Quantcast
Channel: Windows Server General Forum forum
Viewing all 24879 articles
Browse latest View live

amd64_microsoft-windows-AppID_31bf3856ad364e35_6.1.7601.23677_neutral_d3330f48 completed with hr=0x80070005 after installing KB4012212 on 2008 R2 SP1

$
0
0

amd64_microsoft-windows-AppID_31bf3856ad364e35_6.1.7601.23677_neutral_d3330f48 completed with hr=0x80070005 after installing KB4012212 on 2008 R2 SP1.

The KB is reverted post reboot.

Any pointers based on this CBS log error?


MMC can't open services.msc

$
0
0

System : Server 2012 Standerd, main system and AD.

Problem: "MMC can't open C:/Windows/System32/services.msc..."

First step:

The first error was due to a file being corrupted message. I escalated the user profile and took control of the file using admin cmd with takeown and icals, both taking full ownership and full access(what a struggle)

Second step:

When trying to launch it from the server management console it now gave me this error MMC.... you require permission from Administrator(the account I am logged in with). Launched an escalated MMC console with the same result(server management console as well) But when using the component management console it works fine. I tried replacing the file by creating a new services.msc, but is unable to save the file to the directory even after stopping all the services(you require permission from Administrator(the account I am logged in with)).

Thus the file is not corrupted any more but still can't be accessed using mmc or SMC.

Google it and forum search, with no luck.

Third and final step:

Panic like hell and open a forum chat

HELP please

PS: This all occurred after a power failure.When the machine was booted after the power failure, i received an fatal error on the raid web console about rejected cache on server starup

Server 2008 R2 contact file (*.contact file extension)

$
0
0

Assuming I am in Server and I just created a new contact by right clicking on the screen, select New from drop down selection, and select Contacts in the next drop down selection.  I have filled out all of the fields for the Contact File and saved it.

Question 1:  Is there a way to use command prompt (CMD) to view the contents of the .contact file I just created?

Question 2:  What is the command to view the contents and direct or append it to a file.

The reason for my question is because the requirements for my students is to create a contact using the method described above and share the contact out in a shared folder.  I am trying to build a program that can grade everything including of everything that is supposed to be in the .contacts file.  The grading system is fairly simple since most everything can be found in command line.  

Thanks for any help anyone can provide.  This will greatly reduce the amount of time it takes to grade a classroom for the install and setup of server and exchange from hours to minutes.

windows server 2008 support end date

$
0
0

As Microsoft already announced End of support for windows server 2008, few things i wanted to be cleared or need help.

1. i have as server running windows server 2008 r2, which is Additional domain controller, can i upgrade it to latest version of server i.e server 2012 or 2016 just like windows clients upgraded to windows 10.

2. i want to upgrade it to latest versions like 2012 or 2016 on the same machine. if you could guide me i this regard. Can i simple upgrade server 2008 to newer version or i will have to get a new  licensed server 2016 or other to migrate or upgrade.

DUMP ANALYSIS SUGGESTION REQUIRED

$
0
0

Below is the detailed analysis of dumb file , need suggestion to spot the issue

Opened log file 'c:\debuglog.txt'

1: kd> .sympath srv*c:\symbols*http://msdl.microsoft.com/download/symbols

Symbol search path is: srv*c:\symbols*http://msdl.microsoft.com/download/symbols

Expanded Symbol search path is: srv*c:\symbols*http://msdl.microsoft.com/download/symbols

************* Path validation summary **************

Response                        Time (ms)     Location

Deferred                                      srv*c:\symbols*http://msdl.microsoft.com/download/symbols

1: kd> .reload;!analyze -v;r;kv;lmnt;.logclose;q

Loading Kernel Symbols

...............................................................

............................................................

Loading User Symbols

Loading unloaded module list

.......

************* Symbol Loading Error Summary **************

Module name           Error

SharedUserData         No error - symbol load deferred

You can troubleshoot most symbol related issues by turning on symbol loading diagnostics (!sym noisy) and repeating the command that caused symbols to be loaded.

You should also verify that your symbol search path (.sympath) is correct.

*******************************************************************************

*                                                                             *

*                       Bugcheck Analysis                                   *

*                                                                            *

*******************************************************************************

KMODE_EXCEPTION_NOT_HANDLED (1e)

This is a very common bugcheck.  Usually the exception address pinpoints

the driver/function that caused the problem.  Always note this address

as well as the link date of the driver/image that contains this address.

Arguments:

Arg1: ffffffffc0000005, The exception code that was not handled

Arg2: fffff80259f5b1d1, The address that the exception occurred at

Arg3: 0000000000000000, Parameter 0 of the exception

Arg4: ffffffffffffffff, Parameter 1 of the exception

Debugging Details:

------------------

KEY_VALUES_STRING: 1

PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1

DUMP_CLASS: 1

DUMP_QUALIFIER: 401

BUILD_VERSION_STRING:  9600.19263.amd64fre.winblue_ltsb_escrow.190108-1700

SYSTEM_MANUFACTURER:  Microsoft Corporation

VIRTUAL_MACHINE:  HyperV

SYSTEM_PRODUCT_NAME:  Virtual Machine

SYSTEM_SKU:  None

SYSTEM_VERSION:  Hyper-V UEFI Release v1.0

BIOS_VENDOR:  Microsoft Corporation

BIOS_VERSION:  Hyper-V UEFI Release v1.0

BIOS_DATE:  11/26/2012

BASEBOARD_MANUFACTURER:  Microsoft Corporation

BASEBOARD_PRODUCT:  Virtual Machine

BASEBOARD_VERSION:  Hyper-V UEFI Release v1.0

DUMP_TYPE:  1

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff80259f5b1d1

BUGCHECK_P3: 0

BUGCHECK_P4: ffffffffffffffff

READ_ADDRESS:  ffffffffffffffff

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP:

nt!memcpy+51

fffff802`59f5b1d1 c3             ret

EXCEPTION_PARAMETER2:  ffffffffffffffff

BUGCHECK_STR:  0x1E_c0000005_R

CPU_COUNT: 2

CPU_MHZ: af0

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 3e

CPU_STEPPING: 4

CPU_MICROCODE: 6,3e,4,0 (F,M,S,R)  SIG: FFFFFFFF'00000000 (cache) FFFFFFFF'00000000 (init)

PROCESS_NAME:  System

CURRENT_IRQL:  1

ANALYSIS_SESSION_HOST:  XXXZZZ187

ANALYSIS_SESSION_TIME:  06-06-2019 11:52:09.0170

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

EXCEPTION_RECORD:  ffffd00190f3d9f8 -- (.exr 0xffffd00190f3d9f8)

.exr 0xffffd00190f3d9f8

ExceptionAddress: 0000000000000000

   ExceptionCode: 00000000

  ExceptionFlags: 00000000

NumberParameters: 0

TRAP_FRAME:  fffff801670e8000 -- (.trap 0xfffff801670e8000)

.trap 0xfffff801670e8000

NOTE: The trap frame does not contain all registers.

Some register values may be zeroed or incorrect.

rax=2e00000000000000 rbx=0000000000000000 rcx=0000000000000000

rdx=0000000100000000 rsi=0000000000000000 rdi=0000000000000000

rip=0000000000000000 rsp=0000000000000000 rbp=0000000000000000

r8=00000000001300ff  r9=fffff801670e8b30 r10=fffff801670ded60

r11=fffff801670debe8 r12=0000000000000000 r13=0000000000000000

r14=0000000000000000 r15=0000000000000000

iopl=0         nv up di pl nz na po cy

00000000`00000000 ??             ???

.trap

Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80259ee3ac6 to fffff80259f4a1a0

STACK_TEXT: 

ffffd001`90f3d088 fffff802`59ee3ac6 : 00000000`0000001e ffffffff`c0000005 fffff802`59f5b1d1 00000000`00000000 : nt!KeBugCheckEx

ffffd001`90f3d090 fffff802`59f5a502 : ffffd001`90f3d9f8 00000000`00000020 fffff801`670e8000 ffffd001`90f3ddc0 : nt!KiDispatchException+0x1da

ffffd001`90f3d770 fffff802`59f57526 : ffffd001`90f3da20 fffff801`656320bb ffff0002`9000da00 00000000`00000054 : nt!KiExceptionDispatch+0xc2

ffffd001`90f3d950 fffff802`59f5b1d1 : cf47c200`0005b951 003af62d`0005f262 004203f2`1e5c6000 11f6f000`00011c36 : nt!KiGeneralProtectionFault+0x2e6

ffffd001`90f3dae8 cf47c200`0005b951 : 003af62d`0005f262 004203f2`1e5c6000 11f6f000`00011c36 0030165c`00017c3c : nt!memcpy+0x51

ffffd001`90f3daf0 003af62d`0005f262 : 004203f2`1e5c6000 11f6f000`00011c36 0030165c`00017c3c 003632e5`85183000 : 0xcf47c200`0005b951

ffffd001`90f3daf8 004203f2`1e5c6000 : 11f6f000`00011c36 0030165c`00017c3c 003632e5`85183000 002d1711`00000000 : 0x003af62d`0005f262

ffffd001`90f3db00 11f6f000`00011c36 : 0030165c`00017c3c 003632e5`85183000 002d1711`00000000 00000000`00000000 : 0x004203f2`1e5c6000

ffffd001`90f3db08 0030165c`00017c3c : 003632e5`85183000 002d1711`00000000 00000000`00000000 00000000`00000001 : 0x11f6f000`00011c36

ffffd001`90f3db10 003632e5`85183000 : 002d1711`00000000 00000000`00000000 00000000`00000001 ffffe000`11b77590 : 0x0030165c`00017c3c

ffffd001`90f3db18 002d1711`00000000 : 00000000`00000000 00000000`00000001 ffffe000`11b77590 ffffe000`13a2bdb0 : 0x003632e5`85183000

ffffd001`90f3db20 00000000`00000000 : 00000000`00000001 ffffe000`11b77590 ffffe000`13a2bdb0 ffffe000`15a30880 : 0x002d1711`00000000

THREAD_SHA1_HASH_MOD_FUNC:  0cb1c6b89fea5447619b132a05aefa05a432e648

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  477eb5b46a8b6977a5b3a9a32de170de6909c3ae

THREAD_SHA1_HASH_MOD:  f08ac56120cad14894587db086f77ce277bfae84

FOLLOWUP_IP:

nt!KiDispatchException+1da

fffff802`59ee3ac6 cc             int     3

FAULT_INSTR_CODE:  ae8b4dcc

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!KiDispatchException+1da

FOLLOWUP_NAME:  MachineOwner

IMAGE_NAME:  Unknown_Image

DEBUG_FLR_IMAGE_TIMESTAMP:  0

STACK_COMMAND:  .thread ; .cxr ; kb

MODULE_NAME: Unknown_Module

BUCKET_ID:  RAISED_IRQL_USER_FAULT_0x1E_c0000005_R

DEFAULT_BUCKET_ID:  RAISED_IRQL_USER_FAULT_0x1E_c0000005_R

PRIMARY_PROBLEM_CLASS:  RAISED_IRQL_USER_FAULT_0x1E_c0000005_R

FAILURE_BUCKET_ID:  RAISED_IRQL_USER_FAULT_0x1E_c0000005_R

TARGET_TIME:  2019-06-05T16:59:28.000Z

OSBUILD:  9600

OSSERVICEPACK:  0

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  3

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8.1

OSEDITION:  Windows 8.1 Server TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  2019-01-08 20:01:52

BUILDDATESTAMP_STR:  190108-1700

BUILDLAB_STR:  winblue_ltsb_escrow

BUILDOSVER_STR:  6.3.9600.19263.amd64fre.winblue_ltsb_escrow.190108-1700

ANALYSIS_SESSION_ELAPSED_TIME:  81eb

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:raised_irql_user_fault_0x1e_c0000005_r

FAILURE_ID_HASH:  {d1e1826c-605d-7a79-a04d-b8220695ad88}

Followup:     MachineOwner

---------

rax=ffffffffffffffff rbx=ffffd00190f3d8a8 rcx=000000000000001e

rdx=ffffffffc0000005 rsi=ffffd00190f3d950 rdi=ffffe00015a30918

rip=fffff80259f4a1a0 rsp=ffffd00190f3d088 rbp=ffffd00190f3d5c0

r8=fffff80259f5b1d1  r9=0000000000000000 r10=0000000000000000

r11=0000000000000122 r12=000000000010001f r13=ffffe00015a30800

r14=ffffd00190f3d0c0 r15=ffffd00190f3d770

iopl=0         nv up ei pl zr na po nc

cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b            efl=00000246

nt!KeBugCheckEx:

fffff802`59f4a1a0 48894c2408      mov    qword ptr [rsp+8],rcx ss:0018:ffffd001`90f3d090=000000000000001e

Child-SP          RetAddr          : Args to Child                                                          : Call Site

ffffd001`90f3d088 fffff802`59ee3ac6 : 00000000`0000001e ffffffff`c0000005 fffff802`59f5b1d1 00000000`00000000 : nt!KeBugCheckEx

ffffd001`90f3d090 fffff802`59f5a502 : ffffd001`90f3d9f8 00000000`00000020 fffff801`670e8000 ffffd001`90f3ddc0 : nt!KiDispatchException+0x1da

ffffd001`90f3d770 fffff802`59f57526 : ffffd001`90f3da20 fffff801`656320bb ffff0002`9000da00 00000000`00000054 : nt!KiExceptionDispatch+0xc2

ffffd001`90f3d950 fffff802`59f5b1d1 : cf47c200`0005b951 003af62d`0005f262 004203f2`1e5c6000 11f6f000`00011c36 : nt!KiGeneralProtectionFault+0x2e6 (TrapFrame @ ffffd001`90f3d950)

ffffd001`90f3dae8 cf47c200`0005b951 : 003af62d`0005f262 004203f2`1e5c6000 11f6f000`00011c36 0030165c`00017c3c : nt!memcpy+0x51

ffffd001`90f3daf0 003af62d`0005f262 : 004203f2`1e5c6000 11f6f000`00011c36 0030165c`00017c3c 003632e5`85183000 : 0xcf47c200`0005b951

ffffd001`90f3daf8 004203f2`1e5c6000 : 11f6f000`00011c36 0030165c`00017c3c 003632e5`85183000 002d1711`00000000 : 0x003af62d`0005f262

ffffd001`90f3db00 11f6f000`00011c36 : 0030165c`00017c3c 003632e5`85183000 002d1711`00000000 00000000`00000000 : 0x004203f2`1e5c6000

ffffd001`90f3db08 0030165c`00017c3c : 003632e5`85183000 002d1711`00000000 00000000`00000000 00000000`00000001 : 0x11f6f000`00011c36

ffffd001`90f3db10 003632e5`85183000 : 002d1711`00000000 00000000`00000000 00000000`00000001 ffffe000`11b77590 : 0x0030165c`00017c3c

ffffd001`90f3db18 002d1711`00000000 : 00000000`00000000 00000000`00000001 ffffe000`11b77590 ffffe000`13a2bdb0 : 0x003632e5`85183000

ffffd001`90f3db20 00000000`00000000 : 00000000`00000001 ffffe000`11b77590 ffffe000`13a2bdb0 ffffe000`15a30880 : 0x002d1711`00000000

start            end                module name

fffff801`65211000 fffff801`6528e000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Fri Jul 4 05:59:36 2014 (53B6A538)

fffff801`6528e000 fffff801`6529c000   werkernel werkernel.sys Thu Aug 22 04:40:24 2013 (5215F8A8)

fffff801`6529c000 fffff801`652fe000   CLFS    CLFS.SYS     Thu Apr  5 10:49:28 2018 (5AC661A8)

fffff801`652fe000 fffff801`65320000   tm      tm.sys       Thu Dec 6 11:34:36 2018 (5C0979CC)

fffff801`65320000 fffff801`65335000   PSHED   PSHED.dll    Sat Sep 14 06:57:19 2013 (52346B3F)

fffff801`65335000 fffff801`6533f000   BOOTVID BOOTVID.dll  Thu Aug 22 04:40:26 2013 (5215F8AA)

fffff801`6533f000 fffff801`6534a000   cmimcext cmimcext.sys Sun Oct 9 07:08:50 2016 (57FA4F72)

fffff801`6534a000 fffff801`653d2000   CI      CI.dll       Sat May 12 12:39:45 2018 (5AF74301)

fffff801`653d2000 fffff801`653f1000   HIDCLASS HIDCLASS.SYS Fri May 13 16:08:24 2016 (57365E68)

fffff801`65400000 fffff801`6540a000   WMILIB  WMILIB.SYS   Thu Aug 22 04:40:23 2013 (5215F8A7)

fffff801`6541a000 fffff801`65475000   msrpc   msrpc.sys    Sat Nov 10 09:46:09 2018 (5BE71961)

fffff801`65475000 fffff801`65544000   Wdf01000 Wdf01000.sys Thu Aug 22 04:38:56 2013 (5215F850)

fffff801`65544000 fffff801`65555000   WDFLDR  WDFLDR.SYS   Thu Aug 22 04:39:03 2013 (5215F857)

fffff801`65555000 fffff801`6556d000   acpiex  acpiex.sys   Thu Aug 22 04:37:47 2013 (5215F80B)

fffff801`6556d000 fffff801`65578000   WppRecorder WppRecorder.sys Thu Aug 22 04:39:40 2013 (5215F87C)

fffff801`65578000 fffff801`65600000   ACPI    ACPI.sys     Sat Feb 10 08:02:05 2018 (5A7F177D)

fffff801`65600000 fffff801`6561e000   intelppm intelppm.sys Wed Jun 20 09:58:06 2018 (5B2A879E)

fffff801`65626000 fffff801`656b3000   cng     cng.sys      Sat May 12 12:39:45 2018 (5AF74301)

fffff801`656b3000 fffff801`656ca000   mpsdrv  mpsdrv.sys   Thu Aug  9 09:41:25 2018 (5B6C6EB5)

fffff801`656ce000 fffff801`657e5000   NDIS    NDIS.SYS     Sat Jun 30 09:48:29 2018 (5B37B45D)

fffff801`657e5000 fffff801`65800000   mountmgr mountmgr.sys Sat May 6 11:34:28 2017 (590E1734)

fffff801`65800000 fffff801`6585f000   volmgrx volmgrx.sys  Fri Jul  7 07:19:15 2017 (595F9863)

fffff801`6585f000 fffff801`6587c000   vmbus   vmbus.sys    Sat May  6 11:32:02 2017 (590E16A2)

fffff801`6587c000 fffff801`65893000   vmbkmcl vmbkmcl.sys  Sat May  6 11:33:40 2017 (590E1704)

fffff801`65893000 fffff801`658a8000   winhv   winhv.sys    Sat May  6 11:34:29 2017 (590E1735)

fffff801`658b5000 fffff801`6592c000   NETIO   NETIO.SYS    Sat May 27 11:29:31 2017 (5929C58B)

fffff801`6592c000 fffff801`65939000   vdrvroot vdrvroot.sys Thu Aug 22 04:38:49 2013 (5215F849)

fffff801`65939000 fffff801`65955000   pdc     pdc.sys      Wed Jul  5 23:19:51 2017 (595DD687)

fffff801`65955000 fffff801`6596d000   partmgr partmgr.sys  Wed Oct  8 00:34:42 2014 (5434E912)

fffff801`6596d000 fffff801`659d8000   spaceport spaceport.sys Tue Jan 10 14:37:47 2017 (5875623B)

fffff801`659d8000 fffff801`659ee000   volmgr  volmgr.sys   Sat Apr  9 14:31:30 2016 (570974B2)

fffff801`659ee000 fffff801`65a00000   kbdclass kbdclass.sys Mon Nov 3 22:54:54 2014 (5458783E)

fffff801`65a00000 fffff801`65a39000   ndiswan ndiswan.sys  Tue Apr  5 15:37:23 2016 (57043E23)

fffff801`65a39000 fffff801`65a4a000   umbus   umbus.sys    Thu Aug 22 04:38:59 2013 (5215F853)

fffff801`65a4a000 fffff801`65a54000   hyperkbd hyperkbd.sys Mon Jan 8 22:19:27 2018 (5A545EEF)

fffff801`65a54000 fffff801`65a60000   HyperVideo HyperVideo.sys Mon Jan 8 22:20:19 2018 (5A545F23)

fffff801`65a60000 fffff801`65abc000   fltmgr  fltmgr.sys   Mon Jan  1 21:40:16 2018 (5A4B1B40)

fffff801`65abc000 fffff801`65bf1000   CyProtectDrv64 CyProtectDrv64.sys Wed Mar 13 13:21:58 2019 (5C896666)

fffff801`65c00000 fffff801`65c2f000   cdrom   cdrom.sys    Tue Dec  5 07:24:08 2017 (5A26BA18)

fffff801`65c2f000 fffff801`65c38000   Null    Null.SYS     Thu Aug 22 04:40:24 2013 (5215F8A8)

fffff801`65c38000 fffff801`65c45000   BasicRender BasicRender.sys Wed Nov 8 07:55:00 2017 (5A0328D4)

fffff801`65c45000 fffff801`65c54000   nsiproxy nsiproxy.sys Sun Aug 13 10:19:15 2017 (59908A13)

fffff801`65c54000 fffff801`65c60000   npsvctrig npsvctrig.sys Thu Aug 22 04:38:22 2013 (5215F82E)

fffff801`65c60000 fffff801`65c6c000   mssmbios mssmbios.sys Thu Aug 22 04:39:41 2013 (5215F87D)

fffff801`65c6c000 fffff801`65c93000   dfsc    dfsc.sys     Mon Jan  1 21:38:50 2018 (5A4B1AEA)

fffff801`65c93000 fffff801`65caa000   ahcache ahcache.sys  Thu Dec 11 16:51:20 2014 (548A3C08)

fffff801`65caa000 fffff801`65cb6000   ndistapi ndistapi.sys Fri Nov 7 20:00:40 2014 (545D9568)

fffff801`65cb6000 fffff801`65cd3000   rassstp rassstp.sys  Tue Oct 28 19:45:50 2014 (545054DE)

fffff801`65cd3000 fffff801`65ce2000   CompositeBus CompositeBus.sys Thu Aug 22 04:38:48 2013 (5215F848)

fffff801`65ce3000 fffff801`65edb000   Ntfs    Ntfs.sys     Sat Dec  8 09:16:10 2018 (5C0BFC5A)

fffff801`65edb000 fffff801`65ef7000   ksecdd  ksecdd.sys   Tue Oct 28 19:47:36 2014 (54505548)

fffff801`65ef7000 fffff801`65f03000   storvsc storvsc.sys  Mon Jan  8 22:19:23 2018 (5A545EEB)

fffff801`65f03000 fffff801`65f64000   storport storport.sys Sun Sep 17 11:52:55 2017 (59BEC487)

fffff801`65f64000 fffff801`65f74000   pcw     pcw.sys      Thu Aug 22 01:46:34 2013 (5215CFEA)

fffff801`65f74000 fffff801`65f7f000   Fs_Rec  Fs_Rec.sys   Thu Aug 22 01:46:33 2013 (5215CFE9)

fffff801`65f7f000 fffff801`65fb0000   ksecpkg ksecpkg.sys  Thu Dec 27 15:47:09 2018 (5C25647D)

fffff801`65fb0000 fffff801`65fd0000   bowser  bowser.sys   Wed Jul 18 06:34:36 2018 (5B4F41EC)

fffff801`65fd3000 fffff801`65ff2000   AgileVpn AgileVpn.sys Thu Jul 7 15:32:00 2016 (577ED860)

fffff801`65ff2000 fffff801`65ffd000   kdnic   kdnic.sys    Thu Aug 22 04:38:26 2013 (5215F832)

fffff801`66000000 fffff801`66020000   mup     mup.sys      Wed Apr  6 11:22:23 2016 (570553DF)

fffff801`6602c000 fffff801`66048000   disk    disk.sys     Thu Jul  6 01:55:00 2017 (595DFAE4)

fffff801`66048000 fffff801`6609c000   CLASSPNP CLASSPNP.SYS Fri May 6 08:18:22 2016 (572CB5BE)

fffff801`6609e000 fffff801`66302000   tcpip   tcpip.sys    Tue Aug 28 06:42:05 2018 (5B85512D)

fffff801`66302000 fffff801`6636e000   fwpkclnt fwpkclnt.sys Thu May 24 06:38:35 2018 (5B06C05B)

fffff801`6636e000 fffff801`66393000   wfplwfs wfplwfs.sys  Mon Jan  1 21:38:17 2018 (5A4B1AC9)

fffff801`66393000 fffff801`663e4000   volsnap volsnap.sys  Fri Mar 11 06:44:06 2016 (56E2D9B6)

fffff801`663e4000 fffff801`663f9000   crashdmp crashdmp.sys Thu Aug 22 04:40:03 2013 (5215F893)

fffff801`66600000 fffff801`66611000   netbios netbios.sys  Mon Jan  1 21:39:30 2018 (5A4B1B12)

fffff801`66611000 fffff801`6667f000   rdbss   rdbss.sys    Mon Jan  1 21:38:59 2018 (5A4B1AF3)

fffff801`6667f000 fffff801`66698000   wanarp  wanarp.sys   Sat Dec  8 11:00:49 2018 (5C0C14E1)

fffff801`66698000 fffff801`6669d500   VMBusHID VMBusHID.sys Mon Jan 8 22:19:30 2018 (5A545EF2)

fffff801`6669e000 fffff801`6681c000   dxgkrnl dxgkrnl.sys  Sat Oct  6 09:46:48 2018 (5BB8E6F8)

fffff801`6681c000 fffff801`6682e000   watchdog watchdog.sys Sat Feb 22 04:14:39 2014 (530894AF)

fffff801`6682e000 fffff801`66891000   dxgmms1 dxgmms1.sys  Sat Oct  6 09:46:35 2018 (5BB8E6EB)

fffff801`66891000 fffff801`668a3000   BasicDisplay BasicDisplay.sys Thu Aug 22 04:39:31 2013 (5215F873)

fffff801`668a3000 fffff801`668b7000   Npfs    Npfs.SYS     Thu Aug 22 04:40:25 2013 (5215F8A9)

fffff801`668b7000 fffff801`668c3000   Msfs    Msfs.SYS     Thu Aug 22 04:40:24 2013 (5215F8A8)

fffff801`668c3000 fffff801`668e3000   tdx     tdx.sys      Tue Aug  1 20:17:15 2017 (5981443B)

fffff801`668e3000 fffff801`668f1000   TDI     TDI.SYS      Thu Aug 22 04:39:01 2013 (5215F855)

fffff801`668f1000 fffff801`6693c000   netbt   netbt.sys    Thu Aug 10 20:27:54 2017 (598D243A)

fffff801`6693c000 fffff801`669cc000   afd     afd.sys      Wed Jan 10 06:48:05 2018 (5A5627A5)

fffff801`669cc000 fffff801`669f6000   pacer   pacer.sys    Mon Jan  1 21:37:59 2018 (5A4B1AB7)

fffff801`669f6000 fffff801`669fe080   HIDPARSE HIDPARSE.SYS Mon Jan 7 20:54:34 2019 (5C342D0A)

fffff801`66a00000 fffff801`66a17000   dump_vmbkmcl dump_vmbkmcl.sys Sat May 6 11:33:40 2017 (590E1704)

fffff801`66a17000 fffff801`66a25000   monitor monitor.sys  Thu Aug 22 04:36:37 2013 (5215F7C5)

fffff801`66a25000 fffff801`66a3d000   rspndr  rspndr.sys   Thu Aug 22 04:36:34 2013 (5215F7C2)

fffff801`66a49000 fffff801`66a5d000   lltdio  lltdio.sys   Thu Aug 22 04:36:18 2013 (5215F7B2)

fffff801`66a69000 fffff801`66a85000   netvsc63 netvsc63.sys Thu Apr 5 10:47:55 2018 (5AC6614B)

fffff801`66a85000 fffff801`66a8f000   vmgencounter vmgencounter.sys Mon Jan 8 22:19:49 2018 (5A545F05)

fffff801`66a8f000 fffff801`66ab0000   raspptp raspptp.sys  Thu Aug 22 04:35:51 2013 (5215F797)

fffff801`66ab0000 fffff801`66ad0000   rasl2tp rasl2tp.sys  Tue Feb  2 10:16:20 2016 (56B0F274)

fffff801`66ad0000 fffff801`66adb000   NdisVirtualBus NdisVirtualBus.sys Thu Aug 22 04:36:25 2013 (5215F7B9)

fffff801`66adb000 fffff801`66af6000   raspppoe raspppoe.sys Thu Aug 22 04:36:37 2013 (5215F7C5)

fffff801`66af6000 fffff801`66af7600   swenum  swenum.sys   Tue Oct 28 19:47:41 2014 (5450554D)

fffff801`66af8000 fffff801`66b44000   ks      ks.sys       Thu Aug 23 15:54:51 2018 (5B7F3B3B)

fffff801`66b44000 fffff801`66b4f000   rdpbus  rdpbus.sys   Thu Aug 22 04:38:52 2013 (5215F84C)

fffff801`66b4f000 fffff801`66b66000   NDProxy NDProxy.SYS  Mon Jan  1 21:39:05 2018 (5A4B1AF9)

fffff801`66b66000 fffff801`66b73000   mouhid  mouhid.sys   Mon Nov  3 22:54:47 2014 (54587837)

fffff801`66b73000 fffff801`66b83000   mouclass mouclass.sys Mon Nov 3 22:54:47 2014 (54587837)

fffff801`66b83000 fffff801`66bbc000   fastfat fastfat.SYS  Thu Aug 22 04:40:18 2013 (5215F8A2)

fffff801`66bbc000 fffff801`66bd7000   cdfs    cdfs.sys     Thu Aug 22 04:40:15 2013 (5215F89F)

fffff801`66bd7000 fffff801`66be3000   dump_diskdump dump_diskdump.sys Thu Aug 22 04:40:18 2013 (5215F8A2)

fffff801`66be3000 fffff801`66bef000   dump_storvsc dump_storvsc.sys Mon Jan 8 22:19:23 2018 (5A545EEB)

fffff801`66c00000 fffff801`66ca9000   peauth  peauth.sys   Sat Feb 22 04:09:37 2014 (53089381)

fffff801`66cde000 fffff801`66d4a000   mrxsmb  mrxsmb.sys   Sat Sep  1 09:43:27 2018 (5B8AC1AF)

fffff801`66d4a000 fffff801`66d81000   mrxsmb20 mrxsmb20.sys Wed Feb 1 11:44:06 2017 (58923A86)

fffff801`66e00000 fffff801`66e4c000   mrxsmb10 mrxsmb10.sys Thu Sep 7 14:32:10 2017 (59B1BADA)

fffff801`66e4c000 fffff801`66e8e000   srvnet  srvnet.sys   Sat Jan  5 09:46:01 2019 (5C30ED59)

fffff801`66e8e000 fffff801`66ea0000   tcpipreg tcpipreg.sys Thu Mar 6 01:19:59 2014 (53183DBF)

fffff801`66eee000 fffff801`66fe7000   HTTP    HTTP.sys     Mon Jan  1 21:38:55 2018 (5A4B1AEF)

fffff801`66fe7000 fffff801`66ff7000   condrv  condrv.sys   Thu Aug 22 04:40:17 2013 (5215F8A1)

fffff801`67000000 fffff801`6702d000   tunnel  tunnel.sys   Fri Sep  4 12:24:03 2015 (55E9EFD3)

fffff801`6702d000 fffff801`67038000   rdpvideominiport rdpvideominiport.sys Tue Oct 28 19:47:25 2014 (5450553D)

fffff801`67038000 fffff801`6706c000   rdpdr   rdpdr.sys    Thu Aug 22 04:36:46 2013 (5215F7CE)

fffff801`6706c000 fffff801`67079000   terminpt terminpt.sys Thu Aug 22 04:39:16 2013 (5215F864)

fffff801`670ad000 fffff801`6715c000   srv2    srv2.sys     Sat Jan  5 09:47:00 2019 (5C30ED94)

fffff801`6715c000 fffff801`671ea000   srv     srv.sys      Mon Jan  1 21:38:44 2018 (5A4B1AE4)

fffff802`5916c000 fffff802`59175000   kd      kd.dll       Thu Aug 22 04:40:43 2013 (5215F8BB)

fffff802`59e0a000 fffff802`5a589000   nt      ntkrnlmp.exe Tue Jan  8 19:01:52 2019 (5C356420)

fffff802`5a589000 fffff802`5a5f8000   hal     hal.dll      Fri Mar  9 06:53:04 2018 (5AA29FD0)

fffff960`0011b000 fffff960`00530000   win32k  win32k.sys   Sat Jan  5 09:47:29 2019 (5C30EDB1)

fffff960`006ed000 fffff960`006f6000   TSDDD   TSDDD.dll    Thu Aug 22 04:40:32 2013 (5215F8B0)

fffff960`00904000 fffff960`0093e000   cdd     cdd.dll      Tue Oct 28 20:51:32 2014 (54506444)

fffff960`00adf000 fffff960`00b05000   RDPUDD  RDPUDD.dll   Sat Mar  4 11:24:19 2017 (58BB1463)

Unloaded modules:

fffff801`65abc000 fffff801`65bf0000   CyProtectDrv64.sys

    Timestamp: unavailable (00000000)

    Checksum:  00000000

    ImageSize:  00134000

fffff801`66a25000 fffff801`66a49000   luafv.sys

    Timestamp: unavailable (00000000)

    Checksum:  00000000

    ImageSize:  00024000

fffff801`66020000 fffff801`6602c000   dump_storport.sys

    Timestamp: unavailable (00000000)

    Checksum:  00000000

    ImageSize:  0000C000

fffff801`65fbc000 fffff801`65fd3000   dump_vmbkmcl.sys

    Timestamp: unavailable (00000000)

    Checksum:  00000000

    ImageSize:  00017000

fffff801`65fb0000 fffff801`65fbc000   dump_storvsc.sys

    Timestamp: unavailable (00000000)

    Checksum:  00000000

    ImageSize:  0000C000

fffff801`66020000 fffff801`6602c000   hwpolicy.sys

    Timestamp: unavailable (00000000)

    Checksum:  00000000

    ImageSize:  0000C000

fffff801`656b3000 fffff801`656ce000   sacdrv.sys

    Timestamp: unavailable (00000000)

    Checksum:  00000000

    ImageSize:  0001B000

Closing open log file c:\debuglog.txt



Rgds, Bairavamoorthy

\Logs\CBS file size

$
0
0
CBS file size in mentioned location is 35 GB (C:\Windows\Logs\CBS ). hence taking too much of a space. Is it safe to remove it or clean it . as its consuming too much of a space..

Microsoft Volume Licensing

$
0
0

Greetings,

We have 4 physical hyper v host with 2 processors 24 core each and running with windows server 2012 r2 data center.

My Question:
How many data center license do we have to purchased as license is per core 24x4=96.

9EA-00278 WinSvrDCCore ALNG SA MVL 2 Lic CoreLic.

So If 2Lic CoreLic x 12 (cores) x 4(hosts) =96 cores.


The below link is helpful but want to double check prior to submitting my report to my superior. 

https://www.bpsme.com/microsoft-windows-server-and-system-center-core-licensing-update/



Using the "log on to" option in active directory requires adding the client?

$
0
0

I am using this feature to limit the a user so it can connect to a list of hosts, I'd like to define it in the AD to keep it centralized if possible.

After some trouble i found out this post here that explains that unless you add both the client and the server in the list it won't work.

Are there any workarounds for this? I am having trouble because this precise user is connecting from his computer that is not joined into our domain and I can't list all the hosts he will be using to connect from.


Check if KMS client is hardcoded

$
0
0

Hi,

Is there a command I can run on client to check if KMS server is hardcoded on the client?

there is the /ckms to clear but would like to know if there is a similar command to check if  hardcoded to point to a KMS host?

Thanks

DirectAccess Teredo/IP-HTTPS

$
0
0

Good evening

I was wondering if you guys/girls would be able to help me troubleshoot a DirectAccess deployment problem...???

I have set up a lab environment that is fully internet facing (where it needs to be); my DA server has two consecutive IP addresses to enable Teredo usage.

My problem is this...my DA client device connects using Teredo, but the user logging on connects via IP-HTTPS.  Due to the 355KBps issue, I'm clearly wanting to use the Teredo connection (I've attached a screenshot).  I see there's a 30 second difference in the two connection times; is that relevant to anything?  You see nothing, save for a minus sign, at the username column for the Teredo connection.

Any ideas why it connects to Teredo but opts for IP-HTTPS instead?

Kind regards

Chris D


Cheers CD

Migrate from FRS to DFSR SYSVOL RODC waiting for Initial SYNC

$
0
0

Hiya

we are migrating from FRS to DFSR for Sysvol replication.

we have one RODC in the domain and it is being stubborn and still says waiting for initial sync.

I have tried polling the device

Forcing replication from the RODC using Repadmin /syncall

I have run dfsrmig /CreateGlobalObjects from the PDC

When I use the cmd Repadmin /showrepl the device seems to have synced ok

what can I do now its been 24hours since I ran step one of the migration?

cheers Mike

MSMQ Version in Windows Server 2016

$
0
0

Hi Team, 

Can anybody confirm what this the current version of MSMQ in Windows Server 2016.

Last version was 6.3 in Windows Server 2012 R2.


Naveed Amir

WAYS to delete pagefile.sys while windows2008 r2 is running

$
0
0

Having a hard stop to find ways to delete pagefile.sys while windows server 2008 r2 is operational .


Anand Shankar

Exporting a specific GPO to another domain

$
0
0
Hi all,

Been looking around AGPM and LGPO, but can't seem to get this to work. Am I doing it wrong? 

Essentially, I want to export this GPO:



...from one domain, and add it to another domain.

LGPO seems to want to do the entire local policy, and I don't have AGPM on the second domain due to licensing issues. Any ideas how to get round this?

Information required on Windows updates for Windows Server 2008 R2 Standard Edition

$
0
0

Hi Team,

We have Windows Server 2008 R2 x64, in which we installed KB4480970 in during January 2019 release now I am looking the update history, I did not find KB4480970 in Update History, I am surprised so I checked Windows Update Catalog I found that KB4486563 is replacing the KB4480970. 

Now we have audit in next month I am worrying if KB4480970 is not listed in update history, then it should not as non-compliance. 

Can any one tell me can I install KB4480970 in my server ?


Error ID 2001 - Source : Usbperf Unable to read the "First Counter" value under the usbperf\Performance Key Windows 2012 R2

$
0
0

Hi All,

Recently we built a physical Windows 2012 R2 server, since last month we see repeated number of Error Events in Application Log :

Error ID 2001 - Source : Usbperf

Unable to read the "First Counter" value under the usbperf\Performance Key. Status codes returned in data.

On running Perfmon the usbperf counter is missing from it

We already tried lodctr /r for System32 and SysWOW64 to rebuild the counters but still errors are getting generated.

Could you please let me know what else could be done to troubleshoot this error?

I already went through and tried rebuilding the counters 

https://social.technet.microsoft.com/Forums/windows/en-US/eff5eeb6-e173-446e-9c79-841918087274/perflib-event-id-1008-1001-1023-2001-on-net-asp-bits-dns-esent-usbperf?forum=winservergen

Thanks



Using Robocopy with arguments

$
0
0

I have been using Robocopy nightly to backup files to a NAS appliance.  Recently I added the "/LOG:file" argument, so a log can be reviewed each day for evaluation of backup success.  I am looking for an output of just the results, not the verbose line by line tally of files copied.  I desire only the results, such as:

               Total    Copied   Skipped  Mismatch    FAILED    Extras

    Dirs :     37831       154         0         0         0         8

   Files :    238420      1533    236646         0       241       230

   Bytes : 598.635 g  10.533 g 588.090 g         0   12.16 m   1.181 g

   Times :   0:43:33   0:06:03                       0:22:18   0:15:10

But my log file is also filling up with details of each file copied.  Is there a way to create a log file that only shows the total files available, total backed up, and total missed?  Also, I am not sure what the column labeled "Extras" above means.  

So any help would be appreciated.

Thanks.


2008 DC Status Unavailable when changing directory server

$
0
0

Hello, while testing/playing with Server 2008, in my two separate test domains. One, a 4 DC native 2008 domain and two, a mixed 2003 R2 / 2008 domain. I noticed whenever I right click on my domain, from one of the roles, and choose change domain controller, and the change Directory Server menu comes up. It also shows my W2K8 DC's status as being Unavailable. My W2K3 DC's all show Online. Why is that? It does not prevent me from managing them or performing any function that i know of. I have the firewall's off thinking it was some kind of SNMP traffic but that didn't change anything.

Any ideas?

Thanks

VSS OTHER: ERROR: VSS failed to process snapshot: Volume Shadow Copy Service error: Unexpected error DeviceIoControl hr = 0x80070057

$
0
0

Looking for help with the VSS service on Windows Server 2008 R2 Datacenter.  My backup software (EMC Networker) fails to capture the DISASTER RECOVERY data it needs for a bare metal recovery.  When it fails the backup software gives me an error message as follows

181407:save: Step (1 of 5) for PID-9712: Save has been started on the client 'abdas-server'.
174412:save: Step (2 of 5) for PID-9712: Running the backup on the client 'abdas-server' for the save set 'pseudo_saveset'.
174424:save: Step (3 of 5) for PID-9712: Creating the snapshot for the selected save sets.
VSS OTHER: ERROR: VSS failed to process snapshot: 
176575:save: Unable to save the SYSTEM STATE save sets and create the snapshot.

176571:save: Step (4 of 5) for PID-9712: Unable to complete the backup of the disaster recovery save sets. See the savegrp log to track the closure steps of the backup.
176572:save: Error occurred during the backup of the disaster recovery save sets.
--- Job Indications ---
abdas-server:pseudo_saveset: retried 1 times.


If I check Windows Event Viewer I find the following error.

Volume Shadow Copy Service error: Unexpected error DeviceIoControl(\\?\Volume{f68daa31-c393-11e2-a67c-806e6f6e6963} - 00000000000001EC,0x0053c008,00000000008BE500,0,00000000008BF510,4096,[0]).  hr = 0x80070057, The parameter is incorrect.

.

Operation:

   Processing EndPrepareSnapshots

Context:

   Execution Context: System Provider

I've done a plethora of troubleshooting at the behest of the backup vendor and a microsoft chat support person which has resolved the issue on 2 other systems.  On this system I have done the following

Rebooted and run chkdsk

Restarted the VSS writer services

Re-registered the VSS writer services

Set the shadow copy space to unlimited and deleted the prior shadows and created a new one.  (The system has 300 GB free out of 528 on the OS drive)

Upgraded the backup client

On the other systems I also did a clean boot with all services disabled but that didn't make a different.  This one being a server I was unable to do that since it is a production system that can't go down without prior planning and advance notice.  

Has anyone else seen this and resolved it?

Blue Screen Of Death with Windows server 2008 R2

$
0
0
Problem signature:
  Problem Event Name: BlueScreen
  OS Version: 6.1.7601.2.1.0.272.7
  Locale ID: 1033
Additional information about the problem:
  BCCode: 3b
  BCP1: 00000000C0000005
  BCP2: FFFFF880031A8630
  BCP3: FFFFF8800F9989A0
  BCP4: 0000000000000000
  OS Version: 6_1_7601
  Service Pack: 1_0
  Product: 272_3
Files that help describe the problem:
  C:\Windows\Minidump\070419-31559-01.dmp
  C:\Users\Administrator\AppData\Local\Temp\2\WER-274842-0.sysdata.xml
Read our privacy statement online:
  http://go.microsoft.com/fwlink/?linkid=104288&clcid=0x0409
If the online privacy statement is not available, please read our privacy statement offline:
  C:\Windows\system32\en-US\erofflps.txt
Viewing all 24879 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>