Advertisement
Guest User

Untitled

a guest
Jul 30th, 2017
133
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 83.57 KB | None | 0 0
  1. Microsoft (R) Windows Debugger Version 10.0.14321.1024 X86
  2. Copyright (c) Microsoft Corporation. All rights reserved.
  3.  
  4. Auto Dump Analyzer by gardenman
  5. Time to debug file(s): 00 hours and 10 minutes and 16 seconds
  6.  
  7. ========================================================================
  8. =================== Dump File: 072917-7593-01.dmp ====================
  9. ========================================================================
  10. Mini Kernel Dump File: Only registers and stack trace are available
  11. Windows 10 Kernel Version 15063 MP (4 procs) Free x64
  12. Product: WinNt, suite: TerminalServer SingleUserTS Personal
  13. Built by: 15063.0.amd64fre.rs2_release.170317-1834
  14. Kernel base = 0xfffff801`36c85000 PsLoadedModuleList = 0xfffff801`36fd15e0
  15. Debug session time: Sat Jul 29 11:40:08.409 2017 (UTC - 4:00)
  16. System Uptime: 2 days 17:20:48.069
  17.  
  18. BugCheck F7, {3c80206f46a0, 8ba9e8902088, ffff7456176fdf77, 0}
  19. *** WARNING: Unable to verify timestamp for win32k.sys
  20. *** ERROR: Module load completed but symbols could not be loaded for win32k.sys
  21. Probably caused by : memory_corruption
  22. Followup: memory_corruption
  23.  
  24. DRIVER_OVERRAN_STACK_BUFFER (f7)
  25. A driver has overrun a stack-based buffer. This overrun could potentially
  26. allow a malicious user to gain control of this machine.
  27. DESCRIPTION
  28. A driver overran a stack-based buffer (or local variable) in a way that would
  29. have overwritten the function's return address and jumped back to an arbitrary
  30. address when the function returned. This is the classic "buffer overrun"
  31. hacking attack and the system has been brought down to prevent a malicious user
  32. from gaining complete control of it.
  33. Do a kb to get a stack backtrace -- the last routine on the stack before the
  34. buffer overrun handlers and bugcheck call is the one that overran its local
  35. variable(s).
  36.  
  37. Arguments:
  38. Arg1: 00003c80206f46a0, Actual security check cookie from the stack
  39. Arg2: 00008ba9e8902088, Expected security check cookie
  40. Arg3: ffff7456176fdf77, Complement of the expected security check cookie
  41. Arg4: 0000000000000000, zero
  42.  
  43. Debugging Details:
  44. DUMP_CLASS: 1
  45. DUMP_QUALIFIER: 400
  46. BUILD_VERSION_STRING: 10.0.15063.483 (WinBuild.160101.0800)
  47. BIOS_VENDOR: American Megatrends Inc.
  48. BIOS_VERSION: P2.30
  49. BIOS_DATE: 06/29/2012
  50. BASEBOARD_MANUFACTURER: ASRock
  51. BASEBOARD_PRODUCT: Z68 Pro3 Gen3
  52. BASEBOARD_VERSION:
  53. DUMP_TYPE: 2
  54. SECURITY_COOKIE: Expected 00008ba9e8902088 found 00003c80206f46a0
  55. CPU_COUNT: 4
  56. CPU_MHZ: c15
  57. CPU_VENDOR: GenuineIntel
  58. CPU_FAMILY: 6
  59. CPU_MODEL: 2a
  60. CPU_STEPPING: 7
  61. CPU_MICROCODE: 6,2a,7,0 (F,M,S,R) SIG: 29'00000000 (cache) 29'00000000 (init)
  62. CUSTOMER_CRASH_COUNT: 1
  63. DEFAULT_BUCKET_ID: CODE_CORRUPTION
  64. BUGCHECK_STR: 0xF7
  65.  
  66. PROCESS_NAME: System
  67.  
  68. CURRENT_IRQL: 2
  69. LAST_CONTROL_TRANSFER: from fffff80136e5f905 to fffff80136df14c0
  70. STACK_TEXT:
  71. ffff9480`206f08f8 fffff801`36e5f905 : 00000000`000000f7 00003c80`206f46a0 00008ba9`e8902088 ffff7456`176fdf77 : nt!KeBugCheckEx
  72. ffff9480`206f0900 fffff801`36ccce0a : ffffde8f`a8808918 00000000`00000000 ffffa800`05cc99d0 fffff801`37002100 : nt!_report_gsfailure+0x25
  73. ffff9480`206f0940 fffff801`36e15799 : 00000000`001eedd0 00000000`00000001 00000000`00000000 0000000f`ffffffff : nt!MiGetTopLevelPfn+0x12a
  74. ffff9480`206f09c0 fffff801`36dad700 : ffffa800`003fb9a0 00000000`00000000 fffff801`37002100 ffffa800`05cc99d0 : nt!MiRestoreTransitionPte+0x145579
  75. ffff9480`206f0a30 fffff801`36ea17f9 : 0000000f`ffffffff 00000000`00000000 00000000`00000000 ffffde8f`00000001 : nt!MiRemoveLowestPriorityStandbyPage+0x1b0
  76. ffff9480`206f0ac0 fffff801`36ea1a0d : 00000000`00000000 00000000`00000000 00000000`00000000 fffff801`37002100 : nt!MiPruneStandbyPages+0x55
  77. ffff9480`206f0b20 fffff801`36cc2ca8 : ffffde8f`a75b5040 fffff801`36ea1980 fffff801`370034e0 fffff801`370c5620 : nt!MiRebalanceZeroFreeLists+0x8d
  78. ffff9480`206f0b80 fffff801`36d61ac7 : 00007ff9`13e69db0 00000000`00000080 ffffde8f`a3622280 ffffde8f`a75b5040 : nt!ExpWorkerThread+0xd8
  79. ffff9480`206f0c10 fffff801`36df6946 : ffff9480`1c444180 ffffde8f`a75b5040 fffff801`36d61a80 ffff9480`206f0c00 : nt!PspSystemThreadStartup+0x47
  80. ffff9480`206f0c60 00000000`00000000 : ffff9480`206f1000 ffff9480`206eb000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
  81. STACK_COMMAND: kb
  82. CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
  83. fffff80136ccce98-fffff80136ccce99 2 bytes - nt!MiUnlockCodePage+5c
  84. [ 80 fa:00 a8 ]
  85. fffff80136d9db1a - nt!MiUnlockPagedAddress+22 (+0xd0c82)
  86. [ f6:c5 ]
  87. fffff80136d9db40-fffff80136d9db41 2 bytes - nt!MiUnlockPagedAddress+48 (+0x26)
  88. [ 80 fa:00 a8 ]
  89. fffff80136ea1810-fffff80136ea1811 2 bytes - nt!MiPruneStandbyPages+6c (+0x103cd0)
  90. [ 80 fa:00 a8 ]
  91. fffff80136ea18a2-fffff80136ea18a3 2 bytes - nt!MiPruneStandbyPages+fe (+0x92)
  92. [ 80 fa:00 a8 ]
  93. fffff80136ea1af9-fffff80136ea1afa 2 bytes - nt!MiSwapNumaStandbyPage+35 (+0x257)
  94. [ 80 fa:00 a8 ]
  95. 11 errors : !nt (fffff80136ccce98-fffff80136ea1afa)
  96. MODULE_NAME: memory_corruption
  97.  
  98. IMAGE_NAME: memory_corruption
  99.  
  100. FOLLOWUP_NAME: memory_corruption
  101. DEBUG_FLR_IMAGE_TIMESTAMP: 0
  102. MEMORY_CORRUPTOR: LARGE
  103. FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
  104. BUCKET_ID: MEMORY_CORRUPTION_LARGE
  105. PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
  106. TARGET_TIME: 2017-07-29T15:40:08.000Z
  107. OSBUILD: 15063
  108. OSSERVICEPACK: 483
  109. SERVICEPACK_NUMBER: 0
  110. OS_REVISION: 0
  111. SUITE_MASK: 784
  112. PRODUCT_TYPE: 1
  113. OSPLATFORM_TYPE: x64
  114. OSNAME: Windows 10
  115. OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
  116. USER_LCID: 0
  117. OSBUILD_TIMESTAMP: 2017-07-07 02:06:35
  118. BUILDDATESTAMP_STR: 160101.0800
  119. BUILDLAB_STR: WinBuild
  120. BUILDOSVER_STR: 10.0.15063.483
  121. ANALYSIS_SESSION_ELAPSED_TIME: 2a65
  122. ANALYSIS_SOURCE: KM
  123. FAILURE_ID_HASH_STRING: km:memory_corruption_large
  124. FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
  125. Followup: memory_corruption
  126.  
  127. =============================== Drivers ================================
  128. Image path: \SystemRoot\System32\win32kfull.sys
  129. Image name: win32kfull.sys
  130. Timestamp: unavailable (00000000)
  131.  
  132. Image path: \SystemRoot\System32\win32k.sys
  133. Image name: win32k.sys
  134. Timestamp: unavailable (00000000)
  135.  
  136. Image path: \SystemRoot\System32\win32kbase.sys
  137. Image name: win32kbase.sys
  138. Timestamp: unavailable (00000000)
  139.  
  140. Image path: \SystemRoot\System32\TSDDD.dll
  141. Image name: TSDDD.dll
  142. Timestamp: unavailable (00000000)
  143.  
  144. Image path: \SystemRoot\System32\cdd.dll
  145. Image name: cdd.dll
  146. Timestamp: unavailable (00000000)
  147.  
  148. Image path: \SystemRoot\system32\drivers\peauth.sys
  149. Image name: peauth.sys
  150. Timestamp: Sat Dec 9 1989
  151.  
  152. Image path: \SystemRoot\system32\DRIVERS\nuviocir_x64.sys
  153. Image name: nuviocir_x64.sys
  154. Timestamp: Thu Jul 11 2013
  155.  
  156. Image path: \SystemRoot\system32\drivers\LGVirHid.sys
  157. Image name: LGVirHid.sys
  158. Timestamp: Mon Jun 13 2016
  159.  
  160. Image path: \SystemRoot\System32\drivers\wdcsam64.sys
  161. Image name: wdcsam64.sys
  162. Timestamp: Fri Oct 9 2015
  163.  
  164. Image path: MpKsl0779f59e.sys
  165. Image name: MpKsl0779f59e.sys
  166. Timestamp: Tue May 19 2015
  167.  
  168. Image path: \SystemRoot\System32\Drivers\Null.SYS
  169. Image name: Null.SYS
  170. Timestamp: unavailable (00000000)
  171.  
  172. Image path: \SystemRoot\System32\Drivers\Fs_Rec.sys
  173. Image name: Fs_Rec.sys
  174. Timestamp: unavailable (00000000)
  175.  
  176. Image path: \??\C:\ProgramData\Microsoft\Windows Defender\Definition Updates\{9C45D0D4-C683-4D03-B550-3CF4D94B5140}\MpKslac96ca23.sys
  177. Image name: MpKslac96ca23.sys
  178. Timestamp: Tue May 19 2015
  179.  
  180. Image path: \??\C:\ProgramData\Microsoft\Windows Defender\Definition Updates\{520C8120-3717-4531-B385-60E85EA43257}\MpKsl5b188f08.sys
  181. Image name: MpKsl5b188f08.sys
  182. Timestamp: Tue May 19 2015
  183.  
  184. Image path: \SystemRoot\System32\drivers\tap0901.sys
  185. Image name: tap0901.sys
  186. Timestamp: Wed Nov 5 2014
  187.  
  188. Image path: \SystemRoot\system32\drivers\LGJoyXlCore.sys
  189. Image name: LGJoyXlCore.sys
  190. Timestamp: Mon Jun 13 2016
  191.  
  192. Image path: \SystemRoot\system32\drivers\nvhda64v.sys
  193. Image name: nvhda64v.sys
  194. Timestamp: Tue May 16 2017
  195.  
  196. Image path: \??\C:\Program Files\Logitech Gaming Software\Drivers\LgCoreTemp\lgcoretemp.sys
  197. Image name: lgcoretemp.sys
  198. Timestamp: Tue Jun 9 2015
  199.  
  200. Image path: \SystemRoot\system32\DRIVERS\igdkmd64.sys
  201. Image name: igdkmd64.sys
  202. Timestamp: Thu May 19 2016
  203.  
  204. Image path: \SystemRoot\System32\drivers\TeeDriverW8x64.sys
  205. Image name: TeeDriverW8x64.sys
  206. Timestamp: Tue Jul 7 2015
  207.  
  208. Image path: \SystemRoot\system32\drivers\cmudaxp.sys
  209. Image name: cmudaxp.sys
  210. Timestamp: Tue Jun 2 2015
  211.  
  212. Image path: \SystemRoot\System32\drivers\rt640x64.sys
  213. Image name: rt640x64.sys
  214. Timestamp: Wed Oct 5 2016
  215.  
  216. Image path: \SystemRoot\System32\drivers\ISCTD64.sys
  217. Image name: ISCTD64.sys
  218. Timestamp: Tue Nov 27 2012
  219.  
  220. Image path: \SystemRoot\system32\drivers\nvvad64v.sys
  221. Image name: nvvad64v.sys
  222. Timestamp: Wed Apr 12 2017
  223.  
  224. Image path: \SystemRoot\System32\drivers\nvvhci.sys
  225. Image name: nvvhci.sys
  226. Timestamp: Tue Dec 27 2016
  227.  
  228. Image path: \SystemRoot\System32\DriverStore\FileRepository\nv_dispi.inf_amd64_2386fda73b467ac8\nvlddmkm.sys
  229. Image name: nvlddmkm.sys
  230. Timestamp: Tue Jun 27 2017
  231.  
  232. Image path: \SystemRoot\System32\drivers\drmk.sys
  233. Image name: drmk.sys
  234. Timestamp: ***** Invalid (A01C1986)
  235.  
  236. Image path: \SystemRoot\system32\drivers\LGBusEnum.sys
  237. Image name: LGBusEnum.sys
  238. Timestamp: Mon Jun 13 2016
  239.  
  240. Unloaded modules:
  241. fffff801`36040000 fffff801`3604e000 MpKsl1244392
  242. fffff801`360f0000 fffff801`3610c000 EhStorClass.
  243. fffff801`35f90000 fffff801`35f9d000 WSDScan.sys
  244. fffff801`35f80000 fffff801`35f8d000 WSDPrint.sys
  245. fffff801`36050000 fffff801`3605f000 hiber_storpo
  246. fffff801`36060000 fffff801`36087000 hiber_storah
  247. fffff801`36090000 fffff801`360ad000 hiber_dumpfv
  248. fffff806`17730000 fffff806`1776d000 WUDFRd.sys
  249. fffff806`17480000 fffff806`174bd000 WUDFRd.sys
  250. fffff806`17440000 fffff806`1747d000 WUDFRd.sys
  251. fffff806`17400000 fffff806`1743d000 WUDFRd.sys
  252. fffff806`173c0000 fffff806`173fd000 WUDFRd.sys
  253. fffff806`18410000 fffff806`1841b000 cldflt.sys
  254. fffff806`17380000 fffff806`173bd000 WUDFRd.sys
  255. fffff806`18420000 fffff806`1843c000 EhStorClass.
  256. fffff806`18400000 fffff806`1841c000 EhStorClass.
  257. fffff806`183e0000 fffff806`183fc000 EhStorClass.
  258. fffff806`166b0000 fffff806`166cc000 EhStorClass.
  259. fffff806`17210000 fffff806`1721f000 dump_storpor
  260. fffff806`17250000 fffff806`17277000 dump_storahc
  261. fffff806`172a0000 fffff806`172bd000 dump_dumpfve
  262. fffff806`17f70000 fffff806`17f90000 dam.sys
  263. fffff806`16320000 fffff806`1632f000 WdBoot.sys
  264. fffff806`17120000 fffff806`1712f000 hwpolicy.sys
  265.  
  266. ============================= BIOS INFO ================================
  267. [SMBIOS Data Tables v2.7]
  268. [DMI Version - 0]
  269. [2.0 Calling Convention - No]
  270. [Table Size - 1537 bytes]
  271. [BIOS Information (Type 0) - Length 24 - Handle 0000h]
  272. Vendor American Megatrends Inc.
  273. BIOS Version P2.30
  274. BIOS Starting Address Segment f000
  275. BIOS Release Date 06/29/2012
  276. BIOS ROM Size 800000
  277. BIOS Characteristics
  278. 07: - PCI Supported
  279. 11: - Upgradeable FLASH BIOS
  280. 12: - BIOS Shadowing Supported
  281. 15: - CD-Boot Supported
  282. 16: - Selectable Boot Supported
  283. 17: - BIOS ROM Socketed
  284. 19: - EDD Supported
  285. 23: - 1.2MB Floppy Supported
  286. 24: - 720KB Floppy Supported
  287. 25: - 2.88MB Floppy Supported
  288. 26: - Print Screen Device Supported
  289. 27: - Keyboard Services Supported
  290. 28: - Serial Services Supported
  291. 29: - Printer Services Supported
  292. 32: - BIOS Vendor Reserved
  293. BIOS Characteristic Extensions
  294. 00: - ACPI Supported
  295. 01: - USB Legacy Supported
  296. 08: - BIOS Boot Specification Supported
  297. 10: - Specification Reserved
  298. 11: - Specification Reserved
  299. BIOS Major Revision 4
  300. BIOS Minor Revision 6
  301. EC Firmware Major Revision 255
  302. EC Firmware Minor Revision 255
  303. [System Information (Type 1) - Length 27 - Handle 0001h]
  304. UUID 00000000-0000-0000-0000-000000000000
  305. Wakeup Type Power Switch
  306. [BaseBoard Information (Type 2) - Length 15 - Handle 0002h]
  307. Manufacturer ASRock
  308. Product Z68 Pro3 Gen3
  309. Version
  310. Feature Flags 09h
  311. 1590305288: - ?ÿU?ì?ì¡H.Ý^3Å?Eü3ÀW?}?Eô?Eø?ÿu
  312. ¸@
  313. 1590305328: - ?ÿU?ì?ì¡H.Ý^3Å?Eü3ÀW?}?Eô?Eø?ÿu
  314. ¸@
  315. Location
  316. Chassis Handle 0003h
  317. Board Type 0ah - Processor/Memory Module
  318. Number of Child Handles 0
  319. [System Enclosure (Type 3) - Length 22 - Handle 0003h]
  320. Chassis Type Desktop
  321. Bootup State Safe
  322. Power Supply State Safe
  323. Thermal State Safe
  324. Security Status None
  325. OEM Defined 0
  326. Height 0U
  327. Number of Power Cords 1
  328. Number of Contained Elements 0
  329. Contained Element Size 0
  330. [OEM Strings (Type 11) - Length 5 - Handle 000ah]
  331. Number of Strings 1
  332. [Cache Information (Type 7) - Length 19 - Handle 000ch]
  333. Socket Designation CPU Internal L2
  334. Cache Configuration 0081h - WT Enabled Int NonSocketed L2
  335. Maximum Cache Size 0200h - 512K
  336. Installed Size 0200h - 512K
  337. Supported SRAM Type 0002h - Unknown
  338. Current SRAM Type 0002h - Unknown
  339. Cache Speed 0ns
  340. Error Correction Type Specification Reserved
  341. System Cache Type Instruction
  342. Associativity 16-way Set-Associative
  343. [Cache Information (Type 7) - Length 19 - Handle 000dh]
  344. Socket Designation CPU Internal L1
  345. Cache Configuration 0080h - WT Enabled Int NonSocketed L1
  346. Maximum Cache Size 0040h - 64K
  347. Installed Size 0040h - 64K
  348. Supported SRAM Type 0002h - Unknown
  349. Current SRAM Type 0002h - Unknown
  350. Cache Speed 0ns
  351. Error Correction Type ParitySingle-Bit ECC
  352. System Cache Type Other
  353. Associativity 16-way Set-Associative
  354. [Cache Information (Type 7) - Length 19 - Handle 000eh]
  355. Socket Designation CPU Internal L3
  356. Cache Configuration 0182h - WB Enabled Int NonSocketed L3
  357. Maximum Cache Size 0c00h - 3072K
  358. Installed Size 0c00h - 3072K
  359. Supported SRAM Type 0002h - Unknown
  360. Current SRAM Type 0002h - Unknown
  361. Cache Speed 0ns
  362. Error Correction Type Specification Reserved
  363. System Cache Type Instruction
  364. Associativity Specification Reserved
  365. [Physical Memory Array (Type 16) - Length 23 - Handle 000fh]
  366. Location 03h - SystemBoard/Motherboard
  367. Use 03h - System Memory
  368. Memory Error Correction 03h - None
  369. Maximum Capacity 33554432KB
  370. Number of Memory Devices 4
  371. [Processor Information (Type 4) - Length 42 - Handle 0010h]
  372. Socket Designation CPUSocket
  373. Processor Type Central Processor
  374. Processor Family ceh - Specification Reserved
  375. Processor Manufacturer Intel(R) Corporation
  376. Processor ID a7060200fffbebbf
  377. Processor Version Intel(R) Core(TM) i3-2100 CPU @ 3.10GHz
  378. Processor Voltage 8ch - 1.2V
  379. External Clock 100MHz
  380. Max Speed 3800MHz
  381. Current Speed 3100MHz
  382. Status Enabled Populated
  383. Processor Upgrade Specification Reserved
  384. L1 Cache Handle 000dh
  385. L2 Cache Handle 000ch
  386. L3 Cache Handle 000eh
  387. [Memory Device (Type 17) - Length 34 - Handle 0011h]
  388. Physical Memory Array Handle 000fh
  389. Total Width 64 bits
  390. Data Width 64 bits
  391. Size 4096MB
  392. Form Factor 09h - DIMM
  393. Device Locator ChannelA-DIMM0
  394. Bank Locator BANK 0
  395. Memory Type 18h - Specification Reserved
  396. Type Detail 0080h - Synchronous
  397. Speed 1333MHz
  398. Manufacturer Kingston
  399. Part Number 9905403-447.A00LF
  400. [Memory Device Mapped Address (Type 20) - Length 35 - Handle 0012h]
  401. Starting Address 00000000h
  402. Ending Address 003fffffh
  403. Memory Device Handle 0011h
  404. Mem Array Mapped Adr Handle 0017h
  405. Partition Row Position 01
  406. Interleave Position 01
  407. Interleave Data Depth 02
  408. [Memory Device (Type 17) - Length 34 - Handle 0013h]
  409. Physical Memory Array Handle 000fh
  410. Total Width 0 bits
  411. Data Width 0 bits
  412. Form Factor 09h - DIMM
  413. Device Locator ChannelA-DIMM1
  414. Bank Locator BANK 1
  415. Memory Type 02h - Unknown
  416. Type Detail 0000h -
  417. Speed 0MHz
  418. [Memory Device (Type 17) - Length 34 - Handle 0014h]
  419. Physical Memory Array Handle 000fh
  420. Total Width 64 bits
  421. Data Width 64 bits
  422. Size 4096MB
  423. Form Factor 09h - DIMM
  424. Device Locator ChannelB-DIMM0
  425. Bank Locator BANK 2
  426. Memory Type 18h - Specification Reserved
  427. Type Detail 0080h - Synchronous
  428. Speed 1333MHz
  429. Manufacturer Kingston
  430. Part Number 9905403-447.A00LF
  431. [Memory Device Mapped Address (Type 20) - Length 35 - Handle 0015h]
  432. Starting Address 00400000h
  433. Ending Address 007fffffh
  434. Memory Device Handle 0014h
  435. Mem Array Mapped Adr Handle 0017h
  436. Partition Row Position 01
  437. Interleave Position 02
  438. Interleave Data Depth 02
  439. [Memory Device (Type 17) - Length 34 - Handle 0016h]
  440. Physical Memory Array Handle 000fh
  441. Total Width 0 bits
  442. Data Width 0 bits
  443. Form Factor 09h - DIMM
  444. Device Locator ChannelB-DIMM1
  445. Bank Locator BANK 3
  446. Memory Type 02h - Unknown
  447. Type Detail 0000h -
  448. Speed 0MHz
  449. [Memory Array Mapped Address (Type 19) - Length 31 - Handle 0017h]
  450. Starting Address 00000000h
  451. Ending Address 007fffffh
  452. Memory Array Handle 000fh
  453. Partition Width 04
  454.  
  455. ========================================================================
  456. =================== Dump File: 072917-7625-01.dmp ====================
  457. ========================================================================
  458. Mini Kernel Dump File: Only registers and stack trace are available
  459. Windows 10 Kernel Version 15063 MP (4 procs) Free x64
  460. Product: WinNt, suite: TerminalServer SingleUserTS Personal
  461. Built by: 15063.0.amd64fre.rs2_release.170317-1834
  462. Kernel base = 0xfffff803`55206000 PsLoadedModuleList = 0xfffff803`555525e0
  463. Debug session time: Sat Jul 29 12:24:38.533 2017 (UTC - 4:00)
  464. System Uptime: 0 days 0:00:10.193
  465.  
  466. BugCheck 3B, {c0000005, fffff8035529c7c0, ffffd000051172c0, 0}
  467. Probably caused by : memory_corruption
  468. Followup: memory_corruption
  469.  
  470. SYSTEM_SERVICE_EXCEPTION (3b)
  471. An exception happened while executing a system service routine.
  472.  
  473. Arguments:
  474. Arg1: 00000000c0000005, Exception code that caused the bugcheck
  475. Arg2: fffff8035529c7c0, Address of the instruction which caused the bugcheck
  476. Arg3: ffffd000051172c0, Address of the context record for the exception that caused the bugcheck
  477. Arg4: 0000000000000000, zero.
  478.  
  479. Debugging Details:
  480. DUMP_CLASS: 1
  481. DUMP_QUALIFIER: 400
  482. BUILD_VERSION_STRING: 10.0.15063.483 (WinBuild.160101.0800)
  483. BIOS_VENDOR: American Megatrends Inc.
  484. BIOS_VERSION: P2.30
  485. BIOS_DATE: 06/29/2012
  486. BASEBOARD_MANUFACTURER: ASRock
  487. BASEBOARD_PRODUCT: Z68 Pro3 Gen3
  488. BASEBOARD_VERSION:
  489. DUMP_TYPE: 2
  490. EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
  491. FAULTING_IP:
  492. nt!MiCoalesceFreePages+3c0
  493. fffff803`5529c7c0 4c8b36 mov r14,qword ptr [rsi]
  494. CONTEXT: ffffd000051172c0 -- (.cxr 0xffffd000051172c0)
  495. rax=fffff18003c12540 rbx=fffff18003c15568 rcx=fffff18003c0f540
  496. rdx=fffff18003c12540 rsi=dd00000000000000 rdi=fffff18000000000
  497. rip=fffff8035529c7c0 rsp=ffffd00005117cb0 rbp=fffff480000051c0
  498. r8=fffff18003c12540 r9=00000000001a6a80 r10=fffff480000051c0
  499. r11=fffff18003c0f540 r12=0000000000000201 r13=7fffffffffffffff
  500. r14=dd00000000000000 r15=2aaaaaaaaaaaaaab
  501. iopl=0 nv up ei ng nz na po nc
  502. cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010286
  503. nt!MiCoalesceFreePages+0x3c0:
  504. fffff803`5529c7c0 4c8b36 mov r14,qword ptr [rsi] ds:002b:dd000000`00000000=????????????????
  505. Resetting default scope
  506. CPU_COUNT: 4
  507. CPU_MHZ: c15
  508. CPU_VENDOR: GenuineIntel
  509. CPU_FAMILY: 6
  510. CPU_MODEL: 2a
  511. CPU_STEPPING: 7
  512. CPU_MICROCODE: 6,2a,7,0 (F,M,S,R) SIG: 29'00000000 (cache) 29'00000000 (init)
  513. CUSTOMER_CRASH_COUNT: 1
  514. DEFAULT_BUCKET_ID: CODE_CORRUPTION
  515. BUGCHECK_STR: 0x3B
  516.  
  517. PROCESS_NAME: MsMpEng.exe
  518.  
  519. CURRENT_IRQL: 2
  520. LAST_CONTROL_TRANSFER: from fffff8035529bc6e to fffff8035529c7c0
  521. STACK_TEXT:
  522. ffffd000`05117cb0 fffff803`5529bc6e : 00000000`00140710 00000000`00000001 00000000`00000201 fffff180`03c15300 : nt!MiCoalesceFreePages+0x3c0
  523. ffffd000`05117d80 fffff803`5529b75c : 00000000`00140712 00000000`00000000 ffffa782`2da79010 ffffa782`00000001 : nt!MiInsertPageInFreeOrZeroedList+0x20e
  524. ffffd000`05117e80 fffff803`5529de72 : ffffa782`2da790f0 ffffd000`05118168 ffffa782`2da790f0 fffff803`55272107 : nt!MiPfnShareCountIsZero+0xcc
  525. ffffd000`05117ed0 fffff803`55289ef4 : 00000000`00000200 fffff880`fad42538 00000000`00000000 ffffbb87`e363e150 : nt!MiDeletePteList+0x432
  526. ffffd000`05118090 fffff803`556bcc6b : 00000000`00000000 ffffd000`05118b80 00000000`00017000 000001f5`a8491000 : nt!MiDecommitPages+0x5e4
  527. ffffd000`051189b0 fffff803`5537d413 : 00000000`0000027c ffffa782`2c619080 00000000`00000000 00000039`a23fefd8 : nt!NtFreeVirtualMemory+0x2ab
  528. ffffd000`05118b00 00007ffb`3fc95764 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
  529. 00000039`a23fe868 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`3fc95764
  530. CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
  531. fffff803552899c2 - nt!MiDecommitPages+b2
  532. [ f6:f8 ]
  533. fffff8035529b817 - nt!MiPfnShareCountIsZero+187 (+0x11e55)
  534. [ f6:f8 ]
  535. fffff8035529c17c - nt!MiInsertPageInFreeOrZeroedList+71c (+0x965)
  536. [ fa:f1 ]
  537. fffff8035529c1dc - nt!MiInsertPageInFreeOrZeroedList+77c (+0x60)
  538. [ fa:f1 ]
  539. fffff8035529c447 - nt!MiCoalesceFreePages+47 (+0x26b)
  540. [ fa:f1 ]
  541. fffff8035529c4c7 - nt!MiCoalesceFreePages+c7 (+0x80)
  542. [ fa:f1 ]
  543. fffff8035529c7b8 - nt!MiCoalesceFreePages+3b8 (+0x2f1)
  544. [ fa:f1 ]
  545. fffff8035529ca0c - nt!MiCoalesceFreePages+60c (+0x254)
  546. [ fa:f1 ]
  547. fffff8035529cbf4 - nt!MiUnlinkFreeOrZeroedPage+24 (+0x1e8)
  548. [ fa:f1 ]
  549. fffff8035529ce33 - nt!MiUnlinkFreeOrZeroedPage+263 (+0x23f)
  550. [ fa:f1 ]
  551. fffff8035529cec1 - nt!MiUnlinkFreeOrZeroedPage+2f1 (+0x8e)
  552. [ fa:f1 ]
  553. fffff8035529cf7b - nt!MiUnlinkFreeOrZeroedPage+3ab (+0xba)
  554. [ fa:f1 ]
  555. fffff8035529cfac - nt!MiUnlinkFreeOrZeroedPage+3dc (+0x31)
  556. [ fa:f1 ]
  557. 13 errors : !nt (fffff803552899c2-fffff8035529cfac)
  558. MODULE_NAME: memory_corruption
  559.  
  560. IMAGE_NAME: memory_corruption
  561.  
  562. FOLLOWUP_NAME: memory_corruption
  563. DEBUG_FLR_IMAGE_TIMESTAMP: 0
  564. MEMORY_CORRUPTOR: LARGE
  565. STACK_COMMAND: .cxr 0xffffd000051172c0 ; kb
  566. FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
  567. BUCKET_ID: MEMORY_CORRUPTION_LARGE
  568. PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
  569. TARGET_TIME: 2017-07-29T16:24:38.000Z
  570. OSBUILD: 15063
  571. OSSERVICEPACK: 483
  572. SERVICEPACK_NUMBER: 0
  573. OS_REVISION: 0
  574. SUITE_MASK: 784
  575. PRODUCT_TYPE: 1
  576. OSPLATFORM_TYPE: x64
  577. OSNAME: Windows 10
  578. OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
  579. USER_LCID: 0
  580. OSBUILD_TIMESTAMP: 2017-07-07 02:06:35
  581. BUILDDATESTAMP_STR: 160101.0800
  582. BUILDLAB_STR: WinBuild
  583. BUILDOSVER_STR: 10.0.15063.483
  584. ANALYSIS_SESSION_ELAPSED_TIME: 2952
  585. ANALYSIS_SOURCE: KM
  586. FAILURE_ID_HASH_STRING: km:memory_corruption_large
  587. FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
  588. Followup: memory_corruption
  589.  
  590. ========================================================================
  591. =================== Dump File: 072917-7640-03.dmp ====================
  592. ========================================================================
  593. Mini Kernel Dump File: Only registers and stack trace are available
  594. Windows 10 Kernel Version 15063 MP (4 procs) Free x64
  595. Product: WinNt, suite: TerminalServer SingleUserTS Personal
  596. Built by: 15063.0.amd64fre.rs2_release.170317-1834
  597. Kernel base = 0xfffff800`49e8d000 PsLoadedModuleList = 0xfffff800`4a1d95e0
  598. Debug session time: Sat Jul 29 16:55:10.359 2017 (UTC - 4:00)
  599. System Uptime: 0 days 0:00:39.078
  600.  
  601. BugCheck 1000007E, {ffffffffc0000005, fffff8004a5edc25, ffffc100a1945dd8, ffffc100a1945620}
  602. *** WARNING: Unable to verify timestamp for win32k.sys
  603. *** ERROR: Module load completed but symbols could not be loaded for win32k.sys
  604. Probably caused by : memory_corruption
  605. Followup: memory_corruption
  606.  
  607. SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
  608. This is a very common bugcheck. Usually the exception address pinpoints
  609. the driver/function that caused the problem. Always note this address
  610. as well as the link date of the driver/image that contains this address.
  611. Some common problems are exception code 0x80000003. This means a hard
  612. coded breakpoint or assertion was hit, but this system was booted
  613. /NODEBUG. This is not supposed to happen as developers should never have
  614. hardcoded breakpoints in retail code, but ...
  615. If this happens, make sure a debugger gets connected, and the
  616. system is booted /DEBUG. This will let us see why this breakpoint is
  617. happening.
  618.  
  619. Arguments:
  620. Arg1: ffffffffc0000005, The exception code that was not handled
  621. Arg2: fffff8004a5edc25, The address that the exception occurred at
  622. Arg3: ffffc100a1945dd8, Exception Record Address
  623. Arg4: ffffc100a1945620, Context Record Address
  624.  
  625. Debugging Details:
  626. DUMP_CLASS: 1
  627. DUMP_QUALIFIER: 400
  628. BUILD_VERSION_STRING: 10.0.15063.483 (WinBuild.160101.0800)
  629. DUMP_TYPE: 2
  630. EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
  631. FAULTING_IP:
  632. nt!IovpValidateDeviceObject+5
  633. fffff800`4a5edc25 66833903 cmp word ptr [rcx],3
  634. EXCEPTION_RECORD: ffffc100a1945dd8 -- (.exr 0xffffc100a1945dd8)
  635. ExceptionAddress: fffff8004a5edc25 (nt!IovpValidateDeviceObject+0x0000000000000005)
  636. ExceptionCode: c0000005 (Access violation)
  637. ExceptionFlags: 00000000
  638. NumberParameters: 2
  639. Parameter[0]: 0000000000000000
  640. Parameter[1]: 00000000046dc232
  641. Attempt to read from address 00000000046dc232
  642. CONTEXT: ffffc100a1945620 -- (.cxr 0xffffc100a1945620)
  643. rax=ffffd404faaced80 rbx=ffffd404faaced80 rcx=00000000046dc232
  644. rdx=0000000000000000 rsi=00000000046dc232 rdi=ffffd50ba9bb74f0
  645. rip=fffff8004a5edc25 rsp=ffffc100a1946018 rbp=fffff803e6ce1657
  646. r8=0000000000000000 r9=0000000000000000 r10=0000000000000000
  647. r11=0000000000000000 r12=0000000000180000 r13=fffff803e904a488
  648. r14=0000000000000000 r15=ffffd50ba9c491b0
  649. iopl=0 nv up ei pl nz na pe nc
  650. cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202
  651. nt!IovpValidateDeviceObject+0x5:
  652. fffff800`4a5edc25 66833903 cmp word ptr [rcx],3 ds:002b:00000000`046dc232=????
  653. Resetting default scope
  654. CPU_COUNT: 4
  655. CPU_MHZ: c15
  656. CPU_VENDOR: GenuineIntel
  657. CPU_FAMILY: 6
  658. CPU_MODEL: 2a
  659. CPU_STEPPING: 7
  660. CUSTOMER_CRASH_COUNT: 3
  661. DEFAULT_BUCKET_ID: CODE_CORRUPTION
  662.  
  663. PROCESS_NAME: System
  664.  
  665. CURRENT_IRQL: 0
  666. ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
  667. EXCEPTION_CODE_STR: c0000005
  668. EXCEPTION_PARAMETER1: 0000000000000000
  669. EXCEPTION_PARAMETER2: 00000000046dc232
  670. FOLLOWUP_IP:
  671. nt!IovpValidateDeviceObject+5
  672. fffff800`4a5edc25 66833903 cmp word ptr [rcx],3
  673. READ_ADDRESS: fffff8004a26e358: Unable to get MiVisibleState
  674. 00000000046dc232
  675. BUGCHECK_STR: AV
  676. LOCK_ADDRESS: fffff8004a1f1f80 -- (!locks fffff8004a1f1f80)
  677. Resource @ nt!PiEngineLock (0xfffff8004a1f1f80) Available
  678. WARNING: SystemResourcesList->Flink chain invalid. Resource may be corrupted, or already deleted.
  679. WARNING: SystemResourcesList->Blink chain invalid. Resource may be corrupted, or already deleted.
  680. 1 total locks
  681. PNP_TRIAGE:
  682. Lock address : 0xfffff8004a1f1f80
  683. Thread Count : 0
  684. Thread address: 0x0000000000000000
  685. Thread wait : 0x0
  686. LAST_CONTROL_TRANSFER: from fffff8004a5ecfa4 to fffff8004a5edc25
  687. STACK_TEXT:
  688. ffffc100`a1946018 fffff800`4a5ecfa4 : ffffd404`faaced80 00000000`00000000 ffffd404`faacee98 ffffd50b`a9bb3f40 : nt!IovpValidateDeviceObject+0x5
  689. ffffc100`a1946020 fffff803`e6cd7c49 : ffffd50b`a969a490 ffffc100`a1946110 ffffd50b`a9903150 ffffd50b`a9bb74f0 : nt!IovCallDriver+0x14c
  690. ffffc100`a1946060 fffff800`4a5fa741 : 00000000`00000000 fffff800`4a5fd5b4 ffffd404`faaceee0 ffffd50b`a9c491b0 : VerifierExt!IofCallDriver_internal_wrapper+0x19
  691. ffffc100`a19460a0 fffff803`e6ce1657 : ffffd50b`a969a490 ffffd404`faaceee0 00000000`00000000 fffff800`4a5f8870 : nt!VerifierIofCallDriver+0x21
  692. ffffc100`a19460e0 fffff800`4a5ed09d : ffffd404`faaced80 ffffd50b`a969a490 00000000`00000000 ffffc100`a1946158 : VerifierExt!xdv_IRP_MJ_SYSTEM_CONTROL_wrapper+0xc7
  693. ffffc100`a1946130 fffff800`4a0227ad : ffffd404`faaced80 00000000`00000000 00000000`00000000 ffffd50b`a9bb3f40 : nt!IovCallDriver+0x245
  694. ffffc100`a1946170 fffff800`4a60ab5b : ffffd404`faaced80 00000000`00000000 ffffd50b`a9c7e4d0 ffffd404`00000000 : nt!IofCallDriver+0x134f9d
  695. ffffc100`a19461b0 fffff800`4a5ed09d : ffffd50b`a9c7e620 ffffd404`faaced80 00000000`00000000 00001f80`01089390 : nt!ViFilterDispatchGeneric+0xbb
  696. ffffc100`a19461f0 fffff803`e6cd7c49 : ffffd404`faaced80 00000000`00000017 ffffd50b`a9c49060 ffffd50b`a90b47e0 : nt!IovCallDriver+0x245
  697. ffffc100`a1946230 fffff800`4a5fa741 : fffff803`e6cde657 fffff800`4a5ed09d fffff803`e75d05d8 fffff803`e75d137d : VerifierExt!IofCallDriver_internal_wrapper+0x19
  698. ffffc100`a1946270 fffff803`e903666a : fffff803`e905af14 00000000`00000000 00000000`00000000 fffff800`4a5fd2db : nt!VerifierIofCallDriver+0x21
  699. ffffc100`a19462b0 fffff803`e903fd9a : 00000000`00000000 00000000`00000000 ffffd404`faaced80 ffffd50b`a9c491d0 : HIDCLASS!HidpCallDriver+0x7a
  700. ffffc100`a1946310 fffff803`e905af22 : ffffd50b`a9c491b0 ffffd50b`a9c7e4d0 ffffd404`faacef28 ffffc100`a19463a0 : HIDCLASS!HidpIrpMajorDefault+0xfa
  701. ffffc100`a1946370 fffff803`e903214f : ffffd404`00000002 00000000`00000017 ffffd404`faaced80 ffffd50b`a9903240 : HIDCLASS!HidpIrpMajorSystemControl+0x2352
  702. ffffc100`a19463a0 fffff803`e6ce1657 : ffffd50b`a9c49060 ffffc100`a1946460 ffffd404`faaced80 fffff800`4a5f8870 : HIDCLASS!HidpMajorHandler+0x21f
  703. ffffc100`a1946430 fffff800`4a5ed09d : ffffd404`faaced80 ffffd50b`a9c49060 00000000`00000000 ffffc100`a19464a8 : VerifierExt!xdv_IRP_MJ_SYSTEM_CONTROL_wrapper+0xc7
  704. ffffc100`a1946480 fffff800`4a0227ad : ffffd404`faaced80 00000000`00000000 00000000`00000000 ffffd50b`a9b24d00 : nt!IovCallDriver+0x245
  705. ffffc100`a19464c0 fffff800`4a60ab5b : ffffd404`faaced80 00000000`00000000 ffffd50b`a9c49a30 ffffd404`00000001 : nt!IofCallDriver+0x134f9d
  706. ffffc100`a1946500 fffff800`4a5ed09d : ffffd50b`a9c49b80 ffffd404`faaced80 ffffd404`faaced00 fffff800`4a606313 : nt!ViFilterDispatchGeneric+0xbb
  707. ffffc100`a1946540 fffff800`4a0227ad : ffffd404`faaced80 ffffd50b`a9c49a30 00000000`00000002 ffffd50b`a92fe2f0 : nt!IovCallDriver+0x245
  708. ffffc100`a1946580 fffff800`4a5f8cc9 : ffffd50b`a969a490 ffffd50b`a9c49a30 00000000`00000000 00000000`00000000 : nt!IofCallDriver+0x134f9d
  709. ffffc100`a19465c0 fffff800`4a608c2a : ffffd50b`a969a490 ffffc100`a1946779 00000000`00000001 ffffd50b`a969a490 : nt!VfIrpSendSynchronousIrp+0x109
  710. ffffc100`a1946630 fffff800`4a5fd459 : 00000000`00000000 ffffc100`a1946779 00000000`00000001 ffffd50b`a969a490 : nt!VfWmiTestStartedPdoStack+0x5a
  711. ffffc100`a19466d0 fffff800`4a375394 : 00000000`00000000 ffffc100`a1946779 00000000`00000001 ffffc100`a1946779 : nt!VfMajorTestStartedPdoStack+0x59
  712. ffffc100`a1946700 fffff800`4a2c38ed : ffffd50b`a9c0b250 ffffc100`00000001 00000000`00000000 00000000`00000000 : nt!PipProcessStartPhase3+0xb8
  713. ffffc100`a19467e0 fffff800`4a37442f : ffffd50b`a995ebb0 ffffc100`a1946b19 00000000`00000010 fffff800`4a374384 : nt!PipProcessDevNodeTree+0x3d1
  714. ffffc100`a1946a60 fffff800`49f5f8f3 : ffffd501`00000003 00000000`00000000 ffffd50b`a995ebb0 ffffd50b`a995ebb0 : nt!PiProcessReenumeration+0xab
  715. ffffc100`a1946ab0 fffff800`49ecaca8 : ffffd50b`a5366040 fffff800`4a1f0a20 fffff800`4a285380 ffffd50b`a984d040 : nt!PnpDeviceActionWorker+0x1b3
  716. ffffc100`a1946b80 fffff800`49f69ac7 : 00000000`00000000 00000000`00000080 ffffd50b`a405d680 ffffd50b`a5366040 : nt!ExpWorkerThread+0xd8
  717. ffffc100`a1946c10 fffff800`49ffe946 : ffffc100`a14a0180 ffffd50b`a5366040 fffff800`49f69a80 00000000`00000000 : nt!PspSystemThreadStartup+0x47
  718. ffffc100`a1946c60 00000000`00000000 : ffffc100`a1947000 ffffc100`a1941000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
  719. CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
  720. fffff80049f1ad27-fffff80049f1ad28 2 bytes - nt!MiResolvePageTablePage+3b7
  721. [ ff f6:7f fc ]
  722. fffff80049f1ad48-fffff80049f1ad4c 5 bytes - nt!MiResolvePageTablePage+3d8 (+0x21)
  723. [ df be 7d fb f6:8f 1f 3f 7e fc ]
  724. fffff80049f20122-fffff80049f20124 3 bytes - nt!MiCompleteProtoPteFault+242 (+0x53da)
  725. [ 40 fb f6:00 7e fc ]
  726. fffff80049f22816-fffff80049f22817 2 bytes - nt!MiPfnShareCountIsZero+186 (+0x26f4)
  727. [ 80 f6:00 fc ]
  728. fffff80049f3c8bc - nt!MiInitializeTransitionPfn+28 (+0x1a0a6)
  729. [ fa:f3 ]
  730. 13 errors : !nt (fffff80049f1ad27-fffff80049f3c8bc)
  731. MODULE_NAME: memory_corruption
  732.  
  733. IMAGE_NAME: memory_corruption
  734.  
  735. FOLLOWUP_NAME: memory_corruption
  736. DEBUG_FLR_IMAGE_TIMESTAMP: 0
  737. MEMORY_CORRUPTOR: LARGE
  738. STACK_COMMAND: .cxr 0xffffc100a1945620 ; kb
  739. FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
  740. BUCKET_ID: MEMORY_CORRUPTION_LARGE
  741. PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
  742. TARGET_TIME: 2017-07-29T20:55:10.000Z
  743. OSBUILD: 15063
  744. OSSERVICEPACK: 483
  745. SERVICEPACK_NUMBER: 0
  746. OS_REVISION: 0
  747. SUITE_MASK: 784
  748. PRODUCT_TYPE: 1
  749. OSPLATFORM_TYPE: x64
  750. OSNAME: Windows 10
  751. OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
  752. USER_LCID: 0
  753. OSBUILD_TIMESTAMP: 2017-07-07 02:06:35
  754. BUILDDATESTAMP_STR: 160101.0800
  755. BUILDLAB_STR: WinBuild
  756. BUILDOSVER_STR: 10.0.15063.483
  757. ANALYSIS_SESSION_ELAPSED_TIME: 2f8c
  758. ANALYSIS_SOURCE: KM
  759. FAILURE_ID_HASH_STRING: km:memory_corruption_large
  760. FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
  761. Followup: memory_corruption
  762.  
  763. ========================================================================
  764. =================== Dump File: 072917-8421-01.dmp ====================
  765. ========================================================================
  766. Mini Kernel Dump File: Only registers and stack trace are available
  767. Windows 10 Kernel Version 15063 MP (4 procs) Free x64
  768. Product: WinNt, suite: TerminalServer SingleUserTS Personal
  769. Built by: 15063.0.amd64fre.rs2_release.170317-1834
  770. Kernel base = 0xfffff800`ad295000 PsLoadedModuleList = 0xfffff800`ad5e15e0
  771. Debug session time: Sat Jul 29 16:48:56.084 2017 (UTC - 4:00)
  772. System Uptime: 0 days 0:00:44.803
  773.  
  774. BugCheck 1000007E, {ffffffffc0000005, fffff800ad9f5c25, ffffe4805e3b3dd8, ffffe4805e3b3620}
  775. *** WARNING: Unable to verify timestamp for win32k.sys
  776. *** ERROR: Module load completed but symbols could not be loaded for win32k.sys
  777. Probably caused by : memory_corruption
  778. Followup: memory_corruption
  779.  
  780. SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
  781. This is a very common bugcheck. Usually the exception address pinpoints
  782. the driver/function that caused the problem. Always note this address
  783. as well as the link date of the driver/image that contains this address.
  784. Some common problems are exception code 0x80000003. This means a hard
  785. coded breakpoint or assertion was hit, but this system was booted
  786. /NODEBUG. This is not supposed to happen as developers should never have
  787. hardcoded breakpoints in retail code, but ...
  788. If this happens, make sure a debugger gets connected, and the
  789. system is booted /DEBUG. This will let us see why this breakpoint is
  790. happening.
  791.  
  792. Arguments:
  793. Arg1: ffffffffc0000005, The exception code that was not handled
  794. Arg2: fffff800ad9f5c25, The address that the exception occurred at
  795. Arg3: ffffe4805e3b3dd8, Exception Record Address
  796. Arg4: ffffe4805e3b3620, Context Record Address
  797.  
  798. Debugging Details:
  799. DUMP_CLASS: 1
  800. DUMP_QUALIFIER: 400
  801. BUILD_VERSION_STRING: 10.0.15063.483 (WinBuild.160101.0800)
  802. DUMP_TYPE: 2
  803. EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
  804. FAULTING_IP:
  805. nt!IovpValidateDeviceObject+5
  806. fffff800`ad9f5c25 66833903 cmp word ptr [rcx],3
  807. EXCEPTION_RECORD: ffffe4805e3b3dd8 -- (.exr 0xffffe4805e3b3dd8)
  808. ExceptionAddress: fffff800ad9f5c25 (nt!IovpValidateDeviceObject+0x0000000000000005)
  809. ExceptionCode: c0000005 (Access violation)
  810. ExceptionFlags: 00000000
  811. NumberParameters: 2
  812. Parameter[0]: 0000000000000000
  813. Parameter[1]: 00000000046dc232
  814. Attempt to read from address 00000000046dc232
  815. CONTEXT: ffffe4805e3b3620 -- (.cxr 0xffffe4805e3b3620)
  816. rax=ffffe38658a16d80 rbx=ffffe38658a16d80 rcx=00000000046dc232
  817. rdx=0000000000000000 rsi=00000000046dc232 rdi=ffff9488e18d82b0
  818. rip=fffff800ad9f5c25 rsp=ffffe4805e3b4018 rbp=fffff80731b41657
  819. r8=0000000000000000 r9=0000000000000000 r10=0000000000000000
  820. r11=0000000000000000 r12=0000000000180000 r13=fffff8073243a488
  821. r14=0000000000000000 r15=ffff9488e1a777f0
  822. iopl=0 nv up ei pl nz na pe nc
  823. cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202
  824. nt!IovpValidateDeviceObject+0x5:
  825. fffff800`ad9f5c25 66833903 cmp word ptr [rcx],3 ds:002b:00000000`046dc232=????
  826. Resetting default scope
  827. CPU_COUNT: 4
  828. CPU_MHZ: c15
  829. CPU_VENDOR: GenuineIntel
  830. CPU_FAMILY: 6
  831. CPU_MODEL: 2a
  832. CPU_STEPPING: 7
  833. CUSTOMER_CRASH_COUNT: 1
  834. DEFAULT_BUCKET_ID: CODE_CORRUPTION
  835.  
  836. PROCESS_NAME: System
  837.  
  838. CURRENT_IRQL: 0
  839. ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
  840. EXCEPTION_CODE_STR: c0000005
  841. EXCEPTION_PARAMETER1: 0000000000000000
  842. EXCEPTION_PARAMETER2: 00000000046dc232
  843. FOLLOWUP_IP:
  844. nt!IovpValidateDeviceObject+5
  845. fffff800`ad9f5c25 66833903 cmp word ptr [rcx],3
  846. READ_ADDRESS: fffff800ad676358: Unable to get MiVisibleState
  847. 00000000046dc232
  848. BUGCHECK_STR: AV
  849. LOCK_ADDRESS: fffff800ad5f9f80 -- (!locks fffff800ad5f9f80)
  850. Resource @ nt!PiEngineLock (0xfffff800ad5f9f80) Available
  851. WARNING: SystemResourcesList->Flink chain invalid. Resource may be corrupted, or already deleted.
  852. WARNING: SystemResourcesList->Blink chain invalid. Resource may be corrupted, or already deleted.
  853. 1 total locks
  854. PNP_TRIAGE:
  855. Lock address : 0xfffff800ad5f9f80
  856. Thread Count : 0
  857. Thread address: 0x0000000000000000
  858. Thread wait : 0x0
  859. LAST_CONTROL_TRANSFER: from fffff800ad9f4fa4 to fffff800ad9f5c25
  860. STACK_TEXT:
  861. ffffe480`5e3b4018 fffff800`ad9f4fa4 : ffffe386`58a16d80 00000000`00000000 ffffe386`58a16e98 ffff9488`e09b5f40 : nt!IovpValidateDeviceObject+0x5
  862. ffffe480`5e3b4020 fffff807`31b37c49 : ffff9488`e1a749b0 ffffe480`5e3b4110 ffff9488`df6d1150 ffff9488`e18d82b0 : nt!IovCallDriver+0x14c
  863. ffffe480`5e3b4060 fffff800`ada02741 : 00000000`00000000 fffff800`ada055b4 ffffe386`58a16ee0 ffff9488`e1a777f0 : VerifierExt!IofCallDriver_internal_wrapper+0x19
  864. ffffe480`5e3b40a0 fffff807`31b41657 : ffff9488`e1a749b0 ffffe386`58a16ee0 00000000`00000000 fffff800`ada00870 : nt!VerifierIofCallDriver+0x21
  865. ffffe480`5e3b40e0 fffff800`ad9f509d : ffffe386`58a16d80 ffff9488`e1a749b0 00000000`00000000 ffffe480`5e3b4158 : VerifierExt!xdv_IRP_MJ_SYSTEM_CONTROL_wrapper+0xc7
  866. ffffe480`5e3b4130 fffff800`ad42a7ad : ffffe386`58a16d80 00000000`00000000 00000000`00000000 ffff9488`e09b5f40 : nt!IovCallDriver+0x245
  867. ffffe480`5e3b4170 fffff800`ada12b5b : ffffe386`58a16d80 00000000`00000000 ffff9488`e1a61540 ffffe386`00000000 : nt!IofCallDriver+0x134f9d
  868. ffffe480`5e3b41b0 fffff800`ad9f509d : ffff9488`e1a61690 ffffe386`58a16d80 00000000`00000006 ffff9488`e1a779d0 : nt!ViFilterDispatchGeneric+0xbb
  869. ffffe480`5e3b41f0 fffff807`31b37c49 : ffffe386`58a16d80 00000000`00000017 00000000`c00000bb ffff9488`e1355660 : nt!IovCallDriver+0x245
  870. ffffe480`5e3b4230 fffff800`ada02741 : fffff807`34cb05d8 fffff807`34cb137d 00000000`00000000 00000000`00000000 : VerifierExt!IofCallDriver_internal_wrapper+0x19
  871. ffffe480`5e3b4270 fffff807`3242666a : 00000000`00000000 00000000`00000000 00000000`00000000 fffff800`ada052db : nt!VerifierIofCallDriver+0x21
  872. ffffe480`5e3b42b0 fffff807`3242fd9a : 00000000`00000000 00000000`00000000 ffffe386`58a16d80 ffff9488`e1a77810 : HIDCLASS!HidpCallDriver+0x7a
  873. ffffe480`5e3b4310 fffff807`3244af22 : ffff9488`e1a777f0 ffff9488`e1a61540 ffffe386`58a16f28 ffffe480`5e3b43a0 : HIDCLASS!HidpIrpMajorDefault+0xfa
  874. ffffe480`5e3b4370 fffff807`3242214f : ffffe386`00000002 00000000`00000017 ffffe386`58a16d80 ffff9488`df6d1240 : HIDCLASS!HidpIrpMajorSystemControl+0x2352
  875. ffffe480`5e3b43a0 fffff807`31b41657 : ffff9488`e1a776a0 ffffe480`5e3b4460 ffffe386`58a16d80 fffff800`ada00870 : HIDCLASS!HidpMajorHandler+0x21f
  876. ffffe480`5e3b4430 fffff800`ad9f509d : ffffe386`58a16d80 ffff9488`e1a776a0 00000000`00000000 ffffe480`5e3b44a8 : VerifierExt!xdv_IRP_MJ_SYSTEM_CONTROL_wrapper+0xc7
  877. ffffe480`5e3b4480 fffff800`ad42a7ad : ffffe386`58a16d80 00000000`00000000 00000000`00000000 ffff9488`e177c980 : nt!IovCallDriver+0x245
  878. ffffe480`5e3b44c0 fffff800`ada12b5b : ffffe386`58a16d80 00000000`00000000 ffff9488`e1a77420 ffffe386`00000001 : nt!IofCallDriver+0x134f9d
  879. ffffe480`5e3b4500 fffff800`ad9f509d : ffff9488`e1a77570 ffffe386`58a16d80 ffffe386`58a16d00 fffff800`ada0e313 : nt!ViFilterDispatchGeneric+0xbb
  880. ffffe480`5e3b4540 fffff800`ad42a7ad : ffffe386`58a16d80 ffff9488`e1a77420 00000000`00000002 ffff9488`e19fcf40 : nt!IovCallDriver+0x245
  881. ffffe480`5e3b4580 fffff800`ada00cc9 : ffff9488`e1a749b0 ffff9488`e1a77420 00000000`00000000 00000000`00000000 : nt!IofCallDriver+0x134f9d
  882. ffffe480`5e3b45c0 fffff800`ada10c2a : ffff9488`e1a749b0 ffffe480`5e3b4779 00000000`00000001 ffff9488`e1a749b0 : nt!VfIrpSendSynchronousIrp+0x109
  883. ffffe480`5e3b4630 fffff800`ada05459 : 00000000`00000000 ffffe480`5e3b4779 00000000`00000001 ffff9488`e1a749b0 : nt!VfWmiTestStartedPdoStack+0x5a
  884. ffffe480`5e3b46d0 fffff800`ad77d394 : 00000000`00000000 ffffe480`5e3b4779 00000000`00000001 ffffe480`5e3b4779 : nt!VfMajorTestStartedPdoStack+0x59
  885. ffffe480`5e3b4700 fffff800`ad6cb8ed : ffff9488`e1a6b010 ffffe480`00000001 00000000`00000000 00000000`00000000 : nt!PipProcessStartPhase3+0xb8
  886. ffffe480`5e3b47e0 fffff800`ad77c42f : ffff9488`e18ee1e0 ffffe480`5e3b4b19 00000000`00000010 fffff800`ad77c384 : nt!PipProcessDevNodeTree+0x3d1
  887. ffffe480`5e3b4a60 fffff800`ad3678f3 : ffff9401`00000003 00000000`00000000 ffff9488`e18ee1e0 ffff9488`e18ee1e0 : nt!PiProcessReenumeration+0xab
  888. ffffe480`5e3b4ab0 fffff800`ad2d2ca8 : ffff9488`dc1e7040 fffff800`ad5f8a20 fffff800`ad68d380 fffff800`ad68d380 : nt!PnpDeviceActionWorker+0x1b3
  889. ffffe480`5e3b4b80 fffff800`ad371ac7 : 00000000`00000000 00000000`00000080 ffff9488`dc05d680 ffff9488`dc1e7040 : nt!ExpWorkerThread+0xd8
  890. ffffe480`5e3b4c10 fffff800`ad406946 : ffffe480`5e890180 ffff9488`dc1e7040 fffff800`ad371a80 00000000`00000000 : nt!PspSystemThreadStartup+0x47
  891. ffffe480`5e3b4c60 00000000`00000000 : ffffe480`5e3b5000 ffffe480`5e3af000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
  892. CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
  893. fffff800ad322d28 - nt!MiResolvePageTablePage+3b8
  894. [ f6:f8 ]
  895. fffff800ad322d48-fffff800ad322d4c 5 bytes - nt!MiResolvePageTablePage+3d8 (+0x20)
  896. [ df be 7d fb f6:1f 3f 7e fc f8 ]
  897. fffff800ad32a817 - nt!MiPfnShareCountIsZero+187 (+0x7acf)
  898. [ f6:f8 ]
  899. fffff800ad3448bc - nt!MiInitializeTransitionPfn+28 (+0x1a0a5)
  900. [ fa:a5 ]
  901. 8 errors : !nt (fffff800ad322d28-fffff800ad3448bc)
  902. MODULE_NAME: memory_corruption
  903.  
  904. IMAGE_NAME: memory_corruption
  905.  
  906. FOLLOWUP_NAME: memory_corruption
  907. DEBUG_FLR_IMAGE_TIMESTAMP: 0
  908. MEMORY_CORRUPTOR: LARGE
  909. STACK_COMMAND: .cxr 0xffffe4805e3b3620 ; kb
  910. FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
  911. BUCKET_ID: MEMORY_CORRUPTION_LARGE
  912. PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
  913. TARGET_TIME: 2017-07-29T20:48:56.000Z
  914. OSBUILD: 15063
  915. OSSERVICEPACK: 483
  916. SERVICEPACK_NUMBER: 0
  917. OS_REVISION: 0
  918. SUITE_MASK: 784
  919. PRODUCT_TYPE: 1
  920. OSPLATFORM_TYPE: x64
  921. OSNAME: Windows 10
  922. OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
  923. USER_LCID: 0
  924. OSBUILD_TIMESTAMP: 2017-07-07 02:06:35
  925. BUILDDATESTAMP_STR: 160101.0800
  926. BUILDLAB_STR: WinBuild
  927. BUILDOSVER_STR: 10.0.15063.483
  928. ANALYSIS_SESSION_ELAPSED_TIME: 2ebc
  929. ANALYSIS_SOURCE: KM
  930. FAILURE_ID_HASH_STRING: km:memory_corruption_large
  931. FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
  932. Followup: memory_corruption
  933.  
  934. ========================================================================
  935. =================== Dump File: 072917-8546-01.dmp ====================
  936. ========================================================================
  937. Mini Kernel Dump File: Only registers and stack trace are available
  938. Windows 10 Kernel Version 15063 MP (4 procs) Free x64
  939. Product: WinNt, suite: TerminalServer SingleUserTS Personal
  940. Built by: 15063.0.amd64fre.rs2_release.170317-1834
  941. Kernel base = 0xfffff800`65616000 PsLoadedModuleList = 0xfffff800`659625e0
  942. Debug session time: Sat Jul 29 17:01:48.829 2017 (UTC - 4:00)
  943. System Uptime: 0 days 0:00:46.546
  944.  
  945. BugCheck 1000007E, {ffffffffc0000005, fffff80065d76c25, ffffb7013f1aedd8, ffffb7013f1ae620}
  946. *** WARNING: Unable to verify timestamp for win32k.sys
  947. *** ERROR: Module load completed but symbols could not be loaded for win32k.sys
  948. Probably caused by : memory_corruption
  949. Followup: memory_corruption
  950.  
  951. SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
  952. This is a very common bugcheck. Usually the exception address pinpoints
  953. the driver/function that caused the problem. Always note this address
  954. as well as the link date of the driver/image that contains this address.
  955. Some common problems are exception code 0x80000003. This means a hard
  956. coded breakpoint or assertion was hit, but this system was booted
  957. /NODEBUG. This is not supposed to happen as developers should never have
  958. hardcoded breakpoints in retail code, but ...
  959. If this happens, make sure a debugger gets connected, and the
  960. system is booted /DEBUG. This will let us see why this breakpoint is
  961. happening.
  962.  
  963. Arguments:
  964. Arg1: ffffffffc0000005, The exception code that was not handled
  965. Arg2: fffff80065d76c25, The address that the exception occurred at
  966. Arg3: ffffb7013f1aedd8, Exception Record Address
  967. Arg4: ffffb7013f1ae620, Context Record Address
  968.  
  969. Debugging Details:
  970. DUMP_CLASS: 1
  971. DUMP_QUALIFIER: 400
  972. BUILD_VERSION_STRING: 10.0.15063.483 (WinBuild.160101.0800)
  973. DUMP_TYPE: 2
  974. EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
  975. FAULTING_IP:
  976. nt!IovpValidateDeviceObject+5
  977. fffff800`65d76c25 66833903 cmp word ptr [rcx],3
  978. EXCEPTION_RECORD: ffffb7013f1aedd8 -- (.exr 0xffffb7013f1aedd8)
  979. ExceptionAddress: fffff80065d76c25 (nt!IovpValidateDeviceObject+0x0000000000000005)
  980. ExceptionCode: c0000005 (Access violation)
  981. ExceptionFlags: 00000000
  982. NumberParameters: 2
  983. Parameter[0]: 0000000000000000
  984. Parameter[1]: 00000000046dc232
  985. Attempt to read from address 00000000046dc232
  986. CONTEXT: ffffb7013f1ae620 -- (.cxr 0xffffb7013f1ae620)
  987. rax=fffff60eca25ad80 rbx=fffff60eca25ad80 rcx=00000000046dc232
  988. rdx=0000000000000000 rsi=00000000046dc232 rdi=ffffa60b19586b30
  989. rip=fffff80065d76c25 rsp=ffffb7013f1af018 rbp=fffff80a35471657
  990. r8=0000000000000000 r9=0000000000000000 r10=0000000000000000
  991. r11=0000000000000000 r12=0000000000180000 r13=fffff80a3792a488
  992. r14=0000000000000000 r15=ffffa60b195aa7f0
  993. iopl=0 nv up ei pl nz na pe nc
  994. cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202
  995. nt!IovpValidateDeviceObject+0x5:
  996. fffff800`65d76c25 66833903 cmp word ptr [rcx],3 ds:002b:00000000`046dc232=????
  997. Resetting default scope
  998. CPU_COUNT: 4
  999. CPU_MHZ: c15
  1000. CPU_VENDOR: GenuineIntel
  1001. CPU_FAMILY: 6
  1002. CPU_MODEL: 2a
  1003. CPU_STEPPING: 7
  1004. CUSTOMER_CRASH_COUNT: 1
  1005. DEFAULT_BUCKET_ID: CODE_CORRUPTION
  1006.  
  1007. PROCESS_NAME: System
  1008.  
  1009. CURRENT_IRQL: 0
  1010. ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
  1011. EXCEPTION_CODE_STR: c0000005
  1012. EXCEPTION_PARAMETER1: 0000000000000000
  1013. EXCEPTION_PARAMETER2: 00000000046dc232
  1014. FOLLOWUP_IP:
  1015. nt!IovpValidateDeviceObject+5
  1016. fffff800`65d76c25 66833903 cmp word ptr [rcx],3
  1017. READ_ADDRESS: fffff800659f7358: Unable to get MiVisibleState
  1018. 00000000046dc232
  1019. BUGCHECK_STR: AV
  1020. LOCK_ADDRESS: fffff8006597af80 -- (!locks fffff8006597af80)
  1021. Resource @ nt!PiEngineLock (0xfffff8006597af80) Available
  1022. WARNING: SystemResourcesList->Flink chain invalid. Resource may be corrupted, or already deleted.
  1023. WARNING: SystemResourcesList->Blink chain invalid. Resource may be corrupted, or already deleted.
  1024. 1 total locks
  1025. PNP_TRIAGE:
  1026. Lock address : 0xfffff8006597af80
  1027. Thread Count : 0
  1028. Thread address: 0x0000000000000000
  1029. Thread wait : 0x0
  1030. LAST_CONTROL_TRANSFER: from fffff80065d75fa4 to fffff80065d76c25
  1031. STACK_TEXT:
  1032. ffffb701`3f1af018 fffff800`65d75fa4 : fffff60e`ca25ad80 00000000`00000000 fffff60e`ca25ae98 ffffa60b`182044b0 : nt!IovpValidateDeviceObject+0x5
  1033. ffffb701`3f1af020 fffff80a`35467c49 : ffffa60b`19524a50 ffffb701`3f1af110 ffffa60b`19347150 ffffa60b`19586b30 : nt!IovCallDriver+0x14c
  1034. ffffb701`3f1af060 fffff800`65d83741 : 00000000`00000000 fffff800`65d865b4 fffff60e`ca25aee0 ffffa60b`195aa7f0 : VerifierExt!IofCallDriver_internal_wrapper+0x19
  1035. ffffb701`3f1af0a0 fffff80a`35471657 : ffffa60b`19524a50 fffff60e`ca25aee0 00000000`00000000 fffff800`65d81870 : nt!VerifierIofCallDriver+0x21
  1036. ffffb701`3f1af0e0 fffff800`65d7609d : fffff60e`ca25ad80 ffffa60b`19524a50 00000000`00000000 ffffb701`3f1af158 : VerifierExt!xdv_IRP_MJ_SYSTEM_CONTROL_wrapper+0xc7
  1037. ffffb701`3f1af130 fffff800`657ab7ad : fffff60e`ca25ad80 00000000`00000000 00000000`00000000 ffffa60b`182044b0 : nt!IovCallDriver+0x245
  1038. ffffb701`3f1af170 fffff800`65d93b5b : fffff60e`ca25ad80 00000000`00000000 ffffa60b`19547500 fffff60e`00000000 : nt!IofCallDriver+0x134f9d
  1039. ffffb701`3f1af1b0 fffff800`65d7609d : ffffa60b`19547650 fffff60e`ca25ad80 00000000`00000000 00001f80`0108a9d0 : nt!ViFilterDispatchGeneric+0xbb
  1040. ffffb701`3f1af1f0 fffff80a`35467c49 : fffff60e`ca25ad80 00000000`00000017 ffffa60b`195aa6a0 ffffa60b`1812d780 : nt!IovCallDriver+0x245
  1041. ffffb701`3f1af230 fffff800`65d83741 : fffff80a`3546e657 fffff800`649106ac 00000000`00000010 00000000`00000282 : VerifierExt!IofCallDriver_internal_wrapper+0x19
  1042. ffffb701`3f1af270 fffff80a`3791666a : fffff80a`3793af14 00000000`00000000 00000000`00000000 fffff800`65d862db : nt!VerifierIofCallDriver+0x21
  1043. ffffb701`3f1af2b0 fffff80a`3791fd9a : 00000000`00000000 00000000`00000000 fffff60e`ca25ad80 ffffa60b`195aa810 : HIDCLASS!HidpCallDriver+0x7a
  1044. ffffb701`3f1af310 fffff80a`3793af22 : ffffa60b`195aa7f0 ffffa60b`19547500 fffff60e`ca25af28 ffffb701`3f1af3a0 : HIDCLASS!HidpIrpMajorDefault+0xfa
  1045. ffffb701`3f1af370 fffff80a`3791214f : fffff60e`00000002 00000000`00000017 fffff60e`ca25ad80 ffffa60b`19347240 : HIDCLASS!HidpIrpMajorSystemControl+0x2352
  1046. ffffb701`3f1af3a0 fffff80a`35471657 : ffffa60b`195aa6a0 ffffb701`3f1af460 fffff60e`ca25ad80 fffff800`65d81870 : HIDCLASS!HidpMajorHandler+0x21f
  1047. ffffb701`3f1af430 fffff800`65d7609d : fffff60e`ca25ad80 ffffa60b`195aa6a0 00000000`00000000 ffffb701`3f1af4a8 : VerifierExt!xdv_IRP_MJ_SYSTEM_CONTROL_wrapper+0xc7
  1048. ffffb701`3f1af480 fffff800`657ab7ad : fffff60e`ca25ad80 00000000`00000000 00000000`00000000 ffffa60b`1960f0a0 : nt!IovCallDriver+0x245
  1049. ffffb701`3f1af4c0 fffff800`65d93b5b : fffff60e`ca25ad80 00000000`00000000 ffffa60b`195aa420 fffff60e`00000001 : nt!IofCallDriver+0x134f9d
  1050. ffffb701`3f1af500 fffff800`65d7609d : ffffa60b`195aa570 fffff60e`ca25ad80 fffff60e`ca25ad00 fffff800`65d8f313 : nt!ViFilterDispatchGeneric+0xbb
  1051. ffffb701`3f1af540 fffff800`657ab7ad : fffff60e`ca25ad80 ffffa60b`195aa420 00000000`00000002 ffffa60b`196057c0 : nt!IovCallDriver+0x245
  1052. ffffb701`3f1af580 fffff800`65d81cc9 : ffffa60b`19524a50 ffffa60b`195aa420 00000000`00000000 00000000`00000000 : nt!IofCallDriver+0x134f9d
  1053. ffffb701`3f1af5c0 fffff800`65d91c2a : ffffa60b`19524a50 ffffb701`3f1af779 00000000`00000001 ffffa60b`19524a50 : nt!VfIrpSendSynchronousIrp+0x109
  1054. ffffb701`3f1af630 fffff800`65d86459 : 00000000`00000000 ffffb701`3f1af779 00000000`00000001 ffffa60b`19524a50 : nt!VfWmiTestStartedPdoStack+0x5a
  1055. ffffb701`3f1af6d0 fffff800`65afe394 : 00000000`00000000 ffffb701`3f1af779 00000000`00000001 ffffb701`3f1af779 : nt!VfMajorTestStartedPdoStack+0x59
  1056. ffffb701`3f1af700 fffff800`65a4c8ed : ffffa60b`18c81d30 ffffb701`00000001 00000000`00000000 00000000`00000000 : nt!PipProcessStartPhase3+0xb8
  1057. ffffb701`3f1af7e0 fffff800`65afd42f : ffffa60b`195d81c0 ffffb701`3f1afb19 00000000`00000010 fffff800`65afd384 : nt!PipProcessDevNodeTree+0x3d1
  1058. ffffb701`3f1afa60 fffff800`656e88f3 : ffffa601`00000003 00000000`00000000 ffffa60b`195d81c0 ffffa60b`195d81c0 : nt!PiProcessReenumeration+0xab
  1059. ffffb701`3f1afab0 fffff800`65653ca8 : ffffa60b`1957d040 fffff800`65979a20 fffff800`65a0e380 fffff800`65a0e380 : nt!PnpDeviceActionWorker+0x1b3
  1060. ffffb701`3f1afb80 fffff800`656f2ac7 : ffffb701`39420180 00000000`00000080 ffffa60b`13a6d040 ffffa60b`1957d040 : nt!ExpWorkerThread+0xd8
  1061. ffffb701`3f1afc10 fffff800`65787946 : ffffb701`39420180 ffffa60b`1957d040 fffff800`656f2a80 81818181`81818181 : nt!PspSystemThreadStartup+0x47
  1062. ffffb701`3f1afc60 00000000`00000000 : ffffb701`3f1b0000 ffffb701`3f1aa000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
  1063. CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
  1064. fffff800656a3d28 - nt!MiResolvePageTablePage+3b8
  1065. [ f6:81 ]
  1066. fffff800656a3d48-fffff800656a3d4c 5 bytes - nt!MiResolvePageTablePage+3d8 (+0x20)
  1067. [ df be 7d fb f6:3f 70 e0 c0 81 ]
  1068. fffff800656ab817 - nt!MiPfnShareCountIsZero+187 (+0x7acf)
  1069. [ f6:81 ]
  1070. 7 errors : !nt (fffff800656a3d28-fffff800656ab817)
  1071. MODULE_NAME: memory_corruption
  1072.  
  1073. IMAGE_NAME: memory_corruption
  1074.  
  1075. FOLLOWUP_NAME: memory_corruption
  1076. DEBUG_FLR_IMAGE_TIMESTAMP: 0
  1077. MEMORY_CORRUPTOR: LARGE
  1078. STACK_COMMAND: .cxr 0xffffb7013f1ae620 ; kb
  1079. FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
  1080. BUCKET_ID: MEMORY_CORRUPTION_LARGE
  1081. PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
  1082. TARGET_TIME: 2017-07-29T21:01:48.000Z
  1083. OSBUILD: 15063
  1084. OSSERVICEPACK: 483
  1085. SERVICEPACK_NUMBER: 0
  1086. OS_REVISION: 0
  1087. SUITE_MASK: 784
  1088. PRODUCT_TYPE: 1
  1089. OSPLATFORM_TYPE: x64
  1090. OSNAME: Windows 10
  1091. OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
  1092. USER_LCID: 0
  1093. OSBUILD_TIMESTAMP: 2017-07-07 02:06:35
  1094. BUILDDATESTAMP_STR: 160101.0800
  1095. BUILDLAB_STR: WinBuild
  1096. BUILDOSVER_STR: 10.0.15063.483
  1097. ANALYSIS_SESSION_ELAPSED_TIME: 431e
  1098. ANALYSIS_SOURCE: KM
  1099. FAILURE_ID_HASH_STRING: km:memory_corruption_large
  1100. FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
  1101. Followup: memory_corruption
  1102.  
  1103. ========================================================================
  1104. =================== Dump File: 072917-8875-01.dmp ====================
  1105. ========================================================================
  1106. Mini Kernel Dump File: Only registers and stack trace are available
  1107. Windows 10 Kernel Version 15063 MP (4 procs) Free x64
  1108. Product: WinNt, suite: TerminalServer SingleUserTS Personal
  1109. Built by: 15063.0.amd64fre.rs2_release.170317-1834
  1110. Kernel base = 0xfffff803`0a40c000 PsLoadedModuleList = 0xfffff803`0a7585e0
  1111. Debug session time: Sat Jul 29 16:56:55.493 2017 (UTC - 4:00)
  1112. System Uptime: 0 days 0:00:45.212
  1113.  
  1114. BugCheck 1000007E, {ffffffffc0000005, fffff8030ab6cc25, ffffcc8018680dd8, ffffcc8018680620}
  1115. *** WARNING: Unable to verify timestamp for win32k.sys
  1116. *** ERROR: Module load completed but symbols could not be loaded for win32k.sys
  1117. Probably caused by : memory_corruption
  1118. Followup: memory_corruption
  1119.  
  1120. SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
  1121. This is a very common bugcheck. Usually the exception address pinpoints
  1122. the driver/function that caused the problem. Always note this address
  1123. as well as the link date of the driver/image that contains this address.
  1124. Some common problems are exception code 0x80000003. This means a hard
  1125. coded breakpoint or assertion was hit, but this system was booted
  1126. /NODEBUG. This is not supposed to happen as developers should never have
  1127. hardcoded breakpoints in retail code, but ...
  1128. If this happens, make sure a debugger gets connected, and the
  1129. system is booted /DEBUG. This will let us see why this breakpoint is
  1130. happening.
  1131.  
  1132. Arguments:
  1133. Arg1: ffffffffc0000005, The exception code that was not handled
  1134. Arg2: fffff8030ab6cc25, The address that the exception occurred at
  1135. Arg3: ffffcc8018680dd8, Exception Record Address
  1136. Arg4: ffffcc8018680620, Context Record Address
  1137.  
  1138. Debugging Details:
  1139. DUMP_CLASS: 1
  1140. DUMP_QUALIFIER: 400
  1141. BUILD_VERSION_STRING: 10.0.15063.483 (WinBuild.160101.0800)
  1142. BIOS_VENDOR: American Megatrends Inc.
  1143. BIOS_VERSION: P2.30
  1144. BIOS_DATE: 06/29/2012
  1145. BASEBOARD_MANUFACTURER: ASRock
  1146. BASEBOARD_PRODUCT: Z68 Pro3 Gen3
  1147. BASEBOARD_VERSION:
  1148. DUMP_TYPE: 2
  1149. EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
  1150. FAULTING_IP:
  1151. nt!IovpValidateDeviceObject+5
  1152. fffff803`0ab6cc25 66833903 cmp word ptr [rcx],3
  1153. EXCEPTION_RECORD: ffffcc8018680dd8 -- (.exr 0xffffcc8018680dd8)
  1154. ExceptionAddress: fffff8030ab6cc25 (nt!IovpValidateDeviceObject+0x0000000000000005)
  1155. ExceptionCode: c0000005 (Access violation)
  1156. ExceptionFlags: 00000000
  1157. NumberParameters: 2
  1158. Parameter[0]: 0000000000000000
  1159. Parameter[1]: 00000000046dc232
  1160. Attempt to read from address 00000000046dc232
  1161. CONTEXT: ffffcc8018680620 -- (.cxr 0xffffcc8018680620)
  1162. rax=ffff88009edbcd80 rbx=ffff88009edbcd80 rcx=00000000046dc232
  1163. rdx=0000000000000000 rsi=00000000046dc232 rdi=ffffdc82f5efe2d0
  1164. rip=fffff8030ab6cc25 rsp=ffffcc8018681018 rbp=fffff80a6bae1657
  1165. r8=0000000000000000 r9=0000000000000000 r10=0000000000000000
  1166. r11=0000000000000000 r12=0000000000180000 r13=fffff80a6d67a488
  1167. r14=0000000000000000 r15=ffffdc82f720c1b0
  1168. iopl=0 nv up ei pl nz na pe nc
  1169. cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202
  1170. nt!IovpValidateDeviceObject+0x5:
  1171. fffff803`0ab6cc25 66833903 cmp word ptr [rcx],3 ds:002b:00000000`046dc232=????
  1172. Resetting default scope
  1173. CPU_COUNT: 4
  1174. CPU_MHZ: c15
  1175. CPU_VENDOR: GenuineIntel
  1176. CPU_FAMILY: 6
  1177. CPU_MODEL: 2a
  1178. CPU_STEPPING: 7
  1179. CPU_MICROCODE: 6,2a,7,0 (F,M,S,R) SIG: 29'00000000 (cache) 29'00000000 (init)
  1180. CUSTOMER_CRASH_COUNT: 1
  1181. DEFAULT_BUCKET_ID: CODE_CORRUPTION
  1182.  
  1183. PROCESS_NAME: System
  1184.  
  1185. CURRENT_IRQL: 0
  1186. ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
  1187. EXCEPTION_CODE_STR: c0000005
  1188. EXCEPTION_PARAMETER1: 0000000000000000
  1189. EXCEPTION_PARAMETER2: 00000000046dc232
  1190. FOLLOWUP_IP:
  1191. nt!IovpValidateDeviceObject+5
  1192. fffff803`0ab6cc25 66833903 cmp word ptr [rcx],3
  1193. READ_ADDRESS: fffff8030a7ed358: Unable to get MiVisibleState
  1194. 00000000046dc232
  1195. BUGCHECK_STR: AV
  1196. LOCK_ADDRESS: fffff8030a770f80 -- (!locks fffff8030a770f80)
  1197. Resource @ nt!PiEngineLock (0xfffff8030a770f80) Available
  1198. WARNING: SystemResourcesList->Flink chain invalid. Resource may be corrupted, or already deleted.
  1199. WARNING: SystemResourcesList->Blink chain invalid. Resource may be corrupted, or already deleted.
  1200. 1 total locks
  1201. PNP_TRIAGE:
  1202. Lock address : 0xfffff8030a770f80
  1203. Thread Count : 0
  1204. Thread address: 0x0000000000000000
  1205. Thread wait : 0x0
  1206. LAST_CONTROL_TRANSFER: from fffff8030ab6bfa4 to fffff8030ab6cc25
  1207. STACK_TEXT:
  1208. ffffcc80`18681018 fffff803`0ab6bfa4 : ffff8800`9edbcd80 00000000`00000000 ffff8800`9edbce98 ffffdc82`f69118d0 : nt!IovpValidateDeviceObject+0x5
  1209. ffffcc80`18681020 fffff80a`6bad7c49 : ffffdc82`f722d080 ffffcc80`18681110 ffffdc82`f6fe0150 ffffdc82`f5efe2d0 : nt!IovCallDriver+0x14c
  1210. ffffcc80`18681060 fffff803`0ab79741 : 00000000`00000000 fffff803`0ab7c5b4 ffff8800`9edbcee0 ffffdc82`f720c1b0 : VerifierExt!IofCallDriver_internal_wrapper+0x19
  1211. ffffcc80`186810a0 fffff80a`6bae1657 : ffffdc82`f722d080 ffff8800`9edbcee0 00000000`00000000 fffff803`0ab77870 : nt!VerifierIofCallDriver+0x21
  1212. ffffcc80`186810e0 fffff803`0ab6c09d : ffff8800`9edbcd80 ffffdc82`f722d080 00000000`00000000 ffffcc80`18681158 : VerifierExt!xdv_IRP_MJ_SYSTEM_CONTROL_wrapper+0xc7
  1213. ffffcc80`18681130 fffff803`0a5a17ad : ffff8800`9edbcd80 00000000`00000000 00000000`00000000 ffffdc82`f69118d0 : nt!IovCallDriver+0x245
  1214. ffffcc80`18681170 fffff803`0ab89b5b : ffff8800`9edbcd80 00000000`00000000 ffffdc82`f719f8d0 ffff8800`00000000 : nt!IofCallDriver+0x134f9d
  1215. ffffcc80`186811b0 fffff803`0ab6c09d : ffffdc82`f719fa20 ffff8800`9edbcd80 00000000`00000006 ffffdc82`f720c390 : nt!ViFilterDispatchGeneric+0xbb
  1216. ffffcc80`186811f0 fffff80a`6bad7c49 : ffff8800`9edbcd80 00000000`00000017 00000000`c00000bb ffffdc82`f72331b0 : nt!IovCallDriver+0x245
  1217. ffffcc80`18681230 fffff803`0ab79741 : fffff80a`6d4405d8 fffff80a`6d44137d 00000000`00000000 00000000`00000000 : VerifierExt!IofCallDriver_internal_wrapper+0x19
  1218. ffffcc80`18681270 fffff80a`6d66666a : 00000000`00000000 00000000`00000000 00000000`00000000 fffff803`0ab7c2db : nt!VerifierIofCallDriver+0x21
  1219. ffffcc80`186812b0 fffff80a`6d66fd9a : 00000000`00000000 00000000`00000000 ffff8800`9edbcd80 ffffdc82`f720c1d0 : HIDCLASS!HidpCallDriver+0x7a
  1220. ffffcc80`18681310 fffff80a`6d68af22 : ffffdc82`f720c1b0 ffffdc82`f719f8d0 ffff8800`9edbcf28 ffffcc80`186813a0 : HIDCLASS!HidpIrpMajorDefault+0xfa
  1221. ffffcc80`18681370 fffff80a`6d66214f : ffff8800`00000002 00000000`00000017 ffff8800`9edbcd80 ffffdc82`f6fe0240 : HIDCLASS!HidpIrpMajorSystemControl+0x2352
  1222. ffffcc80`186813a0 fffff80a`6bae1657 : ffffdc82`f720c060 ffffcc80`18681460 ffff8800`9edbcd80 fffff803`0ab77870 : HIDCLASS!HidpMajorHandler+0x21f
  1223. ffffcc80`18681430 fffff803`0ab6c09d : ffff8800`9edbcd80 ffffdc82`f720c060 00000000`00000000 ffffcc80`186814a8 : VerifierExt!xdv_IRP_MJ_SYSTEM_CONTROL_wrapper+0xc7
  1224. ffffcc80`18681480 fffff803`0a5a17ad : ffff8800`9edbcd80 00000000`00000000 00000000`00000000 ffffdc82`f6fe9b60 : nt!IovCallDriver+0x245
  1225. ffffcc80`186814c0 fffff803`0ab89b5b : ffff8800`9edbcd80 00000000`00000000 ffffdc82`f71e2260 ffff8800`00000001 : nt!IofCallDriver+0x134f9d
  1226. ffffcc80`18681500 fffff803`0ab6c09d : ffffdc82`f71e23b0 ffff8800`9edbcd80 ffff8800`9edbcd00 fffff803`0ab85313 : nt!ViFilterDispatchGeneric+0xbb
  1227. ffffcc80`18681540 fffff803`0a5a17ad : ffff8800`9edbcd80 ffffdc82`f71e2260 00000000`00000002 ffffdc82`f5f27630 : nt!IovCallDriver+0x245
  1228. ffffcc80`18681580 fffff803`0ab77cc9 : ffffdc82`f722d080 ffffdc82`f71e2260 00000000`00000000 00000000`00000000 : nt!IofCallDriver+0x134f9d
  1229. ffffcc80`186815c0 fffff803`0ab87c2a : ffffdc82`f722d080 ffffcc80`18681779 00000000`00000001 ffffdc82`f722d080 : nt!VfIrpSendSynchronousIrp+0x109
  1230. ffffcc80`18681630 fffff803`0ab7c459 : 00000000`00000000 ffffcc80`18681779 00000000`00000001 ffffdc82`f722d080 : nt!VfWmiTestStartedPdoStack+0x5a
  1231. ffffcc80`186816d0 fffff803`0a8f4394 : 00000000`00000000 ffffcc80`18681779 00000000`00000001 ffffcc80`18681779 : nt!VfMajorTestStartedPdoStack+0x59
  1232. ffffcc80`18681700 fffff803`0a8428ed : ffffdc82`f71e1340 ffffcc80`00000001 00000000`00000000 00000000`00000000 : nt!PipProcessStartPhase3+0xb8
  1233. ffffcc80`186817e0 fffff803`0a8f342f : ffffdc82`f70b1c50 ffffcc80`18681b19 00000000`00000010 fffff803`0a8f3384 : nt!PipProcessDevNodeTree+0x3d1
  1234. ffffcc80`18681a60 fffff803`0a4de8f3 : ffffdc01`00000003 00000000`00000000 ffffdc82`f70b1c50 ffffdc82`f70b1c50 : nt!PiProcessReenumeration+0xab
  1235. ffffcc80`18681ab0 fffff803`0a449ca8 : ffffdc82`f70a2040 fffff803`0a76fa20 fffff803`0a804380 fffff803`0a804380 : nt!PnpDeviceActionWorker+0x1b3
  1236. ffffcc80`18681b80 fffff803`0a4e8ac7 : fffff803`09250180 00000000`00000080 ffffdc82`f1660680 ffffdc82`f70a2040 : nt!ExpWorkerThread+0xd8
  1237. ffffcc80`18681c10 fffff803`0a57d946 : fffff803`09250180 ffffdc82`f70a2040 fffff803`0a4e8a80 00000000`00000000 : nt!PspSystemThreadStartup+0x47
  1238. ffffcc80`18681c60 00000000`00000000 : ffffcc80`18682000 ffffcc80`1867c000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
  1239. CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
  1240. fffff8030a4bb8bb-fffff8030a4bb8bc 2 bytes - nt!MiInitializeTransitionPfn+27
  1241. [ 80 fa:00 84 ]
  1242. 2 errors : !nt (fffff8030a4bb8bb-fffff8030a4bb8bc)
  1243. MODULE_NAME: memory_corruption
  1244.  
  1245. IMAGE_NAME: memory_corruption
  1246.  
  1247. FOLLOWUP_NAME: memory_corruption
  1248. DEBUG_FLR_IMAGE_TIMESTAMP: 0
  1249. MEMORY_CORRUPTOR: LARGE
  1250. STACK_COMMAND: .cxr 0xffffcc8018680620 ; kb
  1251. FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
  1252. BUCKET_ID: MEMORY_CORRUPTION_LARGE
  1253. PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
  1254. TARGET_TIME: 2017-07-29T20:56:55.000Z
  1255. OSBUILD: 15063
  1256. OSSERVICEPACK: 483
  1257. SERVICEPACK_NUMBER: 0
  1258. OS_REVISION: 0
  1259. SUITE_MASK: 784
  1260. PRODUCT_TYPE: 1
  1261. OSPLATFORM_TYPE: x64
  1262. OSNAME: Windows 10
  1263. OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
  1264. USER_LCID: 0
  1265. OSBUILD_TIMESTAMP: 2017-07-07 02:06:35
  1266. BUILDDATESTAMP_STR: 160101.0800
  1267. BUILDLAB_STR: WinBuild
  1268. BUILDOSVER_STR: 10.0.15063.483
  1269. ANALYSIS_SESSION_ELAPSED_TIME: 2d90
  1270. ANALYSIS_SOURCE: KM
  1271. FAILURE_ID_HASH_STRING: km:memory_corruption_large
  1272. FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
  1273. Followup: memory_corruption
  1274.  
  1275. ========================================================================
  1276. =================== Dump File: 072617-7859-01.dmp ====================
  1277. ========================================================================
  1278. Mini Kernel Dump File: Only registers and stack trace are available
  1279. Windows 10 Kernel Version 15063 MP (4 procs) Free x64
  1280. Product: WinNt, suite: TerminalServer SingleUserTS Personal
  1281. Built by: 15063.0.amd64fre.rs2_release.170317-1834
  1282. Kernel base = 0xfffff800`51a18000 PsLoadedModuleList = 0xfffff800`51d645e0
  1283. Debug session time: Wed Jul 26 15:15:34.190 2017 (UTC - 4:00)
  1284. System Uptime: 2 days 22:42:13.312
  1285.  
  1286. BugCheck 133, {1, 1e00, fffff80051df9348, 0}
  1287. *************************************************************************
  1288. *** Either you specified an unqualified symbol, or your debugger ***
  1289. *** doesn't have full symbol information. Unqualified symbol ***
  1290. *** resolution is turned off by default. Please either specify a ***
  1291. *** fully qualified symbol module!symbolname, or enable resolution ***
  1292. *** of unqualified symbols by typing ".symopt- 100". Note that ***
  1293. *** enabling unqualified symbol resolution with network symbol ***
  1294. *** server shares in the symbol path may cause the debugger to ***
  1295. *** appear to hang for long periods of time when an incorrect ***
  1296. *** symbol name is typed or the network symbol server is down. ***
  1297. *** For some commands to work properly, your symbol path ***
  1298. *** must point to .pdb files that have full type information. ***
  1299. *** Certain .pdb files (such as the public OS symbols) do not ***
  1300. *** contain the required information. Contact the group that ***
  1301. *** provided you with these symbols if you need this command to ***
  1302. *** work. ***
  1303. *** Type referenced: TickPeriods ***
  1304. *************************************************************************
  1305. *** WARNING: Unable to verify timestamp for win32k.sys
  1306. *** ERROR: Module load completed but symbols could not be loaded for win32k.sys
  1307. Probably caused by : memory_corruption
  1308. Followup: memory_corruption
  1309.  
  1310. DPC_WATCHDOG_VIOLATION (133)
  1311. The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
  1312. or above.
  1313.  
  1314. Arguments:
  1315. Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
  1316. DISPATCH_LEVEL or above. The offending component can usually be
  1317. identified with a stack trace.
  1318. Arg2: 0000000000001e00, The watchdog period.
  1319. Arg3: fffff80051df9348
  1320. Arg4: 0000000000000000
  1321.  
  1322. Debugging Details:
  1323. *************************************************************************
  1324. *** Either you specified an unqualified symbol, or your debugger ***
  1325. *** doesn't have full symbol information. Unqualified symbol ***
  1326. *** resolution is turned off by default. Please either specify a ***
  1327. *** fully qualified symbol module!symbolname, or enable resolution ***
  1328. *** of unqualified symbols by typing ".symopt- 100". Note that ***
  1329. *** enabling unqualified symbol resolution with network symbol ***
  1330. *** server shares in the symbol path may cause the debugger to ***
  1331. *** appear to hang for long periods of time when an incorrect ***
  1332. *** symbol name is typed or the network symbol server is down. ***
  1333. *** For some commands to work properly, your symbol path ***
  1334. *** must point to .pdb files that have full type information. ***
  1335. *** Certain .pdb files (such as the public OS symbols) do not ***
  1336. *** contain the required information. Contact the group that ***
  1337. *** provided you with these symbols if you need this command to ***
  1338. *** work. ***
  1339. *** Type referenced: TickPeriods ***
  1340. *************************************************************************
  1341. DUMP_CLASS: 1
  1342. DUMP_QUALIFIER: 400
  1343. BUILD_VERSION_STRING: 10.0.15063.483 (WinBuild.160101.0800)
  1344. BIOS_VENDOR: American Megatrends Inc.
  1345. BIOS_VERSION: P2.30
  1346. BIOS_DATE: 06/29/2012
  1347. BASEBOARD_MANUFACTURER: ASRock
  1348. BASEBOARD_PRODUCT: Z68 Pro3 Gen3
  1349. BASEBOARD_VERSION:
  1350. DUMP_TYPE: 2
  1351. DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED
  1352. CPU_COUNT: 4
  1353. CPU_MHZ: c15
  1354. CPU_VENDOR: GenuineIntel
  1355. CPU_FAMILY: 6
  1356. CPU_MODEL: 2a
  1357. CPU_STEPPING: 7
  1358. CPU_MICROCODE: 6,2a,7,0 (F,M,S,R) SIG: 29'00000000 (cache) 29'00000000 (init)
  1359. CUSTOMER_CRASH_COUNT: 1
  1360. DEFAULT_BUCKET_ID: CODE_CORRUPTION
  1361. BUGCHECK_STR: 0x133
  1362.  
  1363. PROCESS_NAME: svchost.exe
  1364.  
  1365. CURRENT_IRQL: d
  1366. LAST_CONTROL_TRANSFER: from fffff80051bb445d to fffff80051b844c0
  1367. STACK_TEXT:
  1368. fffff800`53869bc8 fffff800`51bb445d : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff800`51df9348 : nt!KeBugCheckEx
  1369. fffff800`53869bd0 fffff800`51a8d899 : 0000da7c`24355f0e fffff800`509b0180 00000000`00f89154 00000000`00000002 : nt!KeAccumulateTicks+0x124f2d
  1370. fffff800`53869c30 fffff800`522a4676 : 0000da7c`24354b26 00000000`00000001 ffffaf81`1356de40 fffff800`522f4460 : nt!KeClockInterruptNotify+0x599
  1371. fffff800`53869f40 fffff800`51a27675 : fffff800`522f43b0 ffffbb4b`86348f96 ffff9600`056a51c0 ffffaf81`0fbb13c0 : hal!HalpTimerClockInterrupt+0x56
  1372. fffff800`53869f70 fffff800`51b85b5a : ffffaf81`1356dec0 fffff800`522f43b0 0000000f`ffffffff 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5
  1373. fffff800`53869fb0 fffff800`51b85fa7 : a0000000`00000050 00000000`32187b8e 00000000`001ce1b4 00000000`00000000 : nt!KiInterruptSubDispatchNoLockNoEtw+0xea
  1374. ffffaf81`1356de40 fffff800`51a81a80 : ffffdd0d`f736f000 ffffaf81`1356e010 00000000`00000000 ffff856d`00000000 : nt!KiInterruptDispatchNoLockNoEtw+0x37
  1375. ffffaf81`1356dfd0 fffff800`51a8102e : 00000000`00000100 ffffdd0d`f73708c0 00000000`00000000 ffffaf81`1356e198 : nt!MiIdentifyPfn+0xa00
  1376. ffffaf81`1356e0a0 fffff800`51ec5dda : 00000000`00000000 ffffdd0d`f736f918 ffffdd0d`f736f000 fffff800`51a7f393 : nt!MiIdentifyPfnWrapper+0x3e
  1377. ffffaf81`1356e0d0 fffff800`51ec58ef : ffffdd0d`f6ef3740 00000000`00000001 ffffaf81`1356e2b4 ffffdd0d`f736f000 : nt!PfpPfnPrioRequest+0xca
  1378. ffffaf81`1356e150 fffff800`51ec3b4e : 00000000`0000004f ffffdd0d`f90715e0 000000e2`adff9e88 00000000`00000000 : nt!PfQuerySuperfetchInformation+0x2bf
  1379. ffffaf81`1356e280 fffff800`51ec37fb : 000002b6`854e16f0 fffff800`51b8936f ffffffff`ffffffd2 fffff800`51b8f422 : nt!ExpQuerySystemInformation+0x22e
  1380. ffffaf81`1356eac0 fffff800`51b8f413 : ffffdd0d`f6ef3740 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtQuerySystemInformation+0x2b
  1381. ffffaf81`1356eb00 00007ffb`2c115a64 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
  1382. 000000e2`adff9d88 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`2c115a64
  1383. STACK_COMMAND: kb
  1384. CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
  1385. fffff80051a81b30-fffff80051a81b31 2 bytes - nt!MiIsPfn+20
  1386. [ 80 fa:00 96 ]
  1387. fffff80051ac52ba-fffff80051ac52bb 2 bytes - nt!KiInSwapProcesses+26 (+0x4378a)
  1388. [ 80 f6:00 85 ]
  1389. fffff80051c98383-fffff80051c98385 3 bytes - nt!ExFreePoolWithTag+363
  1390. [ 40 fb f6:80 42 85 ]
  1391. 7 errors : !nt (fffff80051a81b30-fffff80051c98385)
  1392. MODULE_NAME: memory_corruption
  1393.  
  1394. IMAGE_NAME: memory_corruption
  1395.  
  1396. FOLLOWUP_NAME: memory_corruption
  1397. DEBUG_FLR_IMAGE_TIMESTAMP: 0
  1398. MEMORY_CORRUPTOR: LARGE
  1399. FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
  1400. BUCKET_ID: MEMORY_CORRUPTION_LARGE
  1401. PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
  1402. TARGET_TIME: 2017-07-26T19:15:34.000Z
  1403. OSBUILD: 15063
  1404. OSSERVICEPACK: 483
  1405. SERVICEPACK_NUMBER: 0
  1406. OS_REVISION: 0
  1407. SUITE_MASK: 784
  1408. PRODUCT_TYPE: 1
  1409. OSPLATFORM_TYPE: x64
  1410. OSNAME: Windows 10
  1411. OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
  1412. USER_LCID: 0
  1413. OSBUILD_TIMESTAMP: 2017-07-07 02:06:35
  1414. BUILDDATESTAMP_STR: 160101.0800
  1415. BUILDLAB_STR: WinBuild
  1416. BUILDOSVER_STR: 10.0.15063.483
  1417. ANALYSIS_SESSION_ELAPSED_TIME: 390c
  1418. ANALYSIS_SOURCE: KM
  1419. FAILURE_ID_HASH_STRING: km:memory_corruption_large
  1420. FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
  1421. Followup: memory_corruption
  1422.  
  1423. ========================================================================
  1424. =================== Dump File: 072917-7250-01.dmp ====================
  1425. ========================================================================
  1426. Could not match Dump File signature - invalid file format
  1427. Could not open dump file [C:\Users\UserName\Desktop\Crash Dumps\072917-7250-01.dmp], Win32 error 0n87
  1428. "The parameter is incorrect."
  1429. Debuggee initialization failed, Win32 error 0n87
  1430. The parameter is incorrect.
  1431.  
  1432. ========================================================================
  1433. =================== Dump File: 072917-7578-01.dmp ====================
  1434. ========================================================================
  1435. Mini Kernel Dump File: Only registers and stack trace are available
  1436. Windows 10 Kernel Version 15063 MP (4 procs) Free x64
  1437. Product: WinNt, suite: TerminalServer SingleUserTS Personal
  1438. Built by: 15063.0.amd64fre.rs2_release.170317-1834
  1439. Kernel base = 0xfffff802`7e400000 PsLoadedModuleList = 0xfffff802`7e74c5e0
  1440. Debug session time: Sat Jul 29 16:52:37.954 2017 (UTC - 4:00)
  1441. System Uptime: 0 days 0:01:40.673
  1442.  
  1443. BugCheck 1000007E, {ffffffffc0000005, fffff8027eb60c25, ffffad017a0c5dd8, ffffad017a0c5620}
  1444. *** WARNING: Unable to verify timestamp for win32k.sys
  1445. *** ERROR: Module load completed but symbols could not be loaded for win32k.sys
  1446. Probably caused by : memory_corruption
  1447. Followup: memory_corruption
  1448.  
  1449. SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
  1450. This is a very common bugcheck. Usually the exception address pinpoints
  1451. the driver/function that caused the problem. Always note this address
  1452. as well as the link date of the driver/image that contains this address.
  1453. Some common problems are exception code 0x80000003. This means a hard
  1454. coded breakpoint or assertion was hit, but this system was booted
  1455. /NODEBUG. This is not supposed to happen as developers should never have
  1456. hardcoded breakpoints in retail code, but ...
  1457. If this happens, make sure a debugger gets connected, and the
  1458. system is booted /DEBUG. This will let us see why this breakpoint is
  1459. happening.
  1460.  
  1461. Arguments:
  1462. Arg1: ffffffffc0000005, The exception code that was not handled
  1463. Arg2: fffff8027eb60c25, The address that the exception occurred at
  1464. Arg3: ffffad017a0c5dd8, Exception Record Address
  1465. Arg4: ffffad017a0c5620, Context Record Address
  1466.  
  1467. Debugging Details:
  1468. DUMP_CLASS: 1
  1469. DUMP_QUALIFIER: 400
  1470. BUILD_VERSION_STRING: 10.0.15063.483 (WinBuild.160101.0800)
  1471. DUMP_TYPE: 2
  1472. EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
  1473. FAULTING_IP:
  1474. nt!IovpValidateDeviceObject+5
  1475. fffff802`7eb60c25 66833903 cmp word ptr [rcx],3
  1476. EXCEPTION_RECORD: ffffad017a0c5dd8 -- (.exr 0xffffad017a0c5dd8)
  1477. ExceptionAddress: fffff8027eb60c25 (nt!IovpValidateDeviceObject+0x0000000000000005)
  1478. ExceptionCode: c0000005 (Access violation)
  1479. ExceptionFlags: 00000000
  1480. NumberParameters: 2
  1481. Parameter[0]: 0000000000000000
  1482. Parameter[1]: 00000000046dc232
  1483. Attempt to read from address 00000000046dc232
  1484. CONTEXT: ffffad017a0c5620 -- (.cxr 0xffffad017a0c5620)
  1485. rax=ffffd587a151ed80 rbx=ffffd587a151ed80 rcx=00000000046dc232
  1486. rdx=0000000000000000 rsi=00000000046dc232 rdi=ffffdb8980497770
  1487. rip=fffff8027eb60c25 rsp=ffffad017a0c6018 rbp=fffff80cf1ee1657
  1488. r8=0000000000000000 r9=0000000000000000 r10=0000000000000000
  1489. r11=0000000000000000 r12=0000000000180000 r13=fffff80cf66fa488
  1490. r14=0000000000000000 r15=ffffdb89804807f0
  1491. iopl=0 nv up ei pl nz na pe nc
  1492. cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202
  1493. nt!IovpValidateDeviceObject+0x5:
  1494. fffff802`7eb60c25 66833903 cmp word ptr [rcx],3 ds:002b:00000000`046dc232=????
  1495. Resetting default scope
  1496. CPU_COUNT: 4
  1497. CPU_MHZ: c15
  1498. CPU_VENDOR: GenuineIntel
  1499. CPU_FAMILY: 6
  1500. CPU_MODEL: 2a
  1501. CPU_STEPPING: 7
  1502. CUSTOMER_CRASH_COUNT: 1
  1503. DEFAULT_BUCKET_ID: CODE_CORRUPTION
  1504.  
  1505. PROCESS_NAME: System
  1506.  
  1507. CURRENT_IRQL: 0
  1508. ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
  1509. EXCEPTION_CODE_STR: c0000005
  1510. EXCEPTION_PARAMETER1: 0000000000000000
  1511. EXCEPTION_PARAMETER2: 00000000046dc232
  1512. FOLLOWUP_IP:
  1513. nt!IovpValidateDeviceObject+5
  1514. fffff802`7eb60c25 66833903 cmp word ptr [rcx],3
  1515. READ_ADDRESS: fffff8027e7e1358: Unable to get MiVisibleState
  1516. 00000000046dc232
  1517. BUGCHECK_STR: AV
  1518. LOCK_ADDRESS: fffff8027e764f80 -- (!locks fffff8027e764f80)
  1519. Resource @ nt!PiEngineLock (0xfffff8027e764f80) Available
  1520. WARNING: SystemResourcesList->Flink chain invalid. Resource may be corrupted, or already deleted.
  1521. WARNING: SystemResourcesList->Blink chain invalid. Resource may be corrupted, or already deleted.
  1522. 1 total locks
  1523. PNP_TRIAGE:
  1524. Lock address : 0xfffff8027e764f80
  1525. Thread Count : 0
  1526. Thread address: 0x0000000000000000
  1527. Thread wait : 0x0
  1528. LAST_CONTROL_TRANSFER: from fffff8027eb5ffa4 to fffff8027eb60c25
  1529. STACK_TEXT:
  1530. ffffad01`7a0c6018 fffff802`7eb5ffa4 : ffffd587`a151ed80 00000000`00000000 ffffd587`a151ee98 ffffdb89`7ff5fc20 : nt!IovpValidateDeviceObject+0x5
  1531. ffffad01`7a0c6020 fffff80c`f1ed7c49 : ffffdb89`803bf7e0 ffffad01`7a0c6110 ffffdb89`80261150 ffffdb89`80497770 : nt!IovCallDriver+0x14c
  1532. ffffad01`7a0c6060 fffff802`7eb6d741 : 00000000`00000000 fffff802`7eb705b4 ffffd587`a151eee0 ffffdb89`804807f0 : VerifierExt!IofCallDriver_internal_wrapper+0x19
  1533. ffffad01`7a0c60a0 fffff80c`f1ee1657 : ffffdb89`803bf7e0 ffffd587`a151eee0 00000000`00000000 fffff802`7eb6b870 : nt!VerifierIofCallDriver+0x21
  1534. ffffad01`7a0c60e0 fffff802`7eb6009d : ffffd587`a151ed80 ffffdb89`803bf7e0 00000000`00000000 ffffad01`7a0c6158 : VerifierExt!xdv_IRP_MJ_SYSTEM_CONTROL_wrapper+0xc7
  1535. ffffad01`7a0c6130 fffff802`7e5957ad : ffffd587`a151ed80 00000000`00000000 00000000`00000000 ffffdb89`7ff5fc20 : nt!IovCallDriver+0x245
  1536. ffffad01`7a0c6170 fffff802`7eb7db5b : ffffd587`a151ed80 00000000`00000000 ffffdb89`8046bb50 ffffd587`00000000 : nt!IofCallDriver+0x134f9d
  1537. ffffad01`7a0c61b0 fffff802`7eb6009d : ffffdb89`8046bca0 ffffd587`a151ed80 00000000`00000000 00001f80`010809d0 : nt!ViFilterDispatchGeneric+0xbb
  1538. ffffad01`7a0c61f0 fffff80c`f1ed7c49 : ffffd587`a151ed80 00000000`00000017 ffffdb89`804806a0 ffffdb89`7e0f0a80 : nt!IovCallDriver+0x245
  1539. ffffad01`7a0c6230 fffff802`7eb6d741 : fffff80c`f1ede657 fffff802`7eb6009d fffff80c`f64e05d8 fffff80c`f64e137d : VerifierExt!IofCallDriver_internal_wrapper+0x19
  1540. ffffad01`7a0c6270 fffff80c`f66e666a : fffff80c`f670af14 00000000`00000000 00000000`00000000 fffff802`7eb702db : nt!VerifierIofCallDriver+0x21
  1541. ffffad01`7a0c62b0 fffff80c`f66efd9a : 00000000`00000000 00000000`00000000 ffffd587`a151ed80 ffffdb89`80480810 : HIDCLASS!HidpCallDriver+0x7a
  1542. ffffad01`7a0c6310 fffff80c`f670af22 : ffffdb89`804807f0 ffffdb89`8046bb50 ffffd587`a151ef28 ffffad01`7a0c63a0 : HIDCLASS!HidpIrpMajorDefault+0xfa
  1543. ffffad01`7a0c6370 fffff80c`f66e214f : ffffd587`00000002 00000000`00000017 ffffd587`a151ed80 ffffdb89`80261240 : HIDCLASS!HidpIrpMajorSystemControl+0x2352
  1544. ffffad01`7a0c63a0 fffff80c`f1ee1657 : ffffdb89`804806a0 ffffad01`7a0c6460 ffffd587`a151ed80 fffff802`7eb6b870 : HIDCLASS!HidpMajorHandler+0x21f
  1545. ffffad01`7a0c6430 fffff802`7eb6009d : ffffd587`a151ed80 ffffdb89`804806a0 00000000`00000000 ffffad01`7a0c64a8 : VerifierExt!xdv_IRP_MJ_SYSTEM_CONTROL_wrapper+0xc7
  1546. ffffad01`7a0c6480 fffff802`7e5957ad : ffffd587`a151ed80 00000000`00000000 00000000`00000000 ffffdb89`7fc9da60 : nt!IovCallDriver+0x245
  1547. ffffad01`7a0c64c0 fffff802`7eb7db5b : ffffd587`a151ed80 00000000`00000000 ffffdb89`8046dde0 ffffd587`00000001 : nt!IofCallDriver+0x134f9d
  1548. ffffad01`7a0c6500 fffff802`7eb6009d : ffffdb89`8046df30 ffffd587`a151ed80 ffffd587`a151ed00 fffff802`7eb79313 : nt!ViFilterDispatchGeneric+0xbb
  1549. ffffad01`7a0c6540 fffff802`7e5957ad : ffffd587`a151ed80 ffffdb89`8046dde0 00000000`00000002 ffffdb89`80433f40 : nt!IovCallDriver+0x245
  1550. ffffad01`7a0c6580 fffff802`7eb6bcc9 : ffffdb89`803bf7e0 ffffdb89`8046dde0 00000000`00000000 00000000`00000000 : nt!IofCallDriver+0x134f9d
  1551. ffffad01`7a0c65c0 fffff802`7eb7bc2a : ffffdb89`803bf7e0 ffffad01`7a0c6779 00000000`00000001 ffffdb89`803bf7e0 : nt!VfIrpSendSynchronousIrp+0x109
  1552. ffffad01`7a0c6630 fffff802`7eb70459 : 00000000`00000000 ffffad01`7a0c6779 00000000`00000001 ffffdb89`803bf7e0 : nt!VfWmiTestStartedPdoStack+0x5a
  1553. ffffad01`7a0c66d0 fffff802`7e8e8394 : 00000000`00000000 ffffad01`7a0c6779 00000000`00000001 ffffad01`7a0c6779 : nt!VfMajorTestStartedPdoStack+0x59
  1554. ffffad01`7a0c6700 fffff802`7e8368ed : ffffdb89`800cf520 ffffad01`00000001 00000000`00000000 00000000`00000000 : nt!PipProcessStartPhase3+0xb8
  1555. ffffad01`7a0c67e0 fffff802`7e8e742f : ffffdb89`801da690 ffffad01`7a0c6b19 00000000`00000010 fffff802`7e8e7384 : nt!PipProcessDevNodeTree+0x3d1
  1556. ffffad01`7a0c6a60 fffff802`7e4d28f3 : ffffdb01`00000003 00000000`00000000 ffffdb89`801da690 ffffdb89`801da690 : nt!PiProcessReenumeration+0xab
  1557. ffffad01`7a0c6ab0 fffff802`7e43dca8 : ffffdb89`7bb66640 fffff802`7e763a20 fffff802`7e7f8380 fffff802`7e7f8380 : nt!PnpDeviceActionWorker+0x1b3
  1558. ffffad01`7a0c6b80 fffff802`7e4dcac7 : 00000000`00000000 00000000`00000080 ffffdb89`7a87a680 ffffdb89`7bb66640 : nt!ExpWorkerThread+0xd8
  1559. ffffad01`7a0c6c10 fffff802`7e571946 : ffffad01`79ca0180 ffffdb89`7bb66640 fffff802`7e4dca80 00000000`00000000 : nt!PspSystemThreadStartup+0x47
  1560. ffffad01`7a0c6c60 00000000`00000000 : ffffad01`7a0c7000 ffffad01`7a0c1000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
  1561. CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
  1562. fffff8027e48dd28 - nt!MiResolvePageTablePage+3b8
  1563. [ f6:c3 ]
  1564. fffff8027e48dd48-fffff8027e48dd4c 5 bytes - nt!MiResolvePageTablePage+3d8 (+0x20)
  1565. [ df be 7d fb f6:7f f8 f0 e1 c3 ]
  1566. fffff8027e495817 - nt!MiPfnShareCountIsZero+187 (+0x7acf)
  1567. [ f6:c3 ]
  1568. fffff8027e4af8bc - nt!MiInitializeTransitionPfn+28 (+0x1a0a5)
  1569. [ fa:82 ]
  1570. 8 errors : !nt (fffff8027e48dd28-fffff8027e4af8bc)
  1571. MODULE_NAME: memory_corruption
  1572.  
  1573. IMAGE_NAME: memory_corruption
  1574.  
  1575. FOLLOWUP_NAME: memory_corruption
  1576. DEBUG_FLR_IMAGE_TIMESTAMP: 0
  1577. MEMORY_CORRUPTOR: LARGE
  1578. STACK_COMMAND: .cxr 0xffffad017a0c5620 ; kb
  1579. FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
  1580. BUCKET_ID: MEMORY_CORRUPTION_LARGE
  1581. PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
  1582. TARGET_TIME: 2017-07-29T20:52:37.000Z
  1583. OSBUILD: 15063
  1584. OSSERVICEPACK: 483
  1585. SERVICEPACK_NUMBER: 0
  1586. OS_REVISION: 0
  1587. SUITE_MASK: 784
  1588. PRODUCT_TYPE: 1
  1589. OSPLATFORM_TYPE: x64
  1590. OSNAME: Windows 10
  1591. OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
  1592. USER_LCID: 0
  1593. OSBUILD_TIMESTAMP: 2017-07-07 02:06:35
  1594. BUILDDATESTAMP_STR: 160101.0800
  1595. BUILDLAB_STR: WinBuild
  1596. BUILDOSVER_STR: 10.0.15063.483
  1597. ANALYSIS_SESSION_ELAPSED_TIME: 40d4
  1598. ANALYSIS_SOURCE: KM
  1599. FAILURE_ID_HASH_STRING: km:memory_corruption_large
  1600. FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
  1601. Followup: memory_corruption
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement