Advertisement
Guest User

Untitled

a guest
Jun 3rd, 2017
227
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 28.83 KB | None | 0 0
  1. Microsoft (R) Windows Debugger Version 10.0.14321.1024 AMD64
  2. Copyright (c) Microsoft Corporation. All rights reserved.
  3.  
  4. ========================================================================
  5.  
  6. Gardenman: File 060317-5078-01.dmp was invalid or not a normal minidump.
  7. Gardenman: File 060317-13984-01.dmp was invalid or not a normal minidump.
  8.  
  9. ========================================================================
  10. =================== Dump File: 060317-5046-01.dmp ====================
  11. ========================================================================
  12. Mini Kernel Dump File: Only registers and stack trace are available
  13. Executable search path is:
  14. Windows 10 Kernel Version 15063 MP (8 procs) Free x64
  15. Product: WinNt, suite: TerminalServer SingleUserTS
  16. Built by: 15063.0.amd64fre.rs2_release.170317-1834
  17. Machine Name:
  18. Kernel base = 0xfffff803`c608d000 PsLoadedModuleList = 0xfffff803`c63d95a0
  19. Debug session time: Sat Jun 3 06:38:22.706 2017 (UTC - 4:00)
  20. System Uptime: 0 days 0:00:18.513
  21.  
  22. BugCheck 3B, {c0000005, fffff80bcf326804, ffffbf81919c0220, 0}
  23. *** WARNING: Unable to verify timestamp for nvlddmkm.sys
  24. *** ERROR: Module load completed but symbols could not be loaded for nvlddmkm.sys
  25. Probably caused by : memory_corruption
  26. Followup: memory_corruption
  27. SYSTEM_SERVICE_EXCEPTION (3b)
  28. An exception happened while executing a system service routine.
  29.  
  30. Arguments:
  31. Arg1: 00000000c0000005, Exception code that caused the bugcheck
  32. Arg2: fffff80bcf326804, Address of the instruction which caused the bugcheck
  33. Arg3: ffffbf81919c0220, Address of the context record for the exception that caused the bugcheck
  34. Arg4: 0000000000000000, zero.
  35.  
  36. Debugging Details:
  37. DUMP_CLASS: 1
  38. DUMP_QUALIFIER: 400
  39. BUILD_VERSION_STRING: 10.0.15063.332 (WinBuild.160101.0800)
  40. SYSTEM_MANUFACTURER: System manufacturer
  41. SYSTEM_PRODUCT_NAME: System Product Name
  42. SYSTEM_SKU: SKU
  43. SYSTEM_VERSION: System Version
  44. BIOS_VENDOR: American Megatrends Inc.
  45. BIOS_VERSION: 0604
  46. BIOS_DATE: 12/08/2016
  47. BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
  48. BASEBOARD_PRODUCT: MAXIMUS IX HERO
  49. BASEBOARD_VERSION: Rev 1.xx
  50. DUMP_TYPE: 2
  51. EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
  52. FAULTING_IP:
  53. dxgkrnl!DMMVIDPNTOPOLOGY::GetFirstPath+4
  54. fffff80b`cf326804 488b08 mov rcx,qword ptr [rax]
  55. CONTEXT: ffffbf81919c0220 -- (.cxr 0xffffbf81919c0220)
  56. rax=0003910deb3f57b8 rbx=ffffbf81919c0c90 rcx=0003910deb3f57a0
  57. rdx=ffffbf81919c0c90 rsi=ffffbf81919c0d48 rdi=ffffd10deb3f57a0
  58. rip=fffff80bcf326804 rsp=ffffbf81919c0c28 rbp=0000000000000000
  59. r8=ffffbf81919c0cb0 r9=ffffd10de71f62c0 r10=0000000000000000
  60. r11=fffff80bd218c693 r12=ffffd10de13284b0 r13=0000000000000000
  61. r14=ffffbf81919c0cb0 r15=ffff9a0026df5000
  62. iopl=0 nv up ei pl nz na po cy
  63. cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010207
  64. dxgkrnl!DMMVIDPNTOPOLOGY::GetFirstPath+0x4:
  65. fffff80b`cf326804 488b08 mov rcx,qword ptr [rax] ds:002b:0003910d`eb3f57b8=????????????????
  66. Resetting default scope
  67. CPU_COUNT: 8
  68. CPU_MHZ: 1068
  69. CPU_VENDOR: GenuineIntel
  70. CPU_FAMILY: 6
  71. CPU_MODEL: 9e
  72. CPU_STEPPING: 9
  73. CPU_MICROCODE: 6,9e,9,0 (F,M,S,R) SIG: 42'00000000 (cache) 42'00000000 (init)
  74. CUSTOMER_CRASH_COUNT: 1
  75. DEFAULT_BUCKET_ID: CODE_CORRUPTION
  76. BUGCHECK_STR: 0x3B
  77.  
  78. PROCESS_NAME: CorsairLink4.exe
  79.  
  80. CURRENT_IRQL: 0
  81. ANALYSIS_SESSION_HOST: USERNAME-PC
  82. ANALYSIS_SESSION_TIME: 06-03-2017 15:34:36.0227
  83. ANALYSIS_VERSION: 10.0.14321.1024 amd64fre
  84. LAST_CONTROL_TRANSFER: from fffff80bcf3dd1b6 to fffff80bcf326804
  85. CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
  86. fffff803c60eab03-fffff803c60eab04 2 bytes - nt!MiDeleteValidSystemPage+243
  87. [ 80 f6:00 88 ]
  88. fffff803c60eab21 - nt!MiDeleteValidSystemPage+261 (+0x1e)
  89. [ fa:8b ]
  90. fffff803c6103ca6-fffff803c6103ca7 2 bytes - nt!MiPfnShareCountIsZero+186 (+0x19185)
  91. [ 80 f6:00 88 ]
  92. fffff803c617d532-fffff803c617d534 3 bytes - nt!MiAllocatePoolPages+106 (+0x7988c)
  93. [ 40 fb f6:00 44 88 ]
  94. fffff803c630d373-fffff803c630d375 3 bytes - nt!ExFreePoolWithTag+363
  95. [ 40 fb f6:00 44 88 ]
  96. 11 errors : !nt (fffff803c60eab03-fffff803c630d375)
  97. MODULE_NAME: memory_corruption
  98.  
  99. IMAGE_NAME: memory_corruption
  100.  
  101. FOLLOWUP_NAME: memory_corruption
  102. DEBUG_FLR_IMAGE_TIMESTAMP: 0
  103. MEMORY_CORRUPTOR: LARGE
  104. STACK_COMMAND: .cxr 0xffffbf81919c0220 ; kb
  105. FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
  106. BUCKET_ID: MEMORY_CORRUPTION_LARGE
  107. PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
  108. TARGET_TIME: 2017-06-03T10:38:22.000Z
  109. OSBUILD: 15063
  110. OSSERVICEPACK: 332
  111. SERVICEPACK_NUMBER: 0
  112. OS_REVISION: 0
  113. SUITE_MASK: 272
  114. PRODUCT_TYPE: 1
  115. OSPLATFORM_TYPE: x64
  116. OSNAME: Windows 10
  117. OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
  118. OS_LOCALE:
  119. USER_LCID: 0
  120. OSBUILD_TIMESTAMP: 2017-05-20 01:49:54
  121. BUILDDATESTAMP_STR: 160101.0800
  122. BUILDLAB_STR: WinBuild
  123. BUILDOSVER_STR: 10.0.15063.332
  124. ANALYSIS_SESSION_ELAPSED_TIME: 19e4
  125. ANALYSIS_SOURCE: KM
  126. FAILURE_ID_HASH_STRING: km:memory_corruption_large
  127. FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
  128. Followup: memory_corruption
  129.  
  130. !sysinfo smbios
  131. [SMBIOS Data Tables v3.0]
  132. [DMI Version - 0]
  133. [2.0 Calling Convention - No]
  134. [Table Size - 4498 bytes]
  135. [BIOS Information (Type 0) - Length 24 - Handle 0000h]
  136. Vendor American Megatrends Inc.
  137. BIOS Version 0604
  138. BIOS Starting Address Segment f000
  139. BIOS Release Date 12/08/2016
  140. BIOS ROM Size 1000000
  141. BIOS Characteristics
  142. 07: - PCI Supported
  143. 10: - APM Supported
  144. 11: - Upgradeable FLASH BIOS
  145. 12: - BIOS Shadowing Supported
  146. 15: - CD-Boot Supported
  147. 16: - Selectable Boot Supported
  148. 17: - BIOS ROM Socketed
  149. 19: - EDD Supported
  150. 23: - 1.2MB Floppy Supported
  151. 24: - 720KB Floppy Supported
  152. 25: - 2.88MB Floppy Supported
  153. 26: - Print Screen Device Supported
  154. 27: - Keyboard Services Supported
  155. 28: - Serial Services Supported
  156. 29: - Printer Services Supported
  157. 32: - BIOS Vendor Reserved
  158. BIOS Characteristic Extensions
  159. 00: - ACPI Supported
  160. 01: - USB Legacy Supported
  161. 08: - BIOS Boot Specification Supported
  162. 10: - Specification Reserved
  163. 11: - Specification Reserved
  164. BIOS Major Revision 5
  165. BIOS Minor Revision 12
  166. EC Firmware Major Revision 255
  167. EC Firmware Minor Revision 255
  168. [System Information (Type 1) - Length 27 - Handle 0001h]
  169. Manufacturer System manufacturer
  170. Product Name System Product Name
  171. Version System Version
  172. Serial Number System Serial Number
  173. UUID 00000000-0000-0000-0000-000000000000
  174. Wakeup Type Power Switch
  175. SKUNumber SKU
  176. Family To be filled by O.E.M.
  177. [BaseBoard Information (Type 2) - Length 15 - Handle 0002h]
  178. Manufacturer ASUSTeK COMPUTER INC.
  179. Product MAXIMUS IX HERO
  180. Version Rev 1.xx
  181. Serial Number 161292444500835
  182. Asset Tag
  183. Feature Flags 09h
  184. -1113213216: - -1113213168: - §'Aòþ
  185. Location Default string
  186. Chassis Handle 0003h
  187. Board Type 0ah - Processor/Memory Module
  188. Number of Child Handles 0
  189. [System Enclosure (Type 3) - Length 22 - Handle 0003h]
  190. Manufacturer Default string
  191. Chassis Type Desktop
  192. Version Default string
  193. Serial Number
  194. Asset Tag Number
  195. Bootup State Safe
  196. Power Supply State Safe
  197. Thermal State Safe
  198. Security Status None
  199. OEM Defined 0
  200. Height 0U
  201. Number of Power Cords 1
  202. Number of Contained Elements 0
  203. Contained Element Size 3
  204. [Onboard Devices Information (Type 10) - Length 6 - Handle 0028h]
  205. Number of Devices 1
  206. 01: Type Video [enabled]
  207. 01: Description To Be Filled By O.E.M.
  208. [OEM Strings (Type 11) - Length 5 - Handle 0029h]
  209. Number of Strings 4
  210. 1 Default string
  211. 2 Default string
  212. 3 SAVANNA
  213. 4 Default string
  214. [System Configuration Options (Type 12) - Length 5 - Handle 002ah]
  215. [Physical Memory Array (Type 16) - Length 23 - Handle 0045h]
  216. Location 03h - SystemBoard/Motherboard
  217. Use 03h - System Memory
  218. Memory Error Correction 03h - None
  219. Maximum Capacity 67108864KB
  220. Memory Error Inf Handle [Not Provided]
  221. Number of Memory Devices 4
  222. [Memory Device (Type 17) - Length 40 - Handle 0046h]
  223. Physical Memory Array Handle 0045h
  224. Memory Error Info Handle [Not Provided]
  225. Total Width 64 bits
  226. Data Width 64 bits
  227. Size 8192MB
  228. Form Factor 09h - DIMM
  229. Device Set [None]
  230. Device Locator ChannelA-DIMM1
  231. Bank Locator BANK 0
  232. Memory Type 1ah - Specification Reserved
  233. Type Detail 0080h - Synchronous
  234. Speed 2133MHz
  235. Manufacturer Corsair
  236. Serial Number
  237. Asset Tag Number
  238. Part Number CMR32GX4M4C3000C15
  239. [Memory Device (Type 17) - Length 40 - Handle 0047h]
  240. Physical Memory Array Handle 0045h
  241. Memory Error Info Handle [Not Provided]
  242. Total Width 64 bits
  243. Data Width 64 bits
  244. Size 8192MB
  245. Form Factor 09h - DIMM
  246. Device Set [None]
  247. Device Locator ChannelA-DIMM2
  248. Bank Locator BANK 1
  249. Memory Type 1ah - Specification Reserved
  250. Type Detail 0080h - Synchronous
  251. Speed 2133MHz
  252. Manufacturer Corsair
  253. Serial Number
  254. Asset Tag Number
  255. Part Number CMR32GX4M4C3000C15
  256. [Memory Device (Type 17) - Length 40 - Handle 0048h]
  257. Physical Memory Array Handle 0045h
  258. Memory Error Info Handle [Not Provided]
  259. Total Width 64 bits
  260. Data Width 64 bits
  261. Size 8192MB
  262. Form Factor 09h - DIMM
  263. Device Set [None]
  264. Device Locator ChannelB-DIMM1
  265. Bank Locator BANK 2
  266. Memory Type 1ah - Specification Reserved
  267. Type Detail 0080h - Synchronous
  268. Speed 2133MHz
  269. Manufacturer Corsair
  270. Serial Number
  271. Asset Tag Number
  272. Part Number CMR32GX4M4C3000C15
  273. [Memory Device (Type 17) - Length 40 - Handle 0049h]
  274. Physical Memory Array Handle 0045h
  275. Memory Error Info Handle [Not Provided]
  276. Total Width 64 bits
  277. Data Width 64 bits
  278. Size 8192MB
  279. Form Factor 09h - DIMM
  280. Device Set [None]
  281. Device Locator ChannelB-DIMM2
  282. Bank Locator BANK 3
  283. Memory Type 1ah - Specification Reserved
  284. Type Detail 0080h - Synchronous
  285. Speed 2133MHz
  286. Manufacturer Corsair
  287. Serial Number
  288. Asset Tag Number
  289. Part Number CMR32GX4M4C3000C15
  290. [Memory Array Mapped Address (Type 19) - Length 31 - Handle 004ah]
  291. Starting Address 00000000h
  292. Ending Address 01ffffffh
  293. Memory Array Handle 0045h
  294. Partition Width 04
  295. [Cache Information (Type 7) - Length 19 - Handle 004bh]
  296. Socket Designation L1 Cache
  297. Cache Configuration 0180h - WB Enabled Int NonSocketed L1
  298. Maximum Cache Size 0100h - 256K
  299. Installed Size 0100h - 256K
  300. Supported SRAM Type 0020h - Synchronous
  301. Current SRAM Type 0020h - Synchronous
  302. Cache Speed 0ns
  303. Error Correction Type ParitySingle-Bit ECC
  304. System Cache Type Unified
  305. Associativity 8-way Set-Associative
  306. [Cache Information (Type 7) - Length 19 - Handle 004ch]
  307. Socket Designation L2 Cache
  308. Cache Configuration 0181h - WB Enabled Int NonSocketed L2
  309. Maximum Cache Size 0400h - 1024K
  310. Installed Size 0400h - 1024K
  311. Supported SRAM Type 0020h - Synchronous
  312. Current SRAM Type 0020h - Synchronous
  313. Cache Speed 0ns
  314. Error Correction Type Multi-Bit ECC
  315. System Cache Type Unified
  316. Associativity 4-way Set-Associative
  317. [Cache Information (Type 7) - Length 19 - Handle 004dh]
  318. Socket Designation L3 Cache
  319. Cache Configuration 0182h - WB Enabled Int NonSocketed L3
  320. Maximum Cache Size 2000h - 8192K
  321. Installed Size 2000h - 8192K
  322. Supported SRAM Type 0020h - Synchronous
  323. Current SRAM Type 0020h - Synchronous
  324. Cache Speed 0ns
  325. Error Correction Type Specification Reserved
  326. System Cache Type Unified
  327. Associativity 16-way Set-Associative
  328. [Processor Information (Type 4) - Length 48 - Handle 004eh]
  329. Socket Designation LGA1151
  330. Processor Type Central Processor
  331. Processor Family c6h - Specification Reserved
  332. Processor Manufacturer Intel(R) Corporation
  333. Processor ID e9060900fffbebbf
  334. Processor Version Intel(R) Core(TM) i7-7700K CPU @ 4.20GHz
  335. Processor Voltage 8bh - 1.1V
  336. External Clock 100MHz
  337. Max Speed 8300MHz
  338. Current Speed 4200MHz
  339. Status Enabled Populated
  340. Processor Upgrade Other
  341. L1 Cache Handle 004bh
  342. L2 Cache Handle 004ch
  343. L3 Cache Handle 004dh
  344. Serial Number
  345. Asset Tag Number
  346. Part Number To Be Filled By O.E.M.
  347. [Memory Device Mapped Address (Type 20) - Length 35 - Handle 004fh]
  348. Starting Address 00000000h
  349. Ending Address 007fffffh
  350. Memory Device Handle 0046h
  351. Mem Array Mapped Adr Handle 004ah
  352. Partition Row Position [Unknown]
  353. Interleave Position 01
  354. Interleave Data Depth 02
  355. [Memory Device Mapped Address (Type 20) - Length 35 - Handle 0050h]
  356. Starting Address 01000000h
  357. Ending Address 017fffffh
  358. Memory Device Handle 0047h
  359. Mem Array Mapped Adr Handle 004ah
  360. Partition Row Position [Unknown]
  361. Interleave Position 01
  362. Interleave Data Depth 02
  363. [Memory Device Mapped Address (Type 20) - Length 35 - Handle 0051h]
  364. Starting Address 00800000h
  365. Ending Address 00ffffffh
  366. Memory Device Handle 0048h
  367. Mem Array Mapped Adr Handle 004ah
  368. Partition Row Position [Unknown]
  369. Interleave Position 02
  370. Interleave Data Depth 02
  371. [Memory Device Mapped Address (Type 20) - Length 35 - Handle 0052h]
  372. Starting Address 01800000h
  373. Ending Address 01ffffffh
  374. Memory Device Handle 0049h
  375. Mem Array Mapped Adr Handle 004ah
  376. Partition Row Position [Unknown]
  377. Interleave Position 02
  378. Interleave Data Depth 02
  379.  
  380. !thread
  381. THREAD ffff9a002b3bb7c0 Cid 139c.23e8 Teb: 00000000028a6000 Win32Thread: ffff9a002ab19470 RUNNING on processor 3
  382. Not impersonating
  383. GetUlongFromAddress: unable to read from fffff803c63ca2d4
  384. Owning Process ffff9a00282737c0 Image: CorsairLink4.exe
  385. Attached Process N/A Image: N/A
  386. fffff78000000000: Unable to get shared data
  387. Wait Start TickCount 1184
  388. Context Switch Count 181 IdealProcessor: 3
  389. ReadMemory error: Cannot get nt!KeMaximumIncrement value.
  390. UserTime 00:00:00.000
  391. KernelTime 00:00:00.000
  392. Win32 Start Address 0x0000000066b10410
  393. Stack Init ffffbf81919c1c10 Current ffffbf81919bfca0
  394. Base ffffbf81919c2000 Limit ffffbf81919bb000 Call 0000000000000000
  395. Priority 8 BasePriority 8 PriorityDecrement 0 IoPriority 2 PagePriority 4
  396. Child-SP RetAddr : Args to Child : Call Site
  397. ffffbf81`919bf948 fffff803`c62046a9 : 00000000`0000003b 00000000`c0000005 fffff80b`cf326804 ffffbf81`919c0220 : nt!KeBugCheckEx
  398. ffffbf81`919bf950 fffff803`c6203e3c : ffffbf81`919bfba0 fffff80b`cf334bc6 fffff80b`cf3784dc ffffbf81`919c09e8 : nt!KiBugCheckDispatch+0x69
  399. ffffbf81`919bfa90 fffff803`c61ff7ed : fffff803`c6417000 fffff803`c608d000 00053760`00889000 ffffbf81`919c00c0 : nt!KiSystemServiceHandler+0x7c
  400. ffffbf81`919bfad0 fffff803`c609a284 : 00000000`00000000 ffffbf81`919bfc00 00000000`00000000 ffffbf81`919bfc80 : nt!RtlpExecuteHandlerForException+0xd
  401. ffffbf81`919bfb00 fffff803`c6099063 : ffffbf81`919c09e8 ffffbf81`919c0720 ffffbf81`919c09e8 ffffd10d`eb3f57a0 : nt!RtlDispatchException+0x404
  402. ffffbf81`919c01f0 fffff803`c6204782 : ffffd10d`eb518bb0 00000000`00000000 ffff9a00`25801000 ffffd10d`eb5d8440 : nt!KiDispatchException+0x143
  403. ffffbf81`919c08b0 fffff803`c6202a34 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0xc2
  404. ffffbf81`919c0a90 fffff80b`cf326804 : fffff80b`cf3dd1b6 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiGeneralProtectionFault+0xf4 (TrapFrame @ ffffbf81`919c0a90)
  405. ffffbf81`919c0c28 fffff80b`cf3dd1b6 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : dxgkrnl!DMMVIDPNTOPOLOGY::GetFirstPath+0x4
  406. ffffbf81`919c0c30 fffff80b`cf3dd00a : ffffbf81`919c0d48 ffffbf81`919c1100 ffffd10d`eb3f57a0 ffffd10d`e13284b0 : dxgkrnl!DMMVIDPNTOPOLOGY::AcquireDdiEnumeratorCachedPathInfo<KM_STL::const_mem_fun_t<DMMVIDPNPRESENTPATH * __ptr64,DMMVIDPNTOPOLOGY> >+0x46
  407. ffffbf81`919c0c70 fffff80b`d1cb2702 : 00000000`00000000 ffff9a00`285bc000 ffffd10d`eae1a850 ffff9a00`285bc000 : dxgkrnl!DXGK_VIDPNTOPOLOGY_INTERFACE_V1_IMPL::AcquireFirstPathInfo+0xaa
  408. ffffbf81`919c0cb0 00000000`00000000 : ffff9a00`285bc000 ffffd10d`eae1a850 ffff9a00`285bc000 ffff9a00`285bc000 : nvlddmkm+0x132702
  409.  
  410. ========================================================================
  411. =================== Dump File: 060317-7328-01.dmp ====================
  412. ========================================================================
  413. Mini Kernel Dump File: Only registers and stack trace are available
  414. Executable search path is:
  415. Windows 10 Kernel Version 15063 MP (8 procs) Free x64
  416. Product: WinNt, suite: TerminalServer SingleUserTS
  417. Built by: 15063.0.amd64fre.rs2_release.170317-1834
  418. Machine Name:
  419. Kernel base = 0xfffff800`80683000 PsLoadedModuleList = 0xfffff800`809cf5a0
  420. Debug session time: Sat Jun 3 07:15:02.490 2017 (UTC - 4:00)
  421. System Uptime: 0 days 0:00:18.297
  422.  
  423. BugCheck 3B, {c0000005, fffff80080ae6bb9, ffffe580a746a580, 0}
  424. Probably caused by : memory_corruption
  425. Followup: memory_corruption
  426. SYSTEM_SERVICE_EXCEPTION (3b)
  427. An exception happened while executing a system service routine.
  428.  
  429. Arguments:
  430. Arg1: 00000000c0000005, Exception code that caused the bugcheck
  431. Arg2: fffff80080ae6bb9, Address of the instruction which caused the bugcheck
  432. Arg3: ffffe580a746a580, Address of the context record for the exception that caused the bugcheck
  433. Arg4: 0000000000000000, zero.
  434.  
  435. Debugging Details:
  436. DUMP_CLASS: 1
  437. DUMP_QUALIFIER: 400
  438. BUILD_VERSION_STRING: 10.0.15063.332 (WinBuild.160101.0800)
  439. SYSTEM_MANUFACTURER: System manufacturer
  440. SYSTEM_PRODUCT_NAME: System Product Name
  441. SYSTEM_SKU: SKU
  442. SYSTEM_VERSION: System Version
  443. BIOS_VENDOR: American Megatrends Inc.
  444. BIOS_VERSION: 0604
  445. BIOS_DATE: 12/08/2016
  446. BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
  447. BASEBOARD_PRODUCT: MAXIMUS IX HERO
  448. BASEBOARD_VERSION: Rev 1.xx
  449. DUMP_TYPE: 2
  450. EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
  451. FAULTING_IP:
  452. nt!CmpDoParseKey+239
  453. fffff800`80ae6bb9 66833e5c cmp word ptr [rsi],5Ch
  454. CONTEXT: ffffe580a746a580 -- (.cxr 0xffffe580a746a580)
  455. rax=0000000000f800c8 rbx=0000000000000000 rcx=ffffa38d3b43c000
  456. rdx=0000000000000000 rsi=ffffa38d440e3370 rdi=00000000000000c8
  457. rip=fffff80080ae6bb9 rsp=ffffe580a746af80 rbp=ffffe580a746b080
  458. r8=000000000000fffe r9=0000000000000000 r10=0000000000000200
  459. r11=fffff800807fb817 r12=ffffe580a746b9a0 r13=0000000000000000
  460. r14=00000000000000f8 r15=ffffa38d3b43c130
  461. iopl=0 nv up ei ng nz na pe cy
  462. cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010283
  463. nt!CmpDoParseKey+0x239:
  464. fffff800`80ae6bb9 66833e5c cmp word ptr [rsi],5Ch ds:002b:ffffa38d`440e3370=0053
  465. Resetting default scope
  466. CPU_COUNT: 8
  467. CPU_MHZ: 1068
  468. CPU_VENDOR: GenuineIntel
  469. CPU_FAMILY: 6
  470. CPU_MODEL: 9e
  471. CPU_STEPPING: 9
  472. CPU_MICROCODE: 6,9e,9,0 (F,M,S,R) SIG: 42'00000000 (cache) 42'00000000 (init)
  473. CUSTOMER_CRASH_COUNT: 1
  474. DEFAULT_BUCKET_ID: CODE_CORRUPTION
  475. BUGCHECK_STR: 0x3B
  476.  
  477. PROCESS_NAME: svchost.exe
  478.  
  479. CURRENT_IRQL: 0
  480. ANALYSIS_SESSION_HOST: USERNAME-PC
  481. ANALYSIS_SESSION_TIME: 06-03-2017 15:39:28.0813
  482. ANALYSIS_VERSION: 10.0.14321.1024 amd64fre
  483. LAST_CONTROL_TRANSFER: from fffff80080af24b6 to fffff80080ae6bb9
  484. CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
  485. fffff800806f6152-fffff800806f6153 2 bytes - nt!MiGetFreeOrZeroPage+72
  486. [ 80 fa:00 84 ]
  487. fffff800806f69e7 - nt!MiCompletePrivateZeroFault+517 (+0x895)
  488. [ 80:00 ]
  489. fffff800806f69f7-fffff800806f69f8 2 bytes - nt!MiCompletePrivateZeroFault+527 (+0x10)
  490. [ 80 fa:00 84 ]
  491. 5 errors : !nt (fffff800806f6152-fffff800806f69f8)
  492. MODULE_NAME: memory_corruption
  493.  
  494. IMAGE_NAME: memory_corruption
  495.  
  496. FOLLOWUP_NAME: memory_corruption
  497. DEBUG_FLR_IMAGE_TIMESTAMP: 0
  498. MEMORY_CORRUPTOR: LARGE
  499. STACK_COMMAND: .cxr 0xffffe580a746a580 ; kb
  500. FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
  501. BUCKET_ID: MEMORY_CORRUPTION_LARGE
  502. PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
  503. TARGET_TIME: 2017-06-03T11:15:02.000Z
  504. OSBUILD: 15063
  505. OSSERVICEPACK: 332
  506. SERVICEPACK_NUMBER: 0
  507. OS_REVISION: 0
  508. SUITE_MASK: 272
  509. PRODUCT_TYPE: 1
  510. OSPLATFORM_TYPE: x64
  511. OSNAME: Windows 10
  512. OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
  513. OS_LOCALE:
  514. USER_LCID: 0
  515. OSBUILD_TIMESTAMP: 2017-05-20 01:49:54
  516. BUILDDATESTAMP_STR: 160101.0800
  517. BUILDLAB_STR: WinBuild
  518. BUILDOSVER_STR: 10.0.15063.332
  519. ANALYSIS_SESSION_ELAPSED_TIME: 1910
  520. ANALYSIS_SOURCE: KM
  521. FAILURE_ID_HASH_STRING: km:memory_corruption_large
  522. FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
  523. Followup: memory_corruption
  524.  
  525. !errrec fffff80080ae6bb9
  526. ===============================================================================
  527. Section 33603 : {24448d48-4850-4589-d048-8d4424584889}
  528. -------------------------------------------------------------------------------
  529. Descriptor @ fffff80080d35711
  530. Section @ fffff800c8ee8ffd
  531. Offset : 1212163140
  532. Length : 1219511689
  533. Flags : 0xc0458948 ThresholdExceeded
  534. Severity : Invalid
  535. *** Unknown section format ***
  536. ===============================================================================
  537. Section 33604 : {084d89f8-8d48-8045-498b-c94889442438}
  538. -------------------------------------------------------------------------------
  539. Descriptor @ fffff80080d35759
  540. Section @ fffff800ce376bb9
  541. Offset : 1300824064
  542. Length : 3360524728
  543. Flags : 0x4d89e84d Primary Reset ThresholdExceeded
  544. Severity : Invalid
  545. *** Unknown section format ***
  546. ===============================================================================
  547. Section 33605 : {5de38b49-ccc3-cccc-cccc-cc40534883ec}
  548. -------------------------------------------------------------------------------
  549. Descriptor @ fffff80080d357a1
  550. Section @ fffff8009109f702
  551. Offset : 274434889
  552. Length : 410225481
  553. Flags : 0x28738b4d Primary Reset ThresholdExceeded
  554. Severity : Invalid
  555. FRU Id : {018b4820-8b48-48d9-85c0-74334883f820}
  556. FRU Text : ÈèU¥ÿ¾Ð¸?
  557. *** Unknown section format ***
  558. ===============================================================================
  559. Section 33606 : {00000db8-ebc0-3302-c048-83c4205bc3cc}
  560. -------------------------------------------------------------------------------
  561. Descriptor @ fffff80080d357e9
  562. Section @ fffff800c8b656bc
  563. Offset : 1208478467
  564. Length : 1210105987
  565. Flags : 0x0776353b Primary ContainmentWarning ThresholdExceeded ResourceNotAvailable LatentError
  566. Severity : Invalid
  567. *** Unknown section format ***
  568. ===============================================================================
  569. Section 33607 : {780d8d48-cca8-45ff-8bf8-e800b39dff33}
  570. -------------------------------------------------------------------------------
  571. Descriptor @ fffff80080d35831
  572. Section @ fffff800c9729f01
  573. Offset : 1220817736
  574. Length : 1156597129
  575. Flags : 0xd233e18b Primary ContainmentWarning ThresholdExceeded
  576. Severity : Invalid
  577. FRU Text : ÆHIHÁãH¹
  578. *** Unknown section format ***
  579.  
  580. !thread
  581. THREAD ffffbb0569acf080 Cid 0940.09f8 Teb: 0000004c8c89e000 Win32Thread: 0000000000000000 RUNNING on processor 2
  582. Not impersonating
  583. GetUlongFromAddress: unable to read from fffff800809c02d4
  584. Owning Process ffffbb0569a297c0 Image: svchost.exe
  585. Attached Process N/A Image: N/A
  586. fffff78000000000: Unable to get shared data
  587. Wait Start TickCount 1171
  588. Context Switch Count 21 IdealProcessor: 1
  589. ReadMemory error: Cannot get nt!KeMaximumIncrement value.
  590. UserTime 00:00:00.000
  591. KernelTime 00:00:00.000
  592. Win32 Start Address 0x00007ffe6c899090
  593. Stack Init ffffe580a746bc10 Current ffffe580a746b190
  594. Base ffffe580a746c000 Limit ffffe580a7465000 Call 0000000000000000
  595. Priority 8 BasePriority 8 PriorityDecrement 0 IoPriority 2 PagePriority 5
  596. Child-SP RetAddr : Args to Child : Call Site
  597. ffffe580`a7469ca8 fffff800`807fa6a9 : 00000000`0000003b 00000000`c0000005 fffff800`80ae6bb9 ffffe580`a746a580 : nt!KeBugCheckEx
  598. ffffe580`a7469cb0 fffff800`807f9e3c : ffffe580`a7469f00 fffff800`807eb5ea fffff800`8095c824 ffffe580`a746ad48 : nt!KiBugCheckDispatch+0x69
  599. ffffe580`a7469df0 fffff800`807f57ed : fffff800`80a0d000 fffff800`80683000 00053760`00889000 ffffe580`a746a420 : nt!KiSystemServiceHandler+0x7c
  600. ffffe580`a7469e30 fffff800`80690284 : 00000000`00000003 ffffe580`a7469f60 00000000`00000000 00000000`00000000 : nt!RtlpExecuteHandlerForException+0xd
  601. ffffe580`a7469e60 fffff800`8068f063 : ffffe580`a746ad48 ffffe580`a746aa80 ffffe580`a746ad48 00000000`000000c8 : nt!RtlDispatchException+0x404
  602. ffffe580`a746a550 fffff800`807fa782 : ffffa38d`42dd0a01 00000000`00000000 ffffe580`a746ae20 00000000`00000000 : nt!KiDispatchException+0x143
  603. ffffe580`a746ac10 fffff800`807f8a34 : 00000000`00000000 00000000`ffffffff 00000001`00000000 00000000`00000201 : nt!KiExceptionDispatch+0xc2
  604. ffffe580`a746adf0 fffff800`80ae6bb9 : ffffe580`a746b910 ffffe580`a746b080 ffffa38d`3b43c130 ffffa38d`3b4387a0 : nt!KiGeneralProtectionFault+0xf4 (TrapFrame @ ffffe580`a746adf0)
  605. ffffe580`a746af80 fffff800`80af24b6 : ffffe580`0000001c ffffe580`a746b450 ffffe580`a746b3d0 ffffa38d`451689e0 : nt!CmpDoParseKey+0x239
  606. ffffe580`a746b360 fffff800`80aec98b : ffffbb05`653cbb10 00000000`00000000 ffffbb05`653cbb10 ffffa38d`3b414701 : nt!CmpParseKey+0x266
  607. ffffe580`a746b530 fffff800`80af0300 : ffffbb05`653cbb00 ffffe580`a746b798 00000000`00000040 ffffbb05`64f59f20 : nt!ObpLookupObjectName+0x46b
  608. ffffe580`a746b700 fffff800`80af1004 : 0000004c`00000001 ffffbb05`64f59f20 00000000`00000000 00000000`00000000 : nt!ObOpenObjectByNameEx+0x1e0
  609. ffffe580`a746b840 fffff800`80af3d2f : 0000004c`8d1fed01 00000000`00000000 00000000`00000000 000001a0`446a63b0 : nt!CmOpenKey+0x274
  610. ffffe580`a746ba40 fffff800`807fa213 : ffffbb05`69acf080 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtOpenKeyEx+0xf
  611. ffffe580`a746ba80 00007ffe`76e17644 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 (TrapFrame @ ffffe580`a746ba80)
  612. 0000004c`8d1fe838 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`76e17644
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement