Advertisement
Guest User

Untitled

a guest
Aug 5th, 2017
694
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 63.07 KB | None | 0 0
  1. Microsoft (R) Windows Debugger Version 10.0.14321.1024 X86
  2. Copyright (c) Microsoft Corporation. All rights reserved.
  3.  
  4. Auto Dump Analyzer by gardenman
  5. Time to debug file(s): 00 hours and 08 minutes and 32 seconds
  6.  
  7. ========================================================================
  8. =================== Dump File: 073117-9921-01.dmp ====================
  9. ========================================================================
  10. Mini Kernel Dump File: Only registers and stack trace are available
  11. Windows 10 Kernel Version 15063 MP (4 procs) Free x64
  12. Product: WinNt, suite: TerminalServer SingleUserTS Personal
  13. Built by: 15063.0.amd64fre.rs2_release.170317-1834
  14. Kernel base = 0xfffff802`b288c000 PsLoadedModuleList = 0xfffff802`b2bd85e0
  15. Debug session time: Mon Jul 31 08:13:28.050 2017 (UTC - 4:00)
  16. System Uptime: 0 days 13:06:29.803
  17.  
  18. BugCheck A, {ffffa2883991a204, 2, 1, fffff802b28fc383}
  19. Probably caused by : memory_corruption
  20. Followup: memory_corruption
  21.  
  22. IRQL_NOT_LESS_OR_EQUAL (a)
  23. An attempt was made to access a pageable (or completely invalid) address at an
  24. interrupt request level (IRQL) that is too high. This is usually
  25. caused by drivers using improper addresses.
  26. If a kernel debugger is available get the stack backtrace.
  27.  
  28. Arguments:
  29. Arg1: ffffa2883991a204, memory referenced
  30. Arg2: 0000000000000002, IRQL
  31. Arg3: 0000000000000001, bitfield :
  32. bit 0 : value 0 = read operation, 1 = write operation
  33. bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
  34. Arg4: fffff802b28fc383, address which referenced memory
  35.  
  36. Debugging Details:
  37. DUMP_CLASS: 1
  38. DUMP_QUALIFIER: 400
  39. BUILD_VERSION_STRING: 10.0.15063.483 (WinBuild.160101.0800)
  40. SYSTEM_MANUFACTURER: HP-Pavilion
  41. SYSTEM_PRODUCT_NAME: AY614AAR-ABA p6347c
  42. SYSTEM_SKU: AY614AAR#ABA
  43. BIOS_VENDOR: American Megatrends Inc.
  44. BIOS_VERSION: 5.12
  45. BIOS_DATE: 05/21/2010
  46. BASEBOARD_MANUFACTURER: FOXCONN
  47. BASEBOARD_PRODUCT: ALOE
  48. BASEBOARD_VERSION: 1.01
  49. DUMP_TYPE: 2
  50. WRITE_ADDRESS: fffff802b2c6d358: Unable to get MiVisibleState
  51. ffffa2883991a204
  52. CURRENT_IRQL: 2
  53. FAULTING_IP:
  54. nt!KiSignalThread+b3
  55. fffff802`b28fc383 c6838401000007 mov byte ptr [rbx+184h],7
  56. CPU_COUNT: 4
  57. CPU_MHZ: af0
  58. CPU_VENDOR: AuthenticAMD
  59. CPU_FAMILY: 10
  60. CPU_MODEL: 5
  61. CPU_STEPPING: 2
  62. CUSTOMER_CRASH_COUNT: 1
  63. DEFAULT_BUCKET_ID: CODE_CORRUPTION
  64. BUGCHECK_STR: AV
  65.  
  66. PROCESS_NAME: bzfilelist.exe
  67.  
  68. TRAP_FRAME: ffffd600a7fde030 -- (.trap 0xffffd600a7fde030)
  69. NOTE: The trap frame does not contain all registers.
  70. Some register values may be zeroed or incorrect.
  71. rax=ffffa287e991a158 rbx=0000000000000000 rcx=ffffa287eaf8c898
  72. rdx=ffffd600a2fa1a80 rsi=0000000000000000 rdi=0000000000000000
  73. rip=fffff802b28fc383 rsp=ffffd600a7fde1c0 rbp=ffffa287e9965988
  74. r8=ffffa287e9965988 r9=ffffa287e991a1c0 r10=ffffd600a3019180
  75. r11=ffffd600a7fde1d0 r12=0000000000000000 r13=0000000000000000
  76. r14=0000000000000000 r15=0000000000000000
  77. iopl=0 nv up ei pl zr na po nc
  78. nt!KiSignalThread+0xb3:
  79. fffff802`b28fc383 c6838401000007 mov byte ptr [rbx+184h],7 ds:00000000`00000184=??
  80. Resetting default scope
  81. LAST_CONTROL_TRANSFER: from fffff802b2a038a9 to fffff802b29f84c0
  82. STACK_TEXT:
  83. ffffd600`a7fddee8 fffff802`b2a038a9 : 00000000`0000000a ffffa288`3991a204 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
  84. ffffd600`a7fddef0 fffff802`b2a01e7d : ffffa287`e4427080 ffffa287`00000008 00000000`00000000 ffffa287`eaf6d350 : nt!KiBugCheckDispatch+0x69
  85. ffffd600`a7fde030 fffff802`b28fc383 : fffff9e3`9edc9c1f 00000000`00000000 00000000`00000000 ffffffff`5ffffffd : nt!KiPageFault+0x23d
  86. ffffd600`a7fde1c0 fffff802`b28f895f : ffffa287`e99658e0 00000000`00000000 ffffd600`a7fde300 00000000`00400201 : nt!KiSignalThread+0xb3
  87. ffffd600`a7fde200 fffff80d`6be0a7f5 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IopfCompleteRequest+0x96f
  88. ffffd600`a7fde330 fffff80d`6c66551b : 00000000`00000000 ffffc20c`cc541780 ffffc20c`cc20e370 ffffc20c`0000029a : FLTMGR!FltSendMessage+0x455
  89. ffffd600`a7fde470 fffff80d`6c660942 : ffffd600`a7fde870 ffffd600`a7fde899 ffffc20c`cc541780 ffffd600`a7fde870 : WdFilter!MpScanFile+0x7fb
  90. ffffd600`a7fde620 fffff80d`6be04b4c : ffffd600`a7fde899 fffff80d`00000000 ffffa287`f898f520 ffffa287`fab27c00 : WdFilter!MpPreCleanup+0x782
  91. ffffd600`a7fde7e0 fffff80d`6be046ec : ffffd600`a7fde9d0 00000000`00000000 ffffa287`fab0d700 ffffa287`ec253612 : FLTMGR!FltpPerformPreCallbacks+0x2ec
  92. ffffd600`a7fde900 fffff80d`6be036d8 : ffffa287`ec2536d0 ffffd600`a7fde9d0 ffffa287`ec2536d0 ffffd600`a7fde9e0 : FLTMGR!FltpPassThroughInternal+0x8c
  93. ffffd600`a7fde930 fffff80d`6be034be : ffffffff`fffe7960 ffffa287`e5e66d70 00000000`00000000 00000000`00000000 : FLTMGR!FltpPassThrough+0x168
  94. ffffd600`a7fde9b0 fffff802`b2d2083f : ffffa287`f898f520 00000000`00000000 00000000`00000000 fffff802`b2d4beee : FLTMGR!FltpDispatch+0x9e
  95. ffffd600`a7fdea10 fffff802`b2d2fe48 : 00000000`00007fff ffffa287`e4551080 00000000`00000000 ffffa287`f898f500 : nt!IopCloseFile+0x14f
  96. ffffd600`a7fdeaa0 fffff802`b2d31e6b : 00000000`00000000 00000000`00000000 00000000`0009ef58 00000000`0453e020 : nt!ObCloseHandleTableEntry+0x228
  97. ffffd600`a7fdebe0 fffff802`b2a03413 : ffffa287`e8c3a080 00000000`77447b60 00000000`00000000 00000000`002d9000 : nt!NtClose+0xcb
  98. ffffd600`a7fdec40 00000000`572f21cc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
  99. 00000000`0009ef08 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x572f21cc
  100. STACK_COMMAND: kb
  101. CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
  102. fffff802b28ff84f - nt!MmMapLockedPagesSpecifyCache+ff
  103. [ f6:d5 ]
  104. fffff802b28ff8f4 - nt!MmMapLockedPagesSpecifyCache+1a4 (+0xa5)
  105. [ f6:d5 ]
  106. fffff802b28ff904-fffff802b28ff906 3 bytes - nt!MmMapLockedPagesSpecifyCache+1b4 (+0x10)
  107. [ 40 fb f6:c0 ea d5 ]
  108. 5 errors : !nt (fffff802b28ff84f-fffff802b28ff906)
  109. MODULE_NAME: memory_corruption
  110.  
  111. IMAGE_NAME: memory_corruption
  112.  
  113. FOLLOWUP_NAME: memory_corruption
  114. DEBUG_FLR_IMAGE_TIMESTAMP: 0
  115. MEMORY_CORRUPTOR: LARGE
  116. FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
  117. BUCKET_ID: MEMORY_CORRUPTION_LARGE
  118. PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
  119. TARGET_TIME: 2017-07-31T12:13:28.000Z
  120. OSBUILD: 15063
  121. OSSERVICEPACK: 483
  122. SERVICEPACK_NUMBER: 0
  123. OS_REVISION: 0
  124. SUITE_MASK: 784
  125. PRODUCT_TYPE: 1
  126. OSPLATFORM_TYPE: x64
  127. OSNAME: Windows 10
  128. OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
  129. USER_LCID: 0
  130. OSBUILD_TIMESTAMP: 2017-07-07 02:06:35
  131. BUILDDATESTAMP_STR: 160101.0800
  132. BUILDLAB_STR: WinBuild
  133. BUILDOSVER_STR: 10.0.15063.483
  134. ANALYSIS_SESSION_ELAPSED_TIME: 293b
  135. ANALYSIS_SOURCE: KM
  136. FAILURE_ID_HASH_STRING: km:memory_corruption_large
  137. FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
  138. Followup: memory_corruption
  139.  
  140. ========================================================================
  141. ============================== Drivers ===============================
  142. ========================================================================
  143. Image path: \SystemRoot\System32\Drivers\PxHlpa64.sys
  144. Image name: PxHlpa64.sys
  145. Info Link : http://www.carrona.org/drivers/driver.php?id=PxHlpa64.sys
  146. ADA Info : Sonic CD/DVD driver
  147. Timestamp : Tue Jun 23 2009
  148.  
  149. Image path: \SystemRoot\System32\Drivers\dump_ahcix64s.sys
  150. Image name: dump_ahcix64s.sys
  151. Info Link : http://www.carrona.org/drivers/driver.php?id=dump_ahcix64s.sys
  152. Timestamp : Fri Apr 4 2008
  153.  
  154. Image path: \SystemRoot\System32\drivers\ahcix64s.sys
  155. Image name: ahcix64s.sys
  156. Info Link : http://www.carrona.org/drivers/driver.php?id=ahcix64s.sys
  157. Timestamp : Fri Apr 4 2008
  158.  
  159. Image path: \SystemRoot\system32\drivers\fortknoxfw.sys
  160. Image name: fortknoxfw.sys
  161. Info Link : http://www.carrona.org/drivers/driver.php?id=fortknoxfw.sys
  162. Timestamp : Tue Dec 23 2014
  163.  
  164. Image path: \??\C:\ProgramData\Microsoft\Windows Defender\Definition Updates\{872245D0-50CF-46A6-BD0B-93BA1C490A24}\MpKsl1c788baa.sys
  165. Image name: MpKsl1c788baa.sys
  166. Info Link : http://www.carrona.org/drivers/driver.php?id=MpKsl1c788baa.sys
  167. Timestamp : Tue May 19 2015
  168.  
  169. Image path: \??\C:\ProgramData\Microsoft\Windows Defender\Definition Updates\{872245D0-50CF-46A6-BD0B-93BA1C490A24}\MpKsl00ef5985.sys
  170. Image name: MpKsl00ef5985.sys
  171. Info Link : http://www.carrona.org/drivers/driver.php?id=MpKsl00ef5985.sys
  172. Timestamp : Tue May 19 2015
  173.  
  174. Image path: \??\C:\ProgramData\Microsoft\Windows Defender\Definition Updates\{7B7D70AB-684B-4356-9F9E-090DEE574C10}\MpKsl71070fb6.sys
  175. Image name: MpKsl71070fb6.sys
  176. Info Link : http://www.carrona.org/drivers/driver.php?id=MpKsl71070fb6.sys
  177. Timestamp : Tue May 19 2015
  178.  
  179. Image path: \SystemRoot\system32\DRIVERS\atikmpag.sys
  180. Image name: atikmpag.sys
  181. Info Link : http://www.carrona.org/drivers/driver.php?id=atikmpag.sys
  182. ADA Info : ATI video card driver
  183. Timestamp : Tue Jan 13 2015
  184.  
  185. Image path: \SystemRoot\System32\drivers\rt640x64.sys
  186. Image name: rt640x64.sys
  187. Info Link : http://www.carrona.org/drivers/driver.php?id=rt640x64.sys
  188. ADA Info : Realtek NICDRV 8169 PCIe GBE Family Controller driver http://www.realtek.com.tw
  189. Timestamp : Fri May 26 2017
  190.  
  191. Image path: \SystemRoot\system32\drivers\RTKVHD64.sys
  192. Image name: RTKVHD64.sys
  193. Info Link : http://www.carrona.org/drivers/driver.php?id=RTKVHD64.sys
  194. ADA Info : Realtek Audio Driver system driver http://www.realtek.com.tw
  195. Timestamp : Tue Jun 19 2012
  196.  
  197. Image path: \SystemRoot\system32\DRIVERS\atikmdag.sys
  198. Image name: atikmdag.sys
  199. Info Link : http://www.carrona.org/drivers/driver.php?id=atikmdag.sys
  200. Timestamp : Tue Jan 13 2015
  201.  
  202. Unloaded modules:
  203. fffff80d`6e5a0000 fffff80d`6e5dd000 WUDFRd.sys
  204. fffff80d`6e510000 fffff80d`6e54d000 WUDFRd.sys
  205. fffff80d`6e7c0000 fffff80d`6e7fd000 WUDFRd.sys
  206. fffff80d`6e780000 fffff80d`6e7bd000 WUDFRd.sys
  207. fffff80d`6e5b0000 fffff80d`6e5ed000 WUDFRd.sys
  208. fffff80d`6e570000 fffff80d`6e5ad000 WUDFRd.sys
  209. fffff80d`6e510000 fffff80d`6e54d000 WUDFRd.sys
  210. fffff80d`6e4c0000 fffff80d`6e4dc000 EhStorClass.
  211. fffff80d`70190000 fffff80d`7019b000 cldflt.sys
  212. fffff80d`6d310000 fffff80d`6d31f000 dump_storpor
  213. fffff80d`6c6a0000 fffff80d`6c70f000 dump_ahcix64
  214. fffff80d`6c730000 fffff80d`6c74d000 dump_dumpfve
  215. fffff80d`6fd70000 fffff80d`6fd8c000 EhStorClass.
  216. fffff80d`6fc90000 fffff80d`6fcac000 EhStorClass.
  217. fffff80d`6fc70000 fffff80d`6fc8c000 EhStorClass.
  218. fffff80d`6fc50000 fffff80d`6fc6c000 EhStorClass.
  219. fffff80d`6fc30000 fffff80d`6fc4c000 EhStorClass.
  220. fffff80d`6c5c0000 fffff80d`6c5dc000 EhStorClass.
  221. fffff80d`6deb0000 fffff80d`6ded0000 dam.sys
  222. fffff80d`6c2f0000 fffff80d`6c2ff000 WdBoot.sys
  223. fffff80d`6d220000 fffff80d`6d22f000 hwpolicy.sys
  224.  
  225. ========================================================================
  226. ============================== BIOS INFO =============================
  227. ========================================================================
  228. [SMBIOS Data Tables v2.6]
  229. [DMI Version - 0]
  230. [2.0 Calling Convention - No]
  231. [Table Size - 3291 bytes]
  232. [BIOS Information (Type 0) - Length 24 - Handle 0000h]
  233. Vendor American Megatrends Inc.
  234. BIOS Version 5.12
  235. BIOS Starting Address Segment f000
  236. BIOS Release Date 05/21/2010
  237. BIOS ROM Size 100000
  238. BIOS Characteristics
  239. 04: - ISA Supported
  240. 07: - PCI Supported
  241. 09: - Plug and Play Supported
  242. 11: - Upgradeable FLASH BIOS
  243. 12: - BIOS Shadowing Supported
  244. 14: - ESCD Supported
  245. 15: - CD-Boot Supported
  246. 16: - Selectable Boot Supported
  247. 17: - BIOS ROM Socketed
  248. 19: - EDD Supported
  249. 23: - 1.2MB Floppy Supported
  250. 24: - 720KB Floppy Supported
  251. 25: - 2.88MB Floppy Supported
  252. 26: - Print Screen Device Supported
  253. 27: - Keyboard Services Supported
  254. 28: - Serial Services Supported
  255. 29: - Printer Services Supported
  256. 30: - CGA/Mono Services Supported
  257. 32: - BIOS Vendor Reserved
  258. 48: - System Vendor Reserved
  259. BIOS Characteristic Extensions
  260. 00: - ACPI Supported
  261. 01: - USB Legacy Supported
  262. 04: - LS120-Boot Supported
  263. 05: - ATAPI ZIP-Boot Supported
  264. 08: - BIOS Boot Specification Supported
  265. 09: - Fn-Key NET-Boot Supported
  266. 10: - Specification Reserved
  267. BIOS Major Revision 5
  268. BIOS Minor Revision 18
  269. EC Firmware Major Revision 255
  270. EC Firmware Minor Revision 255
  271. [System Information (Type 1) - Length 27 - Handle 0001h]
  272. Manufacturer HP-Pavilion
  273. Product Name AY614AAR-ABA p6347c
  274. UUID 00000000-0000-0000-0000-000000000000
  275. Wakeup Type Power Switch
  276. SKUNumber AY614AAR#ABA
  277. Family 103C_53316J
  278. [BaseBoard Information (Type 2) - Length 15 - Handle 0002h]
  279. Manufacturer FOXCONN
  280. Product ALOE
  281. Version 1.01
  282. Feature Flags 09h
  283. Location
  284. Chassis Handle 0003h
  285. Board Type 0ah - Processor/Memory Module
  286. Number of Child Handles 0
  287. [System Enclosure (Type 3) - Length 21 - Handle 0003h]
  288. Manufacturer Hewlett-Packard
  289. Chassis Type Desktop
  290. Bootup State Safe
  291. Power Supply State Safe
  292. Thermal State Safe
  293. Security Status None
  294. OEM Defined 0
  295. Height 0U
  296. Number of Power Cords 1
  297. Number of Contained Elements 0
  298. Contained Element Size 0
  299. [Processor Information (Type 4) - Length 42 - Handle 0004h]
  300. Socket Designation CPU 1
  301. Processor Type Central Processor
  302. Processor Family edh - Specification Reserved
  303. Processor Manufacturer AMD
  304. Processor ID 520f1000fffb8b17
  305. Processor Version AMD Athlon(tm) II X4 630 Processor
  306. Processor Voltage 8fh - 1.5V
  307. External Clock 200MHz
  308. Max Speed 2800MHz
  309. Current Speed 2800MHz
  310. Status Enabled Populated
  311. Processor Upgrade Other
  312. L1 Cache Handle 0005h
  313. L2 Cache Handle 0006h
  314. L3 Cache Handle 0007h
  315. Part Number
  316. [Cache Information (Type 7) - Length 19 - Handle 0005h]
  317. Socket Designation L1-Cache
  318. Cache Configuration 0280h - Varies Enabled Int NonSocketed L1
  319. Maximum Cache Size 0200h - 512K
  320. Installed Size 0200h - 512K
  321. Supported SRAM Type 0010h - Pipeline-Burst
  322. Current SRAM Type 0010h - Pipeline-Burst
  323. Cache Speed 0ns
  324. Error Correction Type Multi-Bit ECC
  325. System Cache Type Specification Reserved
  326. Associativity 4-way Set-Associative
  327. [Cache Information (Type 7) - Length 19 - Handle 0006h]
  328. Socket Designation L2-Cache
  329. Cache Configuration 0281h - Varies Enabled Int NonSocketed L2
  330. Maximum Cache Size 0800h - 2048K
  331. Installed Size 0800h - 2048K
  332. Supported SRAM Type 0010h - Pipeline-Burst
  333. Current SRAM Type 0010h - Pipeline-Burst
  334. Cache Speed 0ns
  335. Error Correction Type Multi-Bit ECC
  336. System Cache Type Specification Reserved
  337. Associativity 4-way Set-Associative
  338. [Cache Information (Type 7) - Length 19 - Handle 0007h]
  339. Socket Designation L3-Cache
  340. Cache Configuration 0302h - Unknown Disabled Int NonSocketed L3
  341. Maximum Cache Size 0000h - 0K
  342. Installed Size 0000h - 0K
  343. Supported SRAM Type 0002h - Unknown
  344. Current SRAM Type 0002h - Unknown
  345. Cache Speed 0ns
  346. Error Correction Type Unknown
  347. System Cache Type Unknown
  348. Associativity Unknown
  349. [OEM Strings (Type 11) - Length 5 - Handle 000dh]
  350. Number of Strings 32
  351. 1 bid=A1NAv6PrA3;PROD_MSWORKS;SFCHK;DLED;IS.N60d;ACPwrFail=Off;Cha
  352. 2 n=Refurb;CPUFan=On;DVDRW;LegacyFloppy=No;TVout=NTSC;PCBRAND=Pavi
  353. 3 lion;OS=MSV;LScribe;DVDP_STD;Vos.P;PROD_MSOFFHST;FPA=HM;C_VEN2;C
  354. 4 DS_D;SW_Main;.B2;##HPCPC=00000000<900000060200000004200002535141
  355. 5 30040000010001000;5;:0665<;85>18>1<2=1:<55>?4;;=?=19:<8494;>:801
  356. 6 1<=31953=?76?>378139;594701:=;34:;55;9128<7937==0<722<:<1:2489>:
  357. 7 088=6:?1;2>8=8>12691>>286:9?;4454>3<3>89909>=738375;02951<;>=??2
  358. 8 ?70>75;04<815:33<20846?312127;?24876>7488457<0;0?39>9;?407;8;8;0
  359. 9 9>=;==>231>;?456:100000006;00000000002000840515?454=435<49434=23
  360. 10 405347594>444?47535021000200000000000000000000000000000000000176
  361. 11 0:<4;1?6??6:=:30393:=<:8>0733583=1;7=7:?6417;:83==335:93?179=82=
  362. 12 3<6<7:36018=:=05>2<7:76>9><?3=?3326<44;;515?5:05223?9=731563>:5>
  363. 13 :>:3?;752183168?<4641;15?1?:6;<46:36<39?682>03534:144>:?44867648
  364. 14 =32?5=6=56:3246?<8338;8?=?=<2:3?3<237?=6>8;=91=3;>??;>?0;<37=
  365. [Physical Memory Array (Type 16) - Length 15 - Handle 0010h]
  366. Location 03h - SystemBoard/Motherboard
  367. Use 03h - System Memory
  368. Memory Error Correction 03h - None
  369. Maximum Capacity 16777216KB
  370. Number of Memory Devices 4
  371. [Memory Array Mapped Address (Type 19) - Length 15 - Handle 0011h]
  372. Starting Address 00000000h
  373. Ending Address 0103ffffh
  374. Memory Array Handle 0010h
  375. Partition Width 01
  376. [Memory Device (Type 17) - Length 28 - Handle 0012h]
  377. Physical Memory Array Handle 0010h
  378. Total Width 64 bits
  379. Data Width 64 bits
  380. Size 4096MB
  381. Form Factor 09h - DIMM
  382. Device Locator DIMM1
  383. Bank Locator BANK0
  384. Memory Type 18h - Specification Reserved
  385. Type Detail 0080h - Synchronous
  386. Speed 1066MHz
  387. Manufacturer Manufacturer00
  388. Part Number CT51264BD160B.C16F
  389. [Memory Device (Type 17) - Length 28 - Handle 0013h]
  390. Physical Memory Array Handle 0010h
  391. Total Width 64 bits
  392. Data Width 64 bits
  393. Size 4096MB
  394. Form Factor 09h - DIMM
  395. Device Locator DIMM2
  396. Bank Locator BANK1
  397. Memory Type 18h - Specification Reserved
  398. Type Detail 0080h - Synchronous
  399. Speed 1066MHz
  400. Manufacturer Manufacturer01
  401. Part Number CT51264BD160B.C16F
  402. [Memory Device (Type 17) - Length 28 - Handle 0014h]
  403. Physical Memory Array Handle 0010h
  404. Total Width 64 bits
  405. Data Width 64 bits
  406. Size 4096MB
  407. Form Factor 09h - DIMM
  408. Device Locator DIMM3
  409. Bank Locator BANK2
  410. Memory Type 18h - Specification Reserved
  411. Type Detail 0080h - Synchronous
  412. Speed 1066MHz
  413. Manufacturer Manufacturer02
  414. Part Number CT51264BD160B.C16F
  415. [Memory Device (Type 17) - Length 28 - Handle 0015h]
  416. Physical Memory Array Handle 0010h
  417. Total Width 64 bits
  418. Data Width 64 bits
  419. Size 4096MB
  420. Form Factor 09h - DIMM
  421. Device Locator DIMM4
  422. Bank Locator BANK3
  423. Memory Type 18h - Specification Reserved
  424. Type Detail 0080h - Synchronous
  425. Speed 1066MHz
  426. Manufacturer Manufacturer03
  427. Part Number CT51264BD160B.C16F
  428.  
  429. ========================================================================
  430. =================== Dump File: 080117-8875-01.dmp ====================
  431. ========================================================================
  432. Mini Kernel Dump File: Only registers and stack trace are available
  433. Windows 10 Kernel Version 15063 MP (4 procs) Free x64
  434. Product: WinNt, suite: TerminalServer SingleUserTS Personal
  435. Built by: 15063.0.amd64fre.rs2_release.170317-1834
  436. Kernel base = 0xfffff800`5480b000 PsLoadedModuleList = 0xfffff800`54b575e0
  437. Debug session time: Tue Aug 1 00:52:43.902 2017 (UTC - 4:00)
  438. System Uptime: 0 days 13:40:43.655
  439.  
  440. BugCheck A, {1, ff, 86, fffff8005486c9ff}
  441. Probably caused by : win32kbase.sys ( win32kbase!EnterSharedCrit+41 )
  442. Followup: MachineOwner
  443.  
  444. IRQL_NOT_LESS_OR_EQUAL (a)
  445. An attempt was made to access a pageable (or completely invalid) address at an
  446. interrupt request level (IRQL) that is too high. This is usually
  447. caused by drivers using improper addresses.
  448. If a kernel debugger is available get the stack backtrace.
  449.  
  450. Arguments:
  451. Arg1: 0000000000000001, memory referenced
  452. Arg2: 00000000000000ff, IRQL
  453. Arg3: 0000000000000086, bitfield :
  454. bit 0 : value 0 = read operation, 1 = write operation
  455. bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
  456. Arg4: fffff8005486c9ff, address which referenced memory
  457.  
  458. Debugging Details:
  459. DUMP_CLASS: 1
  460. DUMP_QUALIFIER: 400
  461. BUILD_VERSION_STRING: 10.0.15063.483 (WinBuild.160101.0800)
  462. SYSTEM_MANUFACTURER: HP-Pavilion
  463. SYSTEM_PRODUCT_NAME: AY614AAR-ABA p6347c
  464. SYSTEM_SKU: AY614AAR#ABA
  465. BIOS_VENDOR: American Megatrends Inc.
  466. BIOS_VERSION: 5.12
  467. BIOS_DATE: 05/21/2010
  468. BASEBOARD_MANUFACTURER: FOXCONN
  469. BASEBOARD_PRODUCT: ALOE
  470. BASEBOARD_VERSION: 1.01
  471. DUMP_TYPE: 2
  472. READ_ADDRESS: fffff80054bec358: Unable to get MiVisibleState
  473. 0000000000000001
  474. CURRENT_IRQL: 0
  475. FAULTING_IP:
  476. nt!ExpAcquireResourceSharedLite+9f
  477. fffff800`5486c9ff 8b4b40 mov ecx,dword ptr [rbx+40h]
  478. CPU_COUNT: 4
  479. CPU_MHZ: af0
  480. CPU_VENDOR: AuthenticAMD
  481. CPU_FAMILY: 10
  482. CPU_MODEL: 5
  483. CPU_STEPPING: 2
  484. CUSTOMER_CRASH_COUNT: 1
  485. DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
  486. BUGCHECK_STR: AV
  487.  
  488. PROCESS_NAME: BlueIris.exe
  489.  
  490. TRAP_FRAME: ffffe680b2994960 -- (.trap 0xffffe680b2994960)
  491. NOTE: The trap frame does not contain all registers.
  492. Some register values may be zeroed or incorrect.
  493. rax=0000000000000000 rbx=0000000000000000 rcx=ffffd68560c2ce00
  494. rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
  495. rip=fffff8005486c9ff rsp=ffffe680b2994af0 rbp=ffffe680b2994b60
  496. r8=000000000000001f r9=0000000000000020 r10=000000002a080e6d
  497. r11=00000000002b8000 r12=0000000000000000 r13=0000000000000000
  498. r14=0000000000000000 r15=0000000000000000
  499. iopl=0 nv up di pl zr na po nc
  500. nt!ExpAcquireResourceSharedLite+0x9f:
  501. fffff800`5486c9ff 8b4b40 mov ecx,dword ptr [rbx+40h] ds:00000000`00000040=????????
  502. Resetting default scope
  503. LAST_CONTROL_TRANSFER: from fffff800549828a9 to fffff800549774c0
  504. STACK_TEXT:
  505. ffffe680`b2994818 fffff800`549828a9 : 00000000`0000000a 00000000`00000001 00000000`000000ff 00000000`00000086 : nt!KeBugCheckEx
  506. ffffe680`b2994820 fffff800`54980e7d : 00000000`00000001 00000000`00000000 00000000`00000001 ffffb45d`00007f68 : nt!KiBugCheckDispatch+0x69
  507. ffffe680`b2994960 fffff800`5486c9ff : 00000000`00000000 00000000`00000000 00000000`004c8618 00000000`00000000 : nt!KiPageFault+0x23d
  508. ffffe680`b2994af0 fffff800`5486bf5a : 00000000`00000002 ffffd685`60c2ce00 00000000`00000000 00000000`00000000 : nt!ExpAcquireResourceSharedLite+0x9f
  509. ffffe680`b2994b90 ffffb410`59bd1de1 : 00000000`00000000 00000000`00da7a64 00000000`00000001 00000000`0c69013e : nt!ExEnterCriticalRegionAndAcquireResourceShared+0x4a
  510. ffffe680`b2994bd0 ffffb410`598df205 : ffffd685`627d6080 00000000`00000001 00000000`00000000 00000000`00000000 : win32kbase!EnterSharedCrit+0x41
  511. ffffe680`b2994c10 fffff800`54982413 : ffffd685`627d6080 ffffe680`b2994cc0 00000000`00000000 ffffd685`6396a501 : win32kfull!NtUserGetThreadState+0x25
  512. ffffe680`b2994c40 00007ffb`131d1084 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
  513. 00000000`02b5fcc8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`131d1084
  514. STACK_COMMAND: kb
  515. THREAD_SHA1_HASH_MOD_FUNC: 6a927fddb47682dfab6f44c23a0a39729d9003ed
  516. THREAD_SHA1_HASH_MOD_FUNC_OFFSET: df254e815f7e7a2c8b07071483939b24a0995596
  517. THREAD_SHA1_HASH_MOD: a1065c0f1e29b9ea5565121504105574f7d99b4b
  518. FOLLOWUP_IP:
  519. win32kbase!EnterSharedCrit+41
  520. ffffb410`59bd1de1 4885c0 test rax,rax
  521. FAULT_INSTR_CODE: 74c08548
  522. SYMBOL_STACK_INDEX: 5
  523. SYMBOL_NAME: win32kbase!EnterSharedCrit+41
  524. FOLLOWUP_NAME: MachineOwner
  525. MODULE_NAME: win32kbase
  526.  
  527. IMAGE_NAME: win32kbase.sys
  528.  
  529. DEBUG_FLR_IMAGE_TIMESTAMP: 2cddd6b0
  530. IMAGE_VERSION: 10.0.15063.477
  531. BUCKET_ID_FUNC_OFFSET: 41
  532. FAILURE_BUCKET_ID: OLD_IMAGE_win32kbase.sys
  533. BUCKET_ID: OLD_IMAGE_win32kbase.sys
  534. PRIMARY_PROBLEM_CLASS: OLD_IMAGE_win32kbase.sys
  535. TARGET_TIME: 2017-08-01T04:52:43.000Z
  536. OSBUILD: 15063
  537. OSSERVICEPACK: 483
  538. SERVICEPACK_NUMBER: 0
  539. OS_REVISION: 0
  540. SUITE_MASK: 784
  541. PRODUCT_TYPE: 1
  542. OSPLATFORM_TYPE: x64
  543. OSNAME: Windows 10
  544. OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
  545. USER_LCID: 0
  546. OSBUILD_TIMESTAMP: 2017-07-07 02:06:35
  547. BUILDDATESTAMP_STR: 160101.0800
  548. BUILDLAB_STR: WinBuild
  549. BUILDOSVER_STR: 10.0.15063.483
  550. ANALYSIS_SESSION_ELAPSED_TIME: 93d
  551. ANALYSIS_SOURCE: KM
  552. FAILURE_ID_HASH_STRING: km:old_image_win32kbase.sys
  553. FAILURE_ID_HASH: {3f13b969-b4cb-c469-0e86-f8eab9a812e6}
  554. Followup: MachineOwner
  555.  
  556. ========================================================================
  557. =================== Dump File: 080217-12562-01.dmp ===================
  558. ========================================================================
  559. Mini Kernel Dump File: Only registers and stack trace are available
  560. Windows 10 Kernel Version 15063 MP (4 procs) Free x64
  561. Product: WinNt, suite: TerminalServer SingleUserTS Personal
  562. Built by: 15063.0.amd64fre.rs2_release.170317-1834
  563. Kernel base = 0xfffff803`1dc80000 PsLoadedModuleList = 0xfffff803`1dfcc5e0
  564. Debug session time: Wed Aug 2 22:54:24.662 2017 (UTC - 4:00)
  565. System Uptime: 1 days 22:00:15.416
  566.  
  567. BugCheck 1A, {411, ffffce7e6c6080b8, 810000015b491874, ffff940491ae20b8}
  568. Probably caused by : memory_corruption
  569. Followup: memory_corruption
  570.  
  571. MEMORY_MANAGEMENT (1a)
  572. # Any other values for parameter 1 must be individually examined.
  573.  
  574. Arguments:
  575. Arg1: 0000000000000411, The subtype of the bugcheck.
  576. Arg2: ffffce7e6c6080b8
  577. Arg3: 810000015b491874
  578. Arg4: ffff940491ae20b8
  579.  
  580. Debugging Details:
  581. DUMP_CLASS: 1
  582. DUMP_QUALIFIER: 400
  583. BUILD_VERSION_STRING: 10.0.15063.483 (WinBuild.160101.0800)
  584. SYSTEM_MANUFACTURER: HP-Pavilion
  585. SYSTEM_PRODUCT_NAME: AY614AAR-ABA p6347c
  586. SYSTEM_SKU: AY614AAR#ABA
  587. BIOS_VENDOR: American Megatrends Inc.
  588. BIOS_VERSION: 5.12
  589. BIOS_DATE: 05/21/2010
  590. BASEBOARD_MANUFACTURER: FOXCONN
  591. BASEBOARD_PRODUCT: ALOE
  592. BASEBOARD_VERSION: 1.01
  593. DUMP_TYPE: 2
  594. BUGCHECK_STR: 0x1a_411
  595. CPU_COUNT: 4
  596. CPU_MHZ: af0
  597. CPU_VENDOR: AuthenticAMD
  598. CPU_FAMILY: 10
  599. CPU_MODEL: 5
  600. CPU_STEPPING: 2
  601. CUSTOMER_CRASH_COUNT: 1
  602. DEFAULT_BUCKET_ID: CODE_CORRUPTION
  603.  
  604. PROCESS_NAME: bzbui.exe
  605.  
  606. CURRENT_IRQL: 2
  607. TRAP_FRAME: ffff8100dc3f2720 -- (.trap 0xffff8100dc3f2720)
  608. NOTE: The trap frame does not contain all registers.
  609. Some register values may be zeroed or incorrect.
  610. rax=fffffcd8c0b37c00 rbx=0000000000000000 rcx=fffffcd8c1017fd0
  611. rdx=fffffcd8c0b38ab0 rsi=0000000000000000 rdi=0000000000000000
  612. rip=fffffc948fc4d4e9 rsp=ffff8100dc3f28b0 rbp=0000000000000001
  613. r8=0000000000000001 r9=0000000000000000 r10=0000000000000000
  614. r11=ffffd08d4bea3080 r12=0000000000000000 r13=0000000000000000
  615. r14=0000000000000000 r15=0000000000000000
  616. iopl=0 nv up ei pl zr na po nc
  617. win32kfull!xxxRealSleepThread+0xc9:
  618. fffffc94`8fc4d4e9 0fb74104 movzx eax,word ptr [rcx+4] ds:fffffcd8`c1017fd4=0210
  619. Resetting default scope
  620. LAST_CONTROL_TRANSFER: from fffff8031de26017 to fffff8031ddec4c0
  621. STACK_TEXT:
  622. ffff8100`dc3f22d8 fffff803`1de26017 : 00000000`0000001a 00000000`00000411 ffffce7e`6c6080b8 81000001`5b491874 : nt!KeBugCheckEx
  623. ffff8100`dc3f22e0 fffff803`1dd0ea38 : fffffcd8`c1017fd4 ffffce7e`6c6080b8 00000000`00000001 ffff8100`d985abc0 : nt!MiResolveTransitionFault+0x10d157
  624. ffff8100`dc3f23b0 fffff803`1dd0ce63 : 00000000`c0000016 fffffcd8`c1017fd4 ffff8100`dc3f2720 ffffd08d`4bc907c0 : nt!MiDispatchFault+0xc88
  625. ffff8100`dc3f2530 fffff803`1ddf5d72 : 00000000`00000000 ffff8100`d8a19180 ffffd08d`4bea3080 fffff803`1dcb3401 : nt!MmAccessFault+0x673
  626. ffff8100`dc3f2720 fffffc94`8fc4d4e9 : fffffcd8`c0b38ab0 00000000`00000000 fffffcd8`c0b38a01 fffff803`00000000 : nt!KiPageFault+0x132
  627. ffff8100`dc3f28b0 fffffc94`8fc4d377 : fffff780`00000320 fffffcd8`c0b38ab0 00000000`00000000 fffffc94`8fc51af3 : win32kfull!xxxRealSleepThread+0xc9
  628. ffff8100`dc3f29e0 fffffc94`8fc509c9 : fffffcd8`c0b38ab0 ffff8100`dc3f2cc0 00000000`00000000 00000000`00000000 : win32kfull!xxxSleepThread2+0x97
  629. ffff8100`dc3f2a30 fffffc94`8fc4df5c : ffff8100`dc3f2be8 00000000`0000c240 00000000`00000000 00000000`00000000 : win32kfull!xxxRealInternalGetMessage+0x919
  630. ffff8100`dc3f2ba0 fffff803`1ddf7413 : ffffd08d`4bea3080 00000000`740979c0 00000000`00000020 00000000`002ec000 : win32kfull!NtUserGetMessage+0x8c
  631. ffff8100`dc3f2c40 00000000`740a1944 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
  632. 00000000`0009e5e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x740a1944
  633. STACK_COMMAND: kb
  634. CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
  635. fffff8031dd0eac8 - nt!MiDispatchFault+d18
  636. [ fa:e2 ]
  637. 1 error : !nt (fffff8031dd0eac8)
  638. MODULE_NAME: memory_corruption
  639.  
  640. IMAGE_NAME: memory_corruption
  641.  
  642. FOLLOWUP_NAME: memory_corruption
  643. DEBUG_FLR_IMAGE_TIMESTAMP: 0
  644. MEMORY_CORRUPTOR: ONE_BYTE
  645. FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BYTE
  646. BUCKET_ID: MEMORY_CORRUPTION_ONE_BYTE
  647. PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_ONE_BYTE
  648. TARGET_TIME: 2017-08-03T02:54:24.000Z
  649. OSBUILD: 15063
  650. OSSERVICEPACK: 483
  651. SERVICEPACK_NUMBER: 0
  652. OS_REVISION: 0
  653. SUITE_MASK: 784
  654. PRODUCT_TYPE: 1
  655. OSPLATFORM_TYPE: x64
  656. OSNAME: Windows 10
  657. OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
  658. USER_LCID: 0
  659. OSBUILD_TIMESTAMP: 2017-07-07 02:06:35
  660. BUILDDATESTAMP_STR: 160101.0800
  661. BUILDLAB_STR: WinBuild
  662. BUILDOSVER_STR: 10.0.15063.483
  663. ANALYSIS_SESSION_ELAPSED_TIME: 292d
  664. ANALYSIS_SOURCE: KM
  665. FAILURE_ID_HASH_STRING: km:memory_corruption_one_byte
  666. FAILURE_ID_HASH: {ad110d6a-3b33-2c0a-c931-570eae1ba92d}
  667. Followup: memory_corruption
  668.  
  669. ========================================================================
  670. =================== Dump File: 080317-10359-01.dmp ===================
  671. ========================================================================
  672. Could not match Dump File signature - invalid file format
  673. Could not open dump file [C:\Users\UserName\Desktop\New folder\080317-10359-01.dmp], Win32 error 0n87
  674. "The parameter is incorrect."
  675. Debuggee initialization failed, Win32 error 0n87
  676. The parameter is incorrect.
  677.  
  678. ========================================================================
  679. =================== Dump File: 080317-11218-01.dmp ===================
  680. ========================================================================
  681. Mini Kernel Dump File: Only registers and stack trace are available
  682. Windows 10 Kernel Version 15063 MP (4 procs) Free x64
  683. Product: WinNt, suite: TerminalServer SingleUserTS Personal
  684. Built by: 15063.0.amd64fre.rs2_release.170317-1834
  685. Kernel base = 0xfffff801`d9216000 PsLoadedModuleList = 0xfffff801`d95625e0
  686. Debug session time: Thu Aug 3 19:06:37.399 2017 (UTC - 4:00)
  687. System Uptime: 0 days 20:10:33.154
  688.  
  689. BugCheck 4E, {2, 3f6bef, 41ffff, 1}
  690. Probably caused by : memory_corruption
  691. Followup: memory_corruption
  692.  
  693. PFN_LIST_CORRUPT (4e)
  694. Typically caused by drivers passing bad memory descriptor lists (ie: calling
  695. MmUnlockPages twice with the same list, etc). If a kernel debugger is
  696. available get the stack trace.
  697.  
  698. Arguments:
  699. Arg1: 0000000000000002, A list entry was corrupt
  700. Arg2: 00000000003f6bef, entry in list being removed
  701. Arg3: 000000000041ffff, highest physical page number
  702. Arg4: 0000000000000001, reference count of entry being removed
  703.  
  704. Debugging Details:
  705. DUMP_CLASS: 1
  706. DUMP_QUALIFIER: 400
  707. BUILD_VERSION_STRING: 10.0.15063.483 (WinBuild.160101.0800)
  708. SYSTEM_MANUFACTURER: HP-Pavilion
  709. SYSTEM_PRODUCT_NAME: AY614AAR-ABA p6347c
  710. SYSTEM_SKU: AY614AAR#ABA
  711. BIOS_VENDOR: American Megatrends Inc.
  712. BIOS_VERSION: 5.12
  713. BIOS_DATE: 05/21/2010
  714. BASEBOARD_MANUFACTURER: FOXCONN
  715. BASEBOARD_PRODUCT: ALOE
  716. BASEBOARD_VERSION: 1.01
  717. DUMP_TYPE: 2
  718. BUGCHECK_STR: 0x4E_2
  719. CPU_COUNT: 4
  720. CPU_MHZ: af0
  721. CPU_VENDOR: AuthenticAMD
  722. CPU_FAMILY: 10
  723. CPU_MODEL: 5
  724. CPU_STEPPING: 2
  725. CUSTOMER_CRASH_COUNT: 1
  726. DEFAULT_BUCKET_ID: CODE_CORRUPTION
  727.  
  728. PROCESS_NAME: firefox.exe
  729.  
  730. CURRENT_IRQL: 2
  731. LAST_CONTROL_TRANSFER: from fffff801d93bc49b to fffff801d93824c0
  732. STACK_TEXT:
  733. ffffb900`44d98688 fffff801`d93bc49b : 00000000`0000004e 00000000`00000002 00000000`003f6bef 00000000`0041ffff : nt!KeBugCheckEx
  734. ffffb900`44d98690 fffff801`d92af02c : ffffb900`00000000 fffff80b`00000000 00000000`00000000 ffffca8a`0656a200 : nt!MiUnlinkPageFromList+0x10c8cb
  735. ffffb900`44d98730 fffff801`d92a4a38 : ffffee3f`fca000b0 ffffee77`1ffe5000 ffff8485`49010101 ffffca8a`06dbc580 : nt!MiResolveTransitionFault+0x16c
  736. ffffb900`44d98800 fffff801`d92a3c1f : ffffb900`44d98bc0 ffff8485`4a6ae4c0 00000000`00000068 ffff8485`495b92e0 : nt!MiDispatchFault+0xc88
  737. ffffb900`44d98980 fffff801`d92a2adb : 00000000`00000014 00007ff9`40016fa0 ffffb900`44d98bb0 00000000`00000000 : nt!MiResolvePageTablePage+0x2af
  738. ffffb900`44d98a50 fffff801`d938bd72 : ffffca8a`070bd7c0 ffffca8a`000007d4 ffff8485`445538b0 ffff8485`445538b0 : nt!MmAccessFault+0x2eb
  739. ffffb900`44d98c40 00007ff9`40016fa0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x132
  740. 00000000`0c54e708 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`40016fa0
  741. STACK_COMMAND: kb
  742. CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
  743. fffff801d92a2afa-fffff801d92a2afc 3 bytes - nt!MmAccessFault+30a
  744. [ 40 fb f6:00 77 ee ]
  745. fffff801d92a2b08-fffff801d92a2b09 2 bytes - nt!MmAccessFault+318 (+0x0e)
  746. [ 80 f6:00 ee ]
  747. fffff801d92a3c79-fffff801d92a3c7a 2 bytes - nt!MiResolvePageTablePage+309 (+0x1171)
  748. [ 80 f6:00 ee ]
  749. fffff801d92a3c8d-fffff801d92a3c8e 2 bytes - nt!MiResolvePageTablePage+31d (+0x14)
  750. [ ff f6:7f ee ]
  751. fffff801d92a4ac7-fffff801d92a4ac8 2 bytes - nt!MiDispatchFault+d17 (+0xe3a)
  752. [ 80 fa:00 db ]
  753. fffff801d92af119-fffff801d92af11a 2 bytes - nt!MiResolveTransitionFault+259 (+0xa652)
  754. [ 80 f6:00 ee ]
  755. 13 errors : !nt (fffff801d92a2afa-fffff801d92af11a)
  756. MODULE_NAME: memory_corruption
  757.  
  758. IMAGE_NAME: memory_corruption
  759.  
  760. FOLLOWUP_NAME: memory_corruption
  761. DEBUG_FLR_IMAGE_TIMESTAMP: 0
  762. MEMORY_CORRUPTOR: LARGE
  763. FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
  764. BUCKET_ID: MEMORY_CORRUPTION_LARGE
  765. PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
  766. TARGET_TIME: 2017-08-03T23:06:37.000Z
  767. OSBUILD: 15063
  768. OSSERVICEPACK: 483
  769. SERVICEPACK_NUMBER: 0
  770. OS_REVISION: 0
  771. SUITE_MASK: 784
  772. PRODUCT_TYPE: 1
  773. OSPLATFORM_TYPE: x64
  774. OSNAME: Windows 10
  775. OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
  776. USER_LCID: 0
  777. OSBUILD_TIMESTAMP: 2017-07-07 02:06:35
  778. BUILDDATESTAMP_STR: 160101.0800
  779. BUILDLAB_STR: WinBuild
  780. BUILDOSVER_STR: 10.0.15063.483
  781. ANALYSIS_SESSION_ELAPSED_TIME: 29c0
  782. ANALYSIS_SOURCE: KM
  783. FAILURE_ID_HASH_STRING: km:memory_corruption_large
  784. FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
  785. Followup: memory_corruption
  786.  
  787. ========================================================================
  788. =================== Dump File: 072917-12156-01.dmp ===================
  789. ========================================================================
  790. Mini Kernel Dump File: Only registers and stack trace are available
  791. Windows 10 Kernel Version 15063 MP (4 procs) Free x64
  792. Product: WinNt, suite: TerminalServer SingleUserTS Personal
  793. Built by: 15063.0.amd64fre.rs2_release.170317-1834
  794. Kernel base = 0xfffff801`d4c7d000 PsLoadedModuleList = 0xfffff801`d4fc95e0
  795. Debug session time: Sat Jul 29 19:18:44.608 2017 (UTC - 4:00)
  796. System Uptime: 0 days 10:18:11.361
  797.  
  798. BugCheck 1000007E, {ffffffffc0000005, fffff801d4cff80e, ffffbc804fbefe98, ffffbc804fbef6e0}
  799. *** WARNING: Unable to verify timestamp for win32k.sys
  800. *** ERROR: Module load completed but symbols could not be loaded for win32k.sys
  801. Probably caused by : memory_corruption
  802. Followup: memory_corruption
  803.  
  804. SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
  805. This is a very common bugcheck. Usually the exception address pinpoints
  806. the driver/function that caused the problem. Always note this address
  807. as well as the link date of the driver/image that contains this address.
  808. Some common problems are exception code 0x80000003. This means a hard
  809. coded breakpoint or assertion was hit, but this system was booted
  810. /NODEBUG. This is not supposed to happen as developers should never have
  811. hardcoded breakpoints in retail code, but ...
  812. If this happens, make sure a debugger gets connected, and the
  813. system is booted /DEBUG. This will let us see why this breakpoint is
  814. happening.
  815.  
  816. Arguments:
  817. Arg1: ffffffffc0000005, The exception code that was not handled
  818. Arg2: fffff801d4cff80e, The address that the exception occurred at
  819. Arg3: ffffbc804fbefe98, Exception Record Address
  820. Arg4: ffffbc804fbef6e0, Context Record Address
  821.  
  822. Debugging Details:
  823. DUMP_CLASS: 1
  824. DUMP_QUALIFIER: 400
  825. BUILD_VERSION_STRING: 10.0.15063.483 (WinBuild.160101.0800)
  826. SYSTEM_MANUFACTURER: HP-Pavilion
  827. SYSTEM_PRODUCT_NAME: AY614AAR-ABA p6347c
  828. SYSTEM_SKU: AY614AAR#ABA
  829. BIOS_VENDOR: American Megatrends Inc.
  830. BIOS_VERSION: 5.12
  831. BIOS_DATE: 05/21/2010
  832. BASEBOARD_MANUFACTURER: FOXCONN
  833. BASEBOARD_PRODUCT: ALOE
  834. BASEBOARD_VERSION: 1.01
  835. DUMP_TYPE: 2
  836. EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
  837. FAULTING_IP:
  838. nt!MiDemoteCombinedPte+1e
  839. fffff801`d4cff80e 498378f001 cmp qword ptr [r8-10h],1
  840. EXCEPTION_RECORD: ffffbc804fbefe98 -- (.exr 0xffffbc804fbefe98)
  841. ExceptionAddress: fffff801d4cff80e (nt!MiDemoteCombinedPte+0x000000000000001e)
  842. ExceptionCode: c0000005 (Access violation)
  843. ExceptionFlags: 00000000
  844. NumberParameters: 2
  845. Parameter[0]: 0000000000000000
  846. Parameter[1]: ffffffffffffffff
  847. Attempt to read from address ffffffffffffffff
  848. CONTEXT: ffffbc804fbef6e0 -- (.cxr 0xffffbc804fbef6e0)
  849. rax=fffff59acd2dcc2f rbx=8e8e25565090047d rcx=fffff801d4ffb800
  850. rdx=ffffb772074bd080 rsi=ffffe40e97a10000 rdi=ffffbc804fbf0530
  851. rip=fffff801d4cff80e rsp=ffffbc804fbf00d0 rbp=fffff801d4fe64e0
  852. r8=8000000000000000 r9=0000000000000002 r10=ffffb8f002f1b000
  853. r11=0000000000000001 r12=0000000000000000 r13=0000000000000001
  854. r14=fffff801d4ffb800 r15=ffffb772074bd080
  855. iopl=0 nv up ei ng nz na pe nc
  856. cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010282
  857. nt!MiDemoteCombinedPte+0x1e:
  858. fffff801`d4cff80e 498378f001 cmp qword ptr [r8-10h],1 ds:002b:7fffffff`fffffff0=????????????????
  859. Resetting default scope
  860. CPU_COUNT: 4
  861. CPU_MHZ: af0
  862. CPU_VENDOR: AuthenticAMD
  863. CPU_FAMILY: 10
  864. CPU_MODEL: 5
  865. CPU_STEPPING: 2
  866. CUSTOMER_CRASH_COUNT: 1
  867. DEFAULT_BUCKET_ID: CODE_CORRUPTION
  868.  
  869. PROCESS_NAME: System
  870.  
  871. CURRENT_IRQL: 2
  872. ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
  873. EXCEPTION_CODE_STR: c0000005
  874. EXCEPTION_PARAMETER1: 0000000000000000
  875. EXCEPTION_PARAMETER2: ffffffffffffffff
  876. FOLLOWUP_IP:
  877. nt!MiDemoteCombinedPte+1e
  878. fffff801`d4cff80e 498378f001 cmp qword ptr [r8-10h],1
  879. READ_ADDRESS: fffff801d505e358: Unable to get MiVisibleState
  880. ffffffffffffffff
  881. BUGCHECK_STR: AV
  882. LAST_CONTROL_TRANSFER: from fffff801d4d03836 to fffff801d4cff80e
  883. STACK_TEXT:
  884. ffffbc80`4fbf00d0 fffff801`d4d03836 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiDemoteCombinedPte+0x1e
  885. ffffbc80`4fbf0190 fffff801`d4d02979 : fffff59a`00000001 00000000`00000000 00000000`00000005 00000000`00000002 : nt!MiAgePte+0x9c6
  886. ffffbc80`4fbf0210 fffff801`d4d02aa9 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff801`d4ffb800 : nt!MiWalkPageTablesRecursively+0x209
  887. ffffbc80`4fbf0290 fffff801`d4d02aa9 : fffff801`00000000 00000000`00000000 00000000`00000001 fffff801`d4ffb800 : nt!MiWalkPageTablesRecursively+0x339
  888. ffffbc80`4fbf0310 fffff801`d4d02aa9 : fffff801`00000000 00000000`00000000 00000000`00000002 fffff801`d4ffb800 : nt!MiWalkPageTablesRecursively+0x339
  889. ffffbc80`4fbf0390 fffff801`d4cff730 : 00000000`00000000 00000000`00000000 ffffbc80`00000003 fffff801`d4ffb800 : nt!MiWalkPageTablesRecursively+0x339
  890. ffffbc80`4fbf0410 fffff801`d4cff06b : 00000000`00000000 fffff801`d4cff350 ffffbc80`4fbf05b0 ffffbc80`00000000 : nt!MiWalkPageTables+0x210
  891. ffffbc80`4fbf04b0 fffff801`d4cfe9dd : 00000000`00000000 00000000`00000002 00000000`00000000 fffff801`d4dee62f : nt!MiAgeWorkingSet+0x2ab
  892. ffffbc80`4fbf0890 fffff801`d4d22530 : ffffd183`00000000 ffffbc80`4fbf0bc0 fffff801`d4ffb818 00000000`00000000 : nt!MiTrimOrAgeWorkingSet+0x2ed
  893. ffffbc80`4fbf09e0 fffff801`d4d21bc5 : fffff801`d4ffa100 fffff801`d4ffa100 00000000`00000188 00000000`00000001 : nt!MiProcessWorkingSets+0x200
  894. ffffbc80`4fbf0ba0 fffff801`d4dc7a4d : 00000000`ffffffff 00000000`00000006 00000000`ffffffff 00000000`00000001 : nt!MiWorkingSetManager+0x9d
  895. ffffbc80`4fbf0c60 fffff801`d4d59ac7 : ffffd183`79548040 00000000`00000080 fffff801`d4dc7900 45f68b41`f98b48ea : nt!KeBalanceSetManager+0x14d
  896. ffffbc80`4fbf0d50 fffff801`d4dee946 : fffff801`d3ce0180 ffffd183`79548040 fffff801`d4d59a80 e8202474`894c0002 : nt!PspSystemThreadStartup+0x47
  897. ffffbc80`4fbf0da0 00000000`00000000 : ffffbc80`4fbf1000 ffffbc80`4fbeb000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
  898. CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
  899. fffff801d4cff576-fffff801d4cff577 2 bytes - nt!MiWalkPageTables+56
  900. [ 80 f6:00 b7 ]
  901. fffff801d4cff592-fffff801d4cff596 5 bytes - nt!MiWalkPageTables+72 (+0x1c)
  902. [ d0 be 7d fb f6:e0 d6 ad 5b b7 ]
  903. fffff801d4cff5c9-fffff801d4cff5ca 2 bytes - nt!MiWalkPageTables+a9 (+0x37)
  904. [ ff f6:7f b7 ]
  905. fffff801d4cff772-fffff801d4cff773 2 bytes - nt!MiWalkPageTables+252 (+0x1a9)
  906. [ 80 f6:00 b7 ]
  907. fffff801d4cff881 - nt!MiDemoteCombinedPte+91 (+0x10f)
  908. [ fa:b8 ]
  909. fffff801d4cff894-fffff801d4cff895 2 bytes - nt!MiDemoteCombinedPte+a4 (+0x13)
  910. [ 80 f6:00 b7 ]
  911. fffff801d4cffa59 - nt!MiDemoteCombinedPte+269 (+0x1c5)
  912. [ fa:b8 ]
  913. fffff801d4cffc8a-fffff801d4cffc8b 2 bytes - nt!MiWsleFlush+3a (+0x231)
  914. [ 80 f6:00 b7 ]
  915. fffff801d4cffcc2 - nt!MiWsleFlush+72 (+0x38)
  916. [ fa:b8 ]
  917. fffff801d4cffdcd-fffff801d4cffdce 2 bytes - nt!MiWsleFlush+17d (+0x10b)
  918. [ 80 f6:00 b7 ]
  919. fffff801d4cffe58-fffff801d4cffe59 2 bytes - nt!MiWsleFlush+208 (+0x8b)
  920. [ ff f6:7f b7 ]
  921. fffff801d4cfff13-fffff801d4cfff14 2 bytes - nt!MiWsleFlush+2c3 (+0xbb)
  922. [ ff f6:7f b7 ]
  923. fffff801d4d02a03-fffff801d4d02a07 5 bytes - nt!MiWalkPageTablesRecursively+293 (+0x2af0)
  924. [ d0 be 7d fb f6:e0 d6 ad 5b b7 ]
  925. fffff801d4d02a24-fffff801d4d02a25 2 bytes - nt!MiWalkPageTablesRecursively+2b4 (+0x21)
  926. [ 80 f6:00 b7 ]
  927. fffff801d4d02a5f - nt!MiWalkPageTablesRecursively+2ef (+0x3b)
  928. [ fa:b8 ]
  929. fffff801d4d02b3c-fffff801d4d02b3d 2 bytes - nt!MiWalkPageTablesRecursively+3cc (+0xdd)
  930. [ 80 f6:00 b7 ]
  931. fffff801d4d02eb3-fffff801d4d02eb4 2 bytes - nt!MiAgePte+43 (+0x377)
  932. [ 80 f6:00 b7 ]
  933. fffff801d4d02ed9-fffff801d4d02eda 2 bytes - nt!MiAgePte+69 (+0x26)
  934. [ ff f6:7f b7 ]
  935. fffff801d4d02f2e - nt!MiAgePte+be (+0x55)
  936. [ fa:b8 ]
  937. fffff801d4d03872-fffff801d4d03873 2 bytes - nt!MiAgePte+a02 (+0x944)
  938. [ ff f6:7f b7 ]
  939. fffff801d4d0390c-fffff801d4d0390d 2 bytes - nt!MiAgePte+a9c (+0x9a)
  940. [ ff f6:7f b7 ]
  941. fffff801d4d23098 - nt!MiEmptyDecayClusterTimers+b8 (+0x1f78c)
  942. [ fa:b8 ]
  943. fffff801d4d780cd-fffff801d4d780ce 2 bytes - nt!MiUpdatePrefetchPriority+2d (+0x55035)
  944. [ 80 f6:00 b7 ]
  945. fffff801d4d7810c - nt!MiUpdatePrefetchPriority+6c (+0x3f)
  946. [ fa:b8 ]
  947. 47 errors : !nt (fffff801d4cff576-fffff801d4d7810c)
  948. MODULE_NAME: memory_corruption
  949.  
  950. IMAGE_NAME: memory_corruption
  951.  
  952. FOLLOWUP_NAME: memory_corruption
  953. DEBUG_FLR_IMAGE_TIMESTAMP: 0
  954. MEMORY_CORRUPTOR: LARGE
  955. STACK_COMMAND: .cxr 0xffffbc804fbef6e0 ; kb
  956. FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
  957. BUCKET_ID: MEMORY_CORRUPTION_LARGE
  958. PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
  959. TARGET_TIME: 2017-07-29T23:18:44.000Z
  960. OSBUILD: 15063
  961. OSSERVICEPACK: 483
  962. SERVICEPACK_NUMBER: 0
  963. OS_REVISION: 0
  964. SUITE_MASK: 784
  965. PRODUCT_TYPE: 1
  966. OSPLATFORM_TYPE: x64
  967. OSNAME: Windows 10
  968. OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
  969. USER_LCID: 0
  970. OSBUILD_TIMESTAMP: 2017-07-07 02:06:35
  971. BUILDDATESTAMP_STR: 160101.0800
  972. BUILDLAB_STR: WinBuild
  973. BUILDOSVER_STR: 10.0.15063.483
  974. ANALYSIS_SESSION_ELAPSED_TIME: 2900
  975. ANALYSIS_SOURCE: KM
  976. FAILURE_ID_HASH_STRING: km:memory_corruption_large
  977. FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
  978. Followup: memory_corruption
  979.  
  980. ========================================================================
  981. =================== Dump File: 072917-12875-01.dmp ===================
  982. ========================================================================
  983. Mini Kernel Dump File: Only registers and stack trace are available
  984. Windows 10 Kernel Version 15063 MP (4 procs) Free x64
  985. Product: WinNt, suite: TerminalServer SingleUserTS Personal
  986. Built by: 15063.0.amd64fre.rs2_release.170317-1834
  987. Kernel base = 0xfffff802`5aa91000 PsLoadedModuleList = 0xfffff802`5addd5e0
  988. Debug session time: Sat Jul 29 08:58:46.624 2017 (UTC - 4:00)
  989. System Uptime: 0 days 13:05:04.377
  990.  
  991. BugCheck 3B, {80000003, fffff80fdca8fa75, ffffa3804cc71600, 0}
  992. *** WARNING: Unable to verify timestamp for atikmdag.sys
  993. *** ERROR: Module load completed but symbols could not be loaded for atikmdag.sys
  994. *** WARNING: Unable to verify timestamp for atikmpag.sys
  995. *** ERROR: Module load completed but symbols could not be loaded for atikmpag.sys
  996. *** WARNING: Unable to verify timestamp for win32k.sys
  997. *** ERROR: Module load completed but symbols could not be loaded for win32k.sys
  998. Probably caused by : memory_corruption
  999. Followup: memory_corruption
  1000.  
  1001. SYSTEM_SERVICE_EXCEPTION (3b)
  1002. An exception happened while executing a system service routine.
  1003.  
  1004. Arguments:
  1005. Arg1: 0000000080000003, Exception code that caused the bugcheck
  1006. Arg2: fffff80fdca8fa75, Address of the instruction which caused the bugcheck
  1007. Arg3: ffffa3804cc71600, Address of the context record for the exception that caused the bugcheck
  1008. Arg4: 0000000000000000, zero.
  1009.  
  1010. Debugging Details:
  1011. DUMP_CLASS: 1
  1012. DUMP_QUALIFIER: 400
  1013. BUILD_VERSION_STRING: 10.0.15063.483 (WinBuild.160101.0800)
  1014. SYSTEM_MANUFACTURER: HP-Pavilion
  1015. SYSTEM_PRODUCT_NAME: AY614AAR-ABA p6347c
  1016. SYSTEM_SKU: AY614AAR#ABA
  1017. BIOS_VENDOR: American Megatrends Inc.
  1018. BIOS_VERSION: 5.12
  1019. BIOS_DATE: 05/21/2010
  1020. BASEBOARD_MANUFACTURER: FOXCONN
  1021. BASEBOARD_PRODUCT: ALOE
  1022. BASEBOARD_VERSION: 1.01
  1023. DUMP_TYPE: 2
  1024. EXCEPTION_CODE: (HRESULT) 0x80000003 (2147483651) - One or more arguments are invalid
  1025. FAULTING_IP:
  1026. atikmdag+fa75
  1027. fffff80f`dca8fa75 cc int 3
  1028. CONTEXT: ffffa3804cc71600 -- (.cxr 0xffffa3804cc71600)
  1029. rax=fffff80fdca8fa75 rbx=ffffa3804cc72240 rcx=ffff8f09e73a0b60
  1030. rdx=ffffa3804cc72240 rsi=ffff8f09e73a0a80 rdi=ffff8f09e5773040
  1031. rip=fffff80fdca8fa75 rsp=ffffa3804cc71ff8 rbp=ffffa3804cc72050
  1032. r8=0000000000000000 r9=0000000000000000 r10=0000000000000000
  1033. r11=ffffd98d3819e000 r12=ffff8f09e73a0a80 r13=ffffa3804cc72aa0
  1034. r14=00000000c0000001 r15=ffff8f09f6f54000
  1035. iopl=0 nv up ei ng nz na pe nc
  1036. cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00000282
  1037. atikmdag+0xfa75:
  1038. fffff80f`dca8fa75 cc int 3
  1039. Resetting default scope
  1040. CPU_COUNT: 4
  1041. CPU_MHZ: af0
  1042. CPU_VENDOR: AuthenticAMD
  1043. CPU_FAMILY: 10
  1044. CPU_MODEL: 5
  1045. CPU_STEPPING: 2
  1046. CUSTOMER_CRASH_COUNT: 1
  1047. DEFAULT_BUCKET_ID: CODE_CORRUPTION
  1048. BUGCHECK_STR: 0x3B
  1049.  
  1050. PROCESS_NAME: dwm.exe
  1051.  
  1052. CURRENT_IRQL: 0
  1053. LAST_CONTROL_TRANSFER: from fffff80fdaeea78a to fffff80fdca8fa75
  1054. STACK_TEXT:
  1055. ffffa380`4cc71ff8 fffff80f`daeea78a : ffffa380`4cc72240 ffff8f09`e73a0a80 ffff8f09`e73a0a80 fffff80f`da353dd2 : atikmdag+0xfa75
  1056. ffffa380`4cc72000 ffffa380`4cc72240 : ffff8f09`e73a0a80 ffff8f09`e73a0a80 fffff80f`da353dd2 ffffa380`4cc72078 : atikmpag+0xa78a
  1057. ffffa380`4cc72008 ffff8f09`e73a0a80 : ffff8f09`e73a0a80 fffff80f`da353dd2 ffffa380`4cc72078 ffffa380`4cc72060 : 0xffffa380`4cc72240
  1058. ffffa380`4cc72010 ffff8f09`e73a0a80 : fffff80f`da353dd2 ffffa380`4cc72078 ffffa380`4cc72060 ffffa380`4cc72240 : 0xffff8f09`e73a0a80
  1059. ffffa380`4cc72018 fffff80f`da353dd2 : ffffa380`4cc72078 ffffa380`4cc72060 ffffa380`4cc72240 00000000`00000000 : 0xffff8f09`e73a0a80
  1060. ffffa380`4cc72020 fffff80f`da4cbfe1 : ffff8f09`e7716080 ffff8f09`e7716080 ffffd98d`3819e000 000001d8`e1800000 : dxgkrnl!DXGADAPTER::AcquireDdiSync+0x92
  1061. ffffa380`4cc72060 fffff80f`da3fd074 : 00000000`00000100 00000000`00000000 00000000`00000002 ffffd98d`3c005c50 : dxgkrnl!ADAPTER_RENDER::DdiRender+0x145
  1062. ffffa380`4cc72120 fffff80f`da4f9113 : 00000000`00000000 ffffd98d`3813b6d0 ffffd98d`3813b6d0 ffff8f09`e73f2f20 : dxgkrnl!DXGCONTEXT::Render+0x954
  1063. ffffa380`4cc72820 fffff802`5ac08413 : ffff8f09`e7716080 ffff8f09`e7716080 000001d8`dea65df0 00000000`00000020 : dxgkrnl!DxgkRender+0x803
  1064. ffffa380`4cc72c40 00007ffb`387b4f44 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
  1065. 00000089`49f0d968 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`387b4f44
  1066. CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
  1067. fffff8025ab190ef - nt!MiGetNextPageTable+19f
  1068. [ f6:82 ]
  1069. fffff8025ab19122 - nt!MiGetNextPageTable+1d2 (+0x33)
  1070. [ f6:82 ]
  1071. fffff8025ab2207b - nt!MiResolvePrivateZeroFault+27b (+0x8f59)
  1072. [ f6:82 ]
  1073. fffff8025ab220b1-fffff8025ab220b2 2 bytes - nt!MiResolvePrivateZeroFault+2b1 (+0x36)
  1074. [ fb f6:c1 82 ]
  1075. fffff8025ab220d9 - nt!MiResolvePrivateZeroFault+2d9 (+0x28)
  1076. [ fa:ed ]
  1077. fffff8025ab22cc3 - nt!MiGetFreeOrZeroPage+73 (+0xbea)
  1078. [ fa:ed ]
  1079. fffff8025ab23558 - nt!MiCompletePrivateZeroFault+518 (+0x895)
  1080. [ f6:82 ]
  1081. fffff8025ab23568 - nt!MiCompletePrivateZeroFault+528 (+0x10)
  1082. [ fa:ed ]
  1083. fffff8025ab40467 - nt!MiFlushCacheForAttributeChange+9b (+0x1ceff)
  1084. [ f6:82 ]
  1085. fffff8025ab405f8 - nt!MiMapPageInHyperSpaceWorker+b8 (+0x191)
  1086. [ f6:82 ]
  1087. fffff8025ab40723 - nt!MiInitializePfn+7f (+0x12b)
  1088. [ f6:82 ]
  1089. fffff8025ab40758 - nt!MiInitializePfn+b4 (+0x35)
  1090. [ fa:ed ]
  1091. fffff8025ab41422 - nt!MiMarkKernelStack+5a (+0xcca)
  1092. [ fa:ed ]
  1093. 14 errors : !nt (fffff8025ab190ef-fffff8025ab41422)
  1094. MODULE_NAME: memory_corruption
  1095.  
  1096. IMAGE_NAME: memory_corruption
  1097.  
  1098. FOLLOWUP_NAME: memory_corruption
  1099. DEBUG_FLR_IMAGE_TIMESTAMP: 0
  1100. MEMORY_CORRUPTOR: LARGE
  1101. STACK_COMMAND: .cxr 0xffffa3804cc71600 ; kb
  1102. FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
  1103. BUCKET_ID: MEMORY_CORRUPTION_LARGE
  1104. PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
  1105. TARGET_TIME: 2017-07-29T12:58:46.000Z
  1106. OSBUILD: 15063
  1107. OSSERVICEPACK: 483
  1108. SERVICEPACK_NUMBER: 0
  1109. OS_REVISION: 0
  1110. SUITE_MASK: 784
  1111. PRODUCT_TYPE: 1
  1112. OSPLATFORM_TYPE: x64
  1113. OSNAME: Windows 10
  1114. OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
  1115. USER_LCID: 0
  1116. OSBUILD_TIMESTAMP: 2017-07-07 02:06:35
  1117. BUILDDATESTAMP_STR: 160101.0800
  1118. BUILDLAB_STR: WinBuild
  1119. BUILDOSVER_STR: 10.0.15063.483
  1120. ANALYSIS_SESSION_ELAPSED_TIME: 38bb
  1121. ANALYSIS_SOURCE: KM
  1122. FAILURE_ID_HASH_STRING: km:memory_corruption_large
  1123. FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
  1124. Followup: memory_corruption
  1125.  
  1126. ========================================================================
  1127. =================== Dump File: 073017-9968-01.dmp ====================
  1128. ========================================================================
  1129. Mini Kernel Dump File: Only registers and stack trace are available
  1130. Windows 10 Kernel Version 15063 MP (4 procs) Free x64
  1131. Product: WinNt, suite: TerminalServer SingleUserTS Personal
  1132. Built by: 15063.0.amd64fre.rs2_release.170317-1834
  1133. Kernel base = 0xfffff802`d7885000 PsLoadedModuleList = 0xfffff802`d7bd15e0
  1134. Debug session time: Sun Jul 30 19:05:24.768 2017 (UTC - 4:00)
  1135. System Uptime: 0 days 23:45:13.522
  1136.  
  1137. BugCheck EF, {ffff98827b6967c0, 0, 0, 0}
  1138. errfg" bg="errbg">ETW minidump data unavailable
  1139. Probably caused by : ntkrnlmp.exe ( nt!PspCatchCriticalBreak+c9 )
  1140. Followup: MachineOwner
  1141.  
  1142. CRITICAL_PROCESS_DIED (ef)
  1143. A critical system process died
  1144.  
  1145. Arguments:
  1146. Arg1: ffff98827b6967c0, Process object or thread object
  1147. Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
  1148. Arg3: 0000000000000000
  1149. Arg4: 0000000000000000
  1150.  
  1151. Debugging Details:
  1152. ETW minidump data unavailable
  1153. DUMP_CLASS: 1
  1154. DUMP_QUALIFIER: 400
  1155. BUILD_VERSION_STRING: 10.0.15063.483 (WinBuild.160101.0800)
  1156. SYSTEM_MANUFACTURER: HP-Pavilion
  1157. SYSTEM_PRODUCT_NAME: AY614AAR-ABA p6347c
  1158. SYSTEM_SKU: AY614AAR#ABA
  1159. BIOS_VENDOR: American Megatrends Inc.
  1160. BIOS_VERSION: 5.12
  1161. BIOS_DATE: 05/21/2010
  1162. BASEBOARD_MANUFACTURER: FOXCONN
  1163. BASEBOARD_PRODUCT: ALOE
  1164. BASEBOARD_VERSION: 1.01
  1165. DUMP_TYPE: 2
  1166.  
  1167. PROCESS_NAME: svchost.exe
  1168.  
  1169. CRITICAL_PROCESS: svchost.exe
  1170. EXCEPTION_CODE: (HRESULT) 0x8bde9080 (2346619008) - <Unable to get error code text>
  1171. ERROR_CODE: (NTSTATUS) 0x8bde9080 - <Unable to get error code text>
  1172. CPU_COUNT: 4
  1173. CPU_MHZ: af0
  1174. CPU_VENDOR: AuthenticAMD
  1175. CPU_FAMILY: 10
  1176. CPU_MODEL: 5
  1177. CPU_STEPPING: 2
  1178. CUSTOMER_CRASH_COUNT: 1
  1179. DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
  1180. BUGCHECK_STR: 0xEF
  1181. CURRENT_IRQL: 0
  1182. LAST_CONTROL_TRANSFER: from fffff802d7f65071 to fffff802d79f14c0
  1183. STACK_TEXT:
  1184. ffffbc01`dcba1ac8 fffff802`d7f65071 : 00000000`000000ef ffff9882`7b6967c0 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
  1185. ffffbc01`dcba1ad0 fffff802`d7ea0c47 : ffff9882`7b6967c0 00000000`00000000 ffff9882`7b6967c0 00000000`00000000 : nt!PspCatchCriticalBreak+0xc9
  1186. ffffbc01`dcba1b20 fffff802`d7d80186 : ffff9882`00000000 ffff9882`7b6967c0 00000000`00000000 ffff9882`7b6967c0 : nt!PspTerminateAllThreads+0x1209bb
  1187. ffffbc01`dcba1b90 fffff802`d7d7ff47 : ffffffff`ffffffff ffff9882`7b6967c0 ffff9882`7b6967c0 ffff51ed`c501e901 : nt!PspTerminateProcess+0xde
  1188. ffffbc01`dcba1bd0 fffff802`d79fc413 : ffff9882`7b6967c0 ffff9882`8bde9080 ffffbc01`dcba1cc0 000000ed`186ff930 : nt!NtTerminateProcess+0xa7
  1189. ffffbc01`dcba1c40 00007ffb`94435924 : 00007ffb`94495d3f 0000020b`f6a20002 00007ffb`944c6598 000000ed`186ff930 : nt!KiSystemServiceCopyEnd+0x13
  1190. 000000ed`186fe1a8 00007ffb`94495d3f : 0000020b`f6a20002 00007ffb`944c6598 000000ed`186ff930 00000000`00000001 : 0x00007ffb`94435924
  1191. 000000ed`186fe1b0 0000020b`f6a20002 : 00007ffb`944c6598 000000ed`186ff930 00000000`00000001 00000000`00000006 : 0x00007ffb`94495d3f
  1192. 000000ed`186fe1b8 00007ffb`944c6598 : 000000ed`186ff930 00000000`00000001 00000000`00000006 00007ffb`9443cf9d : 0x0000020b`f6a20002
  1193. 000000ed`186fe1c0 000000ed`186ff930 : 00000000`00000001 00000000`00000006 00007ffb`9443cf9d 00007ffb`944c6598 : 0x00007ffb`944c6598
  1194. 000000ed`186fe1c8 00000000`00000001 : 00000000`00000006 00007ffb`9443cf9d 00007ffb`944c6598 00000000`00000003 : 0x000000ed`186ff930
  1195. 000000ed`186fe1d0 00000000`00000006 : 00007ffb`9443cf9d 00007ffb`944c6598 00000000`00000003 00000000`00000001 : 0x1
  1196. 000000ed`186fe1d8 00007ffb`9443cf9d : 00007ffb`944c6598 00000000`00000003 00000000`00000001 00007ffb`92c71256 : 0x6
  1197. 000000ed`186fe1e0 00007ffb`944c6598 : 00000000`00000003 00000000`00000001 00007ffb`92c71256 00007ffb`92d2d480 : 0x00007ffb`9443cf9d
  1198. 000000ed`186fe1e8 00000000`00000003 : 00000000`00000001 00007ffb`92c71256 00007ffb`92d2d480 00007ffb`92c30000 : 0x00007ffb`944c6598
  1199. 000000ed`186fe1f0 00000000`00000001 : 00007ffb`92c71256 00007ffb`92d2d480 00007ffb`92c30000 00000000`000416b6 : 0x3
  1200. 000000ed`186fe1f8 00007ffb`92c71256 : 00007ffb`92d2d480 00007ffb`92c30000 00000000`000416b6 00007ffb`94426466 : 0x1
  1201. 000000ed`186fe200 00007ffb`92d2d480 : 00007ffb`92c30000 00000000`000416b6 00007ffb`94426466 000000ed`186fe3f0 : 0x00007ffb`92c71256
  1202. 000000ed`186fe208 00007ffb`92c30000 : 00000000`000416b6 00007ffb`94426466 000000ed`186fe3f0 00007ffb`943a6f1c : 0x00007ffb`92d2d480
  1203. 000000ed`186fe210 00000000`000416b6 : 00007ffb`94426466 000000ed`186fe3f0 00007ffb`943a6f1c 00007ffb`92c710be : 0x00007ffb`92c30000
  1204. 000000ed`186fe218 00007ffb`94426466 : 000000ed`186fe3f0 00007ffb`943a6f1c 00007ffb`92c710be 00000000`00000000 : 0x416b6
  1205. 000000ed`186fe220 000000ed`186fe3f0 : 00007ffb`943a6f1c 00007ffb`92c710be 00000000`00000000 00000000`00053bb4 : 0x00007ffb`94426466
  1206. 000000ed`186fe228 00007ffb`943a6f1c : 00007ffb`92c710be 00000000`00000000 00000000`00053bb4 00007ffb`94426466 : 0x000000ed`186fe3f0
  1207. 000000ed`186fe230 00007ffb`92c710be : 00000000`00000000 00000000`00053bb4 00007ffb`94426466 000000ed`186feef0 : 0x00007ffb`943a6f1c
  1208. 000000ed`186fe238 00000000`00000000 : 00000000`00053bb4 00007ffb`94426466 000000ed`186feef0 000000ed`186fea00 : 0x00007ffb`92c710be
  1209. STACK_COMMAND: kb
  1210. THREAD_SHA1_HASH_MOD_FUNC: 042a2b51772309c39e12d732cc93cacf0af3064e
  1211. THREAD_SHA1_HASH_MOD_FUNC_OFFSET: fc10ecd29a9db0f986cc1d740175a75d350c5136
  1212. THREAD_SHA1_HASH_MOD: ee8fcf1fb60cb6e3e2f60ddbed2ec02b5748a693
  1213. FOLLOWUP_IP:
  1214. nt!PspCatchCriticalBreak+c9
  1215. fffff802`d7f65071 cc int 3
  1216. FAULT_INSTR_CODE: ff8440cc
  1217. SYMBOL_STACK_INDEX: 1
  1218. SYMBOL_NAME: nt!PspCatchCriticalBreak+c9
  1219. FOLLOWUP_NAME: MachineOwner
  1220. MODULE_NAME: nt
  1221.  
  1222. IMAGE_NAME: ntkrnlmp.exe
  1223.  
  1224. DEBUG_FLR_IMAGE_TIMESTAMP: 595f24eb
  1225. IMAGE_VERSION: 10.0.15063.483
  1226. BUCKET_ID_FUNC_OFFSET: c9
  1227. FAILURE_BUCKET_ID: 0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_8bde9080_nt!PspCatchCriticalBreak
  1228. BUCKET_ID: 0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_8bde9080_nt!PspCatchCriticalBreak
  1229. PRIMARY_PROBLEM_CLASS: 0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_8bde9080_nt!PspCatchCriticalBreak
  1230. TARGET_TIME: 2017-07-30T23:05:24.000Z
  1231. OSBUILD: 15063
  1232. OSSERVICEPACK: 483
  1233. SERVICEPACK_NUMBER: 0
  1234. OS_REVISION: 0
  1235. SUITE_MASK: 784
  1236. PRODUCT_TYPE: 1
  1237. OSPLATFORM_TYPE: x64
  1238. OSNAME: Windows 10
  1239. OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
  1240. USER_LCID: 0
  1241. OSBUILD_TIMESTAMP: 2017-07-07 02:06:35
  1242. BUILDDATESTAMP_STR: 160101.0800
  1243. BUILDLAB_STR: WinBuild
  1244. BUILDOSVER_STR: 10.0.15063.483
  1245. ANALYSIS_SESSION_ELAPSED_TIME: cfe
  1246. ANALYSIS_SOURCE: KM
  1247. FAILURE_ID_HASH_STRING: km:0xef_svchost.exe_bugcheck_critical_process_8bde9080_nt!pspcatchcriticalbreak
  1248. FAILURE_ID_HASH: {ceef35d5-277a-cca0-ff9e-bd36970a3715}
  1249. Followup: MachineOwner
  1250.  
  1251. ========================================================================
  1252. =================== Dump File: 073117-9218-01.dmp ====================
  1253. ========================================================================
  1254. Mini Kernel Dump File: Only registers and stack trace are available
  1255. Windows 10 Kernel Version 15063 MP (4 procs) Free x64
  1256. Product: WinNt, suite: TerminalServer SingleUserTS Personal
  1257. Built by: 15063.0.amd64fre.rs2_release.170317-1834
  1258. Kernel base = 0xfffff802`f2e85000 PsLoadedModuleList = 0xfffff802`f31d15e0
  1259. Debug session time: Mon Jul 31 11:10:33.777 2017 (UTC - 4:00)
  1260. System Uptime: 0 days 2:55:30.529
  1261.  
  1262. BugCheck 7F, {8, ffffca0180c21af0, 8563a358, fffff807b4865c1d}
  1263. Probably caused by : memory_corruption
  1264. Followup: memory_corruption
  1265.  
  1266. UNEXPECTED_KERNEL_MODE_TRAP (7f)
  1267. This means a trap occurred in kernel mode, and it's a trap of a kind
  1268. that the kernel isn't allowed to have/catch (bound trap) or that
  1269. is always instant death (double fault). The first number in the
  1270. bugcheck params is the number of the trap (8 = double fault, etc)
  1271. Consult an Intel x86 family manual to learn more about what these
  1272. traps are. Here is a *portion* of those codes:
  1273. If kv shows a taskGate
  1274. use .tss on the part before the colon, then kv.
  1275. Else if kv shows a trapframe
  1276. use .trap on that value
  1277. Else
  1278. .trap on the appropriate frame will show where the trap was taken
  1279. (on x86, this will be the ebp that goes with the procedure KiTrap)
  1280. Endif
  1281. kb will then show the corrected stack.
  1282.  
  1283. Arguments:
  1284. Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
  1285. Arg2: ffffca0180c21af0
  1286. Arg3: 000000008563a358
  1287. Arg4: fffff807b4865c1d
  1288.  
  1289. Debugging Details:
  1290. DUMP_CLASS: 1
  1291. DUMP_QUALIFIER: 400
  1292. BUILD_VERSION_STRING: 10.0.15063.483 (WinBuild.160101.0800)
  1293. SYSTEM_MANUFACTURER: HP-Pavilion
  1294. SYSTEM_PRODUCT_NAME: AY614AAR-ABA p6347c
  1295. SYSTEM_SKU: AY614AAR#ABA
  1296. BIOS_VENDOR: American Megatrends Inc.
  1297. BIOS_VERSION: 5.12
  1298. BIOS_DATE: 05/21/2010
  1299. BASEBOARD_MANUFACTURER: FOXCONN
  1300. BASEBOARD_PRODUCT: ALOE
  1301. BASEBOARD_VERSION: 1.01
  1302. DUMP_TYPE: 2
  1303. BUGCHECK_STR: 0x7f_8
  1304. TRAP_FRAME: ffffca0180c21af0 -- (.trap 0xffffca0180c21af0)
  1305. NOTE: The trap frame does not contain all registers.
  1306. Some register values may be zeroed or incorrect.
  1307. rax=ffffdb05e5800c00 rbx=0000000000000000 rcx=ffffdb05e5800bff
  1308. rdx=ffffdb05d6304350 rsi=0000000000000000 rdi=0000000000000000
  1309. rip=fffff807b4865c1d rsp=000000008563a358 rbp=ffffca018563a470
  1310. r8=0000000000000000 r9=0000000000000000 r10=0000000000000000
  1311. r11=ffffdb05e4739080 r12=0000000000000000 r13=0000000000000000
  1312. r14=0000000000000000 r15=0000000000000000
  1313. iopl=0 nv up ei pl nz na pe nc
  1314. FLTMGR!FltpMoveCallbackDataToIrp+0xd:
  1315. fffff807`b4865c1d 450fb6d0 movzx r10d,r8b
  1316. Resetting default scope
  1317. CPU_COUNT: 4
  1318. CPU_MHZ: af0
  1319. CPU_VENDOR: AuthenticAMD
  1320. CPU_FAMILY: 10
  1321. CPU_MODEL: 5
  1322. CPU_STEPPING: 2
  1323. CUSTOMER_CRASH_COUNT: 1
  1324. DEFAULT_BUCKET_ID: CODE_CORRUPTION
  1325.  
  1326. PROCESS_NAME: svchost.exe
  1327.  
  1328. CURRENT_IRQL: 0
  1329. BAD_STACK_POINTER: 000000008563a358
  1330. LAST_CONTROL_TRANSFER: from fffff802f2ffc8a9 to fffff802f2ff14c0
  1331. STACK_TEXT:
  1332. ffffca01`80c219a8 fffff802`f2ffc8a9 : 00000000`0000007f 00000000`00000008 ffffca01`80c21af0 00000000`8563a358 : nt!KeBugCheckEx
  1333. ffffca01`80c219b0 fffff802`f2ffa6f3 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
  1334. ffffca01`80c21af0 fffff807`b4865c1d : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0xb3
  1335. 00000000`8563a358 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : FLTMGR!FltpMoveCallbackDataToIrp+0xd
  1336. STACK_COMMAND: kb
  1337. CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
  1338. fffff802f2f1a816-fffff802f2f1a817 2 bytes - nt!MiPfnShareCountIsZero+186
  1339. [ 80 f6:00 f4 ]
  1340. fffff802f2f1cfd2-fffff802f2f1cfd3 2 bytes - nt!MiDeletePteList+592 (+0x27bc)
  1341. [ 80 fa:00 bc ]
  1342. 4 errors : !nt (fffff802f2f1a816-fffff802f2f1cfd3)
  1343. MODULE_NAME: memory_corruption
  1344.  
  1345. IMAGE_NAME: memory_corruption
  1346.  
  1347. FOLLOWUP_NAME: memory_corruption
  1348. DEBUG_FLR_IMAGE_TIMESTAMP: 0
  1349. MEMORY_CORRUPTOR: LARGE
  1350. FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
  1351. BUCKET_ID: MEMORY_CORRUPTION_LARGE
  1352. PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
  1353. TARGET_TIME: 2017-07-31T15:10:33.000Z
  1354. OSBUILD: 15063
  1355. OSSERVICEPACK: 483
  1356. SERVICEPACK_NUMBER: 0
  1357. OS_REVISION: 0
  1358. SUITE_MASK: 784
  1359. PRODUCT_TYPE: 1
  1360. OSPLATFORM_TYPE: x64
  1361. OSNAME: Windows 10
  1362. OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
  1363. USER_LCID: 0
  1364. OSBUILD_TIMESTAMP: 2017-07-07 02:06:35
  1365. BUILDDATESTAMP_STR: 160101.0800
  1366. BUILDLAB_STR: WinBuild
  1367. BUILDOSVER_STR: 10.0.15063.483
  1368. ANALYSIS_SESSION_ELAPSED_TIME: 2918
  1369. ANALYSIS_SOURCE: KM
  1370. FAILURE_ID_HASH_STRING: km:memory_corruption_large
  1371. FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
  1372. Followup: memory_corruption
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement