Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Microsoft (R) Windows Debugger Version 10.0.14321.1024 X86
- Copyright (c) Microsoft Corporation. All rights reserved.
- Auto Dump Analyzer by gardenman
- Time to debug file(s): 00 hours and 10 minutes and 16 seconds
- ========================================================================
- =================== Dump File: 072917-7593-01.dmp ====================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 15063 MP (4 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS Personal
- Built by: 15063.0.amd64fre.rs2_release.170317-1834
- Kernel base = 0xfffff801`36c85000 PsLoadedModuleList = 0xfffff801`36fd15e0
- Debug session time: Sat Jul 29 11:40:08.409 2017 (UTC - 4:00)
- System Uptime: 2 days 17:20:48.069
- BugCheck F7, {3c80206f46a0, 8ba9e8902088, ffff7456176fdf77, 0}
- *** WARNING: Unable to verify timestamp for win32k.sys
- *** ERROR: Module load completed but symbols could not be loaded for win32k.sys
- Probably caused by : memory_corruption
- Followup: memory_corruption
- DRIVER_OVERRAN_STACK_BUFFER (f7)
- A driver has overrun a stack-based buffer. This overrun could potentially
- allow a malicious user to gain control of this machine.
- DESCRIPTION
- A driver overran a stack-based buffer (or local variable) in a way that would
- have overwritten the function's return address and jumped back to an arbitrary
- address when the function returned. This is the classic "buffer overrun"
- hacking attack and the system has been brought down to prevent a malicious user
- from gaining complete control of it.
- Do a kb to get a stack backtrace -- the last routine on the stack before the
- buffer overrun handlers and bugcheck call is the one that overran its local
- variable(s).
- Arguments:
- Arg1: 00003c80206f46a0, Actual security check cookie from the stack
- Arg2: 00008ba9e8902088, Expected security check cookie
- Arg3: ffff7456176fdf77, Complement of the expected security check cookie
- Arg4: 0000000000000000, zero
- Debugging Details:
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 10.0.15063.483 (WinBuild.160101.0800)
- BIOS_VENDOR: American Megatrends Inc.
- BIOS_VERSION: P2.30
- BIOS_DATE: 06/29/2012
- BASEBOARD_MANUFACTURER: ASRock
- BASEBOARD_PRODUCT: Z68 Pro3 Gen3
- BASEBOARD_VERSION:
- DUMP_TYPE: 2
- SECURITY_COOKIE: Expected 00008ba9e8902088 found 00003c80206f46a0
- CPU_COUNT: 4
- CPU_MHZ: c15
- CPU_VENDOR: GenuineIntel
- CPU_FAMILY: 6
- CPU_MODEL: 2a
- CPU_STEPPING: 7
- CPU_MICROCODE: 6,2a,7,0 (F,M,S,R) SIG: 29'00000000 (cache) 29'00000000 (init)
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: CODE_CORRUPTION
- BUGCHECK_STR: 0xF7
- PROCESS_NAME: System
- CURRENT_IRQL: 2
- LAST_CONTROL_TRANSFER: from fffff80136e5f905 to fffff80136df14c0
- STACK_TEXT:
- ffff9480`206f08f8 fffff801`36e5f905 : 00000000`000000f7 00003c80`206f46a0 00008ba9`e8902088 ffff7456`176fdf77 : nt!KeBugCheckEx
- ffff9480`206f0900 fffff801`36ccce0a : ffffde8f`a8808918 00000000`00000000 ffffa800`05cc99d0 fffff801`37002100 : nt!_report_gsfailure+0x25
- ffff9480`206f0940 fffff801`36e15799 : 00000000`001eedd0 00000000`00000001 00000000`00000000 0000000f`ffffffff : nt!MiGetTopLevelPfn+0x12a
- ffff9480`206f09c0 fffff801`36dad700 : ffffa800`003fb9a0 00000000`00000000 fffff801`37002100 ffffa800`05cc99d0 : nt!MiRestoreTransitionPte+0x145579
- ffff9480`206f0a30 fffff801`36ea17f9 : 0000000f`ffffffff 00000000`00000000 00000000`00000000 ffffde8f`00000001 : nt!MiRemoveLowestPriorityStandbyPage+0x1b0
- ffff9480`206f0ac0 fffff801`36ea1a0d : 00000000`00000000 00000000`00000000 00000000`00000000 fffff801`37002100 : nt!MiPruneStandbyPages+0x55
- ffff9480`206f0b20 fffff801`36cc2ca8 : ffffde8f`a75b5040 fffff801`36ea1980 fffff801`370034e0 fffff801`370c5620 : nt!MiRebalanceZeroFreeLists+0x8d
- ffff9480`206f0b80 fffff801`36d61ac7 : 00007ff9`13e69db0 00000000`00000080 ffffde8f`a3622280 ffffde8f`a75b5040 : nt!ExpWorkerThread+0xd8
- ffff9480`206f0c10 fffff801`36df6946 : ffff9480`1c444180 ffffde8f`a75b5040 fffff801`36d61a80 ffff9480`206f0c00 : nt!PspSystemThreadStartup+0x47
- ffff9480`206f0c60 00000000`00000000 : ffff9480`206f1000 ffff9480`206eb000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
- STACK_COMMAND: kb
- CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
- fffff80136ccce98-fffff80136ccce99 2 bytes - nt!MiUnlockCodePage+5c
- [ 80 fa:00 a8 ]
- fffff80136d9db1a - nt!MiUnlockPagedAddress+22 (+0xd0c82)
- [ f6:c5 ]
- fffff80136d9db40-fffff80136d9db41 2 bytes - nt!MiUnlockPagedAddress+48 (+0x26)
- [ 80 fa:00 a8 ]
- fffff80136ea1810-fffff80136ea1811 2 bytes - nt!MiPruneStandbyPages+6c (+0x103cd0)
- [ 80 fa:00 a8 ]
- fffff80136ea18a2-fffff80136ea18a3 2 bytes - nt!MiPruneStandbyPages+fe (+0x92)
- [ 80 fa:00 a8 ]
- fffff80136ea1af9-fffff80136ea1afa 2 bytes - nt!MiSwapNumaStandbyPage+35 (+0x257)
- [ 80 fa:00 a8 ]
- 11 errors : !nt (fffff80136ccce98-fffff80136ea1afa)
- MODULE_NAME: memory_corruption
- IMAGE_NAME: memory_corruption
- FOLLOWUP_NAME: memory_corruption
- DEBUG_FLR_IMAGE_TIMESTAMP: 0
- MEMORY_CORRUPTOR: LARGE
- FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
- BUCKET_ID: MEMORY_CORRUPTION_LARGE
- PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
- TARGET_TIME: 2017-07-29T15:40:08.000Z
- OSBUILD: 15063
- OSSERVICEPACK: 483
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 784
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2017-07-07 02:06:35
- BUILDDATESTAMP_STR: 160101.0800
- BUILDLAB_STR: WinBuild
- BUILDOSVER_STR: 10.0.15063.483
- ANALYSIS_SESSION_ELAPSED_TIME: 2a65
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:memory_corruption_large
- FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
- Followup: memory_corruption
- =============================== Drivers ================================
- Image path: \SystemRoot\System32\win32kfull.sys
- Image name: win32kfull.sys
- Timestamp: unavailable (00000000)
- Image path: \SystemRoot\System32\win32k.sys
- Image name: win32k.sys
- Timestamp: unavailable (00000000)
- Image path: \SystemRoot\System32\win32kbase.sys
- Image name: win32kbase.sys
- Timestamp: unavailable (00000000)
- Image path: \SystemRoot\System32\TSDDD.dll
- Image name: TSDDD.dll
- Timestamp: unavailable (00000000)
- Image path: \SystemRoot\System32\cdd.dll
- Image name: cdd.dll
- Timestamp: unavailable (00000000)
- Image path: \SystemRoot\system32\drivers\peauth.sys
- Image name: peauth.sys
- Timestamp: Sat Dec 9 1989
- Image path: \SystemRoot\system32\DRIVERS\nuviocir_x64.sys
- Image name: nuviocir_x64.sys
- Timestamp: Thu Jul 11 2013
- Image path: \SystemRoot\system32\drivers\LGVirHid.sys
- Image name: LGVirHid.sys
- Timestamp: Mon Jun 13 2016
- Image path: \SystemRoot\System32\drivers\wdcsam64.sys
- Image name: wdcsam64.sys
- Timestamp: Fri Oct 9 2015
- Image path: MpKsl0779f59e.sys
- Image name: MpKsl0779f59e.sys
- Timestamp: Tue May 19 2015
- Image path: \SystemRoot\System32\Drivers\Null.SYS
- Image name: Null.SYS
- Timestamp: unavailable (00000000)
- Image path: \SystemRoot\System32\Drivers\Fs_Rec.sys
- Image name: Fs_Rec.sys
- Timestamp: unavailable (00000000)
- Image path: \??\C:\ProgramData\Microsoft\Windows Defender\Definition Updates\{9C45D0D4-C683-4D03-B550-3CF4D94B5140}\MpKslac96ca23.sys
- Image name: MpKslac96ca23.sys
- Timestamp: Tue May 19 2015
- Image path: \??\C:\ProgramData\Microsoft\Windows Defender\Definition Updates\{520C8120-3717-4531-B385-60E85EA43257}\MpKsl5b188f08.sys
- Image name: MpKsl5b188f08.sys
- Timestamp: Tue May 19 2015
- Image path: \SystemRoot\System32\drivers\tap0901.sys
- Image name: tap0901.sys
- Timestamp: Wed Nov 5 2014
- Image path: \SystemRoot\system32\drivers\LGJoyXlCore.sys
- Image name: LGJoyXlCore.sys
- Timestamp: Mon Jun 13 2016
- Image path: \SystemRoot\system32\drivers\nvhda64v.sys
- Image name: nvhda64v.sys
- Timestamp: Tue May 16 2017
- Image path: \??\C:\Program Files\Logitech Gaming Software\Drivers\LgCoreTemp\lgcoretemp.sys
- Image name: lgcoretemp.sys
- Timestamp: Tue Jun 9 2015
- Image path: \SystemRoot\system32\DRIVERS\igdkmd64.sys
- Image name: igdkmd64.sys
- Timestamp: Thu May 19 2016
- Image path: \SystemRoot\System32\drivers\TeeDriverW8x64.sys
- Image name: TeeDriverW8x64.sys
- Timestamp: Tue Jul 7 2015
- Image path: \SystemRoot\system32\drivers\cmudaxp.sys
- Image name: cmudaxp.sys
- Timestamp: Tue Jun 2 2015
- Image path: \SystemRoot\System32\drivers\rt640x64.sys
- Image name: rt640x64.sys
- Timestamp: Wed Oct 5 2016
- Image path: \SystemRoot\System32\drivers\ISCTD64.sys
- Image name: ISCTD64.sys
- Timestamp: Tue Nov 27 2012
- Image path: \SystemRoot\system32\drivers\nvvad64v.sys
- Image name: nvvad64v.sys
- Timestamp: Wed Apr 12 2017
- Image path: \SystemRoot\System32\drivers\nvvhci.sys
- Image name: nvvhci.sys
- Timestamp: Tue Dec 27 2016
- Image path: \SystemRoot\System32\DriverStore\FileRepository\nv_dispi.inf_amd64_2386fda73b467ac8\nvlddmkm.sys
- Image name: nvlddmkm.sys
- Timestamp: Tue Jun 27 2017
- Image path: \SystemRoot\System32\drivers\drmk.sys
- Image name: drmk.sys
- Timestamp: ***** Invalid (A01C1986)
- Image path: \SystemRoot\system32\drivers\LGBusEnum.sys
- Image name: LGBusEnum.sys
- Timestamp: Mon Jun 13 2016
- Unloaded modules:
- fffff801`36040000 fffff801`3604e000 MpKsl1244392
- fffff801`360f0000 fffff801`3610c000 EhStorClass.
- fffff801`35f90000 fffff801`35f9d000 WSDScan.sys
- fffff801`35f80000 fffff801`35f8d000 WSDPrint.sys
- fffff801`36050000 fffff801`3605f000 hiber_storpo
- fffff801`36060000 fffff801`36087000 hiber_storah
- fffff801`36090000 fffff801`360ad000 hiber_dumpfv
- fffff806`17730000 fffff806`1776d000 WUDFRd.sys
- fffff806`17480000 fffff806`174bd000 WUDFRd.sys
- fffff806`17440000 fffff806`1747d000 WUDFRd.sys
- fffff806`17400000 fffff806`1743d000 WUDFRd.sys
- fffff806`173c0000 fffff806`173fd000 WUDFRd.sys
- fffff806`18410000 fffff806`1841b000 cldflt.sys
- fffff806`17380000 fffff806`173bd000 WUDFRd.sys
- fffff806`18420000 fffff806`1843c000 EhStorClass.
- fffff806`18400000 fffff806`1841c000 EhStorClass.
- fffff806`183e0000 fffff806`183fc000 EhStorClass.
- fffff806`166b0000 fffff806`166cc000 EhStorClass.
- fffff806`17210000 fffff806`1721f000 dump_storpor
- fffff806`17250000 fffff806`17277000 dump_storahc
- fffff806`172a0000 fffff806`172bd000 dump_dumpfve
- fffff806`17f70000 fffff806`17f90000 dam.sys
- fffff806`16320000 fffff806`1632f000 WdBoot.sys
- fffff806`17120000 fffff806`1712f000 hwpolicy.sys
- ============================= BIOS INFO ================================
- [SMBIOS Data Tables v2.7]
- [DMI Version - 0]
- [2.0 Calling Convention - No]
- [Table Size - 1537 bytes]
- [BIOS Information (Type 0) - Length 24 - Handle 0000h]
- Vendor American Megatrends Inc.
- BIOS Version P2.30
- BIOS Starting Address Segment f000
- BIOS Release Date 06/29/2012
- BIOS ROM Size 800000
- BIOS Characteristics
- 07: - PCI Supported
- 11: - Upgradeable FLASH BIOS
- 12: - BIOS Shadowing Supported
- 15: - CD-Boot Supported
- 16: - Selectable Boot Supported
- 17: - BIOS ROM Socketed
- 19: - EDD Supported
- 23: - 1.2MB Floppy Supported
- 24: - 720KB Floppy Supported
- 25: - 2.88MB Floppy Supported
- 26: - Print Screen Device Supported
- 27: - Keyboard Services Supported
- 28: - Serial Services Supported
- 29: - Printer Services Supported
- 32: - BIOS Vendor Reserved
- BIOS Characteristic Extensions
- 00: - ACPI Supported
- 01: - USB Legacy Supported
- 08: - BIOS Boot Specification Supported
- 10: - Specification Reserved
- 11: - Specification Reserved
- BIOS Major Revision 4
- BIOS Minor Revision 6
- EC Firmware Major Revision 255
- EC Firmware Minor Revision 255
- [System Information (Type 1) - Length 27 - Handle 0001h]
- UUID 00000000-0000-0000-0000-000000000000
- Wakeup Type Power Switch
- [BaseBoard Information (Type 2) - Length 15 - Handle 0002h]
- Manufacturer ASRock
- Product Z68 Pro3 Gen3
- Version
- Feature Flags 09h
- 1590305288: - ?ÿU?ì?ì¡H.Ý^3Å?Eü3ÀW?}?Eô?Eø?ÿu
- ¸@
- 1590305328: - ?ÿU?ì?ì¡H.Ý^3Å?Eü3ÀW?}?Eô?Eø?ÿu
- ¸@
- Location
- Chassis Handle 0003h
- Board Type 0ah - Processor/Memory Module
- Number of Child Handles 0
- [System Enclosure (Type 3) - Length 22 - Handle 0003h]
- Chassis Type Desktop
- Bootup State Safe
- Power Supply State Safe
- Thermal State Safe
- Security Status None
- OEM Defined 0
- Height 0U
- Number of Power Cords 1
- Number of Contained Elements 0
- Contained Element Size 0
- [OEM Strings (Type 11) - Length 5 - Handle 000ah]
- Number of Strings 1
- [Cache Information (Type 7) - Length 19 - Handle 000ch]
- Socket Designation CPU Internal L2
- Cache Configuration 0081h - WT Enabled Int NonSocketed L2
- Maximum Cache Size 0200h - 512K
- Installed Size 0200h - 512K
- Supported SRAM Type 0002h - Unknown
- Current SRAM Type 0002h - Unknown
- Cache Speed 0ns
- Error Correction Type Specification Reserved
- System Cache Type Instruction
- Associativity 16-way Set-Associative
- [Cache Information (Type 7) - Length 19 - Handle 000dh]
- Socket Designation CPU Internal L1
- Cache Configuration 0080h - WT Enabled Int NonSocketed L1
- Maximum Cache Size 0040h - 64K
- Installed Size 0040h - 64K
- Supported SRAM Type 0002h - Unknown
- Current SRAM Type 0002h - Unknown
- Cache Speed 0ns
- Error Correction Type ParitySingle-Bit ECC
- System Cache Type Other
- Associativity 16-way Set-Associative
- [Cache Information (Type 7) - Length 19 - Handle 000eh]
- Socket Designation CPU Internal L3
- Cache Configuration 0182h - WB Enabled Int NonSocketed L3
- Maximum Cache Size 0c00h - 3072K
- Installed Size 0c00h - 3072K
- Supported SRAM Type 0002h - Unknown
- Current SRAM Type 0002h - Unknown
- Cache Speed 0ns
- Error Correction Type Specification Reserved
- System Cache Type Instruction
- Associativity Specification Reserved
- [Physical Memory Array (Type 16) - Length 23 - Handle 000fh]
- Location 03h - SystemBoard/Motherboard
- Use 03h - System Memory
- Memory Error Correction 03h - None
- Maximum Capacity 33554432KB
- Number of Memory Devices 4
- [Processor Information (Type 4) - Length 42 - Handle 0010h]
- Socket Designation CPUSocket
- Processor Type Central Processor
- Processor Family ceh - Specification Reserved
- Processor Manufacturer Intel(R) Corporation
- Processor ID a7060200fffbebbf
- Processor Version Intel(R) Core(TM) i3-2100 CPU @ 3.10GHz
- Processor Voltage 8ch - 1.2V
- External Clock 100MHz
- Max Speed 3800MHz
- Current Speed 3100MHz
- Status Enabled Populated
- Processor Upgrade Specification Reserved
- L1 Cache Handle 000dh
- L2 Cache Handle 000ch
- L3 Cache Handle 000eh
- [Memory Device (Type 17) - Length 34 - Handle 0011h]
- Physical Memory Array Handle 000fh
- Total Width 64 bits
- Data Width 64 bits
- Size 4096MB
- Form Factor 09h - DIMM
- Device Locator ChannelA-DIMM0
- Bank Locator BANK 0
- Memory Type 18h - Specification Reserved
- Type Detail 0080h - Synchronous
- Speed 1333MHz
- Manufacturer Kingston
- Part Number 9905403-447.A00LF
- [Memory Device Mapped Address (Type 20) - Length 35 - Handle 0012h]
- Starting Address 00000000h
- Ending Address 003fffffh
- Memory Device Handle 0011h
- Mem Array Mapped Adr Handle 0017h
- Partition Row Position 01
- Interleave Position 01
- Interleave Data Depth 02
- [Memory Device (Type 17) - Length 34 - Handle 0013h]
- Physical Memory Array Handle 000fh
- Total Width 0 bits
- Data Width 0 bits
- Form Factor 09h - DIMM
- Device Locator ChannelA-DIMM1
- Bank Locator BANK 1
- Memory Type 02h - Unknown
- Type Detail 0000h -
- Speed 0MHz
- [Memory Device (Type 17) - Length 34 - Handle 0014h]
- Physical Memory Array Handle 000fh
- Total Width 64 bits
- Data Width 64 bits
- Size 4096MB
- Form Factor 09h - DIMM
- Device Locator ChannelB-DIMM0
- Bank Locator BANK 2
- Memory Type 18h - Specification Reserved
- Type Detail 0080h - Synchronous
- Speed 1333MHz
- Manufacturer Kingston
- Part Number 9905403-447.A00LF
- [Memory Device Mapped Address (Type 20) - Length 35 - Handle 0015h]
- Starting Address 00400000h
- Ending Address 007fffffh
- Memory Device Handle 0014h
- Mem Array Mapped Adr Handle 0017h
- Partition Row Position 01
- Interleave Position 02
- Interleave Data Depth 02
- [Memory Device (Type 17) - Length 34 - Handle 0016h]
- Physical Memory Array Handle 000fh
- Total Width 0 bits
- Data Width 0 bits
- Form Factor 09h - DIMM
- Device Locator ChannelB-DIMM1
- Bank Locator BANK 3
- Memory Type 02h - Unknown
- Type Detail 0000h -
- Speed 0MHz
- [Memory Array Mapped Address (Type 19) - Length 31 - Handle 0017h]
- Starting Address 00000000h
- Ending Address 007fffffh
- Memory Array Handle 000fh
- Partition Width 04
- ========================================================================
- =================== Dump File: 072917-7625-01.dmp ====================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 15063 MP (4 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS Personal
- Built by: 15063.0.amd64fre.rs2_release.170317-1834
- Kernel base = 0xfffff803`55206000 PsLoadedModuleList = 0xfffff803`555525e0
- Debug session time: Sat Jul 29 12:24:38.533 2017 (UTC - 4:00)
- System Uptime: 0 days 0:00:10.193
- BugCheck 3B, {c0000005, fffff8035529c7c0, ffffd000051172c0, 0}
- Probably caused by : memory_corruption
- Followup: memory_corruption
- SYSTEM_SERVICE_EXCEPTION (3b)
- An exception happened while executing a system service routine.
- Arguments:
- Arg1: 00000000c0000005, Exception code that caused the bugcheck
- Arg2: fffff8035529c7c0, Address of the instruction which caused the bugcheck
- Arg3: ffffd000051172c0, Address of the context record for the exception that caused the bugcheck
- Arg4: 0000000000000000, zero.
- Debugging Details:
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 10.0.15063.483 (WinBuild.160101.0800)
- BIOS_VENDOR: American Megatrends Inc.
- BIOS_VERSION: P2.30
- BIOS_DATE: 06/29/2012
- BASEBOARD_MANUFACTURER: ASRock
- BASEBOARD_PRODUCT: Z68 Pro3 Gen3
- BASEBOARD_VERSION:
- DUMP_TYPE: 2
- EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
- FAULTING_IP:
- nt!MiCoalesceFreePages+3c0
- fffff803`5529c7c0 4c8b36 mov r14,qword ptr [rsi]
- CONTEXT: ffffd000051172c0 -- (.cxr 0xffffd000051172c0)
- rax=fffff18003c12540 rbx=fffff18003c15568 rcx=fffff18003c0f540
- rdx=fffff18003c12540 rsi=dd00000000000000 rdi=fffff18000000000
- rip=fffff8035529c7c0 rsp=ffffd00005117cb0 rbp=fffff480000051c0
- r8=fffff18003c12540 r9=00000000001a6a80 r10=fffff480000051c0
- r11=fffff18003c0f540 r12=0000000000000201 r13=7fffffffffffffff
- r14=dd00000000000000 r15=2aaaaaaaaaaaaaab
- iopl=0 nv up ei ng nz na po nc
- cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010286
- nt!MiCoalesceFreePages+0x3c0:
- fffff803`5529c7c0 4c8b36 mov r14,qword ptr [rsi] ds:002b:dd000000`00000000=????????????????
