Advertisement
Guest User

Untitled

a guest
Jul 20th, 2017
216
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 46.78 KB | None | 0 0
  1. Microsoft (R) Windows Debugger Version 10.0.14321.1024 AMD64
  2. Copyright (c) Microsoft Corporation. All rights reserved.
  3.  
  4. ========================================================================
  5. =================== Dump File: 071617-9546-01.dmp ====================
  6. ========================================================================
  7. Mini Kernel Dump File: Only registers and stack trace are available
  8. Windows 10 Kernel Version 14393 MP (8 procs) Free x64
  9. Product: WinNt, suite: TerminalServer SingleUserTS Personal
  10. Built by: 14393.1480.amd64fre.rs1_release.170706-2004
  11. Kernel base = 0xfffff802`1c410000 PsLoadedModuleList = 0xfffff802`1c70f040
  12. Debug session time: Sun Jul 16 21:11:21.017 2017 (UTC - 4:00)
  13. System Uptime: 0 days 0:45:18.029
  14.  
  15. BugCheck 1A, {41793, fffffd80cae78008, 1, 0}
  16. Probably caused by : memory_corruption
  17. Followup: memory_corruption
  18.  
  19. MEMORY_MANAGEMENT (1a)
  20. # Any other values for parameter 1 must be individually examined.
  21.  
  22. Arguments:
  23. Arg1: 0000000000041793, The subtype of the bugcheck.
  24. Arg2: fffffd80cae78008
  25. Arg3: 0000000000000001
  26. Arg4: 0000000000000000
  27.  
  28. Debugging Details:
  29. DUMP_CLASS: 1
  30. DUMP_QUALIFIER: 400
  31. BUILD_VERSION_STRING: 10.0.14393.1480 (rs1_release.170706-2004)
  32. SYSTEM_MANUFACTURER: ASUS
  33. SYSTEM_PRODUCT_NAME: All Series
  34. SYSTEM_SKU: All
  35. SYSTEM_VERSION: System Version
  36. BIOS_VENDOR: American Megatrends Inc.
  37. BIOS_VERSION: 1707
  38. BIOS_DATE: 12/13/2013
  39. BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
  40. BASEBOARD_PRODUCT: SABERTOOTH Z87
  41. BASEBOARD_VERSION: Rev 1.xx
  42. DUMP_TYPE: 2
  43. BUGCHECK_STR: 0x1a_41793
  44. CPU_COUNT: 8
  45. CPU_MHZ: daa
  46. CPU_VENDOR: GenuineIntel
  47. CPU_FAMILY: 6
  48. CPU_MODEL: 3c
  49. CPU_STEPPING: 3
  50. CPU_MICROCODE: 6,3c,3,0 (F,M,S,R) SIG: 1E'00000000 (cache) 1E'00000000 (init)
  51. CUSTOMER_CRASH_COUNT: 1
  52. DEFAULT_BUCKET_ID: CODE_CORRUPTION
  53.  
  54. PROCESS_NAME: RainbowSix.exe
  55.  
  56. CURRENT_IRQL: 2
  57. ANALYSIS_SESSION_HOST: USERNAME-PC
  58. ANALYSIS_SESSION_TIME: 07-20-2017 16:08:15.0169
  59. ANALYSIS_VERSION: 10.0.14321.1024 amd64fre
  60. LAST_CONTROL_TRANSFER: from fffff8021c46d6a1 to fffff8021c55f960
  61. STACK_TEXT:
  62. ffff8000`ce97d6a8 fffff802`1c46d6a1 : 00000000`0000001a 00000000`00041793 fffffd80`cae78008 00000000`00000001 : nt!KeBugCheckEx
  63. ffff8000`ce97d6b0 fffff802`1c45409c : ffffc48f`30bdf660 fffff802`1c818400 00000000`00000000 00000000`00000000 : nt!MiDeleteVirtualAddresses+0xff1
  64. ffff8000`ce97d8b0 fffff802`1c82a55b : 00000000`00000000 ffffaf0d`29dbf840 00000000`00000000 00000000`00000000 : nt!MiDeleteVad+0x39c
  65. ffff8000`ce97d9e0 fffff802`1c829fe6 : ffffaf0d`209f1800 fffff802`00000008 ffffaf0d`1fa25510 00000195`ced00000 : nt!MiUnmapViewOfSection+0xeb
  66. ffff8000`ce97dab0 fffff802`1c56a693 : ffffaf0d`209f1800 ffff8000`ce97db80 00000000`00000000 ffffaf0d`20e45800 : nt!NtUnmapViewOfSectionEx+0x86
  67. ffff8000`ce97db00 00007ffd`3a2e6624 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
  68. 00000040`8e4aef38 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`3a2e6624
  69. STACK_COMMAND: kb
  70. CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
  71. fffff8021c5232dd-fffff8021c5232de 2 bytes - nt!MiPurgeZeroList+6d
  72. [ 80 fa:00 f0 ]
  73. fffff8021c658387-fffff8021c658389 3 bytes - nt!ExFreePoolWithTag+387
  74. [ 40 fb f6:c0 fe fd ]
  75. 5 errors : !nt (fffff8021c5232dd-fffff8021c658389)
  76. MODULE_NAME: memory_corruption
  77.  
  78. IMAGE_NAME: memory_corruption
  79.  
  80. FOLLOWUP_NAME: memory_corruption
  81. DEBUG_FLR_IMAGE_TIMESTAMP: 0
  82. MEMORY_CORRUPTOR: LARGE
  83. FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
  84. BUCKET_ID: MEMORY_CORRUPTION_LARGE
  85. PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
  86. TARGET_TIME: 2017-07-17T01:11:21.000Z
  87. OSBUILD: 14393
  88. OSSERVICEPACK: 1480
  89. SERVICEPACK_NUMBER: 0
  90. OS_REVISION: 0
  91. SUITE_MASK: 784
  92. PRODUCT_TYPE: 1
  93. OSPLATFORM_TYPE: x64
  94. OSNAME: Windows 10
  95. OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
  96. USER_LCID: 0
  97. OSBUILD_TIMESTAMP: 2017-07-07 02:26:09
  98. BUILDDATESTAMP_STR: 170706-2004
  99. BUILDLAB_STR: rs1_release
  100. BUILDOSVER_STR: 10.0.14393.1480
  101. ANALYSIS_SESSION_ELAPSED_TIME: 1c0f
  102. ANALYSIS_SOURCE: KM
  103. FAILURE_ID_HASH_STRING: km:memory_corruption_large
  104. FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
  105. Followup: memory_corruption
  106.  
  107. =============================== Drivers ================================
  108. ffffd520`12be0000 ffffd520`12bea000 TSDDD (deferred)
  109. Image path: \SystemRoot\System32\TSDDD.dll
  110. Image name: TSDDD.dll
  111. Timestamp: unavailable (00000000)
  112. fffff803`5a8d0000 fffff803`5ae42000 iaStorA (deferred)
  113. Image path: \SystemRoot\System32\drivers\iaStorA.sys
  114. Image name: iaStorA.sys
  115. Timestamp: Wed Jun 3 05:38:57 2015 (556ECB31)
  116. fffff803`5c470000 fffff803`5c47a000 ndisrd (deferred)
  117. Image path: \SystemRoot\system32\DRIVERS\ndisrd.sys
  118. Image name: ndisrd.sys
  119. Timestamp: Wed Feb 20 21:40:15 2013 (5125890F)
  120. fffff803`5c610000 fffff803`5c617000 AsUpIO (deferred)
  121. Image path: \SystemRoot\SysWow64\drivers\AsUpIO.sys
  122. Image name: AsUpIO.sys
  123. Timestamp: Mon Aug 2 22:47:59 2010 (4C57835F)
  124. fffff803`5c620000 fffff803`5c626000 AsIO (deferred)
  125. Image path: \SystemRoot\SysWow64\drivers\AsIO.sys
  126. Image name: AsIO.sys
  127. Timestamp: Wed Aug 22 05:54:47 2012 (5034AC67)
  128. fffff803`5c670000 fffff803`5c67d000 tap0901 (deferred)
  129. Image path: \SystemRoot\System32\drivers\tap0901.sys
  130. Image name: tap0901.sys
  131. Timestamp: Thu Aug 22 08:40:01 2013 (521606A1)
  132. fffff803`5c6e0000 fffff803`5c701000 drmk (deferred)
  133. Image path: \SystemRoot\System32\drivers\drmk.sys
  134. Image name: drmk.sys
  135. Timestamp: Fri Jul 15 22:27:13 2016 (57899B81)
  136. fffff803`5c830000 fffff803`5c85f000 TeeDriverW8x64 (deferred)
  137. Image path: \SystemRoot\System32\drivers\TeeDriverW8x64.sys
  138. Image name: TeeDriverW8x64.sys
  139. Timestamp: Mon Jun 29 13:22:00 2015 (55917EB8)
  140. fffff803`5c860000 fffff803`5c8e6000 e1i63x64 (deferred)
  141. Image path: \SystemRoot\System32\drivers\e1i63x64.sys
  142. Image name: e1i63x64.sys
  143. Timestamp: Fri Mar 4 16:46:29 2016 (56DA0235)
  144. fffff803`5c970000 fffff803`5c9d1000 mt7612US (deferred)
  145. Image path: \SystemRoot\System32\drivers\mt7612US.sys
  146. Image name: mt7612US.sys
  147. Timestamp: Wed Dec 9 01:44:11 2015 (5667CDBB)
  148. fffff803`5d690000 fffff803`5d6c5000 nvhda64v (deferred)
  149. Image path: \SystemRoot\system32\drivers\nvhda64v.sys
  150. Image name: nvhda64v.sys
  151. Timestamp: Tue May 16 09:02:27 2017 (591AF863)
  152. fffff803`5d760000 fffff803`5dbdd000 RTKVHD64 (deferred)
  153. Image path: \SystemRoot\system32\drivers\RTKVHD64.sys
  154. Image name: RTKVHD64.sys
  155. Timestamp: Tue Jun 2 06:47:59 2015 (556D89DF)
  156. fffff803`5dce0000 fffff803`5dcec000 ladfGSS (deferred)
  157. Image path: \SystemRoot\system32\drivers\ladfGSS.sys
  158. Image name: ladfGSS.sys
  159. Timestamp: Thu Dec 8 21:38:49 2016 (584A1939)
  160. fffff803`5dcf0000 fffff803`5dd05000 LGSHidFilt (deferred)
  161. Image path: \SystemRoot\system32\DRIVERS\LGSHidFilt.Sys
  162. Image name: LGSHidFilt.Sys
  163. Timestamp: Thu May 30 11:16:33 2013 (51A76D51)
  164. fffff803`5dd50000 fffff803`5e0d3000 athw8x (deferred)
  165. Image path: \SystemRoot\System32\drivers\athw8x.sys
  166. Image name: athw8x.sys
  167. Timestamp: Wed Sep 19 03:15:18 2012 (50597106)
  168. fffff803`5e190000 fffff803`5e19e000 nvvad64v (deferred)
  169. Image path: \SystemRoot\system32\drivers\nvvad64v.sys
  170. Image name: nvvad64v.sys
  171. Timestamp: Wed Apr 12 04:06:41 2017 (58EDE011)
  172. fffff803`5e1a0000 fffff803`5e1af000 nvvhci (deferred)
  173. Image path: \SystemRoot\System32\drivers\nvvhci.sys
  174. Image name: nvvhci.sys
  175. Timestamp: Tue Dec 27 20:44:00 2016 (586318E0)
  176. fffff803`5e1d0000 fffff803`5e1d4e00 LGBusEnum (deferred)
  177. Image path: \SystemRoot\system32\drivers\LGBusEnum.sys
  178. Image name: LGBusEnum.sys
  179. Timestamp: Mon Jun 13 14:47:08 2016 (575EFFAC)
  180. fffff803`5e1e0000 fffff803`5e1ec800 LGJoyXlCore (deferred)
  181. Image path: \SystemRoot\system32\drivers\LGJoyXlCore.sys
  182. Image name: LGJoyXlCore.sys
  183. Timestamp: Mon Jun 13 14:47:06 2016 (575EFFAA)
  184. fffff803`5e220000 fffff803`5f15b000 nvlddmkm (deferred)
  185. Image path: \SystemRoot\System32\DriverStore\FileRepository\nv_dispi.inf_amd64_2386fda73b467ac8\nvlddmkm.sys
  186. Image name: nvlddmkm.sys
  187. Timestamp: Tue Jun 27 16:02:17 2017 (5952B9C9)
  188. fffff803`5f5b0000 fffff803`5f5d6000 Sentinel64 (deferred)
  189. Image path: \SystemRoot\System32\Drivers\Sentinel64.sys
  190. Image name: Sentinel64.sys
  191. Timestamp: Mon Jun 2 02:14:55 2008 (48438FDF)
  192. fffff803`5f5e0000 fffff803`5f5e8000 lgcoretemp (deferred)
  193. Image path: \??\C:\Program Files\Logitech Gaming Software\Drivers\LgCoreTemp\lgcoretemp.sys
  194. Image name: lgcoretemp.sys
  195. Timestamp: Tue Jun 9 12:52:10 2015 (557719BA)
  196. fffff803`5f770000 fffff803`5f832000 peauth (deferred)
  197. Image path: \SystemRoot\system32\drivers\peauth.sys
  198. Image name: peauth.sys
  199. Timestamp: Fri Jul 15 22:24:39 2016 (57899AE7)
  200. fffff803`5f890000 fffff803`5f8ae080 rzpnk (deferred)
  201. Image path: \??\C:\WINDOWS\system32\drivers\rzpnk.sys
  202. Image name: rzpnk.sys
  203. Timestamp: Wed Sep 16 20:16:35 2015 (55FA0663)
  204. fffff803`5f950000 fffff803`5fec2000 dump_iaStorA (deferred)
  205. Image path: \SystemRoot\System32\Drivers\dump_iaStorA.sys
  206. Image name: dump_iaStorA.sys
  207. Timestamp: Wed Jun 3 05:38:57 2015 (556ECB31)
  208. fffff803`60400000 fffff803`604af000 BEDaisy (deferred)
  209. Image path: \??\C:\Program Files (x86)\Common Files\BattlEye\BEDaisy.sys
  210. Image name: BEDaisy.sys
  211. Timestamp: Tue Jan 10 22:01:10 2017 (58759FF6)
  212. fffff803`60af0000 fffff803`60afe000 MpKslf0f82d35 (deferred)
  213. Image path: \??\C:\ProgramData\Microsoft\Windows Defender\Definition Updates\{0471CC39-287E-41D3-A13B-6FB7F9381CFF}\MpKslf0f82d35.sys
  214. Image name: MpKslf0f82d35.sys
  215. Timestamp: Tue May 19 21:50:37 2015 (555BE86D)
  216. fffff803`60b00000 fffff803`60b02500 LGVirHid (deferred)
  217. Image path: \SystemRoot\system32\drivers\LGVirHid.sys
  218. Image name: LGVirHid.sys
  219. Timestamp: Mon Jun 13 14:47:03 2016 (575EFFA7)
  220. fffff803`60be0000 fffff803`60bed000 tapoas (deferred)
  221. Image path: \SystemRoot\System32\drivers\tapoas.sys
  222. Image name: tapoas.sys
  223. Timestamp: Sun Jul 11 20:31:59 2010 (4C3A627F)
  224. fffff803`60b30000 fffff803`60bdf000 BEDaisy.sys
  225. Timestamp: unavailable (00000000)
  226. Checksum: 00000000
  227. ImageSize: 000AF000
  228. fffff803`60500000 fffff803`60ad4000 iqvw64e.sys
  229. Timestamp: unavailable (00000000)
  230. Checksum: 00000000
  231. ImageSize: 005D4000
  232. fffff803`5c680000 fffff803`5c68d000 tapoas.sys
  233. Timestamp: unavailable (00000000)
  234. Checksum: 00000000
  235. ImageSize: 0000D000
  236. fffff803`60ae0000 fffff803`60aed000 WinDivert.sy
  237. Timestamp: unavailable (00000000)
  238. Checksum: 00000000
  239. ImageSize: 0000D000
  240. fffff803`5b1f0000 fffff803`5b1ff000 dump_storpor
  241. Timestamp: unavailable (00000000)
  242. Checksum: 00000000
  243. ImageSize: 0000F000
  244. fffff803`5cc40000 fffff803`5d1b2000 dump_iaStorA
  245. Timestamp: unavailable (00000000)
  246. Checksum: 00000000
  247. ImageSize: 00572000
  248. fffff803`5d1e0000 fffff803`5d1fd000 dump_dumpfve
  249. Timestamp: unavailable (00000000)
  250. Checksum: 00000000
  251. ImageSize: 0001D000
  252. fffff803`5ae50000 fffff803`5ae6c000 EhStorClass.
  253. Timestamp: unavailable (00000000)
  254. Checksum: 00000000
  255. ImageSize: 0001C000
  256. fffff803`5e100000 fffff803`5e13c000 WUDFRd.sys
  257. Timestamp: unavailable (00000000)
  258. Checksum: 00000000
  259. ImageSize: 0003C000
  260. fffff803`5c5f0000 fffff803`5c604000 dam.sys
  261. Timestamp: unavailable (00000000)
  262. Checksum: 00000000
  263. ImageSize: 00014000
  264. fffff803`59e20000 fffff803`59e30000 WdBoot.sys
  265. Timestamp: unavailable (00000000)
  266. Checksum: 00000000
  267. ImageSize: 00010000
  268. fffff803`5b100000 fffff803`5b10f000 hwpolicy.sys
  269. Timestamp: unavailable (00000000)
  270. Checksum: 00000000
  271. ImageSize: 0000F000
  272.  
  273. ============================= BIOS INFO ================================
  274. [SMBIOS Data Tables v2.7]
  275. [DMI Version - 0]
  276. [2.0 Calling Convention - No]
  277. [Table Size - 3219 bytes]
  278. [BIOS Information (Type 0) - Length 24 - Handle 0000h]
  279. Vendor American Megatrends Inc.
  280. BIOS Version 1707
  281. BIOS Starting Address Segment f000
  282. BIOS Release Date 12/13/2013
  283. BIOS ROM Size 800000
  284. BIOS Characteristics
  285. 07: - PCI Supported
  286. 10: - APM Supported
  287. 11: - Upgradeable FLASH BIOS
  288. 12: - BIOS Shadowing Supported
  289. 15: - CD-Boot Supported
  290. 16: - Selectable Boot Supported
  291. 17: - BIOS ROM Socketed
  292. 19: - EDD Supported
  293. 23: - 1.2MB Floppy Supported
  294. 24: - 720KB Floppy Supported
  295. 25: - 2.88MB Floppy Supported
  296. 26: - Print Screen Device Supported
  297. 27: - Keyboard Services Supported
  298. 28: - Serial Services Supported
  299. 29: - Printer Services Supported
  300. 32: - BIOS Vendor Reserved
  301. BIOS Characteristic Extensions
  302. 00: - ACPI Supported
  303. 01: - USB Legacy Supported
  304. 08: - BIOS Boot Specification Supported
  305. 10: - Specification Reserved
  306. 11: - Specification Reserved
  307. BIOS Major Revision 4
  308. BIOS Minor Revision 6
  309. EC Firmware Major Revision 255
  310. EC Firmware Minor Revision 255
  311. [System Information (Type 1) - Length 27 - Handle 0001h]
  312. Manufacturer ASUS
  313. Product Name All Series
  314. Version System Version
  315. UUID 00000000-0000-0000-0000-000000000000
  316. Wakeup Type Power Switch
  317. SKUNumber All
  318. Family ASUS MB
  319. [BaseBoard Information (Type 2) - Length 15 - Handle 0002h]
  320. Manufacturer ASUSTeK COMPUTER INC.
  321. Product SABERTOOTH Z87
  322. Version Rev 1.xx
  323. Feature Flags 09h
  324. 1983428320: - 1983428368: - H¿pÏ(
  325. Chassis Handle 0003h
  326. Board Type 0ah - Processor/Memory Module
  327. Number of Child Handles 0
  328. [System Enclosure (Type 3) - Length 22 - Handle 0003h]
  329. Manufacturer Chassis Manufacture
  330. Chassis Type Desktop
  331. Version Chassis Version
  332. Bootup State Safe
  333. Power Supply State Safe
  334. Thermal State Safe
  335. Security Status None
  336. OEM Defined 0
  337. Height 0U
  338. Number of Power Cords 1
  339. Number of Contained Elements 0
  340. Contained Element Size 0
  341. [Onboard Devices Information (Type 10) - Length 8 - Handle 0028h]
  342. Number of Devices 2
  343. 01: Type Ethernet [enabled]
  344. 01: Description Onboard Ethernet
  345. 02: Type Sound [enabled]
  346. 02: Description Onboard Audio
  347. [OEM Strings (Type 11) - Length 5 - Handle 0029h]
  348. Number of Strings 4
  349. 3 F117
  350. [System Configuration Options (Type 12) - Length 5 - Handle 002ah]
  351. [Memory Device (Type 17) - Length 34 - Handle 0046h]
  352. Physical Memory Array Handle 0047h
  353. Total Width 0 bits
  354. Data Width 0 bits
  355. Form Factor 09h - DIMM
  356. Device Locator ChannelA-DIMM0
  357. Bank Locator BANK 0
  358. Memory Type 02h - Unknown
  359. Type Detail 0000h -
  360. Speed 0MHz
  361. [Physical Memory Array (Type 16) - Length 23 - Handle 0047h]
  362. Location 03h - SystemBoard/Motherboard
  363. Use 03h - System Memory
  364. Memory Error Correction 03h - None
  365. Maximum Capacity 33554432KB
  366. Number of Memory Devices 4
  367. [Memory Device (Type 17) - Length 34 - Handle 0048h]
  368. Physical Memory Array Handle 0047h
  369. Total Width 0 bits
  370. Data Width 0 bits
  371. Form Factor 09h - DIMM
  372. Device Locator ChannelA-DIMM1
  373. Bank Locator BANK 1
  374. Memory Type 02h - Unknown
  375. Type Detail 0000h -
  376. Speed 0MHz
  377. [Memory Device (Type 17) - Length 34 - Handle 0049h]
  378. Physical Memory Array Handle 0047h
  379. Total Width 64 bits
  380. Data Width 64 bits
  381. Size 8192MB
  382. Form Factor 09h - DIMM
  383. Device Locator ChannelB-DIMM0
  384. Bank Locator BANK 2
  385. Memory Type 18h - Specification Reserved
  386. Type Detail 0080h - Synchronous
  387. Speed 1600MHz
  388. Manufacturer 0215
  389. Part Number CMZ8GX3M1A1600C9
  390. [Memory Device Mapped Address (Type 20) - Length 35 - Handle 004ah]
  391. Starting Address 00000000h
  392. Ending Address 007fffffh
  393. Memory Device Handle 0049h
  394. Mem Array Mapped Adr Handle 004dh
  395. [Memory Device (Type 17) - Length 34 - Handle 004bh]
  396. Physical Memory Array Handle 0047h
  397. Total Width 64 bits
  398. Data Width 64 bits
  399. Size 8192MB
  400. Form Factor 09h - DIMM
  401. Device Locator ChannelB-DIMM1
  402. Bank Locator BANK 3
  403. Memory Type 18h - Specification Reserved
  404. Type Detail 0080h - Synchronous
  405. Speed 1600MHz
  406. Manufacturer 0215
  407. Part Number CMZ8GX3M1A1600C9
  408. [Memory Device Mapped Address (Type 20) - Length 35 - Handle 004ch]
  409. Starting Address 00800000h
  410. Ending Address 00ffffffh
  411. Memory Device Handle 004bh
  412. Mem Array Mapped Adr Handle 004dh
  413. [Memory Array Mapped Address (Type 19) - Length 31 - Handle 004dh]
  414. Starting Address 00000000h
  415. Ending Address 00ffffffh
  416. Memory Array Handle 0047h
  417. Partition Width 04
  418. [Cache Information (Type 7) - Length 19 - Handle 004eh]
  419. Socket Designation CPU Internal L1
  420. Cache Configuration 0180h - WB Enabled Int NonSocketed L1
  421. Maximum Cache Size 0100h - 256K
  422. Installed Size 0100h - 256K
  423. Supported SRAM Type 0002h - Unknown
  424. Current SRAM Type 0002h - Unknown
  425. Cache Speed 0ns
  426. Error Correction Type Multi-Bit ECC
  427. System Cache Type Other
  428. Associativity 8-way Set-Associative
  429. [Cache Information (Type 7) - Length 19 - Handle 004fh]
  430. Socket Designation CPU Internal L2
  431. Cache Configuration 0181h - WB Enabled Int NonSocketed L2
  432. Maximum Cache Size 0400h - 1024K
  433. Installed Size 0400h - 1024K
  434. Supported SRAM Type 0002h - Unknown
  435. Current SRAM Type 0002h - Unknown
  436. Cache Speed 0ns
  437. Error Correction Type Multi-Bit ECC
  438. System Cache Type Unified
  439. Associativity 8-way Set-Associative
  440. [Cache Information (Type 7) - Length 19 - Handle 0050h]
  441. Socket Designation CPU Internal L3
  442. Cache Configuration 0182h - WB Enabled Int NonSocketed L3
  443. Maximum Cache Size 2000h - 8192K
  444. Installed Size 2000h - 8192K
  445. Supported SRAM Type 0002h - Unknown
  446. Current SRAM Type 0002h - Unknown
  447. Cache Speed 0ns
  448. Error Correction Type Multi-Bit ECC
  449. System Cache Type Unified
  450. Associativity 16-way Set-Associative
  451. [Processor Information (Type 4) - Length 42 - Handle 0054h]
  452. Socket Designation SOCKET 1150
  453. Processor Type Central Processor
  454. Processor Family 01h - Other
  455. Processor Manufacturer Intel
  456. Processor ID c3060300fffbebbf
  457. Processor Version Intel(R) Core(TM) i7-4770K CPU @ 3.50GHz
  458. Processor Voltage 8ch - 1.2V
  459. External Clock 100MHz
  460. Max Speed 3800MHz
  461. Current Speed 3500MHz
  462. Status Enabled Populated
  463. Processor Upgrade Specification Reserved
  464. L1 Cache Handle 004eh
  465. L2 Cache Handle 004fh
  466. L3 Cache Handle 0050h
  467. 6: kd> q
  468.  
  469. ========================================================================
  470. =================== Dump File: 071717-8328-01.dmp ====================
  471. ========================================================================
  472. Mini Kernel Dump File: Only registers and stack trace are available
  473. Windows 10 Kernel Version 14393 MP (8 procs) Free x64
  474. Product: WinNt, suite: TerminalServer SingleUserTS Personal
  475. Built by: 14393.1480.amd64fre.rs1_release.170706-2004
  476. Kernel base = 0xfffff801`e7478000 PsLoadedModuleList = 0xfffff801`e7777040
  477. Debug session time: Mon Jul 17 23:52:56.421 2017 (UTC - 4:00)
  478. System Uptime: 0 days 2:32:25.123
  479.  
  480. BugCheck 12B, {ffffffffc00002c4, 45a, 351d0000, ffffb001373bc000}
  481. *** WARNING: Unable to verify timestamp for win32k.sys
  482. *** ERROR: Module load completed but symbols could not be loaded for win32k.sys
  483. Probably caused by : memory_corruption
  484. Followup: memory_corruption
  485.  
  486. FAULTY_HARDWARE_CORRUPTED_PAGE (12b)
  487. This bugcheck indicates that a single bit error was found in this page. This is a hardware memory error.
  488.  
  489. Arguments:
  490. Arg1: ffffffffc00002c4, virtual address mapping the corrupted page
  491. Arg2: 000000000000045a, physical page number
  492. Arg3: 00000000351d0000, zero
  493. Arg4: ffffb001373bc000, zero
  494.  
  495. Debugging Details:
  496. DUMP_CLASS: 1
  497. DUMP_QUALIFIER: 400
  498. BUILD_VERSION_STRING: 10.0.14393.1480 (rs1_release.170706-2004)
  499. SYSTEM_MANUFACTURER: ASUS
  500. SYSTEM_PRODUCT_NAME: All Series
  501. SYSTEM_SKU: All
  502. SYSTEM_VERSION: System Version
  503. BIOS_VENDOR: American Megatrends Inc.
  504. BIOS_VERSION: 1707
  505. BIOS_DATE: 12/13/2013
  506. BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
  507. BASEBOARD_PRODUCT: SABERTOOTH Z87
  508. BASEBOARD_VERSION: Rev 1.xx
  509. DUMP_TYPE: 2
  510. BUGCHECK_STR: 0x12B_c00002c4_StCtDecompressFailed
  511. CPU_COUNT: 8
  512. CPU_MHZ: daa
  513. CPU_VENDOR: GenuineIntel
  514. CPU_FAMILY: 6
  515. CPU_MODEL: 3c
  516. CPU_STEPPING: 3
  517. CPU_MICROCODE: 6,3c,3,0 (F,M,S,R) SIG: 1E'00000000 (cache) 1E'00000000 (init)
  518. CUSTOMER_CRASH_COUNT: 1
  519. DEFAULT_BUCKET_ID: CODE_CORRUPTION
  520.  
  521. PROCESS_NAME: MemCompression
  522.  
  523. CURRENT_IRQL: 0
  524. ANALYSIS_SESSION_HOST: USERNAME-PC
  525. ANALYSIS_SESSION_TIME: 07-20-2017 16:10:18.0668
  526. ANALYSIS_VERSION: 10.0.14321.1024 amd64fre
  527. LAST_CONTROL_TRANSFER: from fffff801e768dd8f to fffff801e75c7960
  528. STACK_TEXT:
  529. ffffb001`3c2851b8 fffff801`e768dd8f : 00000000`0000012b ffffffff`c00002c4 00000000`0000045a 00000000`351d0000 : nt!KeBugCheckEx
  530. ffffb001`3c2851c0 fffff801`e76136cc : 00000000`00000200 00000000`00000003 00000000`351d0000 ffffb001`373bc000 : nt!ST_STORE<SM_TRAITS>::StDmPageError+0x117
  531. ffffb001`3c285210 fffff801`e75879c3 : 00000000`00000000 ffff9c05`7fd5b050 00000000`00000000 00000000`00000000 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageCopy+0x8bcd8
  532. ffffb001`3c2852f0 fffff801`e7587d51 : 00000000`00000001 00000000`0000211c 00000000`00000001 ffffb001`00010000 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageTransfer+0x7b
  533. ffffb001`3c285340 fffff801`e7587edd : 00000000`ffffffff ffff9c05`86a67000 ffffb001`3c285428 ffff9c05`87398780 : nt!ST_STORE<SM_TRAITS>::StDmpSinglePageRetrieve+0x199
  534. ffffb001`3c2853e0 fffff801`e7588cb2 : ffffb001`3c2854b8 ffff9c05`87398780 ffffbffc`90727f78 ffff9c05`87398780 : nt!ST_STORE<SM_TRAITS>::StDmPageRetrieve+0xe5
  535. ffffb001`3c2854a0 fffff801`e7588e09 : ffff9c05`7fd5b000 ffffb001`3c2855b0 fffff801`e7588de8 fffff801`e7588de8 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadIssue+0x52
  536. ffffb001`3c2854f0 fffff801`e7514045 : ffff9c05`7a37a800 ffffb001`3c2855b0 ffff9c05`82944060 fffff801`e752e6f8 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadCallout+0x21
  537. ffffb001`3c285520 fffff801`e758201d : 00000000`00000003 ffff9c05`86a67000 ffff9c05`7fd5b000 00000000`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0x85
  538. ffffb001`3c285570 fffff801`e758541c : ffffb001`3c285670 ffffb001`3c2857b0 ffff9c05`7fd5b000 fffff801`e75821f6 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectRead+0xad
  539. ffffb001`3c285640 fffff801`e7585107 : ffff9c05`7fd5b000 ffff9c05`87398780 fffff801`e782ca40 ffffb001`3c2857b0 : nt!SMKM_STORE<SM_TRAITS>::SmStWorkItemQueue+0x1a4
  540. ffffb001`3c285690 fffff801`e7581eb3 : 00000000`0000000c ffff9c05`82944110 ffff9c05`87398780 00000000`00000010 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmIoCtxQueueWork+0xbf
  541. ffffb001`3c285710 fffff801`e7588de2 : ffff9c05`00000010 ffff9c05`82944110 00000204`00000000 ffff9c05`7fd5b000 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmPageRead+0x16b
  542. ffffb001`3c285780 fffff801`e75570fd : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!SmPageRead+0x2e
  543. ffffb001`3c2857d0 fffff801`e74ba11d : 00000000`00000002 ffffb001`3c285b00 ffff9c05`82944010 00000000`00000000 : nt!MiIssueHardFaultIo+0x145
  544. ffffb001`3c285860 fffff801`e74ce06c : 00000000`c0033333 ffff9c05`82944010 ffff9c05`893d4b00 ffffb001`3c285b00 : nt!MiIssueHardFault+0x15d
  545. ffffb001`3c285900 fffff801`e75d0ffc : ffff9c05`7a37a800 00000000`00000000 00000000`00000000 ffff9c05`7a4309d0 : nt!MmAccessFault+0x11ec
  546. ffffb001`3c285b00 00007ff8`79bf6d1d : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x13c
  547. 000000b5`0dec4ad0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`79bf6d1d
  548. STACK_COMMAND: kb
  549. CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
  550. fffff801e74ba1be-fffff801e74ba1bf 2 bytes - nt!MiIssueHardFault+1fe
  551. [ 80 f6:00 95 ]
  552. fffff801e755718f-fffff801e7557190 2 bytes - nt!MiIsPfnSystemCharged+17 (+0x9cfd1)
  553. [ 80 f6:00 95 ]
  554. 4 errors : !nt (fffff801e74ba1be-fffff801e7557190)
  555. MODULE_NAME: memory_corruption
  556.  
  557. IMAGE_NAME: memory_corruption
  558.  
  559. FOLLOWUP_NAME: memory_corruption
  560. DEBUG_FLR_IMAGE_TIMESTAMP: 0
  561. MEMORY_CORRUPTOR: LARGE
  562. FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
  563. BUCKET_ID: MEMORY_CORRUPTION_LARGE
  564. PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
  565. TARGET_TIME: 2017-07-18T03:52:56.000Z
  566. OSBUILD: 14393
  567. OSSERVICEPACK: 1480
  568. SERVICEPACK_NUMBER: 0
  569. OS_REVISION: 0
  570. SUITE_MASK: 784
  571. PRODUCT_TYPE: 1
  572. OSPLATFORM_TYPE: x64
  573. OSNAME: Windows 10
  574. OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
  575. USER_LCID: 0
  576. OSBUILD_TIMESTAMP: 2017-07-07 02:26:09
  577. BUILDDATESTAMP_STR: 170706-2004
  578. BUILDLAB_STR: rs1_release
  579. BUILDOSVER_STR: 10.0.14393.1480
  580. ANALYSIS_SESSION_ELAPSED_TIME: 1ab8
  581. ANALYSIS_SOURCE: KM
  582. FAILURE_ID_HASH_STRING: km:memory_corruption_large
  583. FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
  584. Followup: memory_corruption
  585. 4: kd> q
  586.  
  587. ========================================================================
  588. =================== Dump File: 071817-44531-01.dmp ===================
  589. ========================================================================
  590. Mini Kernel Dump File: Only registers and stack trace are available
  591. Windows 10 Kernel Version 14393 MP (8 procs) Free x64
  592. Product: WinNt, suite: TerminalServer SingleUserTS Personal
  593. Built by: 14393.1480.amd64fre.rs1_release.170706-2004
  594. Kernel base = 0xfffff801`2820b000 PsLoadedModuleList = 0xfffff801`2850a040
  595. Debug session time: Tue Jul 18 01:50:27.433 2017 (UTC - 4:00)
  596. System Uptime: 0 days 0:41:03.115
  597.  
  598. BugCheck 50, {ffffd4810f011230, 0, fffff80128238bd6, 2}
  599. Could not read faulting driver name
  600. Probably caused by : memory_corruption
  601. Followup: memory_corruption
  602.  
  603. PAGE_FAULT_IN_NONPAGED_AREA (50)
  604. Invalid system memory was referenced. This cannot be protected by try-except.
  605. Typically the address is just plain bad or it is pointing at freed memory.
  606.  
  607. Arguments:
  608. Arg1: ffffd4810f011230, memory referenced.
  609. Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
  610. Arg3: fffff80128238bd6, If non-zero, the instruction address which referenced the bad memory
  611. address.
  612. Arg4: 0000000000000002, (reserved)
  613.  
  614. Debugging Details:
  615. Could not read faulting driver name
  616. DUMP_CLASS: 1
  617. DUMP_QUALIFIER: 400
  618. BUILD_VERSION_STRING: 10.0.14393.1480 (rs1_release.170706-2004)
  619. SYSTEM_MANUFACTURER: ASUS
  620. SYSTEM_PRODUCT_NAME: All Series
  621. SYSTEM_SKU: All
  622. SYSTEM_VERSION: System Version
  623. BIOS_VENDOR: American Megatrends Inc.
  624. BIOS_VERSION: 1707
  625. BIOS_DATE: 12/13/2013
  626. BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
  627. BASEBOARD_PRODUCT: SABERTOOTH Z87
  628. BASEBOARD_VERSION: Rev 1.xx
  629. DUMP_TYPE: 2
  630. READ_ADDRESS: fffff801285ab338: Unable to get MiVisibleState
  631. ffffd4810f011230
  632. FAULTING_IP:
  633. nt!MmCopyToCachedPage+4e6
  634. fffff801`28238bd6 498b06 mov rax,qword ptr [r14]
  635. MM_INTERNAL_CODE: 2
  636. CPU_COUNT: 8
  637. CPU_MHZ: daa
  638. CPU_VENDOR: GenuineIntel
  639. CPU_FAMILY: 6
  640. CPU_MODEL: 3c
  641. CPU_STEPPING: 3
  642. CPU_MICROCODE: 6,3c,3,0 (F,M,S,R) SIG: 1E'00000000 (cache) 1E'00000000 (init)
  643. CUSTOMER_CRASH_COUNT: 1
  644. DEFAULT_BUCKET_ID: CODE_CORRUPTION
  645. BUGCHECK_STR: AV
  646.  
  647. PROCESS_NAME: explorer.exe
  648.  
  649. CURRENT_IRQL: 0
  650. ANALYSIS_SESSION_HOST: USERNAME-PC
  651. ANALYSIS_SESSION_TIME: 07-20-2017 16:14:15.0223
  652. ANALYSIS_VERSION: 10.0.14321.1024 amd64fre
  653. DEVICE_OBJECT: 0000000000000001
  654. TRAP_FRAME: ffff8b018b631ed0 -- (.trap 0xffff8b018b631ed0)
  655. NOTE: The trap frame does not contain all registers.
  656. Some register values may be zeroed or incorrect.
  657. rax=ffff810000000000 rbx=0000000000000000 rcx=ffffb18051a85880
  658. rdx=fffff8012820b000 rsi=0000000000000000 rdi=0000000000000000
  659. rip=fffff80128238bd6 rsp=ffff8b018b632060 rbp=ffff8b018b632750
  660. r8=fffffa8000000000 r9=ffff810000000000 r10=ffffc4810f0111b0
  661. r11=0000000fffffffff r12=0000000000000000 r13=0000000000000000
  662. r14=0000000000000000 r15=0000000000000000
  663. iopl=0 nv up ei ng nz na po nc
  664. nt!MmCopyToCachedPage+0x4e6:
  665. fffff801`28238bd6 498b06 mov rax,qword ptr [r14] ds:00000000`00000000=????????????????
  666. Resetting default scope
  667. LAST_CONTROL_TRANSFER: from fffff80128384e11 to fffff8012835a960
  668. STACK_TEXT:
  669. ffff8b01`8b631bd8 fffff801`28384e11 : 00000000`00000050 ffffd481`0f011230 00000000`00000000 ffff8b01`8b631ed0 : nt!KeBugCheckEx
  670. ffff8b01`8b631be0 fffff801`282600fd : 00000000`00000000 00000000`00000000 ffff8b01`8b631ed0 ffffd481`0f011230 : nt!MiSystemFault+0x100201
  671. ffff8b01`8b631cd0 fffff801`28363ffc : ffffc481`0f011230 00000000`51a857f8 ffffd4c9`1043c60c 00000000`00000000 : nt!MmAccessFault+0x27d
  672. ffff8b01`8b631ed0 fffff801`28238bd6 : 00000000`00000000 ffff8100`0823b7e0 00000000`00000000 00194657`00263e16 : nt!KiPageFault+0x13c
  673. ffff8b01`8b632060 fffff801`282382f2 : 00000000`00000000 00000000`01700000 ffff8b01`8b632368 ffff8b01`8b63235c : nt!MmCopyToCachedPage+0x4e6
  674. ffff8b01`8b632310 fffff801`28235187 : ffffc481`11221be0 00000000`14a45040 ffff8b01`8b632480 00000000`000c0000 : nt!CcMapAndCopyInToCache+0x592
  675. ffff8b01`8b632420 fffff800`301aa427 : ffffc481`112616a8 ffff8b01`8b632700 00000000`00000000 ffffb180`476d7100 : nt!CcCopyWriteEx+0xe7
  676. ffff8b01`8b6324a0 fffff800`301a6388 : ffffc481`112616a8 00000000`00000000 00000000`00000000 ffffc481`112616a8 : NTFS!NtfsCommonWrite+0x3e07
  677. ffff8b01`8b632720 fffff800`2ec05206 : ffffc481`0ddf8900 ffffc481`11444010 ffffc481`11444010 ffffc481`11444758 : NTFS!NtfsFsdWrite+0x1d8
  678. ffff8b01`8b6327e0 fffff800`2ec03146 : 00000000`00000801 ffffc481`11444000 00000000`00000001 fffff800`00000306 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x1a6
  679. ffff8b01`8b632870 fffff801`28621d80 : ffffc481`0ce20080 ffffc481`11444010 00000000`00100000 ffffc481`0ce20080 : FLTMGR!FltpDispatch+0xb6
  680. ffff8b01`8b6328d0 fffff801`2862277b : 00000000`00000001 00000000`00000000 00000000`00000000 ffff8b01`8b632b80 : nt!IopSynchronousServiceTail+0x1a0
  681. ffff8b01`8b632990 fffff801`28365693 : ffffc481`0ee19400 00000000`00000d70 00000000`00000000 00000000`40df71e0 : nt!NtWriteFile+0x65b
  682. ffff8b01`8b632a90 00007ffe`1ef561e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
  683. 00000000`4d28c8d8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`1ef561e4
  684. STACK_COMMAND: kb
  685. CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
  686. fffff8012823876c-fffff8012823876d 2 bytes - nt!MmCopyToCachedPage+7c
  687. [ fb f6:fd fa ]
  688. fffff8012823879d-fffff8012823879e 2 bytes - nt!MmCopyToCachedPage+ad (+0x31)
  689. [ 80 fa:00 81 ]
  690. fffff80128238855 - nt!MmCopyToCachedPage+165 (+0xb8)
  691. [ f6:fa ]
  692. fffff801282389c2-fffff801282389c3 2 bytes - nt!MmCopyToCachedPage+2d2 (+0x16d)
  693. [ 80 fa:00 81 ]
  694. fffff80128238b10-fffff80128238b11 2 bytes - nt!MmCopyToCachedPage+420 (+0x14e)
  695. [ fb f6:fd fa ]
  696. fffff80128238b33 - nt!MmCopyToCachedPage+443 (+0x23)
  697. [ f6:fa ]
  698. fffff80128238b4b-fffff80128238b4d 3 bytes - nt!MmCopyToCachedPage+45b (+0x18)
  699. [ 7d fb f6:7e fd fa ]
  700. fffff80128238b5b-fffff80128238b5f 5 bytes - nt!MmCopyToCachedPage+46b (+0x10)
  701. [ d0 be 7d fb f6:50 bf 7e fd fa ]
  702. fffff80128238d0a-fffff80128238d0b 2 bytes - nt!MmCopyToCachedPage+61a (+0x1af)
  703. [ 80 fa:00 81 ]
  704. fffff80128238e2a - nt!MmCopyToCachedPage+73a (+0x120)
  705. [ f6:fa ]
  706. fffff8012825f3d7-fffff8012825f3d8 2 bytes - nt!MiGetPage+97 (+0x265ad)
  707. [ 80 fa:00 81 ]
  708. fffff8012826b425-fffff8012826b426 2 bytes - nt!MmUnmapViewInSystemCache+855 (+0xc04e)
  709. [ 80 fa:00 81 ]
  710. fffff8012827a076-fffff8012827a077 2 bytes - nt!MiZeroSinglePage+26 (+0xec51)
  711. [ 80 fa:00 81 ]
  712. fffff8012831e2dd-fffff8012831e2de 2 bytes - nt!MiPurgeZeroList+6d (+0xa4267)
  713. [ 80 fa:00 81 ]
  714. 29 errors : !nt (fffff8012823876c-fffff8012831e2de)
  715. MODULE_NAME: memory_corruption
  716.  
  717. IMAGE_NAME: memory_corruption
  718.  
  719. FOLLOWUP_NAME: memory_corruption
  720. DEBUG_FLR_IMAGE_TIMESTAMP: 0
  721. MEMORY_CORRUPTOR: LARGE
  722. FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
  723. BUCKET_ID: MEMORY_CORRUPTION_LARGE
  724. PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
  725. TARGET_TIME: 2017-07-18T05:50:27.000Z
  726. OSBUILD: 14393
  727. OSSERVICEPACK: 1480
  728. SERVICEPACK_NUMBER: 0
  729. OS_REVISION: 0
  730. SUITE_MASK: 784
  731. PRODUCT_TYPE: 1
  732. OSPLATFORM_TYPE: x64
  733. OSNAME: Windows 10
  734. OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
  735. USER_LCID: 0
  736. OSBUILD_TIMESTAMP: 2017-07-07 02:26:09
  737. BUILDDATESTAMP_STR: 170706-2004
  738. BUILDLAB_STR: rs1_release
  739. BUILDOSVER_STR: 10.0.14393.1480
  740. ANALYSIS_SESSION_ELAPSED_TIME: 8f54
  741. ANALYSIS_SOURCE: KM
  742. FAILURE_ID_HASH_STRING: km:memory_corruption_large
  743. FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
  744. Followup: memory_corruption
  745. 6: kd> q
  746.  
  747. ========================================================================
  748. =================== Dump File: 071717-10890-01.dmp ===================
  749. ========================================================================
  750. Mini Kernel Dump File: Only registers and stack trace are available
  751. Windows 10 Kernel Version 14393 MP (8 procs) Free x64
  752. Product: WinNt, suite: TerminalServer SingleUserTS Personal
  753. Built by: 14393.1480.amd64fre.rs1_release.170706-2004
  754. Kernel base = 0xfffff800`6a615000 PsLoadedModuleList = 0xfffff800`6a914040
  755. Debug session time: Tue Jul 18 00:22:42.149 2017 (UTC - 4:00)
  756. System Uptime: 0 days 0:11:34.831
  757.  
  758. BugCheck BE, {ffff963ffcd32800, 2b00002b6cae025, ffff85805650d030, a}
  759. Probably caused by : memory_corruption
  760. Followup: memory_corruption
  761.  
  762. ATTEMPTED_WRITE_TO_READONLY_MEMORY (be)
  763. An attempt was made to write to readonly memory. The guilty driver is on the
  764. stack trace (and is typically the current instruction pointer).
  765. When possible, the guilty driver's name (Unicode string) is printed on
  766. the bugcheck screen and saved in KiBugCheckDriver.
  767.  
  768. Arguments:
  769. Arg1: ffff963ffcd32800, Virtual address for the attempted write.
  770. Arg2: 02b00002b6cae025, PTE contents.
  771. Arg3: ffff85805650d030, (reserved)
  772. Arg4: 000000000000000a, (reserved)
  773.  
  774. Debugging Details:
  775. DUMP_CLASS: 1
  776. DUMP_QUALIFIER: 400
  777. BUILD_VERSION_STRING: 10.0.14393.1480 (rs1_release.170706-2004)
  778. SYSTEM_MANUFACTURER: ASUS
  779. SYSTEM_PRODUCT_NAME: All Series
  780. SYSTEM_SKU: All
  781. SYSTEM_VERSION: System Version
  782. BIOS_VENDOR: American Megatrends Inc.
  783. BIOS_VERSION: 1707
  784. BIOS_DATE: 12/13/2013
  785. BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
  786. BASEBOARD_PRODUCT: SABERTOOTH Z87
  787. BASEBOARD_VERSION: Rev 1.xx
  788. DUMP_TYPE: 2
  789. CPU_COUNT: 8
  790. CPU_MHZ: daa
  791. CPU_VENDOR: GenuineIntel
  792. CPU_FAMILY: 6
  793. CPU_MODEL: 3c
  794. CPU_STEPPING: 3
  795. CPU_MICROCODE: 6,3c,3,0 (F,M,S,R) SIG: 1E'00000000 (cache) 1E'00000000 (init)
  796. CUSTOMER_CRASH_COUNT: 1
  797. DEFAULT_BUCKET_ID: CODE_CORRUPTION
  798. BUGCHECK_STR: 0xBE
  799.  
  800. PROCESS_NAME: svchost.exe
  801.  
  802. CURRENT_IRQL: 2
  803. ANALYSIS_SESSION_HOST: USERNAME-PC
  804. ANALYSIS_SESSION_TIME: 07-20-2017 16:11:58.0744
  805. ANALYSIS_VERSION: 10.0.14321.1024 amd64fre
  806. TRAP_FRAME: ffff85805650d4e0 -- (.trap 0xffff85805650d4e0)
  807. NOTE: The trap frame does not contain all registers.
  808. Some register values may be zeroed or incorrect.
  809. rax=00007ff9a64fff00 rbx=0000000000000000 rcx=0000000000005a4d
  810. rdx=00007ff9a6500000 rsi=0000000000000000 rdi=0000000000000000
  811. rip=fffff8006a61dee5 rsp=ffff85805650d678 rbp=ffff85805650d700
  812. r8=0000000000000000 r9=ffff85805650d6b8 r10=0000000000000000
  813. r11=7ffffffffffffffc r12=0000000000000000 r13=0000000000000000
  814. r14=0000000000000000 r15=0000000000000000
  815. iopl=0 nv up ei pl zr na po nc
  816. nt!RtlImageNtHeaderEx+0x35:
  817. fffff800`6a61dee5 66390a cmp word ptr [rdx],cx ds:00007ff9`a6500000=????
  818. Resetting default scope
  819. LAST_CONTROL_TRANSFER: from fffff8006a7fccca to fffff8006a764960
  820. STACK_TEXT:
  821. ffff8580`5650cdd8 fffff800`6a7fccca : 00000000`000000be ffff963f`fcd32800 02b00002`b6cae025 ffff8580`5650d030 : nt!KeBugCheckEx
  822. ffff8580`5650cde0 fffff800`6a669fda : 0000007f`fffffff8 ffff8580`5650cf30 00000000`00000003 fffff180`082460a0 : nt!MiRaisedIrqlFault+0x122
  823. ffff8580`5650ce30 fffff800`6a76dffc : 00000000`00000000 00000000`6a85db00 ffffc509`537b3580 00000000`00000000 : nt!MmAccessFault+0x15a
  824. ffff8580`5650d030 fffff800`6a66d631 : 00000000`00000000 ffff8580`00000019 ffffdb5e`91b3da2e fffff800`6a6443a5 : nt!KiPageFault+0x13c
  825. ffff8580`5650d1c0 fffff800`6a66ab58 : ffffc509`51b8d550 00000000`00000100 ffffc509`51b8d550 ffff8580`5650d3e0 : nt!MiResolveSharedZeroFault+0x1c1
  826. ffff8580`5650d2e0 fffff800`6a76dffc : ffffc509`4783c140 00000000`00000001 00000000`324c7241 00000000`00000290 : nt!MmAccessFault+0xcd8
  827. ffff8580`5650d4e0 fffff800`6a61dee5 : fffff800`6a61dea6 ffff8580`5650d700 ffffc509`537b3080 ffff8580`504b2c40 : nt!KiPageFault+0x13c
  828. ffff8580`5650d678 fffff800`6a61dea6 : ffff8580`5650d700 ffffc509`537b3080 ffff8580`504b2c40 00000000`00000000 : nt!RtlImageNtHeaderEx+0x35
  829. ffff8580`5650d680 fffff800`6aa649a0 : 0000001f`28376000 00000000`00000000 ffffc509`537b3080 ffff8580`5650d740 : nt!RtlImageNtHeader+0x1e
  830. ffff8580`5650d6b0 fffff800`6aa646c3 : 0000001f`28376000 ffffc509`537b3080 ffffc509`492b6080 80000002`b68e7867 : nt!DbgkCreateThread+0x1bc
  831. ffff8580`5650d8d0 fffff800`6a769f66 : ffff8580`504ac180 ffffc509`492b6080 ffff8580`504b8cc0 00000000`00000000 : nt!PspUserThreadStartup+0xa7
  832. ffff8580`5650d9c0 fffff800`6a769ee0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiStartUserThread+0x16
  833. ffff8580`5650db00 00007ff9`a65670b0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiStartUserThreadReturn
  834. 0000001f`2812fcc8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`a65670b0
  835. STACK_COMMAND: kb
  836. CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
  837. fffff8006a6679d1 - nt!MiCompletePrivateZeroFault+821
  838. [ fa:f1 ]
  839. fffff8006a667a94 - nt!MiCompletePrivateZeroFault+8e4 (+0xc3)
  840. [ fa:f1 ]
  841. fffff8006a66a02a-fffff8006a66a02b 2 bytes - nt!MmAccessFault+1aa (+0x2596)
  842. [ 80 f6:00 96 ]
  843. fffff8006a66a037-fffff8006a66a038 2 bytes - nt!MmAccessFault+1b7 (+0x0d)
  844. [ ff f6:7f 96 ]
  845. fffff8006a66a0a1-fffff8006a66a0a2 2 bytes - nt!MmAccessFault+221 (+0x6a)
  846. [ 80 f6:00 96 ]
  847. fffff8006a66ab9b-fffff8006a66ab9c 2 bytes - nt!MmAccessFault+d1b (+0xafa)
  848. [ 80 f6:00 96 ]
  849. fffff8006a66b71f-fffff8006a66b720 2 bytes - nt!MiResolvePageTablePage+3cf (+0xb84)
  850. [ 80 f6:00 96 ]
  851. fffff8006a66b790-fffff8006a66b791 2 bytes - nt!MiResolvePageTablePage+440 (+0x71)
  852. [ ff f6:7f 96 ]
  853. fffff8006a66b7b0-fffff8006a66b7b1 2 bytes - nt!MiResolvePageTablePage+460 (+0x20)
  854. [ ff f6:7f 96 ]
  855. fffff8006a7fcd03 - nt!MiRaisedIrqlFault+15b (+0x191553)
  856. [ fa:f1 ]
  857. fffff8006a7fcd8b-fffff8006a7fcd8c 2 bytes - nt!MiRaisedIrqlFault+1e3 (+0x88)
  858. [ ff f6:7f 96 ]
  859. fffff8006a85d387-fffff8006a85d389 3 bytes - nt!ExFreePoolWithTag+387
  860. [ 40 fb f6:00 4b 96 ]
  861. 22 errors : !nt (fffff8006a6679d1-fffff8006a85d389)
  862. MODULE_NAME: memory_corruption
  863.  
  864. IMAGE_NAME: memory_corruption
  865.  
  866. FOLLOWUP_NAME: memory_corruption
  867. DEBUG_FLR_IMAGE_TIMESTAMP: 0
  868. MEMORY_CORRUPTOR: LARGE
  869. FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
  870. BUCKET_ID: MEMORY_CORRUPTION_LARGE
  871. PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
  872. TARGET_TIME: 2017-07-18T04:22:42.000Z
  873. OSBUILD: 14393
  874. OSSERVICEPACK: 1480
  875. SERVICEPACK_NUMBER: 0
  876. OS_REVISION: 0
  877. SUITE_MASK: 784
  878. PRODUCT_TYPE: 1
  879. OSPLATFORM_TYPE: x64
  880. OSNAME: Windows 10
  881. OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
  882. USER_LCID: 0
  883. OSBUILD_TIMESTAMP: 2017-07-07 02:26:09
  884. BUILDDATESTAMP_STR: 170706-2004
  885. BUILDLAB_STR: rs1_release
  886. BUILDOSVER_STR: 10.0.14393.1480
  887. ANALYSIS_SESSION_ELAPSED_TIME: 1b6e
  888. ANALYSIS_SOURCE: KM
  889. FAILURE_ID_HASH_STRING: km:memory_corruption_large
  890. FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
  891. Followup: memory_corruption
  892.  
  893. ========================================================================
  894. =================== Dump File: 071917-10546-01.dmp ===================
  895. ========================================================================
  896. Mini Kernel Dump File: Only registers and stack trace are available
  897. Windows 10 Kernel Version 14393 MP (8 procs) Free x64
  898. Product: WinNt, suite: TerminalServer SingleUserTS Personal
  899. Built by: 14393.1480.amd64fre.rs1_release.170706-2004
  900. Kernel base = 0xfffff803`07877000 PsLoadedModuleList = 0xfffff803`07b76040
  901. Debug session time: Wed Jul 19 01:45:30.129 2017 (UTC - 4:00)
  902. System Uptime: 0 days 0:54:25.302
  903.  
  904. BugCheck EF, {ffffd506cc978800, 0, 0, 0}
  905. errfg" bg="errbg">ETW minidump data unavailable
  906. Probably caused by : ntkrnlmp.exe ( nt!PspCatchCriticalBreak+d6 )
  907. Followup: MachineOwner
  908.  
  909. CRITICAL_PROCESS_DIED (ef)
  910. A critical system process died
  911.  
  912. Arguments:
  913. Arg1: ffffd506cc978800, Process object or thread object
  914. Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
  915. Arg3: 0000000000000000
  916. Arg4: 0000000000000000
  917.  
  918. Debugging Details:
  919. ETW minidump data unavailable
  920. DUMP_CLASS: 1
  921. DUMP_QUALIFIER: 400
  922. BUILD_VERSION_STRING: 10.0.14393.1480 (rs1_release.170706-2004)
  923. SYSTEM_MANUFACTURER: ASUS
  924. SYSTEM_PRODUCT_NAME: All Series
  925. SYSTEM_SKU: All
  926. SYSTEM_VERSION: System Version
  927. BIOS_VENDOR: American Megatrends Inc.
  928. BIOS_VERSION: 1707
  929. BIOS_DATE: 12/13/2013
  930. BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
  931. BASEBOARD_PRODUCT: SABERTOOTH Z87
  932. BASEBOARD_VERSION: Rev 1.xx
  933. DUMP_TYPE: 2
  934.  
  935. PROCESS_NAME: svchost.exe
  936.  
  937. CRITICAL_PROCESS: svchost.exe
  938. EXCEPTION_CODE: (NTSTATUS) 0xcdfd1080 - <Unable to get error code text>
  939. ERROR_CODE: (NTSTATUS) 0xcdfd1080 - <Unable to get error code text>
  940. CPU_COUNT: 8
  941. CPU_MHZ: daa
  942. CPU_VENDOR: GenuineIntel
  943. CPU_FAMILY: 6
  944. CPU_MODEL: 3c
  945. CPU_STEPPING: 3
  946. CPU_MICROCODE: 6,3c,3,0 (F,M,S,R) SIG: 1E'00000000 (cache) 1E'00000000 (init)
  947. CUSTOMER_CRASH_COUNT: 1
  948. DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
  949. BUGCHECK_STR: 0xEF
  950. CURRENT_IRQL: 0
  951. ANALYSIS_SESSION_HOST: USERNAME-PC
  952. ANALYSIS_SESSION_TIME: 07-20-2017 16:16:26.0317
  953. ANALYSIS_VERSION: 10.0.14321.1024 amd64fre
  954. LAST_CONTROL_TRANSFER: from fffff80307ef0806 to fffff803079c6960
  955. STACK_TEXT:
  956. ffffc281`c89cd978 fffff803`07ef0806 : 00000000`000000ef ffffd506`cc978800 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
  957. ffffc281`c89cd980 fffff803`07e123f9 : ffffd506`cc978800 ffffd506`cdfd13a0 00000000`00000000 ffffd506`cdfd1080 : nt!PspCatchCriticalBreak+0xd6
  958. ffffc281`c89cd9e0 fffff803`07d14149 : ffffd506`00000000 ffffd506`cc978800 ffffd506`cdfd13a0 00000000`00000000 : nt!PspTerminateAllThreads+0x1462b9
  959. ffffc281`c89cda50 fffff803`07d13f00 : ffffd506`cc978800 00000000`c0000005 ffffd506`cc978800 ffffd506`cdfd1080 : nt!PspTerminateProcess+0x101
  960. ffffc281`c89cda90 fffff803`079d1693 : ffffd506`cc978800 ffffd506`cdfd1080 ffffc281`c89cdb80 00000000`00000003 : nt!NtTerminateProcess+0x9c
  961. ffffc281`c89cdb00 00007ffd`4b4501a1 : 00000000`0000002c ffffffff`ffffffff 00000000`c0000005 00007ffd`c9400000 : nt!KiSystemServiceCopyEnd+0x13
  962. 00000015`b5efd198 00000000`0000002c : ffffffff`ffffffff 00000000`c0000005 00007ffd`c9400000 00000000`00000000 : 0x00007ffd`4b4501a1
  963. 00000015`b5efd1a0 ffffffff`ffffffff : 00000000`c0000005 00007ffd`c9400000 00000000`00000000 00000000`0000000a : 0x2c
  964. 00000015`b5efd1a8 00000000`c0000005 : 00007ffd`c9400000 00000000`00000000 00000000`0000000a 00007ffd`cb30dc90 : 0xffffffff`ffffffff
  965. 00000015`b5efd1b0 00007ffd`c9400000 : 00000000`00000000 00000000`0000000a 00007ffd`cb30dc90 00007ffd`cb38de98 : 0xc0000005
  966. 00000015`b5efd1b8 00000000`00000000 : 00000000`0000000a 00007ffd`cb30dc90 00007ffd`cb38de98 00007ffd`c93032d3 : 0x00007ffd`c9400000
  967. STACK_COMMAND: kb
  968. THREAD_SHA1_HASH_MOD_FUNC: 042a2b51772309c39e12d732cc93cacf0af3064e
  969. THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 8aa4b88bf813027305913f33c1d3314f099e2369
  970. THREAD_SHA1_HASH_MOD: ee8fcf1fb60cb6e3e2f60ddbed2ec02b5748a693
  971. FOLLOWUP_IP:
  972. nt!PspCatchCriticalBreak+d6
  973. fffff803`07ef0806 cc int 3
  974. FAULT_INSTR_CODE: ff8440cc
  975. SYMBOL_STACK_INDEX: 1
  976. SYMBOL_NAME: nt!PspCatchCriticalBreak+d6
  977. FOLLOWUP_NAME: MachineOwner
  978. MODULE_NAME: nt
  979.  
  980. IMAGE_NAME: ntkrnlmp.exe
  981.  
  982. DEBUG_FLR_IMAGE_TIMESTAMP: 595f2981
  983. IMAGE_VERSION: 10.0.14393.1480
  984. BUCKET_ID_FUNC_OFFSET: d6
  985. FAILURE_BUCKET_ID: 0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_cdfd1080_nt!PspCatchCriticalBreak
  986. BUCKET_ID: 0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_cdfd1080_nt!PspCatchCriticalBreak
  987. PRIMARY_PROBLEM_CLASS: 0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_cdfd1080_nt!PspCatchCriticalBreak
  988. TARGET_TIME: 2017-07-19T05:45:30.000Z
  989. OSBUILD: 14393
  990. OSSERVICEPACK: 1480
  991. SERVICEPACK_NUMBER: 0
  992. OS_REVISION: 0
  993. SUITE_MASK: 784
  994. PRODUCT_TYPE: 1
  995. OSPLATFORM_TYPE: x64
  996. OSNAME: Windows 10
  997. OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
  998. USER_LCID: 0
  999. OSBUILD_TIMESTAMP: 2017-07-07 02:26:09
  1000. BUILDDATESTAMP_STR: 170706-2004
  1001. BUILDLAB_STR: rs1_release
  1002. BUILDOSVER_STR: 10.0.14393.1480
  1003. ANALYSIS_SESSION_ELAPSED_TIME: 862
  1004. ANALYSIS_SOURCE: KM
  1005. FAILURE_ID_HASH_STRING: km:0xef_svchost.exe_bugcheck_critical_process_cdfd1080_nt!pspcatchcriticalbreak
  1006. FAILURE_ID_HASH: {8a3fda49-47d6-5ff7-fe50-ea2c4a5eb3b4}
  1007. Followup: MachineOwner
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement