Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Microsoft (R) Windows Debugger Version 10.0.14321.1024 X86
- Copyright (c) Microsoft Corporation. All rights reserved.
- Auto Dump Analyzer by gardenman
- Time to debug file(s): 00 hours and 05 minutes and 03 seconds
- ========================================================================
- =================== Dump File: 080517-3656-01.dmp ====================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 14393 MP (4 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS Personal
- Built by: 14393.0.amd64fre.rs1_release.160715-1616
- Kernel base = 0xfffff802`b5c91000 PsLoadedModuleList = 0xfffff802`b5f96060
- Debug session time: Sat Aug 5 08:01:16.295 2017 (UTC - 4:00)
- System Uptime: 0 days 0:00:27.969
- BugCheck D1, {fffffa0ea67210f0, ff, 72, fffffa0ea67210f0}
- Probably caused by : ntkrnlmp.exe ( nt!KiPageFault+247 )
- Followup: MachineOwner
- DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
- An attempt was made to access a pageable (or completely invalid) address at an
- interrupt request level (IRQL) that is too high. This is usually
- caused by drivers using improper addresses.
- If kernel debugger is available get stack backtrace.
- Arguments:
- Arg1: fffffa0ea67210f0, memory referenced
- Arg2: 00000000000000ff, IRQL
- Arg3: 0000000000000072, value 0 = read operation, 1 = write operation
- Arg4: fffffa0ea67210f0, address which referenced memory
- Debugging Details:
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 10.0.14393.0 (rs1_release.160715-1616)
- SYSTEM_SKU: SKU
- BIOS_VENDOR: American Megatrends Inc.
- BIOS_VERSION: 3401
- BIOS_DATE: 01/25/2017
- BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
- BASEBOARD_PRODUCT: Z170-A
- BASEBOARD_VERSION: Rev 1.xx
- DUMP_TYPE: 2
- READ_ADDRESS: fffff802b6038338: Unable to get MiVisibleState
- fffffa0ea67210f0
- CURRENT_IRQL: 0
- FAULTING_IP:
- +0
- fffffa0e`a67210f0 ?? ???
- ADDITIONAL_DEBUG_TEXT: The trap occurred when interrupts are disabled on the target.
- BUGCHECK_STR: DISABLED_INTERRUPT_FAULT
- CPU_COUNT: 4
- CPU_MHZ: db0
- CPU_VENDOR: GenuineIntel
- CPU_FAMILY: 6
- CPU_MODEL: 5e
- CPU_STEPPING: 3
- CPU_MICROCODE: 6,5e,3,0 (F,M,S,R) SIG: 9E'00000000 (cache) 9E'00000000 (init)
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
- PROCESS_NAME: System
- TRAP_FRAME: fffff802b7935700 -- (.trap 0xfffff802b7935700)
- NOTE: The trap frame does not contain all registers.
- Some register values may be zeroed or incorrect.
- rax=ffffcb83efa4a7d0 rbx=0000000000000000 rcx=ffffcb83efa4a9a8
- rdx=0000000000000032 rsi=0000000000000000 rdi=0000000000000000
- rip=fffffa0ea67210f0 rsp=fffff802b7935898 rbp=00000000000002c6
- r8=fffff802b5fd3180 r9=fffff802b604e100 r10=0000000005beee46
- r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
- r14=0000000000000000 r15=0000000000000000
- iopl=0 nv up di pl nz na po nc
- fffffa0e`a67210f0 ?? ???
- Resetting default scope
- LAST_CONTROL_TRANSFER: from fffff802b5de6129 to fffff802b5ddaf90
- FAILED_INSTRUCTION_ADDRESS:
- +0
- fffffa0e`a67210f0 ?? ???
- STACK_TEXT:
- fffff802`b79355b8 fffff802`b5de6129 : 00000000`0000000a fffffa0e`a67210f0 00000000`000000ff 00000000`00000072 : nt!KeBugCheckEx
- fffff802`b79355c0 fffff802`b5de4707 : 00000000`00000000 00000000`00000000 00000004`40435f7d fffff80e`a64fa489 : nt!KiBugCheckDispatch+0x69
- fffff802`b7935700 fffffa0e`a67210f0 : fffff802`b5cb5b22 00000000`0000101c 00000000`003436b6 00000000`00000000 : nt!KiPageFault+0x247
- fffff802`b7935898 fffff802`b5cb5b22 : 00000000`0000101c 00000000`003436b6 00000000`00000000 ffffcb83`efa4aaf0 : 0xfffffa0e`a67210f0
- fffff802`b79358a0 fffff802`b5cb46d7 : fffff80e`a4d27c50 000006fe`000006fe fffff80e`a47aa6b0 000006fe`000006fe : nt!PpmIdlePrepare+0x392
- fffff802`b7935a80 fffff802`b5dddfec : 00000000`00000000 fffff802`b5fd3180 fffff802`b604e940 ffffcb83`f134b080 : nt!PoIdle+0x1b7
- fffff802`b7935be0 00000000`00000000 : fffff802`b7936000 fffff802`b792f000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x2c
- STACK_COMMAND: kb
- THREAD_SHA1_HASH_MOD_FUNC: bac30f8031bbad40506eeaabc9b982d6623c8637
- THREAD_SHA1_HASH_MOD_FUNC_OFFSET: c4a3d5988d8caf850812979859d924b3e96b0798
- THREAD_SHA1_HASH_MOD: ee8fcf1fb60cb6e3e2f60ddbed2ec02b5748a693
- FOLLOWUP_IP:
- nt!KiPageFault+247
- fffff802`b5de4707 33c0 xor eax,eax
- FAULT_INSTR_CODE: ffb0c033
- SYMBOL_STACK_INDEX: 2
- SYMBOL_NAME: nt!KiPageFault+247
- FOLLOWUP_NAME: MachineOwner
- MODULE_NAME: nt
- IMAGE_NAME: ntkrnlmp.exe
- DEBUG_FLR_IMAGE_TIMESTAMP: 578998f1
- IMAGE_VERSION: 10.0.14393.0
- BUCKET_ID_FUNC_OFFSET: 247
- FAILURE_BUCKET_ID: DISABLED_INTERRUPT_FAULT_CODE_AV_BAD_IP_nt!KiPageFault
- BUCKET_ID: DISABLED_INTERRUPT_FAULT_CODE_AV_BAD_IP_nt!KiPageFault
- PRIMARY_PROBLEM_CLASS: DISABLED_INTERRUPT_FAULT_CODE_AV_BAD_IP_nt!KiPageFault
- TARGET_TIME: 2017-08-05T12:01:16.000Z
- OSBUILD: 14393
- OSSERVICEPACK: 0
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 784
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2016-07-15 22:16:17
- BUILDDATESTAMP_STR: 160715-1616
- BUILDLAB_STR: rs1_release
- BUILDOSVER_STR: 10.0.14393.0
- ANALYSIS_SESSION_ELAPSED_TIME: 953
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:disabled_interrupt_fault_code_av_bad_ip_nt!kipagefault
- FAILURE_ID_HASH: {f2ab72c5-099d-9077-bfcf-ba12aa825b36}
- Followup: MachineOwner
- ========================================================================
- ============================== Drivers ===============================
- ========================================================================
- Image path: \SystemRoot\System32\drivers\TeeDriverW8x64.sys
- Image name: TeeDriverW8x64.sys
- Info Link : http://www.carrona.org/drivers/driver.php?id=TeeDriverW8x64.sys
- ADA Info : Intel® Management Engine Interface
- Timestamp : Tue Apr 4 2017
- Image path: \SystemRoot\System32\drivers\e1i63x64.sys
- Image name: e1i63x64.sys
- Info Link : http://www.carrona.org/drivers/driver.php?id=e1i63x64.sys
- Timestamp : Fri Mar 4 2016
- Image path: \SystemRoot\System32\drivers\sshid.sys
- Image name: sshid.sys
- Info Link : http://www.carrona.org/drivers/driver.php?id=sshid.sys
- Timestamp : Mon Jun 26 2017
- Unloaded modules:
- fffff80e`a58e0000 fffff80e`a58ef000 dump_storpor
- fffff80e`a50f0000 fffff80e`a5114000 dump_storahc
- fffff80e`a5120000 fffff80e`a513d000 dump_dumpfve
- fffff80e`a6310000 fffff80e`a6323000 dam.sys
- fffff80e`a5140000 fffff80e`a5171000 cdrom.sys
- fffff80e`a4a20000 fffff80e`a4a30000 WdBoot.sys
- fffff80e`a58e0000 fffff80e`a58ef000 hwpolicy.sys
- ========================================================================
- ============================== BIOS INFO =============================
- ========================================================================
- [SMBIOS Data Tables v3.0]
- [DMI Version - 0]
- [2.0 Calling Convention - No]
- [Table Size - 4359 bytes]
- [BIOS Information (Type 0) - Length 24 - Handle 0000h]
- Vendor American Megatrends Inc.
- BIOS Version 3401
- BIOS Starting Address Segment f000
- BIOS Release Date 01/25/2017
- BIOS ROM Size 1000000
- BIOS Characteristics
- 07: - PCI Supported
- 10: - APM Supported
- 11: - Upgradeable FLASH BIOS
- 12: - BIOS Shadowing Supported
- 15: - CD-Boot Supported
- 16: - Selectable Boot Supported
- 17: - BIOS ROM Socketed
- 19: - EDD Supported
- 23: - 1.2MB Floppy Supported
- 24: - 720KB Floppy Supported
- 25: - 2.88MB Floppy Supported
- 26: - Print Screen Device Supported
- 27: - Keyboard Services Supported
- 28: - Serial Services Supported
- 29: - Printer Services Supported
- 32: - BIOS Vendor Reserved
- BIOS Characteristic Extensions
- 00: - ACPI Supported
- 01: - USB Legacy Supported
- 08: - BIOS Boot Specification Supported
- 10: - Specification Reserved
- 11: - Specification Reserved
- BIOS Major Revision 5
- BIOS Minor Revision 12
- EC Firmware Major Revision 255
- EC Firmware Minor Revision 255
- [System Information (Type 1) - Length 27 - Handle 0001h]
- Manufacturer System manufacturer
- Product Name System Product Name
- Version System Version
- UUID 00000000-0000-0000-0000-000000000000
- Wakeup Type Power Switch
- SKUNumber SKU
- [BaseBoard Information (Type 2) - Length 15 - Handle 0002h]
- Manufacturer ASUSTeK COMPUTER INC.
- Product Z170-A
- Version Rev 1.xx
- Feature Flags 09h
- 1591878152: - ?ÿU?ì?ì¡H.õ^3Å?Eü3ÀW?}?Eô?Eø?ÿu
- ¸@
- 1591878192: - ?ÿU?ì?ì¡H.õ^3Å?Eü3ÀW?}?Eô?Eø?ÿu
- ¸@
- Location Default string
- Chassis Handle 0003h
- Board Type 0ah - Processor/Memory Module
- Number of Child Handles 0
- [System Enclosure (Type 3) - Length 22 - Handle 0003h]
- Manufacturer Default string
- Chassis Type Desktop
- Version Default string
- Bootup State Safe
- Power Supply State Safe
- Thermal State Safe
- Security Status None
- OEM Defined 0
- Height 0U
- Number of Power Cords 1
- Number of Contained Elements 0
- Contained Element Size 3
- [Onboard Devices Information (Type 10) - Length 6 - Handle 0028h]
- Number of Devices 1
- 01: Type Video [enabled]
- [OEM Strings (Type 11) - Length 5 - Handle 0029h]
- Number of Strings 4
- 1 Default string
- 2 Default string
- 3 ORC
- 4 Default string
- [System Configuration Options (Type 12) - Length 5 - Handle 002ah]
- [Physical Memory Array (Type 16) - Length 23 - Handle 0045h]
- Location 03h - SystemBoard/Motherboard
- Use 03h - System Memory
- Memory Error Correction 03h - None
- Maximum Capacity 67108864KB
- Number of Memory Devices 4
- [Memory Device (Type 17) - Length 40 - Handle 0046h]
- Physical Memory Array Handle 0045h
- Total Width 64 bits
- Data Width 64 bits
- Size 8192MB
- Form Factor 09h - DIMM
- Device Locator ChannelA-DIMM1
- Bank Locator BANK 0
- Memory Type 1ah - Specification Reserved
- Type Detail 0080h - Synchronous
- Speed 2133MHz
- Manufacturer G-Skill
- Part Number F4-2133C15-8GRR
- [Memory Device (Type 17) - Length 40 - Handle 0047h]
- Physical Memory Array Handle 0045h
- Total Width 0 bits
- Data Width 0 bits
- Form Factor 02h - Unknown
- Device Locator ChannelA-DIMM2
- Bank Locator BANK 1
- Memory Type 02h - Unknown
- Type Detail 0000h -
- Speed 0MHz
- [Memory Device (Type 17) - Length 40 - Handle 0048h]
- Physical Memory Array Handle 0045h
- Total Width 64 bits
- Data Width 64 bits
- Size 8192MB
- Form Factor 09h - DIMM
- Device Locator ChannelB-DIMM1
- Bank Locator BANK 2
- Memory Type 1ah - Specification Reserved
- Type Detail 0080h - Synchronous
- Speed 2133MHz
- Manufacturer G-Skill
- Part Number F4-2133C15-8GRR
- [Memory Device (Type 17) - Length 40 - Handle 0049h]
- Physical Memory Array Handle 0045h
- Total Width 0 bits
- Data Width 0 bits
- Form Factor 02h - Unknown
- Device Locator ChannelB-DIMM2
- Bank Locator BANK 3
- Memory Type 02h - Unknown
- Type Detail 0000h -
- Speed 0MHz
- [Memory Array Mapped Address (Type 19) - Length 31 - Handle 004ah]
- Starting Address 00000000h
- Ending Address 00ffffffh
- Memory Array Handle 0045h
- Partition Width 02
- [Cache Information (Type 7) - Length 19 - Handle 004bh]
- Socket Designation L1 Cache
- Cache Configuration 0180h - WB Enabled Int NonSocketed L1
- Maximum Cache Size 0100h - 256K
- Installed Size 0100h - 256K
- Supported SRAM Type 0020h - Synchronous
- Current SRAM Type 0020h - Synchronous
- Cache Speed 0ns
- Error Correction Type ParitySingle-Bit ECC
- System Cache Type Unified
- Associativity 8-way Set-Associative
- [Cache Information (Type 7) - Length 19 - Handle 004ch]
- Socket Designation L2 Cache
- Cache Configuration 0181h - WB Enabled Int NonSocketed L2
- Maximum Cache Size 0400h - 1024K
- Installed Size 0400h - 1024K
- Supported SRAM Type 0020h - Synchronous
- Current SRAM Type 0020h - Synchronous
- Cache Speed 0ns
- Error Correction Type Multi-Bit ECC
- System Cache Type Unified
- Associativity 4-way Set-Associative
- [Cache Information (Type 7) - Length 19 - Handle 004dh]
- Socket Designation L3 Cache
- Cache Configuration 0182h - WB Enabled Int NonSocketed L3
- Maximum Cache Size 1800h - 6144K
- Installed Size 1800h - 6144K
- Supported SRAM Type 0020h - Synchronous
- Current SRAM Type 0020h - Synchronous
- Cache Speed 0ns
- Error Correction Type Specification Reserved
- System Cache Type Unified
- Associativity Specification Reserved
- [Processor Information (Type 4) - Length 48 - Handle 004eh]
- Socket Designation LGA1151
- Processor Type Central Processor
- Processor Family cdh - Specification Reserved
- Processor Manufacturer Intel(R) Corporation
- Processor ID e3060500fffbebbf
- Processor Version Intel(R) Core(TM) i5-6600K CPU @ 3.50GHz
- Processor Voltage 8bh - 1.1V
- External Clock 100MHz
- Max Speed 8300MHz
- Current Speed 3500MHz
- Status Enabled Populated
- Processor Upgrade Other
- L1 Cache Handle 004bh
- L2 Cache Handle 004ch
- L3 Cache Handle 004dh
- [Memory Device Mapped Address (Type 20) - Length 35 - Handle 004fh]
- Starting Address 00000000h
- Ending Address 007fffffh
- Memory Device Handle 0046h
- Mem Array Mapped Adr Handle 004ah
- Interleave Position 01
- Interleave Data Depth 02
- [Memory Device Mapped Address (Type 20) - Length 35 - Handle 0050h]
- Starting Address 00800000h
- Ending Address 00ffffffh
- Memory Device Handle 0048h
- Mem Array Mapped Adr Handle 004ah
- Interleave Position 02
- Interleave Data Depth 02
- ========================================================================
- =================== Dump File: 080517-3671-01.dmp ====================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 14393 MP (4 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS Personal
- Built by: 14393.0.amd64fre.rs1_release.160715-1616
- Kernel base = 0xfffff800`d348e000 PsLoadedModuleList = 0xfffff800`d3793060
- Debug session time: Sat Aug 5 07:08:20.115 2017 (UTC - 4:00)
- System Uptime: 0 days 0:00:19.788
- BugCheck F7, {67fad00a5be5, 675bd00a5be5, ffff98a42ff5a41a, 0}
- Probably caused by : ntkrnlmp.exe ( nt!_report_gsfailure+25 )
- Followup: MachineOwner
- DRIVER_OVERRAN_STACK_BUFFER (f7)
- A driver has overrun a stack-based buffer. This overrun could potentially
- allow a malicious user to gain control of this machine.
- DESCRIPTION
- A driver overran a stack-based buffer (or local variable) in a way that would
- have overwritten the function's return address and jumped back to an arbitrary
- address when the function returned. This is the classic "buffer overrun"
- hacking attack and the system has been brought down to prevent a malicious user
- from gaining complete control of it.
- Do a kb to get a stack backtrace -- the last routine on the stack before the
- buffer overrun handlers and bugcheck call is the one that overran its local
- variable(s).
- Arguments:
- Arg1: 000067fad00a5be5, Actual security check cookie from the stack
- Arg2: 0000675bd00a5be5, Expected security check cookie
- Arg3: ffff98a42ff5a41a, Complement of the expected security check cookie
- Arg4: 0000000000000000, zero
- Debugging Details:
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 10.0.14393.0 (rs1_release.160715-1616)
- SYSTEM_SKU: SKU
- BIOS_VENDOR: American Megatrends Inc.
- BIOS_VERSION: 3401
- BIOS_DATE: 01/25/2017
- BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
- BASEBOARD_PRODUCT: Z170-A
- BASEBOARD_VERSION: Rev 1.xx
- DUMP_TYPE: 2
- SECURITY_COOKIE: Expected 0000675bd00a5be5 found 000067fad00a5be5
- BUGCHECK_STR: 0xF7_THREE_BIT
- CPU_COUNT: 4
- CPU_MHZ: db0
- CPU_VENDOR: GenuineIntel
- CPU_FAMILY: 6
- CPU_MODEL: 5e
- CPU_STEPPING: 3
- CPU_MICROCODE: 6,5e,3,0 (F,M,S,R) SIG: 9E'00000000 (cache) 9E'00000000 (init)
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
- PROCESS_NAME: svchost.exe
- CURRENT_IRQL: 0
- LAST_CONTROL_TRANSFER: from fffff800d3640225 to fffff800d35d7f90
- STACK_TEXT:
- ffffcb01`4a56f508 fffff800`d3640225 : 00000000`000000f7 000067fa`d00a5be5 0000675b`d00a5be5 ffff98a4`2ff5a41a : nt!KeBugCheckEx
- ffffcb01`4a56f510 fffff800`d34c7d17 : 00000000`00000001 00000000`00000000 ffffc701`48c5d178 ffff9880`000e88c0 : nt!_report_gsfailure+0x25
- ffffcb01`4a56f550 fffff800`d34c777f : ffffb70a`8f7c3090 ffffdf0f`bc45fcf0 ffffb70a`8fdcba80 fffff800`d38a2a1c : nt!KiSwapThread+0x1b7
- ffffcb01`4a56f600 fffff800`d34c9547 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiCommitThreadWait+0x14f
- ffffcb01`4a56f6a0 fffff800`d34d7a18 : ffffb70a`90a036c0 ffffb70a`00000011 ffffb70a`8f79a901 ffffb70a`00000000 : nt!KeWaitForSingleObject+0x377
- ffffcb01`4a56f750 fffff800`d38a7868 : 00000000`00000000 ffffb70a`90a036c0 00000000`00000011 00000291`8ba2fc01 : nt!AlpcpSignalAndWait+0x1d8
- ffffcb01`4a56f7f0 fffff800`d38a6541 : ffffb70a`91070e20 00000291`8b2dc170 ffffffff`ffffffff 00000291`8b2dc170 : nt!AlpcpReceiveSynchronousReply+0x58
- ffffcb01`4a56f850 fffff800`d38a481d : ffffb70a`91070e20 fffff800`00020000 00000291`8b2dc170 00000291`8b94a298 : nt!AlpcpProcessSynchronousRequest+0x301
- ffffcb01`4a56f950 fffff800`d35e2c93 : ffffcb01`4a56fa28 ffffb70a`90a03080 ffffcb01`4a56fb00 000000be`aef7cd78 : nt!NtAlpcSendWaitReceivePort+0x23d
- ffffcb01`4a56fa10 00007ffc`6eff5f44 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
- 000000be`aef7cd58 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`6eff5f44
- STACK_COMMAND: kb
- THREAD_SHA1_HASH_MOD_FUNC: 1a4f76e5a3302c2ff033839ea052ccf8e056ac8a
- THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 03a942cb1db6a46cf7dc687c70a3218e441511f6
- THREAD_SHA1_HASH_MOD: bc100a5647b828107ac4e18055e00abcbe1ec406
- FOLLOWUP_IP:
- nt!_report_gsfailure+25
- fffff800`d3640225 cc int 3
- FAULT_INSTR_CODE: 48cccccc
- SYMBOL_STACK_INDEX: 1
- SYMBOL_NAME: nt!_report_gsfailure+25
- FOLLOWUP_NAME: MachineOwner
- MODULE_NAME: nt
- IMAGE_NAME: ntkrnlmp.exe
- DEBUG_FLR_IMAGE_TIMESTAMP: 578998f1
- IMAGE_VERSION: 10.0.14393.0
- BUCKET_ID_FUNC_OFFSET: 25
- FAILURE_BUCKET_ID: 0xF7_THREE_BIT_MISSING_GSFRAME_nt!_report_gsfailure
- BUCKET_ID: 0xF7_THREE_BIT_MISSING_GSFRAME_nt!_report_gsfailure
- PRIMARY_PROBLEM_CLASS: 0xF7_THREE_BIT_MISSING_GSFRAME_nt!_report_gsfailure
- TARGET_TIME: 2017-08-05T11:08:20.000Z
- OSBUILD: 14393
- OSSERVICEPACK: 0
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 784
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2016-07-15 22:16:17
- BUILDDATESTAMP_STR: 160715-1616
- BUILDLAB_STR: rs1_release
- BUILDOSVER_STR: 10.0.14393.0
- ANALYSIS_SESSION_ELAPSED_TIME: 988
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:0xf7_three_bit_missing_gsframe_nt!_report_gsfailure
- FAILURE_ID_HASH: {78a85278-f601-c152-78ea-701afde9cf45}
- Followup: MachineOwner
- ========================================================================
- =================== Dump File: 080517-3703-01.dmp ====================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 14393 MP (4 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS Personal
- Built by: 14393.0.amd64fre.rs1_release.160715-1616
- Kernel base = 0xfffff803`13c02000 PsLoadedModuleList = 0xfffff803`13f07060
- Debug session time: Sat Aug 5 07:00:45.356 2017 (UTC - 4:00)
- System Uptime: 0 days 0:00:11.030
- BugCheck BE, {ffff82d00cd84a88, 8000000000400121, ffffd501b45f7700, a}
- *** WARNING: Unable to verify timestamp for win32k.sys
- *** ERROR: Module load completed but symbols could not be loaded for win32k.sys
- Probably caused by : memory_corruption
- Followup: memory_corruption
- ATTEMPTED_WRITE_TO_READONLY_MEMORY (be)
- An attempt was made to write to readonly memory. The guilty driver is on the
- stack trace (and is typically the current instruction pointer).
- When possible, the guilty driver's name (Unicode string) is printed on
- the bugcheck screen and saved in KiBugCheckDriver.
- Arguments:
- Arg1: ffff82d00cd84a88, Virtual address for the attempted write.
- Arg2: 8000000000400121, PTE contents.
- Arg3: ffffd501b45f7700, (reserved)
- Arg4: 000000000000000a, (reserved)
- Debugging Details:
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 10.0.14393.0 (rs1_release.160715-1616)
- SYSTEM_SKU: SKU
- BIOS_VENDOR: American Megatrends Inc.
- BIOS_VERSION: 3401
- BIOS_DATE: 01/25/2017
- BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
- BASEBOARD_PRODUCT: Z170-A
- BASEBOARD_VERSION: Rev 1.xx
- DUMP_TYPE: 2
- CPU_COUNT: 4
- CPU_MHZ: db0
- CPU_VENDOR: GenuineIntel
- CPU_FAMILY: 6
- CPU_MODEL: 5e
- CPU_STEPPING: 3
- CPU_MICROCODE: 6,5e,3,0 (F,M,S,R) SIG: 9E'00000000 (cache) 9E'00000000 (init)
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: CODE_CORRUPTION
- BUGCHECK_STR: 0xBE
- PROCESS_NAME: System
- CURRENT_IRQL: 2
- TRAP_FRAME: ffffd501b45f7700 -- (.trap 0xffffd501b45f7700)
- NOTE: The trap frame does not contain all registers.
- Some register values may be zeroed or incorrect.
- rax=0000000000000002 rbx=0000000000000000 rcx=0000000000000041
- rdx=000000000000007f rsi=0000000000000000 rdi=0000000000000000
- rip=fffff80313d26856 rsp=ffffd501b45f7890 rbp=ffffd501b45f7900
- r8=0000000fffffffff r9=0000000000000000 r10=0000000000000000
- r11=ffffc0877618897a r12=0000000000000000 r13=0000000000000000
- r14=0000000000000000 r15=0000000000000000
- iopl=0 nv up ei pl zr na po nc
- nt!MiZeroPageThread+0x656:
- fffff803`13d26856 f0480fba6e183f lock bts qword ptr [rsi+18h],3Fh ds:00000000`00000018=????????????????
- Resetting default scope
- LAST_CONTROL_TRANSFER: from fffff80313ded8aa to fffff80313d4bf90
- STACK_TEXT:
- ffffd501`b45f74a8 fffff803`13ded8aa : 00000000`000000be ffff82d0`0cd84a88 80000000`00400121 ffffd501`b45f7700 : nt!KeBugCheckEx
- ffffd501`b45f74b0 fffff803`13d7ec63 : 00000000`00000000 ffffd501`b45f7600 00000000`00000003 00000000`00000003 : nt!MiRaisedIrqlFault+0x122
- ffffd501`b45f7500 fffff803`13d555fc : ffffc087`75d5f040 fffff803`13c3b77f ffff8000`0cedb910 fffff803`13c6d39f : nt! ?? ::FNODOBFM::`string'+0x23aa3
- ffffd501`b45f7700 fffff803`13d26856 : ffffc087`00000002 ffffd501`b45f7968 fffff803`13f27580 ffffc087`00000008 : nt!KiPageFault+0x13c
- ffffd501`b45f7890 fffff803`13c9e4bd : 00000000`00000000 ffffc087`75d5f040 fffff803`13d26200 fffff803`13f26380 : nt!MiZeroPageThread+0x656
- ffffd501`b45f7b90 fffff803`13d51456 : fffff803`13f44180 ffffc087`75d5f040 fffff803`13c9e47c 00000000`00000000 : nt!PspSystemThreadStartup+0x41
- ffffd501`b45f7be0 00000000`00000000 : ffffd501`b45f8000 ffffd501`b45f1000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
- STACK_COMMAND: kb
- CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
- fffff80313c6d3e8-fffff80313c6d3e9 2 bytes - nt!MiGetSmallZeroPtes+ac
- [ 80 f6:00 88 ]
- fffff80313c6d478-fffff80313c6d479 2 bytes - nt!MiZeroPageWorkMapping+58 (+0x90)
- [ 80 f6:00 88 ]
- fffff80313ceccd8-fffff80313ceccd9 2 bytes - nt!MiReplacePageTablePage+5c (+0x7f860)
- [ 80 fa:00 80 ]
- fffff80313cf333d-fffff80313cf333e 2 bytes - nt!RemoveListEntryPte+31 (+0x6665)
- [ 80 f6:00 88 ]
- fffff80313d101dd-fffff80313d101de 2 bytes - nt!MiPurgeZeroList+6d (+0x1cea0)
- [ 80 fa:00 80 ]
- fffff80313d26880-fffff80313d26881 2 bytes - nt!MiZeroPageThread+680 (+0x166a3)
- [ 80 fa:00 80 ]
- fffff80313ded8e2-fffff80313ded8e3 2 bytes - nt!MiRaisedIrqlFault+15a (+0xc7062)
- [ 80 fa:00 80 ]
- fffff80313ded96b-fffff80313ded96c 2 bytes - nt!MiRaisedIrqlFault+1e3 (+0x89)
- [ ff f6:7f 88 ]
- 16 errors : !nt (fffff80313c6d3e8-fffff80313ded96c)
- MODULE_NAME: memory_corruption
- IMAGE_NAME: memory_corruption
- FOLLOWUP_NAME: memory_corruption
- DEBUG_FLR_IMAGE_TIMESTAMP: 0
- MEMORY_CORRUPTOR: LARGE
- FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
- BUCKET_ID: MEMORY_CORRUPTION_LARGE
- PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
- TARGET_TIME: 2017-08-05T11:00:45.000Z
- OSBUILD: 14393
- OSSERVICEPACK: 0
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 784
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2016-07-15 22:16:17
- BUILDDATESTAMP_STR: 160715-1616
- BUILDLAB_STR: rs1_release
- BUILDOSVER_STR: 10.0.14393.0
- ANALYSIS_SESSION_ELAPSED_TIME: 2953
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:memory_corruption_large
- FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
- Followup: memory_corruption
- ========================================================================
- =================== Dump File: 080517-4281-01.dmp ====================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 14393 MP (4 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS Personal
- Built by: 14393.0.amd64fre.rs1_release.160715-1616
- Kernel base = 0xfffff803`1de81000 PsLoadedModuleList = 0xfffff803`1e186060
- Debug session time: Sat Aug 5 07:42:13.524 2017 (UTC - 4:00)
- System Uptime: 0 days 0:01:16.194
- BugCheck F7, {d1d9dc65ee66, d1d1dc65ee66, ffff2e2e239a1199, 0}
- Probably caused by : ntkrnlmp.exe ( nt!_report_gsfailure+25 )
- Followup: MachineOwner
- DRIVER_OVERRAN_STACK_BUFFER (f7)
- A driver has overrun a stack-based buffer. This overrun could potentially
- allow a malicious user to gain control of this machine.
- DESCRIPTION
- A driver overran a stack-based buffer (or local variable) in a way that would
- have overwritten the function's return address and jumped back to an arbitrary
- address when the function returned. This is the classic "buffer overrun"
- hacking attack and the system has been brought down to prevent a malicious user
- from gaining complete control of it.
- Do a kb to get a stack backtrace -- the last routine on the stack before the
- buffer overrun handlers and bugcheck call is the one that overran its local
- variable(s).
- Arguments:
- Arg1: 0000d1d9dc65ee66, Actual security check cookie from the stack
- Arg2: 0000d1d1dc65ee66, Expected security check cookie
- Arg3: ffff2e2e239a1199, Complement of the expected security check cookie
- Arg4: 0000000000000000, zero
- Debugging Details:
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 10.0.14393.0 (rs1_release.160715-1616)
- SYSTEM_SKU: SKU
- BIOS_VENDOR: American Megatrends Inc.
- BIOS_VERSION: 3401
- BIOS_DATE: 01/25/2017
- BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
- BASEBOARD_PRODUCT: Z170-A
- BASEBOARD_VERSION: Rev 1.xx
- DUMP_TYPE: 2
- SECURITY_COOKIE: Expected 0000d1d1dc65ee66 found 0000d1d9dc65ee66
- BUGCHECK_STR: 0xF7_ONE_BIT
- CPU_COUNT: 4
- CPU_MHZ: db0
- CPU_VENDOR: GenuineIntel
- CPU_FAMILY: 6
- CPU_MODEL: 5e
- CPU_STEPPING: 3
- CPU_MICROCODE: 6,5e,3,0 (F,M,S,R) SIG: 9E'00000000 (cache) 9E'00000000 (init)
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
- PROCESS_NAME: System
- CURRENT_IRQL: 0
- LAST_CONTROL_TRANSFER: from fffff8031e033225 to fffff8031dfcaf90
- STACK_TEXT:
- ffffb400`dc5cca88 fffff803`1e033225 : 00000000`000000f7 0000d1d9`dc65ee66 0000d1d1`dc65ee66 ffff2e2e`239a1199 : nt!KeBugCheckEx
- ffffb400`dc5cca90 fffff803`1debad17 : ffffb400`dc5ccd10 fffff80c`00000000 00000000`00000007 ffff8c02`11378111 : nt!_report_gsfailure+0x25
- ffffb400`dc5ccad0 fffff803`1deba77f : ffffc988`c755f040 ffffc988`c755f180 fffff803`1e23e280 ffffb400`dc5c7000 : nt!KiSwapThread+0x1b7
- ffffb400`dc5ccb80 fffff803`1debc547 : ffffc988`00000000 ffffb400`dc5cd220 ffffc988`c7353f30 00000000`00000000 : nt!KiCommitThreadWait+0x14f
- ffffb400`dc5ccc20 fffff80c`f74d8a75 : ffffb400`dc5cd148 ffffb400`00000000 ffff8c02`11378100 00000000`00000000 : nt!KeWaitForSingleObject+0x377
- ffffb400`dc5cccd0 fffff80c`f74e9d28 : ffff8c02`08241c10 00000000`2f345559 00000000`2f345559 ffff8c02`11378010 : NTFS!NtfsNonCachedIo+0x425
- ffffb400`dc5ccf70 fffff80c`f74e63a8 : ffffb400`dc5cd220 00000000`00000000 00000000`00000000 ffffb400`dc5cd220 : NTFS!NtfsCommonWrite+0x36e8
- ffffb400`dc5cd1f0 fffff80c`f6ad5206 : ffffc988`ca215c00 ffffc988`c9622ab0 ffffc988`c9622ab0 ffffc988`c9622f70 : NTFS!NtfsFsdWrite+0x1d8
- ffffb400`dc5cd4e0 fffff80c`f6ad3146 : ffffb400`dc5cd619 ffffb400`dc5cd6b0 00000000`00000001 ffffc988`c7560010 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x1a6
- ffffb400`dc5cd570 fffff803`1df5940c : ffffc988`c9622ab0 ffffb400`dc5cd7c0 ffffc988`ca07e8b0 ffffc988`c9622ab0 : FLTMGR!FltpDispatch+0xb6
- ffffb400`dc5cd5d0 fffff803`1df69c9a : 00000000`00000000 ffffb400`dc5cd670 ffffc988`ca07e8b0 fffff803`1deee3fd : nt!IoSynchronousPageWriteEx+0x138
- ffffb400`dc5cd610 fffff803`1ded121f : 00000000`00000011 ffff8c02`16561010 00000000`00000000 00000000`00000000 : nt!MiIssueSynchronousFlush+0x72
- ffffb400`dc5cd690 fffff803`1df0a5e4 : ffffb400`ddf5fa68 00000000`00002000 ffffc988`ca0f5860 ffffc988`c84c1bc0 : nt!MiFlushSectionInternal+0x7cf
- ffffb400`dc5cd8c0 fffff803`1deda67c : ffffb400`ddf5fa68 ffffc988`c755f040 00000000`00002000 00000000`00000000 : nt!MmFlushSection+0x1a8
- ffffb400`dc5cd970 fffff803`1ded9742 : ffffc988`ca0f7b08 00000000`00000000 ffffc988`00000001 00000000`00000000 : nt!CcFlushCachePriv+0x3fc
- ffffb400`dc5cda80 fffff803`1ded8d79 : fffff803`1e23e100 fffff803`1e28bb01 00000000`00000000 fffff803`00000007 : nt!CcWriteBehindInternal+0x15a
- ffffb400`dc5cdb00 fffff803`1df1d4bd : fffff803`1e1c3180 00000000`00000080 ffffc988`c62b46c0 ffffc988`c755f040 : nt!ExpWorkerThread+0xe9
- ffffb400`dc5cdb90 fffff803`1dfd0456 : fffff803`1e1c3180 ffffc988`c755f040 fffff803`1df1d47c 00000000`001e8080 : nt!PspSystemThreadStartup+0x41
- ffffb400`dc5cdbe0 00000000`00000000 : ffffb400`dc5ce000 ffffb400`dc5c7000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
- STACK_COMMAND: kb
- THREAD_SHA1_HASH_MOD_FUNC: ab8ddea2ceccdb84e6e2057ec7370accf447746d
- THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 5d023df74d9046f48fabc1e1efc75c535e1cc0d0
- THREAD_SHA1_HASH_MOD: 3cbdb1db51dc7640045ce14a5cdc9c2a1bffd1b1
- FOLLOWUP_IP:
- nt!_report_gsfailure+25
- fffff803`1e033225 cc int 3
- FAULT_INSTR_CODE: 48cccccc
- SYMBOL_STACK_INDEX: 1
- SYMBOL_NAME: nt!_report_gsfailure+25
- FOLLOWUP_NAME: MachineOwner
- MODULE_NAME: nt
- IMAGE_NAME: ntkrnlmp.exe
- DEBUG_FLR_IMAGE_TIMESTAMP: 578998f1
- IMAGE_VERSION: 10.0.14393.0
- BUCKET_ID_FUNC_OFFSET: 25
- FAILURE_BUCKET_ID: 0xF7_ONE_BIT_MISSING_GSFRAME_nt!_report_gsfailure
- BUCKET_ID: 0xF7_ONE_BIT_MISSING_GSFRAME_nt!_report_gsfailure
- PRIMARY_PROBLEM_CLASS: 0xF7_ONE_BIT_MISSING_GSFRAME_nt!_report_gsfailure
- TARGET_TIME: 2017-08-05T11:42:13.000Z
- OSBUILD: 14393
- OSSERVICEPACK: 0
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 784
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2016-07-15 22:16:17
- BUILDDATESTAMP_STR: 160715-1616
- BUILDLAB_STR: rs1_release
- BUILDOSVER_STR: 10.0.14393.0
- ANALYSIS_SESSION_ELAPSED_TIME: 97a
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:0xf7_one_bit_missing_gsframe_nt!_report_gsfailure
- FAILURE_ID_HASH: {8f84f302-dd0e-1f96-6f9c-0ea31ad59f42}
- Followup: MachineOwner
- ========================================================================
- =================== Dump File: 080517-4359-01.dmp ====================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 14393 MP (4 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS Personal
- Built by: 14393.0.amd64fre.rs1_release.160715-1616
- Kernel base = 0xfffff803`c008b000 PsLoadedModuleList = 0xfffff803`c0390060
- Debug session time: Sat Aug 5 06:58:30.318 2017 (UTC - 4:00)
- System Uptime: 0 days 0:00:09.992
- BugCheck A, {fffffe8c78556290, 2, 0, fffff803c01da22d}
- Probably caused by : msrpc.sys ( msrpc!LRPC_CASSOCIATION::Bind+2cf )
- Followup: MachineOwner
- IRQL_NOT_LESS_OR_EQUAL (a)
- An attempt was made to access a pageable (or completely invalid) address at an
- interrupt request level (IRQL) that is too high. This is usually
- caused by drivers using improper addresses.
- If a kernel debugger is available get the stack backtrace.
- Arguments:
- Arg1: fffffe8c78556290, memory referenced
- Arg2: 0000000000000002, IRQL
- Arg3: 0000000000000000, bitfield :
- bit 0 : value 0 = read operation, 1 = write operation
- bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
- Arg4: fffff803c01da22d, address which referenced memory
- Debugging Details:
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 10.0.14393.0 (rs1_release.160715-1616)
- SYSTEM_SKU: SKU
- BIOS_VENDOR: American Megatrends Inc.
- BIOS_VERSION: 3401
- BIOS_DATE: 01/25/2017
- BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
- BASEBOARD_PRODUCT: Z170-A
- BASEBOARD_VERSION: Rev 1.xx
- DUMP_TYPE: 2
- READ_ADDRESS: fffff803c0432338: Unable to get MiVisibleState
- fffffe8c78556290
- CURRENT_IRQL: 2
- FAULTING_IP:
- nt!SwapContext+1cd
- fffff803`c01da22d 480b9650020000 or rdx,qword ptr [rsi+250h]
- CPU_COUNT: 4
- CPU_MHZ: db0
- CPU_VENDOR: GenuineIntel
- CPU_FAMILY: 6
- CPU_MODEL: 5e
- CPU_STEPPING: 3
- CPU_MICROCODE: 6,5e,3,0 (F,M,S,R) SIG: 9E'00000000 (cache) 9E'00000000 (init)
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
- BUGCHECK_STR: AV
- PROCESS_NAME: System
- TRAP_FRAME: ffffc900a6db0820 -- (.trap 0xffffc900a6db0820)
- NOTE: The trap frame does not contain all registers.
- Some register values may be zeroed or incorrect.
- rax=0000000000004080 rbx=0000000000000000 rcx=fffff78000000000
- rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
- rip=fffff803c01da22d rsp=ffffc900a6db09b0 rbp=000000edb59bbfff
- r8=0000000000000002 r9=0000000000000000 r10=0000000000000008
- r11=ffffde8c791ffb50 r12=0000000000000000 r13=0000000000000000
- r14=0000000000000000 r15=0000000000000000
- iopl=0 nv up ei pl zr na po nc
- nt!SwapContext+0x1cd:
- fffff803`c01da22d 480b9650020000 or rdx,qword ptr [rsi+250h] ds:00000000`00000250=????????????????
- Resetting default scope
- LAST_CONTROL_TRANSFER: from fffff803c01e0129 to fffff803c01d4f90
- STACK_TEXT:
- ffffc900`a6db06d8 fffff803`c01e0129 : 00000000`0000000a fffffe8c`78556290 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
- ffffc900`a6db06e0 fffff803`c01de707 : ffff8608`697af5d0 ffff8608`698e9ad0 00000000`00008814 00000000`00000003 : nt!KiBugCheckDispatch+0x69
- ffffc900`a6db0820 fffff803`c01da22d : 00000000`02141dc7 ffffde8c`78556040 ffffde8c`7eb4c540 00000000`0000012a : nt!KiPageFault+0x247
- ffffc900`a6db09b0 fffff803`c01d9da6 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!SwapContext+0x1cd
- ffffc900`a6db09f0 fffff803`c00c4cdc : 00000000`00000000 ffffc900`00000000 ffff8608`6841e7f0 fffff803`00000000 : nt!KiSwapContext+0x76
- ffffc900`a6db0b30 fffff803`c00c477f : ffffde8c`78556040 ffffde8c`78556180 fffff803`c0448280 fffff803`c049fa1c : nt!KiSwapThread+0x17c
- ffffc900`a6db0be0 fffff803`c00c6547 : ffffc900`00000000 ffffde8c`7ef745b0 ffffde8c`7ea5aa60 00000000`00000000 : nt!KiCommitThreadWait+0x14f
- ffffc900`a6db0c80 fffff803`c00d4a18 : ffffde8c`78556680 ffffde8c`00000011 00000000`00000000 ffffde8c`00000000 : nt!KeWaitForSingleObject+0x377
- ffffc900`a6db0d30 fffff803`c04a4868 : 00000000`00000000 ffffde8c`78556680 00000000`00000011 ffff8608`698ad000 : nt!AlpcpSignalAndWait+0x1d8
- ffffc900`a6db0dd0 fffff803`c04a3541 : ffffde8c`7ef745b0 ffff8608`63420000 ffffffff`ffffffff ffff8608`63420000 : nt!AlpcpReceiveSynchronousReply+0x58
- ffffc900`a6db0e30 fffff803`c04a181d : ffffde8c`7ef745b0 fffff803`00220000 ffff8608`63420000 ffff8608`698e5ab0 : nt!AlpcpProcessSynchronousRequest+0x301
- ffffc900`a6db0f30 fffff803`c01dfc93 : ffffc900`a6db1008 ffffde8c`78556040 ffffc900`a6db10e0 ffffc900`a6db1218 : nt!NtAlpcSendWaitReceivePort+0x23d
- ffffc900`a6db0ff0 fffff803`c01d8150 : fffff806`5cef8067 00000000`00000000 ffff8608`69897068 00000000`00000003 : nt!KiSystemServiceCopyEnd+0x13
- ffffc900`a6db11f8 fffff806`5cef8067 : 00000000`00000000 ffff8608`69897068 00000000`00000003 fffff806`5cef8990 : nt!KiServiceLinkage
- ffffc900`a6db1200 fffff806`5cef208e : ffff8608`698e5a40 fffff806`5ced3510 00000000`00000000 ffff8608`698e5ab0 : msrpc!LRPC_CASSOCIATION::Bind+0x2cf
- ffffc900`a6db12b0 fffff806`5cef2212 : ffff8608`698e5a40 ffffc900`a6db13e9 00000000`00000000 ffff8608`6986c010 : msrpc!LRPC_BIND_CCALL::BaseBind+0x92
- ffffc900`a6db1330 fffff806`5cef4f55 : 00000000`00000001 ffff8608`698e5a40 ffffc900`a6db13e9 ffff8608`6986c010 : msrpc!LRPC_FAST_BIND_CCALL::Bind+0x32
- ffffc900`a6db1380 fffff806`5cefe5f3 : ffff8608`6986c010 ffff8608`00000000 ffff8608`698e5f50 00000000`00000000 : msrpc!LRPC_FAST_BINDING_HANDLE::Bind+0x145
- ffffc900`a6db1450 fffff806`5cefe064 : ffff8608`698e5c90 00000000`00000000 00000000`00000000 fffff803`00000000 : msrpc!BindToEpMapper+0x6b
- ffffc900`a6db14b0 fffff806`5cefd8fe : 00000000`00000000 fffff806`5cf00a40 ffff8608`62a87898 fffff803`00000000 : msrpc!EP_LOOKUP_DATA::ResolveEndpoint+0x10c
- ffffc900`a6db1550 fffff806`5cefd877 : ffff8608`62a87898 ffff8608`62a87868 00000000`00000000 fffff806`5cefd9c8 : msrpc!ResolveEndpointWithEpMapper+0x82
- ffffc900`a6db15c0 fffff806`5cefd5a5 : ffff8608`62a87898 ffff8608`62a87868 00000000`00000000 fffff803`c00d3f4a : msrpc!ResolveEndpointIfNecessary+0xaf
- ffffc900`a6db1640 fffff806`5cefd6bd : 00000000`00000000 ffff8608`62a87850 ffff8608`698a61a0 ffff8608`62a878e0 : msrpc!LRPC_BASE_BINDING_HANDLE::SubmitResolveEndpointRequest+0xe5
- ffffc900`a6db16d0 fffff806`5cef5852 : 00000000`00000000 ffff8608`62a87850 fffff806`5db84200 00000000`00000000 : msrpc!LRPC_BASE_BINDING_HANDLE::ResolveEndpoint+0xe9
- ffffc900`a6db1750 fffff806`5cef4f33 : 00000000`00000001 ffff8608`698a6010 ffffc900`a6db1819 ffff8608`62a87850 : msrpc!LRPC_BASE_BINDING_HANDLE::DriveStateForward+0x2d6
- ffffc900`a6db17b0 fffff806`5db4af31 : fffff806`5db916b0 00000000`00000000 fffff806`5db916a0 00000000`00000000 : msrpc!LRPC_FAST_BINDING_HANDLE::Bind+0x123
- ffffc900`a6db1880 fffff806`5db4ad54 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : NETIO!NsipRpcAcquireHandle+0x91
- ffffc900`a6db18c0 fffff806`5db4ace1 : fffff806`5db916a0 ffffc900`a6db19f0 ffffc900`a6db1a60 ffffc900`00000000 : NETIO!NsipNotifyUserMode+0x4c
- ffffc900`a6db19b0 fffff806`5daa3b32 : fffff806`5db916a0 ffffde8c`7de23a20 ffffc900`a6db1ad0 00000000`00000000 : NETIO!NsiParameterChange+0x171
- ffffc900`a6db1a40 fffff806`5da147be : ffffde8c`78556040 ffffde8c`7de23a20 ffffde8c`7eff80b0 ffffde8c`7eff80b0 : ndis!ndisNsiNotifyClientInterfaceChange+0xb2
- ffffc900`a6db1ab0 fffff803`c00e2d79 : ffffde8c`78556040 ffffde8c`7eff80c0 fffff803`00000000 ffffde8c`00000003 : ndis!ndisNsiQueuedIfBlockRodChangeNotification+0x5e
- ffffc900`a6db1b00 fffff803`c01274bd : 00000000`00000000 00000000`00000080 ffffde8c`784b46c0 ffffde8c`78556040 : nt!ExpWorkerThread+0xe9
- ffffc900`a6db1b90 fffff803`c01da456 : ffffc900`a6bc8180 ffffde8c`78556040 fffff803`c012747c 00000000`00000000 : nt!PspSystemThreadStartup+0x41
- ffffc900`a6db1be0 00000000`00000000 : ffffc900`a6db2000 ffffc900`a6dab000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
- STACK_COMMAND: kb
- THREAD_SHA1_HASH_MOD_FUNC: 9f26870b7a04b6c2d0825825ec5f817a1ff62bbe
- THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 6529a765491b4f1d1e32d7bc5a6e538ae8d4e7de
- THREAD_SHA1_HASH_MOD: 0ef54a3bfa62f27a168cd0d0b7244acf0a33cdcf
- FOLLOWUP_IP:
- msrpc!LRPC_CASSOCIATION::Bind+2cf
- fffff806`5cef8067 bb170000c0 mov ebx,0C0000017h
- FAULT_INSTR_CODE: 17bb
- SYMBOL_STACK_INDEX: e
- SYMBOL_NAME: msrpc!LRPC_CASSOCIATION::Bind+2cf
- FOLLOWUP_NAME: MachineOwner
- MODULE_NAME: msrpc
- IMAGE_NAME: msrpc.sys
- DEBUG_FLR_IMAGE_TIMESTAMP: 57899a8a
- IMAGE_VERSION: 10.0.14393.0
- BUCKET_ID_FUNC_OFFSET: 2cf
- FAILURE_BUCKET_ID: AV_msrpc!LRPC_CASSOCIATION::Bind
- BUCKET_ID: AV_msrpc!LRPC_CASSOCIATION::Bind
- PRIMARY_PROBLEM_CLASS: AV_msrpc!LRPC_CASSOCIATION::Bind
- TARGET_TIME: 2017-08-05T10:58:30.000Z
- OSBUILD: 14393
- OSSERVICEPACK: 0
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 784
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2016-07-15 22:16:17
- BUILDDATESTAMP_STR: 160715-1616
- BUILDLAB_STR: rs1_release
- BUILDOSVER_STR: 10.0.14393.0
- ANALYSIS_SESSION_ELAPSED_TIME: 9ce
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:av_msrpc!lrpc_cassociation::bind
- FAILURE_ID_HASH: {ad2870fc-56c4-9fea-24a0-352948838279}
- Followup: MachineOwner
- ========================================================================
- =================== Dump File: 080517-4796-01.dmp ====================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 14393 MP (4 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS Personal
- Built by: 14393.0.amd64fre.rs1_release.160715-1616
- Kernel base = 0xfffff800`0b87c000 PsLoadedModuleList = 0xfffff800`0bb81060
- Debug session time: Sat Aug 5 07:37:39.576 2017 (UTC - 4:00)
- System Uptime: 0 days 0:22:47.247
- BugCheck D1, {fffff80fd03d8440, 2, 0, fffff808baa1e7cd}
- *** WARNING: Unable to verify timestamp for e1i63x64.sys
- *** ERROR: Module load completed but symbols could not be loaded for e1i63x64.sys
- Probably caused by : e1i63x64.sys ( e1i63x64+16156 )
- Followup: MachineOwner
- DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
- An attempt was made to access a pageable (or completely invalid) address at an
- interrupt request level (IRQL) that is too high. This is usually
- caused by drivers using improper addresses.
- If kernel debugger is available get stack backtrace.
- Arguments:
- Arg1: fffff80fd03d8440, memory referenced
- Arg2: 0000000000000002, IRQL
- Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
- Arg4: fffff808baa1e7cd, address which referenced memory
- Debugging Details:
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 10.0.14393.0 (rs1_release.160715-1616)
- SYSTEM_SKU: SKU
- BIOS_VENDOR: American Megatrends Inc.
- BIOS_VERSION: 3401
- BIOS_DATE: 01/25/2017
- BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
- BASEBOARD_PRODUCT: Z170-A
- BASEBOARD_VERSION: Rev 1.xx
- DUMP_TYPE: 2
- READ_ADDRESS: fffff8000bc23338: Unable to get MiVisibleState
- fffff80fd03d8440
- CURRENT_IRQL: 2
- FAULTING_IP:
- tcpip!TcpMatchReceive+16d
- fffff808`baa1e7cd 488b0a mov rcx,qword ptr [rdx]
- CPU_COUNT: 4
- CPU_MHZ: db0
- CPU_VENDOR: GenuineIntel
- CPU_FAMILY: 6
- CPU_MODEL: 5e
- CPU_STEPPING: 3
- CPU_MICROCODE: 6,5e,3,0 (F,M,S,R) SIG: 9E'00000000 (cache) 9E'00000000 (init)
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
- BUGCHECK_STR: AV
- PROCESS_NAME: amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.14393.1439_none_7efe016621f5
- DPC_STACK_BASE: FFFFF8000D53DFB0
- TRAP_FRAME: fffff8000d53cb60 -- (.trap 0xfffff8000d53cb60)
- NOTE: The trap frame does not contain all registers.
- Some register values may be zeroed or incorrect.
- rax=ffff900fcb3163c0 rbx=0000000000000000 rcx=00000000918d8104
- rdx=fffff80fd03d8440 rsi=0000000000000000 rdi=0000000000000000
- rip=fffff808baa1e7cd rsp=fffff8000d53ccf0 rbp=fffff8000d53cdf0
- r8=ffff900fcb1b1730 r9=00000000918d8104 r10=fffff8000d53cdb8
- r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
- r14=0000000000000000 r15=0000000000000000
- iopl=0 nv up ei pl zr na po nc
- tcpip!TcpMatchReceive+0x16d:
- fffff808`baa1e7cd 488b0a mov rcx,qword ptr [rdx] ds:fffff80f`d03d8440=????????????????
- Resetting default scope
- LAST_CONTROL_TRANSFER: from fffff8000b9d1129 to fffff8000b9c5f90
- STACK_TEXT:
- fffff800`0d53ca18 fffff800`0b9d1129 : 00000000`0000000a fffff80f`d03d8440 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
- fffff800`0d53ca20 fffff800`0b9cf707 : ffff900f`cb0eb860 00000000`00000001 ffff900f`cb5e8c80 00000000`00000000 : nt!KiBugCheckDispatch+0x69
- fffff800`0d53cb60 fffff808`baa1e7cd : ffff900f`ca5c40a0 00001f80`00000200 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x247
- fffff800`0d53ccf0 fffff808`baa1e310 : ffff900f`ca5f7220 00000000`003436b9 ffff900f`cb763640 fffff808`b9ef3d9a : tcpip!TcpMatchReceive+0x16d
- fffff800`0d53cfa0 fffff808`baa2eb81 : ffff900f`cb2ea6f0 fffff800`0b971a28 00000000`00000004 fffff800`0b97286b : tcpip!TcpPreValidatedReceive+0x460
- fffff800`0d53d090 fffff808`baa2c42e : ffff900f`cb785700 00000000`00000000 ffff900f`cc982406 fffff808`00000006 : tcpip!IpFlcReceivePreValidatedPackets+0x591
- fffff800`0d53d230 fffff800`0b8e0e75 : 00000000`00000002 ffff900f`cd415080 fffff808`baa2c2d0 fffff800`0d53d3e0 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0x15e
- fffff800`0d53d360 fffff808`baa619b6 : ffff900f`cb1cc860 00000000`00000000 ffff900f`cb1d6880 ffff900f`cb70f900 : nt!KeExpandKernelStackAndCalloutInternal+0x85
- fffff800`0d53d3b0 fffff808`b9a4392e : 00000000`00000000 fffff800`0d53d4b0 00000000`00000002 ffff900f`cb6c9010 : tcpip!FlReceiveNetBufferListChain+0xb6
- fffff800`0d53d430 fffff808`b9a433c4 : 00000000`00000001 ffff900f`0000dd00 ffff900f`00000000 00000000`00000002 : ndis!ndisMIndicateNetBufferListsToOpen+0x11e
- fffff800`0d53d4f0 fffff808`b9a43e97 : ffff900f`cb3281a0 fffff808`00000000 ffff900f`cb3281a0 ffff900f`cb3281a0 : ndis!ndisMTopReceiveNetBufferLists+0x224
- fffff800`0d53d600 fffff808`b9a42ce5 : ffff900f`cb3281a0 fffff800`0d53d750 00000000`00000801 00000000`00000001 : ndis!ndisCallReceiveHandler+0x47
- fffff800`0d53d650 fffff808`ba956156 : ffff900f`cb70f950 ffff900f`cb70f950 ffff900f`cb51ee40 ffff900f`cb6d88c0 : ndis!NdisMIndicateReceiveNetBufferLists+0x735
- fffff800`0d53d840 ffff900f`cb70f950 : ffff900f`cb70f950 ffff900f`cb51ee40 ffff900f`cb6d88c0 00000000`00000801 : e1i63x64+0x16156
- fffff800`0d53d848 ffff900f`cb70f950 : ffff900f`cb51ee40 ffff900f`cb6d88c0 00000000`00000801 fffff800`0d53daa0 : 0xffff900f`cb70f950
- fffff800`0d53d850 ffff900f`cb51ee40 : ffff900f`cb6d88c0 00000000`00000801 fffff800`0d53daa0 ffff900f`cb70f950 : 0xffff900f`cb70f950
- fffff800`0d53d858 ffff900f`cb6d88c0 : 00000000`00000801 fffff800`0d53daa0 ffff900f`cb70f950 ffff900f`cb6d8950 : 0xffff900f`cb51ee40
- fffff800`0d53d860 00000000`00000801 : fffff800`0d53daa0 ffff900f`cb70f950 ffff900f`cb6d8950 00000000`00000000 : 0xffff900f`cb6d88c0
- fffff800`0d53d868 fffff800`0d53daa0 : ffff900f`cb70f950 ffff900f`cb6d8950 00000000`00000000 fffff800`0d53daa0 : 0x801
- fffff800`0d53d870 ffff900f`cb70f950 : ffff900f`cb6d8950 00000000`00000000 fffff800`0d53daa0 ffff900f`cb51e000 : 0xfffff800`0d53daa0
- fffff800`0d53d878 ffff900f`cb6d8950 : 00000000`00000000 fffff800`0d53daa0 ffff900f`cb51e000 fffff808`ba9573e3 : 0xffff900f`cb70f950
- fffff800`0d53d880 00000000`00000000 : fffff800`0d53daa0 ffff900f`cb51e000 fffff808`ba9573e3 ffff900f`cb6d8900 : 0xffff900f`cb6d8950
- STACK_COMMAND: kb
- THREAD_SHA1_HASH_MOD_FUNC: 9077c506bee4b68a48aa864340ae865029a9c2e7
- THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 9f38f11c9a6a01628ca8aa05adbfc062c41b817c
- THREAD_SHA1_HASH_MOD: 0d19b9c5761f833083dea77922c55dc8a7fd45cb
- FOLLOWUP_IP:
- e1i63x64+16156
- fffff808`ba956156 ?? ???
- SYMBOL_STACK_INDEX: d
- SYMBOL_NAME: e1i63x64+16156
- FOLLOWUP_NAME: MachineOwner
- MODULE_NAME: e1i63x64
- IMAGE_NAME: e1i63x64.sys
- DEBUG_FLR_IMAGE_TIMESTAMP: 56da0235
- BUCKET_ID_FUNC_OFFSET: 16156
- FAILURE_BUCKET_ID: AV_e1i63x64!unknown_function
- BUCKET_ID: AV_e1i63x64!unknown_function
- PRIMARY_PROBLEM_CLASS: AV_e1i63x64!unknown_function
- TARGET_TIME: 2017-08-05T11:37:39.000Z
- OSBUILD: 14393
- OSSERVICEPACK: 0
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 784
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2016-07-15 22:16:17
- BUILDDATESTAMP_STR: 160715-1616
- BUILDLAB_STR: rs1_release
- BUILDOSVER_STR: 10.0.14393.0
- ANALYSIS_SESSION_ELAPSED_TIME: 97c
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:av_e1i63x64!unknown_function
- FAILURE_ID_HASH: {e02c4228-6ee3-a4f6-d146-ca73b3992c57}
- Followup: MachineOwner
- ========================================================================
- =================== Dump File: 080517-4812-01.dmp ====================
- ========================================================================
- Could not open dump file [C:\Users\UserName\Desktop\ssd2\080517-4812-01.dmp], NTSTATUS 0xC000011E
- "An attempt was made to map a file of size zero with the maximum size specified as zero."
- Debuggee initialization failed, NTSTATUS 0xC000011E
- An attempt was made to map a file of size zero with the maximum size specified as zero.
- ========================================================================
- =================== Dump File: 080517-3312-01.dmp ====================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 14393 MP (4 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS Personal
- Built by: 14393.0.amd64fre.rs1_release.160715-1616
- Kernel base = 0xfffff802`eac92000 PsLoadedModuleList = 0xfffff802`eaf97060
- Debug session time: Sat Aug 5 07:07:06.708 2017 (UTC - 4:00)
- System Uptime: 0 days 0:01:08.382
- BugCheck 1E, {ffffffffc0000005, fffff802eacd4fd5, 0, ffffffffffffffff}
- Probably caused by : memory_corruption
- Followup: memory_corruption
- KMODE_EXCEPTION_NOT_HANDLED (1e)
- This is a very common bugcheck. Usually the exception address pinpoints
- the driver/function that caused the problem. Always note this address
- as well as the link date of the driver/image that contains this address.
- Arguments:
- Arg1: ffffffffc0000005, The exception code that was not handled
- Arg2: fffff802eacd4fd5, The address that the exception occurred at
- Arg3: 0000000000000000, Parameter 0 of the exception
- Arg4: ffffffffffffffff, Parameter 1 of the exception
- Debugging Details:
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 10.0.14393.0 (rs1_release.160715-1616)
- SYSTEM_SKU: SKU
- BIOS_VENDOR: American Megatrends Inc.
- BIOS_VERSION: 3401
- BIOS_DATE: 01/25/2017
- BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
- BASEBOARD_PRODUCT: Z170-A
- BASEBOARD_VERSION: Rev 1.xx
- DUMP_TYPE: 2
- READ_ADDRESS: fffff802eb039338: Unable to get MiVisibleState
- ffffffffffffffff
- EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
- FAULTING_IP:
- nt!MiRemoveAnyPage+145
- fffff802`eacd4fd5 f0480fba69183f lock bts qword ptr [rcx+18h],3Fh
- EXCEPTION_PARAMETER2: ffffffffffffffff
- BUGCHECK_STR: 0x1E_c0000005_R
- CPU_COUNT: 4
- CPU_MHZ: db0
- CPU_VENDOR: GenuineIntel
- CPU_FAMILY: 6
- CPU_MODEL: 5e
- CPU_STEPPING: 3
- CPU_MICROCODE: 6,5e,3,0 (F,M,S,R) SIG: 9E'00000000 (cache) 9E'00000000 (init)
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: CODE_CORRUPTION
- PROCESS_NAME: consent.exe
- CURRENT_IRQL: 2
- LAST_CONTROL_TRANSFER: from fffff802eae1514e to fffff802eaddbf90
- STACK_TEXT:
- ffffd980`d2cfa568 fffff802`eae1514e : 00000000`0000001e ffffffff`c0000005 fffff802`eacd4fd5 00000000`00000000 : nt!KeBugCheckEx
- ffffd980`d2cfa570 fffff802`eade7202 : 00000000`00000000 fffff802`ead02946 ffff990a`9c541ac0 fffff802`00000000 : nt! ?? ::FNODOBFM::`string'+0x29f8e
- ffffd980`d2cfac40 fffff802`eade54bd : ffffac80`00ca39e0 ffffd980`d2cfae80 00000000`0000000a 00000000`00000002 : nt!KiExceptionDispatch+0xc2
- ffffd980`d2cfae20 fffff802`eacd4fd5 : 00000000`00000000 ffffaf80`00003800 00000000`00000002 fffff802`ead082a0 : nt!KiGeneralProtectionFault+0xfd
- ffffd980`d2cfafb0 fffff802`ead086b5 : 00000000`00000002 fffff802`eafb6380 00000000`00000002 fffff802`eafb6380 : nt!MiRemoveAnyPage+0x145
- ffffd980`d2cfb070 fffff802`ead082a0 : fffff802`eafb6380 ffffd980`00000077 00000000`00000002 00000000`00000002 : nt!MiGetFreeOrZeroPage+0x265
- ffffd980`d2cfb140 fffff802`ead07e96 : fffff802`eafb6380 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiGetPage+0x80
- ffffd980`d2cfb1c0 fffff802`ead06058 : ffff990a`a2109040 fffff802`eace1a0b ffffd980`d2cfb4a0 fffff802`ead0c8e5 : nt!MiGetPageChain+0x156
- ffffd980`d2cfb2f0 fffff802`ead09813 : 01000000`00000002 ffffd980`d2cfb4b0 00000000`00000020 00000000`00000004 : nt!MiResolvePrivateZeroFault+0x128
- ffffd980`d2cfb3b0 fffff802`eace2cce : 00000000`00000080 00000000`0003870f 00000000`0003870f fffff600`00000000 : nt!MmAccessFault+0xab3
- ffffd980`d2cfb5b0 fffff802`eb0b1b31 : 00000000`070e1eaf ffffd980`d2cfb724 00000000`00000003 00000000`00000000 : nt!MiCommitExistingVad+0x75e
- ffffd980`d2cfb6c0 fffff802`eb0b17a0 : 00000000`00000002 fffff802`eade7eef 00000000`00000010 00000000`00010202 : nt!MiAllocateVirtualMemory+0x381
- ffffd980`d2cfb8b0 fffff802`eade6c93 : ffff990a`9c5415c0 fffff802`eb0cce2b ffff990a`a2109040 fffff802`eacfac0c : nt!NtAllocateVirtualMemory+0x40
- ffffd980`d2cfb910 fffff802`eaddf150 : fffff802`eb0b9c48 00000000`00000087 ffff990a`000001ee fffff802`eafcbde0 : nt!KiSystemServiceCopyEnd+0x13
- ffffd980`d2cfbb18 fffff802`eb0b9c48 : 00000000`00000087 ffff990a`000001ee fffff802`eafcbde0 00000000`00000000 : nt!KiServiceLinkage
- ffffd980`d2cfbb20 fffff802`eb0b9a30 : 00000000`00002000 00000000`00080000 ffffd980`d2cfc4f0 00000070`e1eae000 : nt!RtlCreateUserStack+0x174
- ffffd980`d2cfbbe0 fffff802`eb0baa81 : ffff990a`a2109420 00000000`00001968 ffffd980`d2cfcb00 ffff990a`a18b9730 : nt!PspSetupUserStack+0x74
- ffffd980`d2cfbca0 fffff802`eb0c8dd6 : 00000000`00000000 ffffd980`d2cfcb00 00000000`00000001 ffffd980`00000000 : nt!PspAllocateThread+0x39d
- ffffd980`d2cfbe30 fffff802`eade6c93 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtCreateUserProcess+0x7c6
- ffffd980`d2cfca10 00007ff9`b94d65e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
- 00000060`652fd518 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`b94d65e4
- STACK_COMMAND: kb
- CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
- fffff802eacd4c1e - nt!MiReplenishPageSlist+1ae
- [ fa:ac ]
- fffff802eacd4f9e - nt!MiRemoveAnyPage+10e (+0x380)
- [ fa:ac ]
- fffff802ead06f21 - nt!MiAllocateWsle+421 (+0x31f83)
- [ 80:00 ]
- fffff802ead07eaa - nt!MiGetPageChain+16a (+0xf89)
- [ fa:ac ]
- fffff802ead082b8 - nt!MiGetPage+98 (+0x40e)
- [ fa:ac ]
- fffff802ead08733 - nt!MiGetFreeOrZeroPage+2e3 (+0x47b)
- [ fa:ac ]
- fffff802ead08789 - nt!MiGetFreeOrZeroPage+339 (+0x56)
- [ fa:ac ]
- fffff802ead098a3 - nt!MmAccessFault+b43 (+0x111a)
- [ 80:00 ]
- fffff802eada01de - nt!MiPurgeZeroList+6e (+0x9693b)
- [ fa:ac ]
- 9 errors : !nt (fffff802eacd4c1e-fffff802eada01de)
- MODULE_NAME: memory_corruption
- IMAGE_NAME: memory_corruption
- FOLLOWUP_NAME: memory_corruption
- DEBUG_FLR_IMAGE_TIMESTAMP: 0
- MEMORY_CORRUPTOR: LARGE
- FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
- BUCKET_ID: MEMORY_CORRUPTION_LARGE
- PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
- TARGET_TIME: 2017-08-05T11:07:06.000Z
- OSBUILD: 14393
- OSSERVICEPACK: 0
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 784
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2016-07-15 22:16:17
- BUILDDATESTAMP_STR: 160715-1616
- BUILDLAB_STR: rs1_release
- BUILDOSVER_STR: 10.0.14393.0
- ANALYSIS_SESSION_ELAPSED_TIME: 3858
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:memory_corruption_large
- FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
- Followup: memory_corruption
- ========================================================================
- =================== Dump File: 080517-3421-01.dmp ====================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 14393 MP (4 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS Personal
- Built by: 14393.0.amd64fre.rs1_release.160715-1616
- Kernel base = 0xfffff803`dc200000 PsLoadedModuleList = 0xfffff803`dc505060
- Debug session time: Sat Aug 5 07:54:25.501 2017 (UTC - 4:00)
- System Uptime: 0 days 0:01:50.173
- BugCheck 50, {ffffcb65bee1e730, 0, fffff803dc26f40c, 2}
- Could not read faulting driver name
- Probably caused by : memory_corruption
- Followup: memory_corruption
- PAGE_FAULT_IN_NONPAGED_AREA (50)
- Invalid system memory was referenced. This cannot be protected by try-except.
- Typically the address is just plain bad or it is pointing at freed memory.
- Arguments:
- Arg1: ffffcb65bee1e730, memory referenced.
- Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
- Arg3: fffff803dc26f40c, If non-zero, the instruction address which referenced the bad memory
- address.
- Arg4: 0000000000000002, (reserved)
- Debugging Details:
- Could not read faulting driver name
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 10.0.14393.0 (rs1_release.160715-1616)
- SYSTEM_SKU: SKU
- BIOS_VENDOR: American Megatrends Inc.
- BIOS_VERSION: 3401
- BIOS_DATE: 01/25/2017
- BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
- BASEBOARD_PRODUCT: Z170-A
- BASEBOARD_VERSION: Rev 1.xx
- DUMP_TYPE: 2
- READ_ADDRESS: fffff803dc5a7338: Unable to get MiVisibleState
- ffffcb65bee1e730 Paged pool
- FAULTING_IP:
- nt!MmCheckCachedPageStates+bc
- fffff803`dc26f40c 488b1401 mov rdx,qword ptr [rcx+rax]
- MM_INTERNAL_CODE: 2
- CPU_COUNT: 4
- CPU_MHZ: db0
- CPU_VENDOR: GenuineIntel
- CPU_FAMILY: 6
- CPU_MODEL: 5e
- CPU_STEPPING: 3
- CPU_MICROCODE: 6,5e,3,0 (F,M,S,R) SIG: 9E'00000000 (cache) 9E'00000000 (init)
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: CODE_CORRUPTION
- BUGCHECK_STR: AV
- PROCESS_NAME: svchost.exe
- CURRENT_IRQL: 0
- TRAP_FRAME: ffff82818f3cf060 -- (.trap 0xffff82818f3cf060)
- NOTE: The trap frame does not contain all registers.
- Some register values may be zeroed or incorrect.
- rax=ffffcb0000000000 rbx=0000000000000000 rcx=00000065bee1e730
- rdx=0000000000002000 rsi=0000000000000000 rdi=0000000000000000
- rip=fffff803dc26f40c rsp=ffff82818f3cf1f0 rbp=ffff82818f3cf2f0
- r8=0000000000000000 r9=0000000000000000 r10=fffffb879cd9e000
- r11=0000007ffffffff8 r12=0000000000000000 r13=0000000000000000
- r14=0000000000000000 r15=0000000000000000
- iopl=0 nv up ei pl nz na po nc
- nt!MmCheckCachedPageStates+0xbc:
- fffff803`dc26f40c 488b1401 mov rdx,qword ptr [rcx+rax] ds:ffffcb65`bee1e730=????????????????
- Resetting default scope
- LAST_CONTROL_TRANSFER: from fffff803dc3623be to fffff803dc349f90
- STACK_TEXT:
- ffff8281`8f3ced68 fffff803`dc3623be : 00000000`00000050 ffffcb65`bee1e730 00000000`00000000 ffff8281`8f3cf060 : nt!KeBugCheckEx
- ffff8281`8f3ced70 fffff803`dc27772a : 00000000`00000000 00000000`00000000 ffff8281`8f3cf060 ffffa786`00000001 : nt! ?? ::FNODOBFM::`string'+0x91fe
- ffff8281`8f3cee60 fffff803`dc3535fc : 00000000`00000011 00000001`00000000 ffffd185`1ce274f0 00000000`00000002 : nt!MmAccessFault+0x9ca
- ffff8281`8f3cf060 fffff803`dc26f40c : ffff8281`8f3cf248 fffff803`dc2889b9 00000000`00000000 ffffa786`fba2c920 : nt!KiPageFault+0x13c
- ffff8281`8f3cf1f0 fffff803`dc26e88e : 00000000`00002000 00000000`00002000 00000000`00002000 00000000`04e9e000 : nt!MmCheckCachedPageStates+0xbc
- ffff8281`8f3cf3a0 fffff803`dc62df3c : 00000000`04e9e000 00000000`00000000 00000000`00000001 ffff8281`8f3cf4b0 : nt!CcFetchDataForRead+0x8e
- ffff8281`8f3cf400 fffff803`dc26e645 : ffffa786`f8dd4da0 00000000`04e9e000 ffff8281`00022000 fffff809`6f71d801 : nt!CcMapAndCopyFromCache+0xdc
- ffff8281`8f3cf4a0 fffff809`6f7f5905 : ffff8281`8f3cf5a0 00000000`00000001 ffffa786`00002000 fffff809`6dcd7222 : nt!CcCopyReadEx+0x125
- ffff8281`8f3cf530 fffff809`6dcd5ae4 : 00000000`000002b0 00000000`00000000 ffffa786`fcafc590 0000014b`82742e50 : NTFS!NtfsCopyReadA+0x245
- ffff8281`8f3cf7c0 fffff809`6dcd2f9d : ffffa786`fcbd8c00 ffff8281`8f3cf8b0 ffffa786`fcafc500 ffffa786`fcbd8cf0 : FLTMGR!FltpPerformFastIoCall+0xc4
- ffff8281`8f3cf820 fffff809`6dd03ce9 : 00000000`00000001 00000000`00000001 00000000`00000000 00000000`00000000 : FLTMGR!FltpPassThroughFastIo+0xbd
- ffff8281`8f3cf880 fffff803`dc5fedc8 : ffffa786`fcafc590 00000000`00000001 ffff8281`8f3cfb00 ffffa786`fcafc590 : FLTMGR!FltpFastIoRead+0x159
- ffff8281`8f3cf920 fffff803`dc354c93 : 00000000`00002938 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtReadFile+0x408
- ffff8281`8f3cfa10 00007ff9`3fdd4f14 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
- 00000039`3ab7eff8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`3fdd4f14
- STACK_COMMAND: kb
- CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
- fffff803dc240995 - nt!MiInsertAndUnlockStandbyPages+105
- [ fa:bb ]
- fffff803dc26f3dd-fffff803dc26f3de 2 bytes - nt!MmCheckCachedPageStates+8d (+0x2ea48)
- [ 80 f6:00 cb ]
- fffff803dc26f428 - nt!MmCheckCachedPageStates+d8 (+0x4b)
- [ fa:bb ]
- fffff803dc26f44f-fffff803dc26f451 3 bytes - nt!MmCheckCachedPageStates+ff (+0x27)
- [ 40 fb f6:80 65 cb ]
- fffff803dc26f46d - nt!MmCheckCachedPageStates+11d (+0x1e)
- [ fa:bb ]
- fffff803dc26f7c2-fffff803dc26f7c3 2 bytes - nt!MmCheckCachedPageStates+472 (+0x355)
- [ 80 f6:00 cb ]
- fffff803dc26f939 - nt!MmCheckCachedPageStates+5e9 (+0x177)
- [ fa:bb ]
- fffff803dc26fa67 - nt!MmCheckCachedPageStates+717 (+0x12e)
- [ fa:bb ]
- fffff803dc2dd736 - nt!MiDeleteParentDecayNode+26 (+0x6dccf)
- [ fa:bb ]
- fffff803dc44b717-fffff803dc44b719 3 bytes - nt!ExFreePoolWithTag+387
- [ 40 fb f6:80 65 cb ]
- 16 errors : !nt (fffff803dc240995-fffff803dc44b719)
- MODULE_NAME: memory_corruption
- IMAGE_NAME: memory_corruption
- FOLLOWUP_NAME: memory_corruption
- DEBUG_FLR_IMAGE_TIMESTAMP: 0
- MEMORY_CORRUPTOR: LARGE
- FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
- BUCKET_ID: MEMORY_CORRUPTION_LARGE
- PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
- TARGET_TIME: 2017-08-05T11:54:25.000Z
- OSBUILD: 14393
- OSSERVICEPACK: 0
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 784
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2016-07-15 22:16:17
- BUILDDATESTAMP_STR: 160715-1616
- BUILDLAB_STR: rs1_release
- BUILDOSVER_STR: 10.0.14393.0
- ANALYSIS_SESSION_ELAPSED_TIME: 2aea
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:memory_corruption_large
- FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
- Followup: memory_corruption
Advertisement
Add Comment
Please, Sign In to add comment