- Resetting default scope
- CPU_COUNT: 4
- CPU_MHZ: c15
- CPU_VENDOR: GenuineIntel
- CPU_FAMILY: 6
- CPU_MODEL: 2a
- CPU_STEPPING: 7
- CPU_MICROCODE: 6,2a,7,0 (F,M,S,R) SIG: 29'00000000 (cache) 29'00000000 (init)
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: CODE_CORRUPTION
- BUGCHECK_STR: 0x3B
- PROCESS_NAME: MsMpEng.exe
- CURRENT_IRQL: 2
- LAST_CONTROL_TRANSFER: from fffff8035529bc6e to fffff8035529c7c0
- STACK_TEXT:
- ffffd000`05117cb0 fffff803`5529bc6e : 00000000`00140710 00000000`00000001 00000000`00000201 fffff180`03c15300 : nt!MiCoalesceFreePages+0x3c0
- ffffd000`05117d80 fffff803`5529b75c : 00000000`00140712 00000000`00000000 ffffa782`2da79010 ffffa782`00000001 : nt!MiInsertPageInFreeOrZeroedList+0x20e
- ffffd000`05117e80 fffff803`5529de72 : ffffa782`2da790f0 ffffd000`05118168 ffffa782`2da790f0 fffff803`55272107 : nt!MiPfnShareCountIsZero+0xcc
- ffffd000`05117ed0 fffff803`55289ef4 : 00000000`00000200 fffff880`fad42538 00000000`00000000 ffffbb87`e363e150 : nt!MiDeletePteList+0x432
- ffffd000`05118090 fffff803`556bcc6b : 00000000`00000000 ffffd000`05118b80 00000000`00017000 000001f5`a8491000 : nt!MiDecommitPages+0x5e4
- ffffd000`051189b0 fffff803`5537d413 : 00000000`0000027c ffffa782`2c619080 00000000`00000000 00000039`a23fefd8 : nt!NtFreeVirtualMemory+0x2ab
- ffffd000`05118b00 00007ffb`3fc95764 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
- 00000039`a23fe868 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`3fc95764
- CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
- fffff803552899c2 - nt!MiDecommitPages+b2
- [ f6:f8 ]
- fffff8035529b817 - nt!MiPfnShareCountIsZero+187 (+0x11e55)
- [ f6:f8 ]
- fffff8035529c17c - nt!MiInsertPageInFreeOrZeroedList+71c (+0x965)
- [ fa:f1 ]
- fffff8035529c1dc - nt!MiInsertPageInFreeOrZeroedList+77c (+0x60)
- [ fa:f1 ]
- fffff8035529c447 - nt!MiCoalesceFreePages+47 (+0x26b)
- [ fa:f1 ]
- fffff8035529c4c7 - nt!MiCoalesceFreePages+c7 (+0x80)
- [ fa:f1 ]
- fffff8035529c7b8 - nt!MiCoalesceFreePages+3b8 (+0x2f1)
- [ fa:f1 ]
- fffff8035529ca0c - nt!MiCoalesceFreePages+60c (+0x254)
- [ fa:f1 ]
- fffff8035529cbf4 - nt!MiUnlinkFreeOrZeroedPage+24 (+0x1e8)
- [ fa:f1 ]
- fffff8035529ce33 - nt!MiUnlinkFreeOrZeroedPage+263 (+0x23f)
- [ fa:f1 ]
- fffff8035529cec1 - nt!MiUnlinkFreeOrZeroedPage+2f1 (+0x8e)
- [ fa:f1 ]
- fffff8035529cf7b - nt!MiUnlinkFreeOrZeroedPage+3ab (+0xba)
- [ fa:f1 ]
- fffff8035529cfac - nt!MiUnlinkFreeOrZeroedPage+3dc (+0x31)
- [ fa:f1 ]
- 13 errors : !nt (fffff803552899c2-fffff8035529cfac)
- MODULE_NAME: memory_corruption
- IMAGE_NAME: memory_corruption
- FOLLOWUP_NAME: memory_corruption
- DEBUG_FLR_IMAGE_TIMESTAMP: 0
- MEMORY_CORRUPTOR: LARGE
- STACK_COMMAND: .cxr 0xffffd000051172c0 ; kb
- FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
- BUCKET_ID: MEMORY_CORRUPTION_LARGE
- PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
- TARGET_TIME: 2017-07-29T16:24:38.000Z
- OSBUILD: 15063
- OSSERVICEPACK: 483
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 784
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2017-07-07 02:06:35
- BUILDDATESTAMP_STR: 160101.0800
- BUILDLAB_STR: WinBuild
- BUILDOSVER_STR: 10.0.15063.483
- ANALYSIS_SESSION_ELAPSED_TIME: 2952
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:memory_corruption_large
- FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
- Followup: memory_corruption
- ========================================================================
- =================== Dump File: 072917-7640-03.dmp ====================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 15063 MP (4 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS Personal
- Built by: 15063.0.amd64fre.rs2_release.170317-1834
- Kernel base = 0xfffff800`49e8d000 PsLoadedModuleList = 0xfffff800`4a1d95e0
- Debug session time: Sat Jul 29 16:55:10.359 2017 (UTC - 4:00)
- System Uptime: 0 days 0:00:39.078
- BugCheck 1000007E, {ffffffffc0000005, fffff8004a5edc25, ffffc100a1945dd8, ffffc100a1945620}
- *** WARNING: Unable to verify timestamp for win32k.sys
- *** ERROR: Module load completed but symbols could not be loaded for win32k.sys
- Probably caused by : memory_corruption
- Followup: memory_corruption
- SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
- This is a very common bugcheck. Usually the exception address pinpoints
- the driver/function that caused the problem. Always note this address
- as well as the link date of the driver/image that contains this address.
- Some common problems are exception code 0x80000003. This means a hard
- coded breakpoint or assertion was hit, but this system was booted
- /NODEBUG. This is not supposed to happen as developers should never have
- hardcoded breakpoints in retail code, but ...
- If this happens, make sure a debugger gets connected, and the
- system is booted /DEBUG. This will let us see why this breakpoint is
- happening.
- Arguments:
- Arg1: ffffffffc0000005, The exception code that was not handled
- Arg2: fffff8004a5edc25, The address that the exception occurred at
- Arg3: ffffc100a1945dd8, Exception Record Address
- Arg4: ffffc100a1945620, Context Record Address
- Debugging Details:
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 10.0.15063.483 (WinBuild.160101.0800)
- DUMP_TYPE: 2
- EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
- FAULTING_IP:
- nt!IovpValidateDeviceObject+5
- fffff800`4a5edc25 66833903 cmp word ptr [rcx],3
- EXCEPTION_RECORD: ffffc100a1945dd8 -- (.exr 0xffffc100a1945dd8)
- ExceptionAddress: fffff8004a5edc25 (nt!IovpValidateDeviceObject+0x0000000000000005)
- ExceptionCode: c0000005 (Access violation)
- ExceptionFlags: 00000000
- NumberParameters: 2
- Parameter[0]: 0000000000000000
- Parameter[1]: 00000000046dc232
- Attempt to read from address 00000000046dc232
- CONTEXT: ffffc100a1945620 -- (.cxr 0xffffc100a1945620)
- rax=ffffd404faaced80 rbx=ffffd404faaced80 rcx=00000000046dc232
- rdx=0000000000000000 rsi=00000000046dc232 rdi=ffffd50ba9bb74f0
- rip=fffff8004a5edc25 rsp=ffffc100a1946018 rbp=fffff803e6ce1657
- r8=0000000000000000 r9=0000000000000000 r10=0000000000000000
- r11=0000000000000000 r12=0000000000180000 r13=fffff803e904a488
- r14=0000000000000000 r15=ffffd50ba9c491b0
- iopl=0 nv up ei pl nz na pe nc
- cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202
- nt!IovpValidateDeviceObject+0x5:
- fffff800`4a5edc25 66833903 cmp word ptr [rcx],3 ds:002b:00000000`046dc232=????
- Resetting default scope
- CPU_COUNT: 4
- CPU_MHZ: c15
- CPU_VENDOR: GenuineIntel
- CPU_FAMILY: 6
- CPU_MODEL: 2a
- CPU_STEPPING: 7
- CUSTOMER_CRASH_COUNT: 3
- DEFAULT_BUCKET_ID: CODE_CORRUPTION
- PROCESS_NAME: System
- CURRENT_IRQL: 0
- ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
- EXCEPTION_CODE_STR: c0000005
- EXCEPTION_PARAMETER1: 0000000000000000
- EXCEPTION_PARAMETER2: 00000000046dc232
- FOLLOWUP_IP:
- nt!IovpValidateDeviceObject+5
- fffff800`4a5edc25 66833903 cmp word ptr [rcx],3
- READ_ADDRESS: fffff8004a26e358: Unable to get MiVisibleState
- 00000000046dc232
- BUGCHECK_STR: AV
- LOCK_ADDRESS: fffff8004a1f1f80 -- (!locks fffff8004a1f1f80)
- Resource @ nt!PiEngineLock (0xfffff8004a1f1f80) Available
- WARNING: SystemResourcesList->Flink chain invalid. Resource may be corrupted, or already deleted.
- WARNING: SystemResourcesList->Blink chain invalid. Resource may be corrupted, or already deleted.
- 1 total locks
- PNP_TRIAGE:
- Lock address : 0xfffff8004a1f1f80
- Thread Count : 0
- Thread address: 0x0000000000000000
- Thread wait : 0x0
- LAST_CONTROL_TRANSFER: from fffff8004a5ecfa4 to fffff8004a5edc25
- STACK_TEXT:
- ffffc100`a1946018 fffff800`4a5ecfa4 : ffffd404`faaced80 00000000`00000000 ffffd404`faacee98 ffffd50b`a9bb3f40 : nt!IovpValidateDeviceObject+0x5
- ffffc100`a1946020 fffff803`e6cd7c49 : ffffd50b`a969a490 ffffc100`a1946110 ffffd50b`a9903150 ffffd50b`a9bb74f0 : nt!IovCallDriver+0x14c
- ffffc100`a1946060 fffff800`4a5fa741 : 00000000`00000000 fffff800`4a5fd5b4 ffffd404`faaceee0 ffffd50b`a9c491b0 : VerifierExt!IofCallDriver_internal_wrapper+0x19
- ffffc100`a19460a0 fffff803`e6ce1657 : ffffd50b`a969a490 ffffd404`faaceee0 00000000`00000000 fffff800`4a5f8870 : nt!VerifierIofCallDriver+0x21
- ffffc100`a19460e0 fffff800`4a5ed09d : ffffd404`faaced80 ffffd50b`a969a490 00000000`00000000 ffffc100`a1946158 : VerifierExt!xdv_IRP_MJ_SYSTEM_CONTROL_wrapper+0xc7
- ffffc100`a1946130 fffff800`4a0227ad : ffffd404`faaced80 00000000`00000000 00000000`00000000 ffffd50b`a9bb3f40 : nt!IovCallDriver+0x245
- ffffc100`a1946170 fffff800`4a60ab5b : ffffd404`faaced80 00000000`00000000 ffffd50b`a9c7e4d0 ffffd404`00000000 : nt!IofCallDriver+0x134f9d
- ffffc100`a19461b0 fffff800`4a5ed09d : ffffd50b`a9c7e620 ffffd404`faaced80 00000000`00000000 00001f80`01089390 : nt!ViFilterDispatchGeneric+0xbb
- ffffc100`a19461f0 fffff803`e6cd7c49 : ffffd404`faaced80 00000000`00000017 ffffd50b`a9c49060 ffffd50b`a90b47e0 : nt!IovCallDriver+0x245
- ffffc100`a1946230 fffff800`4a5fa741 : fffff803`e6cde657 fffff800`4a5ed09d fffff803`e75d05d8 fffff803`e75d137d : VerifierExt!IofCallDriver_internal_wrapper+0x19
- ffffc100`a1946270 fffff803`e903666a : fffff803`e905af14 00000000`00000000 00000000`00000000 fffff800`4a5fd2db : nt!VerifierIofCallDriver+0x21
- ffffc100`a19462b0 fffff803`e903fd9a : 00000000`00000000 00000000`00000000 ffffd404`faaced80 ffffd50b`a9c491d0 : HIDCLASS!HidpCallDriver+0x7a
- ffffc100`a1946310 fffff803`e905af22 : ffffd50b`a9c491b0 ffffd50b`a9c7e4d0 ffffd404`faacef28 ffffc100`a19463a0 : HIDCLASS!HidpIrpMajorDefault+0xfa
- ffffc100`a1946370 fffff803`e903214f : ffffd404`00000002 00000000`00000017 ffffd404`faaced80 ffffd50b`a9903240 : HIDCLASS!HidpIrpMajorSystemControl+0x2352
- ffffc100`a19463a0 fffff803`e6ce1657 : ffffd50b`a9c49060 ffffc100`a1946460 ffffd404`faaced80 fffff800`4a5f8870 : HIDCLASS!HidpMajorHandler+0x21f
- ffffc100`a1946430 fffff800`4a5ed09d : ffffd404`faaced80 ffffd50b`a9c49060 00000000`00000000 ffffc100`a19464a8 : VerifierExt!xdv_IRP_MJ_SYSTEM_CONTROL_wrapper+0xc7
- ffffc100`a1946480 fffff800`4a0227ad : ffffd404`faaced80 00000000`00000000 00000000`00000000 ffffd50b`a9b24d00 : nt!IovCallDriver+0x245
- ffffc100`a19464c0 fffff800`4a60ab5b : ffffd404`faaced80 00000000`00000000 ffffd50b`a9c49a30 ffffd404`00000001 : nt!IofCallDriver+0x134f9d
- ffffc100`a1946500 fffff800`4a5ed09d : ffffd50b`a9c49b80 ffffd404`faaced80 ffffd404`faaced00 fffff800`4a606313 : nt!ViFilterDispatchGeneric+0xbb
- ffffc100`a1946540 fffff800`4a0227ad : ffffd404`faaced80 ffffd50b`a9c49a30 00000000`00000002 ffffd50b`a92fe2f0 : nt!IovCallDriver+0x245
- ffffc100`a1946580 fffff800`4a5f8cc9 : ffffd50b`a969a490 ffffd50b`a9c49a30 00000000`00000000 00000000`00000000 : nt!IofCallDriver+0x134f9d
- ffffc100`a19465c0 fffff800`4a608c2a : ffffd50b`a969a490 ffffc100`a1946779 00000000`00000001 ffffd50b`a969a490 : nt!VfIrpSendSynchronousIrp+0x109
- ffffc100`a1946630 fffff800`4a5fd459 : 00000000`00000000 ffffc100`a1946779 00000000`00000001 ffffd50b`a969a490 : nt!VfWmiTestStartedPdoStack+0x5a
- ffffc100`a19466d0 fffff800`4a375394 : 00000000`00000000 ffffc100`a1946779 00000000`00000001 ffffc100`a1946779 : nt!VfMajorTestStartedPdoStack+0x59
- ffffc100`a1946700 fffff800`4a2c38ed : ffffd50b`a9c0b250 ffffc100`00000001 00000000`00000000 00000000`00000000 : nt!PipProcessStartPhase3+0xb8
- ffffc100`a19467e0 fffff800`4a37442f : ffffd50b`a995ebb0 ffffc100`a1946b19 00000000`00000010 fffff800`4a374384 : nt!PipProcessDevNodeTree+0x3d1
- ffffc100`a1946a60 fffff800`49f5f8f3 : ffffd501`00000003 00000000`00000000 ffffd50b`a995ebb0 ffffd50b`a995ebb0 : nt!PiProcessReenumeration+0xab
- ffffc100`a1946ab0 fffff800`49ecaca8 : ffffd50b`a5366040 fffff800`4a1f0a20 fffff800`4a285380 ffffd50b`a984d040 : nt!PnpDeviceActionWorker+0x1b3
- ffffc100`a1946b80 fffff800`49f69ac7 : 00000000`00000000 00000000`00000080 ffffd50b`a405d680 ffffd50b`a5366040 : nt!ExpWorkerThread+0xd8
- ffffc100`a1946c10 fffff800`49ffe946 : ffffc100`a14a0180 ffffd50b`a5366040 fffff800`49f69a80 00000000`00000000 : nt!PspSystemThreadStartup+0x47
- ffffc100`a1946c60 00000000`00000000 : ffffc100`a1947000 ffffc100`a1941000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
- CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
- fffff80049f1ad27-fffff80049f1ad28 2 bytes - nt!MiResolvePageTablePage+3b7
- [ ff f6:7f fc ]
- fffff80049f1ad48-fffff80049f1ad4c 5 bytes - nt!MiResolvePageTablePage+3d8 (+0x21)
- [ df be 7d fb f6:8f 1f 3f 7e fc ]
- fffff80049f20122-fffff80049f20124 3 bytes - nt!MiCompleteProtoPteFault+242 (+0x53da)
- [ 40 fb f6:00 7e fc ]
- fffff80049f22816-fffff80049f22817 2 bytes - nt!MiPfnShareCountIsZero+186 (+0x26f4)
- [ 80 f6:00 fc ]
- fffff80049f3c8bc - nt!MiInitializeTransitionPfn+28 (+0x1a0a6)
- [ fa:f3 ]
- 13 errors : !nt (fffff80049f1ad27-fffff80049f3c8bc)
- MODULE_NAME: memory_corruption
- IMAGE_NAME: memory_corruption
- FOLLOWUP_NAME: memory_corruption
- DEBUG_FLR_IMAGE_TIMESTAMP: 0
- MEMORY_CORRUPTOR: LARGE
- STACK_COMMAND: .cxr 0xffffc100a1945620 ; kb
- FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
- BUCKET_ID: MEMORY_CORRUPTION_LARGE
- PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
- TARGET_TIME: 2017-07-29T20:55:10.000Z
- OSBUILD: 15063
- OSSERVICEPACK: 483
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 784
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2017-07-07 02:06:35
- BUILDDATESTAMP_STR: 160101.0800
- BUILDLAB_STR: WinBuild
- BUILDOSVER_STR: 10.0.15063.483
- ANALYSIS_SESSION_ELAPSED_TIME: 2f8c
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:memory_corruption_large
- FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
- Followup: memory_corruption
- ========================================================================
- =================== Dump File: 072917-8421-01.dmp ====================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 15063 MP (4 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS Personal
- Built by: 15063.0.amd64fre.rs2_release.170317-1834
- Kernel base = 0xfffff800`ad295000 PsLoadedModuleList = 0xfffff800`ad5e15e0
- Debug session time: Sat Jul 29 16:48:56.084 2017 (UTC - 4:00)
- System Uptime: 0 days 0:00:44.803
- BugCheck 1000007E, {ffffffffc0000005, fffff800ad9f5c25, ffffe4805e3b3dd8, ffffe4805e3b3620}
- *** WARNING: Unable to verify timestamp for win32k.sys
- *** ERROR: Module load completed but symbols could not be loaded for win32k.sys
- Probably caused by : memory_corruption
- Followup: memory_corruption
- SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
- This is a very common bugcheck. Usually the exception address pinpoints
- the driver/function that caused the problem. Always note this address
- as well as the link date of the driver/image that contains this address.
- Some common problems are exception code 0x80000003. This means a hard
- coded breakpoint or assertion was hit, but this system was booted
- /NODEBUG. This is not supposed to happen as developers should never have
- hardcoded breakpoints in retail code, but ...
- If this happens, make sure a debugger gets connected, and the
- system is booted /DEBUG. This will let us see why this breakpoint is
- happening.
- Arguments:
- Arg1: ffffffffc0000005, The exception code that was not handled
- Arg2: fffff800ad9f5c25, The address that the exception occurred at
- Arg3: ffffe4805e3b3dd8, Exception Record Address
- Arg4: ffffe4805e3b3620, Context Record Address
- Debugging Details:
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 10.0.15063.483 (WinBuild.160101.0800)
- DUMP_TYPE: 2
- EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
- FAULTING_IP:
- nt!IovpValidateDeviceObject+5
- fffff800`ad9f5c25 66833903 cmp word ptr [rcx],3
- EXCEPTION_RECORD: ffffe4805e3b3dd8 -- (.exr 0xffffe4805e3b3dd8)
- ExceptionAddress: fffff800ad9f5c25 (nt!IovpValidateDeviceObject+0x0000000000000005)
- ExceptionCode: c0000005 (Access violation)
- ExceptionFlags: 00000000
- NumberParameters: 2
- Parameter[0]: 0000000000000000
- Parameter[1]: 00000000046dc232
- Attempt to read from address 00000000046dc232
- CONTEXT: ffffe4805e3b3620 -- (.cxr 0xffffe4805e3b3620)
- rax=ffffe38658a16d80 rbx=ffffe38658a16d80 rcx=00000000046dc232
- rdx=0000000000000000 rsi=00000000046dc232 rdi=ffff9488e18d82b0
- rip=fffff800ad9f5c25 rsp=ffffe4805e3b4018 rbp=fffff80731b41657
- r8=0000000000000000 r9=0000000000000000 r10=0000000000000000
- r11=0000000000000000 r12=0000000000180000 r13=fffff8073243a488
- r14=0000000000000000 r15=ffff9488e1a777f0
- iopl=0 nv up ei pl nz na pe nc
- cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202
- nt!IovpValidateDeviceObject+0x5:
- fffff800`ad9f5c25 66833903 cmp word ptr [rcx],3 ds:002b:00000000`046dc232=????
- Resetting default scope
- CPU_COUNT: 4
- CPU_MHZ: c15
- CPU_VENDOR: GenuineIntel
- CPU_FAMILY: 6
- CPU_MODEL: 2a
- CPU_STEPPING: 7
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: CODE_CORRUPTION
- PROCESS_NAME: System
- CURRENT_IRQL: 0
- ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
- EXCEPTION_CODE_STR: c0000005
- EXCEPTION_PARAMETER1: 0000000000000000
- EXCEPTION_PARAMETER2: 00000000046dc232
- FOLLOWUP_IP:
- nt!IovpValidateDeviceObject+5
- fffff800`ad9f5c25 66833903 cmp word ptr [rcx],3
- READ_ADDRESS: fffff800ad676358: Unable to get MiVisibleState
- 00000000046dc232
- BUGCHECK_STR: AV
- LOCK_ADDRESS: fffff800ad5f9f80 -- (!locks fffff800ad5f9f80)
- Resource @ nt!PiEngineLock (0xfffff800ad5f9f80) Available
- WARNING: SystemResourcesList->Flink chain invalid. Resource may be corrupted, or already deleted.
- WARNING: SystemResourcesList->Blink chain invalid. Resource may be corrupted, or already deleted.
- 1 total locks
- PNP_TRIAGE:
- Lock address : 0xfffff800ad5f9f80
- Thread Count : 0
- Thread address: 0x0000000000000000
- Thread wait : 0x0
- LAST_CONTROL_TRANSFER: from fffff800ad9f4fa4 to fffff800ad9f5c25
- STACK_TEXT:
- ffffe480`5e3b4018 fffff800`ad9f4fa4 : ffffe386`58a16d80 00000000`00000000 ffffe386`58a16e98 ffff9488`e09b5f40 : nt!IovpValidateDeviceObject+0x5
- ffffe480`5e3b4020 fffff807`31b37c49 : ffff9488`e1a749b0 ffffe480`5e3b4110 ffff9488`df6d1150 ffff9488`e18d82b0 : nt!IovCallDriver+0x14c
- ffffe480`5e3b4060 fffff800`ada02741 : 00000000`00000000 fffff800`ada055b4 ffffe386`58a16ee0 ffff9488`e1a777f0 : VerifierExt!IofCallDriver_internal_wrapper+0x19
- ffffe480`5e3b40a0 fffff807`31b41657 : ffff9488`e1a749b0 ffffe386`58a16ee0 00000000`00000000 fffff800`ada00870 : nt!VerifierIofCallDriver+0x21
- ffffe480`5e3b40e0 fffff800`ad9f509d : ffffe386`58a16d80 ffff9488`e1a749b0 00000000`00000000 ffffe480`5e3b4158 : VerifierExt!xdv_IRP_MJ_SYSTEM_CONTROL_wrapper+0xc7
- ffffe480`5e3b4130 fffff800`ad42a7ad : ffffe386`58a16d80 00000000`00000000 00000000`00000000 ffff9488`e09b5f40 : nt!IovCallDriver+0x245
- ffffe480`5e3b4170 fffff800`ada12b5b : ffffe386`58a16d80 00000000`00000000 ffff9488`e1a61540 ffffe386`00000000 : nt!IofCallDriver+0x134f9d
- ffffe480`5e3b41b0 fffff800`ad9f509d : ffff9488`e1a61690 ffffe386`58a16d80 00000000`00000006 ffff9488`e1a779d0 : nt!ViFilterDispatchGeneric+0xbb
- ffffe480`5e3b41f0 fffff807`31b37c49 : ffffe386`58a16d80 00000000`00000017 00000000`c00000bb ffff9488`e1355660 : nt!IovCallDriver+0x245
- ffffe480`5e3b4230 fffff800`ada02741 : fffff807`34cb05d8 fffff807`34cb137d 00000000`00000000 00000000`00000000 : VerifierExt!IofCallDriver_internal_wrapper+0x19
- ffffe480`5e3b4270 fffff807`3242666a : 00000000`00000000 00000000`00000000 00000000`00000000 fffff800`ada052db : nt!VerifierIofCallDriver+0x21
- ffffe480`5e3b42b0 fffff807`3242fd9a : 00000000`00000000 00000000`00000000 ffffe386`58a16d80 ffff9488`e1a77810 : HIDCLASS!HidpCallDriver+0x7a
- ffffe480`5e3b4310 fffff807`3244af22 : ffff9488`e1a777f0 ffff9488`e1a61540 ffffe386`58a16f28 ffffe480`5e3b43a0 : HIDCLASS!HidpIrpMajorDefault+0xfa
- ffffe480`5e3b4370 fffff807`3242214f : ffffe386`00000002 00000000`00000017 ffffe386`58a16d80 ffff9488`df6d1240 : HIDCLASS!HidpIrpMajorSystemControl+0x2352
- ffffe480`5e3b43a0 fffff807`31b41657 : ffff9488`e1a776a0 ffffe480`5e3b4460 ffffe386`58a16d80 fffff800`ada00870 : HIDCLASS!HidpMajorHandler+0x21f
- ffffe480`5e3b4430 fffff800`ad9f509d : ffffe386`58a16d80 ffff9488`e1a776a0 00000000`00000000 ffffe480`5e3b44a8 : VerifierExt!xdv_IRP_MJ_SYSTEM_CONTROL_wrapper+0xc7
- ffffe480`5e3b4480 fffff800`ad42a7ad : ffffe386`58a16d80 00000000`00000000 00000000`00000000 ffff9488`e177c980 : nt!IovCallDriver+0x245
- ffffe480`5e3b44c0 fffff800`ada12b5b : ffffe386`58a16d80 00000000`00000000 ffff9488`e1a77420 ffffe386`00000001 : nt!IofCallDriver+0x134f9d
- ffffe480`5e3b4500 fffff800`ad9f509d : ffff9488`e1a77570 ffffe386`58a16d80 ffffe386`58a16d00 fffff800`ada0e313 : nt!ViFilterDispatchGeneric+0xbb
- ffffe480`5e3b4540 fffff800`ad42a7ad : ffffe386`58a16d80 ffff9488`e1a77420 00000000`00000002 ffff9488`e19fcf40 : nt!IovCallDriver+0x245
- ffffe480`5e3b4580 fffff800`ada00cc9 : ffff9488`e1a749b0 ffff9488`e1a77420 00000000`00000000 00000000`00000000 : nt!IofCallDriver+0x134f9d
- ffffe480`5e3b45c0 fffff800`ada10c2a : ffff9488`e1a749b0 ffffe480`5e3b4779 00000000`00000001 ffff9488`e1a749b0 : nt!VfIrpSendSynchronousIrp+0x109
- ffffe480`5e3b4630 fffff800`ada05459 : 00000000`00000000 ffffe480`5e3b4779 00000000`00000001 ffff9488`e1a749b0 : nt!VfWmiTestStartedPdoStack+0x5a
- ffffe480`5e3b46d0 fffff800`ad77d394 : 00000000`00000000 ffffe480`5e3b4779 00000000`00000001 ffffe480`5e3b4779 : nt!VfMajorTestStartedPdoStack+0x59
- ffffe480`5e3b4700 fffff800`ad6cb8ed : ffff9488`e1a6b010 ffffe480`00000001 00000000`00000000 00000000`00000000 : nt!PipProcessStartPhase3+0xb8
- ffffe480`5e3b47e0 fffff800`ad77c42f : ffff9488`e18ee1e0 ffffe480`5e3b4b19 00000000`00000010 fffff800`ad77c384 : nt!PipProcessDevNodeTree+0x3d1
- ffffe480`5e3b4a60 fffff800`ad3678f3 : ffff9401`00000003 00000000`00000000 ffff9488`e18ee1e0 ffff9488`e18ee1e0 : nt!PiProcessReenumeration+0xab
- ffffe480`5e3b4ab0 fffff800`ad2d2ca8 : ffff9488`dc1e7040 fffff800`ad5f8a20 fffff800`ad68d380 fffff800`ad68d380 : nt!PnpDeviceActionWorker+0x1b3
- ffffe480`5e3b4b80 fffff800`ad371ac7 : 00000000`00000000 00000000`00000080 ffff9488`dc05d680 ffff9488`dc1e7040 : nt!ExpWorkerThread+0xd8
- ffffe480`5e3b4c10 fffff800`ad406946 : ffffe480`5e890180 ffff9488`dc1e7040 fffff800`ad371a80 00000000`00000000 : nt!PspSystemThreadStartup+0x47
- ffffe480`5e3b4c60 00000000`00000000 : ffffe480`5e3b5000 ffffe480`5e3af000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
- CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
- fffff800ad322d28 - nt!MiResolvePageTablePage+3b8
- [ f6:f8 ]
- fffff800ad322d48-fffff800ad322d4c 5 bytes - nt!MiResolvePageTablePage+3d8 (+0x20)
- [ df be 7d fb f6:1f 3f 7e fc f8 ]
- fffff800ad32a817 - nt!MiPfnShareCountIsZero+187 (+0x7acf)
- [ f6:f8 ]
- fffff800ad3448bc - nt!MiInitializeTransitionPfn+28 (+0x1a0a5)
- [ fa:a5 ]
- 8 errors : !nt (fffff800ad322d28-fffff800ad3448bc)
- MODULE_NAME: memory_corruption
- IMAGE_NAME: memory_corruption
- FOLLOWUP_NAME: memory_corruption
- DEBUG_FLR_IMAGE_TIMESTAMP: 0
- MEMORY_CORRUPTOR: LARGE
- STACK_COMMAND: .cxr 0xffffe4805e3b3620 ; kb
- FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
- BUCKET_ID: MEMORY_CORRUPTION_LARGE
- PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
- TARGET_TIME: 2017-07-29T20:48:56.000Z
- OSBUILD: 15063
- OSSERVICEPACK: 483
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 784
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2017-07-07 02:06:35
- BUILDDATESTAMP_STR: 160101.0800
- BUILDLAB_STR: WinBuild
- BUILDOSVER_STR: 10.0.15063.483
- ANALYSIS_SESSION_ELAPSED_TIME: 2ebc
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:memory_corruption_large
- FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
- Followup: memory_corruption
- ========================================================================
- =================== Dump File: 072917-8546-01.dmp ====================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 15063 MP (4 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS Personal
- Built by: 15063.0.amd64fre.rs2_release.170317-1834
- Kernel base = 0xfffff800`65616000 PsLoadedModuleList = 0xfffff800`659625e0
- Debug session time: Sat Jul 29 17:01:48.829 2017 (UTC - 4:00)
- System Uptime: 0 days 0:00:46.546
- BugCheck 1000007E, {ffffffffc0000005, fffff80065d76c25, ffffb7013f1aedd8, ffffb7013f1ae620}
- *** WARNING: Unable to verify timestamp for win32k.sys
- *** ERROR: Module load completed but symbols could not be loaded for win32k.sys
- Probably caused by : memory_corruption
- Followup: memory_corruption
- SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
- This is a very common bugcheck. Usually the exception address pinpoints
- the driver/function that caused the problem. Always note this address
- as well as the link date of the driver/image that contains this address.
- Some common problems are exception code 0x80000003. This means a hard
- coded breakpoint or assertion was hit, but this system was booted
- /NODEBUG. This is not supposed to happen as developers should never have
- hardcoded breakpoints in retail code, but ...
- If this happens, make sure a debugger gets connected, and the
- system is booted /DEBUG. This will let us see why this breakpoint is
- happening.
- Arguments:
- Arg1: ffffffffc0000005, The exception code that was not handled
- Arg2: fffff80065d76c25, The address that the exception occurred at
- Arg3: ffffb7013f1aedd8, Exception Record Address
- Arg4: ffffb7013f1ae620, Context Record Address
- Debugging Details:
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 10.0.15063.483 (WinBuild.160101.0800)
- DUMP_TYPE: 2
- EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
- FAULTING_IP:
- nt!IovpValidateDeviceObject+5
- fffff800`65d76c25 66833903 cmp word ptr [rcx],3
- EXCEPTION_RECORD: ffffb7013f1aedd8 -- (.exr 0xffffb7013f1aedd8)
- ExceptionAddress: fffff80065d76c25 (nt!IovpValidateDeviceObject+0x0000000000000005)
- ExceptionCode: c0000005 (Access violation)
- ExceptionFlags: 00000000
- NumberParameters: 2
- Parameter[0]: 0000000000000000
- Parameter[1]: 00000000046dc232
- Attempt to read from address 00000000046dc232
- CONTEXT: ffffb7013f1ae620 -- (.cxr 0xffffb7013f1ae620)
- rax=fffff60eca25ad80 rbx=fffff60eca25ad80 rcx=00000000046dc232
- rdx=0000000000000000 rsi=00000000046dc232 rdi=ffffa60b19586b30
- rip=fffff80065d76c25 rsp=ffffb7013f1af018 rbp=fffff80a35471657
- r8=0000000000000000 r9=0000000000000000 r10=0000000000000000
- r11=0000000000000000 r12=0000000000180000 r13=fffff80a3792a488
- r14=0000000000000000 r15=ffffa60b195aa7f0
- iopl=0 nv up ei pl nz na pe nc
- cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202
- nt!IovpValidateDeviceObject+0x5:
- fffff800`65d76c25 66833903 cmp word ptr [rcx],3 ds:002b:00000000`046dc232=????
- Resetting default scope
- CPU_COUNT: 4
- CPU_MHZ: c15
- CPU_VENDOR: GenuineIntel
- CPU_FAMILY: 6
- CPU_MODEL: 2a
- CPU_STEPPING: 7
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: CODE_CORRUPTION
- PROCESS_NAME: System
- CURRENT_IRQL: 0
- ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
- EXCEPTION_CODE_STR: c0000005
- EXCEPTION_PARAMETER1: 0000000000000000
- EXCEPTION_PARAMETER2: 00000000046dc232
- FOLLOWUP_IP:
- nt!IovpValidateDeviceObject+5
- fffff800`65d76c25 66833903 cmp word ptr [rcx],3
- READ_ADDRESS: fffff800659f7358: Unable to get MiVisibleState
- 00000000046dc232
- BUGCHECK_STR: AV
- LOCK_ADDRESS: fffff8006597af80 -- (!locks fffff8006597af80)
- Resource @ nt!PiEngineLock (0xfffff8006597af80) Available
- WARNING: SystemResourcesList->Flink chain invalid. Resource may be corrupted, or already deleted.
- WARNING: SystemResourcesList->Blink chain invalid. Resource may be corrupted, or already deleted.
- 1 total locks
- PNP_TRIAGE:
- Lock address : 0xfffff8006597af80
- Thread Count : 0
- Thread address: 0x0000000000000000
- Thread wait : 0x0
- LAST_CONTROL_TRANSFER: from fffff80065d75fa4 to fffff80065d76c25
- STACK_TEXT:
- ffffb701`3f1af018 fffff800`65d75fa4 : fffff60e`ca25ad80 00000000`00000000 fffff60e`ca25ae98 ffffa60b`182044b0 : nt!IovpValidateDeviceObject+0x5
- ffffb701`3f1af020 fffff80a`35467c49 : ffffa60b`19524a50 ffffb701`3f1af110 ffffa60b`19347150 ffffa60b`19586b30 : nt!IovCallDriver+0x14c
- ffffb701`3f1af060 fffff800`65d83741 : 00000000`00000000 fffff800`65d865b4 fffff60e`ca25aee0 ffffa60b`195aa7f0 : VerifierExt!IofCallDriver_internal_wrapper+0x19
- ffffb701`3f1af0a0 fffff80a`35471657 : ffffa60b`19524a50 fffff60e`ca25aee0 00000000`00000000 fffff800`65d81870 : nt!VerifierIofCallDriver+0x21
- ffffb701`3f1af0e0 fffff800`65d7609d : fffff60e`ca25ad80 ffffa60b`19524a50 00000000`00000000 ffffb701`3f1af158 : VerifierExt!xdv_IRP_MJ_SYSTEM_CONTROL_wrapper+0xc7
- ffffb701`3f1af130 fffff800`657ab7ad : fffff60e`ca25ad80 00000000`00000000 00000000`00000000 ffffa60b`182044b0 : nt!IovCallDriver+0x245
- ffffb701`3f1af170 fffff800`65d93b5b : fffff60e`ca25ad80 00000000`00000000 ffffa60b`19547500 fffff60e`00000000 : nt!IofCallDriver+0x134f9d
- ffffb701`3f1af1b0 fffff800`65d7609d : ffffa60b`19547650 fffff60e`ca25ad80 00000000`00000000 00001f80`0108a9d0 : nt!ViFilterDispatchGeneric+0xbb
- ffffb701`3f1af1f0 fffff80a`35467c49 : fffff60e`ca25ad80 00000000`00000017 ffffa60b`195aa6a0 ffffa60b`1812d780 : nt!IovCallDriver+0x245
- ffffb701`3f1af230 fffff800`65d83741 : fffff80a`3546e657 fffff800`649106ac 00000000`00000010 00000000`00000282 : VerifierExt!IofCallDriver_internal_wrapper+0x19
- ffffb701`3f1af270 fffff80a`3791666a : fffff80a`3793af14 00000000`00000000 00000000`00000000 fffff800`65d862db : nt!VerifierIofCallDriver+0x21
- ffffb701`3f1af2b0 fffff80a`3791fd9a : 00000000`00000000 00000000`00000000 fffff60e`ca25ad80 ffffa60b`195aa810 : HIDCLASS!HidpCallDriver+0x7a
- ffffb701`3f1af310 fffff80a`3793af22 : ffffa60b`195aa7f0 ffffa60b`19547500 fffff60e`ca25af28 ffffb701`3f1af3a0 : HIDCLASS!HidpIrpMajorDefault+0xfa
- ffffb701`3f1af370 fffff80a`3791214f : fffff60e`00000002 00000000`00000017 fffff60e`ca25ad80 ffffa60b`19347240 : HIDCLASS!HidpIrpMajorSystemControl+0x2352
- ffffb701`3f1af3a0 fffff80a`35471657 : ffffa60b`195aa6a0 ffffb701`3f1af460 fffff60e`ca25ad80 fffff800`65d81870 : HIDCLASS!HidpMajorHandler+0x21f
- ffffb701`3f1af430 fffff800`65d7609d : fffff60e`ca25ad80 ffffa60b`195aa6a0 00000000`00000000 ffffb701`3f1af4a8 : VerifierExt!xdv_IRP_MJ_SYSTEM_CONTROL_wrapper+0xc7
- ffffb701`3f1af480 fffff800`657ab7ad : fffff60e`ca25ad80 00000000`00000000 00000000`00000000 ffffa60b`1960f0a0 : nt!IovCallDriver+0x245
- ffffb701`3f1af4c0 fffff800`65d93b5b : fffff60e`ca25ad80 00000000`00000000 ffffa60b`195aa420 fffff60e`00000001 : nt!IofCallDriver+0x134f9d
- ffffb701`3f1af500 fffff800`65d7609d : ffffa60b`195aa570 fffff60e`ca25ad80 fffff60e`ca25ad00 fffff800`65d8f313 : nt!ViFilterDispatchGeneric+0xbb
- ffffb701`3f1af540 fffff800`657ab7ad : fffff60e`ca25ad80 ffffa60b`195aa420 00000000`00000002 ffffa60b`196057c0 : nt!IovCallDriver+0x245
- ffffb701`3f1af580 fffff800`65d81cc9 : ffffa60b`19524a50 ffffa60b`195aa420 00000000`00000000 00000000`00000000 : nt!IofCallDriver+0x134f9d
- ffffb701`3f1af5c0 fffff800`65d91c2a : ffffa60b`19524a50 ffffb701`3f1af779 00000000`00000001 ffffa60b`19524a50 : nt!VfIrpSendSynchronousIrp+0x109
- ffffb701`3f1af630 fffff800`65d86459 : 00000000`00000000 ffffb701`3f1af779 00000000`00000001 ffffa60b`19524a50 : nt!VfWmiTestStartedPdoStack+0x5a
- ffffb701`3f1af6d0 fffff800`65afe394 : 00000000`00000000 ffffb701`3f1af779 00000000`00000001 ffffb701`3f1af779 : nt!VfMajorTestStartedPdoStack+0x59
- ffffb701`3f1af700 fffff800`65a4c8ed : ffffa60b`18c81d30 ffffb701`00000001 00000000`00000000 00000000`00000000 : nt!PipProcessStartPhase3+0xb8
- ffffb701`3f1af7e0 fffff800`65afd42f : ffffa60b`195d81c0 ffffb701`3f1afb19 00000000`00000010 fffff800`65afd384 : nt!PipProcessDevNodeTree+0x3d1
- ffffb701`3f1afa60 fffff800`656e88f3 : ffffa601`00000003 00000000`00000000 ffffa60b`195d81c0 ffffa60b`195d81c0 : nt!PiProcessReenumeration+0xab
- ffffb701`3f1afab0 fffff800`65653ca8 : ffffa60b`1957d040 fffff800`65979a20 fffff800`65a0e380 fffff800`65a0e380 : nt!PnpDeviceActionWorker+0x1b3
- ffffb701`3f1afb80 fffff800`656f2ac7 : ffffb701`39420180 00000000`00000080 ffffa60b`13a6d040 ffffa60b`1957d040 : nt!ExpWorkerThread+0xd8
- ffffb701`3f1afc10 fffff800`65787946 : ffffb701`39420180 ffffa60b`1957d040 fffff800`656f2a80 81818181`81818181 : nt!PspSystemThreadStartup+0x47
- ffffb701`3f1afc60 00000000`00000000 : ffffb701`3f1b0000 ffffb701`3f1aa000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
- CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
- fffff800656a3d28 - nt!MiResolvePageTablePage+3b8
- [ f6:81 ]
- fffff800656a3d48-fffff800656a3d4c 5 bytes - nt!MiResolvePageTablePage+3d8 (+0x20)
- [ df be 7d fb f6:3f 70 e0 c0 81 ]
- fffff800656ab817 - nt!MiPfnShareCountIsZero+187 (+0x7acf)
- [ f6:81 ]
- 7 errors : !nt (fffff800656a3d28-fffff800656ab817)
- MODULE_NAME: memory_corruption
- IMAGE_NAME: memory_corruption
- FOLLOWUP_NAME: memory_corruption
- DEBUG_FLR_IMAGE_TIMESTAMP: 0
- MEMORY_CORRUPTOR: LARGE
- STACK_COMMAND: .cxr 0xffffb7013f1ae620 ; kb
- FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
- BUCKET_ID: MEMORY_CORRUPTION_LARGE
- PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
- TARGET_TIME: 2017-07-29T21:01:48.000Z
- OSBUILD: 15063
- OSSERVICEPACK: 483
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 784
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2017-07-07 02:06:35
- BUILDDATESTAMP_STR: 160101.0800
- BUILDLAB_STR: WinBuild
- BUILDOSVER_STR: 10.0.15063.483
- ANALYSIS_SESSION_ELAPSED_TIME: 431e
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:memory_corruption_large
- FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
- Followup: memory_corruption
- ========================================================================
- =================== Dump File: 072917-8875-01.dmp ====================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 15063 MP (4 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS Personal
- Built by: 15063.0.amd64fre.rs2_release.170317-1834
- Kernel base = 0xfffff803`0a40c000 PsLoadedModuleList = 0xfffff803`0a7585e0
- Debug session time: Sat Jul 29 16:56:55.493 2017 (UTC - 4:00)
- System Uptime: 0 days 0:00:45.212
- BugCheck 1000007E, {ffffffffc0000005, fffff8030ab6cc25, ffffcc8018680dd8, ffffcc8018680620}
- *** WARNING: Unable to verify timestamp for win32k.sys
- *** ERROR: Module load completed but symbols could not be loaded for win32k.sys
- Probably caused by : memory_corruption
- Followup: memory_corruption
- SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
- This is a very common bugcheck. Usually the exception address pinpoints
- the driver/function that caused the problem. Always note this address
- as well as the link date of the driver/image that contains this address.
- Some common problems are exception code 0x80000003. This means a hard
- coded breakpoint or assertion was hit, but this system was booted
- /NODEBUG. This is not supposed to happen as developers should never have
- hardcoded breakpoints in retail code, but ...
- If this happens, make sure a debugger gets connected, and the
- system is booted /DEBUG. This will let us see why this breakpoint is
- happening.
- Arguments:
- Arg1: ffffffffc0000005, The exception code that was not handled
- Arg2: fffff8030ab6cc25, The address that the exception occurred at
- Arg3: ffffcc8018680dd8, Exception Record Address
- Arg4: ffffcc8018680620, Context Record Address
- Debugging Details:
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 10.0.15063.483 (WinBuild.160101.0800)
- BIOS_VENDOR: American Megatrends Inc.
- BIOS_VERSION: P2.30
- BIOS_DATE: 06/29/2012
- BASEBOARD_MANUFACTURER: ASRock
- BASEBOARD_PRODUCT: Z68 Pro3 Gen3
- BASEBOARD_VERSION:
- DUMP_TYPE: 2
- EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
- FAULTING_IP:
- nt!IovpValidateDeviceObject+5
- fffff803`0ab6cc25 66833903 cmp word ptr [rcx],3
- EXCEPTION_RECORD: ffffcc8018680dd8 -- (.exr 0xffffcc8018680dd8)
- ExceptionAddress: fffff8030ab6cc25 (nt!IovpValidateDeviceObject+0x0000000000000005)
- ExceptionCode: c0000005 (Access violation)
- ExceptionFlags: 00000000
- NumberParameters: 2
- Parameter[0]: 0000000000000000
- Parameter[1]: 00000000046dc232
- Attempt to read from address 00000000046dc232
- CONTEXT: ffffcc8018680620 -- (.cxr 0xffffcc8018680620)
- rax=ffff88009edbcd80 rbx=ffff88009edbcd80 rcx=00000000046dc232
- rdx=0000000000000000 rsi=00000000046dc232 rdi=ffffdc82f5efe2d0
- rip=fffff8030ab6cc25 rsp=ffffcc8018681018 rbp=fffff80a6bae1657
- r8=0000000000000000 r9=0000000000000000 r10=0000000000000000
- r11=0000000000000000 r12=0000000000180000 r13=fffff80a6d67a488
- r14=0000000000000000 r15=ffffdc82f720c1b0
- iopl=0 nv up ei pl nz na pe nc
- cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202
- nt!IovpValidateDeviceObject+0x5:
- fffff803`0ab6cc25 66833903 cmp word ptr [rcx],3 ds:002b:00000000`046dc232=????
- Resetting default scope
- CPU_COUNT: 4
- CPU_MHZ: c15
- CPU_VENDOR: GenuineIntel
- CPU_FAMILY: 6
- CPU_MODEL: 2a
- CPU_STEPPING: 7
- CPU_MICROCODE: 6,2a,7,0 (F,M,S,R) SIG: 29'00000000 (cache) 29'00000000 (init)
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: CODE_CORRUPTION
- PROCESS_NAME: System
- CURRENT_IRQL: 0
- ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
- EXCEPTION_CODE_STR: c0000005
- EXCEPTION_PARAMETER1: 0000000000000000
- EXCEPTION_PARAMETER2: 00000000046dc232
- FOLLOWUP_IP:
- nt!IovpValidateDeviceObject+5
- fffff803`0ab6cc25 66833903 cmp word ptr [rcx],3
- READ_ADDRESS: fffff8030a7ed358: Unable to get MiVisibleState
- 00000000046dc232
- BUGCHECK_STR: AV
- LOCK_ADDRESS: fffff8030a770f80 -- (!locks fffff8030a770f80)
- Resource @ nt!PiEngineLock (0xfffff8030a770f80) Available
- WARNING: SystemResourcesList->Flink chain invalid. Resource may be corrupted, or already deleted.
- WARNING: SystemResourcesList->Blink chain invalid. Resource may be corrupted, or already deleted.
- 1 total locks
- PNP_TRIAGE:
- Lock address : 0xfffff8030a770f80
- Thread Count : 0
- Thread address: 0x0000000000000000
- Thread wait : 0x0
- LAST_CONTROL_TRANSFER: from fffff8030ab6bfa4 to fffff8030ab6cc25
- STACK_TEXT:
- ffffcc80`18681018 fffff803`0ab6bfa4 : ffff8800`9edbcd80 00000000`00000000 ffff8800`9edbce98 ffffdc82`f69118d0 : nt!IovpValidateDeviceObject+0x5
- ffffcc80`18681020 fffff80a`6bad7c49 : ffffdc82`f722d080 ffffcc80`18681110 ffffdc82`f6fe0150 ffffdc82`f5efe2d0 : nt!IovCallDriver+0x14c
- ffffcc80`18681060 fffff803`0ab79741 : 00000000`00000000 fffff803`0ab7c5b4 ffff8800`9edbcee0 ffffdc82`f720c1b0 : VerifierExt!IofCallDriver_internal_wrapper+0x19
- ffffcc80`186810a0 fffff80a`6bae1657 : ffffdc82`f722d080 ffff8800`9edbcee0 00000000`00000000 fffff803`0ab77870 : nt!VerifierIofCallDriver+0x21
- ffffcc80`186810e0 fffff803`0ab6c09d : ffff8800`9edbcd80 ffffdc82`f722d080 00000000`00000000 ffffcc80`18681158 : VerifierExt!xdv_IRP_MJ_SYSTEM_CONTROL_wrapper+0xc7
- ffffcc80`18681130 fffff803`0a5a17ad : ffff8800`9edbcd80 00000000`00000000 00000000`00000000 ffffdc82`f69118d0 : nt!IovCallDriver+0x245
- ffffcc80`18681170 fffff803`0ab89b5b : ffff8800`9edbcd80 00000000`00000000 ffffdc82`f719f8d0 ffff8800`00000000 : nt!IofCallDriver+0x134f9d
- ffffcc80`186811b0 fffff803`0ab6c09d : ffffdc82`f719fa20 ffff8800`9edbcd80 00000000`00000006 ffffdc82`f720c390 : nt!ViFilterDispatchGeneric+0xbb
- ffffcc80`186811f0 fffff80a`6bad7c49 : ffff8800`9edbcd80 00000000`00000017 00000000`c00000bb ffffdc82`f72331b0 : nt!IovCallDriver+0x245
- ffffcc80`18681230 fffff803`0ab79741 : fffff80a`6d4405d8 fffff80a`6d44137d 00000000`00000000 00000000`00000000 : VerifierExt!IofCallDriver_internal_wrapper+0x19
- ffffcc80`18681270 fffff80a`6d66666a : 00000000`00000000 00000000`00000000 00000000`00000000 fffff803`0ab7c2db : nt!VerifierIofCallDriver+0x21
- ffffcc80`186812b0 fffff80a`6d66fd9a : 00000000`00000000 00000000`00000000 ffff8800`9edbcd80 ffffdc82`f720c1d0 : HIDCLASS!HidpCallDriver+0x7a
- ffffcc80`18681310 fffff80a`6d68af22 : ffffdc82`f720c1b0 ffffdc82`f719f8d0 ffff8800`9edbcf28 ffffcc80`186813a0 : HIDCLASS!HidpIrpMajorDefault+0xfa
- ffffcc80`18681370 fffff80a`6d66214f : ffff8800`00000002 00000000`00000017 ffff8800`9edbcd80 ffffdc82`f6fe0240 : HIDCLASS!HidpIrpMajorSystemControl+0x2352
- ffffcc80`186813a0 fffff80a`6bae1657 : ffffdc82`f720c060 ffffcc80`18681460 ffff8800`9edbcd80 fffff803`0ab77870 : HIDCLASS!HidpMajorHandler+0x21f
- ffffcc80`18681430 fffff803`0ab6c09d : ffff8800`9edbcd80 ffffdc82`f720c060 00000000`00000000 ffffcc80`186814a8 : VerifierExt!xdv_IRP_MJ_SYSTEM_CONTROL_wrapper+0xc7
- ffffcc80`18681480 fffff803`0a5a17ad : ffff8800`9edbcd80 00000000`00000000 00000000`00000000 ffffdc82`f6fe9b60 : nt!IovCallDriver+0x245
- ffffcc80`186814c0 fffff803`0ab89b5b : ffff8800`9edbcd80 00000000`00000000 ffffdc82`f71e2260 ffff8800`00000001 : nt!IofCallDriver+0x134f9d
- ffffcc80`18681500 fffff803`0ab6c09d : ffffdc82`f71e23b0 ffff8800`9edbcd80 ffff8800`9edbcd00 fffff803`0ab85313 : nt!ViFilterDispatchGeneric+0xbb
- ffffcc80`18681540 fffff803`0a5a17ad : ffff8800`9edbcd80 ffffdc82`f71e2260 00000000`00000002 ffffdc82`f5f27630 : nt!IovCallDriver+0x245
- ffffcc80`18681580 fffff803`0ab77cc9 : ffffdc82`f722d080 ffffdc82`f71e2260 00000000`00000000 00000000`00000000 : nt!IofCallDriver+0x134f9d
- ffffcc80`186815c0 fffff803`0ab87c2a : ffffdc82`f722d080 ffffcc80`18681779 00000000`00000001 ffffdc82`f722d080 : nt!VfIrpSendSynchronousIrp+0x109
- ffffcc80`18681630 fffff803`0ab7c459 : 00000000`00000000 ffffcc80`18681779 00000000`00000001 ffffdc82`f722d080 : nt!VfWmiTestStartedPdoStack+0x5a
- ffffcc80`186816d0 fffff803`0a8f4394 : 00000000`00000000 ffffcc80`18681779 00000000`00000001 ffffcc80`18681779 : nt!VfMajorTestStartedPdoStack+0x59
- ffffcc80`18681700 fffff803`0a8428ed : ffffdc82`f71e1340 ffffcc80`00000001 00000000`00000000 00000000`00000000 : nt!PipProcessStartPhase3+0xb8
- ffffcc80`186817e0 fffff803`0a8f342f : ffffdc82`f70b1c50 ffffcc80`18681b19 00000000`00000010 fffff803`0a8f3384 : nt!PipProcessDevNodeTree+0x3d1
- ffffcc80`18681a60 fffff803`0a4de8f3 : ffffdc01`00000003 00000000`00000000 ffffdc82`f70b1c50 ffffdc82`f70b1c50 : nt!PiProcessReenumeration+0xab
- ffffcc80`18681ab0 fffff803`0a449ca8 : ffffdc82`f70a2040 fffff803`0a76fa20 fffff803`0a804380 fffff803`0a804380 : nt!PnpDeviceActionWorker+0x1b3
- ffffcc80`18681b80 fffff803`0a4e8ac7 : fffff803`09250180 00000000`00000080 ffffdc82`f1660680 ffffdc82`f70a2040 : nt!ExpWorkerThread+0xd8
- ffffcc80`18681c10 fffff803`0a57d946 : fffff803`09250180 ffffdc82`f70a2040 fffff803`0a4e8a80 00000000`00000000 : nt!PspSystemThreadStartup+0x47
- ffffcc80`18681c60 00000000`00000000 : ffffcc80`18682000 ffffcc80`1867c000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
- CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
- fffff8030a4bb8bb-fffff8030a4bb8bc 2 bytes - nt!MiInitializeTransitionPfn+27
- [ 80 fa:00 84 ]
- 2 errors : !nt (fffff8030a4bb8bb-fffff8030a4bb8bc)
- MODULE_NAME: memory_corruption
- IMAGE_NAME: memory_corruption
- FOLLOWUP_NAME: memory_corruption
- DEBUG_FLR_IMAGE_TIMESTAMP: 0
- MEMORY_CORRUPTOR: LARGE
- STACK_COMMAND: .cxr 0xffffcc8018680620 ; kb
- FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
- BUCKET_ID: MEMORY_CORRUPTION_LARGE
- PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
- TARGET_TIME: 2017-07-29T20:56:55.000Z
- OSBUILD: 15063
- OSSERVICEPACK: 483
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 784
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2017-07-07 02:06:35
- BUILDDATESTAMP_STR: 160101.0800
- BUILDLAB_STR: WinBuild
- BUILDOSVER_STR: 10.0.15063.483
- ANALYSIS_SESSION_ELAPSED_TIME: 2d90
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:memory_corruption_large
- FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
- Followup: memory_corruption
- ========================================================================
- =================== Dump File: 072617-7859-01.dmp ====================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 15063 MP (4 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS Personal
- Built by: 15063.0.amd64fre.rs2_release.170317-1834
- Kernel base = 0xfffff800`51a18000 PsLoadedModuleList = 0xfffff800`51d645e0
- Debug session time: Wed Jul 26 15:15:34.190 2017 (UTC - 4:00)
- System Uptime: 2 days 22:42:13.312
- BugCheck 133, {1, 1e00, fffff80051df9348, 0}
- *************************************************************************
- *** Either you specified an unqualified symbol, or your debugger ***
- *** doesn't have full symbol information. Unqualified symbol ***
- *** resolution is turned off by default. Please either specify a ***
- *** fully qualified symbol module!symbolname, or enable resolution ***
- *** of unqualified symbols by typing ".symopt- 100". Note that ***
- *** enabling unqualified symbol resolution with network symbol ***
- *** server shares in the symbol path may cause the debugger to ***
- *** appear to hang for long periods of time when an incorrect ***
- *** symbol name is typed or the network symbol server is down. ***
- *** For some commands to work properly, your symbol path ***
- *** must point to .pdb files that have full type information. ***
- *** Certain .pdb files (such as the public OS symbols) do not ***
- *** contain the required information. Contact the group that ***
- *** provided you with these symbols if you need this command to ***
- *** work. ***
- *** Type referenced: TickPeriods ***
- *************************************************************************
- *** WARNING: Unable to verify timestamp for win32k.sys
- *** ERROR: Module load completed but symbols could not be loaded for win32k.sys
- Probably caused by : memory_corruption
- Followup: memory_corruption
- DPC_WATCHDOG_VIOLATION (133)
- The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
- or above.
- Arguments:
- Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
- DISPATCH_LEVEL or above. The offending component can usually be
- identified with a stack trace.
- Arg2: 0000000000001e00, The watchdog period.
- Arg3: fffff80051df9348
- Arg4: 0000000000000000
- Debugging Details:
- *************************************************************************
- *** Either you specified an unqualified symbol, or your debugger ***
- *** doesn't have full symbol information. Unqualified symbol ***
- *** resolution is turned off by default. Please either specify a ***
- *** fully qualified symbol module!symbolname, or enable resolution ***
- *** of unqualified symbols by typing ".symopt- 100". Note that ***
- *** enabling unqualified symbol resolution with network symbol ***
- *** server shares in the symbol path may cause the debugger to ***
- *** appear to hang for long periods of time when an incorrect ***
- *** symbol name is typed or the network symbol server is down. ***
- *** For some commands to work properly, your symbol path ***
- *** must point to .pdb files that have full type information. ***
- *** Certain .pdb files (such as the public OS symbols) do not ***
- *** contain the required information. Contact the group that ***
- *** provided you with these symbols if you need this command to ***
- *** work. ***
- *** Type referenced: TickPeriods ***
- *************************************************************************
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 10.0.15063.483 (WinBuild.160101.0800)
- BIOS_VENDOR: American Megatrends Inc.
- BIOS_VERSION: P2.30
- BIOS_DATE: 06/29/2012
- BASEBOARD_MANUFACTURER: ASRock
- BASEBOARD_PRODUCT: Z68 Pro3 Gen3
- BASEBOARD_VERSION:
- DUMP_TYPE: 2
- DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED
- CPU_COUNT: 4
- CPU_MHZ: c15
- CPU_VENDOR: GenuineIntel
- CPU_FAMILY: 6
- CPU_MODEL: 2a
- CPU_STEPPING: 7
- CPU_MICROCODE: 6,2a,7,0 (F,M,S,R) SIG: 29'00000000 (cache) 29'00000000 (init)
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: CODE_CORRUPTION
- BUGCHECK_STR: 0x133
- PROCESS_NAME: svchost.exe
- CURRENT_IRQL: d
- LAST_CONTROL_TRANSFER: from fffff80051bb445d to fffff80051b844c0
- STACK_TEXT:
- fffff800`53869bc8 fffff800`51bb445d : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff800`51df9348 : nt!KeBugCheckEx
- fffff800`53869bd0 fffff800`51a8d899 : 0000da7c`24355f0e fffff800`509b0180 00000000`00f89154 00000000`00000002 : nt!KeAccumulateTicks+0x124f2d
- fffff800`53869c30 fffff800`522a4676 : 0000da7c`24354b26 00000000`00000001 ffffaf81`1356de40 fffff800`522f4460 : nt!KeClockInterruptNotify+0x599
- fffff800`53869f40 fffff800`51a27675 : fffff800`522f43b0 ffffbb4b`86348f96 ffff9600`056a51c0 ffffaf81`0fbb13c0 : hal!HalpTimerClockInterrupt+0x56
- fffff800`53869f70 fffff800`51b85b5a : ffffaf81`1356dec0 fffff800`522f43b0 0000000f`ffffffff 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5
- fffff800`53869fb0 fffff800`51b85fa7 : a0000000`00000050 00000000`32187b8e 00000000`001ce1b4 00000000`00000000 : nt!KiInterruptSubDispatchNoLockNoEtw+0xea
- ffffaf81`1356de40 fffff800`51a81a80 : ffffdd0d`f736f000 ffffaf81`1356e010 00000000`00000000 ffff856d`00000000 : nt!KiInterruptDispatchNoLockNoEtw+0x37
- ffffaf81`1356dfd0 fffff800`51a8102e : 00000000`00000100 ffffdd0d`f73708c0 00000000`00000000 ffffaf81`1356e198 : nt!MiIdentifyPfn+0xa00
- ffffaf81`1356e0a0 fffff800`51ec5dda : 00000000`00000000 ffffdd0d`f736f918 ffffdd0d`f736f000 fffff800`51a7f393 : nt!MiIdentifyPfnWrapper+0x3e
- ffffaf81`1356e0d0 fffff800`51ec58ef : ffffdd0d`f6ef3740 00000000`00000001 ffffaf81`1356e2b4 ffffdd0d`f736f000 : nt!PfpPfnPrioRequest+0xca
- ffffaf81`1356e150 fffff800`51ec3b4e : 00000000`0000004f ffffdd0d`f90715e0 000000e2`adff9e88 00000000`00000000 : nt!PfQuerySuperfetchInformation+0x2bf
- ffffaf81`1356e280 fffff800`51ec37fb : 000002b6`854e16f0 fffff800`51b8936f ffffffff`ffffffd2 fffff800`51b8f422 : nt!ExpQuerySystemInformation+0x22e
- ffffaf81`1356eac0 fffff800`51b8f413 : ffffdd0d`f6ef3740 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtQuerySystemInformation+0x2b
- ffffaf81`1356eb00 00007ffb`2c115a64 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
- 000000e2`adff9d88 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`2c115a64
- STACK_COMMAND: kb
- CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
- fffff80051a81b30-fffff80051a81b31 2 bytes - nt!MiIsPfn+20
- [ 80 fa:00 96 ]
- fffff80051ac52ba-fffff80051ac52bb 2 bytes - nt!KiInSwapProcesses+26 (+0x4378a)
- [ 80 f6:00 85 ]
- fffff80051c98383-fffff80051c98385 3 bytes - nt!ExFreePoolWithTag+363
- [ 40 fb f6:80 42 85 ]
- 7 errors : !nt (fffff80051a81b30-fffff80051c98385)
- MODULE_NAME: memory_corruption
- IMAGE_NAME: memory_corruption
- FOLLOWUP_NAME: memory_corruption
- DEBUG_FLR_IMAGE_TIMESTAMP: 0
- MEMORY_CORRUPTOR: LARGE
- FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
- BUCKET_ID: MEMORY_CORRUPTION_LARGE
- PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
- TARGET_TIME: 2017-07-26T19:15:34.000Z
- OSBUILD: 15063
- OSSERVICEPACK: 483
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 784
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2017-07-07 02:06:35
- BUILDDATESTAMP_STR: 160101.0800
- BUILDLAB_STR: WinBuild
- BUILDOSVER_STR: 10.0.15063.483
- ANALYSIS_SESSION_ELAPSED_TIME: 390c
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:memory_corruption_large
- FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
- Followup: memory_corruption
- ========================================================================
- =================== Dump File: 072917-7250-01.dmp ====================
- ========================================================================
- Could not match Dump File signature - invalid file format
- Could not open dump file [C:\Users\UserName\Desktop\Crash Dumps\072917-7250-01.dmp], Win32 error 0n87
- "The parameter is incorrect."
- Debuggee initialization failed, Win32 error 0n87
- The parameter is incorrect.
- ========================================================================
- =================== Dump File: 072917-7578-01.dmp ====================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 15063 MP (4 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS Personal
- Built by: 15063.0.amd64fre.rs2_release.170317-1834
- Kernel base = 0xfffff802`7e400000 PsLoadedModuleList = 0xfffff802`7e74c5e0
- Debug session time: Sat Jul 29 16:52:37.954 2017 (UTC - 4:00)
- System Uptime: 0 days 0:01:40.673
- BugCheck 1000007E, {ffffffffc0000005, fffff8027eb60c25, ffffad017a0c5dd8, ffffad017a0c5620}
- *** WARNING: Unable to verify timestamp for win32k.sys
- *** ERROR: Module load completed but symbols could not be loaded for win32k.sys
- Probably caused by : memory_corruption
- Followup: memory_corruption
- SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
- This is a very common bugcheck. Usually the exception address pinpoints
- the driver/function that caused the problem. Always note this address
- as well as the link date of the driver/image that contains this address.
- Some common problems are exception code 0x80000003. This means a hard
- coded breakpoint or assertion was hit, but this system was booted
- /NODEBUG. This is not supposed to happen as developers should never have
- hardcoded breakpoints in retail code, but ...
- If this happens, make sure a debugger gets connected, and the
- system is booted /DEBUG. This will let us see why this breakpoint is
- happening.
- Arguments:
- Arg1: ffffffffc0000005, The exception code that was not handled
- Arg2: fffff8027eb60c25, The address that the exception occurred at
- Arg3: ffffad017a0c5dd8, Exception Record Address
- Arg4: ffffad017a0c5620, Context Record Address
- Debugging Details:
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 10.0.15063.483 (WinBuild.160101.0800)
- DUMP_TYPE: 2
- EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
- FAULTING_IP:
- nt!IovpValidateDeviceObject+5
- fffff802`7eb60c25 66833903 cmp word ptr [rcx],3
- EXCEPTION_RECORD: ffffad017a0c5dd8 -- (.exr 0xffffad017a0c5dd8)
- ExceptionAddress: fffff8027eb60c25 (nt!IovpValidateDeviceObject+0x0000000000000005)
- ExceptionCode: c0000005 (Access violation)
- ExceptionFlags: 00000000
- NumberParameters: 2
- Parameter[0]: 0000000000000000
- Parameter[1]: 00000000046dc232
- Attempt to read from address 00000000046dc232
- CONTEXT: ffffad017a0c5620 -- (.cxr 0xffffad017a0c5620)
- rax=ffffd587a151ed80 rbx=ffffd587a151ed80 rcx=00000000046dc232
- rdx=0000000000000000 rsi=00000000046dc232 rdi=ffffdb8980497770
- rip=fffff8027eb60c25 rsp=ffffad017a0c6018 rbp=fffff80cf1ee1657
- r8=0000000000000000 r9=0000000000000000 r10=0000000000000000
- r11=0000000000000000 r12=0000000000180000 r13=fffff80cf66fa488
- r14=0000000000000000 r15=ffffdb89804807f0
- iopl=0 nv up ei pl nz na pe nc
- cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202
- nt!IovpValidateDeviceObject+0x5:
- fffff802`7eb60c25 66833903 cmp word ptr [rcx],3 ds:002b:00000000`046dc232=????
- Resetting default scope
- CPU_COUNT: 4
- CPU_MHZ: c15
- CPU_VENDOR: GenuineIntel
- CPU_FAMILY: 6
- CPU_MODEL: 2a
- CPU_STEPPING: 7
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: CODE_CORRUPTION
- PROCESS_NAME: System
- CURRENT_IRQL: 0
- ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
- EXCEPTION_CODE_STR: c0000005
- EXCEPTION_PARAMETER1: 0000000000000000
- EXCEPTION_PARAMETER2: 00000000046dc232
- FOLLOWUP_IP:
- nt!IovpValidateDeviceObject+5
- fffff802`7eb60c25 66833903 cmp word ptr [rcx],3
- READ_ADDRESS: fffff8027e7e1358: Unable to get MiVisibleState
- 00000000046dc232
- BUGCHECK_STR: AV
- LOCK_ADDRESS: fffff8027e764f80 -- (!locks fffff8027e764f80)
- Resource @ nt!PiEngineLock (0xfffff8027e764f80) Available
- WARNING: SystemResourcesList->Flink chain invalid. Resource may be corrupted, or already deleted.
- WARNING: SystemResourcesList->Blink chain invalid. Resource may be corrupted, or already deleted.
- 1 total locks
- PNP_TRIAGE:
- Lock address : 0xfffff8027e764f80
- Thread Count : 0
- Thread address: 0x0000000000000000
- Thread wait : 0x0
- LAST_CONTROL_TRANSFER: from fffff8027eb5ffa4 to fffff8027eb60c25
- STACK_TEXT:
- ffffad01`7a0c6018 fffff802`7eb5ffa4 : ffffd587`a151ed80 00000000`00000000 ffffd587`a151ee98 ffffdb89`7ff5fc20 : nt!IovpValidateDeviceObject+0x5
- ffffad01`7a0c6020 fffff80c`f1ed7c49 : ffffdb89`803bf7e0 ffffad01`7a0c6110 ffffdb89`80261150 ffffdb89`80497770 : nt!IovCallDriver+0x14c
- ffffad01`7a0c6060 fffff802`7eb6d741 : 00000000`00000000 fffff802`7eb705b4 ffffd587`a151eee0 ffffdb89`804807f0 : VerifierExt!IofCallDriver_internal_wrapper+0x19
- ffffad01`7a0c60a0 fffff80c`f1ee1657 : ffffdb89`803bf7e0 ffffd587`a151eee0 00000000`00000000 fffff802`7eb6b870 : nt!VerifierIofCallDriver+0x21
- ffffad01`7a0c60e0 fffff802`7eb6009d : ffffd587`a151ed80 ffffdb89`803bf7e0 00000000`00000000 ffffad01`7a0c6158 : VerifierExt!xdv_IRP_MJ_SYSTEM_CONTROL_wrapper+0xc7
- ffffad01`7a0c6130 fffff802`7e5957ad : ffffd587`a151ed80 00000000`00000000 00000000`00000000 ffffdb89`7ff5fc20 : nt!IovCallDriver+0x245
- ffffad01`7a0c6170 fffff802`7eb7db5b : ffffd587`a151ed80 00000000`00000000 ffffdb89`8046bb50 ffffd587`00000000 : nt!IofCallDriver+0x134f9d
- ffffad01`7a0c61b0 fffff802`7eb6009d : ffffdb89`8046bca0 ffffd587`a151ed80 00000000`00000000 00001f80`010809d0 : nt!ViFilterDispatchGeneric+0xbb
- ffffad01`7a0c61f0 fffff80c`f1ed7c49 : ffffd587`a151ed80 00000000`00000017 ffffdb89`804806a0 ffffdb89`7e0f0a80 : nt!IovCallDriver+0x245
- ffffad01`7a0c6230 fffff802`7eb6d741 : fffff80c`f1ede657 fffff802`7eb6009d fffff80c`f64e05d8 fffff80c`f64e137d : VerifierExt!IofCallDriver_internal_wrapper+0x19
- ffffad01`7a0c6270 fffff80c`f66e666a : fffff80c`f670af14 00000000`00000000 00000000`00000000 fffff802`7eb702db : nt!VerifierIofCallDriver+0x21
- ffffad01`7a0c62b0 fffff80c`f66efd9a : 00000000`00000000 00000000`00000000 ffffd587`a151ed80 ffffdb89`80480810 : HIDCLASS!HidpCallDriver+0x7a
- ffffad01`7a0c6310 fffff80c`f670af22 : ffffdb89`804807f0 ffffdb89`8046bb50 ffffd587`a151ef28 ffffad01`7a0c63a0 : HIDCLASS!HidpIrpMajorDefault+0xfa
- ffffad01`7a0c6370 fffff80c`f66e214f : ffffd587`00000002 00000000`00000017 ffffd587`a151ed80 ffffdb89`80261240 : HIDCLASS!HidpIrpMajorSystemControl+0x2352
- ffffad01`7a0c63a0 fffff80c`f1ee1657 : ffffdb89`804806a0 ffffad01`7a0c6460 ffffd587`a151ed80 fffff802`7eb6b870 : HIDCLASS!HidpMajorHandler+0x21f
- ffffad01`7a0c6430 fffff802`7eb6009d : ffffd587`a151ed80 ffffdb89`804806a0 00000000`00000000 ffffad01`7a0c64a8 : VerifierExt!xdv_IRP_MJ_SYSTEM_CONTROL_wrapper+0xc7
- ffffad01`7a0c6480 fffff802`7e5957ad : ffffd587`a151ed80 00000000`00000000 00000000`00000000 ffffdb89`7fc9da60 : nt!IovCallDriver+0x245
- ffffad01`7a0c64c0 fffff802`7eb7db5b : ffffd587`a151ed80 00000000`00000000 ffffdb89`8046dde0 ffffd587`00000001 : nt!IofCallDriver+0x134f9d
- ffffad01`7a0c6500 fffff802`7eb6009d : ffffdb89`8046df30 ffffd587`a151ed80 ffffd587`a151ed00 fffff802`7eb79313 : nt!ViFilterDispatchGeneric+0xbb
- ffffad01`7a0c6540 fffff802`7e5957ad : ffffd587`a151ed80 ffffdb89`8046dde0 00000000`00000002 ffffdb89`80433f40 : nt!IovCallDriver+0x245
- ffffad01`7a0c6580 fffff802`7eb6bcc9 : ffffdb89`803bf7e0 ffffdb89`8046dde0 00000000`00000000 00000000`00000000 : nt!IofCallDriver+0x134f9d
- ffffad01`7a0c65c0 fffff802`7eb7bc2a : ffffdb89`803bf7e0 ffffad01`7a0c6779 00000000`00000001 ffffdb89`803bf7e0 : nt!VfIrpSendSynchronousIrp+0x109
- ffffad01`7a0c6630 fffff802`7eb70459 : 00000000`00000000 ffffad01`7a0c6779 00000000`00000001 ffffdb89`803bf7e0 : nt!VfWmiTestStartedPdoStack+0x5a
- ffffad01`7a0c66d0 fffff802`7e8e8394 : 00000000`00000000 ffffad01`7a0c6779 00000000`00000001 ffffad01`7a0c6779 : nt!VfMajorTestStartedPdoStack+0x59
- ffffad01`7a0c6700 fffff802`7e8368ed : ffffdb89`800cf520 ffffad01`00000001 00000000`00000000 00000000`00000000 : nt!PipProcessStartPhase3+0xb8
- ffffad01`7a0c67e0 fffff802`7e8e742f : ffffdb89`801da690 ffffad01`7a0c6b19 00000000`00000010 fffff802`7e8e7384 : nt!PipProcessDevNodeTree+0x3d1
- ffffad01`7a0c6a60 fffff802`7e4d28f3 : ffffdb01`00000003 00000000`00000000 ffffdb89`801da690 ffffdb89`801da690 : nt!PiProcessReenumeration+0xab
- ffffad01`7a0c6ab0 fffff802`7e43dca8 : ffffdb89`7bb66640 fffff802`7e763a20 fffff802`7e7f8380 fffff802`7e7f8380 : nt!PnpDeviceActionWorker+0x1b3
- ffffad01`7a0c6b80 fffff802`7e4dcac7 : 00000000`00000000 00000000`00000080 ffffdb89`7a87a680 ffffdb89`7bb66640 : nt!ExpWorkerThread+0xd8
- ffffad01`7a0c6c10 fffff802`7e571946 : ffffad01`79ca0180 ffffdb89`7bb66640 fffff802`7e4dca80 00000000`00000000 : nt!PspSystemThreadStartup+0x47
- ffffad01`7a0c6c60 00000000`00000000 : ffffad01`7a0c7000 ffffad01`7a0c1000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
- CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
- fffff8027e48dd28 - nt!MiResolvePageTablePage+3b8
- [ f6:c3 ]
- fffff8027e48dd48-fffff8027e48dd4c 5 bytes - nt!MiResolvePageTablePage+3d8 (+0x20)
- [ df be 7d fb f6:7f f8 f0 e1 c3 ]
- fffff8027e495817 - nt!MiPfnShareCountIsZero+187 (+0x7acf)
- [ f6:c3 ]
- fffff8027e4af8bc - nt!MiInitializeTransitionPfn+28 (+0x1a0a5)
- [ fa:82 ]
- 8 errors : !nt (fffff8027e48dd28-fffff8027e4af8bc)
- MODULE_NAME: memory_corruption
- IMAGE_NAME: memory_corruption
- FOLLOWUP_NAME: memory_corruption
- DEBUG_FLR_IMAGE_TIMESTAMP: 0
- MEMORY_CORRUPTOR: LARGE
- STACK_COMMAND: .cxr 0xffffad017a0c5620 ; kb
- FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
- BUCKET_ID: MEMORY_CORRUPTION_LARGE
- PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
- TARGET_TIME: 2017-07-29T20:52:37.000Z
- OSBUILD: 15063
- OSSERVICEPACK: 483
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 784
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2017-07-07 02:06:35
- BUILDDATESTAMP_STR: 160101.0800
- BUILDLAB_STR: WinBuild
- BUILDOSVER_STR: 10.0.15063.483
- ANALYSIS_SESSION_ELAPSED_TIME: 40d4
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:memory_corruption_large
- FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
- Followup: memory_corruption
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement