Microsoft (R) Windows Debugger Version 6.3.9600.17336 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Minidump\081915-6140-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available ************* Symbol Path validation summary ************** Response Time (ms) Location Deferred SRV*C:\Minidump\SYMBOLS*http://msdl.microsoft.com/download/symbols Symbol search path is: SRV*C:\Minidump\SYMBOLS*http://msdl.microsoft.com/download/symbols Executable search path is: Windows 8 Kernel Version 9600 MP (8 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Built by: 9600.17936.amd64fre.winblue_ltsb.150715-0840 Machine Name: Kernel base = 0xfffff803`3f48f000 PsLoadedModuleList = 0xfffff803`3f7647b0 Debug session time: Wed Aug 19 12:25:22.346 2015 (UTC + 2:00) System Uptime: 0 days 0:02:12.196 Loading Kernel Symbols ............................................................... ................................................................ ................................. Loading User Symbols Loading unloaded module list ........... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 1A, {5100, fffff6e0007d1018, 19, 40} *** WARNING: Unable to verify timestamp for SRTSP64.SYS *** ERROR: Module load completed but symbols could not be loaded for SRTSP64.SYS *** WARNING: Unable to verify timestamp for EX64.SYS *** ERROR: Module load completed but symbols could not be loaded for EX64.SYS Probably caused by : SRTSP64.SYS ( SRTSP64+82af4 ) Followup: MachineOwner --------- 2: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* MEMORY_MANAGEMENT (1a) # Any other values for parameter 1 must be individually examined. Arguments: Arg1: 0000000000005100, The subtype of the bugcheck. Arg2: fffff6e0007d1018 Arg3: 0000000000000019 Arg4: 0000000000000040 Debugging Details: ------------------ BUGCHECK_STR: 0x1a_5100 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT PROCESS_NAME: CcmExec.exe CURRENT_IRQL: 0 ANALYSIS_VERSION: 6.3.9600.17336 (debuggers(dbg).150226-1500) amd64fre LAST_CONTROL_TRANSFER: from fffff8033f60712d to fffff8033f5de9a0 STACK_TEXT: ffffd000`221e6848 fffff803`3f60712d : 00000000`0000001a 00000000`00005100 fffff6e0`007d1018 00000000`00000019 : nt!KeBugCheckEx ffffd000`221e6850 fffff803`3f4cf3ea : 00000000`0000001c ffffd000`221e6a29 00000000`0000001c 00000000`0000001c : nt! ?? ::FNODOBFM::`string'+0x1826d ffffd000`221e6990 fffff803`3f4d0a9f : ffffd000`00000000 00000000`00161c06 00000000`00000001 00000000`00000000 : nt!MiAllocatePagedPoolPages+0x17a ffffd000`221e6a90 fffff803`3f4cfe50 : 00000000`00000000 00000000`00000001 00000000`0001c000 ffffd000`221e6b40 : nt!MiAllocatePoolPages+0xc3 ffffd000`221e6ae0 fffff803`3f72f4d3 : 00000000`00000001 ffffd001`35489000 00000000`00000001 fffff803`3f7e6dc0 : nt!ExpAllocateBigPool+0xd0 ffffd000`221e6bd0 fffff801`41b47af4 : ffffffff`ffffffff ffffd000`221e6f70 ffffe001`532d1640 ffffc000`f57ef270 : nt!ExAllocatePoolWithTag+0xa83 ffffd000`221e6ca0 ffffffff`ffffffff : ffffd000`221e6f70 ffffe001`532d1640 ffffc000`f57ef270 00000000`ffffffff : SRTSP64+0x82af4 ffffd000`221e6ca8 ffffd000`221e6f70 : ffffe001`532d1640 ffffc000`f57ef270 00000000`ffffffff fffff801`432ecbb0 : 0xffffffff`ffffffff ffffd000`221e6cb0 ffffe001`532d1640 : ffffc000`f57ef270 00000000`ffffffff fffff801`432ecbb0 ffffd000`221e6e68 : 0xffffd000`221e6f70 ffffd000`221e6cb8 ffffc000`f57ef270 : 00000000`ffffffff fffff801`432ecbb0 ffffd000`221e6e68 00000000`0001b9d0 : 0xffffe001`532d1640 ffffd000`221e6cc0 00000000`ffffffff : fffff801`432ecbb0 ffffd000`221e6e68 00000000`0001b9d0 00000000`00000002 : 0xffffc000`f57ef270 ffffd000`221e6cc8 fffff801`432ecbb0 : ffffd000`221e6e68 00000000`0001b9d0 00000000`00000002 00000000`000003e3 : 0xffffffff ffffd000`221e6cd0 ffffd000`221e6e68 : 00000000`0001b9d0 00000000`00000002 00000000`000003e3 ffffc000`eb5c8d28 : EX64+0x8ebb0 ffffd000`221e6cd8 00000000`0001b9d0 : 00000000`00000002 00000000`000003e3 ffffc000`eb5c8d28 fffff801`432ecc7f : 0xffffd000`221e6e68 ffffd000`221e6ce0 00000000`00000002 : 00000000`000003e3 ffffc000`eb5c8d28 fffff801`432ecc7f ffffd000`221e6e68 : 0x1b9d0 ffffd000`221e6ce8 00000000`000003e3 : ffffc000`eb5c8d28 fffff801`432ecc7f ffffd000`221e6e68 00000000`00000001 : 0x2 ffffd000`221e6cf0 ffffc000`eb5c8d28 : fffff801`432ecc7f ffffd000`221e6e68 00000000`00000001 ffffe001`50e00000 : 0x3e3 ffffd000`221e6cf8 fffff801`432ecc7f : ffffd000`221e6e68 00000000`00000001 ffffe001`50e00000 fffff803`3f4e1d7a : 0xffffc000`eb5c8d28 ffffd000`221e6d00 ffffd000`221e6e68 : 00000000`00000001 ffffe001`50e00000 fffff803`3f4e1d7a ffffc000`f5776e70 : EX64+0x8ec7f ffffd000`221e6d08 00000000`00000001 : ffffe001`50e00000 fffff803`3f4e1d7a ffffc000`f5776e70 fffff801`4326bbc7 : 0xffffd000`221e6e68 ffffd000`221e6d10 ffffe001`50e00000 : fffff803`3f4e1d7a ffffc000`f5776e70 fffff801`4326bbc7 006c0061`006e0072 : 0x1 ffffd000`221e6d18 fffff803`3f4e1d7a : ffffc000`f5776e70 fffff801`4326bbc7 006c0061`006e0072 006e0065`00760045 : 0xffffe001`50e00000 ffffd000`221e6d20 00000000`00001000 : 00000000`00000000 ffffe001`532d1640 00000000`00000000 00000000`00000000 : nt!ExReleasePushLockEx+0x4a ffffd000`221e6d60 00000000`00000000 : ffffe001`532d1640 00000000`00000000 00000000`00000000 fffff803`3f7e6dd0 : 0x1000 STACK_COMMAND: kb FOLLOWUP_IP: SRTSP64+82af4 fffff801`41b47af4 ?? ??? SYMBOL_STACK_INDEX: 6 SYMBOL_NAME: SRTSP64+82af4 FOLLOWUP_NAME: MachineOwner MODULE_NAME: SRTSP64 IMAGE_NAME: SRTSP64.SYS DEBUG_FLR_IMAGE_TIMESTAMP: 53e54bed FAILURE_BUCKET_ID: 0x1a_5100_SRTSP64+82af4 BUCKET_ID: 0x1a_5100_SRTSP64+82af4 ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:0x1a_5100_srtsp64+82af4 FAILURE_ID_HASH: {4011fea4-e5c3-c745-9128-4e842802c9ef} Followup: MachineOwner ---------