_NAME: BlueIris.exe
- TRAP_FRAME: ffffe680b2994960 -- (.trap 0xffffe680b2994960)
- NOTE: The trap frame does not contain all registers.
- Some register values may be zeroed or incorrect.
- rax=0000000000000000 rbx=0000000000000000 rcx=ffffd68560c2ce00
- rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
- rip=fffff8005486c9ff rsp=ffffe680b2994af0 rbp=ffffe680b2994b60
- r8=000000000000001f r9=0000000000000020 r10=000000002a080e6d
- r11=00000000002b8000 r12=0000000000000000 r13=0000000000000000
- r14=0000000000000000 r15=0000000000000000
- iopl=0 nv up di pl zr na po nc
- nt!ExpAcquireResourceSharedLite+0x9f:
- fffff800`5486c9ff 8b4b40 mov ecx,dword ptr [rbx+40h] ds:00000000`00000040=????????
- Resetting default scope
- LAST_CONTROL_TRANSFER: from fffff800549828a9 to fffff800549774c0
- STACK_TEXT:
- ffffe680`b2994818 fffff800`549828a9 : 00000000`0000000a 00000000`00000001 00000000`000000ff 00000000`00000086 : nt!KeBugCheckEx
- ffffe680`b2994820 fffff800`54980e7d : 00000000`00000001 00000000`00000000 00000000`00000001 ffffb45d`00007f68 : nt!KiBugCheckDispatch+0x69
- ffffe680`b2994960 fffff800`5486c9ff : 00000000`00000000 00000000`00000000 00000000`004c8618 00000000`00000000 : nt!KiPageFault+0x23d
- ffffe680`b2994af0 fffff800`5486bf5a : 00000000`00000002 ffffd685`60c2ce00 00000000`00000000 00000000`00000000 : nt!ExpAcquireResourceSharedLite+0x9f
- ffffe680`b2994b90 ffffb410`59bd1de1 : 00000000`00000000 00000000`00da7a64 00000000`00000001 00000000`0c69013e : nt!ExEnterCriticalRegionAndAcquireResourceShared+0x4a
- ffffe680`b2994bd0 ffffb410`598df205 : ffffd685`627d6080 00000000`00000001 00000000`00000000 00000000`00000000 : win32kbase!EnterSharedCrit+0x41
- ffffe680`b2994c10 fffff800`54982413 : ffffd685`627d6080 ffffe680`b2994cc0 00000000`00000000 ffffd685`6396a501 : win32kfull!NtUserGetThreadState+0x25
- ffffe680`b2994c40 00007ffb`131d1084 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
- 00000000`02b5fcc8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`131d1084
- STACK_COMMAND: kb
- THREAD_SHA1_HASH_MOD_FUNC: 6a927fddb47682dfab6f44c23a0a39729d9003ed
- THREAD_SHA1_HASH_MOD_FUNC_OFFSET: df254e815f7e7a2c8b07071483939b24a0995596
- THREAD_SHA1_HASH_MOD: a1065c0f1e29b9ea5565121504105574f7d99b4b
- FOLLOWUP_IP:
- win32kbase!EnterSharedCrit+41
- ffffb410`59bd1de1 4885c0 test rax,rax
- FAULT_INSTR_CODE: 74c08548
- SYMBOL_STACK_INDEX: 5
- SYMBOL_NAME: win32kbase!EnterSharedCrit+41
- FOLLOWUP_NAME: MachineOwner
- MODULE_NAME: win32kbase
- IMAGE_NAME: win32kbase.sys
- DEBUG_FLR_IMAGE_TIMESTAMP: 2cddd6b0
- IMAGE_VERSION: 10.0.15063.477
- BUCKET_ID_FUNC_OFFSET: 41
- FAILURE_BUCKET_ID: OLD_IMAGE_win32kbase.sys
- BUCKET_ID: OLD_IMAGE_win32kbase.sys
- PRIMARY_PROBLEM_CLASS: OLD_IMAGE_win32kbase.sys
- TARGET_TIME: 2017-08-01T04:52:43.000Z
- OSBUILD: 15063
- OSSERVICEPACK: 483
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 784
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2017-07-07 02:06:35
- BUILDDATESTAMP_STR: 160101.0800
- BUILDLAB_STR: WinBuild
- BUILDOSVER_STR: 10.0.15063.483
- ANALYSIS_SESSION_ELAPSED_TIME: 93d
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:old_image_win32kbase.sys
- FAILURE_ID_HASH: {3f13b969-b4cb-c469-0e86-f8eab9a812e6}
- Followup: MachineOwner
- ========================================================================
- =================== Dump File: 080217-12562-01.dmp ===================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 15063 MP (4 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS Personal
- Built by: 15063.0.amd64fre.rs2_release.170317-1834
- Kernel base = 0xfffff803`1dc80000 PsLoadedModuleList = 0xfffff803`1dfcc5e0
- Debug session time: Wed Aug 2 22:54:24.662 2017 (UTC - 4:00)
- System Uptime: 1 days 22:00:15.416
- BugCheck 1A, {411, ffffce7e6c6080b8, 810000015b491874, ffff940491ae20b8}
- Probably caused by : memory_corruption
- Followup: memory_corruption
- MEMORY_MANAGEMENT (1a)
- # Any other values for parameter 1 must be individually examined.
- Arguments:
- Arg1: 0000000000000411, The subtype of the bugcheck.
- Arg2: ffffce7e6c6080b8
- Arg3: 810000015b491874
- Arg4: ffff940491ae20b8
- Debugging Details:
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 10.0.15063.483 (WinBuild.160101.0800)
- SYSTEM_MANUFACTURER: HP-Pavilion
- SYSTEM_PRODUCT_NAME: AY614AAR-ABA p6347c
- SYSTEM_SKU: AY614AAR#ABA
- BIOS_VENDOR: American Megatrends Inc.
- BIOS_VERSION: 5.12
- BIOS_DATE: 05/21/2010
- BASEBOARD_MANUFACTURER: FOXCONN
- BASEBOARD_PRODUCT: ALOE
- BASEBOARD_VERSION: 1.01
- DUMP_TYPE: 2
- BUGCHECK_STR: 0x1a_411
- CPU_COUNT: 4
- CPU_MHZ: af0
- CPU_VENDOR: AuthenticAMD
- CPU_FAMILY: 10
- CPU_MODEL: 5
- CPU_STEPPING: 2
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: CODE_CORRUPTION
- PROCESS_NAME: bzbui.exe
- CURRENT_IRQL: 2
- TRAP_FRAME: ffff8100dc3f2720 -- (.trap 0xffff8100dc3f2720)
- NOTE: The trap frame does not contain all registers.
- Some register values may be zeroed or incorrect.
- rax=fffffcd8c0b37c00 rbx=0000000000000000 rcx=fffffcd8c1017fd0
- rdx=fffffcd8c0b38ab0 rsi=0000000000000000 rdi=0000000000000000
- rip=fffffc948fc4d4e9 rsp=ffff8100dc3f28b0 rbp=0000000000000001
- r8=0000000000000001 r9=0000000000000000 r10=0000000000000000
- r11=ffffd08d4bea3080 r12=0000000000000000 r13=0000000000000000
- r14=0000000000000000 r15=0000000000000000
- iopl=0 nv up ei pl zr na po nc
- win32kfull!xxxRealSleepThread+0xc9:
- fffffc94`8fc4d4e9 0fb74104 movzx eax,word ptr [rcx+4] ds:fffffcd8`c1017fd4=0210
- Resetting default scope
- LAST_CONTROL_TRANSFER: from fffff8031de26017 to fffff8031ddec4c0
- STACK_TEXT:
- ffff8100`dc3f22d8 fffff803`1de26017 : 00000000`0000001a 00000000`00000411 ffffce7e`6c6080b8 81000001`5b491874 : nt!KeBugCheckEx
- ffff8100`dc3f22e0 fffff803`1dd0ea38 : fffffcd8`c1017fd4 ffffce7e`6c6080b8 00000000`00000001 ffff8100`d985abc0 : nt!MiResolveTransitionFault+0x10d157
- ffff8100`dc3f23b0 fffff803`1dd0ce63 : 00000000`c0000016 fffffcd8`c1017fd4 ffff8100`dc3f2720 ffffd08d`4bc907c0 : nt!MiDispatchFault+0xc88
- ffff8100`dc3f2530 fffff803`1ddf5d72 : 00000000`00000000 ffff8100`d8a19180 ffffd08d`4bea3080 fffff803`1dcb3401 : nt!MmAccessFault+0x673
- ffff8100`dc3f2720 fffffc94`8fc4d4e9 : fffffcd8`c0b38ab0 00000000`00000000 fffffcd8`c0b38a01 fffff803`00000000 : nt!KiPageFault+0x132
- ffff8100`dc3f28b0 fffffc94`8fc4d377 : fffff780`00000320 fffffcd8`c0b38ab0 00000000`00000000 fffffc94`8fc51af3 : win32kfull!xxxRealSleepThread+0xc9
- ffff8100`dc3f29e0 fffffc94`8fc509c9 : fffffcd8`c0b38ab0 ffff8100`dc3f2cc0 00000000`00000000 00000000`00000000 : win32kfull!xxxSleepThread2+0x97
- ffff8100`dc3f2a30 fffffc94`8fc4df5c : ffff8100`dc3f2be8 00000000`0000c240 00000000`00000000 00000000`00000000 : win32kfull!xxxRealInternalGetMessage+0x919
- ffff8100`dc3f2ba0 fffff803`1ddf7413 : ffffd08d`4bea3080 00000000`740979c0 00000000`00000020 00000000`002ec000 : win32kfull!NtUserGetMessage+0x8c
- ffff8100`dc3f2c40 00000000`740a1944 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
- 00000000`0009e5e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x740a1944
- STACK_COMMAND: kb
- CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
- fffff8031dd0eac8 - nt!MiDispatchFault+d18
- [ fa:e2 ]
- 1 error : !nt (fffff8031dd0eac8)
- MODULE_NAME: memory_corruption
- IMAGE_NAME: memory_corruption
- FOLLOWUP_NAME: memory_corruption
- DEBUG_FLR_IMAGE_TIMESTAMP: 0
- MEMORY_CORRUPTOR: ONE_BYTE
- FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BYTE
- BUCKET_ID: MEMORY_CORRUPTION_ONE_BYTE
- PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_ONE_BYTE
- TARGET_TIME: 2017-08-03T02:54:24.000Z
- OSBUILD: 15063
- OSSERVICEPACK: 483
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 784
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2017-07-07 02:06:35
- BUILDDATESTAMP_STR: 160101.0800
- BUILDLAB_STR: WinBuild
- BUILDOSVER_STR: 10.0.15063.483
- ANALYSIS_SESSION_ELAPSED_TIME: 292d
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:memory_corruption_one_byte
- FAILURE_ID_HASH: {ad110d6a-3b33-2c0a-c931-570eae1ba92d}
- Followup: memory_corruption
- ========================================================================
- =================== Dump File: 080317-10359-01.dmp ===================
- ========================================================================
- Could not match Dump File signature - invalid file format
- Could not open dump file [C:\Users\UserName\Desktop\New folder\080317-10359-01.dmp], Win32 error 0n87
- "The parameter is incorrect."
- Debuggee initialization failed, Win32 error 0n87
- The parameter is incorrect.
- ========================================================================
- =================== Dump File: 080317-11218-01.dmp ===================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 15063 MP (4 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS Personal
- Built by: 15063.0.amd64fre.rs2_release.170317-1834
- Kernel base = 0xfffff801`d9216000 PsLoadedModuleList = 0xfffff801`d95625e0
- Debug session time: Thu Aug 3 19:06:37.399 2017 (UTC - 4:00)
- System Uptime: 0 days 20:10:33.154
- BugCheck 4E, {2, 3f6bef, 41ffff, 1}
- Probably caused by : memory_corruption
- Followup: memory_corruption
- PFN_LIST_CORRUPT (4e)
- Typically caused by drivers passing bad memory descriptor lists (ie: calling
- MmUnlockPages twice with the same list, etc). If a kernel debugger is
- available get the stack trace.
- Arguments:
- Arg1: 0000000000000002, A list entry was corrupt
- Arg2: 00000000003f6bef, entry in list being removed
- Arg3: 000000000041ffff, highest physical page number
- Arg4: 0000000000000001, reference count of entry being removed
- Debugging Details:
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 10.0.15063.483 (WinBuild.160101.0800)
- SYSTEM_MANUFACTURER: HP-Pavilion
- SYSTEM_PRODUCT_NAME: AY614AAR-ABA p6347c
- SYSTEM_SKU: AY614AAR#ABA
- BIOS_VENDOR: American Megatrends Inc.
- BIOS_VERSION: 5.12
- BIOS_DATE: 05/21/2010
- BASEBOARD_MANUFACTURER: FOXCONN
- BASEBOARD_PRODUCT: ALOE
- BASEBOARD_VERSION: 1.01
- DUMP_TYPE: 2
- BUGCHECK_STR: 0x4E_2
- CPU_COUNT: 4
- CPU_MHZ: af0
- CPU_VENDOR: AuthenticAMD
- CPU_FAMILY: 10
- CPU_MODEL: 5
- CPU_STEPPING: 2
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: CODE_CORRUPTION
- PROCESS_NAME: firefox.exe
- CURRENT_IRQL: 2
- LAST_CONTROL_TRANSFER: from fffff801d93bc49b to fffff801d93824c0
- STACK_TEXT:
- ffffb900`44d98688 fffff801`d93bc49b : 00000000`0000004e 00000000`00000002 00000000`003f6bef 00000000`0041ffff : nt!KeBugCheckEx
- ffffb900`44d98690 fffff801`d92af02c : ffffb900`00000000 fffff80b`00000000 00000000`00000000 ffffca8a`0656a200 : nt!MiUnlinkPageFromList+0x10c8cb
- ffffb900`44d98730 fffff801`d92a4a38 : ffffee3f`fca000b0 ffffee77`1ffe5000 ffff8485`49010101 ffffca8a`06dbc580 : nt!MiResolveTransitionFault+0x16c
- ffffb900`44d98800 fffff801`d92a3c1f : ffffb900`44d98bc0 ffff8485`4a6ae4c0 00000000`00000068 ffff8485`495b92e0 : nt!MiDispatchFault+0xc88
- ffffb900`44d98980 fffff801`d92a2adb : 00000000`00000014 00007ff9`40016fa0 ffffb900`44d98bb0 00000000`00000000 : nt!MiResolvePageTablePage+0x2af
- ffffb900`44d98a50 fffff801`d938bd72 : ffffca8a`070bd7c0 ffffca8a`000007d4 ffff8485`445538b0 ffff8485`445538b0 : nt!MmAccessFault+0x2eb
- ffffb900`44d98c40 00007ff9`40016fa0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x132
- 00000000`0c54e708 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`40016fa0
- STACK_COMMAND: kb
- CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
- fffff801d92a2afa-fffff801d92a2afc 3 bytes - nt!MmAccessFault+30a
- [ 40 fb f6:00 77 ee ]
- fffff801d92a2b08-fffff801d92a2b09 2 bytes - nt!MmAccessFault+318 (+0x0e)
- [ 80 f6:00 ee ]
- fffff801d92a3c79-fffff801d92a3c7a 2 bytes - nt!MiResolvePageTablePage+309 (+0x1171)
- [ 80 f6:00 ee ]
- fffff801d92a3c8d-fffff801d92a3c8e 2 bytes - nt!MiResolvePageTablePage+31d (+0x14)
- [ ff f6:7f ee ]
- fffff801d92a4ac7-fffff801d92a4ac8 2 bytes - nt!MiDispatchFault+d17 (+0xe3a)
- [ 80 fa:00 db ]
- fffff801d92af119-fffff801d92af11a 2 bytes - nt!MiResolveTransitionFault+259 (+0xa652)
- [ 80 f6:00 ee ]
- 13 errors : !nt (fffff801d92a2afa-fffff801d92af11a)
- MODULE_NAME: memory_corruption
- IMAGE_NAME: memory_corruption
- FOLLOWUP_NAME: memory_corruption
- DEBUG_FLR_IMAGE_TIMESTAMP: 0
- MEMORY_CORRUPTOR: LARGE
- FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
- BUCKET_ID: MEMORY_CORRUPTION_LARGE
- PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
- TARGET_TIME: 2017-08-03T23:06:37.000Z
- OSBUILD: 15063
- OSSERVICEPACK: 483
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 784
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2017-07-07 02:06:35
- BUILDDATESTAMP_STR: 160101.0800
- BUILDLAB_STR: WinBuild
- BUILDOSVER_STR: 10.0.15063.483
- ANALYSIS_SESSION_ELAPSED_TIME: 29c0
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:memory_corruption_large
- FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
- Followup: memory_corruption
- ========================================================================
- =================== Dump File: 072917-12156-01.dmp ===================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 15063 MP (4 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS Personal
- Built by: 15063.0.amd64fre.rs2_release.170317-1834
- Kernel base = 0xfffff801`d4c7d000 PsLoadedModuleList = 0xfffff801`d4fc95e0
- Debug session time: Sat Jul 29 19:18:44.608 2017 (UTC - 4:00)
- System Uptime: 0 days 10:18:11.361
- BugCheck 1000007E, {ffffffffc0000005, fffff801d4cff80e, ffffbc804fbefe98, ffffbc804fbef6e0}
- *** WARNING: Unable to verify timestamp for win32k.sys
- *** ERROR: Module load completed but symbols could not be loaded for win32k.sys
- Probably caused by : memory_corruption
- Followup: memory_corruption
- SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
- This is a very common bugcheck. Usually the exception address pinpoints
- the driver/function that caused the problem. Always note this address
- as well as the link date of the driver/image that contains this address.
- Some common problems are exception code 0x80000003. This means a hard
- coded breakpoint or assertion was hit, but this system was booted
- /NODEBUG. This is not supposed to happen as developers should never have
- hardcoded breakpoints in retail code, but ...
- If this happens, make sure a debugger gets connected, and the
- system is booted /DEBUG. This will let us see why this breakpoint is
- happening.
- Arguments:
- Arg1: ffffffffc0000005, The exception code that was not handled
- Arg2: fffff801d4cff80e, The address that the exception occurred at
- Arg3: ffffbc804fbefe98, Exception Record Address
- Arg4: ffffbc804fbef6e0, Context Record Address
- Debugging Details:
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 10.0.15063.483 (WinBuild.160101.0800)
- SYSTEM_MANUFACTURER: HP-Pavilion
- SYSTEM_PRODUCT_NAME: AY614AAR-ABA p6347c
- SYSTEM_SKU: AY614AAR#ABA
- BIOS_VENDOR: American Megatrends Inc.
- BIOS_VERSION: 5.12
- BIOS_DATE: 05/21/2010
- BASEBOARD_MANUFACTURER: FOXCONN
- BASEBOARD_PRODUCT: ALOE
- BASEBOARD_VERSION: 1.01
- DUMP_TYPE: 2
- EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
- FAULTING_IP:
- nt!MiDemoteCombinedPte+1e
- fffff801`d4cff80e 498378f001 cmp qword ptr [r8-10h],1
- EXCEPTION_RECORD: ffffbc804fbefe98 -- (.exr 0xffffbc804fbefe98)
- ExceptionAddress: fffff801d4cff80e (nt!MiDemoteCombinedPte+0x000000000000001e)
- ExceptionCode: c0000005 (Access violation)
- ExceptionFlags: 00000000
- NumberParameters: 2
- Parameter[0]: 0000000000000000
- Parameter[1]: ffffffffffffffff
- Attempt to read from address ffffffffffffffff
- CONTEXT: ffffbc804fbef6e0 -- (.cxr 0xffffbc804fbef6e0)
- rax=fffff59acd2dcc2f rbx=8e8e25565090047d rcx=fffff801d4ffb800
- rdx=ffffb772074bd080 rsi=ffffe40e97a10000 rdi=ffffbc804fbf0530
- rip=fffff801d4cff80e rsp=ffffbc804fbf00d0 rbp=fffff801d4fe64e0
- r8=8000000000000000 r9=0000000000000002 r10=ffffb8f002f1b000
- r11=0000000000000001 r12=0000000000000000 r13=0000000000000001
- r14=fffff801d4ffb800 r15=ffffb772074bd080
- iopl=0 nv up ei ng nz na pe nc
- cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010282
- nt!MiDemoteCombinedPte+0x1e:
- fffff801`d4cff80e 498378f001 cmp qword ptr [r8-10h],1 ds:002b:7fffffff`fffffff0=????????????????
- Resetting default scope
- CPU_COUNT: 4
- CPU_MHZ: af0
- CPU_VENDOR: AuthenticAMD
- CPU_FAMILY: 10
- CPU_MODEL: 5
- CPU_STEPPING: 2
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: CODE_CORRUPTION
- PROCESS_NAME: System
- CURRENT_IRQL: 2
- ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
- EXCEPTION_CODE_STR: c0000005
- EXCEPTION_PARAMETER1: 0000000000000000
- EXCEPTION_PARAMETER2: ffffffffffffffff
- FOLLOWUP_IP:
- nt!MiDemoteCombinedPte+1e
- fffff801`d4cff80e 498378f001 cmp qword ptr [r8-10h],1
- READ_ADDRESS: fffff801d505e358: Unable to get MiVisibleState
- ffffffffffffffff
- BUGCHECK_STR: AV
- LAST_CONTROL_TRANSFER: from fffff801d4d03836 to fffff801d4cff80e
- STACK_TEXT:
- ffffbc80`4fbf00d0 fffff801`d4d03836 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiDemoteCombinedPte+0x1e
- ffffbc80`4fbf0190 fffff801`d4d02979 : fffff59a`00000001 00000000`00000000 00000000`00000005 00000000`00000002 : nt!MiAgePte+0x9c6
- ffffbc80`4fbf0210 fffff801`d4d02aa9 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff801`d4ffb800 : nt!MiWalkPageTablesRecursively+0x209
- ffffbc80`4fbf0290 fffff801`d4d02aa9 : fffff801`00000000 00000000`00000000 00000000`00000001 fffff801`d4ffb800 : nt!MiWalkPageTablesRecursively+0x339
- ffffbc80`4fbf0310 fffff801`d4d02aa9 : fffff801`00000000 00000000`00000000 00000000`00000002 fffff801`d4ffb800 : nt!MiWalkPageTablesRecursively+0x339
- ffffbc80`4fbf0390 fffff801`d4cff730 : 00000000`00000000 00000000`00000000 ffffbc80`00000003 fffff801`d4ffb800 : nt!MiWalkPageTablesRecursively+0x339
- ffffbc80`4fbf0410 fffff801`d4cff06b : 00000000`00000000 fffff801`d4cff350 ffffbc80`4fbf05b0 ffffbc80`00000000 : nt!MiWalkPageTables+0x210
- ffffbc80`4fbf04b0 fffff801`d4cfe9dd : 00000000`00000000 00000000`00000002 00000000`00000000 fffff801`d4dee62f : nt!MiAgeWorkingSet+0x2ab
- ffffbc80`4fbf0890 fffff801`d4d22530 : ffffd183`00000000 ffffbc80`4fbf0bc0 fffff801`d4ffb818 00000000`00000000 : nt!MiTrimOrAgeWorkingSet+0x2ed
- ffffbc80`4fbf09e0 fffff801`d4d21bc5 : fffff801`d4ffa100 fffff801`d4ffa100 00000000`00000188 00000000`00000001 : nt!MiProcessWorkingSets+0x200
- ffffbc80`4fbf0ba0 fffff801`d4dc7a4d : 00000000`ffffffff 00000000`00000006 00000000`ffffffff 00000000`00000001 : nt!MiWorkingSetManager+0x9d
- ffffbc80`4fbf0c60 fffff801`d4d59ac7 : ffffd183`79548040 00000000`00000080 fffff801`d4dc7900 45f68b41`f98b48ea : nt!KeBalanceSetManager+0x14d
- ffffbc80`4fbf0d50 fffff801`d4dee946 : fffff801`d3ce0180 ffffd183`79548040 fffff801`d4d59a80 e8202474`894c0002 : nt!PspSystemThreadStartup+0x47
- ffffbc80`4fbf0da0 00000000`00000000 : ffffbc80`4fbf1000 ffffbc80`4fbeb000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
- CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
- fffff801d4cff576-fffff801d4cff577 2 bytes - nt!MiWalkPageTables+56
- [ 80 f6:00 b7 ]
- fffff801d4cff592-fffff801d4cff596 5 bytes - nt!MiWalkPageTables+72 (+0x1c)
- [ d0 be 7d fb f6:e0 d6 ad 5b b7 ]
- fffff801d4cff5c9-fffff801d4cff5ca 2 bytes - nt!MiWalkPageTables+a9 (+0x37)
- [ ff f6:7f b7 ]
- fffff801d4cff772-fffff801d4cff773 2 bytes - nt!MiWalkPageTables+252 (+0x1a9)
- [ 80 f6:00 b7 ]
- fffff801d4cff881 - nt!MiDemoteCombinedPte+91 (+0x10f)
- [ fa:b8 ]
- fffff801d4cff894-fffff801d4cff895 2 bytes - nt!MiDemoteCombinedPte+a4 (+0x13)
- [ 80 f6:00 b7 ]
- fffff801d4cffa59 - nt!MiDemoteCombinedPte+269 (+0x1c5)
- [ fa:b8 ]
- fffff801d4cffc8a-fffff801d4cffc8b 2 bytes - nt!MiWsleFlush+3a (+0x231)
- [ 80 f6:00 b7 ]
- fffff801d4cffcc2 - nt!MiWsleFlush+72 (+0x38)
- [ fa:b8 ]
- fffff801d4cffdcd-fffff801d4cffdce 2 bytes - nt!MiWsleFlush+17d (+0x10b)
- [ 80 f6:00 b7 ]
- fffff801d4cffe58-fffff801d4cffe59 2 bytes - nt!MiWsleFlush+208 (+0x8b)
- [ ff f6:7f b7 ]
- fffff801d4cfff13-fffff801d4cfff14 2 bytes - nt!MiWsleFlush+2c3 (+0xbb)
- [ ff f6:7f b7 ]
- fffff801d4d02a03-fffff801d4d02a07 5 bytes - nt!MiWalkPageTablesRecursively+293 (+0x2af0)
- [ d0 be 7d fb f6:e0 d6 ad 5b b7 ]
- fffff801d4d02a24-fffff801d4d02a25 2 bytes - nt!MiWalkPageTablesRecursively+2b4 (+0x21)
- [ 80 f6:00 b7 ]
- fffff801d4d02a5f - nt!MiWalkPageTablesRecursively+2ef (+0x3b)
- [ fa:b8 ]
- fffff801d4d02b3c-fffff801d4d02b3d 2 bytes - nt!MiWalkPageTablesRecursively+3cc (+0xdd)
- [ 80 f6:00 b7 ]
- fffff801d4d02eb3-fffff801d4d02eb4 2 bytes - nt!MiAgePte+43 (+0x377)
- [ 80 f6:00 b7 ]
- fffff801d4d02ed9-fffff801d4d02eda 2 bytes - nt!MiAgePte+69 (+0x26)
- [ ff f6:7f b7 ]
- fffff801d4d02f2e - nt!MiAgePte+be (+0x55)
- [ fa:b8 ]
- fffff801d4d03872-fffff801d4d03873 2 bytes - nt!MiAgePte+a02 (+0x944)
- [ ff f6:7f b7 ]
- fffff801d4d0390c-fffff801d4d0390d 2 bytes - nt!MiAgePte+a9c (+0x9a)
- [ ff f6:7f b7 ]
- fffff801d4d23098 - nt!MiEmptyDecayClusterTimers+b8 (+0x1f78c)
- [ fa:b8 ]
- fffff801d4d780cd-fffff801d4d780ce 2 bytes - nt!MiUpdatePrefetchPriority+2d (+0x55035)
- [ 80 f6:00 b7 ]
- fffff801d4d7810c - nt!MiUpdatePrefetchPriority+6c (+0x3f)
- [ fa:b8 ]
- 47 errors : !nt (fffff801d4cff576-fffff801d4d7810c)
- MODULE_NAME: memory_corruption
- IMAGE_NAME: memory_corruption
- FOLLOWUP_NAME: memory_corruption
- DEBUG_FLR_IMAGE_TIMESTAMP: 0
- MEMORY_CORRUPTOR: LARGE
- STACK_COMMAND: .cxr 0xffffbc804fbef6e0 ; kb
- FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
- BUCKET_ID: MEMORY_CORRUPTION_LARGE
- PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
- TARGET_TIME: 2017-07-29T23:18:44.000Z
- OSBUILD: 15063
- OSSERVICEPACK: 483
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 784
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2017-07-07 02:06:35
- BUILDDATESTAMP_STR: 160101.0800
- BUILDLAB_STR: WinBuild
- BUILDOSVER_STR: 10.0.15063.483
- ANALYSIS_SESSION_ELAPSED_TIME: 2900
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:memory_corruption_large
- FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
- Followup: memory_corruption
- ========================================================================
- =================== Dump File: 072917-12875-01.dmp ===================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 15063 MP (4 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS Personal
- Built by: 15063.0.amd64fre.rs2_release.170317-1834
- Kernel base = 0xfffff802`5aa91000 PsLoadedModuleList = 0xfffff802`5addd5e0
- Debug session time: Sat Jul 29 08:58:46.624 2017 (UTC - 4:00)
- System Uptime: 0 days 13:05:04.377
- BugCheck 3B, {80000003, fffff80fdca8fa75, ffffa3804cc71600, 0}
- *** WARNING: Unable to verify timestamp for atikmdag.sys
- *** ERROR: Module load completed but symbols could not be loaded for atikmdag.sys
- *** WARNING: Unable to verify timestamp for atikmpag.sys
- *** ERROR: Module load completed but symbols could not be loaded for atikmpag.sys
- *** WARNING: Unable to verify timestamp for win32k.sys
- *** ERROR: Module load completed but symbols could not be loaded for win32k.sys
- Probably caused by : memory_corruption
- Followup: memory_corruption
- SYSTEM_SERVICE_EXCEPTION (3b)
- An exception happened while executing a system service routine.
- Arguments:
- Arg1: 0000000080000003, Exception code that caused the bugcheck
- Arg2: fffff80fdca8fa75, Address of the instruction which caused the bugcheck
- Arg3: ffffa3804cc71600, Address of the context record for the exception that caused the bugcheck
- Arg4: 0000000000000000, zero.
- Debugging Details:
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 10.0.15063.483 (WinBuild.160101.0800)
- SYSTEM_MANUFACTURER: HP-Pavilion
- SYSTEM_PRODUCT_NAME: AY614AAR-ABA p6347c
- SYSTEM_SKU: AY614AAR#ABA
- BIOS_VENDOR: American Megatrends Inc.
- BIOS_VERSION: 5.12
- BIOS_DATE: 05/21/2010
- BASEBOARD_MANUFACTURER: FOXCONN
- BASEBOARD_PRODUCT: ALOE
- BASEBOARD_VERSION: 1.01
- DUMP_TYPE: 2
- EXCEPTION_CODE: (HRESULT) 0x80000003 (2147483651) - One or more arguments are invalid
- FAULTING_IP:
- atikmdag+fa75
- fffff80f`dca8fa75 cc int 3
- CONTEXT: ffffa3804cc71600 -- (.cxr 0xffffa3804cc71600)
- rax=fffff80fdca8fa75 rbx=ffffa3804cc72240 rcx=ffff8f09e73a0b60
- rdx=ffffa3804cc72240 rsi=ffff8f09e73a0a80 rdi=ffff8f09e5773040
- rip=fffff80fdca8fa75 rsp=ffffa3804cc71ff8 rbp=ffffa3804cc72050
- r8=0000000000000000 r9=0000000000000000 r10=0000000000000000
- r11=ffffd98d3819e000 r12=ffff8f09e73a0a80 r13=ffffa3804cc72aa0
- r14=00000000c0000001 r15=ffff8f09f6f54000
- iopl=0 nv up ei ng nz na pe nc
- cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00000282
- atikmdag+0xfa75:
- fffff80f`dca8fa75 cc int 3
- Resetting default scope
- CPU_COUNT: 4
- CPU_MHZ: af0
- CPU_VENDOR: AuthenticAMD
- CPU_FAMILY: 10
- CPU_MODEL: 5
- CPU_STEPPING: 2
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: CODE_CORRUPTION
- BUGCHECK_STR: 0x3B
- PROCESS_NAME: dwm.exe
- CURRENT_IRQL: 0
- LAST_CONTROL_TRANSFER: from fffff80fdaeea78a to fffff80fdca8fa75
- STACK_TEXT:
- ffffa380`4cc71ff8 fffff80f`daeea78a : ffffa380`4cc72240 ffff8f09`e73a0a80 ffff8f09`e73a0a80 fffff80f`da353dd2 : atikmdag+0xfa75
- ffffa380`4cc72000 ffffa380`4cc72240 : ffff8f09`e73a0a80 ffff8f09`e73a0a80 fffff80f`da353dd2 ffffa380`4cc72078 : atikmpag+0xa78a
- ffffa380`4cc72008 ffff8f09`e73a0a80 : ffff8f09`e73a0a80 fffff80f`da353dd2 ffffa380`4cc72078 ffffa380`4cc72060 : 0xffffa380`4cc72240
- ffffa380`4cc72010 ffff8f09`e73a0a80 : fffff80f`da353dd2 ffffa380`4cc72078 ffffa380`4cc72060 ffffa380`4cc72240 : 0xffff8f09`e73a0a80
- ffffa380`4cc72018 fffff80f`da353dd2 : ffffa380`4cc72078 ffffa380`4cc72060 ffffa380`4cc72240 00000000`00000000 : 0xffff8f09`e73a0a80
- ffffa380`4cc72020 fffff80f`da4cbfe1 : ffff8f09`e7716080 ffff8f09`e7716080 ffffd98d`3819e000 000001d8`e1800000 : dxgkrnl!DXGADAPTER::AcquireDdiSync+0x92
- ffffa380`4cc72060 fffff80f`da3fd074 : 00000000`00000100 00000000`00000000 00000000`00000002 ffffd98d`3c005c50 : dxgkrnl!ADAPTER_RENDER::DdiRender+0x145
- ffffa380`4cc72120 fffff80f`da4f9113 : 00000000`00000000 ffffd98d`3813b6d0 ffffd98d`3813b6d0 ffff8f09`e73f2f20 : dxgkrnl!DXGCONTEXT::Render+0x954
- ffffa380`4cc72820 fffff802`5ac08413 : ffff8f09`e7716080 ffff8f09`e7716080 000001d8`dea65df0 00000000`00000020 : dxgkrnl!DxgkRender+0x803
- ffffa380`4cc72c40 00007ffb`387b4f44 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
- 00000089`49f0d968 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`387b4f44
- CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
- fffff8025ab190ef - nt!MiGetNextPageTable+19f
- [ f6:82 ]
- fffff8025ab19122 - nt!MiGetNextPageTable+1d2 (+0x33)
- [ f6:82 ]
- fffff8025ab2207b - nt!MiResolvePrivateZeroFault+27b (+0x8f59)
- [ f6:82 ]
- fffff8025ab220b1-fffff8025ab220b2 2 bytes - nt!MiResolvePrivateZeroFault+2b1 (+0x36)
- [ fb f6:c1 82 ]
- fffff8025ab220d9 - nt!MiResolvePrivateZeroFault+2d9 (+0x28)
- [ fa:ed ]
- fffff8025ab22cc3 - nt!MiGetFreeOrZeroPage+73 (+0xbea)
- [ fa:ed ]
- fffff8025ab23558 - nt!MiCompletePrivateZeroFault+518 (+0x895)
- [ f6:82 ]
- fffff8025ab23568 - nt!MiCompletePrivateZeroFault+528 (+0x10)
- [ fa:ed ]
- fffff8025ab40467 - nt!MiFlushCacheForAttributeChange+9b (+0x1ceff)
- [ f6:82 ]
- fffff8025ab405f8 - nt!MiMapPageInHyperSpaceWorker+b8 (+0x191)
- [ f6:82 ]
- fffff8025ab40723 - nt!MiInitializePfn+7f (+0x12b)
- [ f6:82 ]
- fffff8025ab40758 - nt!MiInitializePfn+b4 (+0x35)
- [ fa:ed ]
- fffff8025ab41422 - nt!MiMarkKernelStack+5a (+0xcca)
- [ fa:ed ]
- 14 errors : !nt (fffff8025ab190ef-fffff8025ab41422)
- MODULE_NAME: memory_corruption
- IMAGE_NAME: memory_corruption
- FOLLOWUP_NAME: memory_corruption
- DEBUG_FLR_IMAGE_TIMESTAMP: 0
- MEMORY_CORRUPTOR: LARGE
- STACK_COMMAND: .cxr 0xffffa3804cc71600 ; kb
- FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
- BUCKET_ID: MEMORY_CORRUPTION_LARGE
- PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
- TARGET_TIME: 2017-07-29T12:58:46.000Z
- OSBUILD: 15063
- OSSERVICEPACK: 483
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 784
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2017-07-07 02:06:35
- BUILDDATESTAMP_STR: 160101.0800
- BUILDLAB_STR: WinBuild
- BUILDOSVER_STR: 10.0.15063.483
- ANALYSIS_SESSION_ELAPSED_TIME: 38bb
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:memory_corruption_large
- FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
- Followup: memory_corruption
- ========================================================================
- =================== Dump File: 073017-9968-01.dmp ====================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 15063 MP (4 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS Personal
- Built by: 15063.0.amd64fre.rs2_release.170317-1834
- Kernel base = 0xfffff802`d7885000 PsLoadedModuleList = 0xfffff802`d7bd15e0
- Debug session time: Sun Jul 30 19:05:24.768 2017 (UTC - 4:00)
- System Uptime: 0 days 23:45:13.522
- BugCheck EF, {ffff98827b6967c0, 0, 0, 0}
- errfg" bg="errbg">ETW minidump data unavailable
- Probably caused by : ntkrnlmp.exe ( nt!PspCatchCriticalBreak+c9 )
- Followup: MachineOwner
- CRITICAL_PROCESS_DIED (ef)
- A critical system process died
- Arguments:
- Arg1: ffff98827b6967c0, Process object or thread object
- Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
- Arg3: 0000000000000000
- Arg4: 0000000000000000
- Debugging Details:
- ETW minidump data unavailable
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 10.0.15063.483 (WinBuild.160101.0800)
- SYSTEM_MANUFACTURER: HP-Pavilion
- SYSTEM_PRODUCT_NAME: AY614AAR-ABA p6347c
- SYSTEM_SKU: AY614AAR#ABA
- BIOS_VENDOR: American Megatrends Inc.
- BIOS_VERSION: 5.12
- BIOS_DATE: 05/21/2010
- BASEBOARD_MANUFACTURER: FOXCONN
- BASEBOARD_PRODUCT: ALOE
- BASEBOARD_VERSION: 1.01
- DUMP_TYPE: 2
- PROCESS_NAME: svchost.exe
- CRITICAL_PROCESS: svchost.exe
- EXCEPTION_CODE: (HRESULT) 0x8bde9080 (2346619008) - <Unable to get error code text>
- ERROR_CODE: (NTSTATUS) 0x8bde9080 - <Unable to get error code text>
- CPU_COUNT: 4
- CPU_MHZ: af0
- CPU_VENDOR: AuthenticAMD
- CPU_FAMILY: 10
- CPU_MODEL: 5
- CPU_STEPPING: 2
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
- BUGCHECK_STR: 0xEF
- CURRENT_IRQL: 0
- LAST_CONTROL_TRANSFER: from fffff802d7f65071 to fffff802d79f14c0
- STACK_TEXT:
- ffffbc01`dcba1ac8 fffff802`d7f65071 : 00000000`000000ef ffff9882`7b6967c0 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
- ffffbc01`dcba1ad0 fffff802`d7ea0c47 : ffff9882`7b6967c0 00000000`00000000 ffff9882`7b6967c0 00000000`00000000 : nt!PspCatchCriticalBreak+0xc9
- ffffbc01`dcba1b20 fffff802`d7d80186 : ffff9882`00000000 ffff9882`7b6967c0 00000000`00000000 ffff9882`7b6967c0 : nt!PspTerminateAllThreads+0x1209bb
- ffffbc01`dcba1b90 fffff802`d7d7ff47 : ffffffff`ffffffff ffff9882`7b6967c0 ffff9882`7b6967c0 ffff51ed`c501e901 : nt!PspTerminateProcess+0xde
- ffffbc01`dcba1bd0 fffff802`d79fc413 : ffff9882`7b6967c0 ffff9882`8bde9080 ffffbc01`dcba1cc0 000000ed`186ff930 : nt!NtTerminateProcess+0xa7
- ffffbc01`dcba1c40 00007ffb`94435924 : 00007ffb`94495d3f 0000020b`f6a20002 00007ffb`944c6598 000000ed`186ff930 : nt!KiSystemServiceCopyEnd+0x13
- 000000ed`186fe1a8 00007ffb`94495d3f : 0000020b`f6a20002 00007ffb`944c6598 000000ed`186ff930 00000000`00000001 : 0x00007ffb`94435924
- 000000ed`186fe1b0 0000020b`f6a20002 : 00007ffb`944c6598 000000ed`186ff930 00000000`00000001 00000000`00000006 : 0x00007ffb`94495d3f
- 000000ed`186fe1b8 00007ffb`944c6598 : 000000ed`186ff930 00000000`00000001 00000000`00000006 00007ffb`9443cf9d : 0x0000020b`f6a20002
- 000000ed`186fe1c0 000000ed`186ff930 : 00000000`00000001 00000000`00000006 00007ffb`9443cf9d 00007ffb`944c6598 : 0x00007ffb`944c6598
- 000000ed`186fe1c8 00000000`00000001 : 00000000`00000006 00007ffb`9443cf9d 00007ffb`944c6598 00000000`00000003 : 0x000000ed`186ff930
- 000000ed`186fe1d0 00000000`00000006 : 00007ffb`9443cf9d 00007ffb`944c6598 00000000`00000003 00000000`00000001 : 0x1
- 000000ed`186fe1d8 00007ffb`9443cf9d : 00007ffb`944c6598 00000000`00000003 00000000`00000001 00007ffb`92c71256 : 0x6
- 000000ed`186fe1e0 00007ffb`944c6598 : 00000000`00000003 00000000`00000001 00007ffb`92c71256 00007ffb`92d2d480 : 0x00007ffb`9443cf9d
- 000000ed`186fe1e8 00000000`00000003 : 00000000`00000001 00007ffb`92c71256 00007ffb`92d2d480 00007ffb`92c30000 : 0x00007ffb`944c6598
- 000000ed`186fe1f0 00000000`00000001 : 00007ffb`92c71256 00007ffb`92d2d480 00007ffb`92c30000 00000000`000416b6 : 0x3
- 000000ed`186fe1f8 00007ffb`92c71256 : 00007ffb`92d2d480 00007ffb`92c30000 00000000`000416b6 00007ffb`94426466 : 0x1
- 000000ed`186fe200 00007ffb`92d2d480 : 00007ffb`92c30000 00000000`000416b6 00007ffb`94426466 000000ed`186fe3f0 : 0x00007ffb`92c71256
- 000000ed`186fe208 00007ffb`92c30000 : 00000000`000416b6 00007ffb`94426466 000000ed`186fe3f0 00007ffb`943a6f1c : 0x00007ffb`92d2d480
- 000000ed`186fe210 00000000`000416b6 : 00007ffb`94426466 000000ed`186fe3f0 00007ffb`943a6f1c 00007ffb`92c710be : 0x00007ffb`92c30000
- 000000ed`186fe218 00007ffb`94426466 : 000000ed`186fe3f0 00007ffb`943a6f1c 00007ffb`92c710be 00000000`00000000 : 0x416b6
- 000000ed`186fe220 000000ed`186fe3f0 : 00007ffb`943a6f1c 00007ffb`92c710be 00000000`00000000 00000000`00053bb4 : 0x00007ffb`94426466
- 000000ed`186fe228 00007ffb`943a6f1c : 00007ffb`92c710be 00000000`00000000 00000000`00053bb4 00007ffb`94426466 : 0x000000ed`186fe3f0
- 000000ed`186fe230 00007ffb`92c710be : 00000000`00000000 00000000`00053bb4 00007ffb`94426466 000000ed`186feef0 : 0x00007ffb`943a6f1c
- 000000ed`186fe238 00000000`00000000 : 00000000`00053bb4 00007ffb`94426466 000000ed`186feef0 000000ed`186fea00 : 0x00007ffb`92c710be
- STACK_COMMAND: kb
- THREAD_SHA1_HASH_MOD_FUNC: 042a2b51772309c39e12d732cc93cacf0af3064e
- THREAD_SHA1_HASH_MOD_FUNC_OFFSET: fc10ecd29a9db0f986cc1d740175a75d350c5136
- THREAD_SHA1_HASH_MOD: ee8fcf1fb60cb6e3e2f60ddbed2ec02b5748a693
- FOLLOWUP_IP:
- nt!PspCatchCriticalBreak+c9
- fffff802`d7f65071 cc int 3
- FAULT_INSTR_CODE: ff8440cc
- SYMBOL_STACK_INDEX: 1
- SYMBOL_NAME: nt!PspCatchCriticalBreak+c9
- FOLLOWUP_NAME: MachineOwner
- MODULE_NAME: nt
- IMAGE_NAME: ntkrnlmp.exe
- DEBUG_FLR_IMAGE_TIMESTAMP: 595f24eb
- IMAGE_VERSION: 10.0.15063.483
- BUCKET_ID_FUNC_OFFSET: c9
- FAILURE_BUCKET_ID: 0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_8bde9080_nt!PspCatchCriticalBreak
- BUCKET_ID: 0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_8bde9080_nt!PspCatchCriticalBreak
- PRIMARY_PROBLEM_CLASS: 0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_8bde9080_nt!PspCatchCriticalBreak
- TARGET_TIME: 2017-07-30T23:05:24.000Z
- OSBUILD: 15063
- OSSERVICEPACK: 483
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 784
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2017-07-07 02:06:35
- BUILDDATESTAMP_STR: 160101.0800
- BUILDLAB_STR: WinBuild
- BUILDOSVER_STR: 10.0.15063.483
- ANALYSIS_SESSION_ELAPSED_TIME: cfe
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:0xef_svchost.exe_bugcheck_critical_process_8bde9080_nt!pspcatchcriticalbreak
- FAILURE_ID_HASH: {ceef35d5-277a-cca0-ff9e-bd36970a3715}
- Followup: MachineOwner
- ========================================================================
- =================== Dump File: 073117-9218-01.dmp ====================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 15063 MP (4 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS Personal
- Built by: 15063.0.amd64fre.rs2_release.170317-1834
- Kernel base = 0xfffff802`f2e85000 PsLoadedModuleList = 0xfffff802`f31d15e0
- Debug session time: Mon Jul 31 11:10:33.777 2017 (UTC - 4:00)
- System Uptime: 0 days 2:55:30.529
- BugCheck 7F, {8, ffffca0180c21af0, 8563a358, fffff807b4865c1d}
- Probably caused by : memory_corruption
- Followup: memory_corruption
- UNEXPECTED_KERNEL_MODE_TRAP (7f)
- This means a trap occurred in kernel mode, and it's a trap of a kind
- that the kernel isn't allowed to have/catch (bound trap) or that
- is always instant death (double fault). The first number in the
- bugcheck params is the number of the trap (8 = double fault, etc)
- Consult an Intel x86 family manual to learn more about what these
- traps are. Here is a *portion* of those codes:
- If kv shows a taskGate
- use .tss on the part before the colon, then kv.
- Else if kv shows a trapframe
- use .trap on that value
- Else
- .trap on the appropriate frame will show where the trap was taken
- (on x86, this will be the ebp that goes with the procedure KiTrap)
- Endif
- kb will then show the corrected stack.
- Arguments:
- Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
- Arg2: ffffca0180c21af0
- Arg3: 000000008563a358
- Arg4: fffff807b4865c1d
- Debugging Details:
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 10.0.15063.483 (WinBuild.160101.0800)
- SYSTEM_MANUFACTURER: HP-Pavilion
- SYSTEM_PRODUCT_NAME: AY614AAR-ABA p6347c
- SYSTEM_SKU: AY614AAR#ABA
- BIOS_VENDOR: American Megatrends Inc.
- BIOS_VERSION: 5.12
- BIOS_DATE: 05/21/2010
- BASEBOARD_MANUFACTURER: FOXCONN
- BASEBOARD_PRODUCT: ALOE
- BASEBOARD_VERSION: 1.01
- DUMP_TYPE: 2
- BUGCHECK_STR: 0x7f_8
- TRAP_FRAME: ffffca0180c21af0 -- (.trap 0xffffca0180c21af0)
- NOTE: The trap frame does not contain all registers.
- Some register values may be zeroed or incorrect.
- rax=ffffdb05e5800c00 rbx=0000000000000000 rcx=ffffdb05e5800bff
- rdx=ffffdb05d6304350 rsi=0000000000000000 rdi=0000000000000000
- rip=fffff807b4865c1d rsp=000000008563a358 rbp=ffffca018563a470
- r8=0000000000000000 r9=0000000000000000 r10=0000000000000000
- r11=ffffdb05e4739080 r12=0000000000000000 r13=0000000000000000
- r14=0000000000000000 r15=0000000000000000
- iopl=0 nv up ei pl nz na pe nc
- FLTMGR!FltpMoveCallbackDataToIrp+0xd:
- fffff807`b4865c1d 450fb6d0 movzx r10d,r8b
- Resetting default scope
- CPU_COUNT: 4
- CPU_MHZ: af0
- CPU_VENDOR: AuthenticAMD
- CPU_FAMILY: 10
- CPU_MODEL: 5
- CPU_STEPPING: 2
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: CODE_CORRUPTION
- PROCESS_NAME: svchost.exe
- CURRENT_IRQL: 0
- BAD_STACK_POINTER: 000000008563a358
- LAST_CONTROL_TRANSFER: from fffff802f2ffc8a9 to fffff802f2ff14c0
- STACK_TEXT:
- ffffca01`80c219a8 fffff802`f2ffc8a9 : 00000000`0000007f 00000000`00000008 ffffca01`80c21af0 00000000`8563a358 : nt!KeBugCheckEx
- ffffca01`80c219b0 fffff802`f2ffa6f3 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
- ffffca01`80c21af0 fffff807`b4865c1d : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0xb3
- 00000000`8563a358 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : FLTMGR!FltpMoveCallbackDataToIrp+0xd
- STACK_COMMAND: kb
- CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
- fffff802f2f1a816-fffff802f2f1a817 2 bytes - nt!MiPfnShareCountIsZero+186
- [ 80 f6:00 f4 ]
- fffff802f2f1cfd2-fffff802f2f1cfd3 2 bytes - nt!MiDeletePteList+592 (+0x27bc)
- [ 80 fa:00 bc ]
- 4 errors : !nt (fffff802f2f1a816-fffff802f2f1cfd3)
- MODULE_NAME: memory_corruption
- IMAGE_NAME: memory_corruption
- FOLLOWUP_NAME: memory_corruption
- DEBUG_FLR_IMAGE_TIMESTAMP: 0
- MEMORY_CORRUPTOR: LARGE
- FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
- BUCKET_ID: MEMORY_CORRUPTION_LARGE
- PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
- TARGET_TIME: 2017-07-31T15:10:33.000Z
- OSBUILD: 15063
- OSSERVICEPACK: 483
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 784
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2017-07-07 02:06:35
- BUILDDATESTAMP_STR: 160101.0800
- BUILDLAB_STR: WinBuild
- BUILDOSVER_STR: 10.0.15063.483
- ANALYSIS_SESSION_ELAPSED_TIME: 2918
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:memory_corruption_large
- FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
- Followup: memory_corruption
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement