Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Microsoft (R) Windows Debugger Version 10.0.14321.1024 X86
- Copyright (c) Microsoft Corporation. All rights reserved.
- Auto Dump Analyzer by gardenman
- Time to debug file(s): 00 hours and 26 minutes and 49 seconds
- ========================================================================
- =================== Dump File: 073017-131078-01.dmp ==================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 14393 MP (4 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS
- Built by: 14393.1480.amd64fre.rs1_release.170706-2004
- Kernel base = 0xfffff800`12214000 PsLoadedModuleList = 0xfffff800`12513040
- Debug session time: Sun Jul 30 21:19:52.791 2017 (UTC - 4:00)
- System Uptime: 0 days 0:04:55.452
- BugCheck 50, {ffffe10c0000555f, 0, fffff805de7ccae6, 2}
- *** WARNING: Unable to verify timestamp for ampse.sys
- *** ERROR: Module load completed but symbols could not be loaded for ampse.sys
- Could not read faulting driver name
- Probably caused by : memory_corruption
- Followup: memory_corruption
- PAGE_FAULT_IN_NONPAGED_AREA (50)
- Invalid system memory was referenced. This cannot be protected by try-except.
- Typically the address is just plain bad or it is pointing at freed memory.
- Arguments:
- Arg1: ffffe10c0000555f, memory referenced.
- Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
- Arg3: fffff805de7ccae6, If non-zero, the instruction address which referenced the bad memory
- address.
- Arg4: 0000000000000002, (reserved)
- Debugging Details:
- Could not read faulting driver name
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 10.0.14393.1480 (rs1_release.170706-2004)
- SYSTEM_MANUFACTURER: MSI
- SYSTEM_PRODUCT_NAME: MS-7816
- SYSTEM_VERSION: 2.0
- BIOS_VENDOR: American Megatrends Inc.
- BIOS_VERSION: V10.3
- BIOS_DATE: 12/03/2013
- BASEBOARD_MANUFACTURER: MSI
- BASEBOARD_PRODUCT: Z87-G43 GAMING (MS-7816)
- BASEBOARD_VERSION: 2.0
- DUMP_TYPE: 2
- READ_ADDRESS: fffff800125b4338: Unable to get MiVisibleState
- ffffe10c0000555f Nonpaged pool
- FAULTING_IP:
- ampse+13cae6
- fffff805`de7ccae6 f6420903 test byte ptr [rdx+9],3
- MM_INTERNAL_CODE: 2
- CPU_COUNT: 4
- CPU_MHZ: c80
- CPU_VENDOR: GenuineIntel
- CPU_FAMILY: 6
- CPU_MODEL: 3c
- CPU_STEPPING: 3
- CPU_MICROCODE: 6,3c,3,0 (F,M,S,R) SIG: 1E'00000000 (cache) 1E'00000000 (init)
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: CODE_CORRUPTION
- BUGCHECK_STR: AV
- PROCESS_NAME: NVDisplay.Container.exe
- CURRENT_IRQL: 0
- TRAP_FRAME: ffffab812d3ef810 -- (.trap 0xffffab812d3ef810)
- NOTE: The trap frame does not contain all registers.
- Some register values may be zeroed or incorrect.
- rax=0000000000000000 rbx=0000000000000000 rcx=fffff805de7cc72d
- rdx=ffffe10c00005556 rsi=0000000000000000 rdi=0000000000000000
- rip=fffff805de7ccae6 rsp=ffffab812d3ef9a0 rbp=0000000000000000
- r8=00000000000008c0 r9=ffffe10c6efff600 r10=0000000000000038
- r11=ffffe10c6f9a9828 r12=0000000000000000 r13=0000000000000000
- r14=0000000000000000 r15=0000000000000000
- iopl=0 nv up ei pl nz ac po nc
- ampse+0x13cae6:
- fffff805`de7ccae6 f6420903 test byte ptr [rdx+9],3 ds:ffffe10c`0000555f=??
- Resetting default scope
- LAST_CONTROL_TRANSFER: from fffff8001238de11 to fffff80012363960
- STACK_TEXT:
- ffffab81`2d3ef518 fffff800`1238de11 : 00000000`00000050 ffffe10c`0000555f 00000000`00000000 ffffab81`2d3ef810 : nt!KeBugCheckEx
- ffffab81`2d3ef520 fffff800`122690fd : 00000000`00000000 00000000`00000000 ffffab81`2d3ef810 ffffe10c`0000555f : nt!MiSystemFault+0x100201
- ffffab81`2d3ef610 fffff800`1236cffc : 00000000`00000a00 ffffffff`ffffffff 00000000`00000000 fffff805`de7e8d9a : nt!MmAccessFault+0x27d
- ffffab81`2d3ef810 fffff805`de7ccae6 : ffffe10c`6f9a9770 ffffe10c`6f3e7800 ffffe10c`6f9a9770 ffffe10c`6ee82bd0 : nt!KiPageFault+0x13c
- ffffab81`2d3ef9a0 ffffe10c`6f9a9770 : ffffe10c`6f3e7800 ffffe10c`6f9a9770 ffffe10c`6ee82bd0 ffffe10c`6ed71210 : ampse+0x13cae6
- ffffab81`2d3ef9a8 ffffe10c`6f3e7800 : ffffe10c`6f9a9770 ffffe10c`6ee82bd0 ffffe10c`6ed71210 ffffe10c`6df56260 : 0xffffe10c`6f9a9770
- ffffab81`2d3ef9b0 ffffe10c`6f9a9770 : ffffe10c`6ee82bd0 ffffe10c`6ed71210 ffffe10c`6df56260 00000000`00000398 : 0xffffe10c`6f3e7800
- ffffab81`2d3ef9b8 ffffe10c`6ee82bd0 : ffffe10c`6ed71210 ffffe10c`6df56260 00000000`00000398 fffff805`de7cd115 : 0xffffe10c`6f9a9770
- ffffab81`2d3ef9c0 ffffe10c`6ed71210 : ffffe10c`6df56260 00000000`00000398 fffff805`de7cd115 ffffe10c`6f9a9770 : 0xffffe10c`6ee82bd0
- ffffab81`2d3ef9c8 ffffe10c`6df56260 : 00000000`00000398 fffff805`de7cd115 ffffe10c`6f9a9770 ffffe10c`6f3e7800 : 0xffffe10c`6ed71210
- ffffab81`2d3ef9d0 00000000`00000398 : fffff805`de7cd115 ffffe10c`6f9a9770 ffffe10c`6f3e7800 ffffe10c`6faec480 : 0xffffe10c`6df56260
- ffffab81`2d3ef9d8 fffff805`de7cd115 : ffffe10c`6f9a9770 ffffe10c`6f3e7800 ffffe10c`6faec480 00000000`624c6553 : 0x398
- ffffab81`2d3ef9e0 ffffe10c`6f9a9770 : ffffe10c`6f3e7800 ffffe10c`6faec480 00000000`624c6553 ffffe10c`6f9a9828 : ampse+0x13d115
- ffffab81`2d3ef9e8 ffffe10c`6f3e7800 : ffffe10c`6faec480 00000000`624c6553 ffffe10c`6f9a9828 fffff805`de7cdf58 : 0xffffe10c`6f9a9770
- ffffab81`2d3ef9f0 ffffe10c`6faec480 : 00000000`624c6553 ffffe10c`6f9a9828 fffff805`de7cdf58 ffffe10c`6f9a9770 : 0xffffe10c`6f3e7800
- ffffab81`2d3ef9f8 00000000`624c6553 : ffffe10c`6f9a9828 fffff805`de7cdf58 ffffe10c`6f9a9770 ffffe10c`6f9a9828 : 0xffffe10c`6faec480
- ffffab81`2d3efa00 ffffe10c`6f9a9828 : fffff805`de7cdf58 ffffe10c`6f9a9770 ffffe10c`6f9a9828 00000000`00000000 : 0x624c6553
- ffffab81`2d3efa08 fffff805`de7cdf58 : ffffe10c`6f9a9770 ffffe10c`6f9a9828 00000000`00000000 ffffe10c`6ed96020 : 0xffffe10c`6f9a9828
- ffffab81`2d3efa10 ffffe10c`6f9a9770 : ffffe10c`6f9a9828 00000000`00000000 ffffe10c`6ed96020 00000000`00000000 : ampse+0x13df58
- ffffab81`2d3efa18 ffffe10c`6f9a9828 : 00000000`00000000 ffffe10c`6ed96020 00000000`00000000 fffff805`de7d1332 : 0xffffe10c`6f9a9770
- ffffab81`2d3efa20 00000000`00000000 : ffffe10c`6ed96020 00000000`00000000 fffff805`de7d1332 ffffe10c`6f2c1650 : 0xffffe10c`6f9a9828
- STACK_COMMAND: kb
- CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
- fffff8001222520d-fffff8001222520f 3 bytes - nt!ExpAllocateBigPool+71d
- [ 40 fb f6:00 52 a4 ]
- fffff80012225241-fffff80012225242 2 bytes - nt!ExpAllocateBigPool+751 (+0x34)
- [ 80 f6:00 a4 ]
- 5 errors : !nt (fffff8001222520d-fffff80012225242)
- MODULE_NAME: memory_corruption
- IMAGE_NAME: memory_corruption
- FOLLOWUP_NAME: memory_corruption
- DEBUG_FLR_IMAGE_TIMESTAMP: 0
- MEMORY_CORRUPTOR: LARGE
- FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
- BUCKET_ID: MEMORY_CORRUPTION_LARGE
- PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
- TARGET_TIME: 2017-07-31T01:19:52.000Z
- OSBUILD: 14393
- OSSERVICEPACK: 1480
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 272
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2017-07-07 02:26:09
- BUILDDATESTAMP_STR: 170706-2004
- BUILDLAB_STR: rs1_release
- BUILDOSVER_STR: 10.0.14393.1480
- ANALYSIS_SESSION_ELAPSED_TIME: 2ada
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:memory_corruption_large
- FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
- Followup: memory_corruption
- =============================== Drivers ================================
- Image path: \SystemRoot\system32\drivers\aswVmm.sys
- Image name: aswVmm.sys
- Possible Info Link: http://www.carrona.org/drivers/driver.php?id=aswVmm.sys
- Timestamp: Thu Jun 29 2017
- Image path: \SystemRoot\system32\drivers\aswRvrt.sys
- Image name: aswRvrt.sys
- Possible Info Link: http://www.carrona.org/drivers/driver.php?id=aswRvrt.sys
- Timestamp: Mon Jun 19 2017
- Image path: \SystemRoot\system32\drivers\aswbuniva.sys
- Image name: aswbuniva.sys
- Possible Info Link: http://www.carrona.org/drivers/driver.php?id=aswbuniva.sys
- Timestamp: Tue Jul 11 2017
- Image path: \SystemRoot\system32\drivers\aswbloga.sys
- Image name: aswbloga.sys
- Possible Info Link: http://www.carrona.org/drivers/driver.php?id=aswbloga.sys
- Timestamp: Tue Jul 11 2017
- Image path: \SystemRoot\system32\drivers\aswbidsha.sys
- Image name: aswbidsha.sys
- Possible Info Link: http://www.carrona.org/drivers/driver.php?id=aswbidsha.sys
- Timestamp: Tue Jul 11 2017
- Image path: \SystemRoot\system32\DRIVERS\bwcW10x64.sys
- Image name: bwcW10x64.sys
- Possible Info Link: http://www.carrona.org/drivers/driver.php?id=bwcW10x64.sys
- Timestamp: Fri Jan 22 2016
- Image path: \SystemRoot\System32\drivers\iaStorA.sys
- Image name: iaStorA.sys
- Possible Info Link: http://www.carrona.org/drivers/driver.php?id=iaStorA.sys
- Timestamp: Wed Jun 3 2015
- Image path: \SystemRoot\System32\Drivers\PxHlpa64.sys
- Image name: PxHlpa64.sys
- Possible Info Link: http://www.carrona.org/drivers/driver.php?id=PxHlpa64.sys
- Timestamp: Mon Oct 17 2011
- Image path: \SystemRoot\system32\drivers\peauth.sys
- Image name: peauth.sys
- Possible Info Link: http://www.carrona.org/drivers/driver.php?id=peauth.sys
- Timestamp: Fri Jul 15 2016
- Image path: \SystemRoot\system32\drivers\aswSP.sys
- Image name: aswSP.sys
- Possible Info Link: http://www.carrona.org/drivers/driver.php?id=aswSP.sys
- Timestamp: Thu Jun 22 2017
- Image path: \SystemRoot\system32\drivers\aswSnx.sys
- Image name: aswSnx.sys
- Possible Info Link: http://www.carrona.org/drivers/driver.php?id=aswSnx.sys
- Timestamp: Mon Jun 19 2017
- Image path: \SystemRoot\system32\DRIVERS\SeLow_x64.sys
- Image name: SeLow_x64.sys
- Possible Info Link: http://www.carrona.org/drivers/driver.php?id=SeLow_x64.sys
- Timestamp: Sun Oct 18 2015
- Image path: \SystemRoot\system32\drivers\aswRdr2.sys
- Image name: aswRdr2.sys
- Possible Info Link: http://www.carrona.org/drivers/driver.php?id=aswRdr2.sys
- Timestamp: Mon Jun 19 2017
- Image path: \SystemRoot\system32\DRIVERS\VBoxNetAdp6.sys
- Image name: VBoxNetAdp6.sys
- Possible Info Link: http://www.carrona.org/drivers/driver.php?id=VBoxNetAdp6.sys
- Timestamp: Mon Jan 16 2017
- Image path: \SystemRoot\system32\DRIVERS\VBoxNetLwf.sys
- Image name: VBoxNetLwf.sys
- Possible Info Link: http://www.carrona.org/drivers/driver.php?id=VBoxNetLwf.sys
- Timestamp: Mon Jan 16 2017
- Image path: \SystemRoot\system32\DRIVERS\gwdrv.sys
- Image name: gwdrv.sys
- Possible Info Link: http://www.carrona.org/drivers/driver.php?id=gwdrv.sys
- Timestamp: Fri May 29 2015
- Image path: \SystemRoot\system32\drivers\aswStm.sys
- Image name: aswStm.sys
- Possible Info Link: http://www.carrona.org/drivers/driver.php?id=aswStm.sys
- Timestamp: Mon Jun 19 2017
- Image path: \??\C:\Windows\system32\Drivers\ampse.sys
- Image name: ampse.sys
- Possible Info Link: http://www.carrona.org/drivers/driver.php?id=ampse.sys
- Timestamp: Tue Mar 25 2014
- Image path: \SystemRoot\system32\DRIVERS\VBoxUSBMon.sys
- Image name: VBoxUSBMon.sys
- Possible Info Link: http://www.carrona.org/drivers/driver.php?id=VBoxUSBMon.sys
- Timestamp: Mon Jan 16 2017
- Image path: \??\C:\WINDOWS\system32\drivers\rzpnk.sys
- Image name: rzpnk.sys
- Possible Info Link: http://www.carrona.org/drivers/driver.php?id=rzpnk.sys
- Timestamp: Wed Sep 16 2015
- Image path: \SystemRoot\system32\drivers\aswbidsdrivera.sys
- Image name: aswbidsdrivera.sys
- Possible Info Link: http://www.carrona.org/drivers/driver.php?id=aswbidsdrivera.sys
- Timestamp: Tue Jul 11 2017
- Image path: \SystemRoot\System32\drivers\Neo6_x64_VPN.sys
- Image name: Neo6_x64_VPN.sys
- Possible Info Link: http://www.carrona.org/drivers/driver.php?id=Neo6_x64_VPN.sys
- Timestamp: Sun Oct 18 2015
- Image path: \SystemRoot\System32\Drivers\dump_iaStorA.sys
- Image name: dump_iaStorA.sys
- Possible Info Link: http://www.carrona.org/drivers/driver.php?id=dump_iaStorA.sys
- Timestamp: Wed Jun 3 2015
- Image path: \??\C:\Windows\system32\Drivers\amp.sys
- Image name: amp.sys
- Possible Info Link: http://www.carrona.org/drivers/driver.php?id=amp.sys
- Timestamp: Tue Mar 25 2014
- Image path: \SystemRoot\system32\DRIVERS\VBoxDrv.sys
- Image name: VBoxDrv.sys
- Possible Info Link: http://www.carrona.org/drivers/driver.php?id=VBoxDrv.sys
- Timestamp: Mon Jan 16 2017
- Image path: \??\C:\WINDOWS\system32\drivers\rawdsk3.sys
- Image name: rawdsk3.sys
- Possible Info Link: http://www.carrona.org/drivers/driver.php?id=rawdsk3.sys
- Timestamp: Tue Feb 11 2014
- Image path: \SystemRoot\System32\drivers\drmk.sys
- Image name: drmk.sys
- Possible Info Link: http://www.carrona.org/drivers/driver.php?id=drmk.sys
- Timestamp: Fri Jul 15 2016
- Image path: \SystemRoot\System32\drivers\TeeDriverW8x64.sys
- Image name: TeeDriverW8x64.sys
- Possible Info Link: http://www.carrona.org/drivers/driver.php?id=TeeDriverW8x64.sys
- Timestamp: Tue Jul 7 2015
- Image path: \SystemRoot\System32\drivers\e22w10x64.sys
- Image name: e22w10x64.sys
- Possible Info Link: http://www.carrona.org/drivers/driver.php?id=e22w10x64.sys
- Timestamp: Fri Aug 28 2015
- Image path: \SystemRoot\System32\drivers\AE3000w764.sys
- Image name: AE3000w764.sys
- Possible Info Link: http://www.carrona.org/drivers/driver.php?id=AE3000w764.sys
- Timestamp: Fri Mar 2 2012
- Image path: \SystemRoot\system32\DRIVERS\igdkmd64.sys
- Image name: igdkmd64.sys
- Possible Info Link: http://www.carrona.org/drivers/driver.php?id=igdkmd64.sys
- Timestamp: Wed Mar 8 2017
- Image path: \SystemRoot\system32\DRIVERS\USBPcap.sys
- Image name: USBPcap.sys
- Possible Info Link: http://www.carrona.org/drivers/driver.php?id=USBPcap.sys
- Timestamp: Fri Oct 2 2015
- Image path: \SystemRoot\system32\drivers\aswMonFlt.sys
- Image name: aswMonFlt.sys
- Possible Info Link: http://www.carrona.org/drivers/driver.php?id=aswMonFlt.sys
- Timestamp: Mon Jul 17 2017
- Image path: \SystemRoot\system32\drivers\npf.sys
- Image name: npf.sys
- Possible Info Link: http://www.carrona.org/drivers/driver.php?id=npf.sys
- Timestamp: Thu Feb 28 2013
- Image path: \SystemRoot\system32\drivers\RTKVHD64.sys
- Image name: RTKVHD64.sys
- Possible Info Link: http://www.carrona.org/drivers/driver.php?id=RTKVHD64.sys
- Timestamp: Tue Dec 6 2016
- Image path: \SystemRoot\system32\drivers\MBfilt64.sys
- Image name: MBfilt64.sys
- Possible Info Link: http://www.carrona.org/drivers/driver.php?id=MBfilt64.sys
- Timestamp: Thu Jul 30 2009
- Image path: \SystemRoot\system32\drivers\nvhda64v.sys
- Image name: nvhda64v.sys
- Possible Info Link: http://www.carrona.org/drivers/driver.php?id=nvhda64v.sys
- Timestamp: Tue May 16 2017
- Image path: \SystemRoot\System32\drivers\rzendpt.sys
- Image name: rzendpt.sys
- Possible Info Link: http://www.carrona.org/drivers/driver.php?id=rzendpt.sys
- Timestamp: Tue Aug 11 2015
- Image path: \SystemRoot\System32\drivers\rzudd.sys
- Image name: rzudd.sys
- Possible Info Link: http://www.carrona.org/drivers/driver.php?id=rzudd.sys
- Timestamp: Tue Aug 11 2015
- Image path: \SystemRoot\System32\drivers\rzmpos.sys
- Image name: rzmpos.sys
- Possible Info Link: http://www.carrona.org/drivers/driver.php?id=rzmpos.sys
- Timestamp: Tue Aug 11 2015
- Image path: \??\C:\WINDOWS\system32\drivers\rzpmgrk.sys
- Image name: rzpmgrk.sys
- Possible Info Link: http://www.carrona.org/drivers/driver.php?id=rzpmgrk.sys
- Timestamp: Thu Sep 17 2015
- Image path: \SystemRoot\System32\DriverStore\FileRepository\nv_dispi.inf_amd64_2386fda73b467ac8\nvlddmkm.sys
- Image name: nvlddmkm.sys
- Possible Info Link: http://www.carrona.org/drivers/driver.php?id=nvlddmkm.sys
- Timestamp: Tue Jun 27 2017
- Image path: \SystemRoot\System32\drivers\ICCWDT.sys
- Image name: ICCWDT.sys
- Possible Info Link: http://www.carrona.org/drivers/driver.php?id=ICCWDT.sys
- Timestamp: Wed Jan 23 2013
- Image path: \SystemRoot\System32\drivers\XtuAcpiDriver.sys
- Image name: XtuAcpiDriver.sys
- Possible Info Link: http://www.carrona.org/drivers/driver.php?id=XtuAcpiDriver.sys
- Timestamp: Thu Feb 26 2015
- Image path: \SystemRoot\System32\drivers\ISCTD64.sys
- Image name: ISCTD64.sys
- Possible Info Link: http://www.carrona.org/drivers/driver.php?id=ISCTD64.sys
- Timestamp: Tue Nov 27 2012
- Image path: \SystemRoot\system32\drivers\nvvad64v.sys
- Image name: nvvad64v.sys
- Possible Info Link: http://www.carrona.org/drivers/driver.php?id=nvvad64v.sys
- Timestamp: Sun May 28 2017
- Image path: \SystemRoot\System32\drivers\nvvhci.sys
- Image name: nvvhci.sys
- Possible Info Link: http://www.carrona.org/drivers/driver.php?id=nvvhci.sys
- Timestamp: Tue Dec 27 2016
- Image path: \SystemRoot\System32\ATMFD.DLL
- Image name: ATMFD.DLL
- Possible Info Link: http://www.carrona.org/drivers/driver.php?id=ATMFD.DLL
- Timestamp: Sat Jun 3 2017
- Image path: \SystemRoot\System32\cdd.dll
- Image name: cdd.dll
- Possible Info Link: http://www.carrona.org/drivers/driver.php?id=cdd.dll
- Timestamp: unavailable (00000000)
- Unloaded modules:
- fffff805`e1ea0000 fffff805`e1f17000 IntcDAud.sys
- fffff805`dc110000 fffff805`dc11f000 dump_storpor
- fffff805`de360000 fffff805`de8d2000 dump_iaStorA
- fffff805`de900000 fffff805`de91d000 dump_dumpfve
- fffff805`e3690000 fffff805`e369e000 USBD.SYS
- fffff805`e3680000 fffff805`e368e000 USBPcap.sys
- fffff805`dfe50000 fffff805`dfe5e000 USBD.SYS
- fffff805`dfe40000 fffff805`dfe4e000 USBPcap.sys
- fffff805`dfd60000 fffff805`dfd6e000 USBD.SYS
- fffff805`dfd50000 fffff805`dfd5e000 USBPcap.sys
- fffff805`dea30000 fffff805`dea44000 dam.sys
- fffff805`dbf90000 fffff805`dbf9f000 hwpolicy.sys
- ============================= BIOS INFO ================================
- [SMBIOS Data Tables v2.8]
- [DMI Version - 0]
- [2.0 Calling Convention - No]
- [Table Size - 3081 bytes]
- [BIOS Information (Type 0) - Length 24 - Handle 0000h]
- Vendor American Megatrends Inc.
- BIOS Version V10.3
- BIOS Starting Address Segment f000
- BIOS Release Date 12/03/2013
- BIOS ROM Size 800000
- BIOS Characteristics
- 07: - PCI Supported
- 11: - Upgradeable FLASH BIOS
- 12: - BIOS Shadowing Supported
- 15: - CD-Boot Supported
- 16: - Selectable Boot Supported
- 17: - BIOS ROM Socketed
- 19: - EDD Supported
- 23: - 1.2MB Floppy Supported
- 24: - 720KB Floppy Supported
- 25: - 2.88MB Floppy Supported
- 26: - Print Screen Device Supported
- 27: - Keyboard Services Supported
- 28: - Serial Services Supported
- 29: - Printer Services Supported
- 32: - BIOS Vendor Reserved
- BIOS Characteristic Extensions
- 00: - ACPI Supported
- 01: - USB Legacy Supported
- 08: - BIOS Boot Specification Supported
- 10: - Specification Reserved
- 11: - Specification Reserved
- BIOS Major Revision 4
- BIOS Minor Revision 6
- EC Firmware Major Revision 255
- EC Firmware Minor Revision 255
- [System Information (Type 1) - Length 27 - Handle 0001h]
- Manufacturer MSI
- Product Name MS-7816
- Version 2.0
- UUID 00000000-0000-0000-0000-000000000000
- Wakeup Type Power Switch
- [BaseBoard Information (Type 2) - Length 15 - Handle 0002h]
- Manufacturer MSI
- Product Z87-G43 GAMING (MS-7816)
- Version 2.0
- Feature Flags 09h
- 1590698504: - ?ÿU?ì?ì¡H.ã^3Å?Eü3ÀW?}?Eô?Eø?ÿu
- ¸@
- 1590698544: - ?ÿU?ì?ì¡H.ã^3Å?Eü3ÀW?}?Eô?Eø?ÿu
- ¸@
- Chassis Handle 0003h
- Board Type 0ah - Processor/Memory Module
- Number of Child Handles 0
- [System Enclosure (Type 3) - Length 25 - Handle 0003h]
- Manufacturer MSI
- Chassis Type Desktop
- Version 2.0
- Bootup State Safe
- Power Supply State Safe
- Thermal State Safe
- Security Status None
- OEM Defined 0
- Height 0U
- Number of Power Cords 1
- Number of Contained Elements 1
- Contained Element Size 3
- [OEM Strings (Type 11) - Length 5 - Handle 0021h]
- Number of Strings 1
- [System Configuration Options (Type 12) - Length 5 - Handle 0022h]
- [Processor Information (Type 4) - Length 42 - Handle 003dh]
- Socket Designation SOCKET 0
- Processor Type Central Processor
- Processor Family cdh - Specification Reserved
- Processor Manufacturer Intel
- Processor ID c3060300fffbebbf
- Processor Version Intel(R) Core(TM) i5-4570 CPU @ 3.20GHz
- Processor Voltage 8ch - 1.2V
- External Clock 100MHz
- Max Speed 3800MHz
- Current Speed 3200MHz
- Status Enabled Populated
- Processor Upgrade Specification Reserved
- L1 Cache Handle 003fh
- L2 Cache Handle 003eh
- L3 Cache Handle 0040h
- [Cache Information (Type 7) - Length 19 - Handle 003eh]
- Socket Designation CPU Internal L2
- Cache Configuration 0181h - WB Enabled Int NonSocketed L2
- Maximum Cache Size 0400h - 1024K
- Installed Size 0400h - 1024K
- Supported SRAM Type 0002h - Unknown
- Current SRAM Type 0002h - Unknown
- Cache Speed 0ns
- Error Correction Type Multi-Bit ECC
- System Cache Type Unified
- Associativity 8-way Set-Associative
- [Cache Information (Type 7) - Length 19 - Handle 003fh]
- Socket Designation CPU Internal L1
- Cache Configuration 0180h - WB Enabled Int NonSocketed L1
- Maximum Cache Size 0100h - 256K
- Installed Size 0100h - 256K
- Supported SRAM Type 0002h - Unknown
- Current SRAM Type 0002h - Unknown
- Cache Speed 0ns
- Error Correction Type Multi-Bit ECC
- System Cache Type Other
- Associativity 8-way Set-Associative
- [Cache Information (Type 7) - Length 19 - Handle 0040h]
- Socket Designation CPU Internal L3
- Cache Configuration 0182h - WB Enabled Int NonSocketed L3
- Maximum Cache Size 1800h - 6144K
- Installed Size 1800h - 6144K
- Supported SRAM Type 0002h - Unknown
- Current SRAM Type 0002h - Unknown
- Cache Speed 0ns
- Error Correction Type Multi-Bit ECC
- System Cache Type Unified
- Associativity Specification Reserved
- [Physical Memory Array (Type 16) - Length 23 - Handle 0041h]
- Location 03h - SystemBoard/Motherboard
- Use 03h - System Memory
- Memory Error Correction 03h - None
- Maximum Capacity 33554432KB
- Number of Memory Devices 4
- [Memory Device (Type 17) - Length 40 - Handle 0042h]
- Physical Memory Array Handle 0041h
- Total Width 64 bits
- Data Width 64 bits
- Size 4096MB
- Form Factor 09h - DIMM
- Device Locator ChannelA-DIMM0
- Bank Locator BANK 0
- Memory Type 18h - Specification Reserved
- Type Detail 0080h - Synchronous
- Speed 2400MHz
- Manufacturer 0420
- Part Number F3-2400C10-4GTX
- [Memory Device Mapped Address (Type 20) - Length 35 - Handle 0043h]
- Starting Address 00000000h
- Ending Address 003fffffh
- Memory Device Handle 0042h
- Mem Array Mapped Adr Handle 004ah
- [Memory Device (Type 17) - Length 40 - Handle 0044h]
- Physical Memory Array Handle 0041h
- Total Width 64 bits
- Data Width 64 bits
- Size 4096MB
- Form Factor 09h - DIMM
- Device Locator ChannelA-DIMM1
- Bank Locator BANK 1
- Memory Type 18h - Specification Reserved
- Type Detail 0080h - Synchronous
- Speed 2400MHz
- Manufacturer 0420
- Part Number F3-2400C10-4GTX
- [Memory Device Mapped Address (Type 20) - Length 35 - Handle 0045h]
- Starting Address 00800000h
- Ending Address 00bfffffh
- Memory Device Handle 0044h
- Mem Array Mapped Adr Handle 004ah
- [Memory Device (Type 17) - Length 40 - Handle 0046h]
- Physical Memory Array Handle 0041h
- Total Width 64 bits
- Data Width 64 bits
- Size 4096MB
- Form Factor 09h - DIMM
- Device Locator ChannelB-DIMM0
- Bank Locator BANK 2
- Memory Type 18h - Specification Reserved
- Type Detail 0080h - Synchronous
- Speed 2400MHz
- Manufacturer 0420
- Part Number F3-2400C10-4GTX
- [Memory Device Mapped Address (Type 20) - Length 35 - Handle 0047h]
- Starting Address 00400000h
- Ending Address 007fffffh
- Memory Device Handle 0046h
- Mem Array Mapped Adr Handle 004ah
- [Memory Device (Type 17) - Length 40 - Handle 0048h]
- Physical Memory Array Handle 0041h
- Total Width 64 bits
- Data Width 64 bits
- Size 4096MB
- Form Factor 09h - DIMM
- Device Locator ChannelB-DIMM1
- Bank Locator BANK 3
- Memory Type 18h - Specification Reserved
- Type Detail 0080h - Synchronous
- Speed 2400MHz
- Manufacturer 0420
- Part Number F3-2400C10-4GTX
- [Memory Device Mapped Address (Type 20) - Length 35 - Handle 0049h]
- Starting Address 00c00000h
- Ending Address 00ffffffh
- Memory Device Handle 0048h
- Mem Array Mapped Adr Handle 004ah
- [Memory Array Mapped Address (Type 19) - Length 31 - Handle 004ah]
- Starting Address 00000000h
- Ending Address 00ffffffh
- Memory Array Handle 0041h
- Partition Width 04
- ========================================================================
- =================== Dump File: 073117-33203-01.dmp ===================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 14393 MP (4 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS
- Built by: 14393.1480.amd64fre.rs1_release.170706-2004
- Kernel base = 0xfffff803`f2e17000 PsLoadedModuleList = 0xfffff803`f3116040
- Debug session time: Mon Jul 31 02:12:19.527 2017 (UTC - 4:00)
- System Uptime: 0 days 4:51:49.187
- BugCheck 133, {1, 1e00, fffff803f31b7540, 0}
- Probably caused by : ntkrnlmp.exe ( nt!KeAccumulateTicks+42a )
- Followup: MachineOwner
- DPC_WATCHDOG_VIOLATION (133)
- The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
- or above.
- Arguments:
- Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
- DISPATCH_LEVEL or above. The offending component can usually be
- identified with a stack trace.
- Arg2: 0000000000001e00, The watchdog period.
- Arg3: fffff803f31b7540
- Arg4: 0000000000000000
- Debugging Details:
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 10.0.14393.1480 (rs1_release.170706-2004)
- SYSTEM_MANUFACTURER: MSI
- SYSTEM_PRODUCT_NAME: MS-7816
- SYSTEM_VERSION: 2.0
- BIOS_VENDOR: American Megatrends Inc.
- BIOS_VERSION: V10.3
- BIOS_DATE: 12/03/2013
- BASEBOARD_MANUFACTURER: MSI
- BASEBOARD_PRODUCT: Z87-G43 GAMING (MS-7816)
- BASEBOARD_VERSION: 2.0
- DUMP_TYPE: 2
- DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED
- CPU_COUNT: 4
- CPU_MHZ: c80
- CPU_VENDOR: GenuineIntel
- CPU_FAMILY: 6
- CPU_MODEL: 3c
- CPU_STEPPING: 3
- CPU_MICROCODE: 6,3c,3,0 (F,M,S,R) SIG: 1E'00000000 (cache) 1E'00000000 (init)
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
- BUGCHECK_STR: 0x133
- PROCESS_NAME: System
- CURRENT_IRQL: d
- LAST_CONTROL_TRANSFER: from fffff803f2e39fda to fffff803f2f66960
- STACK_TEXT:
- fffff803`f54d0d88 fffff803`f2e39fda : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff803`f31b7540 : nt!KeBugCheckEx
- fffff803`f54d0d90 fffff803`f2e37fc9 : 00003306`944be802 00000000`00000000 00000000`00000001 fffff780`00000320 : nt!KeAccumulateTicks+0x42a
- fffff803`f54d0df0 fffff803`f3631366 : fffff803`f54c2730 fffff803`f367c3e0 00000000`00000002 00003306`944bd87c : nt!KeClockInterruptNotify+0x469
- fffff803`f54d0f40 fffff803`f2e2ac26 : fffff803`f367c3e0 00000000`00000008 fffff803`f54d0f50 00000000`0000000c : hal!HalpTimerClockInterrupt+0x56
- fffff803`f54d0f70 fffff803`f2f67fda : fffff803`f54c27b0 ffff9785`2ef68d00 00000000`00000000 00000000`000000ff : nt!KiCallInterruptServiceRoutine+0x106
- fffff803`f54d0fb0 fffff803`f2f68427 : 00000099`00000006 00000010`00000000 f9dae8e4`4d8b0000 00000000`00000000 : nt!KiInterruptSubDispatchNoLockNoEtw+0xea
- fffff803`f54c2730 fffff803`f2e4c7a8 : ffffffff`ffffffd1 fffff803`f2e4c8a8 00000000`00000010 00000000`00200286 : nt!KiInterruptDispatchNoLockNoEtw+0x37
- fffff803`f54c28c0 fffff803`f2f8593f : ffff9785`2ef68dc8 ffff9785`00000000 fffff803`f3153180 ffff9785`2011c330 : nt!KiTryUnwaitThread+0x28
- fffff803`f54c2920 fffff803`f2e4d1f8 : ffff9785`2ef68dc0 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiTimerWaitTest+0x1382af
- fffff803`f54c29e0 fffff803`f2f699ea : 00000000`00000000 fffff803`f3153180 fffff803`f31cd940 ffff9785`2f306800 : nt!KiRetireDpcList+0x598
- fffff803`f54c2c60 00000000`00000000 : fffff803`f54c3000 fffff803`f54bd000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x5a
- STACK_COMMAND: kb
- THREAD_SHA1_HASH_MOD_FUNC: a2b6bb59892dc982b985b25492487f0c92f2e474
- THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 1b5346a9c99274f22ed47f79b7312a2cc619b488
- THREAD_SHA1_HASH_MOD: 6e280a424abc2a3a466bcc77abddeb8fc895a32b
- FOLLOWUP_IP:
- nt!KeAccumulateTicks+42a
- fffff803`f2e39fda cc int 3
- FAULT_INSTR_CODE: cccccccc
- SYMBOL_STACK_INDEX: 1
- SYMBOL_NAME: nt!KeAccumulateTicks+42a
- FOLLOWUP_NAME: MachineOwner
- MODULE_NAME: nt
- IMAGE_NAME: ntkrnlmp.exe
- DEBUG_FLR_IMAGE_TIMESTAMP: 595f2981
- IMAGE_VERSION: 10.0.14393.1480
- BUCKET_ID_FUNC_OFFSET: 42a
- FAILURE_BUCKET_ID: 0x133_ISR_nt!KeAccumulateTicks
- BUCKET_ID: 0x133_ISR_nt!KeAccumulateTicks
- PRIMARY_PROBLEM_CLASS: 0x133_ISR_nt!KeAccumulateTicks
- TARGET_TIME: 2017-07-31T06:12:19.000Z
- OSBUILD: 14393
- OSSERVICEPACK: 1480
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 272
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2017-07-07 02:26:09
- BUILDDATESTAMP_STR: 170706-2004
- BUILDLAB_STR: rs1_release
- BUILDOSVER_STR: 10.0.14393.1480
- ANALYSIS_SESSION_ELAPSED_TIME: 1cba
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:0x133_isr_nt!keaccumulateticks
- FAILURE_ID_HASH: {65350307-c3b9-f4b5-8829-4d27e9ff9b06}
- Followup: MachineOwner
- ========================================================================
- =================== Dump File: 073117-34359-01.dmp ===================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 14393 MP (4 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS
- Built by: 14393.1480.amd64fre.rs1_release.170706-2004
- Kernel base = 0xfffff802`82881000 PsLoadedModuleList = 0xfffff802`82b80040
- Debug session time: Mon Jul 31 10:04:24.618 2017 (UTC - 4:00)
- System Uptime: 0 days 0:07:56.279
- BugCheck 19, {3, ffffbd0d2c2388c0, ffffbd4d2c2388c0, ffffbd0d2c2388c0}
- *** WARNING: Unable to verify timestamp for ampse.sys
- *** ERROR: Module load completed but symbols could not be loaded for ampse.sys
- Probably caused by : ampse.sys ( ampse+158cf3 )
- Followup: MachineOwner
- BAD_POOL_HEADER (19)
- The pool is already corrupt at the time of the current request.
- This may or may not be due to the caller.
- The internal pool links must be walked to figure out a possible cause of
- the problem, and then special pool applied to the suspect tags or the driver
- verifier to a suspect driver.
- Arguments:
- Arg1: 0000000000000003, the pool freelist is corrupt.
- Arg2: ffffbd0d2c2388c0, the pool entry being checked.
- Arg3: ffffbd4d2c2388c0, the read back flink freelist value (should be the same as 2).
- Arg4: ffffbd0d2c2388c0, the read back blink freelist value (should be the same as 2).
- Debugging Details:
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 10.0.14393.1480 (rs1_release.170706-2004)
- SYSTEM_MANUFACTURER: MSI
- SYSTEM_PRODUCT_NAME: MS-7816
- SYSTEM_VERSION: 2.0
- BIOS_VENDOR: American Megatrends Inc.
- BIOS_VERSION: V10.3
- BIOS_DATE: 12/03/2013
- BASEBOARD_MANUFACTURER: MSI
- BASEBOARD_PRODUCT: Z87-G43 GAMING (MS-7816)
- BASEBOARD_VERSION: 2.0
- DUMP_TYPE: 2
- BUGCHECK_STR: 0x19_3
- CPU_COUNT: 4
- CPU_MHZ: c80
- CPU_VENDOR: GenuineIntel
- CPU_FAMILY: 6
- CPU_MODEL: 3c
- CPU_STEPPING: 3
- CPU_MICROCODE: 6,3c,3,0 (F,M,S,R) SIG: 1E'00000000 (cache) 1E'00000000 (init)
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
- PROCESS_NAME: svchost.exe
- CURRENT_IRQL: 1
- LAST_CONTROL_TRANSFER: from fffff80282acb6e4 to fffff802829d0960
- STACK_TEXT:
- ffffa100`fe967a18 fffff802`82acb6e4 : 00000000`00000019 00000000`00000003 ffffbd0d`2c2388c0 ffffbd4d`2c2388c0 : nt!KeBugCheckEx
- ffffa100`fe967a20 fffff80c`e1e68cf3 : 00000000`00000001 00000000`00001000 00000000`00000278 ffffcf84`d0516c00 : nt!ExAllocatePoolWithTag+0x1ca4
- ffffa100`fe967b10 00000000`00000001 : 00000000`00001000 00000000`00000278 ffffcf84`d0516c00 00000000`00000288 : ampse+0x158cf3
- ffffa100`fe967b18 00000000`00001000 : 00000000`00000278 ffffcf84`d0516c00 00000000`00000288 00000000`00000000 : 0x1
- ffffa100`fe967b20 00000000`00000278 : ffffcf84`d0516c00 00000000`00000288 00000000`00000000 00000000`00000000 : 0x1000
- ffffa100`fe967b28 ffffcf84`d0516c00 : 00000000`00000288 00000000`00000000 00000000`00000000 fffff80c`e1e53fae : 0x278
- ffffa100`fe967b30 00000000`00000288 : 00000000`00000000 00000000`00000000 fffff80c`e1e53fae ffffbd0d`2c4da0d8 : 0xffffcf84`d0516c00
- ffffa100`fe967b38 00000000`00000000 : 00000000`00000000 fffff80c`e1e53fae ffffbd0d`2c4da0d8 fffff80c`e1e68e64 : 0x288
- STACK_COMMAND: kb
- THREAD_SHA1_HASH_MOD_FUNC: 5eab5dd0ef4f87a17d4b86926b478573779e1e26
- THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 7461e2b3f410d874a5f9c1bad1bdff5df9232781
- THREAD_SHA1_HASH_MOD: 484f48adc31e9789dffb83bcd2a4d426a8019d4e
- FOLLOWUP_IP:
- ampse+158cf3
- fffff80c`e1e68cf3 4889442430 mov qword ptr [rsp+30h],rax
- FAULT_INSTR_CODE: 24448948
- SYMBOL_STACK_INDEX: 2
- SYMBOL_NAME: ampse+158cf3
- FOLLOWUP_NAME: MachineOwner
- MODULE_NAME: ampse
- IMAGE_NAME: ampse.sys
- DEBUG_FLR_IMAGE_TIMESTAMP: 5331e020
- BUCKET_ID_FUNC_OFFSET: 158cf3
- FAILURE_BUCKET_ID: 0x19_3_ampse!unknown_function
- BUCKET_ID: 0x19_3_ampse!unknown_function
- PRIMARY_PROBLEM_CLASS: 0x19_3_ampse!unknown_function
- TARGET_TIME: 2017-07-31T14:04:24.000Z
- OSBUILD: 14393
- OSSERVICEPACK: 1480
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 272
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2017-07-07 02:26:09
- BUILDDATESTAMP_STR: 170706-2004
- BUILDLAB_STR: rs1_release
- BUILDOSVER_STR: 10.0.14393.1480
- ANALYSIS_SESSION_ELAPSED_TIME: ff68
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:0x19_3_ampse!unknown_function
- FAILURE_ID_HASH: {39a3a8c7-4479-082e-2ed8-4fb7906fa045}
- Followup: MachineOwner
- ========================================================================
- =================== Dump File: 073117-39671-01.dmp ===================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 14393 MP (4 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS
- Built by: 14393.1480.amd64fre.rs1_release.170706-2004
- Kernel base = 0xfffff802`d8881000 PsLoadedModuleList = 0xfffff802`d8b80040
- Debug session time: Mon Jul 31 23:28:30.116 2017 (UTC - 4:00)
- System Uptime: 0 days 13:23:28.777
- BugCheck 13A, {3, fffff6a443600000, fffff6a443690b40, 0}
- Probably caused by : win32kbase.sys ( win32kbase!HMFreeObject+168 )
- Followup: MachineOwner
- KERNEL_MODE_HEAP_CORRUPTION (13a)
- The kernel mode heap manager has detected corruption in a heap.
- Arguments:
- Arg1: 0000000000000003, A corrupt entry header was detected.
- Arg2: fffff6a443600000, Address of the heap that reported the corruption
- Arg3: fffff6a443690b40, Address at which the corruption was detected
- Arg4: 0000000000000000
- Debugging Details:
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 10.0.14393.1480 (rs1_release.170706-2004)
- SYSTEM_MANUFACTURER: MSI
- SYSTEM_PRODUCT_NAME: MS-7816
- SYSTEM_VERSION: 2.0
- BIOS_VENDOR: American Megatrends Inc.
- BIOS_VERSION: V10.3
- BIOS_DATE: 12/03/2013
- BASEBOARD_MANUFACTURER: MSI
- BASEBOARD_PRODUCT: Z87-G43 GAMING (MS-7816)
- BASEBOARD_VERSION: 2.0
- DUMP_TYPE: 2
- CPU_COUNT: 4
- CPU_MHZ: c80
- CPU_VENDOR: GenuineIntel
- CPU_FAMILY: 6
- CPU_MODEL: 3c
- CPU_STEPPING: 3
- CPU_MICROCODE: 6,3c,3,0 (F,M,S,R) SIG: 1E'00000000 (cache) 1E'00000000 (init)
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
- BUGCHECK_STR: 0x13A
- PROCESS_NAME: RzSynapse.exe
- CURRENT_IRQL: 0
- LAST_CONTROL_TRANSFER: from fffff802d8a90969 to fffff802d89d0960
- STACK_TEXT:
- ffffa681`60d461c8 fffff802`d8a90969 : 00000000`0000013a 00000000`00000003 fffff6a4`43600000 fffff6a4`43690b40 : nt!KeBugCheckEx
- ffffa681`60d461d0 fffff802`d89cca0d : fffff6a4`43600000 fffff6a4`43690b50 00000000`0000000b 00000000`00000000 : nt!RtlpHeapHandleError+0x29
- ffffa681`60d46210 fffff802`d8a9091c : fffff6a4`43600000 ffffcd84`f8222080 fffff6a4`00000000 00000000`00000000 : nt!RtlpLogHeapFailure+0x8d
- ffffa681`60d46240 fffff802`d8955bb9 : fffff6a4`43600000 fffff6a4`43690b40 fffff6a4`43600000 fffff6a4`436b5d20 : nt!RtlpAnalyzeHeapFailure+0x30c
- ffffa681`60d462a0 fffff802`d89558ec : fffff6a4`43600000 fffff6a4`43690b40 fffff6a4`43690b40 ffff8309`911b9070 : nt!RtlpFreeHeap+0x2ad
- ffffa681`60d46370 fffff802`d8955714 : fffff6a4`4040c270 ffffa681`60d46439 00000000`00000000 fffff6a4`43690b50 : nt!RtlpFreeHeapInternal+0x1c4
- ffffa681`60d463c0 fffff6ea`71a1d028 : 00000000`00000000 fffff6ea`7264a312 00000000`00000000 0001081a`40000014 : nt!RtlFreeHeap+0x30
- ffffa681`60d46400 fffff6ea`72611832 : ffffcd84`f129bcb0 ffffcd84`f129bcb0 ffffa681`60d46499 fffff6a4`43690b50 : win32kbase!HMFreeObject+0x168
- ffffa681`60d46440 fffff6ea`72652707 : fffff6a4`43690b50 00000000`00080080 00000000`00000001 fffff6a4`42aa3010 : win32kfull!xxxFreeWindow+0xe86
- ffffa681`60d46500 fffff6ea`726a57e1 : ffff8309`00000000 00000000`00000000 00000000`00000000 fffff6a4`43690b50 : win32kfull!xxxDestroyWindow+0x2e7
- ffffa681`60d465d0 fffff6ea`726525f7 : fffff6a4`43662b70 ffffa681`60d46689 00000000`00000000 fffff6a4`42aa3010 : win32kfull!xxxDW_DestroyOwnedWindows+0xe5
- ffffa681`60d46620 fffff6ea`726a57e1 : 00010010`00000000 fffff6ea`00000000 fffff6a4`00000000 fffff6a4`43662b70 : win32kfull!xxxDestroyWindow+0x1d7
- ffffa681`60d466f0 fffff6ea`726525f7 : fffff6a4`43622550 ffffa681`60d467a9 00000000`00000000 fffff6a4`42aa3010 : win32kfull!xxxDW_DestroyOwnedWindows+0xe5
- ffffa681`60d46740 fffff6ea`71a5cf5c : ffffcd84`00000000 00000000`00000001 fffff6a4`00000000 fffff6a4`43622550 : win32kfull!xxxDestroyWindow+0x1d7
- ffffa681`60d46810 fffff6ea`71a1cd3a : fffff6a4`42aa3010 ffffa681`60d46940 fffff6a4`42aa3010 fffff6a4`43366370 : win32kbase!xxxDestroyWindowIfSupported+0x1c
- ffffa681`60d46840 fffff6ea`71a1d5b1 : 00000000`00000000 00000000`0000022c fffff6a4`4319d000 fffff6a4`42aa3010 : win32kbase!HMDestroyUnlockedObject+0x4a
- ffffa681`60d46870 fffff6ea`71a1b060 : 00000000`00000000 00000000`00000000 fffff6a4`42aa3010 00000000`00000000 : win32kbase!DestroyThreadsObjects+0xf1
- ffffa681`60d468a0 fffff6ea`71a1bdd6 : 00000000`00000001 fffff6a4`42aa3010 00000000`00000000 fffff6a4`42aa3010 : win32kbase!xxxDestroyThreadInfo+0x374
- ffffa681`60d46a10 fffff6ea`726a88b4 : 00000000`00000000 00000000`00000001 ffffcd84`f8222080 00000000`00000001 : win32kbase!UserThreadCallout+0x296
- ffffa681`60d46a60 fffff6ea`71a3a427 : ffffa681`60d46bb8 fffff802`d8b7a260 00000000`00000000 ffffcd84`ebfee300 : win32kfull!W32pThreadCallout+0x54
- ffffa681`60d46a90 fffff802`d8cb9337 : ffffa681`60d46bb8 fffff802`d8b7a260 00060030`00010002 00000000`00000000 : win32kbase!W32CalloutDispatch+0x147
- ffffa681`60d46ad0 fffff802`d8cf059d : ffffcd84`f4a3f300 ffffa681`60d46b40 00000000`00000000 ffffcd84`f8222080 : nt!ExCallCallBack+0x37
- ffffa681`60d46b00 fffff802`d8d384ce : 00070000`40010004 ffffcd84`f8222080 ffffa681`60d46e40 ffffcd84`f8222128 : nt!PspExitThread+0x3e9
- ffffa681`60d46c40 fffff802`d88bc842 : 00000000`00000000 00000000`00000000 00000000`00000100 ffffa681`60d46d00 : nt!KiSchedulerApcTerminate+0x2e
- ffffa681`60d46c70 fffff802`d89d3fe0 : 00000000`011bd158 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x2f2
- ffffa681`60d46d00 fffff802`d89db73a : ffffcd84`f8222080 00000000`00000000 ffffcd84`f8222080 00000000`0122a000 : nt!KiInitiateUserApc+0x70
- ffffa681`60d46e40 00007ffc`caa06884 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
- 00000000`010bb0f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`caa06884
- STACK_COMMAND: kb
- THREAD_SHA1_HASH_MOD_FUNC: 5162cd68853ae18396661daa21aff82637887ada
- THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 5f4f4b3cf475b630e87b3f29f8649363017b4ac0
- THREAD_SHA1_HASH_MOD: 686fac4591efb6e916267faf0f08dcfa5871552b
- FOLLOWUP_IP:
- win32kbase!HMFreeObject+168
- fffff6ea`71a1d028 488d4c2440 lea rcx,[rsp+40h]
- FAULT_INSTR_CODE: 244c8d48
- SYMBOL_STACK_INDEX: 7
- SYMBOL_NAME: win32kbase!HMFreeObject+168
- FOLLOWUP_NAME: MachineOwner
- MODULE_NAME: win32kbase
- IMAGE_NAME: win32kbase.sys
- DEBUG_FLR_IMAGE_TIMESTAMP: 595f28fc
- IMAGE_VERSION: 10.0.14393.1480
- BUCKET_ID_FUNC_OFFSET: 168
- FAILURE_BUCKET_ID: 0x13A_win32kbase!HMFreeObject
- BUCKET_ID: 0x13A_win32kbase!HMFreeObject
- PRIMARY_PROBLEM_CLASS: 0x13A_win32kbase!HMFreeObject
- TARGET_TIME: 2017-08-01T03:28:30.000Z
- OSBUILD: 14393
- OSSERVICEPACK: 1480
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 272
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2017-07-07 02:26:09
- BUILDDATESTAMP_STR: 170706-2004
- BUILDLAB_STR: rs1_release
- BUILDOSVER_STR: 10.0.14393.1480
- ANALYSIS_SESSION_ELAPSED_TIME: 9ae
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:0x13a_win32kbase!hmfreeobject
- FAILURE_ID_HASH: {e11c3381-b44d-755a-98fe-68b4002b0a97}
- Followup: MachineOwner
- ========================================================================
- =================== Dump File: 073117-87328-01.dmp ===================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 14393 MP (4 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS
- Built by: 14393.1480.amd64fre.rs1_release.170706-2004
- Kernel base = 0xfffff801`7f677000 PsLoadedModuleList = 0xfffff801`7f976040
- Debug session time: Mon Jul 31 09:55:49.196 2017 (UTC - 4:00)
- System Uptime: 0 days 0:07:44.856
- BugCheck 3B, {c0000005, fffff8017faa0f09, ffffdf002e8b6680, 0}
- Probably caused by : ntkrnlmp.exe ( nt!CmpDoParseKey+eb9 )
- Followup: MachineOwner
- SYSTEM_SERVICE_EXCEPTION (3b)
- An exception happened while executing a system service routine.
- Arguments:
- Arg1: 00000000c0000005, Exception code that caused the bugcheck
- Arg2: fffff8017faa0f09, Address of the instruction which caused the bugcheck
- Arg3: ffffdf002e8b6680, Address of the context record for the exception that caused the bugcheck
- Arg4: 0000000000000000, zero.
- Debugging Details:
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 10.0.14393.1480 (rs1_release.170706-2004)
- SYSTEM_MANUFACTURER: MSI
- SYSTEM_PRODUCT_NAME: MS-7816
- SYSTEM_VERSION: 2.0
- BIOS_VENDOR: American Megatrends Inc.
- BIOS_VERSION: V10.3
- BIOS_DATE: 12/03/2013
- BASEBOARD_MANUFACTURER: MSI
- BASEBOARD_PRODUCT: Z87-G43 GAMING (MS-7816)
- BASEBOARD_VERSION: 2.0
- DUMP_TYPE: 2
- EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
- FAULTING_IP:
- nt!CmpDoParseKey+eb9
- fffff801`7faa0f09 41f7460400001000 test dword ptr [r14+4],100000h
- CONTEXT: ffffdf002e8b6680 -- (.cxr 0xffffdf002e8b6680)
- rax=7fffa601d01965f8 rbx=ffffca8172846460 rcx=0000000000000011
- rdx=0000000000000000 rsi=0000000000000002 rdi=0000000000000011
- rip=fffff8017faa0f09 rsp=ffffdf002e8b7080 rbp=ffffdf002e8b7180
- r8=0000000000000000 r9=0000000000000000 r10=0000000000000000
- r11=0000000000000006 r12=ffffdf002e8b7280 r13=ffffdf002e8b7288
- r14=0000000000000000 r15=0000000000000000
- iopl=0 nv up ei ng nz ac pe cy
- cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010293
- nt!CmpDoParseKey+0xeb9:
- fffff801`7faa0f09 41f7460400001000 test dword ptr [r14+4],100000h ds:002b:00000000`00000004=????????
- Resetting default scope
- CPU_COUNT: 4
- CPU_MHZ: c80
- CPU_VENDOR: GenuineIntel
- CPU_FAMILY: 6
- CPU_MODEL: 3c
- CPU_STEPPING: 3
- CPU_MICROCODE: 6,3c,3,0 (F,M,S,R) SIG: 1E'00000000 (cache) 1E'00000000 (init)
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
- BUGCHECK_STR: 0x3B
- PROCESS_NAME: KillerService.exe
- CURRENT_IRQL: 0
- LAST_CONTROL_TRANSFER: from fffff8017fa746a2 to fffff8017faa0f09
- STACK_TEXT:
- ffffdf00`2e8b7080 fffff801`7fa746a2 : 00000000`00000000 ffffa601`b2bcb320 00000000`00000001 00000000`00000000 : nt!CmpDoParseKey+0xeb9
- ffffdf00`2e8b7450 fffff801`7fa9c441 : fffff801`7fa743a0 ffffa601`b1232c01 ffffdf00`2e8b76f0 ffffa601`b409f001 : nt!CmpParseKey+0x302
- ffffdf00`2e8b75f0 fffff801`7fa7d3ed : ffffca81`742ed301 ffffdf00`2e8b7850 00000000`00000040 ffffca81`67952e30 : nt!ObpLookupObjectName+0xb71
- ffffdf00`2e8b77c0 fffff801`7fa7d0cd : ffffa601`00000001 000000b8`dfedbb00 00000000`00000001 00000000`00000000 : nt!ObOpenObjectByNameEx+0x1dd
- ffffdf00`2e8b7900 fffff801`7fa7aa0f : 00000286`8d670001 00000000`00000000 00000000`00000000 00000000`0a64c058 : nt!CmOpenKey+0x29d
- ffffdf00`2e8b7ac0 fffff801`7f7d1693 : ffffca81`72846080 00000000`0000000a 00000000`00000000 00000000`00000000 : nt!NtOpenKeyEx+0xf
- ffffdf00`2e8b7b00 00007ffa`c9d882f4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
- 000000b8`dfedba28 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`c9d882f4
- THREAD_SHA1_HASH_MOD_FUNC: 862c53fe43f8a98df43bc2882a330a6c6f1e3ceb
- THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 0ba4924a976bcc5247647eef7d448c06fae1698d
- THREAD_SHA1_HASH_MOD: 30a3e915496deaace47137d5b90c3ecc03746bf6
- FOLLOWUP_IP:
- nt!CmpDoParseKey+eb9
- fffff801`7faa0f09 41f7460400001000 test dword ptr [r14+4],100000h
- FAULT_INSTR_CODE: 446f741
- SYMBOL_STACK_INDEX: 0
- SYMBOL_NAME: nt!CmpDoParseKey+eb9
- FOLLOWUP_NAME: MachineOwner
- MODULE_NAME: nt
- IMAGE_NAME: ntkrnlmp.exe
- DEBUG_FLR_IMAGE_TIMESTAMP: 595f2981
- IMAGE_VERSION: 10.0.14393.1480
- STACK_COMMAND: .cxr 0xffffdf002e8b6680 ; kb
- BUCKET_ID_FUNC_OFFSET: eb9
- FAILURE_BUCKET_ID: 0x3B_nt!CmpDoParseKey
- BUCKET_ID: 0x3B_nt!CmpDoParseKey
- PRIMARY_PROBLEM_CLASS: 0x3B_nt!CmpDoParseKey
- TARGET_TIME: 2017-07-31T13:55:49.000Z
- OSBUILD: 14393
- OSSERVICEPACK: 1480
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 272
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2017-07-07 02:26:09
- BUILDDATESTAMP_STR: 170706-2004
- BUILDLAB_STR: rs1_release
- BUILDOSVER_STR: 10.0.14393.1480
- ANALYSIS_SESSION_ELAPSED_TIME: 5341
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:0x3b_nt!cmpdoparsekey
- FAILURE_ID_HASH: {a806c8b5-5067-6f86-24dd-6dbfd96a7e15}
- Followup: MachineOwner
- ========================================================================
- =================== Dump File: 073117-106218-01.dmp ==================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 14393 MP (4 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS
- Built by: 14393.1480.amd64fre.rs1_release.170706-2004
- Kernel base = 0xfffff802`b8e76000 PsLoadedModuleList = 0xfffff802`b9175040
- Debug session time: Mon Jul 31 09:47:10.899 2017 (UTC - 4:00)
- System Uptime: 0 days 7:02:39.560
- BugCheck 1E, {ffffffffc0000005, fffff802b8edb038, 0, 40000}
- Probably caused by : memory_corruption
- Followup: memory_corruption
- KMODE_EXCEPTION_NOT_HANDLED (1e)
- This is a very common bugcheck. Usually the exception address pinpoints
- the driver/function that caused the problem. Always note this address
- as well as the link date of the driver/image that contains this address.
- Arguments:
- Arg1: ffffffffc0000005, The exception code that was not handled
- Arg2: fffff802b8edb038, The address that the exception occurred at
- Arg3: 0000000000000000, Parameter 0 of the exception
- Arg4: 0000000000040000, Parameter 1 of the exception
- Debugging Details:
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 10.0.14393.1480 (rs1_release.170706-2004)
- SYSTEM_MANUFACTURER: MSI
- SYSTEM_PRODUCT_NAME: MS-7816
- SYSTEM_VERSION: 2.0
- BIOS_VENDOR: American Megatrends Inc.
- BIOS_VERSION: V10.3
- BIOS_DATE: 12/03/2013
- BASEBOARD_MANUFACTURER: MSI
- BASEBOARD_PRODUCT: Z87-G43 GAMING (MS-7816)
- BASEBOARD_VERSION: 2.0
- DUMP_TYPE: 2
- READ_ADDRESS: fffff802b9216338: Unable to get MiVisibleState
- 0000000000040000
- EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
- FAULTING_IP:
- nt!MiSubsectionUsingExtents+0
- fffff802`b8edb038 488b01 mov rax,qword ptr [rcx]
- EXCEPTION_PARAMETER2: 0000000000040000
- BUGCHECK_STR: 0x1E_c0000005_R
- CPU_COUNT: 4
- CPU_MHZ: c80
- CPU_VENDOR: GenuineIntel
- CPU_FAMILY: 6
- CPU_MODEL: 3c
- CPU_STEPPING: 3
- CPU_MICROCODE: 6,3c,3,0 (F,M,S,R) SIG: 1E'00000000 (cache) 1E'00000000 (init)
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: CODE_CORRUPTION
- PROCESS_NAME: svchost.exe
- CURRENT_IRQL: 0
- EXCEPTION_RECORD: ffff9080e753e000 -- (.exr 0xffff9080e753e000)
- ExceptionAddress: ffffc58b00000000
- ExceptionCode: 00000000
- ExceptionFlags: 00000000
- NumberParameters: -413932960
- Parameter[0]: ffff93eb1da9b79f
- Parameter[1]: 0000000000040000
- Parameter[2]: 0000000000000000
- Parameter[3]: 0000000000000000
- Parameter[4]: fffffe6b0373d008
- Parameter[5]: 0000000000001011
- Parameter[6]: ffffc58b39c5ac40
- Parameter[7]: ffff9080e753e1b8
- Parameter[8]: fffffe6b0373d008
- Parameter[9]: 0000000010000004
- Parameter[10]: ffff9080e753e2e0
- Parameter[11]: fffff802b8fd0c0e
- Parameter[12]: ffff9080e753e000
- Parameter[13]: ffffc58b00000000
- Parameter[14]: ffffd6064cb08438
- TRAP_FRAME: ffffd6064cb08438 -- (.trap 0xffffd6064cb08438)
- Unable to read trap frame at ffffd606`4cb08438
- LAST_CONTROL_TRANSFER: from fffff802b8f1e270 to fffff802b8fc5960
- STACK_TEXT:
- ffff9080`e753d9b8 fffff802`b8f1e270 : 00000000`0000001e ffffffff`c0000005 fffff802`b8edb038 00000000`00000000 : nt!KeBugCheckEx
- ffff9080`e753d9c0 fffff802`b8fd0c0e : ffff9080`e753e000 ffffc58b`00000000 ffffd606`4cb08438 00000000`00000000 : nt!KiDispatchException+0x220
- ffff9080`e753e080 fffff802`b8fcf0e1 : 00000000`00000001 ffff9080`e753e3c0 d9200002`93561921 00000000`00000000 : nt!KiExceptionDispatch+0xce
- ffff9080`e753e260 fffff802`b8edb038 : fffff802`b8ec3172 00000000`00000001 ffffe700`000651c0 ffff9080`e753e500 : nt!KiPageFault+0x221
- ffff9080`e753e3f8 fffff802`b8ec3172 : 00000000`00000001 ffffe700`000651c0 ffff9080`e753e500 fffffe6b`0328f9a8 : nt!MiSubsectionUsingExtents
- ffff9080`e753e400 fffff802`b8ec2c75 : ffffc58b`437faf10 00000000`00000001 00000000`00000000 ffffa20b`dcbb8548 : nt!MmCheckCachedPageStates+0x412
- ffff9080`e753e5b0 fffff802`b9296ab7 : ffffc58b`00000000 00000000`00000000 ffff9080`e753e601 00000000`00000001 : nt!CcMapAndRead+0xe5
- ffff9080`e753e610 fffff807`3630d465 : ffffc58b`3faba838 ffffc58b`42fc0638 ffffc58b`38df2180 fffff802`0003f000 : nt!CcMapData+0x97
- ffff9080`e753e680 fffff807`3630d105 : ffffd606`8c680108 ffffd606`8c680170 ffffd606`8c6801e0 ffffd606`8c680248 : NTFS!NtfsReadMftRecord+0xe5
- ffff9080`e753e790 fffff807`3630ccf0 : 00000000`00000001 fffff802`b90beb45 ffff9080`e7530111 ffffe700`06c9a1a0 : NTFS!NtfsReadFileRecord+0xf5
- ffff9080`e753e8a0 fffff807`3630bb29 : ffffa20b`dcbb8540 00000000`00000012 ffffc58b`42fc0638 ffffc58b`38df2180 : NTFS!NtfsLookupInFileRecord+0x70
- ffff9080`e753e950 fffff807`3633f41f : ffffc58b`42fc0638 00000000`00000000 00000000`00000000 ffffa20b`dcbb8540 : NTFS!NtfsUpdateFcbInfoFromDisk+0xe9
- ffff9080`e753ead0 fffff807`36359351 : ffffd606`8c680340 00000000`00000012 ffffa20b`d7fc5230 ffff9080`e8c581f0 : NTFS!NtfsOpenFile+0x37f
- ffff9080`e753ed10 fffff807`36357ffd : ffffc58b`42fc0638 ffffc58b`351b0010 ffff9080`e8c581f0 ffffc58b`403ed000 : NTFS!NtfsCommonCreate+0x1071
- ffff9080`e753ef50 fffff802`b8fc87f7 : ffff9080`e8c58180 00000000`00000012 ffffc58b`43255080 ffff9080`e6f1fb50 : NTFS!NtfsCommonCreateCallout+0x1d
- ffff9080`e753ef80 fffff802`b8fc87bd : 00000000`00006000 ffff9080`e753f000 ffffc58b`403ed040 fffff802`b8f123b4 : nt!KxSwitchKernelStackCallout+0x27
- ffff9080`e8c57fc0 fffff802`b8f123b4 : 00000000`00000012 00000000`00006000 00000000`00000000 fffff807`00000006 : nt!KiSwitchKernelStackContinue
- ffff9080`e8c57fe0 fffff802`b8f12126 : ffff9080`e8c53000 00000000`00006000 00000000`00000000 ffff9080`e8c58060 : nt!KiExpandKernelStackAndCalloutOnStackSegment+0x134
- ffff9080`e8c58060 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExpandKernelStackAndCalloutSwitchStack+0xa6
- STACK_COMMAND: kb
- CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
- fffff802b8eb4152-fffff802b8eb4154 3 bytes - nt!MI_IS_PHYSICAL_ADDRESS+22
- [ 40 fb f6:00 7f fe ]
- fffff802b8eb4160-fffff802b8eb4161 2 bytes - nt!MI_IS_PHYSICAL_ADDRESS+30 (+0x0e)
- [ 80 f6:00 fe ]
- fffff802b8ec31d2-fffff802b8ec31d3 2 bytes - nt!MmCheckCachedPageStates+472 (+0xf072)
- [ 80 f6:00 fe ]
- fffff802b8edbc5b-fffff802b8edbc5c 2 bytes - nt!MiResolveMappedFileFault+55b (+0x18a89)
- [ 80 fa:00 e7 ]
- fffff802b8edbe96-fffff802b8edbe97 2 bytes - nt!MiFindNonPagedPoolPages+a6 (+0x23b)
- [ 80 fa:00 e7 ]
- fffff802b8ee7f27-fffff802b8ee7f28 2 bytes - nt!MiUnlinkPageFromList+4e7 (+0xc091)
- [ 80 fa:00 e7 ]
- 13 errors : !nt (fffff802b8eb4152-fffff802b8ee7f28)
- MODULE_NAME: memory_corruption
- IMAGE_NAME: memory_corruption
- FOLLOWUP_NAME: memory_corruption
- DEBUG_FLR_IMAGE_TIMESTAMP: 0
- MEMORY_CORRUPTOR: LARGE
- FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
- BUCKET_ID: MEMORY_CORRUPTION_LARGE
- PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
- TARGET_TIME: 2017-07-31T13:47:10.000Z
- OSBUILD: 14393
- OSSERVICEPACK: 1480
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 272
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2017-07-07 02:26:09
- BUILDDATESTAMP_STR: 170706-2004
- BUILDLAB_STR: rs1_release
- BUILDOSVER_STR: 10.0.14393.1480
- ANALYSIS_SESSION_ELAPSED_TIME: 298f
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:memory_corruption_large
- FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
- Followup: memory_corruption
- ========================================================================
- =================== Dump File: 072717-134343-01.dmp ==================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 14393 MP (4 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS Personal
- Built by: 14393.1480.amd64fre.rs1_release.170706-2004
- Kernel base = 0xfffff802`27402000 PsLoadedModuleList = 0xfffff802`27701040
- Debug session time: Thu Jul 27 11:19:07.832 2017 (UTC - 4:00)
- System Uptime: 0 days 0:01:59.493
- BugCheck 1E, {ffffffffc000001d, fffff8022741ac9f, ffffe00dbba10800, 0}
- Probably caused by : ntkrnlmp.exe ( nt!KiQueueReadyThread+46f )
- Followup: MachineOwner
- KMODE_EXCEPTION_NOT_HANDLED (1e)
- This is a very common bugcheck. Usually the exception address pinpoints
- the driver/function that caused the problem. Always note this address
- as well as the link date of the driver/image that contains this address.
- Arguments:
- Arg1: ffffffffc000001d, The exception code that was not handled
- Arg2: fffff8022741ac9f, The address that the exception occurred at
- Arg3: ffffe00dbba10800, Parameter 0 of the exception
- Arg4: 0000000000000000, Parameter 1 of the exception
- Debugging Details:
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 10.0.14393.1480 (rs1_release.170706-2004)
- SYSTEM_MANUFACTURER: MSI
- SYSTEM_PRODUCT_NAME: MS-7816
- SYSTEM_VERSION: 2.0
- BIOS_VENDOR: American Megatrends Inc.
- BIOS_VERSION: V10.3
- BIOS_DATE: 12/03/2013
- BASEBOARD_MANUFACTURER: MSI
- BASEBOARD_PRODUCT: Z87-G43 GAMING (MS-7816)
- BASEBOARD_VERSION: 2.0
- DUMP_TYPE: 2
- EXCEPTION_CODE: (NTSTATUS) 0xc000001d - {EXCEPTION} Illegal Instruction An attempt was made to execute an illegal instruction.
- FAULTING_IP:
- nt!KiQueueReadyThread+46f
- fffff802`2741ac9f 06 ???
- EXCEPTION_PARAMETER1: ffffe00dbba10800
- BUGCHECK_STR: 0x1E_c000001d
- CPU_COUNT: 4
- CPU_MHZ: c80
- CPU_VENDOR: GenuineIntel
- CPU_FAMILY: 6
- CPU_MODEL: 3c
- CPU_STEPPING: 3
- CPU_MICROCODE: 6,3c,3,0 (F,M,S,R) SIG: 1E'00000000 (cache) 1E'00000000 (init)
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
- PROCESS_NAME: GWCtlSrv.exe
- CURRENT_IRQL: 2
- EXCEPTION_RECORD: 0000000000000001 -- (.exr 0x1)
- Cannot read Exception record @ 0000000000000001
- TRAP_FRAME: ffffe00db98c3180 -- (.trap 0xffffe00db98c3180)
- Unable to read trap frame at ffffe00d`b98c3180
- LAST_CONTROL_TRANSFER: from fffff802274aa270 to fffff80227551960
- FAILED_INSTRUCTION_ADDRESS:
- nt!KiQueueReadyThread+46f
- fffff802`2741ac9f 06 ???
- STACK_TEXT:
- ffffca00`9d196e58 fffff802`274aa270 : 00000000`0000001e ffffffff`c000001d fffff802`2741ac9f ffffe00d`bba10800 : nt!KeBugCheckEx
- ffffca00`9d196e60 fffff802`2755cc0e : 00000000`00000001 fffff802`bb3ef261 ffffe00d`b98c3180 ffffe00d`bb39fa00 : nt!KiDispatchException+0x220
- ffffca00`9d197520 fffff802`2755a706 : ffffca00`98b99180 fffff802`27556d4f 00000000`161f9e0e ffffe00d`bba10800 : nt!KiExceptionDispatch+0xce
- ffffca00`9d197700 fffff802`2741ac9f : ffffca00`00000000 00000000`00000001 ffffffff`ffd01d90 ffffe00d`bb9d8801 : nt!KiInvalidOpcodeFault+0x106
- ffffca00`9d197890 ffffa68b`ad972ee4 : ffffe00d`bba10900 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiQueueReadyThread+0x46f
- ffffca00`9d197900 ffffe00d`bba10900 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff802`2773e180 : 0xffffa68b`ad972ee4
- ffffca00`9d197908 00000000`00000000 : 00000000`00000000 00000000`00000000 fffff802`2773e180 00000000`00000000 : 0xffffe00d`bba10900
- STACK_COMMAND: kb
- THREAD_SHA1_HASH_MOD_FUNC: 5fd0f25bde73ee6d7e9fa086227fe937f01a0696
- THREAD_SHA1_HASH_MOD_FUNC_OFFSET: eaeaa87ccc3a5e7744c25446aba97aee7557053a
- THREAD_SHA1_HASH_MOD: f08ac56120cad14894587db086f77ce277bfae84
- FOLLOWUP_IP:
- nt!KiQueueReadyThread+46f
- fffff802`2741ac9f 06 ???
- FAULT_INSTR_CODE: c0854806
- SYMBOL_STACK_INDEX: 4
- SYMBOL_NAME: nt!KiQueueReadyThread+46f
- FOLLOWUP_NAME: MachineOwner
- MODULE_NAME: nt
- IMAGE_NAME: ntkrnlmp.exe
- DEBUG_FLR_IMAGE_TIMESTAMP: 595f2981
- IMAGE_VERSION: 10.0.14393.1480
- BUCKET_ID_FUNC_OFFSET: 46f
- FAILURE_BUCKET_ID: 0x1E_c000001d_BAD_IP_nt!KiQueueReadyThread
- BUCKET_ID: 0x1E_c000001d_BAD_IP_nt!KiQueueReadyThread
- PRIMARY_PROBLEM_CLASS: 0x1E_c000001d_BAD_IP_nt!KiQueueReadyThread
- TARGET_TIME: 2017-07-27T15:19:07.000Z
- OSBUILD: 14393
- OSSERVICEPACK: 1480
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 784
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2017-07-07 02:26:09
- BUILDDATESTAMP_STR: 170706-2004
- BUILDLAB_STR: rs1_release
- BUILDOSVER_STR: 10.0.14393.1480
- ANALYSIS_SESSION_ELAPSED_TIME: 7787
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:0x1e_c000001d_bad_ip_nt!kiqueuereadythread
- FAILURE_ID_HASH: {541d0d27-0402-a98f-a025-944afd9b4ba5}
- Followup: MachineOwner
- ========================================================================
- =================== Dump File: 072817-122609-01.dmp ==================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 14393 MP (4 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS
- Built by: 14393.1480.amd64fre.rs1_release.170706-2004
- Kernel base = 0xfffff802`b648a000 PsLoadedModuleList = 0xfffff802`b6789040
- Debug session time: Fri Jul 28 17:40:01.502 2017 (UTC - 4:00)
- System Uptime: 1 days 2:40:17.164
- BugCheck 1000007E, {ffffffffc0000005, fffff802b64c275c, ffffd880a5e638c8, ffffd880a5e63100}
- *** WARNING: Unable to verify timestamp for win32k.sys
- *** ERROR: Module load completed but symbols could not be loaded for win32k.sys
- Probably caused by : memory_corruption
- Followup: memory_corruption
- SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
- This is a very common bugcheck. Usually the exception address pinpoints
- the driver/function that caused the problem. Always note this address
- as well as the link date of the driver/image that contains this address.
- Some common problems are exception code 0x80000003. This means a hard
- coded breakpoint or assertion was hit, but this system was booted
- /NODEBUG. This is not supposed to happen as developers should never have
- hardcoded breakpoints in retail code, but ...
- If this happens, make sure a debugger gets connected, and the
- system is booted /DEBUG. This will let us see why this breakpoint is
- happening.
- Arguments:
- Arg1: ffffffffc0000005, The exception code that was not handled
- Arg2: fffff802b64c275c, The address that the exception occurred at
- Arg3: ffffd880a5e638c8, Exception Record Address
- Arg4: ffffd880a5e63100, Context Record Address
- Debugging Details:
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 10.0.14393.1480 (rs1_release.170706-2004)
- SYSTEM_MANUFACTURER: MSI
- SYSTEM_PRODUCT_NAME: MS-7816
- SYSTEM_VERSION: 2.0
- BIOS_VENDOR: American Megatrends Inc.
- BIOS_VERSION: V10.3
- BIOS_DATE: 12/03/2013
- BASEBOARD_MANUFACTURER: MSI
- BASEBOARD_PRODUCT: Z87-G43 GAMING (MS-7816)
- BASEBOARD_VERSION: 2.0
- DUMP_TYPE: 2
- EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
- FAULTING_IP:
- nt!KiCommitThreadWait+16c
- fffff802`b64c275c c3 ret
- EXCEPTION_RECORD: ffffd880a5e638c8 -- (.exr 0xffffd880a5e638c8)
- ExceptionAddress: fffff802b64c275c (nt!KiCommitThreadWait+0x000000000000016c)
- ExceptionCode: c0000005 (Access violation)
- ExceptionFlags: 00000000
- NumberParameters: 2
- Parameter[0]: 0000000000000000
- Parameter[1]: ffffffffffffffff
- Attempt to read from address ffffffffffffffff
- CONTEXT: ffffd880a5e63100 -- (.cxr 0xffffd880a5e63100)
- rax=ffffb00c36719af8 rbx=ffffb00c4a2b1800 rcx=12d4b7fb5b630000
- rdx=0000000000000000 rsi=fffff802b6840280 rdi=0000000000000000
- rip=fffff802b64c275c rsp=ffffd880a5e63b08 rbp=0000000000000000
- r8=0000000000000000 r9=0000000000000004 r10=0000000000000000
- r11=fffff802b65e5c4f r12=0000000000000000 r13=0000000000000000
- r14=ffffb00c4a2b1940 r15=0000000000000000
- iopl=0 nv up ei ng nz na pe nc
- cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010282
- nt!KiCommitThreadWait+0x16c:
- fffff802`b64c275c c3 ret
- Resetting default scope
- CPU_COUNT: 4
- CPU_MHZ: c80
- CPU_VENDOR: GenuineIntel
- CPU_FAMILY: 6
- CPU_MODEL: 3c
- CPU_STEPPING: 3
- CPU_MICROCODE: 6,3c,3,0 (F,M,S,R) SIG: 1E'00000000 (cache) 1E'00000000 (init)
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: CODE_CORRUPTION
- PROCESS_NAME: System
- CURRENT_IRQL: 0
- ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
- EXCEPTION_CODE_STR: c0000005
- EXCEPTION_PARAMETER1: 0000000000000000
- EXCEPTION_PARAMETER2: ffffffffffffffff
- FOLLOWUP_IP:
- nt!KiCommitThreadWait+16c
- fffff802`b64c275c c3 ret
- READ_ADDRESS: fffff802b682a338: Unable to get MiVisibleState
- ffffffffffffffff
- BUGCHECK_STR: AV
- LAST_CONTROL_TRANSFER: from ffeff802b64f0937 to fffff802b64c275c
- STACK_TEXT:
- ffffd880`a5e63b08 ffeff802`b64f0937 : ffffb00c`00000000 ffffb00c`692f9af0 ffffb00c`692f9ed8 00000000`00000000 : nt!KiCommitThreadWait+0x16c
- ffffd880`a5e63b10 ffffb00c`00000000 : ffffb00c`692f9af0 ffffb00c`692f9ed8 00000000`00000000 00000063`00000000 : 0xffeff802`b64f0937
- ffffd880`a5e63b18 ffffb00c`692f9af0 : ffffb00c`692f9ed8 00000000`00000000 00000063`00000000 fffff802`b655354c : 0xffffb00c`00000000
- ffffd880`a5e63b20 ffffb00c`692f9ed8 : 00000000`00000000 00000063`00000000 fffff802`b655354c ffffb00c`36719af0 : 0xffffb00c`692f9af0
- ffffd880`a5e63b28 00000000`00000000 : 00000063`00000000 fffff802`b655354c ffffb00c`36719af0 00000000`00000000 : 0xffffb00c`692f9ed8
- CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
- fffff802b64dc9d1 - nt!MiCompletePrivateZeroFault+821
- [ fa:ed ]
- fffff802b64dca94 - nt!MiCompletePrivateZeroFault+8e4 (+0xc3)
- [ fa:ed ]
- fffff802b64dcf22 - nt!MiAllocateWsle+422 (+0x48e)
- [ f6:d6 ]
- fffff802b64e03a4 - nt!MiResolvePageTablePage+54 (+0x3482)
- [ f6:d6 ]
- fffff802b652686f - nt!MmCreateKernelStack+13f (+0x464cb)
- [ f6:d6 ]
- fffff802b65268bf - nt!MmCreateKernelStack+18f (+0x50)
- [ fa:ed ]
- fffff802b659d2de - nt!MiPurgeZeroList+6e (+0x76a1f)
- [ fa:ed ]
- fffff802b66d2388-fffff802b66d2389 2 bytes - nt!ExFreePoolWithTag+388
- [ fb f6:eb d6 ]
- 9 errors : !nt (fffff802b64dc9d1-fffff802b66d2389)
- MODULE_NAME: memory_corruption
- IMAGE_NAME: memory_corruption
- FOLLOWUP_NAME: memory_corruption
- DEBUG_FLR_IMAGE_TIMESTAMP: 0
- MEMORY_CORRUPTOR: LARGE
- STACK_COMMAND: .cxr 0xffffd880a5e63100 ; kb
- FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
- BUCKET_ID: MEMORY_CORRUPTION_LARGE
- PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
- TARGET_TIME: 2017-07-28T21:40:01.000Z
- OSBUILD: 14393
- OSSERVICEPACK: 1480
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 272
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2017-07-07 02:26:09
- BUILDDATESTAMP_STR: 170706-2004
- BUILDLAB_STR: rs1_release
- BUILDOSVER_STR: 10.0.14393.1480
- ANALYSIS_SESSION_ELAPSED_TIME: 9633
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:memory_corruption_large
- FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
- Followup: memory_corruption
- ========================================================================
- =================== Dump File: 072817-143984-01.dmp ==================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 14393 MP (4 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS
- Built by: 14393.1480.amd64fre.rs1_release.170706-2004
- Kernel base = 0xfffff803`7b808000 PsLoadedModuleList = 0xfffff803`7bb07040
- Debug session time: Fri Jul 28 19:31:18.738 2017 (UTC - 4:00)
- System Uptime: 0 days 0:18:46.400
- BugCheck 4E, {99, 2d1414, 2, e0004000040431c}
- *** WARNING: Unable to verify timestamp for ampse.sys
- *** ERROR: Module load completed but symbols could not be loaded for ampse.sys
- Probably caused by : memory_corruption
- Followup: memory_corruption
- PFN_LIST_CORRUPT (4e)
- Typically caused by drivers passing bad memory descriptor lists (ie: calling
- MmUnlockPages twice with the same list, etc). If a kernel debugger is
- available get the stack trace.
- Arguments:
- Arg1: 0000000000000099, A PTE or PFN is corrupt
- Arg2: 00000000002d1414, page frame number
- Arg3: 0000000000000002, current page state
- Arg4: 0e0004000040431c, 0
- Debugging Details:
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 10.0.14393.1480 (rs1_release.170706-2004)
- SYSTEM_MANUFACTURER: MSI
- SYSTEM_PRODUCT_NAME: MS-7816
- SYSTEM_VERSION: 2.0
- BIOS_VENDOR: American Megatrends Inc.
- BIOS_VERSION: V10.3
- BIOS_DATE: 12/03/2013
- BASEBOARD_MANUFACTURER: MSI
- BASEBOARD_PRODUCT: Z87-G43 GAMING (MS-7816)
- BASEBOARD_VERSION: 2.0
- DUMP_TYPE: 2
- BUGCHECK_STR: 0x4E_99
- CPU_COUNT: 4
- CPU_MHZ: c80
- CPU_VENDOR: GenuineIntel
- CPU_FAMILY: 6
- CPU_MODEL: 3c
- CPU_STEPPING: 3
- CPU_MICROCODE: 6,3c,3,0 (F,M,S,R) SIG: 1E'00000000 (cache) 1E'00000000 (init)
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: CODE_CORRUPTION
- PROCESS_NAME: dllhost.exe
- CURRENT_IRQL: 2
- LAST_CONTROL_TRANSFER: from fffff8037b97b630 to fffff8037b957960
- STACK_TEXT:
- ffff8a80`fcea1268 fffff803`7b97b630 : 00000000`0000004e 00000000`00000099 00000000`002d1414 00000000`00000002 : nt!KeBugCheckEx
- ffff8a80`fcea1270 fffff803`7b869ca6 : fffff803`00000000 ffffc207`cd06a000 00000000`00000000 ffff8a80`00000000 : nt!MiDeleteValidSystemPage+0x111650
- ffff8a80`fcea12f0 fffff803`7b85294e : fffff803`7bb24c90 fffff803`7b85e2d7 00000000`00000111 ffffffff`ffffffff : nt!MiDeleteSystemPagableVm+0x856
- ffff8a80`fcea14c0 fffff803`7b8182da : ffffc207`00000003 ffffc207`cd071000 ffffc207`cd071000 00000000`00007550 : nt!MiFreePagedPoolPages+0x2de
- ffff8a80`fcea1690 fffff803`7ba504f5 : ffffc207`cd069000 ffff8a80`fcea17a0 00000000`00000000 00000000`00000001 : nt!ExFreeLargePool+0x5ba
- ffff8a80`fcea1760 fffff80b`dfb58d9a : ffffc207`cd069000 fffff80b`dfa17ba2 00000000`00000004 00000000`00000000 : nt!ExFreePoolWithTag+0x4f5
- ffff8a80`fcea1840 ffffc207`cd069000 : fffff80b`dfa17ba2 00000000`00000004 00000000`00000000 ffffc207`cd069000 : ampse+0x158d9a
- ffff8a80`fcea1848 fffff80b`dfa17ba2 : 00000000`00000004 00000000`00000000 ffffc207`cd069000 00000000`00007541 : 0xffffc207`cd069000
- ffff8a80`fcea1850 00000000`00000004 : 00000000`00000000 ffffc207`cd069000 00000000`00007541 00000000`000002ea : ampse+0x17ba2
- ffff8a80`fcea1858 00000000`00000000 : ffffc207`cd069000 00000000`00007541 00000000`000002ea fffff80b`dfaac8fe : 0x4
- STACK_COMMAND: kb
- CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
- fffff8037b85e3a3-fffff8037b85e3a4 2 bytes - nt!MiResolvePageTablePage+53
- [ 80 f6:00 fe ]
- fffff8037b91b2dd-fffff8037b91b2de 2 bytes - nt!MiPurgeZeroList+6d (+0xbcf3a)
- [ 80 fa:00 83 ]
- 4 errors : !nt (fffff8037b85e3a3-fffff8037b91b2de)
- MODULE_NAME: memory_corruption
- IMAGE_NAME: memory_corruption
- FOLLOWUP_NAME: memory_corruption
- DEBUG_FLR_IMAGE_TIMESTAMP: 0
- MEMORY_CORRUPTOR: LARGE
- FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
- BUCKET_ID: MEMORY_CORRUPTION_LARGE
- PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
- TARGET_TIME: 2017-07-28T23:31:18.000Z
- OSBUILD: 14393
- OSSERVICEPACK: 1480
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 272
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2017-07-07 02:26:09
- BUILDDATESTAMP_STR: 170706-2004
- BUILDLAB_STR: rs1_release
- BUILDOSVER_STR: 10.0.14393.1480
- ANALYSIS_SESSION_ELAPSED_TIME: 2af6
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:memory_corruption_large
- FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
- Followup: memory_corruption
- ========================================================================
- =================== Dump File: 073017-68312-01.dmp ===================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 14393 MP (4 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS
- Built by: 14393.1480.amd64fre.rs1_release.170706-2004
- Kernel base = 0xfffff800`f2a7e000 PsLoadedModuleList = 0xfffff800`f2d7d040
- Debug session time: Sun Jul 30 21:14:23.929 2017 (UTC - 4:00)
- System Uptime: 2 days 1:42:03.590
- BugCheck 3B, {c0000005, fffff800f2ac0a30, ffff8280bf80ed30, 0}
- Probably caused by : memory_corruption
- Followup: memory_corruption
- SYSTEM_SERVICE_EXCEPTION (3b)
- An exception happened while executing a system service routine.
- Arguments:
- Arg1: 00000000c0000005, Exception code that caused the bugcheck
- Arg2: fffff800f2ac0a30, Address of the instruction which caused the bugcheck
- Arg3: ffff8280bf80ed30, Address of the context record for the exception that caused the bugcheck
- Arg4: 0000000000000000, zero.
- Debugging Details:
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 10.0.14393.1480 (rs1_release.170706-2004)
- SYSTEM_MANUFACTURER: MSI
- SYSTEM_PRODUCT_NAME: MS-7816
- SYSTEM_VERSION: 2.0
- BIOS_VENDOR: American Megatrends Inc.
- BIOS_VERSION: V10.3
- BIOS_DATE: 12/03/2013
- BASEBOARD_MANUFACTURER: MSI
- BASEBOARD_PRODUCT: Z87-G43 GAMING (MS-7816)
- BASEBOARD_VERSION: 2.0
- DUMP_TYPE: 2
- DUMP_FILE_ATTRIBUTES: 0xc
- Insufficient Dumpfile Size
- Kernel Generated Triage Dump
- EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
- FAULTING_IP:
- nt!MiSectionControlArea+0
- fffff800`f2ac0a30 488b4128 mov rax,qword ptr [rcx+28h]
- CONTEXT: ffff8280bf80ed30 -- (.cxr 0xffff8280bf80ed30)
- rax=0000000000000000 rbx=ffff8280bf80f9a0 rcx=0000000000000000
- rdx=0000000000000000 rsi=0000000000000000 rdi=ffff8280bf80f9f8
- rip=fffff800f2ac0a30 rsp=ffff8280bf80f738 rbp=ffff8280bf80fa40
- r8=ffff8280bf80f9a0 r9=ffff8280bf80f9b8 r10=0000000000000000
- r11=ffff8280bf80f980 r12=ffff8280bf80f9a0 r13=ffffce4280006c00
- r14=0000000000000000 r15=ffffce4284ef0001
- iopl=0 nv up ei ng nz na po nc
- cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010286
- nt!MiSectionControlArea:
- fffff800`f2ac0a30 488b4128 mov rax,qword ptr [rcx+28h] ds:002b:00000000`00000028=????????????????
- Resetting default scope
- CPU_COUNT: 4
- CPU_MHZ: c80
- CPU_VENDOR: GenuineIntel
- CPU_FAMILY: 6
- CPU_MODEL: 3c
- CPU_STEPPING: 3
- CPU_MICROCODE: 6,3c,3,0 (F,M,S,R) SIG: 1E'00000000 (cache) 1E'00000000 (init)
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: CODE_CORRUPTION
- BUGCHECK_STR: 0x3B
- PROCESS_NAME: dwm.exe
- CURRENT_IRQL: 0
- LAST_CONTROL_TRANSFER: from fffff800f2e9d2f6 to fffff800f2ac0a30
- STACK_TEXT:
- ffff8280`bf80f738 fffff800`f2e9d2f6 : 00000000`00000001 ffffa88b`6d282d10 ffff8280`bf80f9d0 ffffbe0e`14b325c0 : nt!MiSectionControlArea
- ffff8280`bf80f740 fffff800`f2ef21f2 : ffffce42`80006c00 00000000`00000000 ffff8280`bf80fa10 00000000`00000028 : nt!MiMapViewOfSection+0xa6
- ffff8280`bf80f8c0 ffffce1b`7b9cf0f5 : 00000000`00400000 fffff800`00000002 ffff8280`00000002 00000000`00000000 : nt!MmMapViewOfSection+0x62
- ffff8280`bf80f930 ffffce1b`7b9dbde6 : 00000000`00000000 ffffce42`830d5600 ffff8280`bf80f9f0 00000000`00000000 : win32kbase!DirectComposition::CBatchSharedMemoryPool::GetUserModeViewAtOffset+0x9d
- ffff8280`bf80f9a0 ffffce1b`7b9ccdda : ffffce42`80006c50 00000000`00000000 00000000`00000000 00000000`00001000 : win32kbase!DirectComposition::CApplicationChannel::GetChannelRDPHeaders+0x32
- ffff8280`bf80f9d0 ffffce1b`7b9cc151 : ffffbe0e`14b588b0 00000000`00a32130 ffff8280`bf80fab8 00000000`00000001 : win32kbase!DirectComposition::CConnection::RetrieveBatches+0x2b2
- ffff8280`bf80fa80 fffff800`f2bd8693 : 00000000`00000004 00000042`4ebff238 00000042`4ebff1a0 ffffce42`80006c50 : win32kbase!NtDCompositionGetConnectionBatch+0x221
- ffff8280`bf80fb00 00007ffb`57d33744 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
- 00000042`4ebff158 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`57d33744
- CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
- fffff800f2ac01be-fffff800f2ac01bf 2 bytes - nt!MiIssueHardFault+1fe
- [ 80 f6:00 fa ]
- fffff800f2ac02d2 - nt!MiIssueHardFault+312 (+0x114)
- [ fa:94 ]
- fffff800f2ac03b3-fffff800f2ac03b5 3 bytes - nt!MiIssueHardFault+3f3 (+0xe1)
- [ 40 fb f6:00 7d fa ]
- fffff800f2ac03f4-fffff800f2ac03f5 2 bytes - nt!MiIssueHardFault+434 (+0x41)
- [ 80 f6:00 fa ]
- fffff800f2ac0495-fffff800f2ac0498 4 bytes - nt!MiIssueHardFault+4d5 (+0xa1)
- [ a0 7d fb f6:80 3e 7d fa ]
- fffff800f2ac04a7-fffff800f2ac04ab 5 bytes - nt!MiIssueHardFault+4e7 (+0x12)
- [ d0 be 7d fb f6:40 9f 3e 7d fa ]
- fffff800f2ac0609 - nt!MiReferenceInPageFile+a9 (+0x162)
- [ fa:94 ]
- fffff800f2ac0b3b-fffff800f2ac0b3c 2 bytes - nt!MiEmptyPageAccessLog+8b (+0x532)
- [ 80 f6:00 fa ]
- fffff800f2ac0d78-fffff800f2ac0d79 2 bytes - nt!MiEmptyPageAccessLog+2c8 (+0x23d)
- [ 80 f6:00 fa ]
- 22 errors : !nt (fffff800f2ac01be-fffff800f2ac0d79)
- MODULE_NAME: memory_corruption
- IMAGE_NAME: memory_corruption
- FOLLOWUP_NAME: memory_corruption
- DEBUG_FLR_IMAGE_TIMESTAMP: 0
- MEMORY_CORRUPTOR: LARGE
- STACK_COMMAND: .cxr 0xffff8280bf80ed30 ; kb
- FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
- BUCKET_ID: MEMORY_CORRUPTION_LARGE
- PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
- TARGET_TIME: 2017-07-31T01:14:23.000Z
- OSBUILD: 14393
- OSSERVICEPACK: 1480
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 272
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2017-07-07 02:26:09
- BUILDDATESTAMP_STR: 170706-2004
- BUILDLAB_STR: rs1_release
- BUILDOSVER_STR: 10.0.14393.1480
- ANALYSIS_SESSION_ELAPSED_TIME: 2a60
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:memory_corruption_large
- FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
- Followup: memory_corruption
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement