amd64_microsoft-windows-AppID_31bf3856ad364e35_6.1.7601.23677_neutral_d3330f48 completed with hr=0x80070005 after installing KB4012212 on 2008 R2 SP1.
The KB is reverted post reboot.
Any pointers based on this CBS log error?
amd64_microsoft-windows-AppID_31bf3856ad364e35_6.1.7601.23677_neutral_d3330f48 completed with hr=0x80070005 after installing KB4012212 on 2008 R2 SP1.
The KB is reverted post reboot.
Any pointers based on this CBS log error?
System : Server 2012 Standerd, main system and AD.
Problem: "MMC can't open C:/Windows/System32/services.msc..."
First step:
The first error was due to a file being corrupted message. I escalated the user profile and took control of the file using admin cmd with takeown and icals, both taking full ownership and full access(what a struggle)
Second step:
When trying to launch it from the server management console it now gave me this error MMC.... you require permission from Administrator(the account I am logged in with). Launched an escalated MMC console with the same result(server management console as well) But when using the component management console it works fine. I tried replacing the file by creating a new services.msc, but is unable to save the file to the directory even after stopping all the services(you require permission from Administrator(the account I am logged in with)).
Thus the file is not corrupted any more but still can't be accessed using mmc or SMC.
Google it and forum search, with no luck.
Third and final step:
Panic like hell and open a forum chat
HELP please
PS: This all occurred after a power failure.When the machine was booted after the power failure, i received an fatal error on the raid web console about rejected cache on server starupAssuming I am in Server and I just created a new contact by right clicking on the screen, select New from drop down selection, and select Contacts in the next drop down selection. I have filled out all of the fields for the Contact File and saved it.
Question 1: Is there a way to use command prompt (CMD) to view the contents of the .contact file I just created?
Question 2: What is the command to view the contents and direct or append it to a file.
The reason for my question is because the requirements for my students is to create a contact using the method described above and share the contact out in a shared folder. I am trying to build a program that can grade everything including of everything that is supposed to be in the .contacts file. The grading system is fairly simple since most everything can be found in command line.
Thanks for any help anyone can provide. This will greatly reduce the amount of time it takes to grade a classroom for the install and setup of server and exchange from hours to minutes.
As Microsoft already announced End of support for windows server 2008, few things i wanted to be cleared or need help.
1. i have as server running windows server 2008 r2, which is Additional domain controller, can i upgrade it to latest version of server i.e server 2012 or 2016 just like windows clients upgraded to windows 10.
2. i want to upgrade it to latest versions like 2012 or 2016 on the same machine. if you could guide me i this regard. Can i simple upgrade server 2008 to newer version or i will have to get a new licensed server 2016 or other to migrate or upgrade.
Below is the detailed analysis of dumb file , need suggestion to spot the issue
Opened log file 'c:\debuglog.txt'
1: kd> .sympath srv*c:\symbols*http://msdl.microsoft.com/download/symbols
Symbol search path is: srv*c:\symbols*http://msdl.microsoft.com/download/symbols
Expanded Symbol search path is: srv*c:\symbols*http://msdl.microsoft.com/download/symbols
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*c:\symbols*http://msdl.microsoft.com/download/symbols
1: kd> .reload;!analyze -v;r;kv;lmnt;.logclose;q
Loading Kernel Symbols
...............................................................
............................................................
Loading User Symbols
Loading unloaded module list
.......
************* Symbol Loading Error Summary **************
Module name Error
SharedUserData No error - symbol load deferred
You can troubleshoot most symbol related issues by turning on symbol loading diagnostics (!sym noisy) and repeating the command that caused symbols to be loaded.
You should also verify that your symbol search path (.sympath) is correct.
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80259f5b1d1, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 401
BUILD_VERSION_STRING: 9600.19263.amd64fre.winblue_ltsb_escrow.190108-1700
SYSTEM_MANUFACTURER: Microsoft Corporation
VIRTUAL_MACHINE: HyperV
SYSTEM_PRODUCT_NAME: Virtual Machine
SYSTEM_SKU: None
SYSTEM_VERSION: Hyper-V UEFI Release v1.0
BIOS_VENDOR: Microsoft Corporation
BIOS_VERSION: Hyper-V UEFI Release v1.0
BIOS_DATE: 11/26/2012
BASEBOARD_MANUFACTURER: Microsoft Corporation
BASEBOARD_PRODUCT: Virtual Machine
BASEBOARD_VERSION: Hyper-V UEFI Release v1.0
DUMP_TYPE: 1
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff80259f5b1d1
BUGCHECK_P3: 0
BUGCHECK_P4: ffffffffffffffff
READ_ADDRESS: ffffffffffffffff
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
nt!memcpy+51
fffff802`59f5b1d1 c3 ret
EXCEPTION_PARAMETER2: ffffffffffffffff
BUGCHECK_STR: 0x1E_c0000005_R
CPU_COUNT: 2
CPU_MHZ: af0
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 3e
CPU_STEPPING: 4
CPU_MICROCODE: 6,3e,4,0 (F,M,S,R) SIG: FFFFFFFF'00000000 (cache) FFFFFFFF'00000000 (init)
PROCESS_NAME: System
CURRENT_IRQL: 1
ANALYSIS_SESSION_HOST: XXXZZZ187
ANALYSIS_SESSION_TIME: 06-06-2019 11:52:09.0170
ANALYSIS_VERSION: 10.0.18362.1 amd64fre
EXCEPTION_RECORD: ffffd00190f3d9f8 -- (.exr 0xffffd00190f3d9f8)
.exr 0xffffd00190f3d9f8
ExceptionAddress: 0000000000000000
ExceptionCode: 00000000
ExceptionFlags: 00000000
NumberParameters: 0
TRAP_FRAME: fffff801670e8000 -- (.trap 0xfffff801670e8000)
.trap 0xfffff801670e8000
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=2e00000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000100000000 rsi=0000000000000000 rdi=0000000000000000
rip=0000000000000000 rsp=0000000000000000 rbp=0000000000000000
r8=00000000001300ff r9=fffff801670e8b30 r10=fffff801670ded60
r11=fffff801670debe8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di pl nz na po cy
00000000`00000000 ?? ???
.trap
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80259ee3ac6 to fffff80259f4a1a0
STACK_TEXT:
ffffd001`90f3d088 fffff802`59ee3ac6 : 00000000`0000001e ffffffff`c0000005 fffff802`59f5b1d1 00000000`00000000 : nt!KeBugCheckEx
ffffd001`90f3d090 fffff802`59f5a502 : ffffd001`90f3d9f8 00000000`00000020 fffff801`670e8000 ffffd001`90f3ddc0 : nt!KiDispatchException+0x1da
ffffd001`90f3d770 fffff802`59f57526 : ffffd001`90f3da20 fffff801`656320bb ffff0002`9000da00 00000000`00000054 : nt!KiExceptionDispatch+0xc2
ffffd001`90f3d950 fffff802`59f5b1d1 : cf47c200`0005b951 003af62d`0005f262 004203f2`1e5c6000 11f6f000`00011c36 : nt!KiGeneralProtectionFault+0x2e6
ffffd001`90f3dae8 cf47c200`0005b951 : 003af62d`0005f262 004203f2`1e5c6000 11f6f000`00011c36 0030165c`00017c3c : nt!memcpy+0x51
ffffd001`90f3daf0 003af62d`0005f262 : 004203f2`1e5c6000 11f6f000`00011c36 0030165c`00017c3c 003632e5`85183000 : 0xcf47c200`0005b951
ffffd001`90f3daf8 004203f2`1e5c6000 : 11f6f000`00011c36 0030165c`00017c3c 003632e5`85183000 002d1711`00000000 : 0x003af62d`0005f262
ffffd001`90f3db00 11f6f000`00011c36 : 0030165c`00017c3c 003632e5`85183000 002d1711`00000000 00000000`00000000 : 0x004203f2`1e5c6000
ffffd001`90f3db08 0030165c`00017c3c : 003632e5`85183000 002d1711`00000000 00000000`00000000 00000000`00000001 : 0x11f6f000`00011c36
ffffd001`90f3db10 003632e5`85183000 : 002d1711`00000000 00000000`00000000 00000000`00000001 ffffe000`11b77590 : 0x0030165c`00017c3c
ffffd001`90f3db18 002d1711`00000000 : 00000000`00000000 00000000`00000001 ffffe000`11b77590 ffffe000`13a2bdb0 : 0x003632e5`85183000
ffffd001`90f3db20 00000000`00000000 : 00000000`00000001 ffffe000`11b77590 ffffe000`13a2bdb0 ffffe000`15a30880 : 0x002d1711`00000000
THREAD_SHA1_HASH_MOD_FUNC: 0cb1c6b89fea5447619b132a05aefa05a432e648
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 477eb5b46a8b6977a5b3a9a32de170de6909c3ae
THREAD_SHA1_HASH_MOD: f08ac56120cad14894587db086f77ce277bfae84
FOLLOWUP_IP:
nt!KiDispatchException+1da
fffff802`59ee3ac6 cc int 3
FAULT_INSTR_CODE: ae8b4dcc
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!KiDispatchException+1da
FOLLOWUP_NAME: MachineOwner
IMAGE_NAME: Unknown_Image
DEBUG_FLR_IMAGE_TIMESTAMP: 0
STACK_COMMAND: .thread ; .cxr ; kb
MODULE_NAME: Unknown_Module
BUCKET_ID: RAISED_IRQL_USER_FAULT_0x1E_c0000005_R
DEFAULT_BUCKET_ID: RAISED_IRQL_USER_FAULT_0x1E_c0000005_R
PRIMARY_PROBLEM_CLASS: RAISED_IRQL_USER_FAULT_0x1E_c0000005_R
FAILURE_BUCKET_ID: RAISED_IRQL_USER_FAULT_0x1E_c0000005_R
TARGET_TIME: 2019-06-05T16:59:28.000Z
OSBUILD: 9600
OSSERVICEPACK: 0
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 3
OSPLATFORM_TYPE: x64
OSNAME: Windows 8.1
OSEDITION: Windows 8.1 Server TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2019-01-08 20:01:52
BUILDDATESTAMP_STR: 190108-1700
BUILDLAB_STR: winblue_ltsb_escrow
BUILDOSVER_STR: 6.3.9600.19263.amd64fre.winblue_ltsb_escrow.190108-1700
ANALYSIS_SESSION_ELAPSED_TIME: 81eb
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:raised_irql_user_fault_0x1e_c0000005_r
FAILURE_ID_HASH: {d1e1826c-605d-7a79-a04d-b8220695ad88}
Followup: MachineOwner
---------
rax=ffffffffffffffff rbx=ffffd00190f3d8a8 rcx=000000000000001e
rdx=ffffffffc0000005 rsi=ffffd00190f3d950 rdi=ffffe00015a30918
rip=fffff80259f4a1a0 rsp=ffffd00190f3d088 rbp=ffffd00190f3d5c0
r8=fffff80259f5b1d1 r9=0000000000000000 r10=0000000000000000
r11=0000000000000122 r12=000000000010001f r13=ffffe00015a30800
r14=ffffd00190f3d0c0 r15=ffffd00190f3d770
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00000246
nt!KeBugCheckEx:
fffff802`59f4a1a0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffd001`90f3d090=000000000000001e
Child-SP RetAddr : Args to Child : Call Site
ffffd001`90f3d088 fffff802`59ee3ac6 : 00000000`0000001e ffffffff`c0000005 fffff802`59f5b1d1 00000000`00000000 : nt!KeBugCheckEx
ffffd001`90f3d090 fffff802`59f5a502 : ffffd001`90f3d9f8 00000000`00000020 fffff801`670e8000 ffffd001`90f3ddc0 : nt!KiDispatchException+0x1da
ffffd001`90f3d770 fffff802`59f57526 : ffffd001`90f3da20 fffff801`656320bb ffff0002`9000da00 00000000`00000054 : nt!KiExceptionDispatch+0xc2
ffffd001`90f3d950 fffff802`59f5b1d1 : cf47c200`0005b951 003af62d`0005f262 004203f2`1e5c6000 11f6f000`00011c36 : nt!KiGeneralProtectionFault+0x2e6 (TrapFrame @ ffffd001`90f3d950)
ffffd001`90f3dae8 cf47c200`0005b951 : 003af62d`0005f262 004203f2`1e5c6000 11f6f000`00011c36 0030165c`00017c3c : nt!memcpy+0x51
ffffd001`90f3daf0 003af62d`0005f262 : 004203f2`1e5c6000 11f6f000`00011c36 0030165c`00017c3c 003632e5`85183000 : 0xcf47c200`0005b951
ffffd001`90f3daf8 004203f2`1e5c6000 : 11f6f000`00011c36 0030165c`00017c3c 003632e5`85183000 002d1711`00000000 : 0x003af62d`0005f262
ffffd001`90f3db00 11f6f000`00011c36 : 0030165c`00017c3c 003632e5`85183000 002d1711`00000000 00000000`00000000 : 0x004203f2`1e5c6000
ffffd001`90f3db08 0030165c`00017c3c : 003632e5`85183000 002d1711`00000000 00000000`00000000 00000000`00000001 : 0x11f6f000`00011c36
ffffd001`90f3db10 003632e5`85183000 : 002d1711`00000000 00000000`00000000 00000000`00000001 ffffe000`11b77590 : 0x0030165c`00017c3c
ffffd001`90f3db18 002d1711`00000000 : 00000000`00000000 00000000`00000001 ffffe000`11b77590 ffffe000`13a2bdb0 : 0x003632e5`85183000
ffffd001`90f3db20 00000000`00000000 : 00000000`00000001 ffffe000`11b77590 ffffe000`13a2bdb0 ffffe000`15a30880 : 0x002d1711`00000000
start end module name
fffff801`65211000 fffff801`6528e000 mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Fri Jul 4 05:59:36 2014 (53B6A538)
fffff801`6528e000 fffff801`6529c000 werkernel werkernel.sys Thu Aug 22 04:40:24 2013 (5215F8A8)
fffff801`6529c000 fffff801`652fe000 CLFS CLFS.SYS Thu Apr 5 10:49:28 2018 (5AC661A8)
fffff801`652fe000 fffff801`65320000 tm tm.sys Thu Dec 6 11:34:36 2018 (5C0979CC)
fffff801`65320000 fffff801`65335000 PSHED PSHED.dll Sat Sep 14 06:57:19 2013 (52346B3F)
fffff801`65335000 fffff801`6533f000 BOOTVID BOOTVID.dll Thu Aug 22 04:40:26 2013 (5215F8AA)
fffff801`6533f000 fffff801`6534a000 cmimcext cmimcext.sys Sun Oct 9 07:08:50 2016 (57FA4F72)
fffff801`6534a000 fffff801`653d2000 CI CI.dll Sat May 12 12:39:45 2018 (5AF74301)
fffff801`653d2000 fffff801`653f1000 HIDCLASS HIDCLASS.SYS Fri May 13 16:08:24 2016 (57365E68)
fffff801`65400000 fffff801`6540a000 WMILIB WMILIB.SYS Thu Aug 22 04:40:23 2013 (5215F8A7)
fffff801`6541a000 fffff801`65475000 msrpc msrpc.sys Sat Nov 10 09:46:09 2018 (5BE71961)
fffff801`65475000 fffff801`65544000 Wdf01000 Wdf01000.sys Thu Aug 22 04:38:56 2013 (5215F850)
fffff801`65544000 fffff801`65555000 WDFLDR WDFLDR.SYS Thu Aug 22 04:39:03 2013 (5215F857)
fffff801`65555000 fffff801`6556d000 acpiex acpiex.sys Thu Aug 22 04:37:47 2013 (5215F80B)
fffff801`6556d000 fffff801`65578000 WppRecorder WppRecorder.sys Thu Aug 22 04:39:40 2013 (5215F87C)
fffff801`65578000 fffff801`65600000 ACPI ACPI.sys Sat Feb 10 08:02:05 2018 (5A7F177D)
fffff801`65600000 fffff801`6561e000 intelppm intelppm.sys Wed Jun 20 09:58:06 2018 (5B2A879E)
fffff801`65626000 fffff801`656b3000 cng cng.sys Sat May 12 12:39:45 2018 (5AF74301)
fffff801`656b3000 fffff801`656ca000 mpsdrv mpsdrv.sys Thu Aug 9 09:41:25 2018 (5B6C6EB5)
fffff801`656ce000 fffff801`657e5000 NDIS NDIS.SYS Sat Jun 30 09:48:29 2018 (5B37B45D)
fffff801`657e5000 fffff801`65800000 mountmgr mountmgr.sys Sat May 6 11:34:28 2017 (590E1734)
fffff801`65800000 fffff801`6585f000 volmgrx volmgrx.sys Fri Jul 7 07:19:15 2017 (595F9863)
fffff801`6585f000 fffff801`6587c000 vmbus vmbus.sys Sat May 6 11:32:02 2017 (590E16A2)
fffff801`6587c000 fffff801`65893000 vmbkmcl vmbkmcl.sys Sat May 6 11:33:40 2017 (590E1704)
fffff801`65893000 fffff801`658a8000 winhv winhv.sys Sat May 6 11:34:29 2017 (590E1735)
fffff801`658b5000 fffff801`6592c000 NETIO NETIO.SYS Sat May 27 11:29:31 2017 (5929C58B)
fffff801`6592c000 fffff801`65939000 vdrvroot vdrvroot.sys Thu Aug 22 04:38:49 2013 (5215F849)
fffff801`65939000 fffff801`65955000 pdc pdc.sys Wed Jul 5 23:19:51 2017 (595DD687)
fffff801`65955000 fffff801`6596d000 partmgr partmgr.sys Wed Oct 8 00:34:42 2014 (5434E912)
fffff801`6596d000 fffff801`659d8000 spaceport spaceport.sys Tue Jan 10 14:37:47 2017 (5875623B)
fffff801`659d8000 fffff801`659ee000 volmgr volmgr.sys Sat Apr 9 14:31:30 2016 (570974B2)
fffff801`659ee000 fffff801`65a00000 kbdclass kbdclass.sys Mon Nov 3 22:54:54 2014 (5458783E)
fffff801`65a00000 fffff801`65a39000 ndiswan ndiswan.sys Tue Apr 5 15:37:23 2016 (57043E23)
fffff801`65a39000 fffff801`65a4a000 umbus umbus.sys Thu Aug 22 04:38:59 2013 (5215F853)
fffff801`65a4a000 fffff801`65a54000 hyperkbd hyperkbd.sys Mon Jan 8 22:19:27 2018 (5A545EEF)
fffff801`65a54000 fffff801`65a60000 HyperVideo HyperVideo.sys Mon Jan 8 22:20:19 2018 (5A545F23)
fffff801`65a60000 fffff801`65abc000 fltmgr fltmgr.sys Mon Jan 1 21:40:16 2018 (5A4B1B40)
fffff801`65abc000 fffff801`65bf1000 CyProtectDrv64 CyProtectDrv64.sys Wed Mar 13 13:21:58 2019 (5C896666)
fffff801`65c00000 fffff801`65c2f000 cdrom cdrom.sys Tue Dec 5 07:24:08 2017 (5A26BA18)
fffff801`65c2f000 fffff801`65c38000 Null Null.SYS Thu Aug 22 04:40:24 2013 (5215F8A8)
fffff801`65c38000 fffff801`65c45000 BasicRender BasicRender.sys Wed Nov 8 07:55:00 2017 (5A0328D4)
fffff801`65c45000 fffff801`65c54000 nsiproxy nsiproxy.sys Sun Aug 13 10:19:15 2017 (59908A13)
fffff801`65c54000 fffff801`65c60000 npsvctrig npsvctrig.sys Thu Aug 22 04:38:22 2013 (5215F82E)
fffff801`65c60000 fffff801`65c6c000 mssmbios mssmbios.sys Thu Aug 22 04:39:41 2013 (5215F87D)
fffff801`65c6c000 fffff801`65c93000 dfsc dfsc.sys Mon Jan 1 21:38:50 2018 (5A4B1AEA)
fffff801`65c93000 fffff801`65caa000 ahcache ahcache.sys Thu Dec 11 16:51:20 2014 (548A3C08)
fffff801`65caa000 fffff801`65cb6000 ndistapi ndistapi.sys Fri Nov 7 20:00:40 2014 (545D9568)
fffff801`65cb6000 fffff801`65cd3000 rassstp rassstp.sys Tue Oct 28 19:45:50 2014 (545054DE)
fffff801`65cd3000 fffff801`65ce2000 CompositeBus CompositeBus.sys Thu Aug 22 04:38:48 2013 (5215F848)
fffff801`65ce3000 fffff801`65edb000 Ntfs Ntfs.sys Sat Dec 8 09:16:10 2018 (5C0BFC5A)
fffff801`65edb000 fffff801`65ef7000 ksecdd ksecdd.sys Tue Oct 28 19:47:36 2014 (54505548)
fffff801`65ef7000 fffff801`65f03000 storvsc storvsc.sys Mon Jan 8 22:19:23 2018 (5A545EEB)
fffff801`65f03000 fffff801`65f64000 storport storport.sys Sun Sep 17 11:52:55 2017 (59BEC487)
fffff801`65f64000 fffff801`65f74000 pcw pcw.sys Thu Aug 22 01:46:34 2013 (5215CFEA)
fffff801`65f74000 fffff801`65f7f000 Fs_Rec Fs_Rec.sys Thu Aug 22 01:46:33 2013 (5215CFE9)
fffff801`65f7f000 fffff801`65fb0000 ksecpkg ksecpkg.sys Thu Dec 27 15:47:09 2018 (5C25647D)
fffff801`65fb0000 fffff801`65fd0000 bowser bowser.sys Wed Jul 18 06:34:36 2018 (5B4F41EC)
fffff801`65fd3000 fffff801`65ff2000 AgileVpn AgileVpn.sys Thu Jul 7 15:32:00 2016 (577ED860)
fffff801`65ff2000 fffff801`65ffd000 kdnic kdnic.sys Thu Aug 22 04:38:26 2013 (5215F832)
fffff801`66000000 fffff801`66020000 mup mup.sys Wed Apr 6 11:22:23 2016 (570553DF)
fffff801`6602c000 fffff801`66048000 disk disk.sys Thu Jul 6 01:55:00 2017 (595DFAE4)
fffff801`66048000 fffff801`6609c000 CLASSPNP CLASSPNP.SYS Fri May 6 08:18:22 2016 (572CB5BE)
fffff801`6609e000 fffff801`66302000 tcpip tcpip.sys Tue Aug 28 06:42:05 2018 (5B85512D)
fffff801`66302000 fffff801`6636e000 fwpkclnt fwpkclnt.sys Thu May 24 06:38:35 2018 (5B06C05B)
fffff801`6636e000 fffff801`66393000 wfplwfs wfplwfs.sys Mon Jan 1 21:38:17 2018 (5A4B1AC9)
fffff801`66393000 fffff801`663e4000 volsnap volsnap.sys Fri Mar 11 06:44:06 2016 (56E2D9B6)
fffff801`663e4000 fffff801`663f9000 crashdmp crashdmp.sys Thu Aug 22 04:40:03 2013 (5215F893)
fffff801`66600000 fffff801`66611000 netbios netbios.sys Mon Jan 1 21:39:30 2018 (5A4B1B12)
fffff801`66611000 fffff801`6667f000 rdbss rdbss.sys Mon Jan 1 21:38:59 2018 (5A4B1AF3)
fffff801`6667f000 fffff801`66698000 wanarp wanarp.sys Sat Dec 8 11:00:49 2018 (5C0C14E1)
fffff801`66698000 fffff801`6669d500 VMBusHID VMBusHID.sys Mon Jan 8 22:19:30 2018 (5A545EF2)
fffff801`6669e000 fffff801`6681c000 dxgkrnl dxgkrnl.sys Sat Oct 6 09:46:48 2018 (5BB8E6F8)
fffff801`6681c000 fffff801`6682e000 watchdog watchdog.sys Sat Feb 22 04:14:39 2014 (530894AF)
fffff801`6682e000 fffff801`66891000 dxgmms1 dxgmms1.sys Sat Oct 6 09:46:35 2018 (5BB8E6EB)
fffff801`66891000 fffff801`668a3000 BasicDisplay BasicDisplay.sys Thu Aug 22 04:39:31 2013 (5215F873)
fffff801`668a3000 fffff801`668b7000 Npfs Npfs.SYS Thu Aug 22 04:40:25 2013 (5215F8A9)
fffff801`668b7000 fffff801`668c3000 Msfs Msfs.SYS Thu Aug 22 04:40:24 2013 (5215F8A8)
fffff801`668c3000 fffff801`668e3000 tdx tdx.sys Tue Aug 1 20:17:15 2017 (5981443B)
fffff801`668e3000 fffff801`668f1000 TDI TDI.SYS Thu Aug 22 04:39:01 2013 (5215F855)
fffff801`668f1000 fffff801`6693c000 netbt netbt.sys Thu Aug 10 20:27:54 2017 (598D243A)
fffff801`6693c000 fffff801`669cc000 afd afd.sys Wed Jan 10 06:48:05 2018 (5A5627A5)
fffff801`669cc000 fffff801`669f6000 pacer pacer.sys Mon Jan 1 21:37:59 2018 (5A4B1AB7)
fffff801`669f6000 fffff801`669fe080 HIDPARSE HIDPARSE.SYS Mon Jan 7 20:54:34 2019 (5C342D0A)
fffff801`66a00000 fffff801`66a17000 dump_vmbkmcl dump_vmbkmcl.sys Sat May 6 11:33:40 2017 (590E1704)
fffff801`66a17000 fffff801`66a25000 monitor monitor.sys Thu Aug 22 04:36:37 2013 (5215F7C5)
fffff801`66a25000 fffff801`66a3d000 rspndr rspndr.sys Thu Aug 22 04:36:34 2013 (5215F7C2)
fffff801`66a49000 fffff801`66a5d000 lltdio lltdio.sys Thu Aug 22 04:36:18 2013 (5215F7B2)
fffff801`66a69000 fffff801`66a85000 netvsc63 netvsc63.sys Thu Apr 5 10:47:55 2018 (5AC6614B)
fffff801`66a85000 fffff801`66a8f000 vmgencounter vmgencounter.sys Mon Jan 8 22:19:49 2018 (5A545F05)
fffff801`66a8f000 fffff801`66ab0000 raspptp raspptp.sys Thu Aug 22 04:35:51 2013 (5215F797)
fffff801`66ab0000 fffff801`66ad0000 rasl2tp rasl2tp.sys Tue Feb 2 10:16:20 2016 (56B0F274)
fffff801`66ad0000 fffff801`66adb000 NdisVirtualBus NdisVirtualBus.sys Thu Aug 22 04:36:25 2013 (5215F7B9)
fffff801`66adb000 fffff801`66af6000 raspppoe raspppoe.sys Thu Aug 22 04:36:37 2013 (5215F7C5)
fffff801`66af6000 fffff801`66af7600 swenum swenum.sys Tue Oct 28 19:47:41 2014 (5450554D)
fffff801`66af8000 fffff801`66b44000 ks ks.sys Thu Aug 23 15:54:51 2018 (5B7F3B3B)
fffff801`66b44000 fffff801`66b4f000 rdpbus rdpbus.sys Thu Aug 22 04:38:52 2013 (5215F84C)
fffff801`66b4f000 fffff801`66b66000 NDProxy NDProxy.SYS Mon Jan 1 21:39:05 2018 (5A4B1AF9)
fffff801`66b66000 fffff801`66b73000 mouhid mouhid.sys Mon Nov 3 22:54:47 2014 (54587837)
fffff801`66b73000 fffff801`66b83000 mouclass mouclass.sys Mon Nov 3 22:54:47 2014 (54587837)
fffff801`66b83000 fffff801`66bbc000 fastfat fastfat.SYS Thu Aug 22 04:40:18 2013 (5215F8A2)
fffff801`66bbc000 fffff801`66bd7000 cdfs cdfs.sys Thu Aug 22 04:40:15 2013 (5215F89F)
fffff801`66bd7000 fffff801`66be3000 dump_diskdump dump_diskdump.sys Thu Aug 22 04:40:18 2013 (5215F8A2)
fffff801`66be3000 fffff801`66bef000 dump_storvsc dump_storvsc.sys Mon Jan 8 22:19:23 2018 (5A545EEB)
fffff801`66c00000 fffff801`66ca9000 peauth peauth.sys Sat Feb 22 04:09:37 2014 (53089381)
fffff801`66cde000 fffff801`66d4a000 mrxsmb mrxsmb.sys Sat Sep 1 09:43:27 2018 (5B8AC1AF)
fffff801`66d4a000 fffff801`66d81000 mrxsmb20 mrxsmb20.sys Wed Feb 1 11:44:06 2017 (58923A86)
fffff801`66e00000 fffff801`66e4c000 mrxsmb10 mrxsmb10.sys Thu Sep 7 14:32:10 2017 (59B1BADA)
fffff801`66e4c000 fffff801`66e8e000 srvnet srvnet.sys Sat Jan 5 09:46:01 2019 (5C30ED59)
fffff801`66e8e000 fffff801`66ea0000 tcpipreg tcpipreg.sys Thu Mar 6 01:19:59 2014 (53183DBF)
fffff801`66eee000 fffff801`66fe7000 HTTP HTTP.sys Mon Jan 1 21:38:55 2018 (5A4B1AEF)
fffff801`66fe7000 fffff801`66ff7000 condrv condrv.sys Thu Aug 22 04:40:17 2013 (5215F8A1)
fffff801`67000000 fffff801`6702d000 tunnel tunnel.sys Fri Sep 4 12:24:03 2015 (55E9EFD3)
fffff801`6702d000 fffff801`67038000 rdpvideominiport rdpvideominiport.sys Tue Oct 28 19:47:25 2014 (5450553D)
fffff801`67038000 fffff801`6706c000 rdpdr rdpdr.sys Thu Aug 22 04:36:46 2013 (5215F7CE)
fffff801`6706c000 fffff801`67079000 terminpt terminpt.sys Thu Aug 22 04:39:16 2013 (5215F864)
fffff801`670ad000 fffff801`6715c000 srv2 srv2.sys Sat Jan 5 09:47:00 2019 (5C30ED94)
fffff801`6715c000 fffff801`671ea000 srv srv.sys Mon Jan 1 21:38:44 2018 (5A4B1AE4)
fffff802`5916c000 fffff802`59175000 kd kd.dll Thu Aug 22 04:40:43 2013 (5215F8BB)
fffff802`59e0a000 fffff802`5a589000 nt ntkrnlmp.exe Tue Jan 8 19:01:52 2019 (5C356420)
fffff802`5a589000 fffff802`5a5f8000 hal hal.dll Fri Mar 9 06:53:04 2018 (5AA29FD0)
fffff960`0011b000 fffff960`00530000 win32k win32k.sys Sat Jan 5 09:47:29 2019 (5C30EDB1)
fffff960`006ed000 fffff960`006f6000 TSDDD TSDDD.dll Thu Aug 22 04:40:32 2013 (5215F8B0)
fffff960`00904000 fffff960`0093e000 cdd cdd.dll Tue Oct 28 20:51:32 2014 (54506444)
fffff960`00adf000 fffff960`00b05000 RDPUDD RDPUDD.dll Sat Mar 4 11:24:19 2017 (58BB1463)
Unloaded modules:
fffff801`65abc000 fffff801`65bf0000 CyProtectDrv64.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00134000
fffff801`66a25000 fffff801`66a49000 luafv.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00024000
fffff801`66020000 fffff801`6602c000 dump_storport.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000C000
fffff801`65fbc000 fffff801`65fd3000 dump_vmbkmcl.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00017000
fffff801`65fb0000 fffff801`65fbc000 dump_storvsc.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000C000
fffff801`66020000 fffff801`6602c000 hwpolicy.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000C000
fffff801`656b3000 fffff801`656ce000 sacdrv.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0001B000
Closing open log file c:\debuglog.txt
Rgds, Bairavamoorthy
Greetings,
We have 4 physical hyper v host with 2 processors 24 core each and running with windows server 2012 r2 data center.
My Question:
How many data center license do we have to purchased as license is per core 24x4=96.
9EA-00278 WinSvrDCCore ALNG SA MVL 2 Lic CoreLic.
So If 2Lic CoreLic x 12 (cores) x 4(hosts) =96 cores.
The below link is helpful but want to double check prior to submitting my report to my superior.
https://www.bpsme.com/microsoft-windows-server-and-system-center-core-licensing-update/
I am using this feature to limit the a user so it can connect to a list of hosts, I'd like to define it in the AD to keep it centralized if possible.
After some trouble i found out this post here that explains that unless you add both the client and the server in the list it won't work.
Are there any workarounds for this? I am having trouble because this precise user is connecting from his computer that is not joined into our domain and I can't list all the hosts he will be using to connect from.
Hi,
Is there a command I can run on client to check if KMS server is hardcoded on the client?
there is the /ckms to clear but would like to know if there is a similar command to check if hardcoded to point to a KMS host?
Thanks
Good evening
I was wondering if you guys/girls would be able to help me troubleshoot a DirectAccess deployment problem...???
I have set up a lab environment that is fully internet facing (where it needs to be); my DA server has two consecutive IP addresses to enable Teredo usage.
My problem is this...my DA client device connects using Teredo, but the user logging on connects via IP-HTTPS. Due to the 355KBps issue, I'm clearly wanting to use the Teredo connection (I've attached a screenshot). I see there's a 30 second
difference in the two connection times; is that relevant to anything? You see nothing, save for a minus sign, at the username column for the Teredo connection.
Any ideas why it connects to Teredo but opts for IP-HTTPS instead?
Kind regards
Chris D
Cheers CD
Hiya
we are migrating from FRS to DFSR for Sysvol replication.
we have one RODC in the domain and it is being stubborn and still says waiting for initial sync.
I have tried polling the device
Forcing replication from the RODC using Repadmin /syncall
I have run dfsrmig /CreateGlobalObjects from the PDC
When I use the cmd Repadmin /showrepl the device seems to have synced ok
what can I do now its been 24hours since I ran step one of the migration?
cheers Mike
Hi Team,
Can anybody confirm what this the current version of MSMQ in Windows Server 2016.
Last version was 6.3 in Windows Server 2012 R2.
Naveed Amir
Having a hard stop to find ways to delete pagefile.sys while windows server 2008 r2 is operational .
Anand Shankar
Hi Team,
We have Windows Server 2008 R2 x64, in which we installed KB4480970 in during January 2019 release now I am looking the update history, I did not find KB4480970 in Update History, I am surprised so I checked Windows Update Catalog I found that KB4486563 is replacing the KB4480970.
Now we have audit in next month I am worrying if KB4480970 is not listed in update history, then it should not as non-compliance.
Can any one tell me can I install KB4480970 in my server ?
Hi All,
Recently we built a physical Windows 2012 R2 server, since last month we see repeated number of Error Events in Application Log :
Error ID 2001 - Source : Usbperf
Unable to read the "First Counter" value under the usbperf\Performance Key. Status codes returned in data.
On running Perfmon the usbperf counter is missing from it
We already tried lodctr /r for System32 and SysWOW64 to rebuild the counters but still errors are getting generated.
Could you please let me know what else could be done to troubleshoot this error?
I already went through and tried rebuilding the counters
https://social.technet.microsoft.com/Forums/windows/en-US/eff5eeb6-e173-446e-9c79-841918087274/perflib-event-id-1008-1001-1023-2001-on-net-asp-bits-dns-esent-usbperf?forum=winservergen
Thanks
I have been using Robocopy nightly to backup files to a NAS appliance. Recently I added the "/LOG:file" argument, so a log can be reviewed each day for evaluation of backup success. I am looking for an output of just the results, not the verbose line by line tally of files copied. I desire only the results, such as:
Total Copied Skipped Mismatch FAILED Extras
Dirs : 37831 154 0 0 0 8
Files : 238420 1533 236646 0 241 230
Bytes : 598.635 g 10.533 g 588.090 g 0 12.16 m 1.181 g
Times : 0:43:33 0:06:03 0:22:18 0:15:10
But my log file is also filling up with details of each file copied. Is there a way to create a log file that only shows the total files available, total backed up, and total missed? Also, I am not sure what the column labeled "Extras" above means.
So any help would be appreciated.
Thanks.
Hello, while testing/playing with Server 2008, in my two separate test domains. One, a 4 DC native 2008 domain and two, a mixed 2003 R2 / 2008 domain. I noticed whenever I right click on my domain, from one of the roles, and choose change domain controller, and the change Directory Server menu comes up. It also shows my W2K8 DC's status as being Unavailable. My W2K3 DC's all show Online. Why is that? It does not prevent me from managing them or performing any function that i know of. I have the firewall's off thinking it was some kind of SNMP traffic but that didn't change anything.
Any ideas?
Thanks
Looking for help with the VSS service on Windows Server 2008 R2 Datacenter. My backup software (EMC Networker) fails to capture the DISASTER RECOVERY data it needs for a bare metal recovery. When it fails the backup software gives me an error message as follows
181407:save: Step (1 of 5) for PID-9712: Save has been started on the client 'abdas-server'.
174412:save: Step (2 of 5) for PID-9712: Running the backup on the client 'abdas-server' for the save set 'pseudo_saveset'.
174424:save: Step (3 of 5) for PID-9712: Creating the snapshot for the selected save sets.
VSS OTHER: ERROR: VSS failed to process snapshot:
176575:save: Unable to save the SYSTEM STATE save sets and create the snapshot.
176571:save: Step (4 of 5) for PID-9712: Unable to complete the backup of the disaster recovery save sets. See the savegrp log to track the closure steps of the backup.
176572:save: Error occurred during the backup of the disaster recovery save sets.
--- Job Indications ---
abdas-server:pseudo_saveset: retried 1 times.
If I check Windows Event Viewer I find the following error.
Volume Shadow Copy Service error: Unexpected error DeviceIoControl(\\?\Volume{f68daa31-c393-11e2-a67c-806e6f6e6963} - 00000000000001EC,0x0053c008,00000000008BE500,0,00000000008BF510,4096,[0]). hr = 0x80070057, The parameter is incorrect.
.
Operation:
Processing EndPrepareSnapshots
Context:
Execution Context: System Provider
I've done a plethora of troubleshooting at the behest of the backup vendor and a microsoft chat support person which has resolved the issue on 2 other systems. On this system I have done the following
Rebooted and run chkdsk
Restarted the VSS writer services
Re-registered the VSS writer services
Set the shadow copy space to unlimited and deleted the prior shadows and created a new one. (The system has 300 GB free out of 528 on the OS drive)
Upgraded the backup client
On the other systems I also did a clean boot with all services disabled but that didn't make a different. This one being a server I was unable to do that since it is a production system that can't go down without prior planning and advance notice.
Has anyone else seen this and resolved it?