Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Microsoft (R) Windows Debugger Version 10.0.14321.1024 AMD64
- Copyright (c) Microsoft Corporation. All rights reserved.
- ========================================================================
- Gardenman: File 060317-5078-01.dmp was invalid or not a normal minidump.
- Gardenman: File 060317-13984-01.dmp was invalid or not a normal minidump.
- ========================================================================
- =================== Dump File: 060317-5046-01.dmp ====================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Executable search path is:
- Windows 10 Kernel Version 15063 MP (8 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS
- Built by: 15063.0.amd64fre.rs2_release.170317-1834
- Machine Name:
- Kernel base = 0xfffff803`c608d000 PsLoadedModuleList = 0xfffff803`c63d95a0
- Debug session time: Sat Jun 3 06:38:22.706 2017 (UTC - 4:00)
- System Uptime: 0 days 0:00:18.513
- BugCheck 3B, {c0000005, fffff80bcf326804, ffffbf81919c0220, 0}
- *** WARNING: Unable to verify timestamp for nvlddmkm.sys
- *** ERROR: Module load completed but symbols could not be loaded for nvlddmkm.sys
- Probably caused by : memory_corruption
- Followup: memory_corruption
- SYSTEM_SERVICE_EXCEPTION (3b)
- An exception happened while executing a system service routine.
- Arguments:
- Arg1: 00000000c0000005, Exception code that caused the bugcheck
- Arg2: fffff80bcf326804, Address of the instruction which caused the bugcheck
- Arg3: ffffbf81919c0220, Address of the context record for the exception that caused the bugcheck
- Arg4: 0000000000000000, zero.
- Debugging Details:
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 10.0.15063.332 (WinBuild.160101.0800)
- SYSTEM_MANUFACTURER: System manufacturer
- SYSTEM_PRODUCT_NAME: System Product Name
- SYSTEM_SKU: SKU
- SYSTEM_VERSION: System Version
- BIOS_VENDOR: American Megatrends Inc.
- BIOS_VERSION: 0604
- BIOS_DATE: 12/08/2016
- BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
- BASEBOARD_PRODUCT: MAXIMUS IX HERO
- BASEBOARD_VERSION: Rev 1.xx
- DUMP_TYPE: 2
- EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
- FAULTING_IP:
- dxgkrnl!DMMVIDPNTOPOLOGY::GetFirstPath+4
- fffff80b`cf326804 488b08 mov rcx,qword ptr [rax]
- CONTEXT: ffffbf81919c0220 -- (.cxr 0xffffbf81919c0220)
- rax=0003910deb3f57b8 rbx=ffffbf81919c0c90 rcx=0003910deb3f57a0
- rdx=ffffbf81919c0c90 rsi=ffffbf81919c0d48 rdi=ffffd10deb3f57a0
- rip=fffff80bcf326804 rsp=ffffbf81919c0c28 rbp=0000000000000000
- r8=ffffbf81919c0cb0 r9=ffffd10de71f62c0 r10=0000000000000000
- r11=fffff80bd218c693 r12=ffffd10de13284b0 r13=0000000000000000
- r14=ffffbf81919c0cb0 r15=ffff9a0026df5000
- iopl=0 nv up ei pl nz na po cy
- cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010207
- dxgkrnl!DMMVIDPNTOPOLOGY::GetFirstPath+0x4:
- fffff80b`cf326804 488b08 mov rcx,qword ptr [rax] ds:002b:0003910d`eb3f57b8=????????????????
- Resetting default scope
- CPU_COUNT: 8
- CPU_MHZ: 1068
- CPU_VENDOR: GenuineIntel
- CPU_FAMILY: 6
- CPU_MODEL: 9e
- CPU_STEPPING: 9
- CPU_MICROCODE: 6,9e,9,0 (F,M,S,R) SIG: 42'00000000 (cache) 42'00000000 (init)
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: CODE_CORRUPTION
- BUGCHECK_STR: 0x3B
- PROCESS_NAME: CorsairLink4.exe
- CURRENT_IRQL: 0
- ANALYSIS_SESSION_HOST: USERNAME-PC
- ANALYSIS_SESSION_TIME: 06-03-2017 15:34:36.0227
- ANALYSIS_VERSION: 10.0.14321.1024 amd64fre
- LAST_CONTROL_TRANSFER: from fffff80bcf3dd1b6 to fffff80bcf326804
- CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
- fffff803c60eab03-fffff803c60eab04 2 bytes - nt!MiDeleteValidSystemPage+243
- [ 80 f6:00 88 ]
- fffff803c60eab21 - nt!MiDeleteValidSystemPage+261 (+0x1e)
- [ fa:8b ]
- fffff803c6103ca6-fffff803c6103ca7 2 bytes - nt!MiPfnShareCountIsZero+186 (+0x19185)
- [ 80 f6:00 88 ]
- fffff803c617d532-fffff803c617d534 3 bytes - nt!MiAllocatePoolPages+106 (+0x7988c)
- [ 40 fb f6:00 44 88 ]
- fffff803c630d373-fffff803c630d375 3 bytes - nt!ExFreePoolWithTag+363
- [ 40 fb f6:00 44 88 ]
- 11 errors : !nt (fffff803c60eab03-fffff803c630d375)
- MODULE_NAME: memory_corruption
- IMAGE_NAME: memory_corruption
- FOLLOWUP_NAME: memory_corruption
- DEBUG_FLR_IMAGE_TIMESTAMP: 0
- MEMORY_CORRUPTOR: LARGE
- STACK_COMMAND: .cxr 0xffffbf81919c0220 ; kb
- FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
- BUCKET_ID: MEMORY_CORRUPTION_LARGE
- PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
- TARGET_TIME: 2017-06-03T10:38:22.000Z
- OSBUILD: 15063
- OSSERVICEPACK: 332
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 272
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
- OS_LOCALE:
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2017-05-20 01:49:54
- BUILDDATESTAMP_STR: 160101.0800
- BUILDLAB_STR: WinBuild
- BUILDOSVER_STR: 10.0.15063.332
- ANALYSIS_SESSION_ELAPSED_TIME: 19e4
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:memory_corruption_large
- FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
- Followup: memory_corruption
- !sysinfo smbios
- [SMBIOS Data Tables v3.0]
- [DMI Version - 0]
- [2.0 Calling Convention - No]
- [Table Size - 4498 bytes]
- [BIOS Information (Type 0) - Length 24 - Handle 0000h]
- Vendor American Megatrends Inc.
- BIOS Version 0604
- BIOS Starting Address Segment f000
- BIOS Release Date 12/08/2016
- BIOS ROM Size 1000000
- BIOS Characteristics
- 07: - PCI Supported
- 10: - APM Supported
- 11: - Upgradeable FLASH BIOS
- 12: - BIOS Shadowing Supported
- 15: - CD-Boot Supported
- 16: - Selectable Boot Supported
- 17: - BIOS ROM Socketed
- 19: - EDD Supported
- 23: - 1.2MB Floppy Supported
- 24: - 720KB Floppy Supported
- 25: - 2.88MB Floppy Supported
- 26: - Print Screen Device Supported
- 27: - Keyboard Services Supported
- 28: - Serial Services Supported
- 29: - Printer Services Supported
- 32: - BIOS Vendor Reserved
- BIOS Characteristic Extensions
- 00: - ACPI Supported
- 01: - USB Legacy Supported
- 08: - BIOS Boot Specification Supported
- 10: - Specification Reserved
- 11: - Specification Reserved
- BIOS Major Revision 5
- BIOS Minor Revision 12
- EC Firmware Major Revision 255
- EC Firmware Minor Revision 255
- [System Information (Type 1) - Length 27 - Handle 0001h]
- Manufacturer System manufacturer
- Product Name System Product Name
- Version System Version
- Serial Number System Serial Number
- UUID 00000000-0000-0000-0000-000000000000
- Wakeup Type Power Switch
- SKUNumber SKU
- Family To be filled by O.E.M.
- [BaseBoard Information (Type 2) - Length 15 - Handle 0002h]
- Manufacturer ASUSTeK COMPUTER INC.
- Product MAXIMUS IX HERO
- Version Rev 1.xx
- Serial Number 161292444500835
- Asset Tag
- Feature Flags 09h
- -1113213216: - -1113213168: - §'Aòþ
- Location Default string
- Chassis Handle 0003h
- Board Type 0ah - Processor/Memory Module
- Number of Child Handles 0
- [System Enclosure (Type 3) - Length 22 - Handle 0003h]
- Manufacturer Default string
- Chassis Type Desktop
- Version Default string
- Serial Number
- Asset Tag Number
- Bootup State Safe
- Power Supply State Safe
- Thermal State Safe
- Security Status None
- OEM Defined 0
- Height 0U
- Number of Power Cords 1
- Number of Contained Elements 0
- Contained Element Size 3
- [Onboard Devices Information (Type 10) - Length 6 - Handle 0028h]
- Number of Devices 1
- 01: Type Video [enabled]
- 01: Description To Be Filled By O.E.M.
- [OEM Strings (Type 11) - Length 5 - Handle 0029h]
- Number of Strings 4
- 1 Default string
- 2 Default string
- 3 SAVANNA
- 4 Default string
- [System Configuration Options (Type 12) - Length 5 - Handle 002ah]
- [Physical Memory Array (Type 16) - Length 23 - Handle 0045h]
- Location 03h - SystemBoard/Motherboard
- Use 03h - System Memory
- Memory Error Correction 03h - None
- Maximum Capacity 67108864KB
- Memory Error Inf Handle [Not Provided]
- Number of Memory Devices 4
- [Memory Device (Type 17) - Length 40 - Handle 0046h]
- Physical Memory Array Handle 0045h
- Memory Error Info Handle [Not Provided]
- Total Width 64 bits
- Data Width 64 bits
- Size 8192MB
- Form Factor 09h - DIMM
- Device Set [None]
- Device Locator ChannelA-DIMM1
- Bank Locator BANK 0
- Memory Type 1ah - Specification Reserved
- Type Detail 0080h - Synchronous
- Speed 2133MHz
- Manufacturer Corsair
- Serial Number
- Asset Tag Number
- Part Number CMR32GX4M4C3000C15
- [Memory Device (Type 17) - Length 40 - Handle 0047h]
- Physical Memory Array Handle 0045h
- Memory Error Info Handle [Not Provided]
- Total Width 64 bits
- Data Width 64 bits
- Size 8192MB
- Form Factor 09h - DIMM
- Device Set [None]
- Device Locator ChannelA-DIMM2
- Bank Locator BANK 1
- Memory Type 1ah - Specification Reserved
- Type Detail 0080h - Synchronous
- Speed 2133MHz
- Manufacturer Corsair
- Serial Number
- Asset Tag Number
- Part Number CMR32GX4M4C3000C15
- [Memory Device (Type 17) - Length 40 - Handle 0048h]
- Physical Memory Array Handle 0045h
- Memory Error Info Handle [Not Provided]
- Total Width 64 bits
- Data Width 64 bits
- Size 8192MB
- Form Factor 09h - DIMM
- Device Set [None]
- Device Locator ChannelB-DIMM1
- Bank Locator BANK 2
- Memory Type 1ah - Specification Reserved
- Type Detail 0080h - Synchronous
- Speed 2133MHz
- Manufacturer Corsair
- Serial Number
- Asset Tag Number
- Part Number CMR32GX4M4C3000C15
- [Memory Device (Type 17) - Length 40 - Handle 0049h]
- Physical Memory Array Handle 0045h
- Memory Error Info Handle [Not Provided]
- Total Width 64 bits
- Data Width 64 bits
- Size 8192MB
- Form Factor 09h - DIMM
- Device Set [None]
- Device Locator ChannelB-DIMM2
- Bank Locator BANK 3
- Memory Type 1ah - Specification Reserved
- Type Detail 0080h - Synchronous
- Speed 2133MHz
- Manufacturer Corsair
- Serial Number
- Asset Tag Number
- Part Number CMR32GX4M4C3000C15
- [Memory Array Mapped Address (Type 19) - Length 31 - Handle 004ah]
- Starting Address 00000000h
- Ending Address 01ffffffh
- Memory Array Handle 0045h
- Partition Width 04
- [Cache Information (Type 7) - Length 19 - Handle 004bh]
- Socket Designation L1 Cache
- Cache Configuration 0180h - WB Enabled Int NonSocketed L1
- Maximum Cache Size 0100h - 256K
- Installed Size 0100h - 256K
- Supported SRAM Type 0020h - Synchronous
- Current SRAM Type 0020h - Synchronous
- Cache Speed 0ns
- Error Correction Type ParitySingle-Bit ECC
- System Cache Type Unified
- Associativity 8-way Set-Associative
- [Cache Information (Type 7) - Length 19 - Handle 004ch]
- Socket Designation L2 Cache
- Cache Configuration 0181h - WB Enabled Int NonSocketed L2
- Maximum Cache Size 0400h - 1024K
- Installed Size 0400h - 1024K
- Supported SRAM Type 0020h - Synchronous
- Current SRAM Type 0020h - Synchronous
- Cache Speed 0ns
- Error Correction Type Multi-Bit ECC
- System Cache Type Unified
- Associativity 4-way Set-Associative
- [Cache Information (Type 7) - Length 19 - Handle 004dh]
- Socket Designation L3 Cache
- Cache Configuration 0182h - WB Enabled Int NonSocketed L3
- Maximum Cache Size 2000h - 8192K
- Installed Size 2000h - 8192K
- Supported SRAM Type 0020h - Synchronous
- Current SRAM Type 0020h - Synchronous
- Cache Speed 0ns
- Error Correction Type Specification Reserved
- System Cache Type Unified
- Associativity 16-way Set-Associative
- [Processor Information (Type 4) - Length 48 - Handle 004eh]
- Socket Designation LGA1151
- Processor Type Central Processor
- Processor Family c6h - Specification Reserved
- Processor Manufacturer Intel(R) Corporation
- Processor ID e9060900fffbebbf
- Processor Version Intel(R) Core(TM) i7-7700K CPU @ 4.20GHz
- Processor Voltage 8bh - 1.1V
- External Clock 100MHz
- Max Speed 8300MHz
- Current Speed 4200MHz
- Status Enabled Populated
- Processor Upgrade Other
- L1 Cache Handle 004bh
- L2 Cache Handle 004ch
- L3 Cache Handle 004dh
- Serial Number
- Asset Tag Number
- Part Number To Be Filled By O.E.M.
- [Memory Device Mapped Address (Type 20) - Length 35 - Handle 004fh]
- Starting Address 00000000h
- Ending Address 007fffffh
- Memory Device Handle 0046h
- Mem Array Mapped Adr Handle 004ah
- Partition Row Position [Unknown]
- Interleave Position 01
- Interleave Data Depth 02
- [Memory Device Mapped Address (Type 20) - Length 35 - Handle 0050h]
- Starting Address 01000000h
- Ending Address 017fffffh
- Memory Device Handle 0047h
- Mem Array Mapped Adr Handle 004ah
- Partition Row Position [Unknown]
- Interleave Position 01
- Interleave Data Depth 02
- [Memory Device Mapped Address (Type 20) - Length 35 - Handle 0051h]
- Starting Address 00800000h
- Ending Address 00ffffffh
- Memory Device Handle 0048h
- Mem Array Mapped Adr Handle 004ah
- Partition Row Position [Unknown]
- Interleave Position 02
- Interleave Data Depth 02
- [Memory Device Mapped Address (Type 20) - Length 35 - Handle 0052h]
- Starting Address 01800000h
- Ending Address 01ffffffh
- Memory Device Handle 0049h
- Mem Array Mapped Adr Handle 004ah
- Partition Row Position [Unknown]
- Interleave Position 02
- Interleave Data Depth 02
- !thread
- THREAD ffff9a002b3bb7c0 Cid 139c.23e8 Teb: 00000000028a6000 Win32Thread: ffff9a002ab19470 RUNNING on processor 3
- Not impersonating
- GetUlongFromAddress: unable to read from fffff803c63ca2d4
- Owning Process ffff9a00282737c0 Image: CorsairLink4.exe
- Attached Process N/A Image: N/A
- fffff78000000000: Unable to get shared data
- Wait Start TickCount 1184
- Context Switch Count 181 IdealProcessor: 3
- ReadMemory error: Cannot get nt!KeMaximumIncrement value.
- UserTime 00:00:00.000
- KernelTime 00:00:00.000
- Win32 Start Address 0x0000000066b10410
- Stack Init ffffbf81919c1c10 Current ffffbf81919bfca0
- Base ffffbf81919c2000 Limit ffffbf81919bb000 Call 0000000000000000
- Priority 8 BasePriority 8 PriorityDecrement 0 IoPriority 2 PagePriority 4
- Child-SP RetAddr : Args to Child : Call Site
- ffffbf81`919bf948 fffff803`c62046a9 : 00000000`0000003b 00000000`c0000005 fffff80b`cf326804 ffffbf81`919c0220 : nt!KeBugCheckEx
- ffffbf81`919bf950 fffff803`c6203e3c : ffffbf81`919bfba0 fffff80b`cf334bc6 fffff80b`cf3784dc ffffbf81`919c09e8 : nt!KiBugCheckDispatch+0x69
- ffffbf81`919bfa90 fffff803`c61ff7ed : fffff803`c6417000 fffff803`c608d000 00053760`00889000 ffffbf81`919c00c0 : nt!KiSystemServiceHandler+0x7c
- ffffbf81`919bfad0 fffff803`c609a284 : 00000000`00000000 ffffbf81`919bfc00 00000000`00000000 ffffbf81`919bfc80 : nt!RtlpExecuteHandlerForException+0xd
- ffffbf81`919bfb00 fffff803`c6099063 : ffffbf81`919c09e8 ffffbf81`919c0720 ffffbf81`919c09e8 ffffd10d`eb3f57a0 : nt!RtlDispatchException+0x404
- ffffbf81`919c01f0 fffff803`c6204782 : ffffd10d`eb518bb0 00000000`00000000 ffff9a00`25801000 ffffd10d`eb5d8440 : nt!KiDispatchException+0x143
- ffffbf81`919c08b0 fffff803`c6202a34 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0xc2
- ffffbf81`919c0a90 fffff80b`cf326804 : fffff80b`cf3dd1b6 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiGeneralProtectionFault+0xf4 (TrapFrame @ ffffbf81`919c0a90)
- ffffbf81`919c0c28 fffff80b`cf3dd1b6 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : dxgkrnl!DMMVIDPNTOPOLOGY::GetFirstPath+0x4
- ffffbf81`919c0c30 fffff80b`cf3dd00a : ffffbf81`919c0d48 ffffbf81`919c1100 ffffd10d`eb3f57a0 ffffd10d`e13284b0 : dxgkrnl!DMMVIDPNTOPOLOGY::AcquireDdiEnumeratorCachedPathInfo<KM_STL::const_mem_fun_t<DMMVIDPNPRESENTPATH * __ptr64,DMMVIDPNTOPOLOGY> >+0x46
- ffffbf81`919c0c70 fffff80b`d1cb2702 : 00000000`00000000 ffff9a00`285bc000 ffffd10d`eae1a850 ffff9a00`285bc000 : dxgkrnl!DXGK_VIDPNTOPOLOGY_INTERFACE_V1_IMPL::AcquireFirstPathInfo+0xaa
- ffffbf81`919c0cb0 00000000`00000000 : ffff9a00`285bc000 ffffd10d`eae1a850 ffff9a00`285bc000 ffff9a00`285bc000 : nvlddmkm+0x132702
- ========================================================================
- =================== Dump File: 060317-7328-01.dmp ====================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Executable search path is:
- Windows 10 Kernel Version 15063 MP (8 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS
- Built by: 15063.0.amd64fre.rs2_release.170317-1834
- Machine Name:
- Kernel base = 0xfffff800`80683000 PsLoadedModuleList = 0xfffff800`809cf5a0
- Debug session time: Sat Jun 3 07:15:02.490 2017 (UTC - 4:00)
- System Uptime: 0 days 0:00:18.297
- BugCheck 3B, {c0000005, fffff80080ae6bb9, ffffe580a746a580, 0}
- Probably caused by : memory_corruption
- Followup: memory_corruption
- SYSTEM_SERVICE_EXCEPTION (3b)
- An exception happened while executing a system service routine.
- Arguments:
- Arg1: 00000000c0000005, Exception code that caused the bugcheck
- Arg2: fffff80080ae6bb9, Address of the instruction which caused the bugcheck
- Arg3: ffffe580a746a580, Address of the context record for the exception that caused the bugcheck
- Arg4: 0000000000000000, zero.
- Debugging Details:
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 10.0.15063.332 (WinBuild.160101.0800)
- SYSTEM_MANUFACTURER: System manufacturer
- SYSTEM_PRODUCT_NAME: System Product Name
- SYSTEM_SKU: SKU
- SYSTEM_VERSION: System Version
- BIOS_VENDOR: American Megatrends Inc.
- BIOS_VERSION: 0604
- BIOS_DATE: 12/08/2016
- BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
- BASEBOARD_PRODUCT: MAXIMUS IX HERO
- BASEBOARD_VERSION: Rev 1.xx
- DUMP_TYPE: 2
- EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
- FAULTING_IP:
- nt!CmpDoParseKey+239
- fffff800`80ae6bb9 66833e5c cmp word ptr [rsi],5Ch
- CONTEXT: ffffe580a746a580 -- (.cxr 0xffffe580a746a580)
- rax=0000000000f800c8 rbx=0000000000000000 rcx=ffffa38d3b43c000
- rdx=0000000000000000 rsi=ffffa38d440e3370 rdi=00000000000000c8
- rip=fffff80080ae6bb9 rsp=ffffe580a746af80 rbp=ffffe580a746b080
- r8=000000000000fffe r9=0000000000000000 r10=0000000000000200
- r11=fffff800807fb817 r12=ffffe580a746b9a0 r13=0000000000000000
- r14=00000000000000f8 r15=ffffa38d3b43c130
- iopl=0 nv up ei ng nz na pe cy
- cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010283
- nt!CmpDoParseKey+0x239:
- fffff800`80ae6bb9 66833e5c cmp word ptr [rsi],5Ch ds:002b:ffffa38d`440e3370=0053
- Resetting default scope
- CPU_COUNT: 8
- CPU_MHZ: 1068
- CPU_VENDOR: GenuineIntel
- CPU_FAMILY: 6
- CPU_MODEL: 9e
- CPU_STEPPING: 9
- CPU_MICROCODE: 6,9e,9,0 (F,M,S,R) SIG: 42'00000000 (cache) 42'00000000 (init)
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: CODE_CORRUPTION
- BUGCHECK_STR: 0x3B
- PROCESS_NAME: svchost.exe
- CURRENT_IRQL: 0
- ANALYSIS_SESSION_HOST: USERNAME-PC
- ANALYSIS_SESSION_TIME: 06-03-2017 15:39:28.0813
- ANALYSIS_VERSION: 10.0.14321.1024 amd64fre
- LAST_CONTROL_TRANSFER: from fffff80080af24b6 to fffff80080ae6bb9
- CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
- fffff800806f6152-fffff800806f6153 2 bytes - nt!MiGetFreeOrZeroPage+72
- [ 80 fa:00 84 ]
- fffff800806f69e7 - nt!MiCompletePrivateZeroFault+517 (+0x895)
- [ 80:00 ]
- fffff800806f69f7-fffff800806f69f8 2 bytes - nt!MiCompletePrivateZeroFault+527 (+0x10)
- [ 80 fa:00 84 ]
- 5 errors : !nt (fffff800806f6152-fffff800806f69f8)
- MODULE_NAME: memory_corruption
- IMAGE_NAME: memory_corruption
- FOLLOWUP_NAME: memory_corruption
- DEBUG_FLR_IMAGE_TIMESTAMP: 0
- MEMORY_CORRUPTOR: LARGE
- STACK_COMMAND: .cxr 0xffffe580a746a580 ; kb
- FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
- BUCKET_ID: MEMORY_CORRUPTION_LARGE
- PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
- TARGET_TIME: 2017-06-03T11:15:02.000Z
- OSBUILD: 15063
- OSSERVICEPACK: 332
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 272
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
- OS_LOCALE:
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2017-05-20 01:49:54
- BUILDDATESTAMP_STR: 160101.0800
- BUILDLAB_STR: WinBuild
- BUILDOSVER_STR: 10.0.15063.332
- ANALYSIS_SESSION_ELAPSED_TIME: 1910
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:memory_corruption_large
- FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
- Followup: memory_corruption
- !errrec fffff80080ae6bb9
- ===============================================================================
- Section 33603 : {24448d48-4850-4589-d048-8d4424584889}
- -------------------------------------------------------------------------------
- Descriptor @ fffff80080d35711
- Section @ fffff800c8ee8ffd
- Offset : 1212163140
- Length : 1219511689
- Flags : 0xc0458948 ThresholdExceeded
- Severity : Invalid
- *** Unknown section format ***
- ===============================================================================
- Section 33604 : {084d89f8-8d48-8045-498b-c94889442438}
- -------------------------------------------------------------------------------
- Descriptor @ fffff80080d35759
- Section @ fffff800ce376bb9
- Offset : 1300824064
- Length : 3360524728
- Flags : 0x4d89e84d Primary Reset ThresholdExceeded
- Severity : Invalid
- *** Unknown section format ***
- ===============================================================================
- Section 33605 : {5de38b49-ccc3-cccc-cccc-cc40534883ec}
- -------------------------------------------------------------------------------
- Descriptor @ fffff80080d357a1
- Section @ fffff8009109f702
- Offset : 274434889
- Length : 410225481
- Flags : 0x28738b4d Primary Reset ThresholdExceeded
- Severity : Invalid
- FRU Id : {018b4820-8b48-48d9-85c0-74334883f820}
- FRU Text : ÈèU¥ÿ¾Ð¸?
- *** Unknown section format ***
- ===============================================================================
- Section 33606 : {00000db8-ebc0-3302-c048-83c4205bc3cc}
- -------------------------------------------------------------------------------
- Descriptor @ fffff80080d357e9
- Section @ fffff800c8b656bc
- Offset : 1208478467
- Length : 1210105987
- Flags : 0x0776353b Primary ContainmentWarning ThresholdExceeded ResourceNotAvailable LatentError
- Severity : Invalid
- *** Unknown section format ***
- ===============================================================================
- Section 33607 : {780d8d48-cca8-45ff-8bf8-e800b39dff33}
- -------------------------------------------------------------------------------
- Descriptor @ fffff80080d35831
- Section @ fffff800c9729f01
- Offset : 1220817736
- Length : 1156597129
- Flags : 0xd233e18b Primary ContainmentWarning ThresholdExceeded
- Severity : Invalid
- FRU Text : ÆHIHÁãH¹
- *** Unknown section format ***
- !thread
- THREAD ffffbb0569acf080 Cid 0940.09f8 Teb: 0000004c8c89e000 Win32Thread: 0000000000000000 RUNNING on processor 2
- Not impersonating
- GetUlongFromAddress: unable to read from fffff800809c02d4
- Owning Process ffffbb0569a297c0 Image: svchost.exe
- Attached Process N/A Image: N/A
- fffff78000000000: Unable to get shared data
- Wait Start TickCount 1171
- Context Switch Count 21 IdealProcessor: 1
- ReadMemory error: Cannot get nt!KeMaximumIncrement value.
- UserTime 00:00:00.000
- KernelTime 00:00:00.000
- Win32 Start Address 0x00007ffe6c899090
- Stack Init ffffe580a746bc10 Current ffffe580a746b190
- Base ffffe580a746c000 Limit ffffe580a7465000 Call 0000000000000000
- Priority 8 BasePriority 8 PriorityDecrement 0 IoPriority 2 PagePriority 5
- Child-SP RetAddr : Args to Child : Call Site
- ffffe580`a7469ca8 fffff800`807fa6a9 : 00000000`0000003b 00000000`c0000005 fffff800`80ae6bb9 ffffe580`a746a580 : nt!KeBugCheckEx
- ffffe580`a7469cb0 fffff800`807f9e3c : ffffe580`a7469f00 fffff800`807eb5ea fffff800`8095c824 ffffe580`a746ad48 : nt!KiBugCheckDispatch+0x69
- ffffe580`a7469df0 fffff800`807f57ed : fffff800`80a0d000 fffff800`80683000 00053760`00889000 ffffe580`a746a420 : nt!KiSystemServiceHandler+0x7c
- ffffe580`a7469e30 fffff800`80690284 : 00000000`00000003 ffffe580`a7469f60 00000000`00000000 00000000`00000000 : nt!RtlpExecuteHandlerForException+0xd
- ffffe580`a7469e60 fffff800`8068f063 : ffffe580`a746ad48 ffffe580`a746aa80 ffffe580`a746ad48 00000000`000000c8 : nt!RtlDispatchException+0x404
- ffffe580`a746a550 fffff800`807fa782 : ffffa38d`42dd0a01 00000000`00000000 ffffe580`a746ae20 00000000`00000000 : nt!KiDispatchException+0x143
- ffffe580`a746ac10 fffff800`807f8a34 : 00000000`00000000 00000000`ffffffff 00000001`00000000 00000000`00000201 : nt!KiExceptionDispatch+0xc2
- ffffe580`a746adf0 fffff800`80ae6bb9 : ffffe580`a746b910 ffffe580`a746b080 ffffa38d`3b43c130 ffffa38d`3b4387a0 : nt!KiGeneralProtectionFault+0xf4 (TrapFrame @ ffffe580`a746adf0)
- ffffe580`a746af80 fffff800`80af24b6 : ffffe580`0000001c ffffe580`a746b450 ffffe580`a746b3d0 ffffa38d`451689e0 : nt!CmpDoParseKey+0x239
- ffffe580`a746b360 fffff800`80aec98b : ffffbb05`653cbb10 00000000`00000000 ffffbb05`653cbb10 ffffa38d`3b414701 : nt!CmpParseKey+0x266
- ffffe580`a746b530 fffff800`80af0300 : ffffbb05`653cbb00 ffffe580`a746b798 00000000`00000040 ffffbb05`64f59f20 : nt!ObpLookupObjectName+0x46b
- ffffe580`a746b700 fffff800`80af1004 : 0000004c`00000001 ffffbb05`64f59f20 00000000`00000000 00000000`00000000 : nt!ObOpenObjectByNameEx+0x1e0
- ffffe580`a746b840 fffff800`80af3d2f : 0000004c`8d1fed01 00000000`00000000 00000000`00000000 000001a0`446a63b0 : nt!CmOpenKey+0x274
- ffffe580`a746ba40 fffff800`807fa213 : ffffbb05`69acf080 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtOpenKeyEx+0xf
- ffffe580`a746ba80 00007ffe`76e17644 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 (TrapFrame @ ffffe580`a746ba80)
- 0000004c`8d1fe838 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`76e17644
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement