Advertisement
Guest User

Untitled

a guest
Aug 1st, 2017
686
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 77.13 KB | None | 0 0
  1. Microsoft (R) Windows Debugger Version 10.0.14321.1024 X86
  2. Copyright (c) Microsoft Corporation. All rights reserved.
  3.  
  4. Auto Dump Analyzer by gardenman
  5. Time to debug file(s): 00 hours and 26 minutes and 49 seconds
  6.  
  7. ========================================================================
  8. =================== Dump File: 073017-131078-01.dmp ==================
  9. ========================================================================
  10. Mini Kernel Dump File: Only registers and stack trace are available
  11. Windows 10 Kernel Version 14393 MP (4 procs) Free x64
  12. Product: WinNt, suite: TerminalServer SingleUserTS
  13. Built by: 14393.1480.amd64fre.rs1_release.170706-2004
  14. Kernel base = 0xfffff800`12214000 PsLoadedModuleList = 0xfffff800`12513040
  15. Debug session time: Sun Jul 30 21:19:52.791 2017 (UTC - 4:00)
  16. System Uptime: 0 days 0:04:55.452
  17.  
  18. BugCheck 50, {ffffe10c0000555f, 0, fffff805de7ccae6, 2}
  19. *** WARNING: Unable to verify timestamp for ampse.sys
  20. *** ERROR: Module load completed but symbols could not be loaded for ampse.sys
  21. Could not read faulting driver name
  22. Probably caused by : memory_corruption
  23. Followup: memory_corruption
  24.  
  25. PAGE_FAULT_IN_NONPAGED_AREA (50)
  26. Invalid system memory was referenced. This cannot be protected by try-except.
  27. Typically the address is just plain bad or it is pointing at freed memory.
  28.  
  29. Arguments:
  30. Arg1: ffffe10c0000555f, memory referenced.
  31. Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
  32. Arg3: fffff805de7ccae6, If non-zero, the instruction address which referenced the bad memory
  33. address.
  34. Arg4: 0000000000000002, (reserved)
  35.  
  36. Debugging Details:
  37. Could not read faulting driver name
  38. DUMP_CLASS: 1
  39. DUMP_QUALIFIER: 400
  40. BUILD_VERSION_STRING: 10.0.14393.1480 (rs1_release.170706-2004)
  41. SYSTEM_MANUFACTURER: MSI
  42. SYSTEM_PRODUCT_NAME: MS-7816
  43. SYSTEM_VERSION: 2.0
  44. BIOS_VENDOR: American Megatrends Inc.
  45. BIOS_VERSION: V10.3
  46. BIOS_DATE: 12/03/2013
  47. BASEBOARD_MANUFACTURER: MSI
  48. BASEBOARD_PRODUCT: Z87-G43 GAMING (MS-7816)
  49. BASEBOARD_VERSION: 2.0
  50. DUMP_TYPE: 2
  51. READ_ADDRESS: fffff800125b4338: Unable to get MiVisibleState
  52. ffffe10c0000555f Nonpaged pool
  53. FAULTING_IP:
  54. ampse+13cae6
  55. fffff805`de7ccae6 f6420903 test byte ptr [rdx+9],3
  56. MM_INTERNAL_CODE: 2
  57. CPU_COUNT: 4
  58. CPU_MHZ: c80
  59. CPU_VENDOR: GenuineIntel
  60. CPU_FAMILY: 6
  61. CPU_MODEL: 3c
  62. CPU_STEPPING: 3
  63. CPU_MICROCODE: 6,3c,3,0 (F,M,S,R) SIG: 1E'00000000 (cache) 1E'00000000 (init)
  64. CUSTOMER_CRASH_COUNT: 1
  65. DEFAULT_BUCKET_ID: CODE_CORRUPTION
  66. BUGCHECK_STR: AV
  67.  
  68. PROCESS_NAME: NVDisplay.Container.exe
  69.  
  70. CURRENT_IRQL: 0
  71. TRAP_FRAME: ffffab812d3ef810 -- (.trap 0xffffab812d3ef810)
  72. NOTE: The trap frame does not contain all registers.
  73. Some register values may be zeroed or incorrect.
  74. rax=0000000000000000 rbx=0000000000000000 rcx=fffff805de7cc72d
  75. rdx=ffffe10c00005556 rsi=0000000000000000 rdi=0000000000000000
  76. rip=fffff805de7ccae6 rsp=ffffab812d3ef9a0 rbp=0000000000000000
  77. r8=00000000000008c0 r9=ffffe10c6efff600 r10=0000000000000038
  78. r11=ffffe10c6f9a9828 r12=0000000000000000 r13=0000000000000000
  79. r14=0000000000000000 r15=0000000000000000
  80. iopl=0 nv up ei pl nz ac po nc
  81. ampse+0x13cae6:
  82. fffff805`de7ccae6 f6420903 test byte ptr [rdx+9],3 ds:ffffe10c`0000555f=??
  83. Resetting default scope
  84. LAST_CONTROL_TRANSFER: from fffff8001238de11 to fffff80012363960
  85. STACK_TEXT:
  86. ffffab81`2d3ef518 fffff800`1238de11 : 00000000`00000050 ffffe10c`0000555f 00000000`00000000 ffffab81`2d3ef810 : nt!KeBugCheckEx
  87. ffffab81`2d3ef520 fffff800`122690fd : 00000000`00000000 00000000`00000000 ffffab81`2d3ef810 ffffe10c`0000555f : nt!MiSystemFault+0x100201
  88. ffffab81`2d3ef610 fffff800`1236cffc : 00000000`00000a00 ffffffff`ffffffff 00000000`00000000 fffff805`de7e8d9a : nt!MmAccessFault+0x27d
  89. ffffab81`2d3ef810 fffff805`de7ccae6 : ffffe10c`6f9a9770 ffffe10c`6f3e7800 ffffe10c`6f9a9770 ffffe10c`6ee82bd0 : nt!KiPageFault+0x13c
  90. ffffab81`2d3ef9a0 ffffe10c`6f9a9770 : ffffe10c`6f3e7800 ffffe10c`6f9a9770 ffffe10c`6ee82bd0 ffffe10c`6ed71210 : ampse+0x13cae6
  91. ffffab81`2d3ef9a8 ffffe10c`6f3e7800 : ffffe10c`6f9a9770 ffffe10c`6ee82bd0 ffffe10c`6ed71210 ffffe10c`6df56260 : 0xffffe10c`6f9a9770
  92. ffffab81`2d3ef9b0 ffffe10c`6f9a9770 : ffffe10c`6ee82bd0 ffffe10c`6ed71210 ffffe10c`6df56260 00000000`00000398 : 0xffffe10c`6f3e7800
  93. ffffab81`2d3ef9b8 ffffe10c`6ee82bd0 : ffffe10c`6ed71210 ffffe10c`6df56260 00000000`00000398 fffff805`de7cd115 : 0xffffe10c`6f9a9770
  94. ffffab81`2d3ef9c0 ffffe10c`6ed71210 : ffffe10c`6df56260 00000000`00000398 fffff805`de7cd115 ffffe10c`6f9a9770 : 0xffffe10c`6ee82bd0
  95. ffffab81`2d3ef9c8 ffffe10c`6df56260 : 00000000`00000398 fffff805`de7cd115 ffffe10c`6f9a9770 ffffe10c`6f3e7800 : 0xffffe10c`6ed71210
  96. ffffab81`2d3ef9d0 00000000`00000398 : fffff805`de7cd115 ffffe10c`6f9a9770 ffffe10c`6f3e7800 ffffe10c`6faec480 : 0xffffe10c`6df56260
  97. ffffab81`2d3ef9d8 fffff805`de7cd115 : ffffe10c`6f9a9770 ffffe10c`6f3e7800 ffffe10c`6faec480 00000000`624c6553 : 0x398
  98. ffffab81`2d3ef9e0 ffffe10c`6f9a9770 : ffffe10c`6f3e7800 ffffe10c`6faec480 00000000`624c6553 ffffe10c`6f9a9828 : ampse+0x13d115
  99. ffffab81`2d3ef9e8 ffffe10c`6f3e7800 : ffffe10c`6faec480 00000000`624c6553 ffffe10c`6f9a9828 fffff805`de7cdf58 : 0xffffe10c`6f9a9770
  100. ffffab81`2d3ef9f0 ffffe10c`6faec480 : 00000000`624c6553 ffffe10c`6f9a9828 fffff805`de7cdf58 ffffe10c`6f9a9770 : 0xffffe10c`6f3e7800
  101. ffffab81`2d3ef9f8 00000000`624c6553 : ffffe10c`6f9a9828 fffff805`de7cdf58 ffffe10c`6f9a9770 ffffe10c`6f9a9828 : 0xffffe10c`6faec480
  102. ffffab81`2d3efa00 ffffe10c`6f9a9828 : fffff805`de7cdf58 ffffe10c`6f9a9770 ffffe10c`6f9a9828 00000000`00000000 : 0x624c6553
  103. ffffab81`2d3efa08 fffff805`de7cdf58 : ffffe10c`6f9a9770 ffffe10c`6f9a9828 00000000`00000000 ffffe10c`6ed96020 : 0xffffe10c`6f9a9828
  104. ffffab81`2d3efa10 ffffe10c`6f9a9770 : ffffe10c`6f9a9828 00000000`00000000 ffffe10c`6ed96020 00000000`00000000 : ampse+0x13df58
  105. ffffab81`2d3efa18 ffffe10c`6f9a9828 : 00000000`00000000 ffffe10c`6ed96020 00000000`00000000 fffff805`de7d1332 : 0xffffe10c`6f9a9770
  106. ffffab81`2d3efa20 00000000`00000000 : ffffe10c`6ed96020 00000000`00000000 fffff805`de7d1332 ffffe10c`6f2c1650 : 0xffffe10c`6f9a9828
  107. STACK_COMMAND: kb
  108. CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
  109. fffff8001222520d-fffff8001222520f 3 bytes - nt!ExpAllocateBigPool+71d
  110. [ 40 fb f6:00 52 a4 ]
  111. fffff80012225241-fffff80012225242 2 bytes - nt!ExpAllocateBigPool+751 (+0x34)
  112. [ 80 f6:00 a4 ]
  113. 5 errors : !nt (fffff8001222520d-fffff80012225242)
  114. MODULE_NAME: memory_corruption
  115.  
  116. IMAGE_NAME: memory_corruption
  117.  
  118. FOLLOWUP_NAME: memory_corruption
  119. DEBUG_FLR_IMAGE_TIMESTAMP: 0
  120. MEMORY_CORRUPTOR: LARGE
  121. FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
  122. BUCKET_ID: MEMORY_CORRUPTION_LARGE
  123. PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
  124. TARGET_TIME: 2017-07-31T01:19:52.000Z
  125. OSBUILD: 14393
  126. OSSERVICEPACK: 1480
  127. SERVICEPACK_NUMBER: 0
  128. OS_REVISION: 0
  129. SUITE_MASK: 272
  130. PRODUCT_TYPE: 1
  131. OSPLATFORM_TYPE: x64
  132. OSNAME: Windows 10
  133. OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
  134. USER_LCID: 0
  135. OSBUILD_TIMESTAMP: 2017-07-07 02:26:09
  136. BUILDDATESTAMP_STR: 170706-2004
  137. BUILDLAB_STR: rs1_release
  138. BUILDOSVER_STR: 10.0.14393.1480
  139. ANALYSIS_SESSION_ELAPSED_TIME: 2ada
  140. ANALYSIS_SOURCE: KM
  141. FAILURE_ID_HASH_STRING: km:memory_corruption_large
  142. FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
  143. Followup: memory_corruption
  144.  
  145. =============================== Drivers ================================
  146. Image path: \SystemRoot\system32\drivers\aswVmm.sys
  147. Image name: aswVmm.sys
  148. Possible Info Link: http://www.carrona.org/drivers/driver.php?id=aswVmm.sys
  149. Timestamp: Thu Jun 29 2017
  150.  
  151. Image path: \SystemRoot\system32\drivers\aswRvrt.sys
  152. Image name: aswRvrt.sys
  153. Possible Info Link: http://www.carrona.org/drivers/driver.php?id=aswRvrt.sys
  154. Timestamp: Mon Jun 19 2017
  155.  
  156. Image path: \SystemRoot\system32\drivers\aswbuniva.sys
  157. Image name: aswbuniva.sys
  158. Possible Info Link: http://www.carrona.org/drivers/driver.php?id=aswbuniva.sys
  159. Timestamp: Tue Jul 11 2017
  160.  
  161. Image path: \SystemRoot\system32\drivers\aswbloga.sys
  162. Image name: aswbloga.sys
  163. Possible Info Link: http://www.carrona.org/drivers/driver.php?id=aswbloga.sys
  164. Timestamp: Tue Jul 11 2017
  165.  
  166. Image path: \SystemRoot\system32\drivers\aswbidsha.sys
  167. Image name: aswbidsha.sys
  168. Possible Info Link: http://www.carrona.org/drivers/driver.php?id=aswbidsha.sys
  169. Timestamp: Tue Jul 11 2017
  170.  
  171. Image path: \SystemRoot\system32\DRIVERS\bwcW10x64.sys
  172. Image name: bwcW10x64.sys
  173. Possible Info Link: http://www.carrona.org/drivers/driver.php?id=bwcW10x64.sys
  174. Timestamp: Fri Jan 22 2016
  175.  
  176. Image path: \SystemRoot\System32\drivers\iaStorA.sys
  177. Image name: iaStorA.sys
  178. Possible Info Link: http://www.carrona.org/drivers/driver.php?id=iaStorA.sys
  179. Timestamp: Wed Jun 3 2015
  180.  
  181. Image path: \SystemRoot\System32\Drivers\PxHlpa64.sys
  182. Image name: PxHlpa64.sys
  183. Possible Info Link: http://www.carrona.org/drivers/driver.php?id=PxHlpa64.sys
  184. Timestamp: Mon Oct 17 2011
  185.  
  186. Image path: \SystemRoot\system32\drivers\peauth.sys
  187. Image name: peauth.sys
  188. Possible Info Link: http://www.carrona.org/drivers/driver.php?id=peauth.sys
  189. Timestamp: Fri Jul 15 2016
  190.  
  191. Image path: \SystemRoot\system32\drivers\aswSP.sys
  192. Image name: aswSP.sys
  193. Possible Info Link: http://www.carrona.org/drivers/driver.php?id=aswSP.sys
  194. Timestamp: Thu Jun 22 2017
  195.  
  196. Image path: \SystemRoot\system32\drivers\aswSnx.sys
  197. Image name: aswSnx.sys
  198. Possible Info Link: http://www.carrona.org/drivers/driver.php?id=aswSnx.sys
  199. Timestamp: Mon Jun 19 2017
  200.  
  201. Image path: \SystemRoot\system32\DRIVERS\SeLow_x64.sys
  202. Image name: SeLow_x64.sys
  203. Possible Info Link: http://www.carrona.org/drivers/driver.php?id=SeLow_x64.sys
  204. Timestamp: Sun Oct 18 2015
  205.  
  206. Image path: \SystemRoot\system32\drivers\aswRdr2.sys
  207. Image name: aswRdr2.sys
  208. Possible Info Link: http://www.carrona.org/drivers/driver.php?id=aswRdr2.sys
  209. Timestamp: Mon Jun 19 2017
  210.  
  211. Image path: \SystemRoot\system32\DRIVERS\VBoxNetAdp6.sys
  212. Image name: VBoxNetAdp6.sys
  213. Possible Info Link: http://www.carrona.org/drivers/driver.php?id=VBoxNetAdp6.sys
  214. Timestamp: Mon Jan 16 2017
  215.  
  216. Image path: \SystemRoot\system32\DRIVERS\VBoxNetLwf.sys
  217. Image name: VBoxNetLwf.sys
  218. Possible Info Link: http://www.carrona.org/drivers/driver.php?id=VBoxNetLwf.sys
  219. Timestamp: Mon Jan 16 2017
  220.  
  221. Image path: \SystemRoot\system32\DRIVERS\gwdrv.sys
  222. Image name: gwdrv.sys
  223. Possible Info Link: http://www.carrona.org/drivers/driver.php?id=gwdrv.sys
  224. Timestamp: Fri May 29 2015
  225.  
  226. Image path: \SystemRoot\system32\drivers\aswStm.sys
  227. Image name: aswStm.sys
  228. Possible Info Link: http://www.carrona.org/drivers/driver.php?id=aswStm.sys
  229. Timestamp: Mon Jun 19 2017
  230.  
  231. Image path: \??\C:\Windows\system32\Drivers\ampse.sys
  232. Image name: ampse.sys
  233. Possible Info Link: http://www.carrona.org/drivers/driver.php?id=ampse.sys
  234. Timestamp: Tue Mar 25 2014
  235.  
  236. Image path: \SystemRoot\system32\DRIVERS\VBoxUSBMon.sys
  237. Image name: VBoxUSBMon.sys
  238. Possible Info Link: http://www.carrona.org/drivers/driver.php?id=VBoxUSBMon.sys
  239. Timestamp: Mon Jan 16 2017
  240.  
  241. Image path: \??\C:\WINDOWS\system32\drivers\rzpnk.sys
  242. Image name: rzpnk.sys
  243. Possible Info Link: http://www.carrona.org/drivers/driver.php?id=rzpnk.sys
  244. Timestamp: Wed Sep 16 2015
  245.  
  246. Image path: \SystemRoot\system32\drivers\aswbidsdrivera.sys
  247. Image name: aswbidsdrivera.sys
  248. Possible Info Link: http://www.carrona.org/drivers/driver.php?id=aswbidsdrivera.sys
  249. Timestamp: Tue Jul 11 2017
  250.  
  251. Image path: \SystemRoot\System32\drivers\Neo6_x64_VPN.sys
  252. Image name: Neo6_x64_VPN.sys
  253. Possible Info Link: http://www.carrona.org/drivers/driver.php?id=Neo6_x64_VPN.sys
  254. Timestamp: Sun Oct 18 2015
  255.  
  256. Image path: \SystemRoot\System32\Drivers\dump_iaStorA.sys
  257. Image name: dump_iaStorA.sys
  258. Possible Info Link: http://www.carrona.org/drivers/driver.php?id=dump_iaStorA.sys
  259. Timestamp: Wed Jun 3 2015
  260.  
  261. Image path: \??\C:\Windows\system32\Drivers\amp.sys
  262. Image name: amp.sys
  263. Possible Info Link: http://www.carrona.org/drivers/driver.php?id=amp.sys
  264. Timestamp: Tue Mar 25 2014
  265.  
  266. Image path: \SystemRoot\system32\DRIVERS\VBoxDrv.sys
  267. Image name: VBoxDrv.sys
  268. Possible Info Link: http://www.carrona.org/drivers/driver.php?id=VBoxDrv.sys
  269. Timestamp: Mon Jan 16 2017
  270.  
  271. Image path: \??\C:\WINDOWS\system32\drivers\rawdsk3.sys
  272. Image name: rawdsk3.sys
  273. Possible Info Link: http://www.carrona.org/drivers/driver.php?id=rawdsk3.sys
  274. Timestamp: Tue Feb 11 2014
  275.  
  276. Image path: \SystemRoot\System32\drivers\drmk.sys
  277. Image name: drmk.sys
  278. Possible Info Link: http://www.carrona.org/drivers/driver.php?id=drmk.sys
  279. Timestamp: Fri Jul 15 2016
  280.  
  281. Image path: \SystemRoot\System32\drivers\TeeDriverW8x64.sys
  282. Image name: TeeDriverW8x64.sys
  283. Possible Info Link: http://www.carrona.org/drivers/driver.php?id=TeeDriverW8x64.sys
  284. Timestamp: Tue Jul 7 2015
  285.  
  286. Image path: \SystemRoot\System32\drivers\e22w10x64.sys
  287. Image name: e22w10x64.sys
  288. Possible Info Link: http://www.carrona.org/drivers/driver.php?id=e22w10x64.sys
  289. Timestamp: Fri Aug 28 2015
  290.  
  291. Image path: \SystemRoot\System32\drivers\AE3000w764.sys
  292. Image name: AE3000w764.sys
  293. Possible Info Link: http://www.carrona.org/drivers/driver.php?id=AE3000w764.sys
  294. Timestamp: Fri Mar 2 2012
  295.  
  296. Image path: \SystemRoot\system32\DRIVERS\igdkmd64.sys
  297. Image name: igdkmd64.sys
  298. Possible Info Link: http://www.carrona.org/drivers/driver.php?id=igdkmd64.sys
  299. Timestamp: Wed Mar 8 2017
  300.  
  301. Image path: \SystemRoot\system32\DRIVERS\USBPcap.sys
  302. Image name: USBPcap.sys
  303. Possible Info Link: http://www.carrona.org/drivers/driver.php?id=USBPcap.sys
  304. Timestamp: Fri Oct 2 2015
  305.  
  306. Image path: \SystemRoot\system32\drivers\aswMonFlt.sys
  307. Image name: aswMonFlt.sys
  308. Possible Info Link: http://www.carrona.org/drivers/driver.php?id=aswMonFlt.sys
  309. Timestamp: Mon Jul 17 2017
  310.  
  311. Image path: \SystemRoot\system32\drivers\npf.sys
  312. Image name: npf.sys
  313. Possible Info Link: http://www.carrona.org/drivers/driver.php?id=npf.sys
  314. Timestamp: Thu Feb 28 2013
  315.  
  316. Image path: \SystemRoot\system32\drivers\RTKVHD64.sys
  317. Image name: RTKVHD64.sys
  318. Possible Info Link: http://www.carrona.org/drivers/driver.php?id=RTKVHD64.sys
  319. Timestamp: Tue Dec 6 2016
  320.  
  321. Image path: \SystemRoot\system32\drivers\MBfilt64.sys
  322. Image name: MBfilt64.sys
  323. Possible Info Link: http://www.carrona.org/drivers/driver.php?id=MBfilt64.sys
  324. Timestamp: Thu Jul 30 2009
  325.  
  326. Image path: \SystemRoot\system32\drivers\nvhda64v.sys
  327. Image name: nvhda64v.sys
  328. Possible Info Link: http://www.carrona.org/drivers/driver.php?id=nvhda64v.sys
  329. Timestamp: Tue May 16 2017
  330.  
  331. Image path: \SystemRoot\System32\drivers\rzendpt.sys
  332. Image name: rzendpt.sys
  333. Possible Info Link: http://www.carrona.org/drivers/driver.php?id=rzendpt.sys
  334. Timestamp: Tue Aug 11 2015
  335.  
  336. Image path: \SystemRoot\System32\drivers\rzudd.sys
  337. Image name: rzudd.sys
  338. Possible Info Link: http://www.carrona.org/drivers/driver.php?id=rzudd.sys
  339. Timestamp: Tue Aug 11 2015
  340.  
  341. Image path: \SystemRoot\System32\drivers\rzmpos.sys
  342. Image name: rzmpos.sys
  343. Possible Info Link: http://www.carrona.org/drivers/driver.php?id=rzmpos.sys
  344. Timestamp: Tue Aug 11 2015
  345.  
  346. Image path: \??\C:\WINDOWS\system32\drivers\rzpmgrk.sys
  347. Image name: rzpmgrk.sys
  348. Possible Info Link: http://www.carrona.org/drivers/driver.php?id=rzpmgrk.sys
  349. Timestamp: Thu Sep 17 2015
  350.  
  351. Image path: \SystemRoot\System32\DriverStore\FileRepository\nv_dispi.inf_amd64_2386fda73b467ac8\nvlddmkm.sys
  352. Image name: nvlddmkm.sys
  353. Possible Info Link: http://www.carrona.org/drivers/driver.php?id=nvlddmkm.sys
  354. Timestamp: Tue Jun 27 2017
  355.  
  356. Image path: \SystemRoot\System32\drivers\ICCWDT.sys
  357. Image name: ICCWDT.sys
  358. Possible Info Link: http://www.carrona.org/drivers/driver.php?id=ICCWDT.sys
  359. Timestamp: Wed Jan 23 2013
  360.  
  361. Image path: \SystemRoot\System32\drivers\XtuAcpiDriver.sys
  362. Image name: XtuAcpiDriver.sys
  363. Possible Info Link: http://www.carrona.org/drivers/driver.php?id=XtuAcpiDriver.sys
  364. Timestamp: Thu Feb 26 2015
  365.  
  366. Image path: \SystemRoot\System32\drivers\ISCTD64.sys
  367. Image name: ISCTD64.sys
  368. Possible Info Link: http://www.carrona.org/drivers/driver.php?id=ISCTD64.sys
  369. Timestamp: Tue Nov 27 2012
  370.  
  371. Image path: \SystemRoot\system32\drivers\nvvad64v.sys
  372. Image name: nvvad64v.sys
  373. Possible Info Link: http://www.carrona.org/drivers/driver.php?id=nvvad64v.sys
  374. Timestamp: Sun May 28 2017
  375.  
  376. Image path: \SystemRoot\System32\drivers\nvvhci.sys
  377. Image name: nvvhci.sys
  378. Possible Info Link: http://www.carrona.org/drivers/driver.php?id=nvvhci.sys
  379. Timestamp: Tue Dec 27 2016
  380.  
  381. Image path: \SystemRoot\System32\ATMFD.DLL
  382. Image name: ATMFD.DLL
  383. Possible Info Link: http://www.carrona.org/drivers/driver.php?id=ATMFD.DLL
  384. Timestamp: Sat Jun 3 2017
  385.  
  386. Image path: \SystemRoot\System32\cdd.dll
  387. Image name: cdd.dll
  388. Possible Info Link: http://www.carrona.org/drivers/driver.php?id=cdd.dll
  389. Timestamp: unavailable (00000000)
  390.  
  391. Unloaded modules:
  392. fffff805`e1ea0000 fffff805`e1f17000 IntcDAud.sys
  393. fffff805`dc110000 fffff805`dc11f000 dump_storpor
  394. fffff805`de360000 fffff805`de8d2000 dump_iaStorA
  395. fffff805`de900000 fffff805`de91d000 dump_dumpfve
  396. fffff805`e3690000 fffff805`e369e000 USBD.SYS
  397. fffff805`e3680000 fffff805`e368e000 USBPcap.sys
  398. fffff805`dfe50000 fffff805`dfe5e000 USBD.SYS
  399. fffff805`dfe40000 fffff805`dfe4e000 USBPcap.sys
  400. fffff805`dfd60000 fffff805`dfd6e000 USBD.SYS
  401. fffff805`dfd50000 fffff805`dfd5e000 USBPcap.sys
  402. fffff805`dea30000 fffff805`dea44000 dam.sys
  403. fffff805`dbf90000 fffff805`dbf9f000 hwpolicy.sys
  404.  
  405. ============================= BIOS INFO ================================
  406. [SMBIOS Data Tables v2.8]
  407. [DMI Version - 0]
  408. [2.0 Calling Convention - No]
  409. [Table Size - 3081 bytes]
  410. [BIOS Information (Type 0) - Length 24 - Handle 0000h]
  411. Vendor American Megatrends Inc.
  412. BIOS Version V10.3
  413. BIOS Starting Address Segment f000
  414. BIOS Release Date 12/03/2013
  415. BIOS ROM Size 800000
  416. BIOS Characteristics
  417. 07: - PCI Supported
  418. 11: - Upgradeable FLASH BIOS
  419. 12: - BIOS Shadowing Supported
  420. 15: - CD-Boot Supported
  421. 16: - Selectable Boot Supported
  422. 17: - BIOS ROM Socketed
  423. 19: - EDD Supported
  424. 23: - 1.2MB Floppy Supported
  425. 24: - 720KB Floppy Supported
  426. 25: - 2.88MB Floppy Supported
  427. 26: - Print Screen Device Supported
  428. 27: - Keyboard Services Supported
  429. 28: - Serial Services Supported
  430. 29: - Printer Services Supported
  431. 32: - BIOS Vendor Reserved
  432. BIOS Characteristic Extensions
  433. 00: - ACPI Supported
  434. 01: - USB Legacy Supported
  435. 08: - BIOS Boot Specification Supported
  436. 10: - Specification Reserved
  437. 11: - Specification Reserved
  438. BIOS Major Revision 4
  439. BIOS Minor Revision 6
  440. EC Firmware Major Revision 255
  441. EC Firmware Minor Revision 255
  442. [System Information (Type 1) - Length 27 - Handle 0001h]
  443. Manufacturer MSI
  444. Product Name MS-7816
  445. Version 2.0
  446. UUID 00000000-0000-0000-0000-000000000000
  447. Wakeup Type Power Switch
  448. [BaseBoard Information (Type 2) - Length 15 - Handle 0002h]
  449. Manufacturer MSI
  450. Product Z87-G43 GAMING (MS-7816)
  451. Version 2.0
  452. Feature Flags 09h
  453. 1590698504: - ?ÿU?ì?ì¡H.ã^3Å?Eü3ÀW?}?Eô?Eø?ÿu
  454. ¸@
  455. 1590698544: - ?ÿU?ì?ì¡H.ã^3Å?Eü3ÀW?}?Eô?Eø?ÿu
  456. ¸@
  457. Chassis Handle 0003h
  458. Board Type 0ah - Processor/Memory Module
  459. Number of Child Handles 0
  460. [System Enclosure (Type 3) - Length 25 - Handle 0003h]
  461. Manufacturer MSI
  462. Chassis Type Desktop
  463. Version 2.0
  464. Bootup State Safe
  465. Power Supply State Safe
  466. Thermal State Safe
  467. Security Status None
  468. OEM Defined 0
  469. Height 0U
  470. Number of Power Cords 1
  471. Number of Contained Elements 1
  472. Contained Element Size 3
  473. [OEM Strings (Type 11) - Length 5 - Handle 0021h]
  474. Number of Strings 1
  475. [System Configuration Options (Type 12) - Length 5 - Handle 0022h]
  476. [Processor Information (Type 4) - Length 42 - Handle 003dh]
  477. Socket Designation SOCKET 0
  478. Processor Type Central Processor
  479. Processor Family cdh - Specification Reserved
  480. Processor Manufacturer Intel
  481. Processor ID c3060300fffbebbf
  482. Processor Version Intel(R) Core(TM) i5-4570 CPU @ 3.20GHz
  483. Processor Voltage 8ch - 1.2V
  484. External Clock 100MHz
  485. Max Speed 3800MHz
  486. Current Speed 3200MHz
  487. Status Enabled Populated
  488. Processor Upgrade Specification Reserved
  489. L1 Cache Handle 003fh
  490. L2 Cache Handle 003eh
  491. L3 Cache Handle 0040h
  492. [Cache Information (Type 7) - Length 19 - Handle 003eh]
  493. Socket Designation CPU Internal L2
  494. Cache Configuration 0181h - WB Enabled Int NonSocketed L2
  495. Maximum Cache Size 0400h - 1024K
  496. Installed Size 0400h - 1024K
  497. Supported SRAM Type 0002h - Unknown
  498. Current SRAM Type 0002h - Unknown
  499. Cache Speed 0ns
  500. Error Correction Type Multi-Bit ECC
  501. System Cache Type Unified
  502. Associativity 8-way Set-Associative
  503. [Cache Information (Type 7) - Length 19 - Handle 003fh]
  504. Socket Designation CPU Internal L1
  505. Cache Configuration 0180h - WB Enabled Int NonSocketed L1
  506. Maximum Cache Size 0100h - 256K
  507. Installed Size 0100h - 256K
  508. Supported SRAM Type 0002h - Unknown
  509. Current SRAM Type 0002h - Unknown
  510. Cache Speed 0ns
  511. Error Correction Type Multi-Bit ECC
  512. System Cache Type Other
  513. Associativity 8-way Set-Associative
  514. [Cache Information (Type 7) - Length 19 - Handle 0040h]
  515. Socket Designation CPU Internal L3
  516. Cache Configuration 0182h - WB Enabled Int NonSocketed L3
  517. Maximum Cache Size 1800h - 6144K
  518. Installed Size 1800h - 6144K
  519. Supported SRAM Type 0002h - Unknown
  520. Current SRAM Type 0002h - Unknown
  521. Cache Speed 0ns
  522. Error Correction Type Multi-Bit ECC
  523. System Cache Type Unified
  524. Associativity Specification Reserved
  525. [Physical Memory Array (Type 16) - Length 23 - Handle 0041h]
  526. Location 03h - SystemBoard/Motherboard
  527. Use 03h - System Memory
  528. Memory Error Correction 03h - None
  529. Maximum Capacity 33554432KB
  530. Number of Memory Devices 4
  531. [Memory Device (Type 17) - Length 40 - Handle 0042h]
  532. Physical Memory Array Handle 0041h
  533. Total Width 64 bits
  534. Data Width 64 bits
  535. Size 4096MB
  536. Form Factor 09h - DIMM
  537. Device Locator ChannelA-DIMM0
  538. Bank Locator BANK 0
  539. Memory Type 18h - Specification Reserved
  540. Type Detail 0080h - Synchronous
  541. Speed 2400MHz
  542. Manufacturer 0420
  543. Part Number F3-2400C10-4GTX
  544. [Memory Device Mapped Address (Type 20) - Length 35 - Handle 0043h]
  545. Starting Address 00000000h
  546. Ending Address 003fffffh
  547. Memory Device Handle 0042h
  548. Mem Array Mapped Adr Handle 004ah
  549. [Memory Device (Type 17) - Length 40 - Handle 0044h]
  550. Physical Memory Array Handle 0041h
  551. Total Width 64 bits
  552. Data Width 64 bits
  553. Size 4096MB
  554. Form Factor 09h - DIMM
  555. Device Locator ChannelA-DIMM1
  556. Bank Locator BANK 1
  557. Memory Type 18h - Specification Reserved
  558. Type Detail 0080h - Synchronous
  559. Speed 2400MHz
  560. Manufacturer 0420
  561. Part Number F3-2400C10-4GTX
  562. [Memory Device Mapped Address (Type 20) - Length 35 - Handle 0045h]
  563. Starting Address 00800000h
  564. Ending Address 00bfffffh
  565. Memory Device Handle 0044h
  566. Mem Array Mapped Adr Handle 004ah
  567. [Memory Device (Type 17) - Length 40 - Handle 0046h]
  568. Physical Memory Array Handle 0041h
  569. Total Width 64 bits
  570. Data Width 64 bits
  571. Size 4096MB
  572. Form Factor 09h - DIMM
  573. Device Locator ChannelB-DIMM0
  574. Bank Locator BANK 2
  575. Memory Type 18h - Specification Reserved
  576. Type Detail 0080h - Synchronous
  577. Speed 2400MHz
  578. Manufacturer 0420
  579. Part Number F3-2400C10-4GTX
  580. [Memory Device Mapped Address (Type 20) - Length 35 - Handle 0047h]
  581. Starting Address 00400000h
  582. Ending Address 007fffffh
  583. Memory Device Handle 0046h
  584. Mem Array Mapped Adr Handle 004ah
  585. [Memory Device (Type 17) - Length 40 - Handle 0048h]
  586. Physical Memory Array Handle 0041h
  587. Total Width 64 bits
  588. Data Width 64 bits
  589. Size 4096MB
  590. Form Factor 09h - DIMM
  591. Device Locator ChannelB-DIMM1
  592. Bank Locator BANK 3
  593. Memory Type 18h - Specification Reserved
  594. Type Detail 0080h - Synchronous
  595. Speed 2400MHz
  596. Manufacturer 0420
  597. Part Number F3-2400C10-4GTX
  598. [Memory Device Mapped Address (Type 20) - Length 35 - Handle 0049h]
  599. Starting Address 00c00000h
  600. Ending Address 00ffffffh
  601. Memory Device Handle 0048h
  602. Mem Array Mapped Adr Handle 004ah
  603. [Memory Array Mapped Address (Type 19) - Length 31 - Handle 004ah]
  604. Starting Address 00000000h
  605. Ending Address 00ffffffh
  606. Memory Array Handle 0041h
  607. Partition Width 04
  608.  
  609. ========================================================================
  610. =================== Dump File: 073117-33203-01.dmp ===================
  611. ========================================================================
  612. Mini Kernel Dump File: Only registers and stack trace are available
  613. Windows 10 Kernel Version 14393 MP (4 procs) Free x64
  614. Product: WinNt, suite: TerminalServer SingleUserTS
  615. Built by: 14393.1480.amd64fre.rs1_release.170706-2004
  616. Kernel base = 0xfffff803`f2e17000 PsLoadedModuleList = 0xfffff803`f3116040
  617. Debug session time: Mon Jul 31 02:12:19.527 2017 (UTC - 4:00)
  618. System Uptime: 0 days 4:51:49.187
  619.  
  620. BugCheck 133, {1, 1e00, fffff803f31b7540, 0}
  621. Probably caused by : ntkrnlmp.exe ( nt!KeAccumulateTicks+42a )
  622. Followup: MachineOwner
  623.  
  624. DPC_WATCHDOG_VIOLATION (133)
  625. The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
  626. or above.
  627.  
  628. Arguments:
  629. Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
  630. DISPATCH_LEVEL or above. The offending component can usually be
  631. identified with a stack trace.
  632. Arg2: 0000000000001e00, The watchdog period.
  633. Arg3: fffff803f31b7540
  634. Arg4: 0000000000000000
  635.  
  636. Debugging Details:
  637. DUMP_CLASS: 1
  638. DUMP_QUALIFIER: 400
  639. BUILD_VERSION_STRING: 10.0.14393.1480 (rs1_release.170706-2004)
  640. SYSTEM_MANUFACTURER: MSI
  641. SYSTEM_PRODUCT_NAME: MS-7816
  642. SYSTEM_VERSION: 2.0
  643. BIOS_VENDOR: American Megatrends Inc.
  644. BIOS_VERSION: V10.3
  645. BIOS_DATE: 12/03/2013
  646. BASEBOARD_MANUFACTURER: MSI
  647. BASEBOARD_PRODUCT: Z87-G43 GAMING (MS-7816)
  648. BASEBOARD_VERSION: 2.0
  649. DUMP_TYPE: 2
  650. DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED
  651. CPU_COUNT: 4
  652. CPU_MHZ: c80
  653. CPU_VENDOR: GenuineIntel
  654. CPU_FAMILY: 6
  655. CPU_MODEL: 3c
  656. CPU_STEPPING: 3
  657. CPU_MICROCODE: 6,3c,3,0 (F,M,S,R) SIG: 1E'00000000 (cache) 1E'00000000 (init)
  658. CUSTOMER_CRASH_COUNT: 1
  659. DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
  660. BUGCHECK_STR: 0x133
  661.  
  662. PROCESS_NAME: System
  663.  
  664. CURRENT_IRQL: d
  665. LAST_CONTROL_TRANSFER: from fffff803f2e39fda to fffff803f2f66960
  666. STACK_TEXT:
  667. fffff803`f54d0d88 fffff803`f2e39fda : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff803`f31b7540 : nt!KeBugCheckEx
  668. fffff803`f54d0d90 fffff803`f2e37fc9 : 00003306`944be802 00000000`00000000 00000000`00000001 fffff780`00000320 : nt!KeAccumulateTicks+0x42a
  669. fffff803`f54d0df0 fffff803`f3631366 : fffff803`f54c2730 fffff803`f367c3e0 00000000`00000002 00003306`944bd87c : nt!KeClockInterruptNotify+0x469
  670. fffff803`f54d0f40 fffff803`f2e2ac26 : fffff803`f367c3e0 00000000`00000008 fffff803`f54d0f50 00000000`0000000c : hal!HalpTimerClockInterrupt+0x56
  671. fffff803`f54d0f70 fffff803`f2f67fda : fffff803`f54c27b0 ffff9785`2ef68d00 00000000`00000000 00000000`000000ff : nt!KiCallInterruptServiceRoutine+0x106
  672. fffff803`f54d0fb0 fffff803`f2f68427 : 00000099`00000006 00000010`00000000 f9dae8e4`4d8b0000 00000000`00000000 : nt!KiInterruptSubDispatchNoLockNoEtw+0xea
  673. fffff803`f54c2730 fffff803`f2e4c7a8 : ffffffff`ffffffd1 fffff803`f2e4c8a8 00000000`00000010 00000000`00200286 : nt!KiInterruptDispatchNoLockNoEtw+0x37
  674. fffff803`f54c28c0 fffff803`f2f8593f : ffff9785`2ef68dc8 ffff9785`00000000 fffff803`f3153180 ffff9785`2011c330 : nt!KiTryUnwaitThread+0x28
  675. fffff803`f54c2920 fffff803`f2e4d1f8 : ffff9785`2ef68dc0 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiTimerWaitTest+0x1382af
  676. fffff803`f54c29e0 fffff803`f2f699ea : 00000000`00000000 fffff803`f3153180 fffff803`f31cd940 ffff9785`2f306800 : nt!KiRetireDpcList+0x598
  677. fffff803`f54c2c60 00000000`00000000 : fffff803`f54c3000 fffff803`f54bd000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x5a
  678. STACK_COMMAND: kb
  679. THREAD_SHA1_HASH_MOD_FUNC: a2b6bb59892dc982b985b25492487f0c92f2e474
  680. THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 1b5346a9c99274f22ed47f79b7312a2cc619b488
  681. THREAD_SHA1_HASH_MOD: 6e280a424abc2a3a466bcc77abddeb8fc895a32b
  682. FOLLOWUP_IP:
  683. nt!KeAccumulateTicks+42a
  684. fffff803`f2e39fda cc int 3
  685. FAULT_INSTR_CODE: cccccccc
  686. SYMBOL_STACK_INDEX: 1
  687. SYMBOL_NAME: nt!KeAccumulateTicks+42a
  688. FOLLOWUP_NAME: MachineOwner
  689. MODULE_NAME: nt
  690.  
  691. IMAGE_NAME: ntkrnlmp.exe
  692.  
  693. DEBUG_FLR_IMAGE_TIMESTAMP: 595f2981
  694. IMAGE_VERSION: 10.0.14393.1480
  695. BUCKET_ID_FUNC_OFFSET: 42a
  696. FAILURE_BUCKET_ID: 0x133_ISR_nt!KeAccumulateTicks
  697. BUCKET_ID: 0x133_ISR_nt!KeAccumulateTicks
  698. PRIMARY_PROBLEM_CLASS: 0x133_ISR_nt!KeAccumulateTicks
  699. TARGET_TIME: 2017-07-31T06:12:19.000Z
  700. OSBUILD: 14393
  701. OSSERVICEPACK: 1480
  702. SERVICEPACK_NUMBER: 0
  703. OS_REVISION: 0
  704. SUITE_MASK: 272
  705. PRODUCT_TYPE: 1
  706. OSPLATFORM_TYPE: x64
  707. OSNAME: Windows 10
  708. OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
  709. USER_LCID: 0
  710. OSBUILD_TIMESTAMP: 2017-07-07 02:26:09
  711. BUILDDATESTAMP_STR: 170706-2004
  712. BUILDLAB_STR: rs1_release
  713. BUILDOSVER_STR: 10.0.14393.1480
  714. ANALYSIS_SESSION_ELAPSED_TIME: 1cba
  715. ANALYSIS_SOURCE: KM
  716. FAILURE_ID_HASH_STRING: km:0x133_isr_nt!keaccumulateticks
  717. FAILURE_ID_HASH: {65350307-c3b9-f4b5-8829-4d27e9ff9b06}
  718. Followup: MachineOwner
  719.  
  720. ========================================================================
  721. =================== Dump File: 073117-34359-01.dmp ===================
  722. ========================================================================
  723. Mini Kernel Dump File: Only registers and stack trace are available
  724. Windows 10 Kernel Version 14393 MP (4 procs) Free x64
  725. Product: WinNt, suite: TerminalServer SingleUserTS
  726. Built by: 14393.1480.amd64fre.rs1_release.170706-2004
  727. Kernel base = 0xfffff802`82881000 PsLoadedModuleList = 0xfffff802`82b80040
  728. Debug session time: Mon Jul 31 10:04:24.618 2017 (UTC - 4:00)
  729. System Uptime: 0 days 0:07:56.279
  730.  
  731. BugCheck 19, {3, ffffbd0d2c2388c0, ffffbd4d2c2388c0, ffffbd0d2c2388c0}
  732. *** WARNING: Unable to verify timestamp for ampse.sys
  733. *** ERROR: Module load completed but symbols could not be loaded for ampse.sys
  734. Probably caused by : ampse.sys ( ampse+158cf3 )
  735. Followup: MachineOwner
  736.  
  737. BAD_POOL_HEADER (19)
  738. The pool is already corrupt at the time of the current request.
  739. This may or may not be due to the caller.
  740. The internal pool links must be walked to figure out a possible cause of
  741. the problem, and then special pool applied to the suspect tags or the driver
  742. verifier to a suspect driver.
  743.  
  744. Arguments:
  745. Arg1: 0000000000000003, the pool freelist is corrupt.
  746. Arg2: ffffbd0d2c2388c0, the pool entry being checked.
  747. Arg3: ffffbd4d2c2388c0, the read back flink freelist value (should be the same as 2).
  748. Arg4: ffffbd0d2c2388c0, the read back blink freelist value (should be the same as 2).
  749.  
  750. Debugging Details:
  751. DUMP_CLASS: 1
  752. DUMP_QUALIFIER: 400
  753. BUILD_VERSION_STRING: 10.0.14393.1480 (rs1_release.170706-2004)
  754. SYSTEM_MANUFACTURER: MSI
  755. SYSTEM_PRODUCT_NAME: MS-7816
  756. SYSTEM_VERSION: 2.0
  757. BIOS_VENDOR: American Megatrends Inc.
  758. BIOS_VERSION: V10.3
  759. BIOS_DATE: 12/03/2013
  760. BASEBOARD_MANUFACTURER: MSI
  761. BASEBOARD_PRODUCT: Z87-G43 GAMING (MS-7816)
  762. BASEBOARD_VERSION: 2.0
  763. DUMP_TYPE: 2
  764. BUGCHECK_STR: 0x19_3
  765. CPU_COUNT: 4
  766. CPU_MHZ: c80
  767. CPU_VENDOR: GenuineIntel
  768. CPU_FAMILY: 6
  769. CPU_MODEL: 3c
  770. CPU_STEPPING: 3
  771. CPU_MICROCODE: 6,3c,3,0 (F,M,S,R) SIG: 1E'00000000 (cache) 1E'00000000 (init)
  772. CUSTOMER_CRASH_COUNT: 1
  773. DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
  774.  
  775. PROCESS_NAME: svchost.exe
  776.  
  777. CURRENT_IRQL: 1
  778. LAST_CONTROL_TRANSFER: from fffff80282acb6e4 to fffff802829d0960
  779. STACK_TEXT:
  780. ffffa100`fe967a18 fffff802`82acb6e4 : 00000000`00000019 00000000`00000003 ffffbd0d`2c2388c0 ffffbd4d`2c2388c0 : nt!KeBugCheckEx
  781. ffffa100`fe967a20 fffff80c`e1e68cf3 : 00000000`00000001 00000000`00001000 00000000`00000278 ffffcf84`d0516c00 : nt!ExAllocatePoolWithTag+0x1ca4
  782. ffffa100`fe967b10 00000000`00000001 : 00000000`00001000 00000000`00000278 ffffcf84`d0516c00 00000000`00000288 : ampse+0x158cf3
  783. ffffa100`fe967b18 00000000`00001000 : 00000000`00000278 ffffcf84`d0516c00 00000000`00000288 00000000`00000000 : 0x1
  784. ffffa100`fe967b20 00000000`00000278 : ffffcf84`d0516c00 00000000`00000288 00000000`00000000 00000000`00000000 : 0x1000
  785. ffffa100`fe967b28 ffffcf84`d0516c00 : 00000000`00000288 00000000`00000000 00000000`00000000 fffff80c`e1e53fae : 0x278
  786. ffffa100`fe967b30 00000000`00000288 : 00000000`00000000 00000000`00000000 fffff80c`e1e53fae ffffbd0d`2c4da0d8 : 0xffffcf84`d0516c00
  787. ffffa100`fe967b38 00000000`00000000 : 00000000`00000000 fffff80c`e1e53fae ffffbd0d`2c4da0d8 fffff80c`e1e68e64 : 0x288
  788. STACK_COMMAND: kb
  789. THREAD_SHA1_HASH_MOD_FUNC: 5eab5dd0ef4f87a17d4b86926b478573779e1e26
  790. THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 7461e2b3f410d874a5f9c1bad1bdff5df9232781
  791. THREAD_SHA1_HASH_MOD: 484f48adc31e9789dffb83bcd2a4d426a8019d4e
  792. FOLLOWUP_IP:
  793. ampse+158cf3
  794. fffff80c`e1e68cf3 4889442430 mov qword ptr [rsp+30h],rax
  795. FAULT_INSTR_CODE: 24448948
  796. SYMBOL_STACK_INDEX: 2
  797. SYMBOL_NAME: ampse+158cf3
  798. FOLLOWUP_NAME: MachineOwner
  799. MODULE_NAME: ampse
  800.  
  801. IMAGE_NAME: ampse.sys
  802.  
  803. DEBUG_FLR_IMAGE_TIMESTAMP: 5331e020
  804. BUCKET_ID_FUNC_OFFSET: 158cf3
  805. FAILURE_BUCKET_ID: 0x19_3_ampse!unknown_function
  806. BUCKET_ID: 0x19_3_ampse!unknown_function
  807. PRIMARY_PROBLEM_CLASS: 0x19_3_ampse!unknown_function
  808. TARGET_TIME: 2017-07-31T14:04:24.000Z
  809. OSBUILD: 14393
  810. OSSERVICEPACK: 1480
  811. SERVICEPACK_NUMBER: 0
  812. OS_REVISION: 0
  813. SUITE_MASK: 272
  814. PRODUCT_TYPE: 1
  815. OSPLATFORM_TYPE: x64
  816. OSNAME: Windows 10
  817. OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
  818. USER_LCID: 0
  819. OSBUILD_TIMESTAMP: 2017-07-07 02:26:09
  820. BUILDDATESTAMP_STR: 170706-2004
  821. BUILDLAB_STR: rs1_release
  822. BUILDOSVER_STR: 10.0.14393.1480
  823. ANALYSIS_SESSION_ELAPSED_TIME: ff68
  824. ANALYSIS_SOURCE: KM
  825. FAILURE_ID_HASH_STRING: km:0x19_3_ampse!unknown_function
  826. FAILURE_ID_HASH: {39a3a8c7-4479-082e-2ed8-4fb7906fa045}
  827. Followup: MachineOwner
  828.  
  829. ========================================================================
  830. =================== Dump File: 073117-39671-01.dmp ===================
  831. ========================================================================
  832. Mini Kernel Dump File: Only registers and stack trace are available
  833. Windows 10 Kernel Version 14393 MP (4 procs) Free x64
  834. Product: WinNt, suite: TerminalServer SingleUserTS
  835. Built by: 14393.1480.amd64fre.rs1_release.170706-2004
  836. Kernel base = 0xfffff802`d8881000 PsLoadedModuleList = 0xfffff802`d8b80040
  837. Debug session time: Mon Jul 31 23:28:30.116 2017 (UTC - 4:00)
  838. System Uptime: 0 days 13:23:28.777
  839.  
  840. BugCheck 13A, {3, fffff6a443600000, fffff6a443690b40, 0}
  841. Probably caused by : win32kbase.sys ( win32kbase!HMFreeObject+168 )
  842. Followup: MachineOwner
  843.  
  844. KERNEL_MODE_HEAP_CORRUPTION (13a)
  845. The kernel mode heap manager has detected corruption in a heap.
  846.  
  847. Arguments:
  848. Arg1: 0000000000000003, A corrupt entry header was detected.
  849. Arg2: fffff6a443600000, Address of the heap that reported the corruption
  850. Arg3: fffff6a443690b40, Address at which the corruption was detected
  851. Arg4: 0000000000000000
  852.  
  853. Debugging Details:
  854. DUMP_CLASS: 1
  855. DUMP_QUALIFIER: 400
  856. BUILD_VERSION_STRING: 10.0.14393.1480 (rs1_release.170706-2004)
  857. SYSTEM_MANUFACTURER: MSI
  858. SYSTEM_PRODUCT_NAME: MS-7816
  859. SYSTEM_VERSION: 2.0
  860. BIOS_VENDOR: American Megatrends Inc.
  861. BIOS_VERSION: V10.3
  862. BIOS_DATE: 12/03/2013
  863. BASEBOARD_MANUFACTURER: MSI
  864. BASEBOARD_PRODUCT: Z87-G43 GAMING (MS-7816)
  865. BASEBOARD_VERSION: 2.0
  866. DUMP_TYPE: 2
  867. CPU_COUNT: 4
  868. CPU_MHZ: c80
  869. CPU_VENDOR: GenuineIntel
  870. CPU_FAMILY: 6
  871. CPU_MODEL: 3c
  872. CPU_STEPPING: 3
  873. CPU_MICROCODE: 6,3c,3,0 (F,M,S,R) SIG: 1E'00000000 (cache) 1E'00000000 (init)
  874. CUSTOMER_CRASH_COUNT: 1
  875. DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
  876. BUGCHECK_STR: 0x13A
  877.  
  878. PROCESS_NAME: RzSynapse.exe
  879.  
  880. CURRENT_IRQL: 0
  881. LAST_CONTROL_TRANSFER: from fffff802d8a90969 to fffff802d89d0960
  882. STACK_TEXT:
  883. ffffa681`60d461c8 fffff802`d8a90969 : 00000000`0000013a 00000000`00000003 fffff6a4`43600000 fffff6a4`43690b40 : nt!KeBugCheckEx
  884. ffffa681`60d461d0 fffff802`d89cca0d : fffff6a4`43600000 fffff6a4`43690b50 00000000`0000000b 00000000`00000000 : nt!RtlpHeapHandleError+0x29
  885. ffffa681`60d46210 fffff802`d8a9091c : fffff6a4`43600000 ffffcd84`f8222080 fffff6a4`00000000 00000000`00000000 : nt!RtlpLogHeapFailure+0x8d
  886. ffffa681`60d46240 fffff802`d8955bb9 : fffff6a4`43600000 fffff6a4`43690b40 fffff6a4`43600000 fffff6a4`436b5d20 : nt!RtlpAnalyzeHeapFailure+0x30c
  887. ffffa681`60d462a0 fffff802`d89558ec : fffff6a4`43600000 fffff6a4`43690b40 fffff6a4`43690b40 ffff8309`911b9070 : nt!RtlpFreeHeap+0x2ad
  888. ffffa681`60d46370 fffff802`d8955714 : fffff6a4`4040c270 ffffa681`60d46439 00000000`00000000 fffff6a4`43690b50 : nt!RtlpFreeHeapInternal+0x1c4
  889. ffffa681`60d463c0 fffff6ea`71a1d028 : 00000000`00000000 fffff6ea`7264a312 00000000`00000000 0001081a`40000014 : nt!RtlFreeHeap+0x30
  890. ffffa681`60d46400 fffff6ea`72611832 : ffffcd84`f129bcb0 ffffcd84`f129bcb0 ffffa681`60d46499 fffff6a4`43690b50 : win32kbase!HMFreeObject+0x168
  891. ffffa681`60d46440 fffff6ea`72652707 : fffff6a4`43690b50 00000000`00080080 00000000`00000001 fffff6a4`42aa3010 : win32kfull!xxxFreeWindow+0xe86
  892. ffffa681`60d46500 fffff6ea`726a57e1 : ffff8309`00000000 00000000`00000000 00000000`00000000 fffff6a4`43690b50 : win32kfull!xxxDestroyWindow+0x2e7
  893. ffffa681`60d465d0 fffff6ea`726525f7 : fffff6a4`43662b70 ffffa681`60d46689 00000000`00000000 fffff6a4`42aa3010 : win32kfull!xxxDW_DestroyOwnedWindows+0xe5
  894. ffffa681`60d46620 fffff6ea`726a57e1 : 00010010`00000000 fffff6ea`00000000 fffff6a4`00000000 fffff6a4`43662b70 : win32kfull!xxxDestroyWindow+0x1d7
  895. ffffa681`60d466f0 fffff6ea`726525f7 : fffff6a4`43622550 ffffa681`60d467a9 00000000`00000000 fffff6a4`42aa3010 : win32kfull!xxxDW_DestroyOwnedWindows+0xe5
  896. ffffa681`60d46740 fffff6ea`71a5cf5c : ffffcd84`00000000 00000000`00000001 fffff6a4`00000000 fffff6a4`43622550 : win32kfull!xxxDestroyWindow+0x1d7
  897. ffffa681`60d46810 fffff6ea`71a1cd3a : fffff6a4`42aa3010 ffffa681`60d46940 fffff6a4`42aa3010 fffff6a4`43366370 : win32kbase!xxxDestroyWindowIfSupported+0x1c
  898. ffffa681`60d46840 fffff6ea`71a1d5b1 : 00000000`00000000 00000000`0000022c fffff6a4`4319d000 fffff6a4`42aa3010 : win32kbase!HMDestroyUnlockedObject+0x4a
  899. ffffa681`60d46870 fffff6ea`71a1b060 : 00000000`00000000 00000000`00000000 fffff6a4`42aa3010 00000000`00000000 : win32kbase!DestroyThreadsObjects+0xf1
  900. ffffa681`60d468a0 fffff6ea`71a1bdd6 : 00000000`00000001 fffff6a4`42aa3010 00000000`00000000 fffff6a4`42aa3010 : win32kbase!xxxDestroyThreadInfo+0x374
  901. ffffa681`60d46a10 fffff6ea`726a88b4 : 00000000`00000000 00000000`00000001 ffffcd84`f8222080 00000000`00000001 : win32kbase!UserThreadCallout+0x296
  902. ffffa681`60d46a60 fffff6ea`71a3a427 : ffffa681`60d46bb8 fffff802`d8b7a260 00000000`00000000 ffffcd84`ebfee300 : win32kfull!W32pThreadCallout+0x54
  903. ffffa681`60d46a90 fffff802`d8cb9337 : ffffa681`60d46bb8 fffff802`d8b7a260 00060030`00010002 00000000`00000000 : win32kbase!W32CalloutDispatch+0x147
  904. ffffa681`60d46ad0 fffff802`d8cf059d : ffffcd84`f4a3f300 ffffa681`60d46b40 00000000`00000000 ffffcd84`f8222080 : nt!ExCallCallBack+0x37
  905. ffffa681`60d46b00 fffff802`d8d384ce : 00070000`40010004 ffffcd84`f8222080 ffffa681`60d46e40 ffffcd84`f8222128 : nt!PspExitThread+0x3e9
  906. ffffa681`60d46c40 fffff802`d88bc842 : 00000000`00000000 00000000`00000000 00000000`00000100 ffffa681`60d46d00 : nt!KiSchedulerApcTerminate+0x2e
  907. ffffa681`60d46c70 fffff802`d89d3fe0 : 00000000`011bd158 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x2f2
  908. ffffa681`60d46d00 fffff802`d89db73a : ffffcd84`f8222080 00000000`00000000 ffffcd84`f8222080 00000000`0122a000 : nt!KiInitiateUserApc+0x70
  909. ffffa681`60d46e40 00007ffc`caa06884 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
  910. 00000000`010bb0f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`caa06884
  911. STACK_COMMAND: kb
  912. THREAD_SHA1_HASH_MOD_FUNC: 5162cd68853ae18396661daa21aff82637887ada
  913. THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 5f4f4b3cf475b630e87b3f29f8649363017b4ac0
  914. THREAD_SHA1_HASH_MOD: 686fac4591efb6e916267faf0f08dcfa5871552b
  915. FOLLOWUP_IP:
  916. win32kbase!HMFreeObject+168
  917. fffff6ea`71a1d028 488d4c2440 lea rcx,[rsp+40h]
  918. FAULT_INSTR_CODE: 244c8d48
  919. SYMBOL_STACK_INDEX: 7
  920. SYMBOL_NAME: win32kbase!HMFreeObject+168
  921. FOLLOWUP_NAME: MachineOwner
  922. MODULE_NAME: win32kbase
  923.  
  924. IMAGE_NAME: win32kbase.sys
  925.  
  926. DEBUG_FLR_IMAGE_TIMESTAMP: 595f28fc
  927. IMAGE_VERSION: 10.0.14393.1480
  928. BUCKET_ID_FUNC_OFFSET: 168
  929. FAILURE_BUCKET_ID: 0x13A_win32kbase!HMFreeObject
  930. BUCKET_ID: 0x13A_win32kbase!HMFreeObject
  931. PRIMARY_PROBLEM_CLASS: 0x13A_win32kbase!HMFreeObject
  932. TARGET_TIME: 2017-08-01T03:28:30.000Z
  933. OSBUILD: 14393
  934. OSSERVICEPACK: 1480
  935. SERVICEPACK_NUMBER: 0
  936. OS_REVISION: 0
  937. SUITE_MASK: 272
  938. PRODUCT_TYPE: 1
  939. OSPLATFORM_TYPE: x64
  940. OSNAME: Windows 10
  941. OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
  942. USER_LCID: 0
  943. OSBUILD_TIMESTAMP: 2017-07-07 02:26:09
  944. BUILDDATESTAMP_STR: 170706-2004
  945. BUILDLAB_STR: rs1_release
  946. BUILDOSVER_STR: 10.0.14393.1480
  947. ANALYSIS_SESSION_ELAPSED_TIME: 9ae
  948. ANALYSIS_SOURCE: KM
  949. FAILURE_ID_HASH_STRING: km:0x13a_win32kbase!hmfreeobject
  950. FAILURE_ID_HASH: {e11c3381-b44d-755a-98fe-68b4002b0a97}
  951. Followup: MachineOwner
  952.  
  953. ========================================================================
  954. =================== Dump File: 073117-87328-01.dmp ===================
  955. ========================================================================
  956. Mini Kernel Dump File: Only registers and stack trace are available
  957. Windows 10 Kernel Version 14393 MP (4 procs) Free x64
  958. Product: WinNt, suite: TerminalServer SingleUserTS
  959. Built by: 14393.1480.amd64fre.rs1_release.170706-2004
  960. Kernel base = 0xfffff801`7f677000 PsLoadedModuleList = 0xfffff801`7f976040
  961. Debug session time: Mon Jul 31 09:55:49.196 2017 (UTC - 4:00)
  962. System Uptime: 0 days 0:07:44.856
  963.  
  964. BugCheck 3B, {c0000005, fffff8017faa0f09, ffffdf002e8b6680, 0}
  965. Probably caused by : ntkrnlmp.exe ( nt!CmpDoParseKey+eb9 )
  966. Followup: MachineOwner
  967.  
  968. SYSTEM_SERVICE_EXCEPTION (3b)
  969. An exception happened while executing a system service routine.
  970.  
  971. Arguments:
  972. Arg1: 00000000c0000005, Exception code that caused the bugcheck
  973. Arg2: fffff8017faa0f09, Address of the instruction which caused the bugcheck
  974. Arg3: ffffdf002e8b6680, Address of the context record for the exception that caused the bugcheck
  975. Arg4: 0000000000000000, zero.
  976.  
  977. Debugging Details:
  978. DUMP_CLASS: 1
  979. DUMP_QUALIFIER: 400
  980. BUILD_VERSION_STRING: 10.0.14393.1480 (rs1_release.170706-2004)
  981. SYSTEM_MANUFACTURER: MSI
  982. SYSTEM_PRODUCT_NAME: MS-7816
  983. SYSTEM_VERSION: 2.0
  984. BIOS_VENDOR: American Megatrends Inc.
  985. BIOS_VERSION: V10.3
  986. BIOS_DATE: 12/03/2013
  987. BASEBOARD_MANUFACTURER: MSI
  988. BASEBOARD_PRODUCT: Z87-G43 GAMING (MS-7816)
  989. BASEBOARD_VERSION: 2.0
  990. DUMP_TYPE: 2
  991. EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
  992. FAULTING_IP:
  993. nt!CmpDoParseKey+eb9
  994. fffff801`7faa0f09 41f7460400001000 test dword ptr [r14+4],100000h
  995. CONTEXT: ffffdf002e8b6680 -- (.cxr 0xffffdf002e8b6680)
  996. rax=7fffa601d01965f8 rbx=ffffca8172846460 rcx=0000000000000011
  997. rdx=0000000000000000 rsi=0000000000000002 rdi=0000000000000011
  998. rip=fffff8017faa0f09 rsp=ffffdf002e8b7080 rbp=ffffdf002e8b7180
  999. r8=0000000000000000 r9=0000000000000000 r10=0000000000000000
  1000. r11=0000000000000006 r12=ffffdf002e8b7280 r13=ffffdf002e8b7288
  1001. r14=0000000000000000 r15=0000000000000000
  1002. iopl=0 nv up ei ng nz ac pe cy
  1003. cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010293
  1004. nt!CmpDoParseKey+0xeb9:
  1005. fffff801`7faa0f09 41f7460400001000 test dword ptr [r14+4],100000h ds:002b:00000000`00000004=????????
  1006. Resetting default scope
  1007. CPU_COUNT: 4
  1008. CPU_MHZ: c80
  1009. CPU_VENDOR: GenuineIntel
  1010. CPU_FAMILY: 6
  1011. CPU_MODEL: 3c
  1012. CPU_STEPPING: 3
  1013. CPU_MICROCODE: 6,3c,3,0 (F,M,S,R) SIG: 1E'00000000 (cache) 1E'00000000 (init)
  1014. CUSTOMER_CRASH_COUNT: 1
  1015. DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
  1016. BUGCHECK_STR: 0x3B
  1017.  
  1018. PROCESS_NAME: KillerService.exe
  1019.  
  1020. CURRENT_IRQL: 0
  1021. LAST_CONTROL_TRANSFER: from fffff8017fa746a2 to fffff8017faa0f09
  1022. STACK_TEXT:
  1023. ffffdf00`2e8b7080 fffff801`7fa746a2 : 00000000`00000000 ffffa601`b2bcb320 00000000`00000001 00000000`00000000 : nt!CmpDoParseKey+0xeb9
  1024. ffffdf00`2e8b7450 fffff801`7fa9c441 : fffff801`7fa743a0 ffffa601`b1232c01 ffffdf00`2e8b76f0 ffffa601`b409f001 : nt!CmpParseKey+0x302
  1025. ffffdf00`2e8b75f0 fffff801`7fa7d3ed : ffffca81`742ed301 ffffdf00`2e8b7850 00000000`00000040 ffffca81`67952e30 : nt!ObpLookupObjectName+0xb71
  1026. ffffdf00`2e8b77c0 fffff801`7fa7d0cd : ffffa601`00000001 000000b8`dfedbb00 00000000`00000001 00000000`00000000 : nt!ObOpenObjectByNameEx+0x1dd
  1027. ffffdf00`2e8b7900 fffff801`7fa7aa0f : 00000286`8d670001 00000000`00000000 00000000`00000000 00000000`0a64c058 : nt!CmOpenKey+0x29d
  1028. ffffdf00`2e8b7ac0 fffff801`7f7d1693 : ffffca81`72846080 00000000`0000000a 00000000`00000000 00000000`00000000 : nt!NtOpenKeyEx+0xf
  1029. ffffdf00`2e8b7b00 00007ffa`c9d882f4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
  1030. 000000b8`dfedba28 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`c9d882f4
  1031. THREAD_SHA1_HASH_MOD_FUNC: 862c53fe43f8a98df43bc2882a330a6c6f1e3ceb
  1032. THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 0ba4924a976bcc5247647eef7d448c06fae1698d
  1033. THREAD_SHA1_HASH_MOD: 30a3e915496deaace47137d5b90c3ecc03746bf6
  1034. FOLLOWUP_IP:
  1035. nt!CmpDoParseKey+eb9
  1036. fffff801`7faa0f09 41f7460400001000 test dword ptr [r14+4],100000h
  1037. FAULT_INSTR_CODE: 446f741
  1038. SYMBOL_STACK_INDEX: 0
  1039. SYMBOL_NAME: nt!CmpDoParseKey+eb9
  1040. FOLLOWUP_NAME: MachineOwner
  1041. MODULE_NAME: nt
  1042.  
  1043. IMAGE_NAME: ntkrnlmp.exe
  1044.  
  1045. DEBUG_FLR_IMAGE_TIMESTAMP: 595f2981
  1046. IMAGE_VERSION: 10.0.14393.1480
  1047. STACK_COMMAND: .cxr 0xffffdf002e8b6680 ; kb
  1048. BUCKET_ID_FUNC_OFFSET: eb9
  1049. FAILURE_BUCKET_ID: 0x3B_nt!CmpDoParseKey
  1050. BUCKET_ID: 0x3B_nt!CmpDoParseKey
  1051. PRIMARY_PROBLEM_CLASS: 0x3B_nt!CmpDoParseKey
  1052. TARGET_TIME: 2017-07-31T13:55:49.000Z
  1053. OSBUILD: 14393
  1054. OSSERVICEPACK: 1480
  1055. SERVICEPACK_NUMBER: 0
  1056. OS_REVISION: 0
  1057. SUITE_MASK: 272
  1058. PRODUCT_TYPE: 1
  1059. OSPLATFORM_TYPE: x64
  1060. OSNAME: Windows 10
  1061. OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
  1062. USER_LCID: 0
  1063. OSBUILD_TIMESTAMP: 2017-07-07 02:26:09
  1064. BUILDDATESTAMP_STR: 170706-2004
  1065. BUILDLAB_STR: rs1_release
  1066. BUILDOSVER_STR: 10.0.14393.1480
  1067. ANALYSIS_SESSION_ELAPSED_TIME: 5341
  1068. ANALYSIS_SOURCE: KM
  1069. FAILURE_ID_HASH_STRING: km:0x3b_nt!cmpdoparsekey
  1070. FAILURE_ID_HASH: {a806c8b5-5067-6f86-24dd-6dbfd96a7e15}
  1071. Followup: MachineOwner
  1072.  
  1073. ========================================================================
  1074. =================== Dump File: 073117-106218-01.dmp ==================
  1075. ========================================================================
  1076. Mini Kernel Dump File: Only registers and stack trace are available
  1077. Windows 10 Kernel Version 14393 MP (4 procs) Free x64
  1078. Product: WinNt, suite: TerminalServer SingleUserTS
  1079. Built by: 14393.1480.amd64fre.rs1_release.170706-2004
  1080. Kernel base = 0xfffff802`b8e76000 PsLoadedModuleList = 0xfffff802`b9175040
  1081. Debug session time: Mon Jul 31 09:47:10.899 2017 (UTC - 4:00)
  1082. System Uptime: 0 days 7:02:39.560
  1083.  
  1084. BugCheck 1E, {ffffffffc0000005, fffff802b8edb038, 0, 40000}
  1085. Probably caused by : memory_corruption
  1086. Followup: memory_corruption
  1087.  
  1088. KMODE_EXCEPTION_NOT_HANDLED (1e)
  1089. This is a very common bugcheck. Usually the exception address pinpoints
  1090. the driver/function that caused the problem. Always note this address
  1091. as well as the link date of the driver/image that contains this address.
  1092.  
  1093. Arguments:
  1094. Arg1: ffffffffc0000005, The exception code that was not handled
  1095. Arg2: fffff802b8edb038, The address that the exception occurred at
  1096. Arg3: 0000000000000000, Parameter 0 of the exception
  1097. Arg4: 0000000000040000, Parameter 1 of the exception
  1098.  
  1099. Debugging Details:
  1100. DUMP_CLASS: 1
  1101. DUMP_QUALIFIER: 400
  1102. BUILD_VERSION_STRING: 10.0.14393.1480 (rs1_release.170706-2004)
  1103. SYSTEM_MANUFACTURER: MSI
  1104. SYSTEM_PRODUCT_NAME: MS-7816
  1105. SYSTEM_VERSION: 2.0
  1106. BIOS_VENDOR: American Megatrends Inc.
  1107. BIOS_VERSION: V10.3
  1108. BIOS_DATE: 12/03/2013
  1109. BASEBOARD_MANUFACTURER: MSI
  1110. BASEBOARD_PRODUCT: Z87-G43 GAMING (MS-7816)
  1111. BASEBOARD_VERSION: 2.0
  1112. DUMP_TYPE: 2
  1113. READ_ADDRESS: fffff802b9216338: Unable to get MiVisibleState
  1114. 0000000000040000
  1115. EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
  1116. FAULTING_IP:
  1117. nt!MiSubsectionUsingExtents+0
  1118. fffff802`b8edb038 488b01 mov rax,qword ptr [rcx]
  1119. EXCEPTION_PARAMETER2: 0000000000040000
  1120. BUGCHECK_STR: 0x1E_c0000005_R
  1121. CPU_COUNT: 4
  1122. CPU_MHZ: c80
  1123. CPU_VENDOR: GenuineIntel
  1124. CPU_FAMILY: 6
  1125. CPU_MODEL: 3c
  1126. CPU_STEPPING: 3
  1127. CPU_MICROCODE: 6,3c,3,0 (F,M,S,R) SIG: 1E'00000000 (cache) 1E'00000000 (init)
  1128. CUSTOMER_CRASH_COUNT: 1
  1129. DEFAULT_BUCKET_ID: CODE_CORRUPTION
  1130.  
  1131. PROCESS_NAME: svchost.exe
  1132.  
  1133. CURRENT_IRQL: 0
  1134. EXCEPTION_RECORD: ffff9080e753e000 -- (.exr 0xffff9080e753e000)
  1135. ExceptionAddress: ffffc58b00000000
  1136. ExceptionCode: 00000000
  1137. ExceptionFlags: 00000000
  1138. NumberParameters: -413932960
  1139. Parameter[0]: ffff93eb1da9b79f
  1140. Parameter[1]: 0000000000040000
  1141. Parameter[2]: 0000000000000000
  1142. Parameter[3]: 0000000000000000
  1143. Parameter[4]: fffffe6b0373d008
  1144. Parameter[5]: 0000000000001011
  1145. Parameter[6]: ffffc58b39c5ac40
  1146. Parameter[7]: ffff9080e753e1b8
  1147. Parameter[8]: fffffe6b0373d008
  1148. Parameter[9]: 0000000010000004
  1149. Parameter[10]: ffff9080e753e2e0
  1150. Parameter[11]: fffff802b8fd0c0e
  1151. Parameter[12]: ffff9080e753e000
  1152. Parameter[13]: ffffc58b00000000
  1153. Parameter[14]: ffffd6064cb08438
  1154. TRAP_FRAME: ffffd6064cb08438 -- (.trap 0xffffd6064cb08438)
  1155. Unable to read trap frame at ffffd606`4cb08438
  1156. LAST_CONTROL_TRANSFER: from fffff802b8f1e270 to fffff802b8fc5960
  1157. STACK_TEXT:
  1158. ffff9080`e753d9b8 fffff802`b8f1e270 : 00000000`0000001e ffffffff`c0000005 fffff802`b8edb038 00000000`00000000 : nt!KeBugCheckEx
  1159. ffff9080`e753d9c0 fffff802`b8fd0c0e : ffff9080`e753e000 ffffc58b`00000000 ffffd606`4cb08438 00000000`00000000 : nt!KiDispatchException+0x220
  1160. ffff9080`e753e080 fffff802`b8fcf0e1 : 00000000`00000001 ffff9080`e753e3c0 d9200002`93561921 00000000`00000000 : nt!KiExceptionDispatch+0xce
  1161. ffff9080`e753e260 fffff802`b8edb038 : fffff802`b8ec3172 00000000`00000001 ffffe700`000651c0 ffff9080`e753e500 : nt!KiPageFault+0x221
  1162. ffff9080`e753e3f8 fffff802`b8ec3172 : 00000000`00000001 ffffe700`000651c0 ffff9080`e753e500 fffffe6b`0328f9a8 : nt!MiSubsectionUsingExtents
  1163. ffff9080`e753e400 fffff802`b8ec2c75 : ffffc58b`437faf10 00000000`00000001 00000000`00000000 ffffa20b`dcbb8548 : nt!MmCheckCachedPageStates+0x412
  1164. ffff9080`e753e5b0 fffff802`b9296ab7 : ffffc58b`00000000 00000000`00000000 ffff9080`e753e601 00000000`00000001 : nt!CcMapAndRead+0xe5
  1165. ffff9080`e753e610 fffff807`3630d465 : ffffc58b`3faba838 ffffc58b`42fc0638 ffffc58b`38df2180 fffff802`0003f000 : nt!CcMapData+0x97
  1166. ffff9080`e753e680 fffff807`3630d105 : ffffd606`8c680108 ffffd606`8c680170 ffffd606`8c6801e0 ffffd606`8c680248 : NTFS!NtfsReadMftRecord+0xe5
  1167. ffff9080`e753e790 fffff807`3630ccf0 : 00000000`00000001 fffff802`b90beb45 ffff9080`e7530111 ffffe700`06c9a1a0 : NTFS!NtfsReadFileRecord+0xf5
  1168. ffff9080`e753e8a0 fffff807`3630bb29 : ffffa20b`dcbb8540 00000000`00000012 ffffc58b`42fc0638 ffffc58b`38df2180 : NTFS!NtfsLookupInFileRecord+0x70
  1169. ffff9080`e753e950 fffff807`3633f41f : ffffc58b`42fc0638 00000000`00000000 00000000`00000000 ffffa20b`dcbb8540 : NTFS!NtfsUpdateFcbInfoFromDisk+0xe9
  1170. ffff9080`e753ead0 fffff807`36359351 : ffffd606`8c680340 00000000`00000012 ffffa20b`d7fc5230 ffff9080`e8c581f0 : NTFS!NtfsOpenFile+0x37f
  1171. ffff9080`e753ed10 fffff807`36357ffd : ffffc58b`42fc0638 ffffc58b`351b0010 ffff9080`e8c581f0 ffffc58b`403ed000 : NTFS!NtfsCommonCreate+0x1071
  1172. ffff9080`e753ef50 fffff802`b8fc87f7 : ffff9080`e8c58180 00000000`00000012 ffffc58b`43255080 ffff9080`e6f1fb50 : NTFS!NtfsCommonCreateCallout+0x1d
  1173. ffff9080`e753ef80 fffff802`b8fc87bd : 00000000`00006000 ffff9080`e753f000 ffffc58b`403ed040 fffff802`b8f123b4 : nt!KxSwitchKernelStackCallout+0x27
  1174. ffff9080`e8c57fc0 fffff802`b8f123b4 : 00000000`00000012 00000000`00006000 00000000`00000000 fffff807`00000006 : nt!KiSwitchKernelStackContinue
  1175. ffff9080`e8c57fe0 fffff802`b8f12126 : ffff9080`e8c53000 00000000`00006000 00000000`00000000 ffff9080`e8c58060 : nt!KiExpandKernelStackAndCalloutOnStackSegment+0x134
  1176. ffff9080`e8c58060 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExpandKernelStackAndCalloutSwitchStack+0xa6
  1177. STACK_COMMAND: kb
  1178. CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
  1179. fffff802b8eb4152-fffff802b8eb4154 3 bytes - nt!MI_IS_PHYSICAL_ADDRESS+22
  1180. [ 40 fb f6:00 7f fe ]
  1181. fffff802b8eb4160-fffff802b8eb4161 2 bytes - nt!MI_IS_PHYSICAL_ADDRESS+30 (+0x0e)
  1182. [ 80 f6:00 fe ]
  1183. fffff802b8ec31d2-fffff802b8ec31d3 2 bytes - nt!MmCheckCachedPageStates+472 (+0xf072)
  1184. [ 80 f6:00 fe ]
  1185. fffff802b8edbc5b-fffff802b8edbc5c 2 bytes - nt!MiResolveMappedFileFault+55b (+0x18a89)
  1186. [ 80 fa:00 e7 ]
  1187. fffff802b8edbe96-fffff802b8edbe97 2 bytes - nt!MiFindNonPagedPoolPages+a6 (+0x23b)
  1188. [ 80 fa:00 e7 ]
  1189. fffff802b8ee7f27-fffff802b8ee7f28 2 bytes - nt!MiUnlinkPageFromList+4e7 (+0xc091)
  1190. [ 80 fa:00 e7 ]
  1191. 13 errors : !nt (fffff802b8eb4152-fffff802b8ee7f28)
  1192. MODULE_NAME: memory_corruption
  1193.  
  1194. IMAGE_NAME: memory_corruption
  1195.  
  1196. FOLLOWUP_NAME: memory_corruption
  1197. DEBUG_FLR_IMAGE_TIMESTAMP: 0
  1198. MEMORY_CORRUPTOR: LARGE
  1199. FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
  1200. BUCKET_ID: MEMORY_CORRUPTION_LARGE
  1201. PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
  1202. TARGET_TIME: 2017-07-31T13:47:10.000Z
  1203. OSBUILD: 14393
  1204. OSSERVICEPACK: 1480
  1205. SERVICEPACK_NUMBER: 0
  1206. OS_REVISION: 0
  1207. SUITE_MASK: 272
  1208. PRODUCT_TYPE: 1
  1209. OSPLATFORM_TYPE: x64
  1210. OSNAME: Windows 10
  1211. OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
  1212. USER_LCID: 0
  1213. OSBUILD_TIMESTAMP: 2017-07-07 02:26:09
  1214. BUILDDATESTAMP_STR: 170706-2004
  1215. BUILDLAB_STR: rs1_release
  1216. BUILDOSVER_STR: 10.0.14393.1480
  1217. ANALYSIS_SESSION_ELAPSED_TIME: 298f
  1218. ANALYSIS_SOURCE: KM
  1219. FAILURE_ID_HASH_STRING: km:memory_corruption_large
  1220. FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
  1221. Followup: memory_corruption
  1222.  
  1223. ========================================================================
  1224. =================== Dump File: 072717-134343-01.dmp ==================
  1225. ========================================================================
  1226. Mini Kernel Dump File: Only registers and stack trace are available
  1227. Windows 10 Kernel Version 14393 MP (4 procs) Free x64
  1228. Product: WinNt, suite: TerminalServer SingleUserTS Personal
  1229. Built by: 14393.1480.amd64fre.rs1_release.170706-2004
  1230. Kernel base = 0xfffff802`27402000 PsLoadedModuleList = 0xfffff802`27701040
  1231. Debug session time: Thu Jul 27 11:19:07.832 2017 (UTC - 4:00)
  1232. System Uptime: 0 days 0:01:59.493
  1233.  
  1234. BugCheck 1E, {ffffffffc000001d, fffff8022741ac9f, ffffe00dbba10800, 0}
  1235. Probably caused by : ntkrnlmp.exe ( nt!KiQueueReadyThread+46f )
  1236. Followup: MachineOwner
  1237.  
  1238. KMODE_EXCEPTION_NOT_HANDLED (1e)
  1239. This is a very common bugcheck. Usually the exception address pinpoints
  1240. the driver/function that caused the problem. Always note this address
  1241. as well as the link date of the driver/image that contains this address.
  1242.  
  1243. Arguments:
  1244. Arg1: ffffffffc000001d, The exception code that was not handled
  1245. Arg2: fffff8022741ac9f, The address that the exception occurred at
  1246. Arg3: ffffe00dbba10800, Parameter 0 of the exception
  1247. Arg4: 0000000000000000, Parameter 1 of the exception
  1248.  
  1249. Debugging Details:
  1250. DUMP_CLASS: 1
  1251. DUMP_QUALIFIER: 400
  1252. BUILD_VERSION_STRING: 10.0.14393.1480 (rs1_release.170706-2004)
  1253. SYSTEM_MANUFACTURER: MSI
  1254. SYSTEM_PRODUCT_NAME: MS-7816
  1255. SYSTEM_VERSION: 2.0
  1256. BIOS_VENDOR: American Megatrends Inc.
  1257. BIOS_VERSION: V10.3
  1258. BIOS_DATE: 12/03/2013
  1259. BASEBOARD_MANUFACTURER: MSI
  1260. BASEBOARD_PRODUCT: Z87-G43 GAMING (MS-7816)
  1261. BASEBOARD_VERSION: 2.0
  1262. DUMP_TYPE: 2
  1263. EXCEPTION_CODE: (NTSTATUS) 0xc000001d - {EXCEPTION} Illegal Instruction An attempt was made to execute an illegal instruction.
  1264. FAULTING_IP:
  1265. nt!KiQueueReadyThread+46f
  1266. fffff802`2741ac9f 06 ???
  1267. EXCEPTION_PARAMETER1: ffffe00dbba10800
  1268. BUGCHECK_STR: 0x1E_c000001d
  1269. CPU_COUNT: 4
  1270. CPU_MHZ: c80
  1271. CPU_VENDOR: GenuineIntel
  1272. CPU_FAMILY: 6
  1273. CPU_MODEL: 3c
  1274. CPU_STEPPING: 3
  1275. CPU_MICROCODE: 6,3c,3,0 (F,M,S,R) SIG: 1E'00000000 (cache) 1E'00000000 (init)
  1276. CUSTOMER_CRASH_COUNT: 1
  1277. DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
  1278.  
  1279. PROCESS_NAME: GWCtlSrv.exe
  1280.  
  1281. CURRENT_IRQL: 2
  1282. EXCEPTION_RECORD: 0000000000000001 -- (.exr 0x1)
  1283. Cannot read Exception record @ 0000000000000001
  1284. TRAP_FRAME: ffffe00db98c3180 -- (.trap 0xffffe00db98c3180)
  1285. Unable to read trap frame at ffffe00d`b98c3180
  1286. LAST_CONTROL_TRANSFER: from fffff802274aa270 to fffff80227551960
  1287. FAILED_INSTRUCTION_ADDRESS:
  1288. nt!KiQueueReadyThread+46f
  1289. fffff802`2741ac9f 06 ???
  1290. STACK_TEXT:
  1291. ffffca00`9d196e58 fffff802`274aa270 : 00000000`0000001e ffffffff`c000001d fffff802`2741ac9f ffffe00d`bba10800 : nt!KeBugCheckEx
  1292. ffffca00`9d196e60 fffff802`2755cc0e : 00000000`00000001 fffff802`bb3ef261 ffffe00d`b98c3180 ffffe00d`bb39fa00 : nt!KiDispatchException+0x220
  1293. ffffca00`9d197520 fffff802`2755a706 : ffffca00`98b99180 fffff802`27556d4f 00000000`161f9e0e ffffe00d`bba10800 : nt!KiExceptionDispatch+0xce
  1294. ffffca00`9d197700 fffff802`2741ac9f : ffffca00`00000000 00000000`00000001 ffffffff`ffd01d90 ffffe00d`bb9d8801 : nt!KiInvalidOpcodeFault+0x106
  1295. ffffca00`9d197890 ffffa68b`ad972ee4 : ffffe00d`bba10900 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiQueueReadyThread+0x46f
  1296. ffffca00`9d197900 ffffe00d`bba10900 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff802`2773e180 : 0xffffa68b`ad972ee4
  1297. ffffca00`9d197908 00000000`00000000 : 00000000`00000000 00000000`00000000 fffff802`2773e180 00000000`00000000 : 0xffffe00d`bba10900
  1298. STACK_COMMAND: kb
  1299. THREAD_SHA1_HASH_MOD_FUNC: 5fd0f25bde73ee6d7e9fa086227fe937f01a0696
  1300. THREAD_SHA1_HASH_MOD_FUNC_OFFSET: eaeaa87ccc3a5e7744c25446aba97aee7557053a
  1301. THREAD_SHA1_HASH_MOD: f08ac56120cad14894587db086f77ce277bfae84
  1302. FOLLOWUP_IP:
  1303. nt!KiQueueReadyThread+46f
  1304. fffff802`2741ac9f 06 ???
  1305. FAULT_INSTR_CODE: c0854806
  1306. SYMBOL_STACK_INDEX: 4
  1307. SYMBOL_NAME: nt!KiQueueReadyThread+46f
  1308. FOLLOWUP_NAME: MachineOwner
  1309. MODULE_NAME: nt
  1310.  
  1311. IMAGE_NAME: ntkrnlmp.exe
  1312.  
  1313. DEBUG_FLR_IMAGE_TIMESTAMP: 595f2981
  1314. IMAGE_VERSION: 10.0.14393.1480
  1315. BUCKET_ID_FUNC_OFFSET: 46f
  1316. FAILURE_BUCKET_ID: 0x1E_c000001d_BAD_IP_nt!KiQueueReadyThread
  1317. BUCKET_ID: 0x1E_c000001d_BAD_IP_nt!KiQueueReadyThread
  1318. PRIMARY_PROBLEM_CLASS: 0x1E_c000001d_BAD_IP_nt!KiQueueReadyThread
  1319. TARGET_TIME: 2017-07-27T15:19:07.000Z
  1320. OSBUILD: 14393
  1321. OSSERVICEPACK: 1480
  1322. SERVICEPACK_NUMBER: 0
  1323. OS_REVISION: 0
  1324. SUITE_MASK: 784
  1325. PRODUCT_TYPE: 1
  1326. OSPLATFORM_TYPE: x64
  1327. OSNAME: Windows 10
  1328. OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
  1329. USER_LCID: 0
  1330. OSBUILD_TIMESTAMP: 2017-07-07 02:26:09
  1331. BUILDDATESTAMP_STR: 170706-2004
  1332. BUILDLAB_STR: rs1_release
  1333. BUILDOSVER_STR: 10.0.14393.1480
  1334. ANALYSIS_SESSION_ELAPSED_TIME: 7787
  1335. ANALYSIS_SOURCE: KM
  1336. FAILURE_ID_HASH_STRING: km:0x1e_c000001d_bad_ip_nt!kiqueuereadythread
  1337. FAILURE_ID_HASH: {541d0d27-0402-a98f-a025-944afd9b4ba5}
  1338. Followup: MachineOwner
  1339.  
  1340. ========================================================================
  1341. =================== Dump File: 072817-122609-01.dmp ==================
  1342. ========================================================================
  1343. Mini Kernel Dump File: Only registers and stack trace are available
  1344. Windows 10 Kernel Version 14393 MP (4 procs) Free x64
  1345. Product: WinNt, suite: TerminalServer SingleUserTS
  1346. Built by: 14393.1480.amd64fre.rs1_release.170706-2004
  1347. Kernel base = 0xfffff802`b648a000 PsLoadedModuleList = 0xfffff802`b6789040
  1348. Debug session time: Fri Jul 28 17:40:01.502 2017 (UTC - 4:00)
  1349. System Uptime: 1 days 2:40:17.164
  1350.  
  1351. BugCheck 1000007E, {ffffffffc0000005, fffff802b64c275c, ffffd880a5e638c8, ffffd880a5e63100}
  1352. *** WARNING: Unable to verify timestamp for win32k.sys
  1353. *** ERROR: Module load completed but symbols could not be loaded for win32k.sys
  1354. Probably caused by : memory_corruption
  1355. Followup: memory_corruption
  1356.  
  1357. SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
  1358. This is a very common bugcheck. Usually the exception address pinpoints
  1359. the driver/function that caused the problem. Always note this address
  1360. as well as the link date of the driver/image that contains this address.
  1361. Some common problems are exception code 0x80000003. This means a hard
  1362. coded breakpoint or assertion was hit, but this system was booted
  1363. /NODEBUG. This is not supposed to happen as developers should never have
  1364. hardcoded breakpoints in retail code, but ...
  1365. If this happens, make sure a debugger gets connected, and the
  1366. system is booted /DEBUG. This will let us see why this breakpoint is
  1367. happening.
  1368.  
  1369. Arguments:
  1370. Arg1: ffffffffc0000005, The exception code that was not handled
  1371. Arg2: fffff802b64c275c, The address that the exception occurred at
  1372. Arg3: ffffd880a5e638c8, Exception Record Address
  1373. Arg4: ffffd880a5e63100, Context Record Address
  1374.  
  1375. Debugging Details:
  1376. DUMP_CLASS: 1
  1377. DUMP_QUALIFIER: 400
  1378. BUILD_VERSION_STRING: 10.0.14393.1480 (rs1_release.170706-2004)
  1379. SYSTEM_MANUFACTURER: MSI
  1380. SYSTEM_PRODUCT_NAME: MS-7816
  1381. SYSTEM_VERSION: 2.0
  1382. BIOS_VENDOR: American Megatrends Inc.
  1383. BIOS_VERSION: V10.3
  1384. BIOS_DATE: 12/03/2013
  1385. BASEBOARD_MANUFACTURER: MSI
  1386. BASEBOARD_PRODUCT: Z87-G43 GAMING (MS-7816)
  1387. BASEBOARD_VERSION: 2.0
  1388. DUMP_TYPE: 2
  1389. EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
  1390. FAULTING_IP:
  1391. nt!KiCommitThreadWait+16c
  1392. fffff802`b64c275c c3 ret
  1393. EXCEPTION_RECORD: ffffd880a5e638c8 -- (.exr 0xffffd880a5e638c8)
  1394. ExceptionAddress: fffff802b64c275c (nt!KiCommitThreadWait+0x000000000000016c)
  1395. ExceptionCode: c0000005 (Access violation)
  1396. ExceptionFlags: 00000000
  1397. NumberParameters: 2
  1398. Parameter[0]: 0000000000000000
  1399. Parameter[1]: ffffffffffffffff
  1400. Attempt to read from address ffffffffffffffff
  1401. CONTEXT: ffffd880a5e63100 -- (.cxr 0xffffd880a5e63100)
  1402. rax=ffffb00c36719af8 rbx=ffffb00c4a2b1800 rcx=12d4b7fb5b630000
  1403. rdx=0000000000000000 rsi=fffff802b6840280 rdi=0000000000000000
  1404. rip=fffff802b64c275c rsp=ffffd880a5e63b08 rbp=0000000000000000
  1405. r8=0000000000000000 r9=0000000000000004 r10=0000000000000000
  1406. r11=fffff802b65e5c4f r12=0000000000000000 r13=0000000000000000
  1407. r14=ffffb00c4a2b1940 r15=0000000000000000
  1408. iopl=0 nv up ei ng nz na pe nc
  1409. cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010282
  1410. nt!KiCommitThreadWait+0x16c:
  1411. fffff802`b64c275c c3 ret
  1412. Resetting default scope
  1413. CPU_COUNT: 4
  1414. CPU_MHZ: c80
  1415. CPU_VENDOR: GenuineIntel
  1416. CPU_FAMILY: 6
  1417. CPU_MODEL: 3c
  1418. CPU_STEPPING: 3
  1419. CPU_MICROCODE: 6,3c,3,0 (F,M,S,R) SIG: 1E'00000000 (cache) 1E'00000000 (init)
  1420. CUSTOMER_CRASH_COUNT: 1
  1421. DEFAULT_BUCKET_ID: CODE_CORRUPTION
  1422.  
  1423. PROCESS_NAME: System
  1424.  
  1425. CURRENT_IRQL: 0
  1426. ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
  1427. EXCEPTION_CODE_STR: c0000005
  1428. EXCEPTION_PARAMETER1: 0000000000000000
  1429. EXCEPTION_PARAMETER2: ffffffffffffffff
  1430. FOLLOWUP_IP:
  1431. nt!KiCommitThreadWait+16c
  1432. fffff802`b64c275c c3 ret
  1433. READ_ADDRESS: fffff802b682a338: Unable to get MiVisibleState
  1434. ffffffffffffffff
  1435. BUGCHECK_STR: AV
  1436. LAST_CONTROL_TRANSFER: from ffeff802b64f0937 to fffff802b64c275c
  1437. STACK_TEXT:
  1438. ffffd880`a5e63b08 ffeff802`b64f0937 : ffffb00c`00000000 ffffb00c`692f9af0 ffffb00c`692f9ed8 00000000`00000000 : nt!KiCommitThreadWait+0x16c
  1439. ffffd880`a5e63b10 ffffb00c`00000000 : ffffb00c`692f9af0 ffffb00c`692f9ed8 00000000`00000000 00000063`00000000 : 0xffeff802`b64f0937
  1440. ffffd880`a5e63b18 ffffb00c`692f9af0 : ffffb00c`692f9ed8 00000000`00000000 00000063`00000000 fffff802`b655354c : 0xffffb00c`00000000
  1441. ffffd880`a5e63b20 ffffb00c`692f9ed8 : 00000000`00000000 00000063`00000000 fffff802`b655354c ffffb00c`36719af0 : 0xffffb00c`692f9af0
  1442. ffffd880`a5e63b28 00000000`00000000 : 00000063`00000000 fffff802`b655354c ffffb00c`36719af0 00000000`00000000 : 0xffffb00c`692f9ed8
  1443. CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
  1444. fffff802b64dc9d1 - nt!MiCompletePrivateZeroFault+821
  1445. [ fa:ed ]
  1446. fffff802b64dca94 - nt!MiCompletePrivateZeroFault+8e4 (+0xc3)
  1447. [ fa:ed ]
  1448. fffff802b64dcf22 - nt!MiAllocateWsle+422 (+0x48e)
  1449. [ f6:d6 ]
  1450. fffff802b64e03a4 - nt!MiResolvePageTablePage+54 (+0x3482)
  1451. [ f6:d6 ]
  1452. fffff802b652686f - nt!MmCreateKernelStack+13f (+0x464cb)
  1453. [ f6:d6 ]
  1454. fffff802b65268bf - nt!MmCreateKernelStack+18f (+0x50)
  1455. [ fa:ed ]
  1456. fffff802b659d2de - nt!MiPurgeZeroList+6e (+0x76a1f)
  1457. [ fa:ed ]
  1458. fffff802b66d2388-fffff802b66d2389 2 bytes - nt!ExFreePoolWithTag+388
  1459. [ fb f6:eb d6 ]
  1460. 9 errors : !nt (fffff802b64dc9d1-fffff802b66d2389)
  1461. MODULE_NAME: memory_corruption
  1462.  
  1463. IMAGE_NAME: memory_corruption
  1464.  
  1465. FOLLOWUP_NAME: memory_corruption
  1466. DEBUG_FLR_IMAGE_TIMESTAMP: 0
  1467. MEMORY_CORRUPTOR: LARGE
  1468. STACK_COMMAND: .cxr 0xffffd880a5e63100 ; kb
  1469. FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
  1470. BUCKET_ID: MEMORY_CORRUPTION_LARGE
  1471. PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
  1472. TARGET_TIME: 2017-07-28T21:40:01.000Z
  1473. OSBUILD: 14393
  1474. OSSERVICEPACK: 1480
  1475. SERVICEPACK_NUMBER: 0
  1476. OS_REVISION: 0
  1477. SUITE_MASK: 272
  1478. PRODUCT_TYPE: 1
  1479. OSPLATFORM_TYPE: x64
  1480. OSNAME: Windows 10
  1481. OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
  1482. USER_LCID: 0
  1483. OSBUILD_TIMESTAMP: 2017-07-07 02:26:09
  1484. BUILDDATESTAMP_STR: 170706-2004
  1485. BUILDLAB_STR: rs1_release
  1486. BUILDOSVER_STR: 10.0.14393.1480
  1487. ANALYSIS_SESSION_ELAPSED_TIME: 9633
  1488. ANALYSIS_SOURCE: KM
  1489. FAILURE_ID_HASH_STRING: km:memory_corruption_large
  1490. FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
  1491. Followup: memory_corruption
  1492.  
  1493. ========================================================================
  1494. =================== Dump File: 072817-143984-01.dmp ==================
  1495. ========================================================================
  1496. Mini Kernel Dump File: Only registers and stack trace are available
  1497. Windows 10 Kernel Version 14393 MP (4 procs) Free x64
  1498. Product: WinNt, suite: TerminalServer SingleUserTS
  1499. Built by: 14393.1480.amd64fre.rs1_release.170706-2004
  1500. Kernel base = 0xfffff803`7b808000 PsLoadedModuleList = 0xfffff803`7bb07040
  1501. Debug session time: Fri Jul 28 19:31:18.738 2017 (UTC - 4:00)
  1502. System Uptime: 0 days 0:18:46.400
  1503.  
  1504. BugCheck 4E, {99, 2d1414, 2, e0004000040431c}
  1505. *** WARNING: Unable to verify timestamp for ampse.sys
  1506. *** ERROR: Module load completed but symbols could not be loaded for ampse.sys
  1507. Probably caused by : memory_corruption
  1508. Followup: memory_corruption
  1509.  
  1510. PFN_LIST_CORRUPT (4e)
  1511. Typically caused by drivers passing bad memory descriptor lists (ie: calling
  1512. MmUnlockPages twice with the same list, etc). If a kernel debugger is
  1513. available get the stack trace.
  1514.  
  1515. Arguments:
  1516. Arg1: 0000000000000099, A PTE or PFN is corrupt
  1517. Arg2: 00000000002d1414, page frame number
  1518. Arg3: 0000000000000002, current page state
  1519. Arg4: 0e0004000040431c, 0
  1520.  
  1521. Debugging Details:
  1522. DUMP_CLASS: 1
  1523. DUMP_QUALIFIER: 400
  1524. BUILD_VERSION_STRING: 10.0.14393.1480 (rs1_release.170706-2004)
  1525. SYSTEM_MANUFACTURER: MSI
  1526. SYSTEM_PRODUCT_NAME: MS-7816
  1527. SYSTEM_VERSION: 2.0
  1528. BIOS_VENDOR: American Megatrends Inc.
  1529. BIOS_VERSION: V10.3
  1530. BIOS_DATE: 12/03/2013
  1531. BASEBOARD_MANUFACTURER: MSI
  1532. BASEBOARD_PRODUCT: Z87-G43 GAMING (MS-7816)
  1533. BASEBOARD_VERSION: 2.0
  1534. DUMP_TYPE: 2
  1535. BUGCHECK_STR: 0x4E_99
  1536. CPU_COUNT: 4
  1537. CPU_MHZ: c80
  1538. CPU_VENDOR: GenuineIntel
  1539. CPU_FAMILY: 6
  1540. CPU_MODEL: 3c
  1541. CPU_STEPPING: 3
  1542. CPU_MICROCODE: 6,3c,3,0 (F,M,S,R) SIG: 1E'00000000 (cache) 1E'00000000 (init)
  1543. CUSTOMER_CRASH_COUNT: 1
  1544. DEFAULT_BUCKET_ID: CODE_CORRUPTION
  1545.  
  1546. PROCESS_NAME: dllhost.exe
  1547.  
  1548. CURRENT_IRQL: 2
  1549. LAST_CONTROL_TRANSFER: from fffff8037b97b630 to fffff8037b957960
  1550. STACK_TEXT:
  1551. ffff8a80`fcea1268 fffff803`7b97b630 : 00000000`0000004e 00000000`00000099 00000000`002d1414 00000000`00000002 : nt!KeBugCheckEx
  1552. ffff8a80`fcea1270 fffff803`7b869ca6 : fffff803`00000000 ffffc207`cd06a000 00000000`00000000 ffff8a80`00000000 : nt!MiDeleteValidSystemPage+0x111650
  1553. ffff8a80`fcea12f0 fffff803`7b85294e : fffff803`7bb24c90 fffff803`7b85e2d7 00000000`00000111 ffffffff`ffffffff : nt!MiDeleteSystemPagableVm+0x856
  1554. ffff8a80`fcea14c0 fffff803`7b8182da : ffffc207`00000003 ffffc207`cd071000 ffffc207`cd071000 00000000`00007550 : nt!MiFreePagedPoolPages+0x2de
  1555. ffff8a80`fcea1690 fffff803`7ba504f5 : ffffc207`cd069000 ffff8a80`fcea17a0 00000000`00000000 00000000`00000001 : nt!ExFreeLargePool+0x5ba
  1556. ffff8a80`fcea1760 fffff80b`dfb58d9a : ffffc207`cd069000 fffff80b`dfa17ba2 00000000`00000004 00000000`00000000 : nt!ExFreePoolWithTag+0x4f5
  1557. ffff8a80`fcea1840 ffffc207`cd069000 : fffff80b`dfa17ba2 00000000`00000004 00000000`00000000 ffffc207`cd069000 : ampse+0x158d9a
  1558. ffff8a80`fcea1848 fffff80b`dfa17ba2 : 00000000`00000004 00000000`00000000 ffffc207`cd069000 00000000`00007541 : 0xffffc207`cd069000
  1559. ffff8a80`fcea1850 00000000`00000004 : 00000000`00000000 ffffc207`cd069000 00000000`00007541 00000000`000002ea : ampse+0x17ba2
  1560. ffff8a80`fcea1858 00000000`00000000 : ffffc207`cd069000 00000000`00007541 00000000`000002ea fffff80b`dfaac8fe : 0x4
  1561. STACK_COMMAND: kb
  1562. CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
  1563. fffff8037b85e3a3-fffff8037b85e3a4 2 bytes - nt!MiResolvePageTablePage+53
  1564. [ 80 f6:00 fe ]
  1565. fffff8037b91b2dd-fffff8037b91b2de 2 bytes - nt!MiPurgeZeroList+6d (+0xbcf3a)
  1566. [ 80 fa:00 83 ]
  1567. 4 errors : !nt (fffff8037b85e3a3-fffff8037b91b2de)
  1568. MODULE_NAME: memory_corruption
  1569.  
  1570. IMAGE_NAME: memory_corruption
  1571.  
  1572. FOLLOWUP_NAME: memory_corruption
  1573. DEBUG_FLR_IMAGE_TIMESTAMP: 0
  1574. MEMORY_CORRUPTOR: LARGE
  1575. FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
  1576. BUCKET_ID: MEMORY_CORRUPTION_LARGE
  1577. PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
  1578. TARGET_TIME: 2017-07-28T23:31:18.000Z
  1579. OSBUILD: 14393
  1580. OSSERVICEPACK: 1480
  1581. SERVICEPACK_NUMBER: 0
  1582. OS_REVISION: 0
  1583. SUITE_MASK: 272
  1584. PRODUCT_TYPE: 1
  1585. OSPLATFORM_TYPE: x64
  1586. OSNAME: Windows 10
  1587. OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
  1588. USER_LCID: 0
  1589. OSBUILD_TIMESTAMP: 2017-07-07 02:26:09
  1590. BUILDDATESTAMP_STR: 170706-2004
  1591. BUILDLAB_STR: rs1_release
  1592. BUILDOSVER_STR: 10.0.14393.1480
  1593. ANALYSIS_SESSION_ELAPSED_TIME: 2af6
  1594. ANALYSIS_SOURCE: KM
  1595. FAILURE_ID_HASH_STRING: km:memory_corruption_large
  1596. FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
  1597. Followup: memory_corruption
  1598.  
  1599. ========================================================================
  1600. =================== Dump File: 073017-68312-01.dmp ===================
  1601. ========================================================================
  1602. Mini Kernel Dump File: Only registers and stack trace are available
  1603. Windows 10 Kernel Version 14393 MP (4 procs) Free x64
  1604. Product: WinNt, suite: TerminalServer SingleUserTS
  1605. Built by: 14393.1480.amd64fre.rs1_release.170706-2004
  1606. Kernel base = 0xfffff800`f2a7e000 PsLoadedModuleList = 0xfffff800`f2d7d040
  1607. Debug session time: Sun Jul 30 21:14:23.929 2017 (UTC - 4:00)
  1608. System Uptime: 2 days 1:42:03.590
  1609.  
  1610. BugCheck 3B, {c0000005, fffff800f2ac0a30, ffff8280bf80ed30, 0}
  1611. Probably caused by : memory_corruption
  1612. Followup: memory_corruption
  1613.  
  1614. SYSTEM_SERVICE_EXCEPTION (3b)
  1615. An exception happened while executing a system service routine.
  1616.  
  1617. Arguments:
  1618. Arg1: 00000000c0000005, Exception code that caused the bugcheck
  1619. Arg2: fffff800f2ac0a30, Address of the instruction which caused the bugcheck
  1620. Arg3: ffff8280bf80ed30, Address of the context record for the exception that caused the bugcheck
  1621. Arg4: 0000000000000000, zero.
  1622.  
  1623. Debugging Details:
  1624. DUMP_CLASS: 1
  1625. DUMP_QUALIFIER: 400
  1626. BUILD_VERSION_STRING: 10.0.14393.1480 (rs1_release.170706-2004)
  1627. SYSTEM_MANUFACTURER: MSI
  1628. SYSTEM_PRODUCT_NAME: MS-7816
  1629. SYSTEM_VERSION: 2.0
  1630. BIOS_VENDOR: American Megatrends Inc.
  1631. BIOS_VERSION: V10.3
  1632. BIOS_DATE: 12/03/2013
  1633. BASEBOARD_MANUFACTURER: MSI
  1634. BASEBOARD_PRODUCT: Z87-G43 GAMING (MS-7816)
  1635. BASEBOARD_VERSION: 2.0
  1636. DUMP_TYPE: 2
  1637. DUMP_FILE_ATTRIBUTES: 0xc
  1638. Insufficient Dumpfile Size
  1639. Kernel Generated Triage Dump
  1640. EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
  1641. FAULTING_IP:
  1642. nt!MiSectionControlArea+0
  1643. fffff800`f2ac0a30 488b4128 mov rax,qword ptr [rcx+28h]
  1644. CONTEXT: ffff8280bf80ed30 -- (.cxr 0xffff8280bf80ed30)
  1645. rax=0000000000000000 rbx=ffff8280bf80f9a0 rcx=0000000000000000
  1646. rdx=0000000000000000 rsi=0000000000000000 rdi=ffff8280bf80f9f8
  1647. rip=fffff800f2ac0a30 rsp=ffff8280bf80f738 rbp=ffff8280bf80fa40
  1648. r8=ffff8280bf80f9a0 r9=ffff8280bf80f9b8 r10=0000000000000000
  1649. r11=ffff8280bf80f980 r12=ffff8280bf80f9a0 r13=ffffce4280006c00
  1650. r14=0000000000000000 r15=ffffce4284ef0001
  1651. iopl=0 nv up ei ng nz na po nc
  1652. cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010286
  1653. nt!MiSectionControlArea:
  1654. fffff800`f2ac0a30 488b4128 mov rax,qword ptr [rcx+28h] ds:002b:00000000`00000028=????????????????
  1655. Resetting default scope
  1656. CPU_COUNT: 4
  1657. CPU_MHZ: c80
  1658. CPU_VENDOR: GenuineIntel
  1659. CPU_FAMILY: 6
  1660. CPU_MODEL: 3c
  1661. CPU_STEPPING: 3
  1662. CPU_MICROCODE: 6,3c,3,0 (F,M,S,R) SIG: 1E'00000000 (cache) 1E'00000000 (init)
  1663. CUSTOMER_CRASH_COUNT: 1
  1664. DEFAULT_BUCKET_ID: CODE_CORRUPTION
  1665. BUGCHECK_STR: 0x3B
  1666.  
  1667. PROCESS_NAME: dwm.exe
  1668.  
  1669. CURRENT_IRQL: 0
  1670. LAST_CONTROL_TRANSFER: from fffff800f2e9d2f6 to fffff800f2ac0a30
  1671. STACK_TEXT:
  1672. ffff8280`bf80f738 fffff800`f2e9d2f6 : 00000000`00000001 ffffa88b`6d282d10 ffff8280`bf80f9d0 ffffbe0e`14b325c0 : nt!MiSectionControlArea
  1673. ffff8280`bf80f740 fffff800`f2ef21f2 : ffffce42`80006c00 00000000`00000000 ffff8280`bf80fa10 00000000`00000028 : nt!MiMapViewOfSection+0xa6
  1674. ffff8280`bf80f8c0 ffffce1b`7b9cf0f5 : 00000000`00400000 fffff800`00000002 ffff8280`00000002 00000000`00000000 : nt!MmMapViewOfSection+0x62
  1675. ffff8280`bf80f930 ffffce1b`7b9dbde6 : 00000000`00000000 ffffce42`830d5600 ffff8280`bf80f9f0 00000000`00000000 : win32kbase!DirectComposition::CBatchSharedMemoryPool::GetUserModeViewAtOffset+0x9d
  1676. ffff8280`bf80f9a0 ffffce1b`7b9ccdda : ffffce42`80006c50 00000000`00000000 00000000`00000000 00000000`00001000 : win32kbase!DirectComposition::CApplicationChannel::GetChannelRDPHeaders+0x32
  1677. ffff8280`bf80f9d0 ffffce1b`7b9cc151 : ffffbe0e`14b588b0 00000000`00a32130 ffff8280`bf80fab8 00000000`00000001 : win32kbase!DirectComposition::CConnection::RetrieveBatches+0x2b2
  1678. ffff8280`bf80fa80 fffff800`f2bd8693 : 00000000`00000004 00000042`4ebff238 00000042`4ebff1a0 ffffce42`80006c50 : win32kbase!NtDCompositionGetConnectionBatch+0x221
  1679. ffff8280`bf80fb00 00007ffb`57d33744 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
  1680. 00000042`4ebff158 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`57d33744
  1681. CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
  1682. fffff800f2ac01be-fffff800f2ac01bf 2 bytes - nt!MiIssueHardFault+1fe
  1683. [ 80 f6:00 fa ]
  1684. fffff800f2ac02d2 - nt!MiIssueHardFault+312 (+0x114)
  1685. [ fa:94 ]
  1686. fffff800f2ac03b3-fffff800f2ac03b5 3 bytes - nt!MiIssueHardFault+3f3 (+0xe1)
  1687. [ 40 fb f6:00 7d fa ]
  1688. fffff800f2ac03f4-fffff800f2ac03f5 2 bytes - nt!MiIssueHardFault+434 (+0x41)
  1689. [ 80 f6:00 fa ]
  1690. fffff800f2ac0495-fffff800f2ac0498 4 bytes - nt!MiIssueHardFault+4d5 (+0xa1)
  1691. [ a0 7d fb f6:80 3e 7d fa ]
  1692. fffff800f2ac04a7-fffff800f2ac04ab 5 bytes - nt!MiIssueHardFault+4e7 (+0x12)
  1693. [ d0 be 7d fb f6:40 9f 3e 7d fa ]
  1694. fffff800f2ac0609 - nt!MiReferenceInPageFile+a9 (+0x162)
  1695. [ fa:94 ]
  1696. fffff800f2ac0b3b-fffff800f2ac0b3c 2 bytes - nt!MiEmptyPageAccessLog+8b (+0x532)
  1697. [ 80 f6:00 fa ]
  1698. fffff800f2ac0d78-fffff800f2ac0d79 2 bytes - nt!MiEmptyPageAccessLog+2c8 (+0x23d)
  1699. [ 80 f6:00 fa ]
  1700. 22 errors : !nt (fffff800f2ac01be-fffff800f2ac0d79)
  1701. MODULE_NAME: memory_corruption
  1702.  
  1703. IMAGE_NAME: memory_corruption
  1704.  
  1705. FOLLOWUP_NAME: memory_corruption
  1706. DEBUG_FLR_IMAGE_TIMESTAMP: 0
  1707. MEMORY_CORRUPTOR: LARGE
  1708. STACK_COMMAND: .cxr 0xffff8280bf80ed30 ; kb
  1709. FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
  1710. BUCKET_ID: MEMORY_CORRUPTION_LARGE
  1711. PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
  1712. TARGET_TIME: 2017-07-31T01:14:23.000Z
  1713. OSBUILD: 14393
  1714. OSSERVICEPACK: 1480
  1715. SERVICEPACK_NUMBER: 0
  1716. OS_REVISION: 0
  1717. SUITE_MASK: 272
  1718. PRODUCT_TYPE: 1
  1719. OSPLATFORM_TYPE: x64
  1720. OSNAME: Windows 10
  1721. OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
  1722. USER_LCID: 0
  1723. OSBUILD_TIMESTAMP: 2017-07-07 02:26:09
  1724. BUILDDATESTAMP_STR: 170706-2004
  1725. BUILDLAB_STR: rs1_release
  1726. BUILDOSVER_STR: 10.0.14393.1480
  1727. ANALYSIS_SESSION_ELAPSED_TIME: 2a60
  1728. ANALYSIS_SOURCE: KM
  1729. FAILURE_ID_HASH_STRING: km:memory_corruption_large
  1730. FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
  1731. Followup: memory_corruption
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement