Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- ========================== AUTO DUMP ANALYZER ==========================
- Auto Dump Analyzer
- Version: 0.91
- Time to analyze file(s): 00 hours and 00 minutes and 44 seconds
- ================================= CPU ==================================
- COUNT: 8
- MHZ: 4200
- VENDOR: GenuineIntel
- FAMILY: 6
- MODEL: 9e
- STEPPING: 9
- ================================== OS ==================================
- Product: WinNt, suite: TerminalServer SingleUserTS
- Built by: 18362.1.amd64fre.19h1_release.190318-1202
- BUILD_VERSION: 10.0.18362.900 (WinBuild.160101.0800)
- BUILD: 18362
- SERVICEPACK: 900
- PLATFORM_TYPE: x64
- NAME: Windows 10
- EDITION: Windows 10 WinNt TerminalServer SingleUserTS
- BUILD_TIMESTAMP: 2012-07-06 17:22:33
- BUILDDATESTAMP: 160101.0800
- BUILDLAB: WinBuild
- BUILDOSVER: 10.0.18362.900
- =============================== DEBUGGER ===============================
- Microsoft (R) Windows Debugger Version 10.0.14321.1024 AMD64
- Copyright (c) Microsoft Corporation. All rights reserved.
- =============================== COMMENTS ===============================
- * Information gathered from different dump files may be different. If
- Windows updates between two dump files, two or more OS versions may
- be shown above.
- * Additional BIOS information was not included in the dump file(s). This
- can be caused by an outdated BIOS.
- ========================================================================
- ======================= Dump #1: ANALYZE VERBOSE =======================
- ====================== File: 070220-15390-01.dmp =======================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 18362 MP (8 procs) Free x64
- Kernel base = 0xfffff800`36e00000 PsLoadedModuleList = 0xfffff800`37248190
- Debug session time: Thu Jul 2 07:14:47.554 2020 (UTC - 4:00)
- System Uptime: 0 days 0:00:06.267
- BugCheck 5A, {1, ffffba8f4e9f8c50, ffffce06bf0caa90, ffffffffc0000428}
- *************************************************************************
- *** Either you specified an unqualified symbol, or your debugger ***
- *************************************************************************
- Probably caused by : memory_corruption
- Followup: memory_corruption
- CRITICAL_SERVICE_FAILED (5a)
- Arguments:
- Arg1: 0000000000000001
- Arg2: ffffba8f4e9f8c50
- Arg3: ffffce06bf0caa90
- Arg4: ffffffffc0000428
- Debugging Details:
- *************************************************************************
- *** Either you specified an unqualified symbol, or your debugger ***
- *************************************************************************
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- DUMP_TYPE: 2
- BUGCHECK_STR: 0x5A_c0000428
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: CODE_CORRUPTION
- PROCESS_NAME: System
- CURRENT_IRQL: 0
- LAST_CONTROL_TRANSFER: from fffff800375e7113 to fffff80036fc23a0
- STACK_TEXT:
- ffffef0d`e8207828 fffff800`375e7113 : 00000000`0000005a 00000000`00000001 ffffba8f`4e9f8c50 ffffce06`bf0caa90 : nt!KeBugCheckEx
- ffffef0d`e8207830 fffff800`37811f91 : ffffba8f`4effde90 ffffba8f`4effde90 ffffef0d`e8207a80 00000000`00000000 : nt!IopLoadDriver+0xee307
- ffffef0d`e8207a10 fffff800`37811182 : fffff800`00000000 ffffce06`bc8e0110 00000000`00000000 fffff800`31fabca0 : nt!IopInitializeSystemDrivers+0x151
- ffffef0d`e8207ab0 fffff800`37558ac2 : fffff800`31fabca0 fffff800`31fabca0 fffff800`37558a80 fffff800`31fabca0 : nt!IoInitSystem+0x12
- ffffef0d`e8207ae0 fffff800`36f1e135 : ffffba8f`4c6ba040 fffff800`37558a80 fffff800`31fabca0 00000000`00000000 : nt!Phase1Initialization+0x42
- ffffef0d`e8207b10 fffff800`36fc99a8 : fffff800`32365180 ffffba8f`4c6ba040 fffff800`36f1e0e0 00000000`00000000 : nt!PspSystemThreadStartup+0x55
- ffffef0d`e8207b60 00000000`00000000 : ffffef0d`e8208000 ffffef0d`e8201000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
- STACK_COMMAND: kb
- CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
- fffff80037558a8f-fffff80037558a90 2 bytes - nt!Phase1Initialization+f
- [ 48 ff:4c 8b ]
- fffff80037558a96-fffff80037558a9a 5 bytes - nt!Phase1Initialization+16 (+0x07)
- [ 0f 1f 44 00 00:e8 d5 4d 80 ff ]
- 7 errors : !nt (fffff80037558a8f-fffff80037558a9a)
- MODULE_NAME: memory_corruption
- IMAGE_NAME: memory_corruption
- FOLLOWUP_NAME: memory_corruption
- DEBUG_FLR_IMAGE_TIMESTAMP: 0
- MEMORY_CORRUPTOR: LARGE
- FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
- BUCKET_ID: MEMORY_CORRUPTION_LARGE
- PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
- TARGET_TIME: 2020-07-02T11:14:47.000Z
- SUITE_MASK: 272
- PRODUCT_TYPE: 1
- USER_LCID: 0
- FAILURE_ID_HASH_STRING: km:memory_corruption_large
- FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
- Followup: memory_corruption
- ====================== Dump #1: 3RD PARTY DRIVERS ======================
- Oct 17 2011 - PxHlpa64.sys - Sonic CD/DVD driver
- Jul 15 2016 - FNETHYRAMAS.SYS - Hybr Ram (FNet Co., Ltd.) http://www.gotofnet.com/
- Oct 12 2017 - iaStorA.sys - Intel SATA Storage Device RAID Controller
- Jan 09 2020 - ccSetx64.sys - Common Client Settings driver (Symantec Security Technoligies) http://www.symantec.com/
- Feb 11 2020 - SYMEFASI64.SYS - Symantec Extended File Attributes (SI) https://www.symantec.com/
- ================== Dump #1: 3RD PARTY DRIVERS (FULL) ===================
- Image path: \SystemRoot\System32\Drivers\PxHlpa64.sys
- Image name: PxHlpa64.sys
- Search : https://www.google.com/search?q=PxHlpa64.sys
- ADA Info : Sonic CD/DVD driver
- Timestamp : Mon Oct 17 2011
- Image path: \SystemRoot\System32\drivers\FNETHYRAMAS.SYS
- Image name: FNETHYRAMAS.SYS
- Search : https://www.google.com/search?q=FNETHYRAMAS.SYS
- ADA Info : Hybr Ram (FNet Co., Ltd.) http://www.gotofnet.com/
- Timestamp : Fri Jul 15 2016
- Image path: \SystemRoot\System32\drivers\iaStorA.sys
- Image name: iaStorA.sys
- Search : https://www.google.com/search?q=iaStorA.sys
- ADA Info : Intel SATA Storage Device RAID Controller
- Timestamp : Thu Oct 12 2017
- Image path: \SystemRoot\System32\drivers\NGCx64\1614040.039\ccSetx64.sys
- Image name: ccSetx64.sys
- Search : https://www.google.com/search?q=ccSetx64.sys
- ADA Info : Common Client Settings driver (Symantec Security Technoligies) http://www.symantec.com/
- Timestamp : Thu Jan 9 2020
- Image path: \SystemRoot\System32\drivers\NGCx64\1614040.039\SYMEFASI64.SYS
- Image name: SYMEFASI64.SYS
- Search : https://www.google.com/search?q=SYMEFASI64.SYS
- ADA Info : Symantec Extended File Attributes (SI) https://www.symantec.com/
- Timestamp : Tue Feb 11 2020
- ====================== Dump #1: MICROSOFT DRIVERS ======================
- ACPI.sys ACPI Driver for NT (Microsoft)
- acpiex.sys ACPIEx Driver (Microsoft)
- BOOTVID.dll VGA Boot Driver (Microsoft)
- cdrom.sys SCSI CD-ROM Driver (Microsoft)
- CEA.sys Event Aggregation Kernal Mode Library (Microsoft)
- CI.dll Code Integrity Module (Microsoft)
- CLASSPNP.SYS SCSI Class System Dll (Microsoft)
- CLFS.SYS Common Log File System Driver (Microsoft)
- clipsp.sys CLIP Service (Microsoft)
- cmimcext.sys Kernal Configuration Manager Initial Con. Driver (Microsoft)
- cng.sys Kernal Cryptography, Next Generation Driver (Microsoft)
- crashdmp.sys Crash Dump driver (Microsoft)
- disk.sys PnP Disk Driver (Microsoft)
- dump_diskdump.sys (Generic Description) dump_*.sys drivers usually provide disk access during a crash to write dump files.
- dump_dumpfve.sys (Generic Description) dump_*.sys drivers usually provide disk access during a crash to write dump files.
- dump_iaStorA.sys (Generic Description) dump_*.sys drivers usually provide disk access during a crash to write dump files.
- EhStorClass.sys Enhanced Storage Class driver for IEEE... (Microsoft)
- fileinfo.sys FileInfo Filter Driver (Microsoft)
- FLTMGR.SYS Filesystem Filter Manager (Microsoft)
- Fs_Rec.sys File System Recognizer Driver (Microsoft)
- fvevol.sys BitLocker Driver Encryption Driver (Microsoft)
- fwpkclnt.sys FWP/IPsec Kernal-Mode API (Microsoft)
- hal.dll Hardware Abstraction Layer DLL (Microsoft)
- intelpep.sys Intel Power Engine Plugin (Microsoft)
- iorate.sys I/O rate control Filter (Microsoft)
- kd.dll Local Kernal Debugger (Microsoft)
- ksecdd.sys Kernel Security Support Provider Interface (Microsoft)
- ksecpkg.sys Kernel Security Support Provider Interface Packages (Microsoft)
- mcupdate_GenuineIntel.dll Intel Microcode Update Library (Microsoft)
- mountmgr.sys Mount Point Manager (Microsoft)
- msisadrv.sys ISA Driver (Microsoft)
- msrpc.sys Kernel Remote Procedure Call Provider (Microsoft)
- mssecflt.sys Microsoft Security Events Component file system filter driver (Microsoft)
- mup.sys Multiple UNC Provider driver (Microsoft)
- ndis.sys Network Driver Interface Specification (NDIS) driver (Microsoft)
- NETIO.SYS Network I/O Subsystem (Microsoft)
- Ntfs.sys NT File System Driver (Microsoft)
- ntkrnlmp.exe Windows NT operating system kernel (Microsoft)
- ntosext.sys NTOS Extension Host driver (Microsoft)
- partmgr.sys Partition driver (Microsoft)
- pci.sys NT Plug and Play PCI Enumerator (Microsoft)
- pcw.sys Performance Counter Driver (Microsoft)
- pdc.sys Power Dependency Coordinator Driver (Microsoft)
- PSHED.dll Platform Specific Hardware Error driver (Microsoft)
- rdyboost.sys ReadyBoost Driver (Microsoft)
- SgrmAgent.sys System Guard Runtime Monitor Agent driver (Microsoft)
- SleepStudyHelper.sys Sleep Study Helper driver (Microsoft)
- spaceport.sys Storage Spaces driver (Microsoft)
- storport.sys Storage port driver for use with high-performance buses such as fibre channel buses and RAID adapters. (Microsoft)
- tcpip.sys TCP/IP Protocol driver (Microsoft)
- tm.sys Kernel Transaction Manager driver (Microsoft)
- vdrvroot.sys Virtual Drive Root Enumerator (Microsoft)
- volmgr.sys Volume Manager Driver (Microsoft)
- volmgrx.sys Volume Manager Extension Driver (Microsoft)
- volsnap.sys Volume Shadow Copy driver (Microsoft)
- volume.sys Volume driver (Microsoft)
- Wdf01000.sys Kernel Mode Driver Framework Runtime (Microsoft)
- WDFLDR.SYS Kernel Mode Driver Framework Loader (Microsoft)
- werkernel.sys Windows Error Reporting Kernel driver (Microsoft)
- wfplwfs.sys WPF NDIS Lightweight Filter driver (Microsoft)
- WindowsTrustedRT.sys Windows Trusted Runtime Interface driver (Microsoft)
- WindowsTrustedRTProxy.sys Windows Trusted Runtime Service Proxy driver (Microsoft)
- WMILIB.SYS WMILIB WMI support library DLL (Microsoft)
- Wof.sys Windows Overlay Filter (Microsoft)
- WppRecorder.sys WPP Trace Recorder (Microsoft)
- ====================== Dump #1: UNLOADED MODULES =======================
- fffff800`39030000 fffff800`39039000 MbamElam.sys
- fffff800`39020000 fffff800`3902a000 SymELAM.sys
- fffff800`3ad00000 fffff800`3ad11000 hwpolicy.sys
- ====================== Dump #1: BIOS INFORMATION =======================
- sysinfo: could not find necessary interfaces.
- sysinfo: note that mssmbios.sys must be loaded (XPSP2+).
- ========================== Dump #1: Extra #1 ===========================
- 0: kd> !verifier
- Verify Flags Level 0x00000000
- STANDARD FLAGS:
- [X] (0x00000000) Automatic Checks
- [ ] (0x00000001) Special pool
- [ ] (0x00000002) Force IRQL checking
- [ ] (0x00000008) Pool tracking
- [ ] (0x00000010) I/O verification
- [ ] (0x00000020) Deadlock detection
- [ ] (0x00000080) DMA checking
- [ ] (0x00000100) Security checks
- [ ] (0x00000800) Miscellaneous checks
- [ ] (0x00020000) DDI compliance checking
- ADDITIONAL FLAGS:
- [ ] (0x00000004) Randomized low resources simulation
- [ ] (0x00000200) Force pending I/O requests
- [ ] (0x00000400) IRP logging
- [ ] (0x00002000) Invariant MDL checking for stack
- [ ] (0x00004000) Invariant MDL checking for driver
- [ ] (0x00008000) Power framework delay fuzzing
- [ ] (0x00010000) Port/miniport interface checking
- [ ] (0x00040000) Systematic low resources simulation
- [ ] (0x00080000) DDI compliance checking (additional)
- [ ] (0x00200000) NDIS/WIFI verification
- [ ] (0x00800000) Kernel synchronization delay fuzzing
- [ ] (0x01000000) VM switch verification
- [ ] (0x02000000) Code integrity checks
- [X] Indicates flag is enabled
- Summary of All Verifier Statistics
- RaiseIrqls 0x0
- AcquireSpinLocks 0x0
- Synch Executions 0x0
- Trims 0x0
- Pool Allocations Attempted 0x0
- Pool Allocations Succeeded 0x0
- Pool Allocations Succeeded SpecialPool 0x0
- Pool Allocations With NO TAG 0x0
- Pool Allocations Failed 0x0
- Current paged pool allocations 0x0 for 00000000 bytes
- Peak paged pool allocations 0x0 for 00000000 bytes
- Current nonpaged pool allocations 0x0 for 00000000 bytes
- Peak nonpaged pool allocations 0x0 for 00000000 bytes
- ========================== Dump #1: Extra #2 ===========================
- 0: kd> !thread
- THREAD ffffba8f4c6ba040 Cid 0004.0008 Teb: 0000000000000000 Win32Thread: 0000000000000000 RUNNING on processor 0
- Not impersonating
- GetUlongFromAddress: unable to read from fffff8003722ca14
- Owning Process ffffba8f4c682040 Image: System
- Attached Process N/A Image: N/A
- fffff78000000000: Unable to get shared data
- Wait Start TickCount 401
- Context Switch Count 5753 IdealProcessor: 0
- ReadMemory error: Cannot get nt!KeMaximumIncrement value.
- UserTime 00:00:00.000
- KernelTime 00:00:00.000
- Win32 Start Address nt!Phase1Initialization (0xfffff80037558a80)
- Stack Init ffffef0de8207b90 Current ffffef0de82067a0
- Base ffffef0de8208000 Limit ffffef0de8201000 Call 0000000000000000
- Priority 31 BasePriority 8 PriorityDecrement 0 IoPriority 2 PagePriority 5
- Child-SP RetAddr : Args to Child : Call Site
- ffffef0d`e8207828 fffff800`375e7113 : 00000000`0000005a 00000000`00000001 ffffba8f`4e9f8c50 ffffce06`bf0caa90 : nt!KeBugCheckEx
- ffffef0d`e8207830 fffff800`37811f91 : ffffba8f`4effde90 ffffba8f`4effde90 ffffef0d`e8207a80 00000000`00000000 : nt!IopLoadDriver+0xee307
- ffffef0d`e8207a10 fffff800`37811182 : fffff800`00000000 ffffce06`bc8e0110 00000000`00000000 fffff800`31fabca0 : nt!IopInitializeSystemDrivers+0x151
- ffffef0d`e8207ab0 fffff800`37558ac2 : fffff800`31fabca0 fffff800`31fabca0 fffff800`37558a80 fffff800`31fabca0 : nt!IoInitSystem+0x12
- ffffef0d`e8207ae0 fffff800`36f1e135 : ffffba8f`4c6ba040 fffff800`37558a80 fffff800`31fabca0 00000000`00000000 : nt!Phase1Initialization+0x42
- ffffef0d`e8207b10 fffff800`36fc99a8 : fffff800`32365180 ffffba8f`4c6ba040 fffff800`36f1e0e0 00000000`00000000 : nt!PspSystemThreadStartup+0x55
- ffffef0d`e8207b60 00000000`00000000 : ffffef0d`e8208000 ffffef0d`e8201000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement