Advertisement
Guest User

Untitled

a guest
Jul 27th, 2017
939
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 146.95 KB | None | 0 0
  1. Microsoft (R) Windows Debugger Version 10.0.14321.1024 X86
  2. Copyright (c) Microsoft Corporation. All rights reserved.
  3.  
  4. ========================================================================
  5. =================== Dump File: 072617-6765-01.dmp ====================
  6. ========================================================================
  7. Mini Kernel Dump File: Only registers and stack trace are available
  8. Windows 10 Kernel Version 14393 MP (8 procs) Free x64
  9. Product: WinNt, suite: TerminalServer SingleUserTS Personal
  10. Built by: 14393.1480.amd64fre.rs1_release.170706-2004
  11. Kernel base = 0xfffff803`58a79000 PsLoadedModuleList = 0xfffff803`58d78040
  12. Debug session time: Wed Jul 26 20:15:27.867 2017 (UTC - 4:00)
  13. System Uptime: 0 days 5:24:08.623
  14.  
  15. BugCheck 50, {ffffc389f50268d8, 0, fffff803590d8de7, 2}
  16. Could not read faulting driver name
  17. Probably caused by : memory_corruption
  18. Followup: memory_corruption
  19.  
  20. PAGE_FAULT_IN_NONPAGED_AREA (50)
  21. Invalid system memory was referenced. This cannot be protected by try-except.
  22. Typically the address is just plain bad or it is pointing at freed memory.
  23.  
  24. Arguments:
  25. Arg1: ffffc389f50268d8, memory referenced.
  26. Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
  27. Arg3: fffff803590d8de7, If non-zero, the instruction address which referenced the bad memory
  28. address.
  29. Arg4: 0000000000000002, (reserved)
  30.  
  31. Debugging Details:
  32. Could not read faulting driver name
  33. DUMP_CLASS: 1
  34. DUMP_QUALIFIER: 400
  35. BUILD_VERSION_STRING: 10.0.14393.1480 (rs1_release.170706-2004)
  36. SYSTEM_MANUFACTURER: MSI
  37. SYSTEM_PRODUCT_NAME: MS-7693
  38. SYSTEM_VERSION: 4.0
  39. BIOS_VENDOR: American Megatrends Inc.
  40. BIOS_VERSION: V22.4
  41. BIOS_DATE: 12/21/2015
  42. BASEBOARD_MANUFACTURER: MSI
  43. BASEBOARD_PRODUCT: 970 GAMING (MS-7693)
  44. BASEBOARD_VERSION: 4.0
  45. DUMP_TYPE: 2
  46. READ_ADDRESS: fffff80358e19338: Unable to get MiVisibleState
  47. ffffc389f50268d8 Paged pool
  48. FAULTING_IP:
  49. nt!ObpCaptureHandleInformation+63
  50. fffff803`590d8de7 0fb64218 movzx eax,byte ptr [rdx+18h]
  51. MM_INTERNAL_CODE: 2
  52. CPU_COUNT: 8
  53. CPU_MHZ: fa0
  54. CPU_VENDOR: AuthenticAMD
  55. CPU_FAMILY: 15
  56. CPU_MODEL: 2
  57. CPU_STEPPING: 0
  58. CUSTOMER_CRASH_COUNT: 1
  59. DEFAULT_BUCKET_ID: CODE_CORRUPTION
  60. BUGCHECK_STR: AV
  61.  
  62. PROCESS_NAME: Steam.exe
  63.  
  64. CURRENT_IRQL: 0
  65. TRAP_FRAME: ffffd880ba971050 -- (.trap 0xffffd880ba971050)
  66. NOTE: The trap frame does not contain all registers.
  67. Some register values may be zeroed or incorrect.
  68. rax=00ffffc389f50268 rbx=0000000000000000 rcx=0000000000000068
  69. rdx=ffffc389f50268c0 rsi=0000000000000000 rdi=0000000000000000
  70. rip=fffff803590d8de7 rsp=ffffd880ba9711e8 rbp=ffffc38df4ff3a50
  71. r8=ffffc38df4ff3a50 r9=000000000004d294 r10=ffffd880ba971278
  72. r11=0000000000001fe8 r12=0000000000000000 r13=0000000000000000
  73. r14=0000000000000000 r15=0000000000000000
  74. iopl=0 nv up ei pl nz ac pe cy
  75. nt!ObpCaptureHandleInformation+0x63:
  76. fffff803`590d8de7 0fb64218 movzx eax,byte ptr [rdx+18h] ds:ffffc389`f50268d8=??
  77. Resetting default scope
  78. LAST_CONTROL_TRANSFER: from fffff80358bf2e11 to fffff80358bc8960
  79. STACK_TEXT:
  80. ffffd880`ba970d58 fffff803`58bf2e11 : 00000000`00000050 ffffc389`f50268d8 00000000`00000000 ffffd880`ba971050 : nt!KeBugCheckEx
  81. ffffd880`ba970d60 fffff803`58ace0fd : 00000000`00000000 00000000`00000000 ffffd880`ba971050 ffffc389`f50268d8 : nt!MiSystemFault+0x100201
  82. ffffd880`ba970e50 fffff803`58bd1ffc : 00000000`00000000 00001f80`00ae0000 c38df38a`7580fffc ffffc38d`ee992040 : nt!MmAccessFault+0x27d
  83. ffffd880`ba971050 fffff803`590d8de7 : fffff803`5911e527 00000000`0004d294 00000000`00000000 ffff9802`00000000 : nt!KiPageFault+0x13c
  84. ffffd880`ba9711e8 fffff803`5911e527 : 00000000`0004d294 00000000`00000000 ffff9802`00000000 00000000`00000000 : nt!ObpCaptureHandleInformation+0x63
  85. ffffd880`ba9711f0 fffff803`590d8cfc : fffff803`590d8d84 ffffe87e`bf75b600 ffffd880`0058a4e0 ffffd880`ba971324 : nt!ExpSnapShotHandleTables+0x127
  86. ffffd880`ba971270 fffff803`5911c237 : ffffd880`ba971324 00000000`0035b5c8 00000000`0058a4e0 00000000`00000000 : nt!ObGetHandleInformation+0x3c
  87. ffffd880`ba9712b0 fffff803`590001d3 : 00000000`00000010 00000000`00020000 ffffe87e`bf400050 ffff9802`f38c5000 : nt!ExpGetHandleInformation+0x53
  88. ffffd880`ba9712f0 fffff803`58e7cb6b : 00000000`00000002 00000000`0000e000 ffffffff`ffffffff 00000000`00b90000 : nt!ExpQuerySystemInformation+0x183553
  89. ffffd880`ba971ac0 fffff803`58bd3693 : ffff9802`ec885480 00000000`00000000 ffffd880`ba971ad8 ffff9802`ec88a120 : nt!NtQuerySystemInformation+0x2b
  90. ffffd880`ba971b00 00007ffa`a35b67a4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
  91. 00000000`0af8e668 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`a35b67a4
  92. STACK_COMMAND: kb
  93. CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
  94. fffff80358acb1f5 - nt!MiCompletePrivateZeroFault+45
  95. [ f6:bf ]
  96. fffff80358acb9d1 - nt!MiCompletePrivateZeroFault+821 (+0x7dc)
  97. [ fa:ef ]
  98. fffff80358acba94 - nt!MiCompletePrivateZeroFault+8e4 (+0xc3)
  99. [ fa:ef ]
  100. fffff80358acbf22 - nt!MiAllocateWsle+422 (+0x48e)
  101. [ f6:bf ]
  102. fffff80358acd3d8 - nt!MiGetPage+98 (+0x14b6)
  103. [ fa:ef ]
  104. fffff80358acd5eb - nt!MiGetFreeOrZeroPage+7b (+0x213)
  105. [ fa:ef ]
  106. fffff80358acf3a4 - nt!MiResolvePageTablePage+54 (+0x1db9)
  107. [ f6:bf ]
  108. fffff80358ae33d1 - nt!MiInsertProtectedStandbyPage+21 (+0x1402d)
  109. [ fa:ef ]
  110. fffff80358afddb9 - nt!MiMakeZeroedPageTableRange+1d1 (+0x1a9e8)
  111. [ f6:bf ]
  112. fffff80358afde10 - nt!MiMakeZeroedPageTableRange+228 (+0x57)
  113. [ f6:bf ]
  114. fffff80358b8c2de - nt!MiPurgeZeroList+6e (+0x8e4ce)
  115. [ fa:ef ]
  116. 11 errors : !nt (fffff80358acb1f5-fffff80358b8c2de)
  117. MODULE_NAME: memory_corruption
  118.  
  119. IMAGE_NAME: memory_corruption
  120.  
  121. FOLLOWUP_NAME: memory_corruption
  122. DEBUG_FLR_IMAGE_TIMESTAMP: 0
  123. MEMORY_CORRUPTOR: LARGE
  124. FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
  125. BUCKET_ID: MEMORY_CORRUPTION_LARGE
  126. PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
  127. TARGET_TIME: 2017-07-27T00:15:27.000Z
  128. OSBUILD: 14393
  129. OSSERVICEPACK: 1480
  130. SERVICEPACK_NUMBER: 0
  131. OS_REVISION: 0
  132. SUITE_MASK: 784
  133. PRODUCT_TYPE: 1
  134. OSPLATFORM_TYPE: x64
  135. OSNAME: Windows 10
  136. OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
  137. USER_LCID: 0
  138. OSBUILD_TIMESTAMP: 2017-07-07 02:26:09
  139. BUILDDATESTAMP_STR: 170706-2004
  140. BUILDLAB_STR: rs1_release
  141. BUILDOSVER_STR: 10.0.14393.1480
  142. ANALYSIS_SESSION_ELAPSED_TIME: 49e0
  143. ANALYSIS_SOURCE: KM
  144. FAILURE_ID_HASH_STRING: km:memory_corruption_large
  145. FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
  146. Followup: memory_corruption
  147.  
  148. =============================== Drivers ================================
  149. ffffd41c`c6120000 ffffd41c`c612a000 TSDDD (deferred)
  150. Image path: \SystemRoot\System32\TSDDD.dll
  151. Image name: TSDDD.dll
  152. Timestamp: unavailable (00000000)
  153. fffff800`04fe0000 fffff800`04ffd000 mcupdate_AuthenticAMD (deferred)
  154. Image path: \SystemRoot\system32\mcupdate_AuthenticAMD.dll
  155. Image name: mcupdate_AuthenticAMD.dll
  156. Timestamp: Fri Jul 15 22:29:15 2016 (57899BFB)
  157. fffff800`06050000 fffff800`0605a000 Null (deferred)
  158. Image path: \SystemRoot\System32\Drivers\Null.SYS
  159. Image name: Null.SYS
  160. Timestamp: unavailable (00000000)
  161. fffff800`06070000 fffff800`06096000 ctxusbm (deferred)
  162. Image path: \SystemRoot\system32\DRIVERS\ctxusbm.sys
  163. Image name: ctxusbm.sys
  164. Timestamp: Mon Aug 29 09:14:23 2016 (57C4352F)
  165. fffff800`06480000 fffff800`067e5000 bwcW10x64 (deferred)
  166. Image path: \SystemRoot\system32\DRIVERS\bwcW10x64.sys
  167. Image name: bwcW10x64.sys
  168. Timestamp: Fri Jan 22 17:08:51 2016 (56A2A873)
  169. fffff800`06920000 fffff800`0692e000 MpKslf7edd665 (deferred)
  170. Image path: \??\C:\ProgramData\Microsoft\Windows Defender\Definition Updates\{477D63B7-88EF-4533-9167-7AB8BA3A4460}\MpKslf7edd665.sys
  171. Image name: MpKslf7edd665.sys
  172. Timestamp: Tue May 19 21:50:37 2015 (555BE86D)
  173. fffff800`06930000 fffff800`0693e000 MpKsl4b7f4181 (deferred)
  174. Image path: \??\C:\ProgramData\Microsoft\Windows Defender\Definition Updates\{12F8D1E2-47DB-4F1F-A80C-655A77F8AE9E}\MpKsl4b7f4181.sys
  175. Image name: MpKsl4b7f4181.sys
  176. Timestamp: Tue May 19 21:50:37 2015 (555BE86D)
  177. fffff800`06940000 fffff800`0694e000 MpKsl49b57fbd (deferred)
  178. Image path: \??\C:\ProgramData\Microsoft\Windows Defender\Definition Updates\{178D3882-493B-4A2D-82BB-E5A2386749D5}\MpKsl49b57fbd.sys
  179. Image name: MpKsl49b57fbd.sys
  180. Timestamp: Tue May 19 21:50:37 2015 (555BE86D)
  181. fffff800`06950000 fffff800`0695e000 MpKsl4386cc84 (deferred)
  182. Image path: \??\C:\ProgramData\Microsoft\Windows Defender\Definition Updates\{96E3F65E-1C91-4D2C-ACD5-BE30F969CF5D}\MpKsl4386cc84.sys
  183. Image name: MpKsl4386cc84.sys
  184. Timestamp: Tue May 19 21:50:37 2015 (555BE86D)
  185. fffff800`06960000 fffff800`0696e000 MpKsl312c2281 (deferred)
  186. Image path: \??\C:\ProgramData\Microsoft\Windows Defender\Definition Updates\{96E3F65E-1C91-4D2C-ACD5-BE30F969CF5D}\MpKsl312c2281.sys
  187. Image name: MpKsl312c2281.sys
  188. Timestamp: Tue May 19 21:50:37 2015 (555BE86D)
  189. fffff800`06970000 fffff800`0697e000 MpKsl2829a156 (deferred)
  190. Image path: \??\C:\ProgramData\Microsoft\Windows Defender\Definition Updates\{B21424A9-38BD-47AB-8E93-AB971B55EB4A}\MpKsl2829a156.sys
  191. Image name: MpKsl2829a156.sys
  192. Timestamp: Tue May 19 21:50:37 2015 (555BE86D)
  193. fffff800`06e00000 fffff800`06ec2000 peauth (deferred)
  194. Image path: \SystemRoot\system32\drivers\peauth.sys
  195. Image name: peauth.sys
  196. Timestamp: Fri Jul 15 22:24:39 2016 (57899AE7)
  197. fffff800`07150000 fffff800`0715e000 MpKsld526b941 (deferred)
  198. Image path: \??\C:\ProgramData\Microsoft\Windows Defender\Definition Updates\{35A34713-BE69-4DBD-BC6E-462217CF76C8}\MpKsld526b941.sys
  199. Image name: MpKsld526b941.sys
  200. Timestamp: Tue May 19 21:50:37 2015 (555BE86D)
  201. fffff800`078e0000 fffff800`07963000 atikmpag (deferred)
  202. Image path: \SystemRoot\System32\DriverStore\FileRepository\c0313745.inf_amd64_133311ca362c9cc6\atikmpag.sys
  203. Image name: atikmpag.sys
  204. Timestamp: Mon Apr 24 20:57:35 2017 (58FE9EFF)
  205. fffff800`09f60000 fffff800`09f69000 IOMap64 (deferred)
  206. Image path: \??\C:\Windows\system32\drivers\IOMap64.sys
  207. Image name: IOMap64.sys
  208. Timestamp: Wed Oct 22 20:52:12 2014 (5448513C)
  209. fffff800`09fa0000 fffff800`09fc7000 e22w10x64 (deferred)
  210. Image path: \SystemRoot\System32\drivers\e22w10x64.sys
  211. Image name: e22w10x64.sys
  212. Timestamp: Fri Aug 28 17:05:38 2015 (55E0CD22)
  213. fffff800`0a040000 fffff800`0a044e00 LGBusEnum (deferred)
  214. Image path: \SystemRoot\system32\drivers\LGBusEnum.sys
  215. Image name: LGBusEnum.sys
  216. Timestamp: Mon Jun 13 14:47:08 2016 (575EFFAC)
  217. fffff800`0a050000 fffff800`0a05c800 LGJoyXlCore (deferred)
  218. Image path: \SystemRoot\system32\drivers\LGJoyXlCore.sys
  219. Image name: LGJoyXlCore.sys
  220. Timestamp: Mon Jun 13 14:47:06 2016 (575EFFAA)
  221. fffff800`0a160000 fffff800`0a17e000 AtihdWT6 (deferred)
  222. Image path: \SystemRoot\system32\drivers\AtihdWT6.sys
  223. Image name: AtihdWT6.sys
  224. Timestamp: Sat Mar 25 17:04:05 2017 (58D6DB45)
  225. fffff800`0a220000 fffff800`0a776000 RTKVHD64 (deferred)
  226. Image path: \SystemRoot\system32\drivers\RTKVHD64.sys
  227. Image name: RTKVHD64.sys
  228. Timestamp: Tue Oct 18 07:20:52 2016 (58060594)
  229. fffff800`0a780000 fffff800`0a78e000 MBfilt64 (deferred)
  230. Image path: \SystemRoot\system32\drivers\MBfilt64.sys
  231. Image name: MBfilt64.sys
  232. Timestamp: Thu Jul 30 23:40:32 2009 (4A7267B0)
  233. fffff800`0acb0000 fffff800`0acb8000 lgcoretemp (deferred)
  234. Image path: \??\C:\Program Files\Logitech Gaming Software\Drivers\LgCoreTemp\lgcoretemp.sys
  235. Image name: lgcoretemp.sys
  236. Timestamp: Tue Jun 9 12:52:10 2015 (557719BA)
  237. fffff800`0ad60000 fffff800`0d094000 atikmdag (deferred)
  238. Image path: \SystemRoot\System32\DriverStore\FileRepository\c0313745.inf_amd64_133311ca362c9cc6\atikmdag.sys
  239. Image name: atikmdag.sys
  240. Timestamp: Mon Apr 24 21:11:16 2017 (58FEA234)
  241. fffff800`0d0a0000 fffff800`0d0a2500 LGVirHid (deferred)
  242. Image path: \SystemRoot\system32\drivers\LGVirHid.sys
  243. Image name: LGVirHid.sys
  244. Timestamp: Mon Jun 13 14:47:03 2016 (575EFFA7)
  245. fffff800`0d140000 fffff800`0d161000 drmk (deferred)
  246. Image path: \SystemRoot\System32\drivers\drmk.sys
  247. Image name: drmk.sys
  248. Timestamp: Fri Jul 15 22:27:13 2016 (57899B81)
  249. LegalCopyright: © Microsoft Corporation. All rights reserved.
  250. Unloaded modules:
  251. fffff800`05f30000 fffff800`05f3f000 dump_storpor
  252. fffff800`05f70000 fffff800`05f94000 dump_storahc
  253. fffff800`05fc0000 fffff800`05fdd000 dump_dumpfve
  254. fffff800`09f60000 fffff800`09f6a000 amdkmafd.sys
  255. fffff800`0d0a0000 fffff800`0d0aa000 amdkmafd.sys
  256. fffff800`069c0000 fffff800`069d4000 dam.sys
  257. fffff800`05fe0000 fffff800`06011000 cdrom.sys
  258. fffff800`05210000 fffff800`05220000 WdBoot.sys
  259. fffff800`05e40000 fffff800`05e4f000 hwpolicy.sys
  260.  
  261. ============================= BIOS INFO ================================
  262. [SMBIOS Data Tables v2.8]
  263. [DMI Version - 0]
  264. [2.0 Calling Convention - No]
  265. [Table Size - 2287 bytes]
  266. [BIOS Information (Type 0) - Length 24 - Handle 0000h]
  267. Vendor American Megatrends Inc.
  268. BIOS Version V22.4
  269. BIOS Starting Address Segment f000
  270. BIOS Release Date 12/21/2015
  271. BIOS ROM Size 800000
  272. BIOS Characteristics
  273. 07: - PCI Supported
  274. 11: - Upgradeable FLASH BIOS
  275. 12: - BIOS Shadowing Supported
  276. 15: - CD-Boot Supported
  277. 16: - Selectable Boot Supported
  278. 17: - BIOS ROM Socketed
  279. 19: - EDD Supported
  280. 23: - 1.2MB Floppy Supported
  281. 24: - 720KB Floppy Supported
  282. 25: - 2.88MB Floppy Supported
  283. 26: - Print Screen Device Supported
  284. 27: - Keyboard Services Supported
  285. 28: - Serial Services Supported
  286. 29: - Printer Services Supported
  287. 32: - BIOS Vendor Reserved
  288. BIOS Characteristic Extensions
  289. 00: - ACPI Supported
  290. 01: - USB Legacy Supported
  291. 08: - BIOS Boot Specification Supported
  292. 10: - Specification Reserved
  293. 11: - Specification Reserved
  294. BIOS Major Revision 4
  295. BIOS Minor Revision 6
  296. EC Firmware Major Revision 255
  297. EC Firmware Minor Revision 255
  298. [System Information (Type 1) - Length 27 - Handle 0001h]
  299. Manufacturer MSI
  300. Product Name MS-7693
  301. Version 4.0
  302. UUID 00000000-0000-0000-0000-000000000000
  303. Wakeup Type Power Switch
  304. [BaseBoard Information (Type 2) - Length 15 - Handle 0002h]
  305. Manufacturer MSI
  306. Product 970 GAMING (MS-7693)
  307. Version 4.0
  308. Feature Flags 09h
  309. 1665933832: - ?ÿU?ì?ì¡H._c3Å?Eü3ÀW?}?Eô?Eø?ÿu
  310. ¸@
  311. 1665933872: - ?ÿU?ì?ì¡H._c3Å?Eü3ÀW?}?Eô?Eø?ÿu
  312. ¸@
  313. Chassis Handle 0003h
  314. Board Type 0ah - Processor/Memory Module
  315. Number of Child Handles 0
  316. [System Enclosure (Type 3) - Length 25 - Handle 0003h]
  317. Manufacturer MSI
  318. Chassis Type Desktop
  319. Version 4.0
  320. Bootup State Safe
  321. Power Supply State Safe
  322. Thermal State Safe
  323. Security Status None
  324. OEM Defined 0
  325. Height 0U
  326. Number of Power Cords 1
  327. Number of Contained Elements 1
  328. Contained Element Size 3
  329. [Processor Information (Type 4) - Length 42 - Handle 0004h]
  330. Socket Designation CPU 1
  331. Processor Type Central Processor
  332. Processor Family 3fh - Specification Reserved
  333. Processor Manufacturer AMD
  334. Processor ID 200f6000fffb8b17
  335. Processor Version AMD FX(tm)-8350 Eight-Core Processor
  336. Processor Voltage 8eh - 1.4V
  337. External Clock 200MHz
  338. Max Speed 4000MHz
  339. Current Speed 4000MHz
  340. Status Enabled Populated
  341. Processor Upgrade Specification Reserved
  342. L1 Cache Handle 0005h
  343. L2 Cache Handle 0006h
  344. L3 Cache Handle 0007h
  345. [Cache Information (Type 7) - Length 19 - Handle 0005h]
  346. Socket Designation L1-Cache
  347. Cache Configuration 0180h - WB Enabled Int NonSocketed L1
  348. Maximum Cache Size 0180h - 384K
  349. Installed Size 0180h - 384K
  350. Supported SRAM Type 0010h - Pipeline-Burst
  351. Current SRAM Type 0010h - Pipeline-Burst
  352. Cache Speed 1ns
  353. Error Correction Type Specification Reserved
  354. System Cache Type Unified
  355. Associativity 2-way Set-Associative
  356. [Cache Information (Type 7) - Length 19 - Handle 0006h]
  357. Socket Designation L2-Cache
  358. Cache Configuration 0181h - WB Enabled Int NonSocketed L2
  359. Maximum Cache Size 2000h - 8192K
  360. Installed Size 2000h - 8192K
  361. Supported SRAM Type 0010h - Pipeline-Burst
  362. Current SRAM Type 0010h - Pipeline-Burst
  363. Cache Speed 1ns
  364. Error Correction Type Specification Reserved
  365. System Cache Type Unified
  366. Associativity 16-way Set-Associative
  367. [Cache Information (Type 7) - Length 19 - Handle 0007h]
  368. Socket Designation L3-Cache
  369. Cache Configuration 0182h - WB Enabled Int NonSocketed L3
  370. Maximum Cache Size 2000h - 8192K
  371. Installed Size 2000h - 8192K
  372. Supported SRAM Type 0010h - Pipeline-Burst
  373. Current SRAM Type 0010h - Pipeline-Burst
  374. Cache Speed 1ns
  375. Error Correction Type Specification Reserved
  376. System Cache Type Unified
  377. Associativity Specification Reserved
  378. [OEM Strings (Type 11) - Length 5 - Handle 0025h]
  379. Number of Strings 1
  380. [System Configuration Options (Type 12) - Length 5 - Handle 0026h]
  381. [Physical Memory Array (Type 16) - Length 23 - Handle 0027h]
  382. Location 03h - SystemBoard/Motherboard
  383. Use 03h - System Memory
  384. Memory Error Correction 03h - None
  385. Maximum Capacity 33554432KB
  386. Number of Memory Devices 4
  387. [Memory Array Mapped Address (Type 19) - Length 31 - Handle 0028h]
  388. Starting Address 00000000h
  389. Ending Address 00ffffffh
  390. Memory Array Handle 0027h
  391. Partition Width 255
  392. [Memory Device (Type 17) - Length 40 - Handle 0029h]
  393. Physical Memory Array Handle 0027h
  394. Total Width 64 bits
  395. Data Width 64 bits
  396. Size 8192MB
  397. Form Factor 09h - DIMM
  398. Device Locator A1_DIMM0
  399. Bank Locator A1_BANK0
  400. Memory Type 18h - Specification Reserved
  401. Type Detail 4080h - Synchronous
  402. Speed 800MHz
  403. Manufacturer Kingston
  404. Part Number KHX1600C10D3/8G
  405. [Memory Device Mapped Address (Type 20) - Length 35 - Handle 002ah]
  406. Starting Address 00000000h
  407. Ending Address 0000003fh
  408. Memory Device Handle 0029h
  409. Mem Array Mapped Adr Handle 0028h
  410. [Memory Device (Type 17) - Length 40 - Handle 002bh]
  411. Physical Memory Array Handle 0027h
  412. Total Width 64 bits
  413. Data Width 64 bits
  414. Size 8192MB
  415. Form Factor 09h - DIMM
  416. Device Locator A1_DIMM1
  417. Bank Locator A1_BANK1
  418. Memory Type 18h - Specification Reserved
  419. Type Detail 4080h - Synchronous
  420. Speed 800MHz
  421. Manufacturer Kingston
  422. Part Number KHX1600C10D3/8G
  423. [Memory Device Mapped Address (Type 20) - Length 35 - Handle 002ch]
  424. Starting Address 00000000h
  425. Ending Address 0000003fh
  426. Memory Device Handle 002bh
  427. Mem Array Mapped Adr Handle 0028h
  428. [Memory Device (Type 17) - Length 40 - Handle 002dh]
  429. Physical Memory Array Handle 0027h
  430. Total Width 0 bits
  431. Data Width 64 bits
  432. Form Factor 09h - DIMM
  433. Device Locator A1_DIMM2
  434. Bank Locator A1_BANK2
  435. Memory Type 02h - Unknown
  436. Type Detail 0080h - Synchronous
  437. Speed 0MHz
  438. Manufacturer A1_Manufacturer2
  439. Part Number Array1_PartNumber2
  440. [Memory Device (Type 17) - Length 40 - Handle 002fh]
  441. Physical Memory Array Handle 0027h
  442. Total Width 0 bits
  443. Data Width 64 bits
  444. Form Factor 09h - DIMM
  445. Device Locator A1_DIMM3
  446. Bank Locator A1_BANK3
  447. Memory Type 02h - Unknown
  448. Type Detail 0080h - Synchronous
  449. Speed 0MHz
  450. Manufacturer A1_Manufacturer3
  451. Part Number Array1_PartNumber3
  452.  
  453. ========================================================================
  454. =================== Dump File: 072617-6796-01.dmp ====================
  455. ========================================================================
  456. Mini Kernel Dump File: Only registers and stack trace are available
  457. Windows 10 Kernel Version 14393 MP (8 procs) Free x64
  458. Product: WinNt, suite: TerminalServer SingleUserTS Personal
  459. Built by: 14393.1480.amd64fre.rs1_release.170706-2004
  460. Kernel base = 0xfffff803`3b817000 PsLoadedModuleList = 0xfffff803`3bb16040
  461. Debug session time: Wed Jul 26 01:56:06.170 2017 (UTC - 4:00)
  462. System Uptime: 0 days 0:22:53.926
  463.  
  464. BugCheck 3B, {c0000005, fffff8033b84acc2, ffff9c80739f9d70, 0}
  465. Probably caused by : win32kfull.sys ( win32kfull!TimersProc+284 )
  466. Followup: MachineOwner
  467.  
  468. SYSTEM_SERVICE_EXCEPTION (3b)
  469. An exception happened while executing a system service routine.
  470.  
  471. Arguments:
  472. Arg1: 00000000c0000005, Exception code that caused the bugcheck
  473. Arg2: fffff8033b84acc2, Address of the instruction which caused the bugcheck
  474. Arg3: ffff9c80739f9d70, Address of the context record for the exception that caused the bugcheck
  475. Arg4: 0000000000000000, zero.
  476.  
  477. Debugging Details:
  478. DUMP_CLASS: 1
  479. DUMP_QUALIFIER: 400
  480. BUILD_VERSION_STRING: 10.0.14393.1480 (rs1_release.170706-2004)
  481. SYSTEM_MANUFACTURER: MSI
  482. SYSTEM_PRODUCT_NAME: MS-7693
  483. SYSTEM_VERSION: 4.0
  484. BIOS_VENDOR: American Megatrends Inc.
  485. BIOS_VERSION: V22.4
  486. BIOS_DATE: 12/21/2015
  487. BASEBOARD_MANUFACTURER: MSI
  488. BASEBOARD_PRODUCT: 970 GAMING (MS-7693)
  489. BASEBOARD_VERSION: 4.0
  490. DUMP_TYPE: 2
  491. EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
  492. FAULTING_IP:
  493. nt!KeSetEvent+12
  494. fffff803`3b84acc2 f6017f test byte ptr [rcx],7Fh
  495. CONTEXT: ffff9c80739f9d70 -- (.cxr 0xffff9c80739f9d70)
  496. rax=fffff34a8088c140 rbx=fffff34a8273c290 rcx=fffb868b7a0d9720
  497. rdx=0000000000000002 rsi=0000000000000000 rdi=0000000000000200
  498. rip=fffff8033b84acc2 rsp=ffff9c80739fa770 rbp=0000000000000000
  499. r8=0000000000000000 r9=0000000000000004 r10=0000000000000000
  500. r11=ffff9c80739fa7e0 r12=000000000014f6e1 r13=fffff78000000320
  501. r14=0000000000000010 r15=0000000000000010
  502. iopl=0 nv up ei pl zr na po nc
  503. cs=0010 ss=0000 ds=002b es=002b fs=0053 gs=002b efl=00210246
  504. nt!KeSetEvent+0x12:
  505. fffff803`3b84acc2 f6017f test byte ptr [rcx],7Fh ds:002b:fffb868b`7a0d9720=??
  506. Resetting default scope
  507. CPU_COUNT: 8
  508. CPU_MHZ: fa0
  509. CPU_VENDOR: AuthenticAMD
  510. CPU_FAMILY: 15
  511. CPU_MODEL: 2
  512. CPU_STEPPING: 0
  513. CUSTOMER_CRASH_COUNT: 1
  514. DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
  515. BUGCHECK_STR: 0x3B
  516.  
  517. PROCESS_NAME: csrss.exe
  518.  
  519. CURRENT_IRQL: 0
  520. LAST_CONTROL_TRANSFER: from fffff321de6a8cc4 to fffff8033b84acc2
  521. STACK_TEXT:
  522. ffff9c80`739fa770 fffff321`de6a8cc4 : 00000000`00000001 fffff803`3b88744b 00000000`00000002 00000000`00000009 : nt!KeSetEvent+0x12
  523. ffff9c80`739fa800 fffff321`de6a88c3 : 00000000`00000001 ffff9c80`739fa980 00000000`00000001 00000000`0000000d : win32kfull!TimersProc+0x284
  524. ffff9c80`739fa880 fffff321`df0f309a : 00000000`00000004 00000000`00000004 00000000`00000000 00000000`00000020 : win32kfull!RawInputThread+0x1323
  525. ffff9c80`739faa90 fffff321`de6aaf0f : 00000000`00000002 ffff9c80`746b2e10 00000000`00000004 00000000`00000000 : win32kbase!xxxCreateSystemThreads+0x12a
  526. ffff9c80`739faad0 fffff803`3b971693 : ffff868b`78ac7080 00000000`00000004 000001d0`95709b98 000001d0`95704090 : win32kfull!NtUserCallNoParam+0x2f
  527. ffff9c80`739fab00 00007ffd`6b141144 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
  528. 0000002e`6fe7fe48 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`6b141144
  529. THREAD_SHA1_HASH_MOD_FUNC: f6501adb690e9debb187f301e9fc82f93c742e90
  530. THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 1bf346fe917eac473700bcb90e38097256af3b31
  531. THREAD_SHA1_HASH_MOD: 96fd029d160db6533056a875ce32dfd8f7debb09
  532. FOLLOWUP_IP:
  533. win32kfull!TimersProc+284
  534. fffff321`de6a8cc4 e945feffff jmp win32kfull!TimersProc+0xce (fffff321`de6a8b0e)
  535. FAULT_INSTR_CODE: fffe45e9
  536. SYMBOL_STACK_INDEX: 1
  537. SYMBOL_NAME: win32kfull!TimersProc+284
  538. FOLLOWUP_NAME: MachineOwner
  539. MODULE_NAME: win32kfull
  540.  
  541. IMAGE_NAME: win32kfull.sys
  542.  
  543. DEBUG_FLR_IMAGE_TIMESTAMP: 595f2913
  544. IMAGE_VERSION: 10.0.14393.1480
  545. STACK_COMMAND: .cxr 0xffff9c80739f9d70 ; kb
  546. BUCKET_ID_FUNC_OFFSET: 284
  547. FAILURE_BUCKET_ID: 0x3B_win32kfull!TimersProc
  548. BUCKET_ID: 0x3B_win32kfull!TimersProc
  549. PRIMARY_PROBLEM_CLASS: 0x3B_win32kfull!TimersProc
  550. TARGET_TIME: 2017-07-26T05:56:06.000Z
  551. OSBUILD: 14393
  552. OSSERVICEPACK: 1480
  553. SERVICEPACK_NUMBER: 0
  554. OS_REVISION: 0
  555. SUITE_MASK: 784
  556. PRODUCT_TYPE: 1
  557. OSPLATFORM_TYPE: x64
  558. OSNAME: Windows 10
  559. OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
  560. USER_LCID: 0
  561. OSBUILD_TIMESTAMP: 2017-07-07 02:26:09
  562. BUILDDATESTAMP_STR: 170706-2004
  563. BUILDLAB_STR: rs1_release
  564. BUILDOSVER_STR: 10.0.14393.1480
  565. ANALYSIS_SESSION_ELAPSED_TIME: 1e554
  566. ANALYSIS_SOURCE: KM
  567. FAILURE_ID_HASH_STRING: km:0x3b_win32kfull!timersproc
  568. FAILURE_ID_HASH: {99e9ad21-9939-f2bd-dcc1-a25f9cb25caa}
  569. Followup: MachineOwner
  570.  
  571. ========================================================================
  572. =================== Dump File: 072617-6968-01.dmp ====================
  573. ========================================================================
  574. Mini Kernel Dump File: Only registers and stack trace are available
  575. Windows 10 Kernel Version 14393 MP (8 procs) Free x64
  576. Product: WinNt, suite: TerminalServer SingleUserTS Personal
  577. Built by: 14393.1480.amd64fre.rs1_release.170706-2004
  578. Kernel base = 0xfffff802`86475000 PsLoadedModuleList = 0xfffff802`86774040
  579. Debug session time: Wed Jul 26 01:32:30.194 2017 (UTC - 4:00)
  580. System Uptime: 0 days 0:02:24.951
  581.  
  582. BugCheck 1000007E, {ffffffffc0000005, fffff80240e4d5c1, ffff918193fa27f8, ffff918193fa2030}
  583. *** WARNING: Unable to verify timestamp for win32k.sys
  584. *** ERROR: Module load completed but symbols could not be loaded for win32k.sys
  585. Probably caused by : dxgmms2.sys ( dxgmms2!VIDMM_GLOBAL::DestroyOneAllocation+191 )
  586. Followup: MachineOwner
  587.  
  588. SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
  589. This is a very common bugcheck. Usually the exception address pinpoints
  590. the driver/function that caused the problem. Always note this address
  591. as well as the link date of the driver/image that contains this address.
  592. Some common problems are exception code 0x80000003. This means a hard
  593. coded breakpoint or assertion was hit, but this system was booted
  594. /NODEBUG. This is not supposed to happen as developers should never have
  595. hardcoded breakpoints in retail code, but ...
  596. If this happens, make sure a debugger gets connected, and the
  597. system is booted /DEBUG. This will let us see why this breakpoint is
  598. happening.
  599.  
  600. Arguments:
  601. Arg1: ffffffffc0000005, The exception code that was not handled
  602. Arg2: fffff80240e4d5c1, The address that the exception occurred at
  603. Arg3: ffff918193fa27f8, Exception Record Address
  604. Arg4: ffff918193fa2030, Context Record Address
  605.  
  606. Debugging Details:
  607. DUMP_CLASS: 1
  608. DUMP_QUALIFIER: 400
  609. BUILD_VERSION_STRING: 10.0.14393.1480 (rs1_release.170706-2004)
  610. SYSTEM_MANUFACTURER: MSI
  611. SYSTEM_PRODUCT_NAME: MS-7693
  612. SYSTEM_VERSION: 4.0
  613. BIOS_VENDOR: American Megatrends Inc.
  614. BIOS_VERSION: V22.4
  615. BIOS_DATE: 12/21/2015
  616. BASEBOARD_MANUFACTURER: MSI
  617. BASEBOARD_PRODUCT: 970 GAMING (MS-7693)
  618. BASEBOARD_VERSION: 4.0
  619. DUMP_TYPE: 2
  620. EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
  621. FAULTING_IP:
  622. dxgmms2!VIDMM_GLOBAL::DestroyOneAllocation+191
  623. fffff802`40e4d5c1 f00fc106 lock xadd dword ptr [rsi],eax
  624. EXCEPTION_RECORD: ffff918193fa27f8 -- (.exr 0xffff918193fa27f8)
  625. ExceptionAddress: fffff80240e4d5c1 (dxgmms2!VIDMM_GLOBAL::DestroyOneAllocation+0x0000000000000191)
  626. ExceptionCode: c0000005 (Access violation)
  627. ExceptionFlags: 00000000
  628. NumberParameters: 2
  629. Parameter[0]: 0000000000000000
  630. Parameter[1]: ffffffffffffffff
  631. Attempt to read from address ffffffffffffffff
  632. CONTEXT: ffff918193fa2030 -- (.cxr 0xffff918193fa2030)
  633. rax=00000000ffffffff rbx=ffffa6802fea02a0 rcx=ffffa6802fea02a0
  634. rdx=ffffa6802fea00e0 rsi=fffba6802e58d220 rdi=ffffcb0286a4be00
  635. rip=fffff80240e4d5c1 rsp=ffff918193fa2a30 rbp=0000000000000000
  636. r8=ffffa6802fea00e0 r9=fffff80286475000 r10=ffff918192e17b20
  637. r11=ffffa6802fea02a0 r12=0000000000000000 r13=0000000000000000
  638. r14=000000008bd1e000 r15=000000000000003f
  639. iopl=0 nv up ei ng nz na po nc
  640. cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010286
  641. dxgmms2!VIDMM_GLOBAL::DestroyOneAllocation+0x191:
  642. fffff802`40e4d5c1 f00fc106 lock xadd dword ptr [rsi],eax ds:002b:fffba680`2e58d220=????????
  643. Resetting default scope
  644. CPU_COUNT: 8
  645. CPU_MHZ: fa0
  646. CPU_VENDOR: AuthenticAMD
  647. CPU_FAMILY: 15
  648. CPU_MODEL: 2
  649. CPU_STEPPING: 0
  650. CUSTOMER_CRASH_COUNT: 1
  651. DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
  652.  
  653. PROCESS_NAME: System
  654.  
  655. CURRENT_IRQL: 0
  656. ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
  657. EXCEPTION_CODE_STR: c0000005
  658. EXCEPTION_PARAMETER1: 0000000000000000
  659. EXCEPTION_PARAMETER2: ffffffffffffffff
  660. FOLLOWUP_IP:
  661. dxgmms2!VIDMM_GLOBAL::DestroyOneAllocation+191
  662. fffff802`40e4d5c1 f00fc106 lock xadd dword ptr [rsi],eax
  663. READ_ADDRESS: fffff80286815338: Unable to get MiVisibleState
  664. ffffffffffffffff
  665. BUGCHECK_STR: AV
  666. LAST_CONTROL_TRANSFER: from fffff80240e3dd81 to fffff80240e4d5c1
  667. STACK_TEXT:
  668. ffff9181`93fa2a30 fffff802`40e3dd81 : ffffa680`2cbbb000 ffffa680`00000000 00000000`00000000 00000000`00000001 : dxgmms2!VIDMM_GLOBAL::DestroyOneAllocation+0x191
  669. ffff9181`93fa2c60 fffff802`40e41d64 : 00000000`00000510 ffffcb02`00000004 00000000`0008be00 ffffef80`00000000 : dxgmms2!VIDMM_PAGE_TABLE::DestroyPageTable+0x8d
  670. ffff9181`93fa2cf0 fffff802`40e3e644 : ffffcb02`81f63f60 ffffcb02`8140e670 ffff9181`93fa2f60 00000000`00000000 : dxgmms2!VIDMM_PAGE_DIRECTORY::CommitVirtualAddressRange+0x1284
  671. ffff9181`93fa2ed0 fffff802`40e446b5 : ffffcb02`8706d009 000f0000`00000000 00000000`00000000 00000000`00000000 : dxgmms2!CVirtualAddressAllocator::UncommitVirtualAddressRange+0x104
  672. ffff9181`93fa3000 fffff802`40e447df : ffffa680`2bfe7e20 ffffcb02`86bfaa00 ffffcb02`86bd2338 fffff802`40df1e38 : dxgmms2!VIDMM_GLOBAL::MakeOneVirtualAddressRangeNotResident+0x169
  673. ffff9181`93fa3490 fffff802`40e35253 : 00000000`00000000 ffff9181`93fa3580 00000000`00000000 ffffcb02`86bfaa00 : dxgmms2!VIDMM_GLOBAL::MakeVirtualAddressRangeNotResident+0xbf
  674. ffff9181`93fa34f0 fffff802`40e4a671 : ffffa680`2cbbb000 ffffa680`307c3d20 00000000`ffffffff ffffa680`2cbbb000 : dxgmms2!VIDMM_MEMORY_SEGMENT::EvictResource+0x3e3
  675. ffff9181`93fa36f0 fffff802`40e5e5d5 : ffffa680`2cbbb000 00000000`00000001 ffffa680`2cbc4bd8 ffffa680`307c3d20 : dxgmms2!VIDMM_GLOBAL::ProcessDeferredCommand+0x2e1
  676. ffff9181`93fa3960 fffff802`8652b965 : ffff9181`92e17180 ffffa680`2cb3c800 fffff802`40e5d720 ffffcb02`6c26e7d0 : dxgmms2!VIDMM_WORKER_THREAD::Run+0xea5
  677. ffff9181`93fa3c10 fffff802`865c9e26 : ffff9181`92e17180 ffffa680`2cb3c800 fffff802`8652b924 eea91066`8004d859 : nt!PspSystemThreadStartup+0x41
  678. ffff9181`93fa3c60 00000000`00000000 : ffff9181`93fa4000 ffff9181`93f9e000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
  679. THREAD_SHA1_HASH_MOD_FUNC: fda33f86c563565ec3bdf260255934e689806d47
  680. THREAD_SHA1_HASH_MOD_FUNC_OFFSET: ec6dded717c2d9487b16d5fd31ac637dddb9e67d
  681. THREAD_SHA1_HASH_MOD: 6ec3af4337961d3332e041e86f509d8cef317437
  682. FAULT_INSTR_CODE: 6c10ff0
  683. SYMBOL_STACK_INDEX: 0
  684. SYMBOL_NAME: dxgmms2!VIDMM_GLOBAL::DestroyOneAllocation+191
  685. FOLLOWUP_NAME: MachineOwner
  686. MODULE_NAME: dxgmms2
  687.  
  688. IMAGE_NAME: dxgmms2.sys
  689.  
  690. DEBUG_FLR_IMAGE_TIMESTAMP: 58ba5e7e
  691. IMAGE_VERSION: 10.0.14393.953
  692. STACK_COMMAND: .cxr 0xffff918193fa2030 ; kb
  693. BUCKET_ID_FUNC_OFFSET: 191
  694. FAILURE_BUCKET_ID: AV_dxgmms2!VIDMM_GLOBAL::DestroyOneAllocation
  695. BUCKET_ID: AV_dxgmms2!VIDMM_GLOBAL::DestroyOneAllocation
  696. PRIMARY_PROBLEM_CLASS: AV_dxgmms2!VIDMM_GLOBAL::DestroyOneAllocation
  697. TARGET_TIME: 2017-07-26T05:32:30.000Z
  698. OSBUILD: 14393
  699. OSSERVICEPACK: 1480
  700. SERVICEPACK_NUMBER: 0
  701. OS_REVISION: 0
  702. SUITE_MASK: 784
  703. PRODUCT_TYPE: 1
  704. OSPLATFORM_TYPE: x64
  705. OSNAME: Windows 10
  706. OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
  707. USER_LCID: 0
  708. OSBUILD_TIMESTAMP: 2017-07-07 02:26:09
  709. BUILDDATESTAMP_STR: 170706-2004
  710. BUILDLAB_STR: rs1_release
  711. BUILDOSVER_STR: 10.0.14393.1480
  712. ANALYSIS_SESSION_ELAPSED_TIME: 1d425
  713. ANALYSIS_SOURCE: KM
  714. FAILURE_ID_HASH_STRING: km:av_dxgmms2!vidmm_global::destroyoneallocation
  715. FAILURE_ID_HASH: {4e73fa52-c790-a648-4bd4-084a2b509fd0}
  716. Followup: MachineOwner
  717.  
  718. ========================================================================
  719. =================== Dump File: 072617-7406-01.dmp ====================
  720. ========================================================================
  721. Mini Kernel Dump File: Only registers and stack trace are available
  722. Windows 10 Kernel Version 14393 MP (8 procs) Free x64
  723. Product: WinNt, suite: TerminalServer SingleUserTS Personal
  724. Built by: 14393.1480.amd64fre.rs1_release.170706-2004
  725. Kernel base = 0xfffff802`8368f000 PsLoadedModuleList = 0xfffff802`8398e040
  726. Debug session time: Wed Jul 26 14:06:48.725 2017 (UTC - 4:00)
  727. System Uptime: 0 days 4:26:30.482
  728.  
  729. BugCheck 3B, {c0000005, fffff8019c5b2680, ffffae0041e45e60, 0}
  730. *** WARNING: Unable to verify timestamp for cdd.dll
  731. *** ERROR: Module load completed but symbols could not be loaded for cdd.dll
  732. *** WARNING: Unable to verify timestamp for win32k.sys
  733. *** ERROR: Module load completed but symbols could not be loaded for win32k.sys
  734. Probably caused by : memory_corruption
  735. Followup: memory_corruption
  736.  
  737. SYSTEM_SERVICE_EXCEPTION (3b)
  738. An exception happened while executing a system service routine.
  739.  
  740. Arguments:
  741. Arg1: 00000000c0000005, Exception code that caused the bugcheck
  742. Arg2: fffff8019c5b2680, Address of the instruction which caused the bugcheck
  743. Arg3: ffffae0041e45e60, Address of the context record for the exception that caused the bugcheck
  744. Arg4: 0000000000000000, zero.
  745.  
  746. Debugging Details:
  747. DUMP_CLASS: 1
  748. DUMP_QUALIFIER: 400
  749. BUILD_VERSION_STRING: 10.0.14393.1480 (rs1_release.170706-2004)
  750. SYSTEM_MANUFACTURER: MSI
  751. SYSTEM_PRODUCT_NAME: MS-7693
  752. SYSTEM_VERSION: 4.0
  753. BIOS_VENDOR: American Megatrends Inc.
  754. BIOS_VERSION: V22.4
  755. BIOS_DATE: 12/21/2015
  756. BASEBOARD_MANUFACTURER: MSI
  757. BASEBOARD_PRODUCT: 970 GAMING (MS-7693)
  758. BASEBOARD_VERSION: 4.0
  759. DUMP_TYPE: 2
  760. EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
  761. FAULTING_IP:
  762. dxgkrnl!memset+c0
  763. fffff801`9c5b2680 488911 mov qword ptr [rcx],rdx
  764. CONTEXT: ffffae0041e45e60 -- (.cxr 0xffffae0041e45e60)
  765. rax=fffbdb0e62ef3000 rbx=ffff80097c36c400 rcx=fffbdb0e62ef3000
  766. rdx=0000000000000000 rsi=ffff9b9940096401 rdi=ffff80097dbe2010
  767. rip=fffff8019c5b2680 rsp=ffffae0041e46868 rbp=ffffae0041e469a0
  768. r8=0000000000010000 r9=0000000000000000 r10=0000000000000400
  769. r11=7ffffffffffffffc r12=ffffae0041e46ae0 r13=ffffdb0e61ed00c0
  770. r14=ffff80097c36c400 r15=ffff80097dbe2010
  771. iopl=0 nv up ei pl zr na po nc
  772. cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246
  773. dxgkrnl!memset+0xc0:
  774. fffff801`9c5b2680 488911 mov qword ptr [rcx],rdx ds:002b:fffbdb0e`62ef3000=????????????????
  775. Resetting default scope
  776. CPU_COUNT: 8
  777. CPU_MHZ: fa0
  778. CPU_VENDOR: AuthenticAMD
  779. CPU_FAMILY: 15
  780. CPU_MODEL: 2
  781. CPU_STEPPING: 0
  782. CUSTOMER_CRASH_COUNT: 1
  783. DEFAULT_BUCKET_ID: CODE_CORRUPTION
  784. BUGCHECK_STR: 0x3B
  785.  
  786. PROCESS_NAME: TslGame.exe
  787.  
  788. CURRENT_IRQL: 0
  789. LAST_CONTROL_TRANSFER: from fffff8019c62f7b0 to fffff8019c5b2680
  790. STACK_TEXT:
  791. ffffae00`41e46868 fffff801`9c62f7b0 : 00000000`00000209 ffffae00`00000209 ffff8009`7c36c400 00000000`00000001 : dxgkrnl!memset+0xc0
  792. ffffae00`41e46870 fffff801`9c62fd1c : ffff8009`7c36c6d0 ffff9b99`40096458 ffffae00`00000209 00000000`00000000 : dxgkrnl!DISPLAY_SOURCE::GetClippedCursor+0x64
  793. ffffae00`41e468a0 fffff801`9c62fa64 : 00000000`00000000 00000000`00000000 00000020`00000020 ffffc2a3`0fd66e2e : dxgkrnl!DxgkSetPointerShape+0x29c
  794. ffffae00`41e46a60 ffff9bca`24f7dc8e : ffff9b99`40096448 ffffae00`41e46b00 ffff9b99`423c0018 ffffae00`41e46b00 : dxgkrnl!DxgkCddSetPointerShape+0x54
  795. ffffae00`41e46aa0 ffff9b99`40096448 : ffffae00`41e46b00 ffff9b99`423c0018 ffffae00`41e46b00 ffff9b99`00000020 : cdd+0xdc8e
  796. ffffae00`41e46aa8 ffffae00`41e46b00 : ffff9b99`423c0018 ffffae00`41e46b00 ffff9b99`00000020 ffff9bca`00000000 : 0xffff9b99`40096448
  797. ffffae00`41e46ab0 ffff9b99`423c0018 : ffffae00`41e46b00 ffff9b99`00000020 ffff9bca`00000000 00000000`000806e7 : 0xffffae00`41e46b00
  798. ffffae00`41e46ab8 ffffae00`41e46b00 : ffff9b99`00000020 ffff9bca`00000000 00000000`000806e7 00000000`00000001 : 0xffff9b99`423c0018
  799. ffffae00`41e46ac0 ffff9b99`00000020 : ffff9bca`00000000 00000000`000806e7 00000000`00000001 00000000`00000001 : 0xffffae00`41e46b00
  800. ffffae00`41e46ac8 ffff9bca`00000000 : 00000000`000806e7 00000000`00000001 00000000`00000001 00000000`00000000 : 0xffff9b99`00000020
  801. ffffae00`41e46ad0 00000000`000806e7 : 00000000`00000001 00000000`00000001 00000000`00000000 ffffc2a3`0fd66ebe : 0xffff9bca`00000000
  802. ffffae00`41e46ad8 00000000`00000001 : 00000000`00000001 00000000`00000000 ffffc2a3`0fd66ebe 00000000`00000030 : 0x806e7
  803. ffffae00`41e46ae0 00000000`00000001 : 00000000`00000000 ffffc2a3`0fd66ebe 00000000`00000030 00000000`00000000 : 0x1
  804. ffffae00`41e46ae8 00000000`00000000 : ffffc2a3`0fd66ebe 00000000`00000030 00000000`00000000 00000000`00000000 : 0x1
  805. CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
  806. fffff80283709db0-fffff80283709db2 3 bytes - nt!MiReleaseSystemCacheView+168
  807. [ 40 fb f6:80 48 91 ]
  808. fffff8028372b86e-fffff8028372b86f 2 bytes - nt!MmCreateKernelStack+13e (+0x21abe)
  809. [ 80 f6:00 91 ]
  810. fffff8028372b8bf - nt!MmCreateKernelStack+18f (+0x51)
  811. [ fa:95 ]
  812. fffff802838d7387-fffff802838d7389 3 bytes - nt!ExFreePoolWithTag+387
  813. [ 40 fb f6:80 48 91 ]
  814. 9 errors : !nt (fffff80283709db0-fffff802838d7389)
  815. MODULE_NAME: memory_corruption
  816.  
  817. IMAGE_NAME: memory_corruption
  818.  
  819. FOLLOWUP_NAME: memory_corruption
  820. DEBUG_FLR_IMAGE_TIMESTAMP: 0
  821. MEMORY_CORRUPTOR: LARGE
  822. STACK_COMMAND: .cxr 0xffffae0041e45e60 ; kb
  823. FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
  824. BUCKET_ID: MEMORY_CORRUPTION_LARGE
  825. PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
  826. TARGET_TIME: 2017-07-26T18:06:48.000Z
  827. OSBUILD: 14393
  828. OSSERVICEPACK: 1480
  829. SERVICEPACK_NUMBER: 0
  830. OS_REVISION: 0
  831. SUITE_MASK: 784
  832. PRODUCT_TYPE: 1
  833. OSPLATFORM_TYPE: x64
  834. OSNAME: Windows 10
  835. OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
  836. USER_LCID: 0
  837. OSBUILD_TIMESTAMP: 2017-07-07 02:26:09
  838. BUILDDATESTAMP_STR: 170706-2004
  839. BUILDLAB_STR: rs1_release
  840. BUILDOSVER_STR: 10.0.14393.1480
  841. ANALYSIS_SESSION_ELAPSED_TIME: 134fb
  842. ANALYSIS_SOURCE: KM
  843. FAILURE_ID_HASH_STRING: km:memory_corruption_large
  844. FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
  845. Followup: memory_corruption
  846.  
  847. ========================================================================
  848. =================== Dump File: 072617-8484-01.dmp ====================
  849. ========================================================================
  850. Mini Kernel Dump File: Only registers and stack trace are available
  851. Windows 10 Kernel Version 14393 MP (8 procs) Free x64
  852. Product: WinNt, suite: TerminalServer SingleUserTS Personal
  853. Built by: 14393.1480.amd64fre.rs1_release.170706-2004
  854. Kernel base = 0xfffff803`64484000 PsLoadedModuleList = 0xfffff803`64783040
  855. Debug session time: Wed Jul 26 14:43:57.544 2017 (UTC - 4:00)
  856. System Uptime: 0 days 0:34:39.300
  857.  
  858. BugCheck 139, {3, fffff803663877f0, fffff80366387748, 0}
  859. Probably caused by : ntkrnlmp.exe ( nt!KiFastFailDispatch+d0 )
  860. Followup: MachineOwner
  861.  
  862. KERNEL_SECURITY_CHECK_FAILURE (139)
  863. A kernel component has corrupted a critical data structure. The corruption
  864. could potentially allow a malicious user to gain control of this machine.
  865.  
  866. Arguments:
  867. Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
  868. Arg2: fffff803663877f0, Address of the trap frame for the exception that caused the bugcheck
  869. Arg3: fffff80366387748, Address of the exception record for the exception that caused the bugcheck
  870. Arg4: 0000000000000000, Reserved
  871.  
  872. Debugging Details:
  873. DUMP_CLASS: 1
  874. DUMP_QUALIFIER: 400
  875. BUILD_VERSION_STRING: 10.0.14393.1480 (rs1_release.170706-2004)
  876. SYSTEM_MANUFACTURER: MSI
  877. SYSTEM_PRODUCT_NAME: MS-7693
  878. SYSTEM_VERSION: 4.0
  879. BIOS_VENDOR: American Megatrends Inc.
  880. BIOS_VERSION: V22.4
  881. BIOS_DATE: 12/21/2015
  882. BASEBOARD_MANUFACTURER: MSI
  883. BASEBOARD_PRODUCT: 970 GAMING (MS-7693)
  884. BASEBOARD_VERSION: 4.0
  885. DUMP_TYPE: 2
  886. TRAP_FRAME: fffff803663877f0 -- (.trap 0xfffff803663877f0)
  887. NOTE: The trap frame does not contain all registers.
  888. Some register values may be zeroed or incorrect.
  889. rax=ffff820995aae908 rbx=0000000000000000 rcx=0000000000000003
  890. rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
  891. rip=fffff8036461128b rsp=fffff80366387980 rbp=fffff803647c0180
  892. r8=0000000000000000 r9=0000000000000002 r10=00000004d75c24c8
  893. r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
  894. r14=0000000000000000 r15=0000000000000000
  895. iopl=0 nv up ei ng nz na po cy
  896. nt!KiProcessThreadWaitList+0xbccbb:
  897. fffff803`6461128b cd29 int 29h
  898. Resetting default scope
  899. EXCEPTION_RECORD: fffff80366387748 -- (.exr 0xfffff80366387748)
  900. ExceptionAddress: fffff8036461128b (nt!KiProcessThreadWaitList+0x00000000000bccbb)
  901. ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  902. ExceptionFlags: 00000001
  903. NumberParameters: 1
  904. Parameter[0]: 0000000000000003
  905. Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
  906. CPU_COUNT: 8
  907. CPU_MHZ: fa0
  908. CPU_VENDOR: AuthenticAMD
  909. CPU_FAMILY: 15
  910. CPU_MODEL: 2
  911. CPU_STEPPING: 0
  912. CUSTOMER_CRASH_COUNT: 1
  913. DEFAULT_BUCKET_ID: LIST_ENTRY_CORRUPT
  914. BUGCHECK_STR: 0x139
  915.  
  916. PROCESS_NAME: System
  917.  
  918. CURRENT_IRQL: 2
  919. ERROR_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.
  920. EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.
  921. EXCEPTION_CODE_STR: c0000409
  922. EXCEPTION_PARAMETER1: 0000000000000003
  923. LAST_CONTROL_TRANSFER: from fffff803645deb29 to fffff803645d3960
  924. STACK_TEXT:
  925. fffff803`663874c8 fffff803`645deb29 : 00000000`00000139 00000000`00000003 fffff803`663877f0 fffff803`66387748 : nt!KeBugCheckEx
  926. fffff803`663874d0 fffff803`645dee90 : 00000000`00000002 00000000`00000000 00000003`00000030 ffff8209`0000000a : nt!KiBugCheckDispatch+0x69
  927. fffff803`66387610 fffff803`645dde73 : 00000000`00000000 fffff803`644a62e1 ffff1132`0188e9b4 fffff803`647c5ec8 : nt!KiFastFailDispatch+0xd0
  928. fffff803`663877f0 fffff803`6461128b : 00000000`00000000 fffff803`66387b60 fffff803`66387b58 fffff780`00000000 : nt!KiRaiseSecurityCheckFailure+0xf3
  929. fffff803`66387980 fffff803`644ba484 : ffff8209`00000000 ffff8209`95969740 00000000`00140001 00000000`00000002 : nt!KiProcessThreadWaitList+0xbccbb
  930. fffff803`663879e0 fffff803`645d69ea : 00000000`00000000 fffff803`647c0180 fffff803`6483a940 ffff8209`97d3f800 : nt!KiRetireDpcList+0x824
  931. fffff803`66387c60 00000000`00000000 : fffff803`66388000 fffff803`66382000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x5a
  932. STACK_COMMAND: kb
  933. THREAD_SHA1_HASH_MOD_FUNC: 729d659528af1886126097481f222c34a5e10b7f
  934. THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 26cbf75db59cb4a805308e5df24b2a209e5226dd
  935. THREAD_SHA1_HASH_MOD: 30a3e915496deaace47137d5b90c3ecc03746bf6
  936. FOLLOWUP_IP:
  937. nt!KiFastFailDispatch+d0
  938. fffff803`645dee90 c644242000 mov byte ptr [rsp+20h],0
  939. FAULT_INSTR_CODE: 202444c6
  940. SYMBOL_STACK_INDEX: 2
  941. SYMBOL_NAME: nt!KiFastFailDispatch+d0
  942. FOLLOWUP_NAME: MachineOwner
  943. MODULE_NAME: nt
  944.  
  945. IMAGE_NAME: ntkrnlmp.exe
  946.  
  947. DEBUG_FLR_IMAGE_TIMESTAMP: 595f2981
  948. IMAGE_VERSION: 10.0.14393.1480
  949. BUCKET_ID_FUNC_OFFSET: d0
  950. FAILURE_BUCKET_ID: 0x139_3_nt!KiFastFailDispatch
  951. BUCKET_ID: 0x139_3_nt!KiFastFailDispatch
  952. PRIMARY_PROBLEM_CLASS: 0x139_3_nt!KiFastFailDispatch
  953. TARGET_TIME: 2017-07-26T18:43:57.000Z
  954. OSBUILD: 14393
  955. OSSERVICEPACK: 1480
  956. SERVICEPACK_NUMBER: 0
  957. OS_REVISION: 0
  958. SUITE_MASK: 784
  959. PRODUCT_TYPE: 1
  960. OSPLATFORM_TYPE: x64
  961. OSNAME: Windows 10
  962. OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
  963. USER_LCID: 0
  964. OSBUILD_TIMESTAMP: 2017-07-07 02:26:09
  965. BUILDDATESTAMP_STR: 170706-2004
  966. BUILDLAB_STR: rs1_release
  967. BUILDOSVER_STR: 10.0.14393.1480
  968. ANALYSIS_SESSION_ELAPSED_TIME: a1a
  969. ANALYSIS_SOURCE: KM
  970. FAILURE_ID_HASH_STRING: km:0x139_3_nt!kifastfaildispatch
  971. FAILURE_ID_HASH: {36173680-6f08-995f-065a-3d368c996911}
  972. Followup: MachineOwner
  973.  
  974. ========================================================================
  975. =================== Dump File: 072617-9140-01.dmp ====================
  976. ========================================================================
  977. Mini Kernel Dump File: Only registers and stack trace are available
  978. Windows 10 Kernel Version 14393 MP (8 procs) Free x64
  979. Product: WinNt, suite: TerminalServer SingleUserTS Personal
  980. Built by: 14393.1480.amd64fre.rs1_release.170706-2004
  981. Kernel base = 0xfffff803`c4002000 PsLoadedModuleList = 0xfffff803`c4301040
  982. Debug session time: Wed Jul 26 01:29:26.467 2017 (UTC - 4:00)
  983. System Uptime: 0 days 0:05:33.224
  984.  
  985. BugCheck 3B, {c0000005, fffff803c4036232, ffffd48036b59fb0, 0}
  986. Probably caused by : memory_corruption
  987. Followup: memory_corruption
  988.  
  989. SYSTEM_SERVICE_EXCEPTION (3b)
  990. An exception happened while executing a system service routine.
  991.  
  992. Arguments:
  993. Arg1: 00000000c0000005, Exception code that caused the bugcheck
  994. Arg2: fffff803c4036232, Address of the instruction which caused the bugcheck
  995. Arg3: ffffd48036b59fb0, Address of the context record for the exception that caused the bugcheck
  996. Arg4: 0000000000000000, zero.
  997.  
  998. Debugging Details:
  999. DUMP_CLASS: 1
  1000. DUMP_QUALIFIER: 400
  1001. BUILD_VERSION_STRING: 10.0.14393.1480 (rs1_release.170706-2004)
  1002. SYSTEM_MANUFACTURER: MSI
  1003. SYSTEM_PRODUCT_NAME: MS-7693
  1004. SYSTEM_VERSION: 4.0
  1005. BIOS_VENDOR: American Megatrends Inc.
  1006. BIOS_VERSION: V22.4
  1007. BIOS_DATE: 12/21/2015
  1008. BASEBOARD_MANUFACTURER: MSI
  1009. BASEBOARD_PRODUCT: 970 GAMING (MS-7693)
  1010. BASEBOARD_VERSION: 4.0
  1011. DUMP_TYPE: 2
  1012. EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
  1013. FAULTING_IP:
  1014. nt!KiExitDispatcher+152
  1015. fffff803`c4036232 f0410fba2c2407 lock bts dword ptr [r12],7
  1016. CONTEXT: ffffd48036b59fb0 -- (.cxr 0xffffd48036b59fb0)
  1017. rax=0000000000000004 rbx=ffff868fc5679500 rcx=ffff868fc07fbc58
  1018. rdx=0000000000000000 rsi=ffff868fc0c05970 rdi=ffffd48030fc0180
  1019. rip=fffff803c4036232 rsp=ffffd48036b5a9b0 rbp=0000000000000001
  1020. r8=0000000000000001 r9=0000000000000001 r10=fffff803c4415e00
  1021. r11=0000000000000000 r12=fffb868fc6740ee0 r13=ffff868fc0c059d0
  1022. r14=0000000000000001 r15=ffff868fc0c05800
  1023. iopl=0 nv up ei ng nz ac po cy
  1024. cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010297
  1025. nt!KiExitDispatcher+0x152:
  1026. fffff803`c4036232 f0410fba2c2407 lock bts dword ptr [r12],7 ds:002b:fffb868f`c6740ee0=????????
  1027. Resetting default scope
  1028. CPU_COUNT: 8
  1029. CPU_MHZ: fa0
  1030. CPU_VENDOR: AuthenticAMD
  1031. CPU_FAMILY: 15
  1032. CPU_MODEL: 2
  1033. CPU_STEPPING: 0
  1034. CUSTOMER_CRASH_COUNT: 1
  1035. DEFAULT_BUCKET_ID: CODE_CORRUPTION
  1036. BUGCHECK_STR: 0x3B
  1037.  
  1038. PROCESS_NAME: audiodg.exe
  1039.  
  1040. CURRENT_IRQL: 2
  1041. LAST_CONTROL_TRANSFER: from fffff803c4035dac to fffff803c4036232
  1042. STACK_TEXT:
  1043. ffffd480`36b5a9b0 fffff803`c4035dac : ffff868f`c56795b0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExitDispatcher+0x152
  1044. ffffd480`36b5aa20 fffff803`c4415ee2 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeSetEvent+0xfc
  1045. ffffd480`36b5aab0 fffff803`c415c693 : ffff868f`c08b3080 00000000`00000001 00000000`00000000 ffff868f`c56795b0 : nt!NtSetEvent+0x92
  1046. ffffd480`36b5ab00 00007ffb`89cd62a4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
  1047. 000000d2`e72ffce8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`89cd62a4
  1048. CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
  1049. fffff803c40549d1 - nt!MiCompletePrivateZeroFault+821
  1050. [ fa:e7 ]
  1051. fffff803c4054a94 - nt!MiCompletePrivateZeroFault+8e4 (+0xc3)
  1052. [ fa:e7 ]
  1053. fffff803c4054f21-fffff803c4054f22 2 bytes - nt!MiAllocateWsle+421 (+0x48d)
  1054. [ 80 f6:00 81 ]
  1055. fffff803c4060022-fffff803c4060023 2 bytes - nt!MiAgeWorkingSet+5a2 (+0xb101)
  1056. [ ff f6:7f 81 ]
  1057. fffff803c41152de - nt!MiPurgeZeroList+6e (+0xb52bc)
  1058. [ fa:e7 ]
  1059. 7 errors : !nt (fffff803c40549d1-fffff803c41152de)
  1060. MODULE_NAME: memory_corruption
  1061.  
  1062. IMAGE_NAME: memory_corruption
  1063.  
  1064. FOLLOWUP_NAME: memory_corruption
  1065. DEBUG_FLR_IMAGE_TIMESTAMP: 0
  1066. MEMORY_CORRUPTOR: LARGE
  1067. STACK_COMMAND: .cxr 0xffffd48036b59fb0 ; kb
  1068. FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
  1069. BUCKET_ID: MEMORY_CORRUPTION_LARGE
  1070. PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
  1071. TARGET_TIME: 2017-07-26T05:29:26.000Z
  1072. OSBUILD: 14393
  1073. OSSERVICEPACK: 1480
  1074. SERVICEPACK_NUMBER: 0
  1075. OS_REVISION: 0
  1076. SUITE_MASK: 784
  1077. PRODUCT_TYPE: 1
  1078. OSPLATFORM_TYPE: x64
  1079. OSNAME: Windows 10
  1080. OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
  1081. USER_LCID: 0
  1082. OSBUILD_TIMESTAMP: 2017-07-07 02:26:09
  1083. BUILDDATESTAMP_STR: 170706-2004
  1084. BUILDLAB_STR: rs1_release
  1085. BUILDOSVER_STR: 10.0.14393.1480
  1086. ANALYSIS_SESSION_ELAPSED_TIME: 2ac1
  1087. ANALYSIS_SOURCE: KM
  1088. FAILURE_ID_HASH_STRING: km:memory_corruption_large
  1089. FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
  1090. Followup: memory_corruption
  1091.  
  1092. ========================================================================
  1093. =================== Dump File: 072617-9421-01.dmp ====================
  1094. ========================================================================
  1095. Mini Kernel Dump File: Only registers and stack trace are available
  1096. Windows 10 Kernel Version 14393 MP (8 procs) Free x64
  1097. Product: WinNt, suite: TerminalServer SingleUserTS Personal
  1098. Built by: 14393.1480.amd64fre.rs1_release.170706-2004
  1099. Kernel base = 0xfffff800`8de7e000 PsLoadedModuleList = 0xfffff800`8e17d040
  1100. Debug session time: Wed Jul 26 01:23:07.396 2017 (UTC - 4:00)
  1101. System Uptime: 3 days 19:03:20.153
  1102.  
  1103. BugCheck A, {200000002, 2, 0, fffff8008deb472c}
  1104. Probably caused by : Unknown_Image ( PAGE_NOT_ZERO )
  1105. Followup: MachineOwner
  1106. *** Memory manager detected 1 instance(s) of page corruption, target is likely to have memory corruption.
  1107.  
  1108. IRQL_NOT_LESS_OR_EQUAL (a)
  1109. An attempt was made to access a pageable (or completely invalid) address at an
  1110. interrupt request level (IRQL) that is too high. This is usually
  1111. caused by drivers using improper addresses.
  1112. If a kernel debugger is available get the stack backtrace.
  1113.  
  1114. Arguments:
  1115. Arg1: 0000000200000002, memory referenced
  1116. Arg2: 0000000000000002, IRQL
  1117. Arg3: 0000000000000000, bitfield :
  1118. bit 0 : value 0 = read operation, 1 = write operation
  1119. bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
  1120. Arg4: fffff8008deb472c, address which referenced memory
  1121.  
  1122. Debugging Details:
  1123. DUMP_CLASS: 1
  1124. DUMP_QUALIFIER: 400
  1125. BUILD_VERSION_STRING: 10.0.14393.1480 (rs1_release.170706-2004)
  1126. SYSTEM_MANUFACTURER: MSI
  1127. SYSTEM_PRODUCT_NAME: MS-7693
  1128. SYSTEM_VERSION: 4.0
  1129. BIOS_VENDOR: American Megatrends Inc.
  1130. BIOS_VERSION: V22.4
  1131. BIOS_DATE: 12/21/2015
  1132. BASEBOARD_MANUFACTURER: MSI
  1133. BASEBOARD_PRODUCT: 970 GAMING (MS-7693)
  1134. BASEBOARD_VERSION: 4.0
  1135. DUMP_TYPE: 2
  1136. READ_ADDRESS: fffff8008e21e338: Unable to get MiVisibleState
  1137. 0000000200000002
  1138. CURRENT_IRQL: 2
  1139. FAULTING_IP:
  1140. nt!KiTimerWaitTest+9c
  1141. fffff800`8deb472c 0fb74702 movzx eax,word ptr [rdi+2]
  1142. CPU_COUNT: 8
  1143. CPU_MHZ: fa0
  1144. CPU_VENDOR: AuthenticAMD
  1145. CPU_FAMILY: 15
  1146. CPU_MODEL: 2
  1147. CPU_STEPPING: 0
  1148. CUSTOMER_CRASH_COUNT: 1
  1149. DEFAULT_BUCKET_ID: PAGE_NOT_ZERO_AV
  1150. BUGCHECK_STR: AV
  1151.  
  1152. PROCESS_NAME: System
  1153.  
  1154. BAD_PAGES_DETECTED: 1
  1155. TRAP_FRAME: fffff8008fced790 -- (.trap 0xfffff8008fced790)
  1156. NOTE: The trap frame does not contain all registers.
  1157. Some register values may be zeroed or incorrect.
  1158. rax=0000000000000004 rbx=0000000000000000 rcx=0000000000000005
  1159. rdx=ffffb38086ae2610 rsi=0000000000000000 rdi=0000000000000000
  1160. rip=fffff8008deb472c rsp=fffff8008fced920 rbp=fffff8008e1ba180
  1161. r8=0000000000000102 r9=0000000000bece07 r10=000002fb381dedfc
  1162. r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
  1163. r14=0000000000000000 r15=0000000000000000
  1164. iopl=0 nv up ei pl nz na pe nc
  1165. nt!KiTimerWaitTest+0x9c:
  1166. fffff800`8deb472c 0fb74702 movzx eax,word ptr [rdi+2] ds:00000000`00000002=????
  1167. Resetting default scope
  1168. LAST_CONTROL_TRANSFER: from fffff8008dfd8b29 to fffff8008dfcd960
  1169. STACK_TEXT:
  1170. fffff800`8fced648 fffff800`8dfd8b29 : 00000000`0000000a 00000002`00000002 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
  1171. fffff800`8fced650 fffff800`8dfd7107 : 00000000`00000000 fffff800`8e1bcf10 ffffb380`8c1b0640 fffff800`8dea1075 : nt!KiBugCheckDispatch+0x69
  1172. fffff800`8fced790 fffff800`8deb472c : 00000000`000005d3 ffffb380`871632f0 00000000`00000001 ffffb380`87163708 : nt!KiPageFault+0x247
  1173. fffff800`8fced920 fffff800`8deb41f8 : ffffb380`86ae2540 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiTimerWaitTest+0x9c
  1174. fffff800`8fced9e0 fffff800`8dfd09ea : 00000000`00000000 fffff800`8e1ba180 fffff800`8e234940 ffffb380`8cddb080 : nt!KiRetireDpcList+0x598
  1175. fffff800`8fcedc60 00000000`00000000 : fffff800`8fcee000 fffff800`8fce8000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x5a
  1176. STACK_COMMAND: kb
  1177. THREAD_SHA1_HASH_MOD_FUNC: 8bf4c35a9afebf54fec0657a41fdb5214542f0a1
  1178. THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 62508bb319c654d5e8ca741495a72286ebd2c4b0
  1179. THREAD_SHA1_HASH_MOD: ee8fcf1fb60cb6e3e2f60ddbed2ec02b5748a693
  1180. SYMBOL_NAME: PAGE_NOT_ZERO
  1181. FOLLOWUP_NAME: MachineOwner
  1182. MODULE_NAME: Unknown_Module
  1183.  
  1184. IMAGE_NAME: Unknown_Image
  1185.  
  1186. DEBUG_FLR_IMAGE_TIMESTAMP: 0
  1187. BUCKET_ID: PAGE_NOT_ZERO_AV
  1188. PRIMARY_PROBLEM_CLASS: PAGE_NOT_ZERO
  1189. FAILURE_BUCKET_ID: PAGE_NOT_ZERO_AV
  1190. TARGET_TIME: 2017-07-26T05:23:07.000Z
  1191. OSBUILD: 14393
  1192. OSSERVICEPACK: 1480
  1193. SERVICEPACK_NUMBER: 0
  1194. OS_REVISION: 0
  1195. SUITE_MASK: 784
  1196. PRODUCT_TYPE: 1
  1197. OSPLATFORM_TYPE: x64
  1198. OSNAME: Windows 10
  1199. OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
  1200. USER_LCID: 0
  1201. OSBUILD_TIMESTAMP: 2017-07-07 02:26:09
  1202. BUILDDATESTAMP_STR: 170706-2004
  1203. BUILDLAB_STR: rs1_release
  1204. BUILDOSVER_STR: 10.0.14393.1480
  1205. ANALYSIS_SESSION_ELAPSED_TIME: f0d
  1206. ANALYSIS_SOURCE: KM
  1207. FAILURE_ID_HASH_STRING: km:page_not_zero_av
  1208. FAILURE_ID_HASH: {91fefd05-7a2b-5d37-e27f-7af624353ffc}
  1209. Followup: MachineOwner
  1210. *** Memory manager detected 1 instance(s) of page corruption, target is likely to have memory corruption.
  1211.  
  1212. ========================================================================
  1213. =================== Dump File: 072717-6218-01.dmp ====================
  1214. ========================================================================
  1215. Mini Kernel Dump File: Only registers and stack trace are available
  1216. Windows 10 Kernel Version 14393 MP (8 procs) Free x64
  1217. Product: WinNt, suite: TerminalServer SingleUserTS Personal
  1218. Built by: 14393.1480.amd64fre.rs1_release.170706-2004
  1219. Kernel base = 0xfffff803`90814000 PsLoadedModuleList = 0xfffff803`90b13040
  1220. Debug session time: Thu Jul 27 11:53:06.107 2017 (UTC - 4:00)
  1221. System Uptime: 0 days 0:07:25.864
  1222.  
  1223. BugCheck 1E, {ffffffffc0000005, fffff803909694c7, 0, ffffffffffffffff}
  1224. Probably caused by : memory_corruption
  1225. Followup: memory_corruption
  1226.  
  1227. KMODE_EXCEPTION_NOT_HANDLED (1e)
  1228. This is a very common bugcheck. Usually the exception address pinpoints
  1229. the driver/function that caused the problem. Always note this address
  1230. as well as the link date of the driver/image that contains this address.
  1231.  
  1232. Arguments:
  1233. Arg1: ffffffffc0000005, The exception code that was not handled
  1234. Arg2: fffff803909694c7, The address that the exception occurred at
  1235. Arg3: 0000000000000000, Parameter 0 of the exception
  1236. Arg4: ffffffffffffffff, Parameter 1 of the exception
  1237.  
  1238. Debugging Details:
  1239. DUMP_CLASS: 1
  1240. DUMP_QUALIFIER: 400
  1241. BUILD_VERSION_STRING: 10.0.14393.1480 (rs1_release.170706-2004)
  1242. SYSTEM_MANUFACTURER: MSI
  1243. SYSTEM_PRODUCT_NAME: MS-7693
  1244. SYSTEM_VERSION: 4.0
  1245. BIOS_VENDOR: American Megatrends Inc.
  1246. BIOS_VERSION: V22.4
  1247. BIOS_DATE: 12/21/2015
  1248. BASEBOARD_MANUFACTURER: MSI
  1249. BASEBOARD_PRODUCT: 970 GAMING (MS-7693)
  1250. BASEBOARD_VERSION: 4.0
  1251. DUMP_TYPE: 2
  1252. READ_ADDRESS: fffff80390bb4338: Unable to get MiVisibleState
  1253. ffffffffffffffff
  1254. EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
  1255. FAULTING_IP:
  1256. nt!ExpInterlockedPopEntrySListFault+0
  1257. fffff803`909694c7 498b08 mov rcx,qword ptr [r8]
  1258. EXCEPTION_PARAMETER2: ffffffffffffffff
  1259. BUGCHECK_STR: 0x1E_c0000005_R
  1260. CPU_COUNT: 8
  1261. CPU_MHZ: fa0
  1262. CPU_VENDOR: AuthenticAMD
  1263. CPU_FAMILY: 15
  1264. CPU_MODEL: 2
  1265. CPU_STEPPING: 0
  1266. CUSTOMER_CRASH_COUNT: 1
  1267. DEFAULT_BUCKET_ID: CODE_CORRUPTION
  1268.  
  1269. PROCESS_NAME: chrome.exe
  1270.  
  1271. CURRENT_IRQL: 2
  1272. EXCEPTION_RECORD: ffffe000623f6250 -- (.exr 0xffffe000623f6250)
  1273. ExceptionAddress: 0000000000000000
  1274. ExceptionCode: 00000000
  1275. ExceptionFlags: 00000000
  1276. NumberParameters: -1869164867
  1277. Parameter[0]: fffff80390b32700
  1278. Parameter[1]: fffff80390883887
  1279. Parameter[2]: ffffa80000000000
  1280. Parameter[3]: 00000000000406f8
  1281. Parameter[4]: 0000000000000017
  1282. Parameter[5]: 00001f80018685d4
  1283. Parameter[6]: 00000000fb820004
  1284. Parameter[7]: ffffa80000000a30
  1285. Parameter[8]: fffba500020e6e90
  1286. Parameter[9]: fffba500020e6e90
  1287. Parameter[10]: 0000000000000000
  1288. Parameter[11]: ffffa80000000a30
  1289. Parameter[12]: fffff80390b32080
  1290. Parameter[13]: 0000000000000009
  1291. Parameter[14]: 0000000000000000
  1292. TRAP_FRAME: 000000399a481000 -- (.trap 0x399a481000)
  1293. Unable to read trap frame at 00000039`9a481000
  1294. LAST_CONTROL_TRANSFER: from fffff803908bc270 to fffff80390963960
  1295. STACK_TEXT:
  1296. ffffe000`623f59c8 fffff803`908bc270 : 00000000`0000001e ffffffff`c0000005 fffff803`909694c7 00000000`00000000 : nt!KeBugCheckEx
  1297. ffffe000`623f59d0 fffff803`9096ec0e : ffffe000`623f6250 ffffb580`1ccd2408 00000039`9a481000 ffffe000`623f69b0 : nt!KiDispatchException+0x220
  1298. ffffe000`623f6090 fffff803`9096cebd : fffff803`90b32700 fffff803`90883887 ffffa800`00000000 00000000`000406f8 : nt!KiExceptionDispatch+0xce
  1299. ffffe000`623f6270 fffff803`909694c7 : 00000000`00000003 fffff803`908685d4 00000000`00000000 00000000`00000001 : nt!KiGeneralProtectionFault+0xfd
  1300. ffffe000`623f6400 fffff803`908685d4 : 00000000`00000000 00000000`00000001 ffffb580`e406d330 ffffe000`623f66f0 : nt!ExpInterlockedPopEntrySListFault
  1301. ffffe000`623f6410 fffff803`908683c0 : fffff803`90b32080 ffffa500`00000003 ffffffff`00000002 00000000`00000002 : nt!MiGetFreeOrZeroPage+0x64
  1302. ffffe000`623f64e0 fffff803`90867f8e : fffff803`90b32080 ffff8200`00000000 00000000`00000000 00000000`00000000 : nt!MiGetPage+0x80
  1303. ffffe000`623f6560 fffff803`9086600d : ffff8200`b42fd080 ffffe000`5d39c180 ffffe000`623f67a0 fffff803`90b32080 : nt!MiGetPageChain+0x24e
  1304. ffffe000`623f66a0 fffff803`9086570e : ffffdcbf`60a131a4 ffffe000`623f6b00 00000336`3c000018 ffff8200`b437f080 : nt!MiResolvePrivateZeroFault+0x46d
  1305. ffffe000`623f67f0 fffff803`9086964f : ffff8200`b437f580 ffffb581`9b1e0000 ffffe000`623f6a68 ffff8200`b437f580 : nt!MiResolveDemandZeroFault+0x2fe
  1306. ffffe000`623f6900 fffff803`9096cffc : ffff8200`b42fd080 00000000`000061a7 ffffe000`623f6ad8 ffff8200`b3d3d200 : nt!MmAccessFault+0x7cf
  1307. ffffe000`623f6b00 00007ff8`b42bcc64 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x13c
  1308. 000000d3`7f1fb5a0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`b42bcc64
  1309. STACK_COMMAND: kb
  1310. CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
  1311. fffff8039083aaad-fffff8039083aaae 2 bytes - nt!MiDeletePteList+20d
  1312. [ 80 fa:00 a5 ]
  1313. fffff8039083aabb - nt!MiDeletePteList+21b (+0x0e)
  1314. [ f6:b5 ]
  1315. fffff80390866033-fffff80390866035 3 bytes - nt!MiResolvePrivateZeroFault+493 (+0x2b578)
  1316. [ 40 fb f6:c0 da b5 ]
  1317. fffff8039086605b-fffff8039086605c 2 bytes - nt!MiResolvePrivateZeroFault+4bb (+0x28)
  1318. [ 80 fa:00 a5 ]
  1319. fffff803908669d0-fffff803908669d1 2 bytes - nt!MiCompletePrivateZeroFault+820 (+0x975)
  1320. [ 80 fa:00 a5 ]
  1321. fffff80390866a93-fffff80390866a94 2 bytes - nt!MiCompletePrivateZeroFault+8e3 (+0xc3)
  1322. [ 80 fa:00 a5 ]
  1323. fffff80390867fb0-fffff80390867fb1 2 bytes - nt!MiGetPageChain+270 (+0x151d)
  1324. [ 80 fa:00 a5 ]
  1325. fffff803908683d7-fffff803908683d8 2 bytes - nt!MiGetPage+97 (+0x427)
  1326. [ 80 fa:00 a5 ]
  1327. fffff803908685ea-fffff803908685eb 2 bytes - nt!MiGetFreeOrZeroPage+7a (+0x213)
  1328. [ 80 fa:00 a5 ]
  1329. fffff8039086974e - nt!MmAccessFault+8ce (+0x1164)
  1330. [ f6:b5 ]
  1331. fffff80390882e12-fffff80390882e14 3 bytes - nt!MiPfnShareCountIsZero+192 (+0x196c4)
  1332. [ 40 fb f6:c0 da b5 ]
  1333. fffff80390882e37 - nt!MiPfnShareCountIsZero+1b7 (+0x25)
  1334. [ f6:b5 ]
  1335. fffff80390882e56-fffff80390882e57 2 bytes - nt!MiPfnShareCountIsZero+1d6 (+0x1f)
  1336. [ a0 7d:60 ed ]
  1337. fffff803909272dd-fffff803909272de 2 bytes - nt!MiPurgeZeroList+6d (+0xa4487)
  1338. [ 80 fa:00 a5 ]
  1339. 27 errors : !nt (fffff8039083aaad-fffff803909272de)
  1340. MODULE_NAME: memory_corruption
  1341.  
  1342. IMAGE_NAME: memory_corruption
  1343.  
  1344. FOLLOWUP_NAME: memory_corruption
  1345. DEBUG_FLR_IMAGE_TIMESTAMP: 0
  1346. MEMORY_CORRUPTOR: LARGE
  1347. FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
  1348. BUCKET_ID: MEMORY_CORRUPTION_LARGE
  1349. PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
  1350. TARGET_TIME: 2017-07-27T15:53:06.000Z
  1351. OSBUILD: 14393
  1352. OSSERVICEPACK: 1480
  1353. SERVICEPACK_NUMBER: 0
  1354. OS_REVISION: 0
  1355. SUITE_MASK: 784
  1356. PRODUCT_TYPE: 1
  1357. OSPLATFORM_TYPE: x64
  1358. OSNAME: Windows 10
  1359. OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
  1360. USER_LCID: 0
  1361. OSBUILD_TIMESTAMP: 2017-07-07 02:26:09
  1362. BUILDDATESTAMP_STR: 170706-2004
  1363. BUILDLAB_STR: rs1_release
  1364. BUILDOSVER_STR: 10.0.14393.1480
  1365. ANALYSIS_SESSION_ELAPSED_TIME: 2ad7
  1366. ANALYSIS_SOURCE: KM
  1367. FAILURE_ID_HASH_STRING: km:memory_corruption_large
  1368. FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
  1369. Followup: memory_corruption
  1370.  
  1371. ========================================================================
  1372. =================== Dump File: 072717-9843-01.dmp ====================
  1373. ========================================================================
  1374. Mini Kernel Dump File: Only registers and stack trace are available
  1375. Windows 10 Kernel Version 14393 MP (8 procs) Free x64
  1376. Product: WinNt, suite: TerminalServer SingleUserTS Personal
  1377. Built by: 14393.1480.amd64fre.rs1_release.170706-2004
  1378. Kernel base = 0xfffff801`cf67f000 PsLoadedModuleList = 0xfffff801`cf97e040
  1379. Debug session time: Thu Jul 27 11:59:50.375 2017 (UTC - 4:00)
  1380. System Uptime: 0 days 0:06:03.131
  1381.  
  1382. BugCheck 1000007E, {ffffffffc0000005, fffff801cf6dcae8, ffffb60010132208, ffffb60010131a40}
  1383. Probably caused by : memory_corruption
  1384. Followup: memory_corruption
  1385.  
  1386. SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
  1387. This is a very common bugcheck. Usually the exception address pinpoints
  1388. the driver/function that caused the problem. Always note this address
  1389. as well as the link date of the driver/image that contains this address.
  1390. Some common problems are exception code 0x80000003. This means a hard
  1391. coded breakpoint or assertion was hit, but this system was booted
  1392. /NODEBUG. This is not supposed to happen as developers should never have
  1393. hardcoded breakpoints in retail code, but ...
  1394. If this happens, make sure a debugger gets connected, and the
  1395. system is booted /DEBUG. This will let us see why this breakpoint is
  1396. happening.
  1397.  
  1398. Arguments:
  1399. Arg1: ffffffffc0000005, The exception code that was not handled
  1400. Arg2: fffff801cf6dcae8, The address that the exception occurred at
  1401. Arg3: ffffb60010132208, Exception Record Address
  1402. Arg4: ffffb60010131a40, Context Record Address
  1403.  
  1404. Debugging Details:
  1405. DUMP_CLASS: 1
  1406. DUMP_QUALIFIER: 400
  1407. BUILD_VERSION_STRING: 10.0.14393.1480 (rs1_release.170706-2004)
  1408. SYSTEM_MANUFACTURER: MSI
  1409. SYSTEM_PRODUCT_NAME: MS-7693
  1410. SYSTEM_VERSION: 4.0
  1411. BIOS_VENDOR: American Megatrends Inc.
  1412. BIOS_VERSION: V22.4
  1413. BIOS_DATE: 12/21/2015
  1414. BASEBOARD_MANUFACTURER: MSI
  1415. BASEBOARD_PRODUCT: 970 GAMING (MS-7693)
  1416. BASEBOARD_VERSION: 4.0
  1417. DUMP_TYPE: 2
  1418. EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
  1419. FAULTING_IP:
  1420. nt!MiAgeWorkingSet+68
  1421. fffff801`cf6dcae8 488b4310 mov rax,qword ptr [rbx+10h]
  1422. EXCEPTION_RECORD: ffffb60010132208 -- (.exr 0xffffb60010132208)
  1423. ExceptionAddress: fffff801cf6dcae8 (nt!MiAgeWorkingSet+0x0000000000000068)
  1424. ExceptionCode: c0000005 (Access violation)
  1425. ExceptionFlags: 00000000
  1426. NumberParameters: 2
  1427. Parameter[0]: 0000000000000000
  1428. Parameter[1]: ffffffffffffffff
  1429. Attempt to read from address ffffffffffffffff
  1430. CONTEXT: ffffb60010131a40 -- (.cxr 0xffffb60010131a40)
  1431. rax=0000000000000000 rbx=fffb880010804310 rcx=ffffde8f95da3580
  1432. rdx=0000000000000000 rsi=0000000000000000 rdi=ffffde8f95da3580
  1433. rip=fffff801cf6dcae8 rsp=ffffb60010132440 rbp=ffffb600101324a0
  1434. r8=0000000000000001 r9=0000000000000007 r10=0000000000000000
  1435. r11=00000000000003ff r12=ffffb60010132a80 r13=fffb880010804170
  1436. r14=ffffde8f95da3580 r15=0000000000000001
  1437. iopl=0 nv up ei ng nz ac pe cy
  1438. cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00210293
  1439. nt!MiAgeWorkingSet+0x68:
  1440. fffff801`cf6dcae8 488b4310 mov rax,qword ptr [rbx+10h] ds:002b:fffb8800`10804320=????????????????
  1441. Resetting default scope
  1442. CPU_COUNT: 8
  1443. CPU_MHZ: fa0
  1444. CPU_VENDOR: AuthenticAMD
  1445. CPU_FAMILY: 15
  1446. CPU_MODEL: 2
  1447. CPU_STEPPING: 0
  1448. CUSTOMER_CRASH_COUNT: 1
  1449. DEFAULT_BUCKET_ID: CODE_CORRUPTION
  1450.  
  1451. PROCESS_NAME: chrome.exe
  1452.  
  1453. CURRENT_IRQL: 2
  1454. ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
  1455. EXCEPTION_CODE_STR: c0000005
  1456. EXCEPTION_PARAMETER1: 0000000000000000
  1457. EXCEPTION_PARAMETER2: ffffffffffffffff
  1458. FOLLOWUP_IP:
  1459. nt!MiAgeWorkingSet+68
  1460. fffff801`cf6dcae8 488b4310 mov rax,qword ptr [rbx+10h]
  1461. READ_ADDRESS: fffff801cfa1f338: Unable to get MiVisibleState
  1462. ffffffffffffffff
  1463. BUGCHECK_STR: AV
  1464. LAST_CONTROL_TRANSFER: from fffff801cf72415c to fffff801cf6dcae8
  1465. STACK_TEXT:
  1466. ffffb600`10132440 fffff801`cf72415c : 00000000`00000000 fffff801`cf691e44 00000000`00000000 00000000`00000000 : nt!MiAgeWorkingSet+0x68
  1467. ffffb600`101327c0 fffff801`cf72384e : ffffb600`00000000 ffffb600`10132a80 00000000`00000000 00000000`00000000 : nt!MiTrimOrAgeWorkingSet+0x49c
  1468. ffffb600`10132890 fffff801`cf70b95b : fffff801`00000000 00000000`00000000 fffff801`cf99d080 ffffde8f`8f817240 : nt!MiProcessWorkingSets+0x1ee
  1469. ffffb600`10132a60 fffff801`cf7af35d : 00000000`00000004 00000000`00000004 00000000`ffffffff 00000000`00000001 : nt!MiWorkingSetManager+0xa7
  1470. ffffb600`10132b20 fffff801`cf735965 : ffffde8f`8f941040 00000000`00000080 fffff801`cf7af20c ff38244c`83382454 : nt!KeBalanceSetManager+0x151
  1471. ffffb600`10132c10 fffff801`cf7d3e26 : ffffb600`10460180 ffffde8f`8f941040 fffff801`cf735924 0ff575ff`c783c803 : nt!PspSystemThreadStartup+0x41
  1472. ffffb600`10132c60 00000000`00000000 : ffffb600`10133000 ffffb600`1012d000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
  1473. CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
  1474. fffff801cf6d8d86 - nt!MiGetNextPageTable+1a6
  1475. [ f6:9c ]
  1476. fffff801cf6d8db9 - nt!MiGetNextPageTable+1d9 (+0x33)
  1477. [ f6:9c ]
  1478. fffff801cf6dc036 - nt!MiDeleteVirtualAddresses+986 (+0x327d)
  1479. [ f6:9c ]
  1480. fffff801cf6dc04d - nt!MiDeleteVirtualAddresses+99d (+0x17)
  1481. [ f6:9c ]
  1482. fffff801cf6dc0be - nt!MiDeleteVirtualAddresses+a0e (+0x71)
  1483. [ fa:80 ]
  1484. fffff801cf6dc41b - nt!MiDeleteVirtualAddresses+d6b (+0x35d)
  1485. [ fa:80 ]
  1486. fffff801cf6dc5c9 - nt!MiDeleteVirtualAddresses+f19 (+0x1ae)
  1487. [ f6:9c ]
  1488. fffff801cf6dc86e - nt!MiTryLocateWsle+15e (+0x2a5)
  1489. [ f6:9c ]
  1490. fffff801cf6dce75 - nt!MiAgeWorkingSet+3f5 (+0x607)
  1491. [ f6:9c ]
  1492. fffff801cf6dce97 - nt!MiAgeWorkingSet+417 (+0x22)
  1493. [ fa:80 ]
  1494. fffff801cf6dcffa - nt!MiAgeWorkingSet+57a (+0x163)
  1495. [ f6:9c ]
  1496. fffff801cf70bbdf - nt!MiEmptyDecayClusterTimers+bf (+0x2ebe5)
  1497. [ fa:80 ]
  1498. fffff801cf7922de - nt!MiPurgeZeroList+6e (+0x866ff)
  1499. [ fa:80 ]
  1500. fffff801cf7af516 - nt!MiDeleteZeroThreadContext+5a (+0x1d238)
  1501. [ fa:80 ]
  1502. 14 errors : !nt (fffff801cf6d8d86-fffff801cf7af516)
  1503. MODULE_NAME: memory_corruption
  1504.  
  1505. IMAGE_NAME: memory_corruption
  1506.  
  1507. FOLLOWUP_NAME: memory_corruption
  1508. DEBUG_FLR_IMAGE_TIMESTAMP: 0
  1509. MEMORY_CORRUPTOR: LARGE
  1510. STACK_COMMAND: .cxr 0xffffb60010131a40 ; kb
  1511. FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
  1512. BUCKET_ID: MEMORY_CORRUPTION_LARGE
  1513. PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
  1514. TARGET_TIME: 2017-07-27T15:59:50.000Z
  1515. OSBUILD: 14393
  1516. OSSERVICEPACK: 1480
  1517. SERVICEPACK_NUMBER: 0
  1518. OS_REVISION: 0
  1519. SUITE_MASK: 784
  1520. PRODUCT_TYPE: 1
  1521. OSPLATFORM_TYPE: x64
  1522. OSNAME: Windows 10
  1523. OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
  1524. USER_LCID: 0
  1525. OSBUILD_TIMESTAMP: 2017-07-07 02:26:09
  1526. BUILDDATESTAMP_STR: 170706-2004
  1527. BUILDLAB_STR: rs1_release
  1528. BUILDOSVER_STR: 10.0.14393.1480
  1529. ANALYSIS_SESSION_ELAPSED_TIME: 38a7
  1530. ANALYSIS_SOURCE: KM
  1531. FAILURE_ID_HASH_STRING: km:memory_corruption_large
  1532. FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
  1533. Followup: memory_corruption
  1534.  
  1535. ========================================================================
  1536. =================== Dump File: 013017-4968-01.dmp ====================
  1537. ========================================================================
  1538. Mini Kernel Dump File: Only registers and stack trace are available
  1539. Windows 10 Kernel Version 14393 MP (8 procs) Free x64
  1540. Product: WinNt, suite: TerminalServer SingleUserTS Personal
  1541. Built by: 14393.693.amd64fre.rs1_release.161220-1747
  1542. Kernel base = 0xfffff800`5da13000 PsLoadedModuleList = 0xfffff800`5dd18060
  1543. Debug session time: Mon Jan 30 16:22:47.787 2017 (UTC - 4:00)
  1544. System Uptime: 3 days 0:34:16.542
  1545.  
  1546. BugCheck 116, {ffffae8b48f273d0, fffff80a3763f284, 0, d}
  1547. *** WARNING: Unable to verify timestamp for atikmpag.sys
  1548. *** ERROR: Module load completed but symbols could not be loaded for atikmpag.sys
  1549. Probably caused by : atikmpag.sys ( atikmpag+f284 )
  1550. Followup: MachineOwner
  1551.  
  1552. VIDEO_TDR_FAILURE (116)
  1553. Attempt to reset the display driver and recover from timeout failed.
  1554.  
  1555. Arguments:
  1556. Arg1: ffffae8b48f273d0, Optional pointer to internal TDR recovery context (TDR_RECOVERY_CONTEXT).
  1557. Arg2: fffff80a3763f284, The pointer into responsible device driver module (e.g. owner tag).
  1558. Arg3: 0000000000000000, Optional error code (NTSTATUS) of the last failed operation.
  1559. Arg4: 000000000000000d, Optional internal context dependent data.
  1560.  
  1561. Debugging Details:
  1562. DUMP_CLASS: 1
  1563. DUMP_QUALIFIER: 400
  1564. BUILD_VERSION_STRING: 10.0.14393.693 (rs1_release.161220-1747)
  1565. SYSTEM_MANUFACTURER: MSI
  1566. SYSTEM_PRODUCT_NAME: MS-7693
  1567. SYSTEM_VERSION: 4.0
  1568. BIOS_VENDOR: American Megatrends Inc.
  1569. BIOS_VERSION: V22.4
  1570. BIOS_DATE: 12/21/2015
  1571. BASEBOARD_MANUFACTURER: MSI
  1572. BASEBOARD_PRODUCT: 970 GAMING (MS-7693)
  1573. BASEBOARD_VERSION: 4.0
  1574. DUMP_TYPE: 2
  1575. FAULTING_IP:
  1576. atikmpag+f284
  1577. fffff80a`3763f284 4883ec28 sub rsp,28h
  1578. DEFAULT_BUCKET_ID: GRAPHICS_DRIVER_TDR_FAULT
  1579. CPU_COUNT: 8
  1580. CPU_MHZ: fa0
  1581. CPU_VENDOR: AuthenticAMD
  1582. CPU_FAMILY: 15
  1583. CPU_MODEL: 2
  1584. CPU_STEPPING: 0
  1585. CUSTOMER_CRASH_COUNT: 1
  1586. BUGCHECK_STR: 0x116
  1587.  
  1588. PROCESS_NAME: System
  1589.  
  1590. CURRENT_IRQL: 0
  1591. STACK_TEXT:
  1592. ffffe000`349b37c8 fffff80a`37c3ba88 : 00000000`00000116 ffffae8b`48f273d0 fffff80a`3763f284 00000000`00000000 : nt!KeBugCheckEx
  1593. ffffe000`349b37d0 fffff80a`37c3b193 : fffff80a`3763f284 ffffae8b`48f273d0 ffffe000`349b38d9 00000000`00000000 : dxgkrnl!TdrBugcheckOnTimeout+0xec
  1594. ffffe000`349b3810 fffff80a`38af77b5 : ffffae8b`48f273d0 00000000`003b9b4e 00000000`00000009 fffff80a`37ad909d : dxgkrnl!TdrIsRecoveryRequired+0x193
  1595. ffffe000`349b3840 fffff80a`38b53842 : ffffae8b`462cc000 00000000`00000002 ffffae8b`462cc000 ffffae8b`462ce000 : dxgmms2!VidSchiReportHwHang+0x4c1
  1596. ffffe000`349b3940 fffff80a`38b32b87 : 00000000`00000002 00000000`00ff216e 00000000`003b9b4e 00000000`00000001 : dxgmms2!VidSchiCheckHwProgress+0x20772
  1597. ffffe000`349b39b0 fffff80a`38ada4b4 : 00000000`00000000 ffffae8b`462ce000 00000000`0000000f 00000000`00000000 : dxgmms2!VidSchiWaitForSchedulerEvents+0x337
  1598. ffffe000`349b3a70 fffff80a`38b3ec1f : ffffae8b`462ffc00 ffffe000`349b3bd0 ffffae8b`462ffc20 ffffae8b`00000000 : dxgmms2!VidSchiScheduleCommandToRun+0x3d4
  1599. ffffe000`349b3b80 fffff80a`38b3ebe0 : ffffae8b`462ce500 ffffae8b`462ce000 00000000`00000080 fffff80a`38b3eb60 : dxgmms2!VidSchiRun_PriorityTable+0x2f
  1600. ffffe000`349b3bd0 fffff800`5da15729 : ffffe000`34880180 fffff800`5db62adf 00000000`0157a2da ffffae8b`465cf800 : dxgmms2!VidSchiWorkerThread+0x80
  1601. ffffe000`349b3c10 fffff800`5db62bb6 : ffffe000`34880180 ffffae8b`465cf800 fffff800`5da156e8 00000000`00000008 : nt!PspSystemThreadStartup+0x41
  1602. ffffe000`349b3c60 00000000`00000000 : ffffe000`349b4000 ffffe000`349ae000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
  1603. STACK_COMMAND: kb
  1604. THREAD_SHA1_HASH_MOD_FUNC: a05e887139f0ff6cbfa648fbee599294462fd682
  1605. THREAD_SHA1_HASH_MOD_FUNC_OFFSET: c0858cbefadebd900fba1d64c1ff0d52ab6be1bb
  1606. THREAD_SHA1_HASH_MOD: 65b26f16328fe41a723c00193723d68b091ef48d
  1607. FOLLOWUP_IP:
  1608. atikmpag+f284
  1609. fffff80a`3763f284 4883ec28 sub rsp,28h
  1610. FAULT_INSTR_CODE: 28ec8348
  1611. SYMBOL_NAME: atikmpag+f284
  1612. FOLLOWUP_NAME: MachineOwner
  1613. MODULE_NAME: atikmpag
  1614.  
  1615. IMAGE_NAME: atikmpag.sys
  1616.  
  1617. DEBUG_FLR_IMAGE_TIMESTAMP: 58443f42
  1618. FAILURE_BUCKET_ID: 0x116_IMAGE_atikmpag.sys
  1619. BUCKET_ID: 0x116_IMAGE_atikmpag.sys
  1620. PRIMARY_PROBLEM_CLASS: 0x116_IMAGE_atikmpag.sys
  1621. TARGET_TIME: 2017-01-30T20:22:47.000Z
  1622. OSBUILD: 14393
  1623. OSSERVICEPACK: 693
  1624. SERVICEPACK_NUMBER: 0
  1625. OS_REVISION: 0
  1626. SUITE_MASK: 784
  1627. PRODUCT_TYPE: 1
  1628. OSPLATFORM_TYPE: x64
  1629. OSNAME: Windows 10
  1630. OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
  1631. USER_LCID: 0
  1632. OSBUILD_TIMESTAMP: 2016-12-21 01:50:57
  1633. BUILDDATESTAMP_STR: 161220-1747
  1634. BUILDLAB_STR: rs1_release
  1635. BUILDOSVER_STR: 10.0.14393.693
  1636. ANALYSIS_SESSION_ELAPSED_TIME: 16b6
  1637. ANALYSIS_SOURCE: KM
  1638. FAILURE_ID_HASH_STRING: km:0x116_image_atikmpag.sys
  1639. FAILURE_ID_HASH: {e300aa8c-6915-3f37-7957-d2e4fc30a6fd}
  1640. Followup: MachineOwner
  1641.  
  1642. ========================================================================
  1643. =================== Dump File: 020817-5312-01.dmp ====================
  1644. ========================================================================
  1645. Mini Kernel Dump File: Only registers and stack trace are available
  1646. Windows 10 Kernel Version 14393 MP (8 procs) Free x64
  1647. Product: WinNt, suite: TerminalServer SingleUserTS Personal
  1648. Built by: 14393.693.amd64fre.rs1_release.161220-1747
  1649. Kernel base = 0xfffff801`17887000 PsLoadedModuleList = 0xfffff801`17b8c060
  1650. Debug session time: Wed Feb 8 02:40:44.772 2017 (UTC - 4:00)
  1651. System Uptime: 1 days 0:55:18.527
  1652.  
  1653. BugCheck 116, {ffffa78058ad0260, fffff809d68bf284, 0, d}
  1654. *** WARNING: Unable to verify timestamp for atikmpag.sys
  1655. *** ERROR: Module load completed but symbols could not be loaded for atikmpag.sys
  1656. Probably caused by : atikmpag.sys ( atikmpag+f284 )
  1657. Followup: MachineOwner
  1658.  
  1659. VIDEO_TDR_FAILURE (116)
  1660. Attempt to reset the display driver and recover from timeout failed.
  1661.  
  1662. Arguments:
  1663. Arg1: ffffa78058ad0260, Optional pointer to internal TDR recovery context (TDR_RECOVERY_CONTEXT).
  1664. Arg2: fffff809d68bf284, The pointer into responsible device driver module (e.g. owner tag).
  1665. Arg3: 0000000000000000, Optional error code (NTSTATUS) of the last failed operation.
  1666. Arg4: 000000000000000d, Optional internal context dependent data.
  1667.  
  1668. Debugging Details:
  1669. DUMP_CLASS: 1
  1670. DUMP_QUALIFIER: 400
  1671. BUILD_VERSION_STRING: 10.0.14393.693 (rs1_release.161220-1747)
  1672. SYSTEM_MANUFACTURER: MSI
  1673. SYSTEM_PRODUCT_NAME: MS-7693
  1674. SYSTEM_VERSION: 4.0
  1675. BIOS_VENDOR: American Megatrends Inc.
  1676. BIOS_VERSION: V22.4
  1677. BIOS_DATE: 12/21/2015
  1678. BASEBOARD_MANUFACTURER: MSI
  1679. BASEBOARD_PRODUCT: 970 GAMING (MS-7693)
  1680. BASEBOARD_VERSION: 4.0
  1681. DUMP_TYPE: 2
  1682. FAULTING_IP:
  1683. atikmpag+f284
  1684. fffff809`d68bf284 4883ec28 sub rsp,28h
  1685. DEFAULT_BUCKET_ID: GRAPHICS_DRIVER_TDR_FAULT
  1686. CPU_COUNT: 8
  1687. CPU_MHZ: fa0
  1688. CPU_VENDOR: AuthenticAMD
  1689. CPU_FAMILY: 15
  1690. CPU_MODEL: 2
  1691. CPU_STEPPING: 0
  1692. CUSTOMER_CRASH_COUNT: 1
  1693. BUGCHECK_STR: 0x116
  1694.  
  1695. PROCESS_NAME: System
  1696.  
  1697. CURRENT_IRQL: 0
  1698. STACK_TEXT:
  1699. ffff9681`cb5e17c8 fffff809`d672ba88 : 00000000`00000116 ffffa780`58ad0260 fffff809`d68bf284 00000000`00000000 : nt!KeBugCheckEx
  1700. ffff9681`cb5e17d0 fffff809`d672b193 : fffff809`d68bf284 ffffa780`58ad0260 ffff9681`cb5e18d9 00000000`00000000 : dxgkrnl!TdrBugcheckOnTimeout+0xec
  1701. ffff9681`cb5e1810 fffff809`d6e977b5 : ffffa780`58ad0260 00000000`003b9b41 00000000`00000009 fffff809`d65c909d : dxgkrnl!TdrIsRecoveryRequired+0x193
  1702. ffff9681`cb5e1840 fffff809`d6ef3842 : ffffa780`589cf000 00000000`00000002 ffffa780`589cf000 ffffa780`589d1000 : dxgmms2!VidSchiReportHwHang+0x4c1
  1703. ffff9681`cb5e1940 fffff809`d6ed2b87 : 00000000`00000002 00000000`00579cd6 00000000`003b9b41 00000000`00000001 : dxgmms2!VidSchiCheckHwProgress+0x20772
  1704. ffff9681`cb5e19b0 fffff809`d6e7a4b4 : ffffa780`55c7c7e0 ffffa780`589d1000 ffffa780`55c7c7e8 00000000`00000002 : dxgmms2!VidSchiWaitForSchedulerEvents+0x337
  1705. ffff9681`cb5e1a70 fffff809`d6edec1f : ffffa780`57b53c00 ffff9681`cb5e1bd0 ffffa780`57b53c00 ffffa780`00000000 : dxgmms2!VidSchiScheduleCommandToRun+0x3d4
  1706. ffff9681`cb5e1b80 fffff809`d6edebe0 : ffffa780`589d1500 ffffa780`589d1000 00000000`00000080 fffff809`d6edeb60 : dxgmms2!VidSchiRun_PriorityTable+0x2f
  1707. ffff9681`cb5e1bd0 fffff801`17889729 : ffff9681`c9900180 fffff801`179d6adf 00000000`015c99ec ffffa780`58b87800 : dxgmms2!VidSchiWorkerThread+0x80
  1708. ffff9681`cb5e1c10 fffff801`179d6bb6 : ffff9681`c9900180 ffffa780`58b87800 fffff801`178896e8 00000438`00000780 : nt!PspSystemThreadStartup+0x41
  1709. ffff9681`cb5e1c60 00000000`00000000 : ffff9681`cb5e2000 ffff9681`cb5dc000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
  1710. STACK_COMMAND: kb
  1711. THREAD_SHA1_HASH_MOD_FUNC: a05e887139f0ff6cbfa648fbee599294462fd682
  1712. THREAD_SHA1_HASH_MOD_FUNC_OFFSET: c0858cbefadebd900fba1d64c1ff0d52ab6be1bb
  1713. THREAD_SHA1_HASH_MOD: 65b26f16328fe41a723c00193723d68b091ef48d
  1714. FOLLOWUP_IP:
  1715. atikmpag+f284
  1716. fffff809`d68bf284 4883ec28 sub rsp,28h
  1717. FAULT_INSTR_CODE: 28ec8348
  1718. SYMBOL_NAME: atikmpag+f284
  1719. FOLLOWUP_NAME: MachineOwner
  1720. MODULE_NAME: atikmpag
  1721.  
  1722. IMAGE_NAME: atikmpag.sys
  1723.  
  1724. DEBUG_FLR_IMAGE_TIMESTAMP: 58443f42
  1725. FAILURE_BUCKET_ID: 0x116_IMAGE_atikmpag.sys
  1726. BUCKET_ID: 0x116_IMAGE_atikmpag.sys
  1727. PRIMARY_PROBLEM_CLASS: 0x116_IMAGE_atikmpag.sys
  1728. TARGET_TIME: 2017-02-08T06:40:44.000Z
  1729. OSBUILD: 14393
  1730. OSSERVICEPACK: 693
  1731. SERVICEPACK_NUMBER: 0
  1732. OS_REVISION: 0
  1733. SUITE_MASK: 784
  1734. PRODUCT_TYPE: 1
  1735. OSPLATFORM_TYPE: x64
  1736. OSNAME: Windows 10
  1737. OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
  1738. USER_LCID: 0
  1739. OSBUILD_TIMESTAMP: 2016-12-21 01:50:57
  1740. BUILDDATESTAMP_STR: 161220-1747
  1741. BUILDLAB_STR: rs1_release
  1742. BUILDOSVER_STR: 10.0.14393.693
  1743. ANALYSIS_SESSION_ELAPSED_TIME: f68
  1744. ANALYSIS_SOURCE: KM
  1745. FAILURE_ID_HASH_STRING: km:0x116_image_atikmpag.sys
  1746. FAILURE_ID_HASH: {e300aa8c-6915-3f37-7957-d2e4fc30a6fd}
  1747. Followup: MachineOwner
  1748.  
  1749. ========================================================================
  1750. =================== Dump File: 070617-6781-01.dmp ====================
  1751. ========================================================================
  1752. Mini Kernel Dump File: Only registers and stack trace are available
  1753. Windows 10 Kernel Version 14393 MP (8 procs) Free x64
  1754. Product: WinNt, suite: TerminalServer SingleUserTS Personal
  1755. Built by: 14393.1358.amd64fre.rs1_release.170602-2252
  1756. Kernel base = 0xfffff802`dba13000 PsLoadedModuleList = 0xfffff802`dbd12000
  1757. Debug session time: Thu Jul 6 19:05:37.087 2017 (UTC - 4:00)
  1758. System Uptime: 2 days 5:27:55.842
  1759.  
  1760. BugCheck 1E, {ffffffffc0000005, fffff802dbae2c68, 0, ffffffffffffffff}
  1761. Probably caused by : ntkrnlmp.exe ( nt!KiProcessThreadWaitList+58 )
  1762. Followup: MachineOwner
  1763.  
  1764. KMODE_EXCEPTION_NOT_HANDLED (1e)
  1765. This is a very common bugcheck. Usually the exception address pinpoints
  1766. the driver/function that caused the problem. Always note this address
  1767. as well as the link date of the driver/image that contains this address.
  1768.  
  1769. Arguments:
  1770. Arg1: ffffffffc0000005, The exception code that was not handled
  1771. Arg2: fffff802dbae2c68, The address that the exception occurred at
  1772. Arg3: 0000000000000000, Parameter 0 of the exception
  1773. Arg4: ffffffffffffffff, Parameter 1 of the exception
  1774.  
  1775. Debugging Details:
  1776. DUMP_CLASS: 1
  1777. DUMP_QUALIFIER: 400
  1778. BUILD_VERSION_STRING: 10.0.14393.1358 (rs1_release.170602-2252)
  1779. SYSTEM_MANUFACTURER: MSI
  1780. SYSTEM_PRODUCT_NAME: MS-7693
  1781. SYSTEM_VERSION: 4.0
  1782. BIOS_VENDOR: American Megatrends Inc.
  1783. BIOS_VERSION: V22.4
  1784. BIOS_DATE: 12/21/2015
  1785. BASEBOARD_MANUFACTURER: MSI
  1786. BASEBOARD_PRODUCT: 970 GAMING (MS-7693)
  1787. BASEBOARD_VERSION: 4.0
  1788. DUMP_TYPE: 2
  1789. READ_ADDRESS: fffff802dbdb3338: Unable to get MiVisibleState
  1790. ffffffffffffffff
  1791. EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
  1792. FAULTING_IP:
  1793. nt!KiProcessThreadWaitList+58
  1794. fffff802`dbae2c68 0fb64311 movzx eax,byte ptr [rbx+11h]
  1795. EXCEPTION_PARAMETER2: ffffffffffffffff
  1796. BUGCHECK_STR: 0x1E_c0000005_R
  1797. CPU_COUNT: 8
  1798. CPU_MHZ: fa0
  1799. CPU_VENDOR: AuthenticAMD
  1800. CPU_FAMILY: 15
  1801. CPU_MODEL: 2
  1802. CPU_STEPPING: 0
  1803. CUSTOMER_CRASH_COUNT: 1
  1804. DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
  1805.  
  1806. PROCESS_NAME: System
  1807.  
  1808. CURRENT_IRQL: 2
  1809. EXCEPTION_RECORD: 0000000000000002 -- (.exr 0x2)
  1810. Cannot read Exception record @ 0000000000000002
  1811. TRAP_FRAME: 0000000300000030 -- (.trap 0x300000030)
  1812. Unable to read trap frame at 00000003`00000030
  1813. LAST_CONTROL_TRANSFER: from fffff802dbbe0a7a to fffff802dbb61ce0
  1814. STACK_TEXT:
  1815. fffff802`dd8a57d8 fffff802`dbbe0a7a : 00000000`0000001e ffffffff`c0000005 fffff802`dbae2c68 00000000`00000000 : nt!KeBugCheckEx
  1816. fffff802`dd8a57e0 fffff802`dbb680dd : fffff802`dbd62000 fffff802`dba13000 0004eaa4`00818000 00000000`00000018 : nt!KiFatalExceptionHandler+0x22
  1817. fffff802`dd8a5820 fffff802`dbabbb01 : fffff802`dd8a7000 00000000`00000000 fffff802`dd8a1000 00000000`00000000 : nt!RtlpExecuteHandlerForException+0xd
  1818. fffff802`dd8a5850 fffff802`dbaba877 : fffff802`dd8a6748 fffff802`dd8a6480 fffff802`dd8a6748 00000000`0010001f : nt!RtlDispatchException+0x421
  1819. fffff802`dd8a5f50 fffff802`dbb6cf0e : 00000000`00000002 00000000`00000000 00000003`00000030 ffff9f88`0000000a : nt!KiDispatchException+0x1d7
  1820. fffff802`dd8a6610 fffff802`dbb6b1bd : ffff9f88`00000000 00000000`000000ff ffff9f88`7bdd7110 fffff802`dbdc9100 : nt!KiExceptionDispatch+0xce
  1821. fffff802`dd8a67f0 fffff802`dbae2c68 : ffff9f88`7e78b1f0 fffff802`dd8a6b60 ffff9f88`00000001 ffff9f88`00000000 : nt!KiGeneralProtectionFault+0xfd
  1822. fffff802`dd8a6980 fffff802`dba49cfd : ffff9f88`00000000 ffff9f88`7e78b180 00000000`00000004 00000000`00000002 : nt!KiProcessThreadWaitList+0x58
  1823. fffff802`dd8a69e0 fffff802`dbb64d6a : 00000000`00000000 fffff802`dbd4f180 fffff802`dbdc9940 ffff9f88`8363f080 : nt!KiRetireDpcList+0x80d
  1824. fffff802`dd8a6c60 00000000`00000000 : fffff802`dd8a7000 fffff802`dd8a1000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x5a
  1825. STACK_COMMAND: kb
  1826. THREAD_SHA1_HASH_MOD_FUNC: b45e3e059857431382c5bc6fbc99a86064b3edb3
  1827. THREAD_SHA1_HASH_MOD_FUNC_OFFSET: c2501133492dd5bb278a3f59301124ef362b5c0e
  1828. THREAD_SHA1_HASH_MOD: bc100a5647b828107ac4e18055e00abcbe1ec406
  1829. FOLLOWUP_IP:
  1830. nt!KiProcessThreadWaitList+58
  1831. fffff802`dbae2c68 0fb64311 movzx eax,byte ptr [rbx+11h]
  1832. FAULT_INSTR_CODE: 1143b60f
  1833. SYMBOL_STACK_INDEX: 7
  1834. SYMBOL_NAME: nt!KiProcessThreadWaitList+58
  1835. FOLLOWUP_NAME: MachineOwner
  1836. MODULE_NAME: nt
  1837.  
  1838. IMAGE_NAME: ntkrnlmp.exe
  1839.  
  1840. DEBUG_FLR_IMAGE_TIMESTAMP: 593278b1
  1841. IMAGE_VERSION: 10.0.14393.1358
  1842. BUCKET_ID_FUNC_OFFSET: 58
  1843. FAILURE_BUCKET_ID: 0x1E_c0000005_R_nt!KiProcessThreadWaitList
  1844. BUCKET_ID: 0x1E_c0000005_R_nt!KiProcessThreadWaitList
  1845. PRIMARY_PROBLEM_CLASS: 0x1E_c0000005_R_nt!KiProcessThreadWaitList
  1846. TARGET_TIME: 2017-07-06T23:05:37.000Z
  1847. OSBUILD: 14393
  1848. OSSERVICEPACK: 1358
  1849. SERVICEPACK_NUMBER: 0
  1850. OS_REVISION: 0
  1851. SUITE_MASK: 784
  1852. PRODUCT_TYPE: 1
  1853. OSPLATFORM_TYPE: x64
  1854. OSNAME: Windows 10
  1855. OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
  1856. USER_LCID: 0
  1857. OSBUILD_TIMESTAMP: 2017-06-03 04:52:01
  1858. BUILDDATESTAMP_STR: 170602-2252
  1859. BUILDLAB_STR: rs1_release
  1860. BUILDOSVER_STR: 10.0.14393.1358
  1861. ANALYSIS_SESSION_ELAPSED_TIME: c781
  1862. ANALYSIS_SOURCE: KM
  1863. FAILURE_ID_HASH_STRING: km:0x1e_c0000005_r_nt!kiprocessthreadwaitlist
  1864. FAILURE_ID_HASH: {4443821a-61af-afaa-5831-91aee323faf4}
  1865. Followup: MachineOwner
  1866.  
  1867. ========================================================================
  1868. =================== Dump File: 071317-6890-01.dmp ====================
  1869. ========================================================================
  1870. Mini Kernel Dump File: Only registers and stack trace are available
  1871. Windows 10 Kernel Version 14393 MP (8 procs) Free x64
  1872. Product: WinNt, suite: TerminalServer SingleUserTS Personal
  1873. Built by: 14393.1480.amd64fre.rs1_release.170706-2004
  1874. Kernel base = 0xfffff800`86685000 PsLoadedModuleList = 0xfffff800`86984040
  1875. Debug session time: Thu Jul 13 18:26:32.170 2017 (UTC - 4:00)
  1876. System Uptime: 2 days 0:07:39.926
  1877.  
  1878. BugCheck 119, {1, 8a6a, b, ffffc48fbc7ef180}
  1879. *** WARNING: Unable to verify timestamp for atikmpag.sys
  1880. *** ERROR: Module load completed but symbols could not be loaded for atikmpag.sys
  1881. *************************************************************************
  1882. *** Either you specified an unqualified symbol, or your debugger ***
  1883. *** doesn't have full symbol information. Unqualified symbol ***
  1884. *** resolution is turned off by default. Please either specify a ***
  1885. *** fully qualified symbol module!symbolname, or enable resolution ***
  1886. *** of unqualified symbols by typing ".symopt- 100". Note that ***
  1887. *** enabling unqualified symbol resolution with network symbol ***
  1888. *** server shares in the symbol path may cause the debugger to ***
  1889. *** appear to hang for long periods of time when an incorrect ***
  1890. *** symbol name is typed or the network symbol server is down. ***
  1891. *** For some commands to work properly, your symbol path ***
  1892. *** must point to .pdb files that have full type information. ***
  1893. *** Certain .pdb files (such as the public OS symbols) do not ***
  1894. *** contain the required information. Contact the group that ***
  1895. *** provided you with these symbols if you need this command to ***
  1896. *** work. ***
  1897. *** Type referenced: dxgkrnl!DXGADAPTER ***
  1898. *************************************************************************
  1899. Probably caused by : dxgmms2.sys ( dxgmms2! ?? ::FNODOBFM::`string'+56eb )
  1900. Followup: MachineOwner
  1901.  
  1902. VIDEO_SCHEDULER_INTERNAL_ERROR (119)
  1903. The video scheduler has detected that fatal violation has occurred. This resulted
  1904. in a condition that video scheduler can no longer progress. Any other values after
  1905. parameter 1 must be individually examined according to the subtype.
  1906.  
  1907. Arguments:
  1908. Arg1: 0000000000000001, The driver has reported an invalid fence ID.
  1909. Arg2: 0000000000008a6a
  1910. Arg3: 000000000000000b
  1911. Arg4: ffffc48fbc7ef180
  1912.  
  1913. Debugging Details:
  1914. *************************************************************************
  1915. *** Either you specified an unqualified symbol, or your debugger ***
  1916. *** doesn't have full symbol information. Unqualified symbol ***
  1917. *** resolution is turned off by default. Please either specify a ***
  1918. *** fully qualified symbol module!symbolname, or enable resolution ***
  1919. *** of unqualified symbols by typing ".symopt- 100". Note that ***
  1920. *** enabling unqualified symbol resolution with network symbol ***
  1921. *** server shares in the symbol path may cause the debugger to ***
  1922. *** appear to hang for long periods of time when an incorrect ***
  1923. *** symbol name is typed or the network symbol server is down. ***
  1924. *** For some commands to work properly, your symbol path ***
  1925. *** must point to .pdb files that have full type information. ***
  1926. *** Certain .pdb files (such as the public OS symbols) do not ***
  1927. *** contain the required information. Contact the group that ***
  1928. *** provided you with these symbols if you need this command to ***
  1929. *** work. ***
  1930. *** Type referenced: dxgkrnl!DXGADAPTER ***
  1931. *************************************************************************
  1932. DUMP_CLASS: 1
  1933. DUMP_QUALIFIER: 400
  1934. BUILD_VERSION_STRING: 10.0.14393.1480 (rs1_release.170706-2004)
  1935. SYSTEM_MANUFACTURER: MSI
  1936. SYSTEM_PRODUCT_NAME: MS-7693
  1937. SYSTEM_VERSION: 4.0
  1938. BIOS_VENDOR: American Megatrends Inc.
  1939. BIOS_VERSION: V22.4
  1940. BIOS_DATE: 12/21/2015
  1941. BASEBOARD_MANUFACTURER: MSI
  1942. BASEBOARD_PRODUCT: 970 GAMING (MS-7693)
  1943. BASEBOARD_VERSION: 4.0
  1944. DUMP_TYPE: 2
  1945. CPU_COUNT: 8
  1946. CPU_MHZ: fa0
  1947. CPU_VENDOR: AuthenticAMD
  1948. CPU_FAMILY: 15
  1949. CPU_MODEL: 2
  1950. CPU_STEPPING: 0
  1951. CUSTOMER_CRASH_COUNT: 1
  1952. DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
  1953. BUGCHECK_STR: 0x119
  1954.  
  1955. PROCESS_NAME: Discord.exe
  1956.  
  1957. CURRENT_IRQL: 9
  1958. LAST_CONTROL_TRANSFER: from fffff80bfcba34ae to fffff800867d4960
  1959. STACK_TEXT:
  1960. fffff800`8855ea38 fffff80b`fcba34ae : 00000000`00000119 00000000`00000001 00000000`00008a6a 00000000`0000000b : nt!KeBugCheckEx
  1961. fffff800`8855ea40 fffff80b`feb4abdb : 00000000`00008a6a ffffc48f`bc3f7000 00000000`00000000 00000000`00000000 : watchdog!WdLogEvent5_WdCriticalError+0xce
  1962. fffff800`8855ea80 fffff80b`feb3c320 : ffffc48f`bc7ef180 ffffc48f`bc3f7000 00000000`00000000 00000000`00000000 : dxgmms2! ?? ::FNODOBFM::`string'+0x56eb
  1963. fffff800`8855eab0 fffff80b`feb3c0ad : fffff800`8855ebe0 ffffc48f`baae9040 ffffc48f`bc7ef180 00000000`00000000 : dxgmms2!VidSchDdiNotifyInterruptWorker+0x220
  1964. fffff800`8855eb00 fffff80b`fdcac414 : ffffc48f`ba99d030 00000000`00000000 00000000`00000000 00000000`00000000 : dxgmms2!VidSchDdiNotifyInterrupt+0x8d
  1965. fffff800`8855eb30 fffff80b`fcc0787b : ffffc48f`bc1c7198 00000000`00000000 00000000`00000000 00000000`00000000 : dxgkrnl!DxgNotifyInterruptCB+0x74
  1966. fffff800`8855eb60 ffffc48f`bc1c7198 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : atikmpag+0x4787b
  1967. fffff800`8855eb68 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xffffc48f`bc1c7198
  1968. STACK_COMMAND: kb
  1969. THREAD_SHA1_HASH_MOD_FUNC: fce24e5dcfaaeac4d321017961c3d429ad6b2e1c
  1970. THREAD_SHA1_HASH_MOD_FUNC_OFFSET: de7aeb4ee24594af3be8b62392e14e6b464d9f7f
  1971. THREAD_SHA1_HASH_MOD: d60cd8b8a1d6f216240d13716025af607894a8c7
  1972. FOLLOWUP_IP:
  1973. dxgmms2! ?? ::FNODOBFM::`string'+56eb
  1974. fffff80b`feb4abdb cc int 3
  1975. FAULT_INSTR_CODE: 9680b8cc
  1976. SYMBOL_STACK_INDEX: 2
  1977. SYMBOL_NAME: dxgmms2! ?? ::FNODOBFM::`string'+56eb
  1978. FOLLOWUP_NAME: MachineOwner
  1979. MODULE_NAME: dxgmms2
  1980.  
  1981. IMAGE_NAME: dxgmms2.sys
  1982.  
  1983. DEBUG_FLR_IMAGE_TIMESTAMP: 58ba5e7e
  1984. IMAGE_VERSION: 10.0.14393.953
  1985. BUCKET_ID_FUNC_OFFSET: 56eb
  1986. FAILURE_BUCKET_ID: 0x119_1_DRIVER_REPORTED_INVALID_FENCE_ID_dxgmms2!_??_::FNODOBFM::_string_
  1987. BUCKET_ID: 0x119_1_DRIVER_REPORTED_INVALID_FENCE_ID_dxgmms2!_??_::FNODOBFM::_string_
  1988. PRIMARY_PROBLEM_CLASS: 0x119_1_DRIVER_REPORTED_INVALID_FENCE_ID_dxgmms2!_??_::FNODOBFM::_string_
  1989. TARGET_TIME: 2017-07-13T22:26:32.000Z
  1990. OSBUILD: 14393
  1991. OSSERVICEPACK: 1480
  1992. SERVICEPACK_NUMBER: 0
  1993. OS_REVISION: 0
  1994. SUITE_MASK: 784
  1995. PRODUCT_TYPE: 1
  1996. OSPLATFORM_TYPE: x64
  1997. OSNAME: Windows 10
  1998. OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
  1999. USER_LCID: 0
  2000. OSBUILD_TIMESTAMP: 2017-07-07 02:26:09
  2001. BUILDDATESTAMP_STR: 170706-2004
  2002. BUILDLAB_STR: rs1_release
  2003. BUILDOSVER_STR: 10.0.14393.1480
  2004. ANALYSIS_SESSION_ELAPSED_TIME: 1ccd3
  2005. ANALYSIS_SOURCE: KM
  2006. FAILURE_ID_HASH_STRING: km:0x119_1_driver_reported_invalid_fence_id_dxgmms2!_??_::fnodobfm::_string_
  2007. FAILURE_ID_HASH: {1e3e5dd8-c408-6829-a01b-21aa1aab0bd3}
  2008. Followup: MachineOwner
  2009.  
  2010. ========================================================================
  2011. =================== Dump File: 071717-9109-01.dmp ====================
  2012. ========================================================================
  2013. Mini Kernel Dump File: Only registers and stack trace are available
  2014. Windows 10 Kernel Version 14393 MP (8 procs) Free x64
  2015. Product: WinNt, suite: TerminalServer SingleUserTS Personal
  2016. Built by: 14393.1480.amd64fre.rs1_release.170706-2004
  2017. Kernel base = 0xfffff801`2001a000 PsLoadedModuleList = 0xfffff801`20319040
  2018. Debug session time: Mon Jul 17 03:09:28.559 2017 (UTC - 4:00)
  2019. System Uptime: 3 days 8:42:14.315
  2020.  
  2021. BugCheck 119, {1, 5b094c, 5b094d, ffff918d55fb8010}
  2022. *** WARNING: Unable to verify timestamp for atikmpag.sys
  2023. *** ERROR: Module load completed but symbols could not be loaded for atikmpag.sys
  2024. *** WARNING: Unable to verify timestamp for atikmdag.sys
  2025. *** ERROR: Module load completed but symbols could not be loaded for atikmdag.sys
  2026. *************************************************************************
  2027. *** Either you specified an unqualified symbol, or your debugger ***
  2028. *** doesn't have full symbol information. Unqualified symbol ***
  2029. *** resolution is turned off by default. Please either specify a ***
  2030. *** fully qualified symbol module!symbolname, or enable resolution ***
  2031. *** of unqualified symbols by typing ".symopt- 100". Note that ***
  2032. *** enabling unqualified symbol resolution with network symbol ***
  2033. *** server shares in the symbol path may cause the debugger to ***
  2034. *** appear to hang for long periods of time when an incorrect ***
  2035. *** symbol name is typed or the network symbol server is down. ***
  2036. *** For some commands to work properly, your symbol path ***
  2037. *** must point to .pdb files that have full type information. ***
  2038. *** Certain .pdb files (such as the public OS symbols) do not ***
  2039. *** contain the required information. Contact the group that ***
  2040. *** provided you with these symbols if you need this command to ***
  2041. *** work. ***
  2042. *** Type referenced: dxgkrnl!DXGADAPTER ***
  2043. *************************************************************************
  2044. *** WARNING: Unable to verify timestamp for win32k.sys
  2045. *** ERROR: Module load completed but symbols could not be loaded for win32k.sys
  2046. Probably caused by : dxgmms2.sys ( dxgmms2! ?? ::FNODOBFM::`string'+53f3 )
  2047. Followup: MachineOwner
  2048.  
  2049. VIDEO_SCHEDULER_INTERNAL_ERROR (119)
  2050. The video scheduler has detected that fatal violation has occurred. This resulted
  2051. in a condition that video scheduler can no longer progress. Any other values after
  2052. parameter 1 must be individually examined according to the subtype.
  2053.  
  2054. Arguments:
  2055. Arg1: 0000000000000001, The driver has reported an invalid fence ID.
  2056. Arg2: 00000000005b094c
  2057. Arg3: 00000000005b094d
  2058. Arg4: ffff918d55fb8010
  2059.  
  2060. Debugging Details:
  2061. *************************************************************************
  2062. *** Either you specified an unqualified symbol, or your debugger ***
  2063. *** doesn't have full symbol information. Unqualified symbol ***
  2064. *** resolution is turned off by default. Please either specify a ***
  2065. *** fully qualified symbol module!symbolname, or enable resolution ***
  2066. *** of unqualified symbols by typing ".symopt- 100". Note that ***
  2067. *** enabling unqualified symbol resolution with network symbol ***
  2068. *** server shares in the symbol path may cause the debugger to ***
  2069. *** appear to hang for long periods of time when an incorrect ***
  2070. *** symbol name is typed or the network symbol server is down. ***
  2071. *** For some commands to work properly, your symbol path ***
  2072. *** must point to .pdb files that have full type information. ***
  2073. *** Certain .pdb files (such as the public OS symbols) do not ***
  2074. *** contain the required information. Contact the group that ***
  2075. *** provided you with these symbols if you need this command to ***
  2076. *** work. ***
  2077. *** Type referenced: dxgkrnl!DXGADAPTER ***
  2078. *************************************************************************
  2079. DUMP_CLASS: 1
  2080. DUMP_QUALIFIER: 400
  2081. BUILD_VERSION_STRING: 10.0.14393.1480 (rs1_release.170706-2004)
  2082. SYSTEM_MANUFACTURER: MSI
  2083. SYSTEM_PRODUCT_NAME: MS-7693
  2084. SYSTEM_VERSION: 4.0
  2085. BIOS_VENDOR: American Megatrends Inc.
  2086. BIOS_VERSION: V22.4
  2087. BIOS_DATE: 12/21/2015
  2088. BASEBOARD_MANUFACTURER: MSI
  2089. BASEBOARD_PRODUCT: 970 GAMING (MS-7693)
  2090. BASEBOARD_VERSION: 4.0
  2091. DUMP_TYPE: 2
  2092. CPU_COUNT: 8
  2093. CPU_MHZ: fa0
  2094. CPU_VENDOR: AuthenticAMD
  2095. CPU_FAMILY: 15
  2096. CPU_MODEL: 2
  2097. CPU_STEPPING: 0
  2098. CUSTOMER_CRASH_COUNT: 1
  2099. DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
  2100. BUGCHECK_STR: 0x119
  2101.  
  2102. PROCESS_NAME: audiodg.exe
  2103.  
  2104. CURRENT_IRQL: 9
  2105. LAST_CONTROL_TRANSFER: from fffff80b0ce434ae to fffff80120169960
  2106. STACK_TEXT:
  2107. fffff801`21efb9d8 fffff80b`0ce434ae : 00000000`00000119 00000000`00000001 00000000`005b094c 00000000`005b094d : nt!KeBugCheckEx
  2108. fffff801`21efb9e0 fffff80b`0ed3a8e3 : 00000000`005b094d 00000000`00000000 ffff918d`569c9000 fffff801`2016e6e0 : watchdog!WdLogEvent5_WdCriticalError+0xce
  2109. fffff801`21efba20 fffff80b`0ed3a66f : ffff918d`598f5010 ffff918d`55fb8010 ffff918d`5469d090 00000000`00000001 : dxgmms2! ?? ::FNODOBFM::`string'+0x53f3
  2110. fffff801`21efbac0 fffff80b`0ed2c0ad : fffff801`005b094c ffff918d`54725040 ffff918d`55fb8010 00000000`00000006 : dxgmms2! ?? ::FNODOBFM::`string'+0x517f
  2111. fffff801`21efbb10 fffff80b`0ce6c414 : ffff918d`5438f030 ffff918d`55fbf000 ffff918d`557cc678 fffff80b`112e9550 : dxgmms2!VidSchDdiNotifyInterrupt+0x8d
  2112. fffff801`21efbb40 fffff80b`0daf787b : ffff918d`547e0518 fffff80b`111453e4 00000000`00000000 00000000`00000000 : dxgkrnl!DxgNotifyInterruptCB+0x74
  2113. fffff801`21efbb70 ffff918d`547e0518 : fffff80b`111453e4 00000000`00000000 00000000`00000000 00000000`00000005 : atikmpag+0x4787b
  2114. fffff801`21efbb78 fffff80b`111453e4 : 00000000`00000000 00000000`00000000 00000000`00000005 00000000`01c87702 : 0xffff918d`547e0518
  2115. fffff801`21efbb80 00000000`00000000 : 00000000`00000000 00000000`00000005 00000000`01c87702 00000000`00000009 : atikmdag+0xf53e4
  2116. STACK_COMMAND: kb
  2117. THREAD_SHA1_HASH_MOD_FUNC: c7e1421ce0872587f4e8436e224bcb164f85f04a
  2118. THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 5d61949a0d51f92b8aa63650b76ec8e106830c4b
  2119. THREAD_SHA1_HASH_MOD: 69aea6f2d3faac8041251d2a7e00b7e9b67d9769
  2120. FOLLOWUP_IP:
  2121. dxgmms2! ?? ::FNODOBFM::`string'+53f3
  2122. fffff80b`0ed3a8e3 cc int 3
  2123. FAULT_INSTR_CODE: 48d233cc
  2124. SYMBOL_STACK_INDEX: 2
  2125. SYMBOL_NAME: dxgmms2! ?? ::FNODOBFM::`string'+53f3
  2126. FOLLOWUP_NAME: MachineOwner
  2127. MODULE_NAME: dxgmms2
  2128.  
  2129. IMAGE_NAME: dxgmms2.sys
  2130.  
  2131. DEBUG_FLR_IMAGE_TIMESTAMP: 58ba5e7e
  2132. IMAGE_VERSION: 10.0.14393.953
  2133. BUCKET_ID_FUNC_OFFSET: 53f3
  2134. FAILURE_BUCKET_ID: 0x119_1_DRIVER_REPORTED_INVALID_FENCE_ID_dxgmms2!_??_::FNODOBFM::_string_
  2135. BUCKET_ID: 0x119_1_DRIVER_REPORTED_INVALID_FENCE_ID_dxgmms2!_??_::FNODOBFM::_string_
  2136. PRIMARY_PROBLEM_CLASS: 0x119_1_DRIVER_REPORTED_INVALID_FENCE_ID_dxgmms2!_??_::FNODOBFM::_string_
  2137. TARGET_TIME: 2017-07-17T07:09:28.000Z
  2138. OSBUILD: 14393
  2139. OSSERVICEPACK: 1480
  2140. SERVICEPACK_NUMBER: 0
  2141. OS_REVISION: 0
  2142. SUITE_MASK: 784
  2143. PRODUCT_TYPE: 1
  2144. OSPLATFORM_TYPE: x64
  2145. OSNAME: Windows 10
  2146. OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
  2147. USER_LCID: 0
  2148. OSBUILD_TIMESTAMP: 2017-07-07 02:26:09
  2149. BUILDDATESTAMP_STR: 170706-2004
  2150. BUILDLAB_STR: rs1_release
  2151. BUILDOSVER_STR: 10.0.14393.1480
  2152. ANALYSIS_SESSION_ELAPSED_TIME: 19212
  2153. ANALYSIS_SOURCE: KM
  2154. FAILURE_ID_HASH_STRING: km:0x119_1_driver_reported_invalid_fence_id_dxgmms2!_??_::fnodobfm::_string_
  2155. FAILURE_ID_HASH: {1e3e5dd8-c408-6829-a01b-21aa1aab0bd3}
  2156. Followup: MachineOwner
  2157.  
  2158. ========================================================================
  2159. =================== Dump File: 071917-6343-01.dmp ====================
  2160. ========================================================================
  2161. Mini Kernel Dump File: Only registers and stack trace are available
  2162. Windows 10 Kernel Version 14393 MP (8 procs) Free x64
  2163. Product: WinNt, suite: TerminalServer SingleUserTS Personal
  2164. Built by: 14393.1480.amd64fre.rs1_release.170706-2004
  2165. Kernel base = 0xfffff801`dd014000 PsLoadedModuleList = 0xfffff801`dd313040
  2166. Debug session time: Wed Jul 19 00:20:33.908 2017 (UTC - 4:00)
  2167. System Uptime: 0 days 4:12:31.665
  2168.  
  2169. BugCheck 116, {ffffca8bd9fa44a0, fffff80a6df0f654, 0, d}
  2170. *** WARNING: Unable to verify timestamp for atikmpag.sys
  2171. *** ERROR: Module load completed but symbols could not be loaded for atikmpag.sys
  2172. Probably caused by : atikmpag.sys ( atikmpag+f654 )
  2173. Followup: MachineOwner
  2174.  
  2175. VIDEO_TDR_FAILURE (116)
  2176. Attempt to reset the display driver and recover from timeout failed.
  2177.  
  2178. Arguments:
  2179. Arg1: ffffca8bd9fa44a0, Optional pointer to internal TDR recovery context (TDR_RECOVERY_CONTEXT).
  2180. Arg2: fffff80a6df0f654, The pointer into responsible device driver module (e.g. owner tag).
  2181. Arg3: 0000000000000000, Optional error code (NTSTATUS) of the last failed operation.
  2182. Arg4: 000000000000000d, Optional internal context dependent data.
  2183.  
  2184. Debugging Details:
  2185. DUMP_CLASS: 1
  2186. DUMP_QUALIFIER: 400
  2187. BUILD_VERSION_STRING: 10.0.14393.1480 (rs1_release.170706-2004)
  2188. SYSTEM_MANUFACTURER: MSI
  2189. SYSTEM_PRODUCT_NAME: MS-7693
  2190. SYSTEM_VERSION: 4.0
  2191. BIOS_VENDOR: American Megatrends Inc.
  2192. BIOS_VERSION: V22.4
  2193. BIOS_DATE: 12/21/2015
  2194. BASEBOARD_MANUFACTURER: MSI
  2195. BASEBOARD_PRODUCT: 970 GAMING (MS-7693)
  2196. BASEBOARD_VERSION: 4.0
  2197. DUMP_TYPE: 2
  2198. FAULTING_IP:
  2199. atikmpag+f654
  2200. fffff80a`6df0f654 4883ec28 sub rsp,28h
  2201. DEFAULT_BUCKET_ID: GRAPHICS_DRIVER_TDR_FAULT
  2202. CPU_COUNT: 8
  2203. CPU_MHZ: fa0
  2204. CPU_VENDOR: AuthenticAMD
  2205. CPU_FAMILY: 15
  2206. CPU_MODEL: 2
  2207. CPU_STEPPING: 0
  2208. CUSTOMER_CRASH_COUNT: 1
  2209. BUGCHECK_STR: 0x116
  2210.  
  2211. PROCESS_NAME: System
  2212.  
  2213. CURRENT_IRQL: 0
  2214. STACK_TEXT:
  2215. ffffe181`2774d7c8 fffff80a`6e31a298 : 00000000`00000116 ffffca8b`d9fa44a0 fffff80a`6df0f654 00000000`00000000 : nt!KeBugCheckEx
  2216. ffffe181`2774d7d0 fffff80a`6e3199a3 : fffff80a`6df0f654 ffffca8b`d9fa44a0 ffffe181`2774d8d9 00000000`00000000 : dxgkrnl!TdrBugcheckOnTimeout+0xec
  2217. ffffe181`2774d810 fffff80a`6e0577b5 : ffffca8b`d9fa44a0 00000000`003b9b42 00000000`00000009 fffff80a`6e1b90bd : dxgkrnl!TdrIsRecoveryRequired+0x193
  2218. ffffe181`2774d840 fffff80a`6e0b3a9e : ffffca8b`d47bc000 00000000`00000002 ffffca8b`d47bc000 ffffca8b`d47be000 : dxgmms2!VidSchiReportHwHang+0x4c1
  2219. ffffe181`2774d940 fffff80a`6e092eb7 : 00000000`00000002 00000000`000ecb5c 00000000`003b9b42 00000000`00000001 : dxgmms2! ?? ::NNGAKEGL::`string'+0xf91e
  2220. ffffe181`2774d9b0 fffff80a`6e03a4c4 : 00000000`00000000 ffffca8b`d47be000 00000000`0000000f 00000000`00000000 : dxgmms2!VidSchiWaitForSchedulerEvents+0x337
  2221. ffffe181`2774da70 fffff80a`6e09f27f : ffffca8b`d47db000 ffffe181`2774dbd0 ffffca8b`d47db010 ffffca8b`00000000 : dxgmms2!VidSchiScheduleCommandToRun+0x3d4
  2222. ffffe181`2774db80 fffff80a`6e09f240 : ffffca8b`d47be500 ffffca8b`d47be000 00000000`00000080 fffff80a`6e09f1c0 : dxgmms2!VidSchiRun_PriorityTable+0x2f
  2223. ffffe181`2774dbd0 fffff801`dd0ca965 : ffffe181`26b07180 fffff801`dd168d4f 00000000`010b12a8 ffffca8b`d51a0800 : dxgmms2!VidSchiWorkerThread+0x80
  2224. ffffe181`2774dc10 fffff801`dd168e26 : ffffe181`26b07180 ffffca8b`d51a0800 fffff801`dd0ca924 00000000`00000000 : nt!PspSystemThreadStartup+0x41
  2225. ffffe181`2774dc60 00000000`00000000 : ffffe181`2774e000 ffffe181`27748000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
  2226. STACK_COMMAND: kb
  2227. THREAD_SHA1_HASH_MOD_FUNC: b894b9fd964d0d623be8fa8c727117633542f015
  2228. THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 415f1eb38427f8c1e04eef804b3fcdda2dacb6cd
  2229. THREAD_SHA1_HASH_MOD: 65b26f16328fe41a723c00193723d68b091ef48d
  2230. FOLLOWUP_IP:
  2231. atikmpag+f654
  2232. fffff80a`6df0f654 4883ec28 sub rsp,28h
  2233. FAULT_INSTR_CODE: 28ec8348
  2234. SYMBOL_NAME: atikmpag+f654
  2235. FOLLOWUP_NAME: MachineOwner
  2236. MODULE_NAME: atikmpag
  2237.  
  2238. IMAGE_NAME: atikmpag.sys
  2239.  
  2240. DEBUG_FLR_IMAGE_TIMESTAMP: 58fe9eff
  2241. FAILURE_BUCKET_ID: 0x116_IMAGE_atikmpag.sys
  2242. BUCKET_ID: 0x116_IMAGE_atikmpag.sys
  2243. PRIMARY_PROBLEM_CLASS: 0x116_IMAGE_atikmpag.sys
  2244. TARGET_TIME: 2017-07-19T04:20:33.000Z
  2245. OSBUILD: 14393
  2246. OSSERVICEPACK: 1480
  2247. SERVICEPACK_NUMBER: 0
  2248. OS_REVISION: 0
  2249. SUITE_MASK: 784
  2250. PRODUCT_TYPE: 1
  2251. OSPLATFORM_TYPE: x64
  2252. OSNAME: Windows 10
  2253. OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
  2254. USER_LCID: 0
  2255. OSBUILD_TIMESTAMP: 2017-07-07 02:26:09
  2256. BUILDDATESTAMP_STR: 170706-2004
  2257. BUILDLAB_STR: rs1_release
  2258. BUILDOSVER_STR: 10.0.14393.1480
  2259. ANALYSIS_SESSION_ELAPSED_TIME: 19df
  2260. ANALYSIS_SOURCE: KM
  2261. FAILURE_ID_HASH_STRING: km:0x116_image_atikmpag.sys
  2262. FAILURE_ID_HASH: {e300aa8c-6915-3f37-7957-d2e4fc30a6fd}
  2263. Followup: MachineOwner
  2264.  
  2265. ========================================================================
  2266. =================== Dump File: 072017-6937-01.dmp ====================
  2267. ========================================================================
  2268. Mini Kernel Dump File: Only registers and stack trace are available
  2269. Windows 10 Kernel Version 14393 MP (8 procs) Free x64
  2270. Product: WinNt, suite: TerminalServer SingleUserTS Personal
  2271. Built by: 14393.1480.amd64fre.rs1_release.170706-2004
  2272. Kernel base = 0xfffff801`d5416000 PsLoadedModuleList = 0xfffff801`d5715040
  2273. Debug session time: Thu Jul 20 22:22:10.067 2017 (UTC - 4:00)
  2274. System Uptime: 0 days 22:40:02.823
  2275.  
  2276. BugCheck 116, {ffffbf83ff477100, fffff804c366f654, 0, d}
  2277. *** WARNING: Unable to verify timestamp for atikmpag.sys
  2278. *** ERROR: Module load completed but symbols could not be loaded for atikmpag.sys
  2279. Probably caused by : atikmpag.sys ( atikmpag+f654 )
  2280. Followup: MachineOwner
  2281.  
  2282. VIDEO_TDR_FAILURE (116)
  2283. Attempt to reset the display driver and recover from timeout failed.
  2284.  
  2285. Arguments:
  2286. Arg1: ffffbf83ff477100, Optional pointer to internal TDR recovery context (TDR_RECOVERY_CONTEXT).
  2287. Arg2: fffff804c366f654, The pointer into responsible device driver module (e.g. owner tag).
  2288. Arg3: 0000000000000000, Optional error code (NTSTATUS) of the last failed operation.
  2289. Arg4: 000000000000000d, Optional internal context dependent data.
  2290.  
  2291. Debugging Details:
  2292. DUMP_CLASS: 1
  2293. DUMP_QUALIFIER: 400
  2294. BUILD_VERSION_STRING: 10.0.14393.1480 (rs1_release.170706-2004)
  2295. SYSTEM_MANUFACTURER: MSI
  2296. SYSTEM_PRODUCT_NAME: MS-7693
  2297. SYSTEM_VERSION: 4.0
  2298. BIOS_VENDOR: American Megatrends Inc.
  2299. BIOS_VERSION: V22.4
  2300. BIOS_DATE: 12/21/2015
  2301. BASEBOARD_MANUFACTURER: MSI
  2302. BASEBOARD_PRODUCT: 970 GAMING (MS-7693)
  2303. BASEBOARD_VERSION: 4.0
  2304. DUMP_TYPE: 2
  2305. FAULTING_IP:
  2306. atikmpag+f654
  2307. fffff804`c366f654 4883ec28 sub rsp,28h
  2308. DEFAULT_BUCKET_ID: GRAPHICS_DRIVER_TDR_FAULT
  2309. CPU_COUNT: 8
  2310. CPU_MHZ: fa0
  2311. CPU_VENDOR: AuthenticAMD
  2312. CPU_FAMILY: 15
  2313. CPU_MODEL: 2
  2314. CPU_STEPPING: 0
  2315. CUSTOMER_CRASH_COUNT: 1
  2316. BUGCHECK_STR: 0x116
  2317.  
  2318. PROCESS_NAME: System
  2319.  
  2320. CURRENT_IRQL: 0
  2321. STACK_TEXT:
  2322. ffffa980`15bf87c8 fffff804`c3a0a298 : 00000000`00000116 ffffbf83`ff477100 fffff804`c366f654 00000000`00000000 : nt!KeBugCheckEx
  2323. ffffa980`15bf87d0 fffff804`c3a099a3 : fffff804`c366f654 ffffbf83`ff477100 ffffa980`15bf88d9 00000000`00000000 : dxgkrnl!TdrBugcheckOnTimeout+0xec
  2324. ffffa980`15bf8810 fffff804`c37177b5 : ffffbf83`ff477100 00000000`003b9b54 00000000`00000009 fffff804`c38a90bd : dxgkrnl!TdrIsRecoveryRequired+0x193
  2325. ffffa980`15bf8840 fffff804`c3773a9e : ffffbf84`017d9000 00000000`00000002 ffffbf84`017d9000 ffffbf84`017db000 : dxgmms2!VidSchiReportHwHang+0x4c1
  2326. ffffa980`15bf8940 fffff804`c3752eb7 : 00000000`00000002 00000000`004fb01f 00000000`003b9b54 00000000`00000001 : dxgmms2! ?? ::NNGAKEGL::`string'+0xf91e
  2327. ffffa980`15bf89b0 fffff804`c36fa4c4 : 00000000`00000000 ffffbf84`017db000 00000000`0000000f 00000000`00000000 : dxgmms2!VidSchiWaitForSchedulerEvents+0x337
  2328. ffffa980`15bf8a70 fffff804`c375f27f : ffffbf84`019e9400 ffffa980`15bf8bd0 ffffbf84`019e94c0 ffffbf84`00000000 : dxgmms2!VidSchiScheduleCommandToRun+0x3d4
  2329. ffffa980`15bf8b80 fffff804`c375f240 : ffffbf84`017db500 ffffbf84`017db000 00000000`00000080 fffff804`c375f1c0 : dxgmms2!VidSchiRun_PriorityTable+0x2f
  2330. ffffa980`15bf8bd0 fffff801`d54cc965 : ffffa980`13f07180 fffff801`d556ad4f 00000000`0110042e ffffbf84`0097d800 : dxgmms2!VidSchiWorkerThread+0x80
  2331. ffffa980`15bf8c10 fffff801`d556ae26 : ffffa980`13f07180 ffffbf84`0097d800 fffff801`d54cc924 00000000`00000465 : nt!PspSystemThreadStartup+0x41
  2332. ffffa980`15bf8c60 00000000`00000000 : ffffa980`15bf9000 ffffa980`15bf3000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
  2333. STACK_COMMAND: kb
  2334. THREAD_SHA1_HASH_MOD_FUNC: b894b9fd964d0d623be8fa8c727117633542f015
  2335. THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 415f1eb38427f8c1e04eef804b3fcdda2dacb6cd
  2336. THREAD_SHA1_HASH_MOD: 65b26f16328fe41a723c00193723d68b091ef48d
  2337. FOLLOWUP_IP:
  2338. atikmpag+f654
  2339. fffff804`c366f654 4883ec28 sub rsp,28h
  2340. FAULT_INSTR_CODE: 28ec8348
  2341. SYMBOL_NAME: atikmpag+f654
  2342. FOLLOWUP_NAME: MachineOwner
  2343. MODULE_NAME: atikmpag
  2344.  
  2345. IMAGE_NAME: atikmpag.sys
  2346.  
  2347. DEBUG_FLR_IMAGE_TIMESTAMP: 58fe9eff
  2348. FAILURE_BUCKET_ID: 0x116_IMAGE_atikmpag.sys
  2349. BUCKET_ID: 0x116_IMAGE_atikmpag.sys
  2350. PRIMARY_PROBLEM_CLASS: 0x116_IMAGE_atikmpag.sys
  2351. TARGET_TIME: 2017-07-21T02:22:10.000Z
  2352. OSBUILD: 14393
  2353. OSSERVICEPACK: 1480
  2354. SERVICEPACK_NUMBER: 0
  2355. OS_REVISION: 0
  2356. SUITE_MASK: 784
  2357. PRODUCT_TYPE: 1
  2358. OSPLATFORM_TYPE: x64
  2359. OSNAME: Windows 10
  2360. OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
  2361. USER_LCID: 0
  2362. OSBUILD_TIMESTAMP: 2017-07-07 02:26:09
  2363. BUILDDATESTAMP_STR: 170706-2004
  2364. BUILDLAB_STR: rs1_release
  2365. BUILDOSVER_STR: 10.0.14393.1480
  2366. ANALYSIS_SESSION_ELAPSED_TIME: 19df
  2367. ANALYSIS_SOURCE: KM
  2368. FAILURE_ID_HASH_STRING: km:0x116_image_atikmpag.sys
  2369. FAILURE_ID_HASH: {e300aa8c-6915-3f37-7957-d2e4fc30a6fd}
  2370. Followup: MachineOwner
  2371.  
  2372. ========================================================================
  2373. =================== Dump File: 072117-6843-01.dmp ====================
  2374. ========================================================================
  2375. Mini Kernel Dump File: Only registers and stack trace are available
  2376. Windows 10 Kernel Version 14393 MP (8 procs) Free x64
  2377. Product: WinNt, suite: TerminalServer SingleUserTS Personal
  2378. Built by: 14393.1480.amd64fre.rs1_release.170706-2004
  2379. Kernel base = 0xfffff801`93611000 PsLoadedModuleList = 0xfffff801`93910040
  2380. Debug session time: Fri Jul 21 11:40:05.615 2017 (UTC - 4:00)
  2381. System Uptime: 0 days 13:17:12.371
  2382.  
  2383. BugCheck 116, {ffffcb03757be010, fffff80ae1c0f654, 0, d}
  2384. *** WARNING: Unable to verify timestamp for atikmpag.sys
  2385. *** ERROR: Module load completed but symbols could not be loaded for atikmpag.sys
  2386. Probably caused by : atikmpag.sys ( atikmpag+f654 )
  2387. Followup: MachineOwner
  2388.  
  2389. VIDEO_TDR_FAILURE (116)
  2390. Attempt to reset the display driver and recover from timeout failed.
  2391.  
  2392. Arguments:
  2393. Arg1: ffffcb03757be010, Optional pointer to internal TDR recovery context (TDR_RECOVERY_CONTEXT).
  2394. Arg2: fffff80ae1c0f654, The pointer into responsible device driver module (e.g. owner tag).
  2395. Arg3: 0000000000000000, Optional error code (NTSTATUS) of the last failed operation.
  2396. Arg4: 000000000000000d, Optional internal context dependent data.
  2397.  
  2398. Debugging Details:
  2399. DUMP_CLASS: 1
  2400. DUMP_QUALIFIER: 400
  2401. BUILD_VERSION_STRING: 10.0.14393.1480 (rs1_release.170706-2004)
  2402. SYSTEM_MANUFACTURER: MSI
  2403. SYSTEM_PRODUCT_NAME: MS-7693
  2404. SYSTEM_VERSION: 4.0
  2405. BIOS_VENDOR: American Megatrends Inc.
  2406. BIOS_VERSION: V22.4
  2407. BIOS_DATE: 12/21/2015
  2408. BASEBOARD_MANUFACTURER: MSI
  2409. BASEBOARD_PRODUCT: 970 GAMING (MS-7693)
  2410. BASEBOARD_VERSION: 4.0
  2411. DUMP_TYPE: 2
  2412. FAULTING_IP:
  2413. atikmpag+f654
  2414. fffff80a`e1c0f654 4883ec28 sub rsp,28h
  2415. DEFAULT_BUCKET_ID: GRAPHICS_DRIVER_TDR_FAULT
  2416. CPU_COUNT: 8
  2417. CPU_MHZ: fa0
  2418. CPU_VENDOR: AuthenticAMD
  2419. CPU_FAMILY: 15
  2420. CPU_MODEL: 2
  2421. CPU_STEPPING: 0
  2422. CUSTOMER_CRASH_COUNT: 1
  2423. BUGCHECK_STR: 0x116
  2424.  
  2425. PROCESS_NAME: System
  2426.  
  2427. CURRENT_IRQL: 0
  2428. STACK_TEXT:
  2429. ffff9100`646467c8 fffff80a`e12da298 : 00000000`00000116 ffffcb03`757be010 fffff80a`e1c0f654 00000000`00000000 : nt!KeBugCheckEx
  2430. ffff9100`646467d0 fffff80a`e12d99a3 : fffff80a`e1c0f654 ffffcb03`757be010 ffff9100`646468d9 00000000`00000000 : dxgkrnl!TdrBugcheckOnTimeout+0xec
  2431. ffff9100`64646810 fffff80a`e10277b5 : ffffcb03`757be010 00000000`003b9b4d 00000000`00000009 fffff80a`e11790bd : dxgkrnl!TdrIsRecoveryRequired+0x193
  2432. ffff9100`64646840 fffff80a`e1083a9e : ffffcb03`729fd000 00000000`00000002 ffffcb03`729fd000 ffffcb03`729fb000 : dxgmms2!VidSchiReportHwHang+0x4c1
  2433. ffff9100`64646940 fffff80a`e1062eb7 : 00000000`00000002 00000000`002eb587 00000000`003b9b4d 00000000`00000001 : dxgmms2! ?? ::NNGAKEGL::`string'+0xf91e
  2434. ffff9100`646469b0 fffff80a`e100a4c4 : ffffcb03`73ae5010 ffffcb03`729fb000 ffffcb03`73ae5018 00000000`00000002 : dxgmms2!VidSchiWaitForSchedulerEvents+0x337
  2435. ffff9100`64646a70 fffff80a`e106f27f : ffffcb03`72be7800 ffff9100`64646bd0 ffffcb03`72be7800 ffffcb03`00000000 : dxgmms2!VidSchiScheduleCommandToRun+0x3d4
  2436. ffff9100`64646b80 fffff80a`e106f240 : ffffcb03`729fb500 ffffcb03`729fb000 00000000`00000080 fffff80a`e106f1c0 : dxgmms2!VidSchiRun_PriorityTable+0x2f
  2437. ffff9100`64646bd0 fffff801`936c7965 : ffff9100`63b07180 fffff801`93765d4f 00000000`011457d0 ffffcb03`72bfc800 : dxgmms2!VidSchiWorkerThread+0x80
  2438. ffff9100`64646c10 fffff801`93765e26 : ffff9100`63b07180 ffffcb03`72bfc800 fffff801`936c7924 00000000`00000000 : nt!PspSystemThreadStartup+0x41
  2439. ffff9100`64646c60 00000000`00000000 : ffff9100`64647000 ffff9100`64641000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
  2440. STACK_COMMAND: kb
  2441. THREAD_SHA1_HASH_MOD_FUNC: b894b9fd964d0d623be8fa8c727117633542f015
  2442. THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 415f1eb38427f8c1e04eef804b3fcdda2dacb6cd
  2443. THREAD_SHA1_HASH_MOD: 65b26f16328fe41a723c00193723d68b091ef48d
  2444. FOLLOWUP_IP:
  2445. atikmpag+f654
  2446. fffff80a`e1c0f654 4883ec28 sub rsp,28h
  2447. FAULT_INSTR_CODE: 28ec8348
  2448. SYMBOL_NAME: atikmpag+f654
  2449. FOLLOWUP_NAME: MachineOwner
  2450. MODULE_NAME: atikmpag
  2451.  
  2452. IMAGE_NAME: atikmpag.sys
  2453.  
  2454. DEBUG_FLR_IMAGE_TIMESTAMP: 58fe9eff
  2455. FAILURE_BUCKET_ID: 0x116_IMAGE_atikmpag.sys
  2456. BUCKET_ID: 0x116_IMAGE_atikmpag.sys
  2457. PRIMARY_PROBLEM_CLASS: 0x116_IMAGE_atikmpag.sys
  2458. TARGET_TIME: 2017-07-21T15:40:05.000Z
  2459. OSBUILD: 14393
  2460. OSSERVICEPACK: 1480
  2461. SERVICEPACK_NUMBER: 0
  2462. OS_REVISION: 0
  2463. SUITE_MASK: 784
  2464. PRODUCT_TYPE: 1
  2465. OSPLATFORM_TYPE: x64
  2466. OSNAME: Windows 10
  2467. OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
  2468. USER_LCID: 0
  2469. OSBUILD_TIMESTAMP: 2017-07-07 02:26:09
  2470. BUILDDATESTAMP_STR: 170706-2004
  2471. BUILDLAB_STR: rs1_release
  2472. BUILDOSVER_STR: 10.0.14393.1480
  2473. ANALYSIS_SESSION_ELAPSED_TIME: 1d0e
  2474. ANALYSIS_SOURCE: KM
  2475. FAILURE_ID_HASH_STRING: km:0x116_image_atikmpag.sys
  2476. FAILURE_ID_HASH: {e300aa8c-6915-3f37-7957-d2e4fc30a6fd}
  2477. Followup: MachineOwner
  2478.  
  2479. ========================================================================
  2480. =================== Dump File: 072217-7046-01.dmp ====================
  2481. ========================================================================
  2482. Mini Kernel Dump File: Only registers and stack trace are available
  2483. Windows 10 Kernel Version 14393 MP (8 procs) Free x64
  2484. Product: WinNt, suite: TerminalServer SingleUserTS Personal
  2485. Built by: 14393.1480.amd64fre.rs1_release.170706-2004
  2486. Kernel base = 0xfffff802`cac7a000 PsLoadedModuleList = 0xfffff802`caf79040
  2487. Debug session time: Sat Jul 22 06:19:02.990 2017 (UTC - 4:00)
  2488. System Uptime: 0 days 18:38:18.747
  2489.  
  2490. BugCheck 116, {ffffbc88348514a0, fffff80210bef654, 0, d}
  2491. *** WARNING: Unable to verify timestamp for atikmpag.sys
  2492. *** ERROR: Module load completed but symbols could not be loaded for atikmpag.sys
  2493. Probably caused by : atikmpag.sys ( atikmpag+f654 )
  2494. Followup: MachineOwner
  2495.  
  2496. VIDEO_TDR_FAILURE (116)
  2497. Attempt to reset the display driver and recover from timeout failed.
  2498.  
  2499. Arguments:
  2500. Arg1: ffffbc88348514a0, Optional pointer to internal TDR recovery context (TDR_RECOVERY_CONTEXT).
  2501. Arg2: fffff80210bef654, The pointer into responsible device driver module (e.g. owner tag).
  2502. Arg3: 0000000000000000, Optional error code (NTSTATUS) of the last failed operation.
  2503. Arg4: 000000000000000d, Optional internal context dependent data.
  2504.  
  2505. Debugging Details:
  2506. DUMP_CLASS: 1
  2507. DUMP_QUALIFIER: 400
  2508. BUILD_VERSION_STRING: 10.0.14393.1480 (rs1_release.170706-2004)
  2509. SYSTEM_MANUFACTURER: MSI
  2510. SYSTEM_PRODUCT_NAME: MS-7693
  2511. SYSTEM_VERSION: 4.0
  2512. BIOS_VENDOR: American Megatrends Inc.
  2513. BIOS_VERSION: V22.4
  2514. BIOS_DATE: 12/21/2015
  2515. BASEBOARD_MANUFACTURER: MSI
  2516. BASEBOARD_PRODUCT: 970 GAMING (MS-7693)
  2517. BASEBOARD_VERSION: 4.0
  2518. DUMP_TYPE: 2
  2519. FAULTING_IP:
  2520. atikmpag+f654
  2521. fffff802`10bef654 4883ec28 sub rsp,28h
  2522. DEFAULT_BUCKET_ID: GRAPHICS_DRIVER_TDR_FAULT
  2523. CPU_COUNT: 8
  2524. CPU_MHZ: fa0
  2525. CPU_VENDOR: AuthenticAMD
  2526. CPU_FAMILY: 15
  2527. CPU_MODEL: 2
  2528. CPU_STEPPING: 0
  2529. CUSTOMER_CRASH_COUNT: 1
  2530. BUGCHECK_STR: 0x116
  2531.  
  2532. PROCESS_NAME: System
  2533.  
  2534. CURRENT_IRQL: 0
  2535. STACK_TEXT:
  2536. ffff9800`da7fe7c8 fffff802`1010a298 : 00000000`00000116 ffffbc88`348514a0 fffff802`10bef654 00000000`00000000 : nt!KeBugCheckEx
  2537. ffff9800`da7fe7d0 fffff802`101099a3 : fffff802`10bef654 ffffbc88`348514a0 ffff9800`da7fe8d9 00000000`00000000 : dxgkrnl!TdrBugcheckOnTimeout+0xec
  2538. ffff9800`da7fe810 fffff802`11cc77b5 : ffffbc88`348514a0 00000000`003b9b4f 00000000`00000009 fffff802`0ffa90bd : dxgkrnl!TdrIsRecoveryRequired+0x193
  2539. ffff9800`da7fe840 fffff802`11d23a9e : ffffbc88`33489000 00000000`00000002 ffffbc88`33489000 ffffbc88`3348b000 : dxgmms2!VidSchiReportHwHang+0x4c1
  2540. ffff9800`da7fe940 fffff802`11d02eb7 : 00000000`00000002 00000000`0041861a 00000000`003b9b4f 00000000`00000001 : dxgmms2! ?? ::NNGAKEGL::`string'+0xf91e
  2541. ffff9800`da7fe9b0 fffff802`11caa4c4 : 00000000`00000000 ffffbc88`3348b000 00000000`0000000f 00000000`00000000 : dxgmms2!VidSchiWaitForSchedulerEvents+0x337
  2542. ffff9800`da7fea70 fffff802`11d0f27f : ffffbc88`335a9700 ffff9800`da7febd0 ffffbc88`335a9780 ffffbc88`00000000 : dxgmms2!VidSchiScheduleCommandToRun+0x3d4
  2543. ffff9800`da7feb80 fffff802`11d0f240 : ffffbc88`3348b500 ffffbc88`3348b000 00000000`00000080 fffff802`11d0f1c0 : dxgmms2!VidSchiRun_PriorityTable+0x2f
  2544. ffff9800`da7febd0 fffff802`cad30965 : ffff9800`d8b07180 fffff802`cadced4f 00000000`0112b26f ffffbc88`3356d800 : dxgmms2!VidSchiWorkerThread+0x80
  2545. ffff9800`da7fec10 fffff802`cadcee26 : ffff9800`d8b07180 ffffbc88`3356d800 fffff802`cad30924 00000000`00000000 : nt!PspSystemThreadStartup+0x41
  2546. ffff9800`da7fec60 00000000`00000000 : ffff9800`da7ff000 ffff9800`da7f9000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
  2547. STACK_COMMAND: kb
  2548. THREAD_SHA1_HASH_MOD_FUNC: b894b9fd964d0d623be8fa8c727117633542f015
  2549. THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 415f1eb38427f8c1e04eef804b3fcdda2dacb6cd
  2550. THREAD_SHA1_HASH_MOD: 65b26f16328fe41a723c00193723d68b091ef48d
  2551. FOLLOWUP_IP:
  2552. atikmpag+f654
  2553. fffff802`10bef654 4883ec28 sub rsp,28h
  2554. FAULT_INSTR_CODE: 28ec8348
  2555. SYMBOL_NAME: atikmpag+f654
  2556. FOLLOWUP_NAME: MachineOwner
  2557. MODULE_NAME: atikmpag
  2558.  
  2559. IMAGE_NAME: atikmpag.sys
  2560.  
  2561. DEBUG_FLR_IMAGE_TIMESTAMP: 58fe9eff
  2562. FAILURE_BUCKET_ID: 0x116_IMAGE_atikmpag.sys
  2563. BUCKET_ID: 0x116_IMAGE_atikmpag.sys
  2564. PRIMARY_PROBLEM_CLASS: 0x116_IMAGE_atikmpag.sys
  2565. TARGET_TIME: 2017-07-22T10:19:02.000Z
  2566. OSBUILD: 14393
  2567. OSSERVICEPACK: 1480
  2568. SERVICEPACK_NUMBER: 0
  2569. OS_REVISION: 0
  2570. SUITE_MASK: 784
  2571. PRODUCT_TYPE: 1
  2572. OSPLATFORM_TYPE: x64
  2573. OSNAME: Windows 10
  2574. OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
  2575. USER_LCID: 0
  2576. OSBUILD_TIMESTAMP: 2017-07-07 02:26:09
  2577. BUILDDATESTAMP_STR: 170706-2004
  2578. BUILDLAB_STR: rs1_release
  2579. BUILDOSVER_STR: 10.0.14393.1480
  2580. ANALYSIS_SESSION_ELAPSED_TIME: 1451
  2581. ANALYSIS_SOURCE: KM
  2582. FAILURE_ID_HASH_STRING: km:0x116_image_atikmpag.sys
  2583. FAILURE_ID_HASH: {e300aa8c-6915-3f37-7957-d2e4fc30a6fd}
  2584. Followup: MachineOwner
  2585.  
  2586. ========================================================================
  2587. =================== Dump File: 072617-6109-01.dmp ====================
  2588. ========================================================================
  2589. Mini Kernel Dump File: Only registers and stack trace are available
  2590. Windows 10 Kernel Version 14393 MP (8 procs) Free x64
  2591. Product: WinNt, suite: TerminalServer SingleUserTS Personal
  2592. Built by: 14393.1480.amd64fre.rs1_release.170706-2004
  2593. Kernel base = 0xfffff803`04092000 PsLoadedModuleList = 0xfffff803`04391040
  2594. Debug session time: Wed Jul 26 01:58:24.649 2017 (UTC - 4:00)
  2595. System Uptime: 0 days 0:00:15.406
  2596.  
  2597. BugCheck 1E, {ffffffffc0000005, fffff803041e74c7, 0, ffffffffffffffff}
  2598. Probably caused by : memory_corruption
  2599. Followup: memory_corruption
  2600.  
  2601. KMODE_EXCEPTION_NOT_HANDLED (1e)
  2602. This is a very common bugcheck. Usually the exception address pinpoints
  2603. the driver/function that caused the problem. Always note this address
  2604. as well as the link date of the driver/image that contains this address.
  2605.  
  2606. Arguments:
  2607. Arg1: ffffffffc0000005, The exception code that was not handled
  2608. Arg2: fffff803041e74c7, The address that the exception occurred at
  2609. Arg3: 0000000000000000, Parameter 0 of the exception
  2610. Arg4: ffffffffffffffff, Parameter 1 of the exception
  2611.  
  2612. Debugging Details:
  2613. DUMP_CLASS: 1
  2614. DUMP_QUALIFIER: 400
  2615. BUILD_VERSION_STRING: 10.0.14393.1480 (rs1_release.170706-2004)
  2616. SYSTEM_MANUFACTURER: MSI
  2617. SYSTEM_PRODUCT_NAME: MS-7693
  2618. SYSTEM_VERSION: 4.0
  2619. BIOS_VENDOR: American Megatrends Inc.
  2620. BIOS_VERSION: V22.4
  2621. BIOS_DATE: 12/21/2015
  2622. BASEBOARD_MANUFACTURER: MSI
  2623. BASEBOARD_PRODUCT: 970 GAMING (MS-7693)
  2624. BASEBOARD_VERSION: 4.0
  2625. DUMP_TYPE: 2
  2626. READ_ADDRESS: fffff80304432338: Unable to get MiVisibleState
  2627. ffffffffffffffff
  2628. EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
  2629. FAULTING_IP:
  2630. nt!ExpInterlockedPopEntrySListFault+0
  2631. fffff803`041e74c7 498b08 mov rcx,qword ptr [r8]
  2632. EXCEPTION_PARAMETER2: ffffffffffffffff
  2633. BUGCHECK_STR: 0x1E_c0000005_R
  2634. CPU_COUNT: 8
  2635. CPU_MHZ: fa0
  2636. CPU_VENDOR: AuthenticAMD
  2637. CPU_FAMILY: 15
  2638. CPU_MODEL: 2
  2639. CPU_STEPPING: 0
  2640. CUSTOMER_CRASH_COUNT: 1
  2641. DEFAULT_BUCKET_ID: CODE_CORRUPTION
  2642.  
  2643. PROCESS_NAME: explorer.exe
  2644.  
  2645. CURRENT_IRQL: 0
  2646. EXCEPTION_RECORD: 0000000000000001 -- (.exr 0x1)
  2647. Cannot read Exception record @ 0000000000000001
  2648. TRAP_FRAME: 0000000000000001 -- (.trap 0x1)
  2649. Unable to read trap frame at 00000000`00000001
  2650. LAST_CONTROL_TRANSFER: from fffff8030413a270 to fffff803041e1960
  2651. STACK_TEXT:
  2652. ffffb080`1467b548 fffff803`0413a270 : 00000000`0000001e ffffffff`c0000005 fffff803`041e74c7 00000000`00000000 : nt!KeBugCheckEx
  2653. ffffb080`1467b550 fffff803`041ecc0e : 00000000`00000001 fffff803`043b0080 00000000`00000001 00000000`00000010 : nt!KiDispatchException+0x220
  2654. ffffb080`1467bc10 fffff803`041eaebd : ffff9380`0b1f9360 00000000`00000000 00000000`00000000 00000000`00060000 : nt!KiExceptionDispatch+0xce
  2655. ffffb080`1467bdf0 fffff803`041e74c7 : 00000000`00000001 fffff803`042dab45 ffffd88a`00279080 fffff803`041058b6 : nt!KiGeneralProtectionFault+0xfd
  2656. ffffb080`1467bf80 fffff803`042dab45 : ffffd88a`00279080 fffff803`041058b6 ffffd88a`00279400 00000000`00000001 : nt!ExpInterlockedPopEntrySListFault
  2657. ffffb080`1467bf90 fffff809`e00d9254 : ffffd88a`00000001 00000000`000000b0 00000000`00000000 fffff809`e00da329 : nt!ExAllocatePoolWithTag+0x105
  2658. ffffb080`1467c080 fffff809`e099d9c8 : 00000000`00000000 00000000`00000000 00000000`00000000 ffffb080`1467c1f0 : FLTMGR!FltAllocateContext+0x194
  2659. ffffb080`1467c0c0 fffff809`e099dff1 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff809`e35941d1 : fileinfo!FIStreamCreate+0x88
  2660. ffffb080`1467c140 fffff809`e0991b3e : ffffd889`fce2bb40 fffff803`00000001 00000000`00000110 00000000`00000000 : fileinfo!FIStreamGet+0xf1
  2661. ffffb080`1467c1c0 fffff809`e00d46ca : ffffb080`1467c369 ffffb080`1467c4a0 ffffd88a`00231820 ffffd889`fcb77010 : fileinfo!FIPreReadWriteCallback+0x8e
  2662. ffffb080`1467c2c0 fffff809`e00d4278 : ffffb080`1467c4a0 00000000`00000000 00000000`00000003 ffffd889`fcb77000 : FLTMGR!FltpPerformPreCallbacks+0x2ea
  2663. ffffb080`1467c3d0 fffff809`e00d3386 : 00000000`00000000 ffffb080`1467c4a0 ffffd88a`003bd010 ffffb080`1467c4b0 : FLTMGR!FltpPassThroughInternal+0x88
  2664. ffffb080`1467c400 fffff809`e00d312e : 00000000`00000000 ffffb080`1467c598 00000000`0000000c fffff803`043b0080 : FLTMGR!FltpPassThrough+0x1a6
  2665. ffffb080`1467c480 fffff803`040d0610 : ffffd88a`003bd010 ffffd88a`003d95f0 00000000`00000000 ffffd88a`003bd010 : FLTMGR!FltpDispatch+0x9e
  2666. ffffb080`1467c4e0 fffff803`04171083 : ffffd88a`003d95a0 fffff803`04108e8d ffffd88a`003d9600 ffffd88a`003d95c0 : nt!IoPageReadEx+0x2b0
  2667. ffffb080`1467c550 fffff803`040d411d : 00000000`00000002 00000000`00000000 ffffd88a`003d95a0 ffffd88a`003d16c0 : nt!MiIssueHardFaultIo+0xcb
  2668. ffffb080`1467c5e0 fffff803`040e806c : 00000000`c0033333 ffffd88a`003d95a0 fffff803`043b15c0 ffff8287`c74c5000 : nt!MiIssueHardFault+0x15d
  2669. ffffb080`1467c680 fffff803`040df1f5 : ffffa007`bb62a060 ffffd88a`00446e90 00000000`00000000 00000000`00000002 : nt!MmAccessFault+0x11ec
  2670. ffffb080`1467c880 fffff803`040dec75 : 00000000`00000030 00000000`00000001 00000100`01000001 00000000`00000004 : nt!MmCheckCachedPageStates+0x495
  2671. ffffb080`1467ca30 fffff803`044b2ab7 : ffffd889`00000000 00000000`00000000 ffffb080`1467cb01 00000000`00000001 : nt!CcMapAndRead+0xe5
  2672. ffffb080`1467ca90 fffff809`e0aeb100 : ffffd889`fafe27a8 00000000`00005000 00000000`00006000 ffffa007`0003b000 : nt!CcMapData+0x97
  2673. ffffb080`1467cb00 fffff809`e0aea99f : ffffd889`ff69bdc8 ffffa007`b932bb40 ffff8287`00000000 ffffd889`ff69bdc8 : NTFS!ReadIndexBuffer+0xe0
  2674. ffffb080`1467cbe0 fffff809`e0ae7543 : ffffd889`ff69bdc8 ffffa007`be9ee3f0 00000000`00000000 ffff8287`d65a4de0 : NTFS!FindFirstIndexEntry+0x17f
  2675. ffffb080`1467cc90 fffff809`e0b38b25 : ffffd889`ff69bdc8 ffffa007`b845f8c2 ffffb080`14bb11a0 ffffb080`14bb1100 : NTFS!NtfsFindIndexEntry+0x63
  2676. ffffb080`1467cd10 fffff809`e0b37ffd : ffffd889`ff69bdc8 ffffd88a`0043b4c0 ffffb080`14bb1100 ffffd88a`004ea200 : NTFS!NtfsCommonCreate+0x845
  2677. ffffb080`1467cf50 fffff803`041e47f7 : ffffb080`14bb1090 00000000`00000000 00000000`00000000 000000f5`48afefd0 : NTFS!NtfsCommonCreateCallout+0x1d
  2678. ffffb080`1467cf80 fffff803`041e47bd : 00000000`00006000 ffffb080`1467d000 ffffd88a`00279080 fffff803`0412e3b4 : nt!KxSwitchKernelStackCallout+0x27
  2679. ffffb080`14bb0ed0 fffff803`0412e3b4 : 00000000`00000012 00000000`00006000 00000000`00000000 00000000`00000006 : nt!KiSwitchKernelStackContinue
  2680. ffffb080`14bb0ef0 fffff803`0412e126 : ffffb080`14bac000 00000000`00006000 00000000`00000000 ffffb080`14bb0f70 : nt!KiExpandKernelStackAndCalloutOnStackSegment+0x134
  2681. ffffb080`14bb0f70 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExpandKernelStackAndCalloutSwitchStack+0xa6
  2682. STACK_COMMAND: kb
  2683. CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
  2684. fffff803040b7195-fffff803040b7196 2 bytes - nt!MmMapLockedPagesSpecifyCache+105
  2685. [ 80 f6:00 ef ]
  2686. fffff803040b7230-fffff803040b7232 3 bytes - nt!MmMapLockedPagesSpecifyCache+1a0 (+0x9b)
  2687. [ 40 fb f6:80 77 ef ]
  2688. fffff803040d004b-fffff803040d004c 2 bytes - nt!MiFindActualFaultingPte+3b (+0x18e1b)
  2689. [ 80 f6:00 ef ]
  2690. fffff803040d0152-fffff803040d0154 3 bytes - nt!MI_IS_PHYSICAL_ADDRESS+22 (+0x107)
  2691. [ 40 fb f6:80 77 ef ]
  2692. fffff803040d0160-fffff803040d0161 2 bytes - nt!MI_IS_PHYSICAL_ADDRESS+30 (+0x0e)
  2693. [ 80 f6:00 ef ]
  2694. fffff803040d41be-fffff803040d41bf 2 bytes - nt!MiIssueHardFault+1fe (+0x405e)
  2695. [ 80 f6:00 ef ]
  2696. fffff803040dbc01 - nt!MiRemoveLockedPageChargeAndDecRef+1a1 (+0x7a43)
  2697. [ fa:93 ]
  2698. fffff803040dbc60 - nt!MiRemoveLockedPageChargeAndDecRef+200 (+0x5f)
  2699. [ fa:93 ]
  2700. fffff803040e41f4-fffff803040e41f5 2 bytes - nt!MiCompletePrivateZeroFault+44 (+0x8594)
  2701. [ 80 f6:00 ef ]
  2702. fffff803040e63d8 - nt!MiGetPage+98 (+0x21e4)
  2703. [ fa:93 ]
  2704. fffff803040e6853 - nt!MiGetFreeOrZeroPage+2e3 (+0x47b)
  2705. [ fa:93 ]
  2706. fffff803040e68a9 - nt!MiGetFreeOrZeroPage+339 (+0x56)
  2707. [ fa:93 ]
  2708. fffff803040e987d-fffff803040e987e 2 bytes - nt!MiResolveProtoPteFault+4d (+0x2fd4)
  2709. [ 80 f6:00 ef ]
  2710. fffff803040e98a0 - nt!MiResolveProtoPteFault+70 (+0x23)
  2711. [ fa:93 ]
  2712. fffff803040e9904 - nt!MiResolveProtoPteFault+d4 (+0x64)
  2713. [ fa:93 ]
  2714. fffff803041a52de - nt!MiPurgeZeroList+6e (+0xbb9da)
  2715. [ fa:93 ]
  2716. fffff803042da387-fffff803042da389 3 bytes - nt!ExFreePoolWithTag+387
  2717. [ 40 fb f6:80 77 ef ]
  2718. 29 errors : !nt (fffff803040b7195-fffff803042da389)
  2719. MODULE_NAME: memory_corruption
  2720.  
  2721. IMAGE_NAME: memory_corruption
  2722.  
  2723. FOLLOWUP_NAME: memory_corruption
  2724. DEBUG_FLR_IMAGE_TIMESTAMP: 0
  2725. MEMORY_CORRUPTOR: LARGE
  2726. FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
  2727. BUCKET_ID: MEMORY_CORRUPTION_LARGE
  2728. PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
  2729. TARGET_TIME: 2017-07-26T05:58:24.000Z
  2730. OSBUILD: 14393
  2731. OSSERVICEPACK: 1480
  2732. SERVICEPACK_NUMBER: 0
  2733. OS_REVISION: 0
  2734. SUITE_MASK: 784
  2735. PRODUCT_TYPE: 1
  2736. OSPLATFORM_TYPE: x64
  2737. OSNAME: Windows 10
  2738. OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
  2739. USER_LCID: 0
  2740. OSBUILD_TIMESTAMP: 2017-07-07 02:26:09
  2741. BUILDDATESTAMP_STR: 170706-2004
  2742. BUILDLAB_STR: rs1_release
  2743. BUILDOSVER_STR: 10.0.14393.1480
  2744. ANALYSIS_SESSION_ELAPSED_TIME: 39e3
  2745. ANALYSIS_SOURCE: KM
  2746. FAILURE_ID_HASH_STRING: km:memory_corruption_large
  2747. FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
  2748. Followup: memory_corruption
  2749.  
  2750. ========================================================================
  2751. =================== Dump File: 072617-6218-01.dmp ====================
  2752. ========================================================================
  2753. Mini Kernel Dump File: Only registers and stack trace are available
  2754. Windows 10 Kernel Version 14393 MP (8 procs) Free x64
  2755. Product: WinNt, suite: TerminalServer SingleUserTS Personal
  2756. Built by: 14393.1480.amd64fre.rs1_release.170706-2004
  2757. Kernel base = 0xfffff800`4c07d000 PsLoadedModuleList = 0xfffff800`4c37c040
  2758. Debug session time: Wed Jul 26 14:08:49.811 2017 (UTC - 4:00)
  2759. System Uptime: 0 days 0:01:07.567
  2760.  
  2761. BugCheck 3B, {c0000005, fffff8004c0f059b, ffffb38024f9c460, 0}
  2762. Probably caused by : memory_corruption
  2763. Followup: memory_corruption
  2764.  
  2765. SYSTEM_SERVICE_EXCEPTION (3b)
  2766. An exception happened while executing a system service routine.
  2767.  
  2768. Arguments:
  2769. Arg1: 00000000c0000005, Exception code that caused the bugcheck
  2770. Arg2: fffff8004c0f059b, Address of the instruction which caused the bugcheck
  2771. Arg3: ffffb38024f9c460, Address of the context record for the exception that caused the bugcheck
  2772. Arg4: 0000000000000000, zero.
  2773.  
  2774. Debugging Details:
  2775. DUMP_CLASS: 1
  2776. DUMP_QUALIFIER: 400
  2777. BUILD_VERSION_STRING: 10.0.14393.1480 (rs1_release.170706-2004)
  2778. SYSTEM_MANUFACTURER: MSI
  2779. SYSTEM_PRODUCT_NAME: MS-7693
  2780. SYSTEM_VERSION: 4.0
  2781. BIOS_VENDOR: American Megatrends Inc.
  2782. BIOS_VERSION: V22.4
  2783. BIOS_DATE: 12/21/2015
  2784. BASEBOARD_MANUFACTURER: MSI
  2785. BASEBOARD_PRODUCT: 970 GAMING (MS-7693)
  2786. BASEBOARD_VERSION: 4.0
  2787. DUMP_TYPE: 2
  2788. EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
  2789. FAULTING_IP:
  2790. nt!ObReferenceObjectSafeWithTag+b
  2791. fffff800`4c0f059b 488b01 mov rax,qword ptr [rcx]
  2792. CONTEXT: ffffb38024f9c460 -- (.cxr 0xffffb38024f9c460)
  2793. rax=7ffff8004c7bcc00 rbx=ffff9d814ae683c0 rcx=fffb9d81472a57d0
  2794. rdx=000000006e457350 rsi=ffff9d814acbb080 rdi=fffb9d81472a5af0
  2795. rip=fffff8004c0f059b rsp=ffffb38024f9ce60 rbp=ffffb38024f9db80
  2796. r8=0000000000000000 r9=fffff8004c07d000 r10=ffffb38022017fa0
  2797. r11=ffff9d814ba8a740 r12=fffff8004c3763f0 r13=fffb9d81472a5800
  2798. r14=0000000000000000 r15=0000000000000011
  2799. iopl=0 nv up ei ng nz na pe cy
  2800. cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010283
  2801. nt!ObReferenceObjectSafeWithTag+0xb:
  2802. fffff800`4c0f059b 488b01 mov rax,qword ptr [rcx] ds:002b:fffb9d81`472a57d0=????????????????
  2803. Resetting default scope
  2804. CPU_COUNT: 8
  2805. CPU_MHZ: fa0
  2806. CPU_VENDOR: AuthenticAMD
  2807. CPU_FAMILY: 15
  2808. CPU_MODEL: 2
  2809. CPU_STEPPING: 0
  2810. CUSTOMER_CRASH_COUNT: 1
  2811. DEFAULT_BUCKET_ID: CODE_CORRUPTION
  2812. BUGCHECK_STR: 0x3B
  2813.  
  2814. PROCESS_NAME: KillerService.exe
  2815.  
  2816. CURRENT_IRQL: 0
  2817. LAST_CONTROL_TRANSFER: from fffff8004c4a4440 to fffff8004c0f059b
  2818. STACK_TEXT:
  2819. ffffb380`24f9ce60 fffff800`4c4a4440 : ffff9d81`4ae683c0 ffffb380`24f9db80 00000000`00000000 00000000`00000010 : nt!ObReferenceObjectSafeWithTag+0xb
  2820. ffffb380`24f9ce90 fffff800`4c481175 : ffffe80b`9f769aa0 fffff800`00010000 00000000`00000000 00000000`00000000 : nt!ExpGetProcessInformation+0xd10
  2821. ffffb380`24f9d2f0 fffff800`4c480b6b : 00000000`00000000 00000000`00000000 00000000`00000102 ffffffff`fffe7960 : nt!ExpQuerySystemInformation+0x4f5
  2822. ffffb380`24f9dac0 fffff800`4c1d7693 : ffff9d81`4acbb080 00000000`0000000a ffffb380`24f9dad8 ffff9d81`4ae8b2b0 : nt!NtQuerySystemInformation+0x2b
  2823. ffffb380`24f9db00 00007ff9`205467a4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
  2824. 0000000e`3f2fe6e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`205467a4
  2825. CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
  2826. fffff8004c0d33a4 - nt!MiResolvePageTablePage+54
  2827. [ f6:fa ]
  2828. fffff8004c0d487e - nt!MiResolveProtoPteFault+4e (+0x14da)
  2829. [ f6:fa ]
  2830. fffff8004c0d48a0 - nt!MiResolveProtoPteFault+70 (+0x22)
  2831. [ fa:c3 ]
  2832. fffff8004c0d4904 - nt!MiResolveProtoPteFault+d4 (+0x64)
  2833. [ fa:c3 ]
  2834. fffff8004c0df231 - nt!MiDeleteValidSystemPage+251 (+0xa92d)
  2835. [ f6:fa ]
  2836. fffff8004c0df24e - nt!MiDeleteValidSystemPage+26e (+0x1d)
  2837. [ fa:c3 ]
  2838. fffff8004c1902de - nt!MiPurgeZeroList+6e (+0xb1090)
  2839. [ fa:c3 ]
  2840. fffff8004c2c5388-fffff8004c2c5389 2 bytes - nt!ExFreePoolWithTag+388
  2841. [ fb f6:fd fa ]
  2842. 9 errors : !nt (fffff8004c0d33a4-fffff8004c2c5389)
  2843. MODULE_NAME: memory_corruption
  2844.  
  2845. IMAGE_NAME: memory_corruption
  2846.  
  2847. FOLLOWUP_NAME: memory_corruption
  2848. DEBUG_FLR_IMAGE_TIMESTAMP: 0
  2849. MEMORY_CORRUPTOR: LARGE
  2850. STACK_COMMAND: .cxr 0xffffb38024f9c460 ; kb
  2851. FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
  2852. BUCKET_ID: MEMORY_CORRUPTION_LARGE
  2853. PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
  2854. TARGET_TIME: 2017-07-26T18:08:49.000Z
  2855. OSBUILD: 14393
  2856. OSSERVICEPACK: 1480
  2857. SERVICEPACK_NUMBER: 0
  2858. OS_REVISION: 0
  2859. SUITE_MASK: 784
  2860. PRODUCT_TYPE: 1
  2861. OSPLATFORM_TYPE: x64
  2862. OSNAME: Windows 10
  2863. OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
  2864. USER_LCID: 0
  2865. OSBUILD_TIMESTAMP: 2017-07-07 02:26:09
  2866. BUILDDATESTAMP_STR: 170706-2004
  2867. BUILDLAB_STR: rs1_release
  2868. BUILDOSVER_STR: 10.0.14393.1480
  2869. ANALYSIS_SESSION_ELAPSED_TIME: 3c36
  2870. ANALYSIS_SOURCE: KM
  2871. FAILURE_ID_HASH_STRING: km:memory_corruption_large
  2872. FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
  2873. Followup: memory_corruption
  2874.  
  2875. ========================================================================
  2876. =================== Dump File: 072617-6500-01.dmp ====================
  2877. ========================================================================
  2878. Mini Kernel Dump File: Only registers and stack trace are available
  2879. Windows 10 Kernel Version 14393 MP (8 procs) Free x64
  2880. Product: WinNt, suite: TerminalServer SingleUserTS Personal
  2881. Built by: 14393.1480.amd64fre.rs1_release.170706-2004
  2882. Kernel base = 0xfffff803`1a808000 PsLoadedModuleList = 0xfffff803`1ab07040
  2883. Debug session time: Wed Jul 26 14:49:00.164 2017 (UTC - 4:00)
  2884. System Uptime: 0 days 0:00:40.921
  2885.  
  2886. BugCheck 3B, {c0000005, fffff8031a817c25, ffffa480a14d9df0, 0}
  2887. Probably caused by : memory_corruption
  2888. Followup: memory_corruption
  2889.  
  2890. SYSTEM_SERVICE_EXCEPTION (3b)
  2891. An exception happened while executing a system service routine.
  2892.  
  2893. Arguments:
  2894. Arg1: 00000000c0000005, Exception code that caused the bugcheck
  2895. Arg2: fffff8031a817c25, Address of the instruction which caused the bugcheck
  2896. Arg3: ffffa480a14d9df0, Address of the context record for the exception that caused the bugcheck
  2897. Arg4: 0000000000000000, zero.
  2898.  
  2899. Debugging Details:
  2900. DUMP_CLASS: 1
  2901. DUMP_QUALIFIER: 400
  2902. BUILD_VERSION_STRING: 10.0.14393.1480 (rs1_release.170706-2004)
  2903. SYSTEM_MANUFACTURER: MSI
  2904. SYSTEM_PRODUCT_NAME: MS-7693
  2905. SYSTEM_VERSION: 4.0
  2906. BIOS_VENDOR: American Megatrends Inc.
  2907. BIOS_VERSION: V22.4
  2908. BIOS_DATE: 12/21/2015
  2909. BASEBOARD_MANUFACTURER: MSI
  2910. BASEBOARD_PRODUCT: 970 GAMING (MS-7693)
  2911. BASEBOARD_VERSION: 4.0
  2912. DUMP_TYPE: 2
  2913. EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
  2914. FAULTING_IP:
  2915. nt!PspReturnQuota+45
  2916. fffff803`1a817c25 488b3b mov rdi,qword ptr [rbx]
  2917. CONTEXT: ffffa480a14d9df0 -- (.cxr 0xffffa480a14d9df0)
  2918. rax=fffff8031aba96e8 rbx=fffb900601c392c0 rcx=fffb900601c392c0
  2919. rdx=0000000000000000 rsi=0000000000000000 rdi=00ffff900602ea87
  2920. rip=fffff8031a817c25 rsp=ffffa480a14da7f0 rbp=0000000000000000
  2921. r8=0000000000000000 r9=00000000000007e0 r10=0000000000000000
  2922. r11=ffffa480a14da890 r12=fffb900601c392c0 r13=0000000000000005
  2923. r14=00000000000007e0 r15=0000000000000000
  2924. iopl=0 nv up ei pl zr ac po nc
  2925. cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010256
  2926. nt!PspReturnQuota+0x45:
  2927. fffff803`1a817c25 488b3b mov rdi,qword ptr [rbx] ds:002b:fffb9006`01c392c0=????????????????
  2928. Resetting default scope
  2929. CPU_COUNT: 8
  2930. CPU_MHZ: fa0
  2931. CPU_VENDOR: AuthenticAMD
  2932. CPU_FAMILY: 15
  2933. CPU_MODEL: 2
  2934. CPU_STEPPING: 0
  2935. CUSTOMER_CRASH_COUNT: 1
  2936. DEFAULT_BUCKET_ID: CODE_CORRUPTION
  2937. BUGCHECK_STR: 0x3B
  2938.  
  2939. PROCESS_NAME: ShellExperienceHost.exe
  2940.  
  2941. CURRENT_IRQL: 0
  2942. LAST_CONTROL_TRANSFER: from fffff8031ac1057d to fffff8031a817c25
  2943. STACK_TEXT:
  2944. ffffa480`a14da7f0 fffff803`1ac1057d : ffff9006`02ea87d0 ffff9006`02ea87d0 ffff9005`fd6aca70 fffb9006`01c392c0 : nt!PspReturnQuota+0x45
  2945. ffffa480`a14da850 fffff803`1ac10400 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObpFreeObject+0x12d
  2946. ffffa480`a14da8c0 fffff803`1a87b566 : 00000000`00000000 00000000`00000000 ffff9006`02ea87d0 ffff9006`02ea8800 : nt!ObpRemoveObjectRoutine+0x80
  2947. ffffa480`a14da920 fffff803`1ac2baeb : 00000000`00000000 00000000`00000000 ffff9006`02ea87d0 00000000`00000000 : nt!ObfDereferenceObjectWithTag+0xc6
  2948. ffffa480`a14da960 fffff803`1ac7666b : ffff9006`02fa2080 00000083`388ff6e8 00000083`388ff760 00000000`00000000 : nt!ObCloseHandleTableEntry+0x28b
  2949. ffffa480`a14daaa0 fffff803`1a962693 : ffff9006`02fa2080 ffffa480`a14dab10 00000000`00000000 000001d5`dbeb14c0 : nt!NtClose+0xcb
  2950. ffffa480`a14dab00 00007ff8`1e1462c4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
  2951. 00000083`388ff6c8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`1e1462c4
  2952. CHKIMG_EXTENSION: !chkimg -lo 50 -db !win32k
  2953. 256 errors : !win32k (ffff830fc8461ac0-ffff830fc8461bbf)
  2954. ffff830fc8461ac0 *00 *ea *d1 *ff *00 *f2 *d1 *ff *00 *fa *d1 *ff *80 *f3 *cf *ff ................
  2955. ffff830fc8461ad0 *e1 *f3 *cf *ff *40 *f4 *cf *ff *a0 *f4 *cf *ff *00 *f5 *cf *ff ....@...........
  2956. ffff830fc8461ae0 *60 *f5 *cf *ff *c0 *f5 *cf *ff *23 *f6 *cf *ff *87 *f6 *cf *ff `.......#.......
  2957. ffff830fc8461af0 *e0 *f6 *cf *ff *40 *f7 *cf *ff *a0 *f7 *cf *ff *00 *f8 *cf *ff ....@...........
  2958. ffff830fc8461b00 *60 *f8 *cf *ff *c0 *f8 *cf *ff *20 *f9 *cf *ff *80 *f9 *cf *ff `....... .......
  2959. ffff830fc8461b10 *00 *02 *d2 *ff *40 *fa *cf *ff *a0 *fa *cf *ff *00 *fb *cf *ff ....@...........
  2960. ffff830fc8461b20 *60 *fb *cf *ff *c0 *fb *cf *ff *20 *fc *cf *ff *81 *fc *cf *ff `....... .......
  2961. ffff830fc8461b30 *e0 *fc *cf *ff *40 *fd *cf *ff *a0 *fd *cf *ff *04 *fe *cf *ff ....@...........
  2962. ffff830fc8461b40 *60 *fe *cf *ff *c0 *fe *cf *ff *20 *ff *cf *ff *81 *ff *cf *ff `....... .......
  2963. ffff830fc8461b50 *e0 *ff *cf *ff *40 *00 *d0 *ff *a0 *00 *d0 *ff *03 *01 *d0 *ff ....@...........
  2964. ffff830fc8461b60 *60 *01 *d0 *ff *00 *0a *d2 *ff *20 *02 *d0 *ff *80 *02 *d0 *ff `....... .......
  2965. ffff830fc8461b70 *ec *02 *d0 *ff *40 *03 *d0 *ff *a0 *03 *d0 *ff *00 *12 *d2 *ff ....@...........
  2966. ffff830fc8461b80 *60 *04 *d0 *ff *c0 *04 *d0 *ff *20 *05 *d0 *ff *80 *05 *d0 *ff `....... .......
  2967. ffff830fc8461b90 *e8 *05 *d0 *ff *40 *06 *d0 *ff *a0 *06 *d0 *ff *00 *07 *d0 *ff ....@...........
  2968. ffff830fc8461ba0 *60 *07 *d0 *ff *c0 *07 *d0 *ff *20 *08 *d0 *ff *85 *08 *d0 *ff `....... .......
  2969. ffff830fc8461bb0 *e0 *08 *d0 *ff *40 *09 *d0 *ff *a0 *09 *d0 *ff *00 *0a *d0 *ff ....@...........
  2970. MODULE_NAME: memory_corruption
  2971.  
  2972. IMAGE_NAME: memory_corruption
  2973.  
  2974. FOLLOWUP_NAME: memory_corruption
  2975. DEBUG_FLR_IMAGE_TIMESTAMP: 0
  2976. MEMORY_CORRUPTOR: LARGE_256
  2977. STACK_COMMAND: .cxr 0xffffa480a14d9df0 ; kb
  2978. FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE_256
  2979. BUCKET_ID: MEMORY_CORRUPTION_LARGE_256
  2980. PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE_256
  2981. TARGET_TIME: 2017-07-26T18:49:00.000Z
  2982. OSBUILD: 14393
  2983. OSSERVICEPACK: 1480
  2984. SERVICEPACK_NUMBER: 0
  2985. OS_REVISION: 0
  2986. SUITE_MASK: 784
  2987. PRODUCT_TYPE: 1
  2988. OSPLATFORM_TYPE: x64
  2989. OSNAME: Windows 10
  2990. OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
  2991. USER_LCID: 0
  2992. OSBUILD_TIMESTAMP: 2017-07-07 02:26:09
  2993. BUILDDATESTAMP_STR: 170706-2004
  2994. BUILDLAB_STR: rs1_release
  2995. BUILDOSVER_STR: 10.0.14393.1480
  2996. ANALYSIS_SESSION_ELAPSED_TIME: 29b2
  2997. ANALYSIS_SOURCE: KM
  2998. FAILURE_ID_HASH_STRING: km:memory_corruption_large_256
  2999. FAILURE_ID_HASH: {c4e440c8-f34a-f4bb-4c2a-b6acf02f9cce}
  3000. Followup: memory_corruption
  3001.  
  3002. ========================================================================
  3003. =================== Dump File: 072617-6703-01.dmp ====================
  3004. ========================================================================
  3005. Mini Kernel Dump File: Only registers and stack trace are available
  3006. Windows 10 Kernel Version 14393 MP (8 procs) Free x64
  3007. Product: WinNt, suite: TerminalServer SingleUserTS Personal
  3008. Built by: 14393.1480.amd64fre.rs1_release.170706-2004
  3009. Kernel base = 0xfffff803`20c86000 PsLoadedModuleList = 0xfffff803`20f85040
  3010. Debug session time: Wed Jul 26 04:29:12.540 2017 (UTC - 4:00)
  3011. System Uptime: 0 days 1:35:12.297
  3012.  
  3013. BugCheck 50, {ffffdd00dc6c4048, 0, fffff803212e5de7, 2}
  3014. Could not read faulting driver name
  3015. Probably caused by : memory_corruption
  3016. Followup: memory_corruption
  3017.  
  3018. PAGE_FAULT_IN_NONPAGED_AREA (50)
  3019. Invalid system memory was referenced. This cannot be protected by try-except.
  3020. Typically the address is just plain bad or it is pointing at freed memory.
  3021.  
  3022. Arguments:
  3023. Arg1: ffffdd00dc6c4048, memory referenced.
  3024. Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
  3025. Arg3: fffff803212e5de7, If non-zero, the instruction address which referenced the bad memory
  3026. address.
  3027. Arg4: 0000000000000002, (reserved)
  3028.  
  3029. Debugging Details:
  3030. Could not read faulting driver name
  3031. DUMP_CLASS: 1
  3032. DUMP_QUALIFIER: 400
  3033. BUILD_VERSION_STRING: 10.0.14393.1480 (rs1_release.170706-2004)
  3034. SYSTEM_MANUFACTURER: MSI
  3035. SYSTEM_PRODUCT_NAME: MS-7693
  3036. SYSTEM_VERSION: 4.0
  3037. BIOS_VENDOR: American Megatrends Inc.
  3038. BIOS_VERSION: V22.4
  3039. BIOS_DATE: 12/21/2015
  3040. BASEBOARD_MANUFACTURER: MSI
  3041. BASEBOARD_PRODUCT: 970 GAMING (MS-7693)
  3042. BASEBOARD_VERSION: 4.0
  3043. DUMP_TYPE: 2
  3044. READ_ADDRESS: fffff80321026338: Unable to get MiVisibleState
  3045. ffffdd00dc6c4048
  3046. FAULTING_IP:
  3047. nt!ObpCaptureHandleInformation+63
  3048. fffff803`212e5de7 0fb64218 movzx eax,byte ptr [rdx+18h]
  3049. MM_INTERNAL_CODE: 2
  3050. CPU_COUNT: 8
  3051. CPU_MHZ: fa0
  3052. CPU_VENDOR: AuthenticAMD
  3053. CPU_FAMILY: 15
  3054. CPU_MODEL: 2
  3055. CPU_STEPPING: 0
  3056. CUSTOMER_CRASH_COUNT: 1
  3057. DEFAULT_BUCKET_ID: CODE_CORRUPTION
  3058. BUGCHECK_STR: AV
  3059.  
  3060. PROCESS_NAME: GameOverlayUI.exe
  3061.  
  3062. CURRENT_IRQL: 0
  3063. TRAP_FRAME: ffff8001f07cd050 -- (.trap 0xffff8001f07cd050)
  3064. NOTE: The trap frame does not contain all registers.
  3065. Some register values may be zeroed or incorrect.
  3066. rax=00ffffdd00dc6c40 rbx=0000000000000000 rcx=0000000000000040
  3067. rdx=ffffdd00dc6c4030 rsi=0000000000000000 rdi=0000000000000000
  3068. rip=fffff803212e5de7 rsp=ffff8001f07cd1e8 rbp=ffffae033efee550
  3069. r8=ffffae033efee550 r9=0000000000001954 r10=ffff8001f07cd278
  3070. r11=00000000000016a4 r12=0000000000000000 r13=0000000000000000
  3071. r14=0000000000000000 r15=0000000000000000
  3072. iopl=0 nv up ei pl nz ac pe nc
  3073. nt!ObpCaptureHandleInformation+0x63:
  3074. fffff803`212e5de7 0fb64218 movzx eax,byte ptr [rdx+18h] ds:ffffdd00`dc6c4048=??
  3075. Resetting default scope
  3076. LAST_CONTROL_TRANSFER: from fffff80320dffe11 to fffff80320dd5960
  3077. STACK_TEXT:
  3078. ffff8001`f07ccd58 fffff803`20dffe11 : 00000000`00000050 ffffdd00`dc6c4048 00000000`00000000 ffff8001`f07cd050 : nt!KeBugCheckEx
  3079. ffff8001`f07ccd60 fffff803`20cdb0fd : 00000000`00000000 00000000`00000000 ffff8001`f07cd050 ffffdd00`dc6c4048 : nt!MiSystemFault+0x100201
  3080. ffff8001`f07cce50 fffff803`20ddeffc : 00000000`00000000 00001f80`00000001 dd04dc46`7e400001 ffffae03`3e6c2580 : nt!MmAccessFault+0x27d
  3081. ffff8001`f07cd050 fffff803`212e5de7 : fffff803`2132b527 00000000`00001954 00000000`00000000 ffffdd04`00000000 : nt!KiPageFault+0x13c
  3082. ffff8001`f07cd1e8 fffff803`2132b527 : 00000000`00001954 00000000`00000000 ffffdd04`00000000 00000000`00000000 : nt!ObpCaptureHandleInformation+0x63
  3083. ffff8001`f07cd1f0 fffff803`212e5cfc : fffff803`212e5d84 ffff8fff`4f2c3580 ffff8001`00372aa0 ffff8001`f07cd324 : nt!ExpSnapShotHandleTables+0x127
  3084. ffff8001`f07cd270 fffff803`21329237 : ffff8001`f07cd324 00000000`000c3548 00000000`00372aa0 00000000`00000000 : nt!ObGetHandleInformation+0x3c
  3085. ffff8001`f07cd2b0 fffff803`2120d1d3 : 00000000`00000010 00000000`00020000 ffff8fff`4f200050 ffffdd04`de96b000 : nt!ExpGetHandleInformation+0x53
  3086. ffff8001`f07cd2f0 fffff803`21089b6b : 00000000`00000002 00000000`0000c000 ffffffff`ffffffff 00000000`00ad0000 : nt!ExpQuerySystemInformation+0x183553
  3087. ffff8001`f07cdac0 fffff803`20de0693 : ffffdd04`dcedf080 00000000`00000000 ffff8001`f07cdad8 ffffdd04`dcce3c50 : nt!NtQuerySystemInformation+0x2b
  3088. ffff8001`f07cdb00 00007ffb`836d67a4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
  3089. 00000000`00c8df98 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`836d67a4
  3090. STACK_COMMAND: kb
  3091. CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
  3092. fffff80320cab383-fffff80320cab384 2 bytes - nt!MmMapLockedPagesSpecifyCache+2f3
  3093. [ 80 fa:00 92 ]
  3094. fffff80320cab406-fffff80320cab407 2 bytes - nt!MmMapLockedPagesSpecifyCache+376 (+0x83)
  3095. [ 80 fa:00 92 ]
  3096. fffff80320cd81f4-fffff80320cd81f5 2 bytes - nt!MiCompletePrivateZeroFault+44 (+0x2cdee)
  3097. [ 80 f6:00 c5 ]
  3098. fffff80320cd89d0-fffff80320cd89d1 2 bytes - nt!MiCompletePrivateZeroFault+820 (+0x7dc)
  3099. [ 80 fa:00 92 ]
  3100. fffff80320cd8a93-fffff80320cd8a94 2 bytes - nt!MiCompletePrivateZeroFault+8e3 (+0xc3)
  3101. [ 80 fa:00 92 ]
  3102. fffff80320cd8f21-fffff80320cd8f22 2 bytes - nt!MiAllocateWsle+421 (+0x48e)
  3103. [ 80 f6:00 c5 ]
  3104. fffff80320cda3d7-fffff80320cda3d8 2 bytes - nt!MiGetPage+97 (+0x14b6)
  3105. [ 80 fa:00 92 ]
  3106. fffff80320cda5ea-fffff80320cda5eb 2 bytes - nt!MiGetFreeOrZeroPage+7a (+0x213)
  3107. [ 80 fa:00 92 ]
  3108. fffff80320cdc3a3-fffff80320cdc3a4 2 bytes - nt!MiResolvePageTablePage+53 (+0x1db9)
  3109. [ 80 f6:00 c5 ]
  3110. fffff80320d992dd-fffff80320d992de 2 bytes - nt!MiPurgeZeroList+6d (+0xbcf3a)
  3111. [ 80 fa:00 92 ]
  3112. 20 errors : !nt (fffff80320cab383-fffff80320d992de)
  3113. MODULE_NAME: memory_corruption
  3114.  
  3115. IMAGE_NAME: memory_corruption
  3116.  
  3117. FOLLOWUP_NAME: memory_corruption
  3118. DEBUG_FLR_IMAGE_TIMESTAMP: 0
  3119. MEMORY_CORRUPTOR: LARGE
  3120. FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
  3121. BUCKET_ID: MEMORY_CORRUPTION_LARGE
  3122. PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
  3123. TARGET_TIME: 2017-07-26T08:29:12.000Z
  3124. OSBUILD: 14393
  3125. OSSERVICEPACK: 1480
  3126. SERVICEPACK_NUMBER: 0
  3127. OS_REVISION: 0
  3128. SUITE_MASK: 784
  3129. PRODUCT_TYPE: 1
  3130. OSPLATFORM_TYPE: x64
  3131. OSNAME: Windows 10
  3132. OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
  3133. USER_LCID: 0
  3134. OSBUILD_TIMESTAMP: 2017-07-07 02:26:09
  3135. BUILDDATESTAMP_STR: 170706-2004
  3136. BUILDLAB_STR: rs1_release
  3137. BUILDOSVER_STR: 10.0.14393.1480
  3138. ANALYSIS_SESSION_ELAPSED_TIME: 3113
  3139. ANALYSIS_SOURCE: KM
  3140. FAILURE_ID_HASH_STRING: km:memory_corruption_large
  3141. FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
  3142. Followup: memory_corruption
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement