Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Microsoft (R) Windows Debugger Version 10.0.14321.1024 AMD64
- Copyright (c) Microsoft Corporation. All rights reserved.
- ========================================================================
- =================== Dump File: 071617-9546-01.dmp ====================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 14393 MP (8 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS Personal
- Built by: 14393.1480.amd64fre.rs1_release.170706-2004
- Kernel base = 0xfffff802`1c410000 PsLoadedModuleList = 0xfffff802`1c70f040
- Debug session time: Sun Jul 16 21:11:21.017 2017 (UTC - 4:00)
- System Uptime: 0 days 0:45:18.029
- BugCheck 1A, {41793, fffffd80cae78008, 1, 0}
- Probably caused by : memory_corruption
- Followup: memory_corruption
- MEMORY_MANAGEMENT (1a)
- # Any other values for parameter 1 must be individually examined.
- Arguments:
- Arg1: 0000000000041793, The subtype of the bugcheck.
- Arg2: fffffd80cae78008
- Arg3: 0000000000000001
- Arg4: 0000000000000000
- Debugging Details:
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 10.0.14393.1480 (rs1_release.170706-2004)
- SYSTEM_MANUFACTURER: ASUS
- SYSTEM_PRODUCT_NAME: All Series
- SYSTEM_SKU: All
- SYSTEM_VERSION: System Version
- BIOS_VENDOR: American Megatrends Inc.
- BIOS_VERSION: 1707
- BIOS_DATE: 12/13/2013
- BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
- BASEBOARD_PRODUCT: SABERTOOTH Z87
- BASEBOARD_VERSION: Rev 1.xx
- DUMP_TYPE: 2
- BUGCHECK_STR: 0x1a_41793
- CPU_COUNT: 8
- CPU_MHZ: daa
- CPU_VENDOR: GenuineIntel
- CPU_FAMILY: 6
- CPU_MODEL: 3c
- CPU_STEPPING: 3
- CPU_MICROCODE: 6,3c,3,0 (F,M,S,R) SIG: 1E'00000000 (cache) 1E'00000000 (init)
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: CODE_CORRUPTION
- PROCESS_NAME: RainbowSix.exe
- CURRENT_IRQL: 2
- ANALYSIS_SESSION_HOST: USERNAME-PC
- ANALYSIS_SESSION_TIME: 07-20-2017 16:08:15.0169
- ANALYSIS_VERSION: 10.0.14321.1024 amd64fre
- LAST_CONTROL_TRANSFER: from fffff8021c46d6a1 to fffff8021c55f960
- STACK_TEXT:
- ffff8000`ce97d6a8 fffff802`1c46d6a1 : 00000000`0000001a 00000000`00041793 fffffd80`cae78008 00000000`00000001 : nt!KeBugCheckEx
- ffff8000`ce97d6b0 fffff802`1c45409c : ffffc48f`30bdf660 fffff802`1c818400 00000000`00000000 00000000`00000000 : nt!MiDeleteVirtualAddresses+0xff1
- ffff8000`ce97d8b0 fffff802`1c82a55b : 00000000`00000000 ffffaf0d`29dbf840 00000000`00000000 00000000`00000000 : nt!MiDeleteVad+0x39c
- ffff8000`ce97d9e0 fffff802`1c829fe6 : ffffaf0d`209f1800 fffff802`00000008 ffffaf0d`1fa25510 00000195`ced00000 : nt!MiUnmapViewOfSection+0xeb
- ffff8000`ce97dab0 fffff802`1c56a693 : ffffaf0d`209f1800 ffff8000`ce97db80 00000000`00000000 ffffaf0d`20e45800 : nt!NtUnmapViewOfSectionEx+0x86
- ffff8000`ce97db00 00007ffd`3a2e6624 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
- 00000040`8e4aef38 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`3a2e6624
- STACK_COMMAND: kb
- CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
- fffff8021c5232dd-fffff8021c5232de 2 bytes - nt!MiPurgeZeroList+6d
- [ 80 fa:00 f0 ]
- fffff8021c658387-fffff8021c658389 3 bytes - nt!ExFreePoolWithTag+387
- [ 40 fb f6:c0 fe fd ]
- 5 errors : !nt (fffff8021c5232dd-fffff8021c658389)
- MODULE_NAME: memory_corruption
- IMAGE_NAME: memory_corruption
- FOLLOWUP_NAME: memory_corruption
- DEBUG_FLR_IMAGE_TIMESTAMP: 0
- MEMORY_CORRUPTOR: LARGE
- FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
- BUCKET_ID: MEMORY_CORRUPTION_LARGE
- PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
- TARGET_TIME: 2017-07-17T01:11:21.000Z
- OSBUILD: 14393
- OSSERVICEPACK: 1480
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 784
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2017-07-07 02:26:09
- BUILDDATESTAMP_STR: 170706-2004
- BUILDLAB_STR: rs1_release
- BUILDOSVER_STR: 10.0.14393.1480
- ANALYSIS_SESSION_ELAPSED_TIME: 1c0f
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:memory_corruption_large
- FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
- Followup: memory_corruption
- =============================== Drivers ================================
- ffffd520`12be0000 ffffd520`12bea000 TSDDD (deferred)
- Image path: \SystemRoot\System32\TSDDD.dll
- Image name: TSDDD.dll
- Timestamp: unavailable (00000000)
- fffff803`5a8d0000 fffff803`5ae42000 iaStorA (deferred)
- Image path: \SystemRoot\System32\drivers\iaStorA.sys
- Image name: iaStorA.sys
- Timestamp: Wed Jun 3 05:38:57 2015 (556ECB31)
- fffff803`5c470000 fffff803`5c47a000 ndisrd (deferred)
- Image path: \SystemRoot\system32\DRIVERS\ndisrd.sys
- Image name: ndisrd.sys
- Timestamp: Wed Feb 20 21:40:15 2013 (5125890F)
- fffff803`5c610000 fffff803`5c617000 AsUpIO (deferred)
- Image path: \SystemRoot\SysWow64\drivers\AsUpIO.sys
- Image name: AsUpIO.sys
- Timestamp: Mon Aug 2 22:47:59 2010 (4C57835F)
- fffff803`5c620000 fffff803`5c626000 AsIO (deferred)
- Image path: \SystemRoot\SysWow64\drivers\AsIO.sys
- Image name: AsIO.sys
- Timestamp: Wed Aug 22 05:54:47 2012 (5034AC67)
- fffff803`5c670000 fffff803`5c67d000 tap0901 (deferred)
- Image path: \SystemRoot\System32\drivers\tap0901.sys
- Image name: tap0901.sys
- Timestamp: Thu Aug 22 08:40:01 2013 (521606A1)
- fffff803`5c6e0000 fffff803`5c701000 drmk (deferred)
- Image path: \SystemRoot\System32\drivers\drmk.sys
- Image name: drmk.sys
- Timestamp: Fri Jul 15 22:27:13 2016 (57899B81)
- fffff803`5c830000 fffff803`5c85f000 TeeDriverW8x64 (deferred)
- Image path: \SystemRoot\System32\drivers\TeeDriverW8x64.sys
- Image name: TeeDriverW8x64.sys
- Timestamp: Mon Jun 29 13:22:00 2015 (55917EB8)
- fffff803`5c860000 fffff803`5c8e6000 e1i63x64 (deferred)
- Image path: \SystemRoot\System32\drivers\e1i63x64.sys
- Image name: e1i63x64.sys
- Timestamp: Fri Mar 4 16:46:29 2016 (56DA0235)
- fffff803`5c970000 fffff803`5c9d1000 mt7612US (deferred)
- Image path: \SystemRoot\System32\drivers\mt7612US.sys
- Image name: mt7612US.sys
- Timestamp: Wed Dec 9 01:44:11 2015 (5667CDBB)
- fffff803`5d690000 fffff803`5d6c5000 nvhda64v (deferred)
- Image path: \SystemRoot\system32\drivers\nvhda64v.sys
- Image name: nvhda64v.sys
- Timestamp: Tue May 16 09:02:27 2017 (591AF863)
- fffff803`5d760000 fffff803`5dbdd000 RTKVHD64 (deferred)
- Image path: \SystemRoot\system32\drivers\RTKVHD64.sys
- Image name: RTKVHD64.sys
- Timestamp: Tue Jun 2 06:47:59 2015 (556D89DF)
- fffff803`5dce0000 fffff803`5dcec000 ladfGSS (deferred)
- Image path: \SystemRoot\system32\drivers\ladfGSS.sys
- Image name: ladfGSS.sys
- Timestamp: Thu Dec 8 21:38:49 2016 (584A1939)
- fffff803`5dcf0000 fffff803`5dd05000 LGSHidFilt (deferred)
- Image path: \SystemRoot\system32\DRIVERS\LGSHidFilt.Sys
- Image name: LGSHidFilt.Sys
- Timestamp: Thu May 30 11:16:33 2013 (51A76D51)
- fffff803`5dd50000 fffff803`5e0d3000 athw8x (deferred)
- Image path: \SystemRoot\System32\drivers\athw8x.sys
- Image name: athw8x.sys
- Timestamp: Wed Sep 19 03:15:18 2012 (50597106)
- fffff803`5e190000 fffff803`5e19e000 nvvad64v (deferred)
- Image path: \SystemRoot\system32\drivers\nvvad64v.sys
- Image name: nvvad64v.sys
- Timestamp: Wed Apr 12 04:06:41 2017 (58EDE011)
- fffff803`5e1a0000 fffff803`5e1af000 nvvhci (deferred)
- Image path: \SystemRoot\System32\drivers\nvvhci.sys
- Image name: nvvhci.sys
- Timestamp: Tue Dec 27 20:44:00 2016 (586318E0)
- fffff803`5e1d0000 fffff803`5e1d4e00 LGBusEnum (deferred)
- Image path: \SystemRoot\system32\drivers\LGBusEnum.sys
- Image name: LGBusEnum.sys
- Timestamp: Mon Jun 13 14:47:08 2016 (575EFFAC)
- fffff803`5e1e0000 fffff803`5e1ec800 LGJoyXlCore (deferred)
- Image path: \SystemRoot\system32\drivers\LGJoyXlCore.sys
- Image name: LGJoyXlCore.sys
- Timestamp: Mon Jun 13 14:47:06 2016 (575EFFAA)
- fffff803`5e220000 fffff803`5f15b000 nvlddmkm (deferred)
- Image path: \SystemRoot\System32\DriverStore\FileRepository\nv_dispi.inf_amd64_2386fda73b467ac8\nvlddmkm.sys
- Image name: nvlddmkm.sys
- Timestamp: Tue Jun 27 16:02:17 2017 (5952B9C9)
- fffff803`5f5b0000 fffff803`5f5d6000 Sentinel64 (deferred)
- Image path: \SystemRoot\System32\Drivers\Sentinel64.sys
- Image name: Sentinel64.sys
- Timestamp: Mon Jun 2 02:14:55 2008 (48438FDF)
- fffff803`5f5e0000 fffff803`5f5e8000 lgcoretemp (deferred)
- Image path: \??\C:\Program Files\Logitech Gaming Software\Drivers\LgCoreTemp\lgcoretemp.sys
- Image name: lgcoretemp.sys
- Timestamp: Tue Jun 9 12:52:10 2015 (557719BA)
- fffff803`5f770000 fffff803`5f832000 peauth (deferred)
- Image path: \SystemRoot\system32\drivers\peauth.sys
- Image name: peauth.sys
- Timestamp: Fri Jul 15 22:24:39 2016 (57899AE7)
- fffff803`5f890000 fffff803`5f8ae080 rzpnk (deferred)
- Image path: \??\C:\WINDOWS\system32\drivers\rzpnk.sys
- Image name: rzpnk.sys
- Timestamp: Wed Sep 16 20:16:35 2015 (55FA0663)
- fffff803`5f950000 fffff803`5fec2000 dump_iaStorA (deferred)
- Image path: \SystemRoot\System32\Drivers\dump_iaStorA.sys
- Image name: dump_iaStorA.sys
- Timestamp: Wed Jun 3 05:38:57 2015 (556ECB31)
- fffff803`60400000 fffff803`604af000 BEDaisy (deferred)
- Image path: \??\C:\Program Files (x86)\Common Files\BattlEye\BEDaisy.sys
- Image name: BEDaisy.sys
- Timestamp: Tue Jan 10 22:01:10 2017 (58759FF6)
- fffff803`60af0000 fffff803`60afe000 MpKslf0f82d35 (deferred)
- Image path: \??\C:\ProgramData\Microsoft\Windows Defender\Definition Updates\{0471CC39-287E-41D3-A13B-6FB7F9381CFF}\MpKslf0f82d35.sys
- Image name: MpKslf0f82d35.sys
- Timestamp: Tue May 19 21:50:37 2015 (555BE86D)
- fffff803`60b00000 fffff803`60b02500 LGVirHid (deferred)
- Image path: \SystemRoot\system32\drivers\LGVirHid.sys
- Image name: LGVirHid.sys
- Timestamp: Mon Jun 13 14:47:03 2016 (575EFFA7)
- fffff803`60be0000 fffff803`60bed000 tapoas (deferred)
- Image path: \SystemRoot\System32\drivers\tapoas.sys
- Image name: tapoas.sys
- Timestamp: Sun Jul 11 20:31:59 2010 (4C3A627F)
- fffff803`60b30000 fffff803`60bdf000 BEDaisy.sys
- Timestamp: unavailable (00000000)
- Checksum: 00000000
- ImageSize: 000AF000
- fffff803`60500000 fffff803`60ad4000 iqvw64e.sys
- Timestamp: unavailable (00000000)
- Checksum: 00000000
- ImageSize: 005D4000
- fffff803`5c680000 fffff803`5c68d000 tapoas.sys
- Timestamp: unavailable (00000000)
- Checksum: 00000000
- ImageSize: 0000D000
- fffff803`60ae0000 fffff803`60aed000 WinDivert.sy
- Timestamp: unavailable (00000000)
- Checksum: 00000000
- ImageSize: 0000D000
- fffff803`5b1f0000 fffff803`5b1ff000 dump_storpor
- Timestamp: unavailable (00000000)
- Checksum: 00000000
- ImageSize: 0000F000
- fffff803`5cc40000 fffff803`5d1b2000 dump_iaStorA
- Timestamp: unavailable (00000000)
- Checksum: 00000000
- ImageSize: 00572000
- fffff803`5d1e0000 fffff803`5d1fd000 dump_dumpfve
- Timestamp: unavailable (00000000)
- Checksum: 00000000
- ImageSize: 0001D000
- fffff803`5ae50000 fffff803`5ae6c000 EhStorClass.
- Timestamp: unavailable (00000000)
- Checksum: 00000000
- ImageSize: 0001C000
- fffff803`5e100000 fffff803`5e13c000 WUDFRd.sys
- Timestamp: unavailable (00000000)
- Checksum: 00000000
- ImageSize: 0003C000
- fffff803`5c5f0000 fffff803`5c604000 dam.sys
- Timestamp: unavailable (00000000)
- Checksum: 00000000
- ImageSize: 00014000
- fffff803`59e20000 fffff803`59e30000 WdBoot.sys
- Timestamp: unavailable (00000000)
- Checksum: 00000000
- ImageSize: 00010000
- fffff803`5b100000 fffff803`5b10f000 hwpolicy.sys
- Timestamp: unavailable (00000000)
- Checksum: 00000000
- ImageSize: 0000F000
- ============================= BIOS INFO ================================
- [SMBIOS Data Tables v2.7]
- [DMI Version - 0]
- [2.0 Calling Convention - No]
- [Table Size - 3219 bytes]
- [BIOS Information (Type 0) - Length 24 - Handle 0000h]
- Vendor American Megatrends Inc.
- BIOS Version 1707
- BIOS Starting Address Segment f000
- BIOS Release Date 12/13/2013
- BIOS ROM Size 800000
- BIOS Characteristics
- 07: - PCI Supported
- 10: - APM Supported
- 11: - Upgradeable FLASH BIOS
- 12: - BIOS Shadowing Supported
- 15: - CD-Boot Supported
- 16: - Selectable Boot Supported
- 17: - BIOS ROM Socketed
- 19: - EDD Supported
- 23: - 1.2MB Floppy Supported
- 24: - 720KB Floppy Supported
- 25: - 2.88MB Floppy Supported
- 26: - Print Screen Device Supported
- 27: - Keyboard Services Supported
- 28: - Serial Services Supported
- 29: - Printer Services Supported
- 32: - BIOS Vendor Reserved
- BIOS Characteristic Extensions
- 00: - ACPI Supported
- 01: - USB Legacy Supported
- 08: - BIOS Boot Specification Supported
- 10: - Specification Reserved
- 11: - Specification Reserved
- BIOS Major Revision 4
- BIOS Minor Revision 6
- EC Firmware Major Revision 255
- EC Firmware Minor Revision 255
- [System Information (Type 1) - Length 27 - Handle 0001h]
- Manufacturer ASUS
- Product Name All Series
- Version System Version
- UUID 00000000-0000-0000-0000-000000000000
- Wakeup Type Power Switch
- SKUNumber All
- Family ASUS MB
- [BaseBoard Information (Type 2) - Length 15 - Handle 0002h]
- Manufacturer ASUSTeK COMPUTER INC.
- Product SABERTOOTH Z87
- Version Rev 1.xx
- Feature Flags 09h
- 1983428320: - 1983428368: - H¿pÏ(
- Chassis Handle 0003h
- Board Type 0ah - Processor/Memory Module
- Number of Child Handles 0
- [System Enclosure (Type 3) - Length 22 - Handle 0003h]
- Manufacturer Chassis Manufacture
- Chassis Type Desktop
- Version Chassis Version
- Bootup State Safe
- Power Supply State Safe
- Thermal State Safe
- Security Status None
- OEM Defined 0
- Height 0U
- Number of Power Cords 1
- Number of Contained Elements 0
- Contained Element Size 0
- [Onboard Devices Information (Type 10) - Length 8 - Handle 0028h]
- Number of Devices 2
- 01: Type Ethernet [enabled]
- 01: Description Onboard Ethernet
- 02: Type Sound [enabled]
- 02: Description Onboard Audio
- [OEM Strings (Type 11) - Length 5 - Handle 0029h]
- Number of Strings 4
- 3 F117
- [System Configuration Options (Type 12) - Length 5 - Handle 002ah]
- [Memory Device (Type 17) - Length 34 - Handle 0046h]
- Physical Memory Array Handle 0047h
- Total Width 0 bits
- Data Width 0 bits
- Form Factor 09h - DIMM
- Device Locator ChannelA-DIMM0
- Bank Locator BANK 0
- Memory Type 02h - Unknown
- Type Detail 0000h -
- Speed 0MHz
- [Physical Memory Array (Type 16) - Length 23 - Handle 0047h]
- Location 03h - SystemBoard/Motherboard
- Use 03h - System Memory
- Memory Error Correction 03h - None
- Maximum Capacity 33554432KB
- Number of Memory Devices 4
- [Memory Device (Type 17) - Length 34 - Handle 0048h]
- Physical Memory Array Handle 0047h
- Total Width 0 bits
- Data Width 0 bits
- Form Factor 09h - DIMM
- Device Locator ChannelA-DIMM1
- Bank Locator BANK 1
- Memory Type 02h - Unknown
- Type Detail 0000h -
- Speed 0MHz
- [Memory Device (Type 17) - Length 34 - Handle 0049h]
- Physical Memory Array Handle 0047h
- Total Width 64 bits
- Data Width 64 bits
- Size 8192MB
- Form Factor 09h - DIMM
- Device Locator ChannelB-DIMM0
- Bank Locator BANK 2
- Memory Type 18h - Specification Reserved
- Type Detail 0080h - Synchronous
- Speed 1600MHz
- Manufacturer 0215
- Part Number CMZ8GX3M1A1600C9
- [Memory Device Mapped Address (Type 20) - Length 35 - Handle 004ah]
- Starting Address 00000000h
- Ending Address 007fffffh
- Memory Device Handle 0049h
- Mem Array Mapped Adr Handle 004dh
- [Memory Device (Type 17) - Length 34 - Handle 004bh]
- Physical Memory Array Handle 0047h
- Total Width 64 bits
- Data Width 64 bits
- Size 8192MB
- Form Factor 09h - DIMM
- Device Locator ChannelB-DIMM1
- Bank Locator BANK 3
- Memory Type 18h - Specification Reserved
- Type Detail 0080h - Synchronous
- Speed 1600MHz
- Manufacturer 0215
- Part Number CMZ8GX3M1A1600C9
- [Memory Device Mapped Address (Type 20) - Length 35 - Handle 004ch]
- Starting Address 00800000h
- Ending Address 00ffffffh
- Memory Device Handle 004bh
- Mem Array Mapped Adr Handle 004dh
- [Memory Array Mapped Address (Type 19) - Length 31 - Handle 004dh]
- Starting Address 00000000h
- Ending Address 00ffffffh
- Memory Array Handle 0047h
- Partition Width 04
- [Cache Information (Type 7) - Length 19 - Handle 004eh]
- Socket Designation CPU Internal L1
- Cache Configuration 0180h - WB Enabled Int NonSocketed L1
- Maximum Cache Size 0100h - 256K
- Installed Size 0100h - 256K
- Supported SRAM Type 0002h - Unknown
- Current SRAM Type 0002h - Unknown
- Cache Speed 0ns
- Error Correction Type Multi-Bit ECC
- System Cache Type Other
- Associativity 8-way Set-Associative
- [Cache Information (Type 7) - Length 19 - Handle 004fh]
- Socket Designation CPU Internal L2
- Cache Configuration 0181h - WB Enabled Int NonSocketed L2
- Maximum Cache Size 0400h - 1024K
- Installed Size 0400h - 1024K
- Supported SRAM Type 0002h - Unknown
- Current SRAM Type 0002h - Unknown
- Cache Speed 0ns
- Error Correction Type Multi-Bit ECC
- System Cache Type Unified
- Associativity 8-way Set-Associative
- [Cache Information (Type 7) - Length 19 - Handle 0050h]
- Socket Designation CPU Internal L3
- Cache Configuration 0182h - WB Enabled Int NonSocketed L3
- Maximum Cache Size 2000h - 8192K
- Installed Size 2000h - 8192K
- Supported SRAM Type 0002h - Unknown
- Current SRAM Type 0002h - Unknown
- Cache Speed 0ns
- Error Correction Type Multi-Bit ECC
- System Cache Type Unified
- Associativity 16-way Set-Associative
- [Processor Information (Type 4) - Length 42 - Handle 0054h]
- Socket Designation SOCKET 1150
- Processor Type Central Processor
- Processor Family 01h - Other
- Processor Manufacturer Intel
- Processor ID c3060300fffbebbf
- Processor Version Intel(R) Core(TM) i7-4770K CPU @ 3.50GHz
- Processor Voltage 8ch - 1.2V
- External Clock 100MHz
- Max Speed 3800MHz
- Current Speed 3500MHz
- Status Enabled Populated
- Processor Upgrade Specification Reserved
- L1 Cache Handle 004eh
- L2 Cache Handle 004fh
- L3 Cache Handle 0050h
- 6: kd> q
- ========================================================================
- =================== Dump File: 071717-8328-01.dmp ====================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 14393 MP (8 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS Personal
- Built by: 14393.1480.amd64fre.rs1_release.170706-2004
- Kernel base = 0xfffff801`e7478000 PsLoadedModuleList = 0xfffff801`e7777040
- Debug session time: Mon Jul 17 23:52:56.421 2017 (UTC - 4:00)
- System Uptime: 0 days 2:32:25.123
- BugCheck 12B, {ffffffffc00002c4, 45a, 351d0000, ffffb001373bc000}
- *** WARNING: Unable to verify timestamp for win32k.sys
- *** ERROR: Module load completed but symbols could not be loaded for win32k.sys
- Probably caused by : memory_corruption
- Followup: memory_corruption
- FAULTY_HARDWARE_CORRUPTED_PAGE (12b)
- This bugcheck indicates that a single bit error was found in this page. This is a hardware memory error.
- Arguments:
- Arg1: ffffffffc00002c4, virtual address mapping the corrupted page
- Arg2: 000000000000045a, physical page number
- Arg3: 00000000351d0000, zero
- Arg4: ffffb001373bc000, zero
- Debugging Details:
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 10.0.14393.1480 (rs1_release.170706-2004)
- SYSTEM_MANUFACTURER: ASUS
- SYSTEM_PRODUCT_NAME: All Series
- SYSTEM_SKU: All
- SYSTEM_VERSION: System Version
- BIOS_VENDOR: American Megatrends Inc.
- BIOS_VERSION: 1707
- BIOS_DATE: 12/13/2013
- BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
- BASEBOARD_PRODUCT: SABERTOOTH Z87
- BASEBOARD_VERSION: Rev 1.xx
- DUMP_TYPE: 2
- BUGCHECK_STR: 0x12B_c00002c4_StCtDecompressFailed
- CPU_COUNT: 8
- CPU_MHZ: daa
- CPU_VENDOR: GenuineIntel
- CPU_FAMILY: 6
- CPU_MODEL: 3c
- CPU_STEPPING: 3
- CPU_MICROCODE: 6,3c,3,0 (F,M,S,R) SIG: 1E'00000000 (cache) 1E'00000000 (init)
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: CODE_CORRUPTION
- PROCESS_NAME: MemCompression
- CURRENT_IRQL: 0
- ANALYSIS_SESSION_HOST: USERNAME-PC
- ANALYSIS_SESSION_TIME: 07-20-2017 16:10:18.0668
- ANALYSIS_VERSION: 10.0.14321.1024 amd64fre
- LAST_CONTROL_TRANSFER: from fffff801e768dd8f to fffff801e75c7960
- STACK_TEXT:
- ffffb001`3c2851b8 fffff801`e768dd8f : 00000000`0000012b ffffffff`c00002c4 00000000`0000045a 00000000`351d0000 : nt!KeBugCheckEx
- ffffb001`3c2851c0 fffff801`e76136cc : 00000000`00000200 00000000`00000003 00000000`351d0000 ffffb001`373bc000 : nt!ST_STORE<SM_TRAITS>::StDmPageError+0x117
- ffffb001`3c285210 fffff801`e75879c3 : 00000000`00000000 ffff9c05`7fd5b050 00000000`00000000 00000000`00000000 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageCopy+0x8bcd8
- ffffb001`3c2852f0 fffff801`e7587d51 : 00000000`00000001 00000000`0000211c 00000000`00000001 ffffb001`00010000 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageTransfer+0x7b
- ffffb001`3c285340 fffff801`e7587edd : 00000000`ffffffff ffff9c05`86a67000 ffffb001`3c285428 ffff9c05`87398780 : nt!ST_STORE<SM_TRAITS>::StDmpSinglePageRetrieve+0x199
- ffffb001`3c2853e0 fffff801`e7588cb2 : ffffb001`3c2854b8 ffff9c05`87398780 ffffbffc`90727f78 ffff9c05`87398780 : nt!ST_STORE<SM_TRAITS>::StDmPageRetrieve+0xe5
- ffffb001`3c2854a0 fffff801`e7588e09 : ffff9c05`7fd5b000 ffffb001`3c2855b0 fffff801`e7588de8 fffff801`e7588de8 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadIssue+0x52
- ffffb001`3c2854f0 fffff801`e7514045 : ffff9c05`7a37a800 ffffb001`3c2855b0 ffff9c05`82944060 fffff801`e752e6f8 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadCallout+0x21
- ffffb001`3c285520 fffff801`e758201d : 00000000`00000003 ffff9c05`86a67000 ffff9c05`7fd5b000 00000000`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0x85
- ffffb001`3c285570 fffff801`e758541c : ffffb001`3c285670 ffffb001`3c2857b0 ffff9c05`7fd5b000 fffff801`e75821f6 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectRead+0xad
- ffffb001`3c285640 fffff801`e7585107 : ffff9c05`7fd5b000 ffff9c05`87398780 fffff801`e782ca40 ffffb001`3c2857b0 : nt!SMKM_STORE<SM_TRAITS>::SmStWorkItemQueue+0x1a4
- ffffb001`3c285690 fffff801`e7581eb3 : 00000000`0000000c ffff9c05`82944110 ffff9c05`87398780 00000000`00000010 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmIoCtxQueueWork+0xbf
- ffffb001`3c285710 fffff801`e7588de2 : ffff9c05`00000010 ffff9c05`82944110 00000204`00000000 ffff9c05`7fd5b000 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmPageRead+0x16b
- ffffb001`3c285780 fffff801`e75570fd : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!SmPageRead+0x2e
- ffffb001`3c2857d0 fffff801`e74ba11d : 00000000`00000002 ffffb001`3c285b00 ffff9c05`82944010 00000000`00000000 : nt!MiIssueHardFaultIo+0x145
- ffffb001`3c285860 fffff801`e74ce06c : 00000000`c0033333 ffff9c05`82944010 ffff9c05`893d4b00 ffffb001`3c285b00 : nt!MiIssueHardFault+0x15d
- ffffb001`3c285900 fffff801`e75d0ffc : ffff9c05`7a37a800 00000000`00000000 00000000`00000000 ffff9c05`7a4309d0 : nt!MmAccessFault+0x11ec
- ffffb001`3c285b00 00007ff8`79bf6d1d : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x13c
- 000000b5`0dec4ad0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`79bf6d1d
- STACK_COMMAND: kb
- CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
- fffff801e74ba1be-fffff801e74ba1bf 2 bytes - nt!MiIssueHardFault+1fe
- [ 80 f6:00 95 ]
- fffff801e755718f-fffff801e7557190 2 bytes - nt!MiIsPfnSystemCharged+17 (+0x9cfd1)
- [ 80 f6:00 95 ]
- 4 errors : !nt (fffff801e74ba1be-fffff801e7557190)
- MODULE_NAME: memory_corruption
- IMAGE_NAME: memory_corruption
- FOLLOWUP_NAME: memory_corruption
- DEBUG_FLR_IMAGE_TIMESTAMP: 0
- MEMORY_CORRUPTOR: LARGE
- FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
- BUCKET_ID: MEMORY_CORRUPTION_LARGE
- PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
- TARGET_TIME: 2017-07-18T03:52:56.000Z
- OSBUILD: 14393
- OSSERVICEPACK: 1480
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 784
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2017-07-07 02:26:09
- BUILDDATESTAMP_STR: 170706-2004
- BUILDLAB_STR: rs1_release
- BUILDOSVER_STR: 10.0.14393.1480
- ANALYSIS_SESSION_ELAPSED_TIME: 1ab8
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:memory_corruption_large
- FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
- Followup: memory_corruption
- 4: kd> q
- ========================================================================
- =================== Dump File: 071817-44531-01.dmp ===================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 14393 MP (8 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS Personal
- Built by: 14393.1480.amd64fre.rs1_release.170706-2004
- Kernel base = 0xfffff801`2820b000 PsLoadedModuleList = 0xfffff801`2850a040
- Debug session time: Tue Jul 18 01:50:27.433 2017 (UTC - 4:00)
- System Uptime: 0 days 0:41:03.115
- BugCheck 50, {ffffd4810f011230, 0, fffff80128238bd6, 2}
- Could not read faulting driver name
- Probably caused by : memory_corruption
- Followup: memory_corruption
- PAGE_FAULT_IN_NONPAGED_AREA (50)
- Invalid system memory was referenced. This cannot be protected by try-except.
- Typically the address is just plain bad or it is pointing at freed memory.
- Arguments:
- Arg1: ffffd4810f011230, memory referenced.
- Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
- Arg3: fffff80128238bd6, If non-zero, the instruction address which referenced the bad memory
- address.
- Arg4: 0000000000000002, (reserved)
- Debugging Details:
- Could not read faulting driver name
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 10.0.14393.1480 (rs1_release.170706-2004)
- SYSTEM_MANUFACTURER: ASUS
- SYSTEM_PRODUCT_NAME: All Series
- SYSTEM_SKU: All
- SYSTEM_VERSION: System Version
- BIOS_VENDOR: American Megatrends Inc.
- BIOS_VERSION: 1707
- BIOS_DATE: 12/13/2013
- BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
- BASEBOARD_PRODUCT: SABERTOOTH Z87
- BASEBOARD_VERSION: Rev 1.xx
- DUMP_TYPE: 2
- READ_ADDRESS: fffff801285ab338: Unable to get MiVisibleState
- ffffd4810f011230
- FAULTING_IP:
- nt!MmCopyToCachedPage+4e6
- fffff801`28238bd6 498b06 mov rax,qword ptr [r14]
- MM_INTERNAL_CODE: 2
- CPU_COUNT: 8
- CPU_MHZ: daa
- CPU_VENDOR: GenuineIntel
- CPU_FAMILY: 6
- CPU_MODEL: 3c
- CPU_STEPPING: 3
- CPU_MICROCODE: 6,3c,3,0 (F,M,S,R) SIG: 1E'00000000 (cache) 1E'00000000 (init)
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: CODE_CORRUPTION
- BUGCHECK_STR: AV
- PROCESS_NAME: explorer.exe
- CURRENT_IRQL: 0
- ANALYSIS_SESSION_HOST: USERNAME-PC
- ANALYSIS_SESSION_TIME: 07-20-2017 16:14:15.0223
- ANALYSIS_VERSION: 10.0.14321.1024 amd64fre
- DEVICE_OBJECT: 0000000000000001
- TRAP_FRAME: ffff8b018b631ed0 -- (.trap 0xffff8b018b631ed0)
- NOTE: The trap frame does not contain all registers.
- Some register values may be zeroed or incorrect.
- rax=ffff810000000000 rbx=0000000000000000 rcx=ffffb18051a85880
- rdx=fffff8012820b000 rsi=0000000000000000 rdi=0000000000000000
- rip=fffff80128238bd6 rsp=ffff8b018b632060 rbp=ffff8b018b632750
- r8=fffffa8000000000 r9=ffff810000000000 r10=ffffc4810f0111b0
- r11=0000000fffffffff r12=0000000000000000 r13=0000000000000000
- r14=0000000000000000 r15=0000000000000000
- iopl=0 nv up ei ng nz na po nc
- nt!MmCopyToCachedPage+0x4e6:
- fffff801`28238bd6 498b06 mov rax,qword ptr [r14] ds:00000000`00000000=????????????????
- Resetting default scope
- LAST_CONTROL_TRANSFER: from fffff80128384e11 to fffff8012835a960
- STACK_TEXT:
- ffff8b01`8b631bd8 fffff801`28384e11 : 00000000`00000050 ffffd481`0f011230 00000000`00000000 ffff8b01`8b631ed0 : nt!KeBugCheckEx
- ffff8b01`8b631be0 fffff801`282600fd : 00000000`00000000 00000000`00000000 ffff8b01`8b631ed0 ffffd481`0f011230 : nt!MiSystemFault+0x100201
- ffff8b01`8b631cd0 fffff801`28363ffc : ffffc481`0f011230 00000000`51a857f8 ffffd4c9`1043c60c 00000000`00000000 : nt!MmAccessFault+0x27d
- ffff8b01`8b631ed0 fffff801`28238bd6 : 00000000`00000000 ffff8100`0823b7e0 00000000`00000000 00194657`00263e16 : nt!KiPageFault+0x13c
- ffff8b01`8b632060 fffff801`282382f2 : 00000000`00000000 00000000`01700000 ffff8b01`8b632368 ffff8b01`8b63235c : nt!MmCopyToCachedPage+0x4e6
- ffff8b01`8b632310 fffff801`28235187 : ffffc481`11221be0 00000000`14a45040 ffff8b01`8b632480 00000000`000c0000 : nt!CcMapAndCopyInToCache+0x592
- ffff8b01`8b632420 fffff800`301aa427 : ffffc481`112616a8 ffff8b01`8b632700 00000000`00000000 ffffb180`476d7100 : nt!CcCopyWriteEx+0xe7
- ffff8b01`8b6324a0 fffff800`301a6388 : ffffc481`112616a8 00000000`00000000 00000000`00000000 ffffc481`112616a8 : NTFS!NtfsCommonWrite+0x3e07
- ffff8b01`8b632720 fffff800`2ec05206 : ffffc481`0ddf8900 ffffc481`11444010 ffffc481`11444010 ffffc481`11444758 : NTFS!NtfsFsdWrite+0x1d8
- ffff8b01`8b6327e0 fffff800`2ec03146 : 00000000`00000801 ffffc481`11444000 00000000`00000001 fffff800`00000306 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x1a6
- ffff8b01`8b632870 fffff801`28621d80 : ffffc481`0ce20080 ffffc481`11444010 00000000`00100000 ffffc481`0ce20080 : FLTMGR!FltpDispatch+0xb6
- ffff8b01`8b6328d0 fffff801`2862277b : 00000000`00000001 00000000`00000000 00000000`00000000 ffff8b01`8b632b80 : nt!IopSynchronousServiceTail+0x1a0
- ffff8b01`8b632990 fffff801`28365693 : ffffc481`0ee19400 00000000`00000d70 00000000`00000000 00000000`40df71e0 : nt!NtWriteFile+0x65b
- ffff8b01`8b632a90 00007ffe`1ef561e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
- 00000000`4d28c8d8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`1ef561e4
- STACK_COMMAND: kb
- CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
- fffff8012823876c-fffff8012823876d 2 bytes - nt!MmCopyToCachedPage+7c
- [ fb f6:fd fa ]
- fffff8012823879d-fffff8012823879e 2 bytes - nt!MmCopyToCachedPage+ad (+0x31)
- [ 80 fa:00 81 ]
- fffff80128238855 - nt!MmCopyToCachedPage+165 (+0xb8)
- [ f6:fa ]
- fffff801282389c2-fffff801282389c3 2 bytes - nt!MmCopyToCachedPage+2d2 (+0x16d)
- [ 80 fa:00 81 ]
- fffff80128238b10-fffff80128238b11 2 bytes - nt!MmCopyToCachedPage+420 (+0x14e)
- [ fb f6:fd fa ]
- fffff80128238b33 - nt!MmCopyToCachedPage+443 (+0x23)
- [ f6:fa ]
- fffff80128238b4b-fffff80128238b4d 3 bytes - nt!MmCopyToCachedPage+45b (+0x18)
- [ 7d fb f6:7e fd fa ]
- fffff80128238b5b-fffff80128238b5f 5 bytes - nt!MmCopyToCachedPage+46b (+0x10)
- [ d0 be 7d fb f6:50 bf 7e fd fa ]
- fffff80128238d0a-fffff80128238d0b 2 bytes - nt!MmCopyToCachedPage+61a (+0x1af)
- [ 80 fa:00 81 ]
- fffff80128238e2a - nt!MmCopyToCachedPage+73a (+0x120)
- [ f6:fa ]
- fffff8012825f3d7-fffff8012825f3d8 2 bytes - nt!MiGetPage+97 (+0x265ad)
- [ 80 fa:00 81 ]
- fffff8012826b425-fffff8012826b426 2 bytes - nt!MmUnmapViewInSystemCache+855 (+0xc04e)
- [ 80 fa:00 81 ]
- fffff8012827a076-fffff8012827a077 2 bytes - nt!MiZeroSinglePage+26 (+0xec51)
- [ 80 fa:00 81 ]
- fffff8012831e2dd-fffff8012831e2de 2 bytes - nt!MiPurgeZeroList+6d (+0xa4267)
- [ 80 fa:00 81 ]
- 29 errors : !nt (fffff8012823876c-fffff8012831e2de)
- MODULE_NAME: memory_corruption
- IMAGE_NAME: memory_corruption
- FOLLOWUP_NAME: memory_corruption
- DEBUG_FLR_IMAGE_TIMESTAMP: 0
- MEMORY_CORRUPTOR: LARGE
- FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
- BUCKET_ID: MEMORY_CORRUPTION_LARGE
- PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
- TARGET_TIME: 2017-07-18T05:50:27.000Z
- OSBUILD: 14393
- OSSERVICEPACK: 1480
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 784
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2017-07-07 02:26:09
- BUILDDATESTAMP_STR: 170706-2004
- BUILDLAB_STR: rs1_release
- BUILDOSVER_STR: 10.0.14393.1480
- ANALYSIS_SESSION_ELAPSED_TIME: 8f54
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:memory_corruption_large
- FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
- Followup: memory_corruption
- 6: kd> q
- ========================================================================
- =================== Dump File: 071717-10890-01.dmp ===================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 14393 MP (8 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS Personal
- Built by: 14393.1480.amd64fre.rs1_release.170706-2004
- Kernel base = 0xfffff800`6a615000 PsLoadedModuleList = 0xfffff800`6a914040
- Debug session time: Tue Jul 18 00:22:42.149 2017 (UTC - 4:00)
- System Uptime: 0 days 0:11:34.831
- BugCheck BE, {ffff963ffcd32800, 2b00002b6cae025, ffff85805650d030, a}
- Probably caused by : memory_corruption
- Followup: memory_corruption
- ATTEMPTED_WRITE_TO_READONLY_MEMORY (be)
- An attempt was made to write to readonly memory. The guilty driver is on the
- stack trace (and is typically the current instruction pointer).
- When possible, the guilty driver's name (Unicode string) is printed on
- the bugcheck screen and saved in KiBugCheckDriver.
- Arguments:
- Arg1: ffff963ffcd32800, Virtual address for the attempted write.
- Arg2: 02b00002b6cae025, PTE contents.
- Arg3: ffff85805650d030, (reserved)
- Arg4: 000000000000000a, (reserved)
- Debugging Details:
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 10.0.14393.1480 (rs1_release.170706-2004)
- SYSTEM_MANUFACTURER: ASUS
- SYSTEM_PRODUCT_NAME: All Series
- SYSTEM_SKU: All
- SYSTEM_VERSION: System Version
- BIOS_VENDOR: American Megatrends Inc.
- BIOS_VERSION: 1707
- BIOS_DATE: 12/13/2013
- BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
- BASEBOARD_PRODUCT: SABERTOOTH Z87
- BASEBOARD_VERSION: Rev 1.xx
- DUMP_TYPE: 2
- CPU_COUNT: 8
- CPU_MHZ: daa
- CPU_VENDOR: GenuineIntel
- CPU_FAMILY: 6
- CPU_MODEL: 3c
- CPU_STEPPING: 3
- CPU_MICROCODE: 6,3c,3,0 (F,M,S,R) SIG: 1E'00000000 (cache) 1E'00000000 (init)
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: CODE_CORRUPTION
- BUGCHECK_STR: 0xBE
- PROCESS_NAME: svchost.exe
- CURRENT_IRQL: 2
- ANALYSIS_SESSION_HOST: USERNAME-PC
- ANALYSIS_SESSION_TIME: 07-20-2017 16:11:58.0744
- ANALYSIS_VERSION: 10.0.14321.1024 amd64fre
- TRAP_FRAME: ffff85805650d4e0 -- (.trap 0xffff85805650d4e0)
- NOTE: The trap frame does not contain all registers.
- Some register values may be zeroed or incorrect.
- rax=00007ff9a64fff00 rbx=0000000000000000 rcx=0000000000005a4d
- rdx=00007ff9a6500000 rsi=0000000000000000 rdi=0000000000000000
- rip=fffff8006a61dee5 rsp=ffff85805650d678 rbp=ffff85805650d700
- r8=0000000000000000 r9=ffff85805650d6b8 r10=0000000000000000
- r11=7ffffffffffffffc r12=0000000000000000 r13=0000000000000000
- r14=0000000000000000 r15=0000000000000000
- iopl=0 nv up ei pl zr na po nc
- nt!RtlImageNtHeaderEx+0x35:
- fffff800`6a61dee5 66390a cmp word ptr [rdx],cx ds:00007ff9`a6500000=????
- Resetting default scope
- LAST_CONTROL_TRANSFER: from fffff8006a7fccca to fffff8006a764960
- STACK_TEXT:
- ffff8580`5650cdd8 fffff800`6a7fccca : 00000000`000000be ffff963f`fcd32800 02b00002`b6cae025 ffff8580`5650d030 : nt!KeBugCheckEx
- ffff8580`5650cde0 fffff800`6a669fda : 0000007f`fffffff8 ffff8580`5650cf30 00000000`00000003 fffff180`082460a0 : nt!MiRaisedIrqlFault+0x122
- ffff8580`5650ce30 fffff800`6a76dffc : 00000000`00000000 00000000`6a85db00 ffffc509`537b3580 00000000`00000000 : nt!MmAccessFault+0x15a
- ffff8580`5650d030 fffff800`6a66d631 : 00000000`00000000 ffff8580`00000019 ffffdb5e`91b3da2e fffff800`6a6443a5 : nt!KiPageFault+0x13c
- ffff8580`5650d1c0 fffff800`6a66ab58 : ffffc509`51b8d550 00000000`00000100 ffffc509`51b8d550 ffff8580`5650d3e0 : nt!MiResolveSharedZeroFault+0x1c1
- ffff8580`5650d2e0 fffff800`6a76dffc : ffffc509`4783c140 00000000`00000001 00000000`324c7241 00000000`00000290 : nt!MmAccessFault+0xcd8
- ffff8580`5650d4e0 fffff800`6a61dee5 : fffff800`6a61dea6 ffff8580`5650d700 ffffc509`537b3080 ffff8580`504b2c40 : nt!KiPageFault+0x13c
- ffff8580`5650d678 fffff800`6a61dea6 : ffff8580`5650d700 ffffc509`537b3080 ffff8580`504b2c40 00000000`00000000 : nt!RtlImageNtHeaderEx+0x35
- ffff8580`5650d680 fffff800`6aa649a0 : 0000001f`28376000 00000000`00000000 ffffc509`537b3080 ffff8580`5650d740 : nt!RtlImageNtHeader+0x1e
- ffff8580`5650d6b0 fffff800`6aa646c3 : 0000001f`28376000 ffffc509`537b3080 ffffc509`492b6080 80000002`b68e7867 : nt!DbgkCreateThread+0x1bc
- ffff8580`5650d8d0 fffff800`6a769f66 : ffff8580`504ac180 ffffc509`492b6080 ffff8580`504b8cc0 00000000`00000000 : nt!PspUserThreadStartup+0xa7
- ffff8580`5650d9c0 fffff800`6a769ee0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiStartUserThread+0x16
- ffff8580`5650db00 00007ff9`a65670b0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiStartUserThreadReturn
- 0000001f`2812fcc8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`a65670b0
- STACK_COMMAND: kb
- CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
- fffff8006a6679d1 - nt!MiCompletePrivateZeroFault+821
- [ fa:f1 ]
- fffff8006a667a94 - nt!MiCompletePrivateZeroFault+8e4 (+0xc3)
- [ fa:f1 ]
- fffff8006a66a02a-fffff8006a66a02b 2 bytes - nt!MmAccessFault+1aa (+0x2596)
- [ 80 f6:00 96 ]
- fffff8006a66a037-fffff8006a66a038 2 bytes - nt!MmAccessFault+1b7 (+0x0d)
- [ ff f6:7f 96 ]
- fffff8006a66a0a1-fffff8006a66a0a2 2 bytes - nt!MmAccessFault+221 (+0x6a)
- [ 80 f6:00 96 ]
- fffff8006a66ab9b-fffff8006a66ab9c 2 bytes - nt!MmAccessFault+d1b (+0xafa)
- [ 80 f6:00 96 ]
- fffff8006a66b71f-fffff8006a66b720 2 bytes - nt!MiResolvePageTablePage+3cf (+0xb84)
- [ 80 f6:00 96 ]
- fffff8006a66b790-fffff8006a66b791 2 bytes - nt!MiResolvePageTablePage+440 (+0x71)
- [ ff f6:7f 96 ]
- fffff8006a66b7b0-fffff8006a66b7b1 2 bytes - nt!MiResolvePageTablePage+460 (+0x20)
- [ ff f6:7f 96 ]
- fffff8006a7fcd03 - nt!MiRaisedIrqlFault+15b (+0x191553)
- [ fa:f1 ]
- fffff8006a7fcd8b-fffff8006a7fcd8c 2 bytes - nt!MiRaisedIrqlFault+1e3 (+0x88)
- [ ff f6:7f 96 ]
- fffff8006a85d387-fffff8006a85d389 3 bytes - nt!ExFreePoolWithTag+387
- [ 40 fb f6:00 4b 96 ]
- 22 errors : !nt (fffff8006a6679d1-fffff8006a85d389)
- MODULE_NAME: memory_corruption
- IMAGE_NAME: memory_corruption
- FOLLOWUP_NAME: memory_corruption
- DEBUG_FLR_IMAGE_TIMESTAMP: 0
- MEMORY_CORRUPTOR: LARGE
- FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
- BUCKET_ID: MEMORY_CORRUPTION_LARGE
- PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
- TARGET_TIME: 2017-07-18T04:22:42.000Z
- OSBUILD: 14393
- OSSERVICEPACK: 1480
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 784
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2017-07-07 02:26:09
- BUILDDATESTAMP_STR: 170706-2004
- BUILDLAB_STR: rs1_release
- BUILDOSVER_STR: 10.0.14393.1480
- ANALYSIS_SESSION_ELAPSED_TIME: 1b6e
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:memory_corruption_large
- FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
- Followup: memory_corruption
- ========================================================================
- =================== Dump File: 071917-10546-01.dmp ===================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 14393 MP (8 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS Personal
- Built by: 14393.1480.amd64fre.rs1_release.170706-2004
- Kernel base = 0xfffff803`07877000 PsLoadedModuleList = 0xfffff803`07b76040
- Debug session time: Wed Jul 19 01:45:30.129 2017 (UTC - 4:00)
- System Uptime: 0 days 0:54:25.302
- BugCheck EF, {ffffd506cc978800, 0, 0, 0}
- errfg" bg="errbg">ETW minidump data unavailable
- Probably caused by : ntkrnlmp.exe ( nt!PspCatchCriticalBreak+d6 )
- Followup: MachineOwner
- CRITICAL_PROCESS_DIED (ef)
- A critical system process died
- Arguments:
- Arg1: ffffd506cc978800, Process object or thread object
- Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
- Arg3: 0000000000000000
- Arg4: 0000000000000000
- Debugging Details:
- ETW minidump data unavailable
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 10.0.14393.1480 (rs1_release.170706-2004)
- SYSTEM_MANUFACTURER: ASUS
- SYSTEM_PRODUCT_NAME: All Series
- SYSTEM_SKU: All
- SYSTEM_VERSION: System Version
- BIOS_VENDOR: American Megatrends Inc.
- BIOS_VERSION: 1707
- BIOS_DATE: 12/13/2013
- BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
- BASEBOARD_PRODUCT: SABERTOOTH Z87
- BASEBOARD_VERSION: Rev 1.xx
- DUMP_TYPE: 2
- PROCESS_NAME: svchost.exe
- CRITICAL_PROCESS: svchost.exe
- EXCEPTION_CODE: (NTSTATUS) 0xcdfd1080 - <Unable to get error code text>
- ERROR_CODE: (NTSTATUS) 0xcdfd1080 - <Unable to get error code text>
- CPU_COUNT: 8
- CPU_MHZ: daa
- CPU_VENDOR: GenuineIntel
- CPU_FAMILY: 6
- CPU_MODEL: 3c
- CPU_STEPPING: 3
- CPU_MICROCODE: 6,3c,3,0 (F,M,S,R) SIG: 1E'00000000 (cache) 1E'00000000 (init)
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
- BUGCHECK_STR: 0xEF
- CURRENT_IRQL: 0
- ANALYSIS_SESSION_HOST: USERNAME-PC
- ANALYSIS_SESSION_TIME: 07-20-2017 16:16:26.0317
- ANALYSIS_VERSION: 10.0.14321.1024 amd64fre
- LAST_CONTROL_TRANSFER: from fffff80307ef0806 to fffff803079c6960
- STACK_TEXT:
- ffffc281`c89cd978 fffff803`07ef0806 : 00000000`000000ef ffffd506`cc978800 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
- ffffc281`c89cd980 fffff803`07e123f9 : ffffd506`cc978800 ffffd506`cdfd13a0 00000000`00000000 ffffd506`cdfd1080 : nt!PspCatchCriticalBreak+0xd6
- ffffc281`c89cd9e0 fffff803`07d14149 : ffffd506`00000000 ffffd506`cc978800 ffffd506`cdfd13a0 00000000`00000000 : nt!PspTerminateAllThreads+0x1462b9
- ffffc281`c89cda50 fffff803`07d13f00 : ffffd506`cc978800 00000000`c0000005 ffffd506`cc978800 ffffd506`cdfd1080 : nt!PspTerminateProcess+0x101
- ffffc281`c89cda90 fffff803`079d1693 : ffffd506`cc978800 ffffd506`cdfd1080 ffffc281`c89cdb80 00000000`00000003 : nt!NtTerminateProcess+0x9c
- ffffc281`c89cdb00 00007ffd`4b4501a1 : 00000000`0000002c ffffffff`ffffffff 00000000`c0000005 00007ffd`c9400000 : nt!KiSystemServiceCopyEnd+0x13
- 00000015`b5efd198 00000000`0000002c : ffffffff`ffffffff 00000000`c0000005 00007ffd`c9400000 00000000`00000000 : 0x00007ffd`4b4501a1
- 00000015`b5efd1a0 ffffffff`ffffffff : 00000000`c0000005 00007ffd`c9400000 00000000`00000000 00000000`0000000a : 0x2c
- 00000015`b5efd1a8 00000000`c0000005 : 00007ffd`c9400000 00000000`00000000 00000000`0000000a 00007ffd`cb30dc90 : 0xffffffff`ffffffff
- 00000015`b5efd1b0 00007ffd`c9400000 : 00000000`00000000 00000000`0000000a 00007ffd`cb30dc90 00007ffd`cb38de98 : 0xc0000005
- 00000015`b5efd1b8 00000000`00000000 : 00000000`0000000a 00007ffd`cb30dc90 00007ffd`cb38de98 00007ffd`c93032d3 : 0x00007ffd`c9400000
- STACK_COMMAND: kb
- THREAD_SHA1_HASH_MOD_FUNC: 042a2b51772309c39e12d732cc93cacf0af3064e
- THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 8aa4b88bf813027305913f33c1d3314f099e2369
- THREAD_SHA1_HASH_MOD: ee8fcf1fb60cb6e3e2f60ddbed2ec02b5748a693
- FOLLOWUP_IP:
- nt!PspCatchCriticalBreak+d6
- fffff803`07ef0806 cc int 3
- FAULT_INSTR_CODE: ff8440cc
- SYMBOL_STACK_INDEX: 1
- SYMBOL_NAME: nt!PspCatchCriticalBreak+d6
- FOLLOWUP_NAME: MachineOwner
- MODULE_NAME: nt
- IMAGE_NAME: ntkrnlmp.exe
- DEBUG_FLR_IMAGE_TIMESTAMP: 595f2981
- IMAGE_VERSION: 10.0.14393.1480
- BUCKET_ID_FUNC_OFFSET: d6
- FAILURE_BUCKET_ID: 0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_cdfd1080_nt!PspCatchCriticalBreak
- BUCKET_ID: 0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_cdfd1080_nt!PspCatchCriticalBreak
- PRIMARY_PROBLEM_CLASS: 0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_cdfd1080_nt!PspCatchCriticalBreak
- TARGET_TIME: 2017-07-19T05:45:30.000Z
- OSBUILD: 14393
- OSSERVICEPACK: 1480
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 784
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2017-07-07 02:26:09
- BUILDDATESTAMP_STR: 170706-2004
- BUILDLAB_STR: rs1_release
- BUILDOSVER_STR: 10.0.14393.1480
- ANALYSIS_SESSION_ELAPSED_TIME: 862
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:0xef_svchost.exe_bugcheck_critical_process_cdfd1080_nt!pspcatchcriticalbreak
- FAILURE_ID_HASH: {8a3fda49-47d6-5ff7-fe50-ea2c4a5eb3b4}
- Followup: MachineOwner
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement