Follow along with the video below to see how to install our site as a web app on your home screen.
Note: This feature may not be available in some browsers.
BugCheck [COLOR="#FF0000"]7A[/COLOR], {fffff6fc40058138, [COLOR="#800080"]ffffffffc000009d[/COLOR], 105fcbe0, fffff8800b027000}
fffff880`0331d848 fffff800`03cfc752 : 00000000`0000007a fffff6fc`40058138 ffffffff`c000009d 00000000`105fcbe0 : nt!KeBugCheckEx
fffff880`0331d850 fffff800`03cb091f : fffffa80`0a044e90 fffff880`0331d9c0 fffff800`03ec4540 fffffa80`0a044e90 : nt! ?? ::FNODOBFM::`string'+0x36c1a
fffff880`0331d930 fffff800`03c971b9 : 00000000`00000000 00000000`00000001 ffffffff`ffffffff fffff800`03ca8843 : [COLOR="#800080"]nt!MiIssueHardFault+0x28b[/COLOR]
fffff880`0331da00 fffff800`03cbd6e0 : 00000000`00000001 fffff880`0b027000 fffffa80`059d3b00 fffff6fc`40058110 : [COLOR="#800080"]nt!MmAccessFault+0x1399[/COLOR]
fffff880`0331db60 fffff800`03cbd8d0 : fffffa80`059428e0 00000000`00000001 fffffa80`00000000 fffff800`03cba70b : [COLOR="#008000"]nt!MiInPageSingleKernelStack+0x134[/COLOR]
fffff880`0331dc70 fffff800`03cbd85f : 00000000`00000000 00000000`00000001 fffffa80`051da740 00000000`00000080 : [COLOR="#008000"]nt!MmInPageKernelStack+0x40[/COLOR]
fffff880`0331dcd0 fffff800`03cbd5a4 : 00000000`00000000 00000000`00000000 00000000`00000000 fffffa80`051da700 : [COLOR="#008000"]nt!KiInSwapKernelStacks+0x1f[/COLOR]
fffff880`0331dd00 fffff800`03f2573a : fffff8a0`0863c000 fffff8a0`0863c009 00000000`00000000 00000000`00001000 : [COLOR="#008000"]nt!KeSwapProcessOrStack+0x84[/COLOR]
fffff880`0331dd40 fffff800`03c7a8e6 : fffff880`02f64180 fffffa80`05308040 fffff880`02f6efc0 00000000`00001000 : nt!PspSystemThreadStartup+0x5a
fffff880`0331dd80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxStartSystemThread+0x16
2: kd> [COLOR="#008000"]!error ffffffffc000009d[/COLOR]
[COLOR="#FF0000"]Error code: (NTSTATUS) 0xc000009d (3221225629) - STATUS_DEVICE_NOT_CONNECTED[/COLOR]
BugCheck 109, {a3a039d89fd81893, 0, 605bdb2df2652f05, 101}
Probably caused by : Unknown_Image ( ANALYSIS_INCONCLUSIVE )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
CRITICAL_STRUCTURE_CORRUPTION (109)
This bugcheck is generated when the kernel detects that critical kernel code or
data have been corrupted. There are generally three causes for a corruption:
1) A driver has inadvertently or deliberately modified critical kernel code
or data. See http://www.microsoft.com/whdc/driver/kernel/64bitPatching.mspx
2) A developer attempted to set a normal kernel breakpoint using a kernel
debugger that was not attached when the system was booted. Normal breakpoints,
"bp", can only be set if the debugger is attached at boot time. Hardware
breakpoints, "ba", can be set at any time.
3) A hardware corruption occurred, e.g. failing RAM holding kernel code or data.
Arguments:
Arg1: a3a039d89fd81893, Reserved
Arg2: 0000000000000000, Reserved
Arg3: 605bdb2df2652f05, Failure type dependent information
Arg4: 0000000000000101, Type of corrupted region, can be
0 : A generic data region
1 : Modification of a function or .pdata
2 : A processor IDT
3 : A processor GDT
4 : Type 1 process list corruption
5 : Type 2 process list corruption
6 : Debug routine modification
7 : Critical MSR modification
Not yet, Patrick. I don't know which RAM stick(s) are/is affected. There are 3 in there right now each approximately 2 GB.