Guest User

Untitled

a guest
Jul 28th, 2017
289
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 40.88 KB | None | 0 0
  1. Microsoft (R) Windows Debugger Version 10.0.14321.1024 X86
  2. Copyright (c) Microsoft Corporation. All rights reserved.
  3.  
  4. ========================================================================
  5. =================== Dump File: 072617-12500-01.dmp ===================
  6. ========================================================================
  7. Mini Kernel Dump File: Only registers and stack trace are available
  8. Windows 10 Kernel Version 10586 MP (6 procs) Free x64
  9. Product: WinNt, suite: TerminalServer SingleUserTS
  10. Built by: 10586.1007.amd64fre.th2_release.170706-2002
  11. Kernel base = 0xfffff800`8c47d000 PsLoadedModuleList = 0xfffff800`8c75ac70
  12. Debug session time: Tue Jul 25 12:39:17.836 2017 (UTC - 4:00)
  13. System Uptime: 0 days 21:22:19.560
  14.  
  15. BugCheck 3B, {c0000005, fffff8008c54a132, ffffd00021fa2d00, 0}
  16. Probably caused by : ntkrnlmp.exe ( nt!KxWaitForLockOwnerShipWithIrql+12 )
  17. Followup: MachineOwner
  18.  
  19. SYSTEM_SERVICE_EXCEPTION (3b)
  20. An exception happened while executing a system service routine.
  21.  
  22. Arguments:
  23. Arg1: 00000000c0000005, Exception code that caused the bugcheck
  24. Arg2: fffff8008c54a132, Address of the instruction which caused the bugcheck
  25. Arg3: ffffd00021fa2d00, Address of the context record for the exception that caused the bugcheck
  26. Arg4: 0000000000000000, zero.
  27.  
  28. Debugging Details:
  29. DUMP_CLASS: 1
  30. DUMP_QUALIFIER: 400
  31. BUILD_VERSION_STRING: 10.0.10586.1007 (th2_release.170706-2002)
  32. BIOS_VENDOR: American Megatrends Inc.
  33. BIOS_VERSION: P1.00
  34. BIOS_DATE: 10/17/2012
  35. BASEBOARD_MANUFACTURER: ASRock
  36. BASEBOARD_PRODUCT: 970 Extreme3 R2.0
  37. BASEBOARD_VERSION:
  38. DUMP_TYPE: 2
  39. EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
  40. FAULTING_IP:
  41. nt!KxWaitForLockOwnerShipWithIrql+12
  42. fffff800`8c54a132 48890a mov qword ptr [rdx],rcx
  43. CONTEXT: ffffd00021fa2d00 -- (.cxr 0xffffd00021fa2d00)
  44. rax=0000000000000000 rbx=fffff8008c80e3c0 rcx=ffffd00021fa3770
  45. rdx=2000000000000000 rsi=0000000000000000 rdi=ffffd00021fa3770
  46. rip=fffff8008c54a132 rsp=ffffd00021fa3720 rbp=ffffd00021fa37b0
  47. r8=ffffd00021fa37e0 r9=0000000000000000 r10=7ffff8008c776690
  48. r11=7ffffffffffffffc r12=0000000000000000 r13=0000000000000000
  49. r14=0000000000000001 r15=0000000000000000
  50. iopl=0 nv up di ng nz na po nc
  51. cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010086
  52. nt!KxWaitForLockOwnerShipWithIrql+0x12:
  53. fffff800`8c54a132 48890a mov qword ptr [rdx],rcx ds:002b:20000000`00000000=????????????????
  54. Resetting default scope
  55. CPU_COUNT: 6
  56. CPU_MHZ: f97
  57. CPU_VENDOR: AuthenticAMD
  58. CPU_FAMILY: 15
  59. CPU_MODEL: 2
  60. CPU_STEPPING: 0
  61. CUSTOMER_CRASH_COUNT: 1
  62. DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
  63. BUGCHECK_STR: 0x3B
  64.  
  65. PROCESS_NAME: svchost.exe
  66.  
  67. CURRENT_IRQL: 0
  68. LAST_CONTROL_TRANSFER: from fffff8008c48eaaa to fffff8008c54a132
  69. STACK_TEXT:
  70. ffffd000`21fa3720 fffff800`8c48eaaa : fffff800`8c80e3c0 00000000`00000000 00000000`00000738 fffff800`8c860e05 : nt!KxWaitForLockOwnerShipWithIrql+0x12
  71. ffffd000`21fa3750 fffff800`8c858c1e : ffffc001`60ae9702 ffffc001`60ae97d0 00000000`00000000 ffffd000`00000019 : nt!ExAcquireResourceSharedLite+0x34a
  72. ffffd000`21fa37e0 fffff800`8c870da8 : 00000000`00000000 fffff800`8c89fb07 00000000`00000090 ffffc001`60ae97a0 : nt!CmpDeleteKeyObject+0x10e
  73. ffffd000`21fa38c0 fffff800`8c490d5f : 00000000`00000000 00000000`00000000 00000000`00000000 ffffc001`60ae97d0 : nt!ObpRemoveObjectRoutine+0x78
  74. ffffd000`21fa3920 fffff800`8c86238c : 00000000`00000000 fffff800`8c47d000 fffff800`8c47d000 00000000`00000000 : nt!ObfDereferenceObjectWithTag+0xbf
  75. ffffd000`21fa3960 fffff800`8c8a5e3d : 00000000`00000000 00000099`1fefe348 00000000`00000090 00000099`1fefdee0 : nt!ObCloseHandleTableEntry+0x89c
  76. ffffd000`21fa3aa0 fffff800`8c5ca2a3 : 00000000`00004000 00000099`1fefdf90 ffffe000`a3cc7080 ffffd000`21fa3b80 : nt!NtClose+0xcd
  77. ffffd000`21fa3b00 00007ffb`fa0b52b4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
  78. 00000099`1fefe2a8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`fa0b52b4
  79. THREAD_SHA1_HASH_MOD_FUNC: 56fb2e776b34bca08cf97a978a90518924177db1
  80. THREAD_SHA1_HASH_MOD_FUNC_OFFSET: ed3d9d73c7e3495effae3bc997fbd8f3ee626970
  81. THREAD_SHA1_HASH_MOD: cb5f414824c2521bcc505eaa03e92fa10922dad8
  82. FOLLOWUP_IP:
  83. nt!KxWaitForLockOwnerShipWithIrql+12
  84. fffff800`8c54a132 48890a mov qword ptr [rdx],rcx
  85. FAULT_INSTR_CODE: 4d0a8948
  86. SYMBOL_STACK_INDEX: 0
  87. SYMBOL_NAME: nt!KxWaitForLockOwnerShipWithIrql+12
  88. FOLLOWUP_NAME: MachineOwner
  89. MODULE_NAME: nt
  90.  
  91. IMAGE_NAME: ntkrnlmp.exe
  92.  
  93. DEBUG_FLR_IMAGE_TIMESTAMP: 595f32ce
  94. IMAGE_VERSION: 10.0.10586.1007
  95. STACK_COMMAND: .cxr 0xffffd00021fa2d00 ; kb
  96. BUCKET_ID_FUNC_OFFSET: 12
  97. FAILURE_BUCKET_ID: 0x3B_nt!KxWaitForLockOwnerShipWithIrql
  98. BUCKET_ID: 0x3B_nt!KxWaitForLockOwnerShipWithIrql
  99. PRIMARY_PROBLEM_CLASS: 0x3B_nt!KxWaitForLockOwnerShipWithIrql
  100. TARGET_TIME: 2017-07-25T16:39:17.000Z
  101. OSBUILD: 10586
  102. OSSERVICEPACK: 1007
  103. SERVICEPACK_NUMBER: 0
  104. OS_REVISION: 0
  105. SUITE_MASK: 272
  106. PRODUCT_TYPE: 1
  107. OSPLATFORM_TYPE: x64
  108. OSNAME: Windows 10
  109. OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
  110. USER_LCID: 0
  111. OSBUILD_TIMESTAMP: 2017-07-07 03:05:50
  112. BUILDDATESTAMP_STR: 170706-2002
  113. BUILDLAB_STR: th2_release
  114. BUILDOSVER_STR: 10.0.10586.1007
  115. ANALYSIS_SESSION_ELAPSED_TIME: 47af
  116. ANALYSIS_SOURCE: KM
  117. FAILURE_ID_HASH_STRING: km:0x3b_nt!kxwaitforlockownershipwithirql
  118. FAILURE_ID_HASH: {c3fcce84-82a0-ac56-6588-32a985eb9681}
  119. Followup: MachineOwner
  120.  
  121. =============================== Drivers ================================
  122. fffff800`89450000 fffff800`8946d000 mcupdate_AuthenticAMD (deferred)
  123. Image path: \SystemRoot\system32\mcupdate_AuthenticAMD.dll
  124. Image name: mcupdate_AuthenticAMD.dll
  125. Timestamp: Thu Oct 29 22:42:29 2015 (5632D915)
  126. fffff800`89820000 fffff800`8985f000 MBAMSwissArmy (deferred)
  127. Image path: \SystemRoot\system32\drivers\MBAMSwissArmy.sys
  128. Image name: MBAMSwissArmy.sys
  129. Timestamp: Wed Mar 15 15:00:41 2017 (58C98F59)
  130. fffff800`8a010000 fffff800`8a0d0000 peauth (deferred)
  131. Image path: \SystemRoot\system32\drivers\peauth.sys
  132. Image name: peauth.sys
  133. Timestamp: Thu Oct 29 22:32:55 2015 (5632D6D7)
  134. fffff800`8e320000 fffff800`8e32e000 aswbuniva (deferred)
  135. Image path: \SystemRoot\system32\drivers\aswbuniva.sys
  136. Image name: aswbuniva.sys
  137. Timestamp: Tue Jun 6 12:14:23 2017 (5936D4DF)
  138. fffff800`8e330000 fffff800`8e380000 aswbloga (deferred)
  139. Image path: \SystemRoot\system32\drivers\aswbloga.sys
  140. Image name: aswbloga.sys
  141. Timestamp: Tue Jun 6 12:14:26 2017 (5936D4E2)
  142. fffff800`8e380000 fffff800`8e3af000 aswbidsha (deferred)
  143. Image path: \SystemRoot\system32\drivers\aswbidsha.sys
  144. Image name: aswbidsha.sys
  145. Timestamp: Tue Jun 6 12:14:33 2017 (5936D4E9)
  146. fffff800`8e4b0000 fffff800`8e561000 aswSP (deferred)
  147. Image path: \SystemRoot\system32\drivers\aswSP.sys
  148. Image name: aswSP.sys
  149. Timestamp: Thu Jun 22 18:45:26 2017 (594C4886)
  150. fffff800`8e570000 fffff800`8e666000 aswSnx (deferred)
  151. Image path: \SystemRoot\system32\drivers\aswSnx.sys
  152. Image name: aswSnx.sys
  153. Timestamp: Mon Jun 19 18:37:45 2017 (59485239)
  154. fffff800`8ea40000 fffff800`8ea5a000 aswRdr2 (deferred)
  155. Image path: \SystemRoot\system32\drivers\aswRdr2.sys
  156. Image name: aswRdr2.sys
  157. Timestamp: Mon Jun 19 18:37:38 2017 (59485232)
  158. fffff800`8ecb0000 fffff800`8ecbc000 ElbyCDIO (deferred)
  159. Image path: \SystemRoot\System32\Drivers\ElbyCDIO.sys
  160. Image name: ElbyCDIO.sys
  161. Timestamp: Wed Dec 17 18:30:51 2014 (5492122B)
  162. fffff800`8ed10000 fffff800`8ed60000 aswbidsdrivera (deferred)
  163. Image path: \SystemRoot\system32\drivers\aswbidsdrivera.sys
  164. Image name: aswbidsdrivera.sys
  165. Timestamp: Tue Jun 6 12:14:24 2017 (5936D4E0)
  166. fffff800`8eeb0000 fffff800`8eee4000 nvhda64v (deferred)
  167. Image path: \SystemRoot\system32\drivers\nvhda64v.sys
  168. Image name: nvhda64v.sys
  169. Timestamp: Thu Sep 29 09:25:06 2016 (57ED1632)
  170. fffff800`8f0e0000 fffff800`8f107000 aswMonFlt (deferred)
  171. Image path: \SystemRoot\system32\drivers\aswMonFlt.sys
  172. Image name: aswMonFlt.sys
  173. Timestamp: Sat Jul 15 12:15:08 2017 (596A3F8C)
  174. fffff800`8f150000 fffff800`8f181000 aswStm (deferred)
  175. Image path: \SystemRoot\system32\drivers\aswStm.sys
  176. Image name: aswStm.sys
  177. Timestamp: Mon Jun 19 18:56:07 2017 (59485687)
  178. fffff800`8f4c0000 fffff800`8f516000 aswVmm (deferred)
  179. Image path: \SystemRoot\system32\drivers\aswVmm.sys
  180. Image name: aswVmm.sys
  181. Timestamp: Thu Jun 29 10:44:20 2017 (59551244)
  182. fffff800`8f520000 fffff800`8f533000 aswRvrt (deferred)
  183. Image path: \SystemRoot\system32\drivers\aswRvrt.sys
  184. Image name: aswRvrt.sys
  185. Timestamp: Mon Jun 19 18:37:16 2017 (5948521C)
  186. fffff800`8f750000 fffff800`8fa0dc80 RTKVHD64 (deferred)
  187. Image path: \SystemRoot\system32\drivers\RTKVHD64.sys
  188. Image name: RTKVHD64.sys
  189. Timestamp: Tue May 24 08:32:39 2011 (4DDBA567)
  190. fffff800`8fa10000 fffff800`8fa1e000 MBfilt64 (deferred)
  191. Image path: \SystemRoot\system32\drivers\MBfilt64.sys
  192. Image name: MBfilt64.sys
  193. Timestamp: Thu Jul 30 23:40:32 2009 (4A7267B0)
  194. fffff800`8fb40000 fffff800`8fb58000 LHidFilt (deferred)
  195. Image path: \SystemRoot\system32\DRIVERS\LHidFilt.Sys
  196. Image name: LHidFilt.Sys
  197. Timestamp: Tue Jun 9 15:25:40 2015 (55773DB4)
  198. fffff800`8fb70000 fffff800`8fb84000 LMouFilt (deferred)
  199. Image path: \SystemRoot\system32\DRIVERS\LMouFilt.Sys
  200. Image name: LMouFilt.Sys
  201. Timestamp: Tue Jun 9 15:25:39 2015 (55773DB3)
  202. fffff800`904d0000 fffff800`90545000 Rt64win7 (deferred)
  203. Image path: \SystemRoot\system32\DRIVERS\Rt64win7.sys
  204. Image name: Rt64win7.sys
  205. Timestamp: Thu Apr 21 14:15:33 2011 (4DB07445)
  206. fffff800`90580000 fffff800`9058d000 nvvad64v (deferred)
  207. Image path: \SystemRoot\system32\drivers\nvvad64v.sys
  208. Image name: nvvad64v.sys
  209. Timestamp: Fri Jul 1 09:12:29 2016 (57766C3D)
  210. fffff800`905c0000 fffff800`905ce000 ScpVBus (deferred)
  211. Image path: \SystemRoot\System32\drivers\ScpVBus.sys
  212. Image name: ScpVBus.sys
  213. Timestamp: Sun May 5 17:31:26 2013 (5186CFAE)
  214. fffff800`905d0000 fffff800`905de000 VClone (deferred)
  215. Image path: \SystemRoot\System32\drivers\VClone.sys
  216. Image name: VClone.sys
  217. Timestamp: Wed Jul 24 11:02:55 2013 (51EFEC9F)
  218. fffff800`90660000 fffff800`9068f000 BazisVirtualCDBus (deferred)
  219. Image path: \SystemRoot\System32\drivers\BazisVirtualCDBus.sys
  220. Image name: BazisVirtualCDBus.sys
  221. Timestamp: Sat Sep 26 22:51:28 2015 (560759B0)
  222. fffff800`906a0000 fffff800`91479000 nvlddmkm (deferred)
  223. Image path: \SystemRoot\system32\DRIVERS\nvlddmkm.sys
  224. Image name: nvlddmkm.sys
  225. Timestamp: Thu Dec 29 07:39:24 2016 (586503FC)
  226. fffff800`91500000 fffff800`91521000 drmk (deferred)
  227. Image path: \SystemRoot\System32\drivers\drmk.sys
  228. Image name: drmk.sys
  229. Timestamp: Thu Oct 29 22:38:44 2015 (5632D834)
  230. fffff961`f6900000 fffff961`f690a000 TSDDD (deferred)
  231. Image path: \SystemRoot\System32\TSDDD.dll
  232. Image name: TSDDD.dll
  233. Timestamp: unavailable (00000000)
  234. fffff961`f6910000 fffff961`f6971000 ATMFD (deferred)
  235. Image path: \SystemRoot\System32\ATMFD.DLL
  236. Image name: ATMFD.DLL
  237. Timestamp: Sat Jun 3 07:20:13 2017 (59329B6D)
  238. LegalCopyright: © Microsoft Corporation. All rights reserved.
  239. Unloaded modules:
  240. fffff800`89f90000 fffff800`89fa7000 aswHdsKe.sys
  241. fffff800`8e400000 fffff800`8e40f000 dump_ataport
  242. fffff800`8e420000 fffff800`8e42c000 dump_atapi.s
  243. fffff800`8e450000 fffff800`8e46c000 dump_dumpfve
  244. fffff800`8ecf0000 fffff800`8ed03000 dam.sys
  245. fffff800`8e470000 fffff800`8e4a1000 cdrom.sys
  246. fffff800`8e2f0000 fffff800`8e2fe000 hwpolicy.sys
  247.  
  248. ============================= BIOS INFO ================================
  249. [SMBIOS Data Tables v2.7]
  250. [DMI Version - 0]
  251. [2.0 Calling Convention - No]
  252. [Table Size - 1641 bytes]
  253. [BIOS Information (Type 0) - Length 24 - Handle 0000h]
  254. Vendor American Megatrends Inc.
  255. BIOS Version P1.00
  256. BIOS Starting Address Segment f000
  257. BIOS Release Date 10/17/2012
  258. BIOS ROM Size 400000
  259. BIOS Characteristics
  260. 07: - PCI Supported
  261. 11: - Upgradeable FLASH BIOS
  262. 12: - BIOS Shadowing Supported
  263. 15: - CD-Boot Supported
  264. 16: - Selectable Boot Supported
  265. 17: - BIOS ROM Socketed
  266. 19: - EDD Supported
  267. 23: - 1.2MB Floppy Supported
  268. 24: - 720KB Floppy Supported
  269. 25: - 2.88MB Floppy Supported
  270. 26: - Print Screen Device Supported
  271. 27: - Keyboard Services Supported
  272. 28: - Serial Services Supported
  273. 29: - Printer Services Supported
  274. 32: - BIOS Vendor Reserved
  275. BIOS Characteristic Extensions
  276. 00: - ACPI Supported
  277. 01: - USB Legacy Supported
  278. 08: - BIOS Boot Specification Supported
  279. 10: - Specification Reserved
  280. 11: - Specification Reserved
  281. BIOS Major Revision 4
  282. BIOS Minor Revision 6
  283. EC Firmware Major Revision 255
  284. EC Firmware Minor Revision 255
  285. [System Information (Type 1) - Length 27 - Handle 0001h]
  286. UUID 00000000-0000-0000-0000-000000000000
  287. Wakeup Type Power Switch
  288. [BaseBoard Information (Type 2) - Length 15 - Handle 0002h]
  289. Manufacturer ASRock
  290. Product 970 Extreme3 R2.0
  291. Version
  292. Feature Flags 09h
  293. 1612194312: - ?ÿU?ì?ì¡H.+`3Å?Eü3ÀW?}?Eô?Eø?ÿu
  294. ¸@
  295. 1612194352: - ?ÿU?ì?ì¡H.+`3Å?Eü3ÀW?}?Eô?Eø?ÿu
  296. ¸@
  297. Location
  298. Chassis Handle 0003h
  299. Board Type 0ah - Processor/Memory Module
  300. Number of Child Handles 0
  301. [System Enclosure (Type 3) - Length 22 - Handle 0003h]
  302. Chassis Type Desktop
  303. Bootup State Safe
  304. Power Supply State Safe
  305. Thermal State Safe
  306. Security Status None
  307. OEM Defined 0
  308. Height 0U
  309. Number of Power Cords 1
  310. Number of Contained Elements 0
  311. Contained Element Size 0
  312. [Processor Information (Type 4) - Length 42 - Handle 0004h]
  313. Socket Designation CPUSocket
  314. Processor Type Central Processor
  315. Processor Family 3fh - Specification Reserved
  316. Processor Manufacturer AMD
  317. Processor ID 200f6000fffb8b17
  318. Processor Version AMD FX(tm)-6300 Six-Core Processor
  319. Processor Voltage 8eh - 1.4V
  320. External Clock 200MHz
  321. Max Speed 4000MHz
  322. Current Speed 4000MHz
  323. Status Enabled Populated
  324. Processor Upgrade Specification Reserved
  325. L1 Cache Handle 0005h
  326. L2 Cache Handle 0006h
  327. L3 Cache Handle 0007h
  328. [Cache Information (Type 7) - Length 19 - Handle 0005h]
  329. Socket Designation L1-Cache
  330. Cache Configuration 0180h - WB Enabled Int NonSocketed L1
  331. Maximum Cache Size 0120h - 288K
  332. Installed Size 0120h - 288K
  333. Supported SRAM Type 0010h - Pipeline-Burst
  334. Current SRAM Type 0010h - Pipeline-Burst
  335. Cache Speed 1ns
  336. Error Correction Type Specification Reserved
  337. System Cache Type Unified
  338. Associativity 2-way Set-Associative
  339. [Cache Information (Type 7) - Length 19 - Handle 0006h]
  340. Socket Designation L2-Cache
  341. Cache Configuration 0181h - WB Enabled Int NonSocketed L2
  342. Maximum Cache Size 1800h - 6144K
  343. Installed Size 1800h - 6144K
  344. Supported SRAM Type 0010h - Pipeline-Burst
  345. Current SRAM Type 0010h - Pipeline-Burst
  346. Cache Speed 1ns
  347. Error Correction Type Specification Reserved
  348. System Cache Type Unified
  349. Associativity 16-way Set-Associative
  350. [Cache Information (Type 7) - Length 19 - Handle 0007h]
  351. Socket Designation L3-Cache
  352. Cache Configuration 0182h - WB Enabled Int NonSocketed L3
  353. Maximum Cache Size 2000h - 8192K
  354. Installed Size 2000h - 8192K
  355. Supported SRAM Type 0010h - Pipeline-Burst
  356. Current SRAM Type 0010h - Pipeline-Burst
  357. Cache Speed 1ns
  358. Error Correction Type Specification Reserved
  359. System Cache Type Unified
  360. Associativity Specification Reserved
  361. [OEM Strings (Type 11) - Length 5 - Handle 000eh]
  362. Number of Strings 1
  363. [Physical Memory Array (Type 16) - Length 23 - Handle 000fh]
  364. Location 03h - SystemBoard/Motherboard
  365. Use 03h - System Memory
  366. Memory Error Correction 03h - None
  367. Maximum Capacity 33554432KB
  368. Number of Memory Devices 4
  369. [Memory Array Mapped Address (Type 19) - Length 31 - Handle 0010h]
  370. Starting Address 00000000h
  371. Ending Address 0087c000h
  372. Memory Array Handle 000fh
  373. Partition Width 255
  374. [Memory Device (Type 17) - Length 34 - Handle 0011h]
  375. Physical Memory Array Handle 000fh
  376. Total Width 64 bits
  377. Data Width 64 bits
  378. Size 4096MB
  379. Form Factor 09h - DIMM
  380. Device Locator A1_DIMM0
  381. Bank Locator A1_BANK0
  382. Memory Type 18h - Specification Reserved
  383. Type Detail 4080h - Synchronous
  384. Speed 800MHz
  385. Manufacturer Micron
  386. Part Number 8JTF51264AZ-1G6E1
  387. [Memory Device Mapped Address (Type 20) - Length 35 - Handle 0012h]
  388. Starting Address 00000000h
  389. Ending Address 003fffffh
  390. Memory Device Handle 0011h
  391. Mem Array Mapped Adr Handle 0010h
  392. Partition Row Position 01
  393. Interleave Position [None]
  394. Interleave Data Depth [None]
  395. [Memory Device (Type 17) - Length 34 - Handle 0013h]
  396. Physical Memory Array Handle 000fh
  397. Total Width 64 bits
  398. Data Width 64 bits
  399. Size 4096MB
  400. Form Factor 09h - DIMM
  401. Device Locator A1_DIMM1
  402. Bank Locator A1_BANK1
  403. Memory Type 18h - Specification Reserved
  404. Type Detail 4080h - Synchronous
  405. Speed 800MHz
  406. Manufacturer Micron
  407. Part Number 8JTF51264AZ-1G6E1
  408. [Memory Device Mapped Address (Type 20) - Length 35 - Handle 0014h]
  409. Starting Address 00400000h
  410. Ending Address 007fffffh
  411. Memory Device Handle 0013h
  412. Mem Array Mapped Adr Handle 0010h
  413. Partition Row Position 01
  414. Interleave Position [None]
  415. Interleave Data Depth [None]
  416. [Memory Device (Type 17) - Length 34 - Handle 0015h]
  417. Physical Memory Array Handle 000fh
  418. Total Width 0 bits
  419. Data Width 64 bits
  420. Form Factor 09h - DIMM
  421. Device Locator A1_DIMM2
  422. Bank Locator A1_BANK2
  423. Memory Type 02h - Unknown
  424. Type Detail 0080h - Synchronous
  425. Speed 0MHz
  426. Manufacturer A1_Manufacturer2
  427. Part Number Array1_PartNumber2
  428. [Memory Device (Type 17) - Length 34 - Handle 0017h]
  429. Physical Memory Array Handle 000fh
  430. Total Width 0 bits
  431. Data Width 64 bits
  432. Form Factor 09h - DIMM
  433. Device Locator A1_DIMM3
  434. Bank Locator A1_BANK3
  435. Memory Type 02h - Unknown
  436. Type Detail 0080h - Synchronous
  437. Speed 0MHz
  438. Manufacturer A1_Manufacturer3
  439. Part Number Array1_PartNumber3
  440.  
  441. ========================================================================
  442. =================== Dump File: 072717-13843-01.dmp ===================
  443. ========================================================================
  444. Mini Kernel Dump File: Only registers and stack trace are available
  445. Windows 10 Kernel Version 10586 MP (6 procs) Free x64
  446. Product: WinNt, suite: TerminalServer SingleUserTS
  447. Built by: 10586.1007.amd64fre.th2_release.170706-2002
  448. Kernel base = 0xfffff803`d3e1d000 PsLoadedModuleList = 0xfffff803`d40fac70
  449. Debug session time: Wed Jul 26 20:10:20.357 2017 (UTC - 4:00)
  450. System Uptime: 1 days 7:30:30.079
  451.  
  452. BugCheck 3B, {c0000005, fffff803d3eea132, ffffd00020431d20, 0}
  453. Probably caused by : dxgkrnl.sys ( dxgkrnl!DXGADAPTER::AcquireCoreResourceShared+63 )
  454. Followup: MachineOwner
  455.  
  456. SYSTEM_SERVICE_EXCEPTION (3b)
  457. An exception happened while executing a system service routine.
  458.  
  459. Arguments:
  460. Arg1: 00000000c0000005, Exception code that caused the bugcheck
  461. Arg2: fffff803d3eea132, Address of the instruction which caused the bugcheck
  462. Arg3: ffffd00020431d20, Address of the context record for the exception that caused the bugcheck
  463. Arg4: 0000000000000000, zero.
  464.  
  465. Debugging Details:
  466. DUMP_CLASS: 1
  467. DUMP_QUALIFIER: 400
  468. BUILD_VERSION_STRING: 10.0.10586.1007 (th2_release.170706-2002)
  469. BIOS_VENDOR: American Megatrends Inc.
  470. BIOS_VERSION: P1.00
  471. BIOS_DATE: 10/17/2012
  472. BASEBOARD_MANUFACTURER: ASRock
  473. BASEBOARD_PRODUCT: 970 Extreme3 R2.0
  474. BASEBOARD_VERSION:
  475. DUMP_TYPE: 2
  476. EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
  477. FAULTING_IP:
  478. nt!KxWaitForLockOwnerShipWithIrql+12
  479. fffff803`d3eea132 48890a mov qword ptr [rdx],rcx
  480. CONTEXT: ffffd00020431d20 -- (.cxr 0xffffd00020431d20)
  481. rax=0000000000000000 rbx=ffffe000591bdc80 rcx=ffffd00020432790
  482. rdx=3a08000000000000 rsi=0000000000000000 rdi=ffffd00020432790
  483. rip=fffff803d3eea132 rsp=ffffd00020432740 rbp=ffffd000204327d0
  484. r8=ffffd00020432800 r9=ffffd000204328b8 r10=7fffc001411e9950
  485. r11=7ffffffffffffffc r12=0000000000000000 r13=0000000000000000
  486. r14=0000000000000001 r15=0000000000000000
  487. iopl=0 nv up di ng nz na po nc
  488. cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010086
  489. nt!KxWaitForLockOwnerShipWithIrql+0x12:
  490. fffff803`d3eea132 48890a mov qword ptr [rdx],rcx ds:002b:3a080000`00000000=????????????????
  491. Resetting default scope
  492. CPU_COUNT: 6
  493. CPU_MHZ: f97
  494. CPU_VENDOR: AuthenticAMD
  495. CPU_FAMILY: 15
  496. CPU_MODEL: 2
  497. CPU_STEPPING: 0
  498. CUSTOMER_CRASH_COUNT: 1
  499. DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
  500. BUGCHECK_STR: 0x3B
  501.  
  502. PROCESS_NAME: dwm.exe
  503.  
  504. CURRENT_IRQL: 0
  505. LAST_CONTROL_TRANSFER: from fffff803d3e2eaaa to fffff803d3eea132
  506. STACK_TEXT:
  507. ffffd000`20432740 fffff803`d3e2eaaa : ffffe000`591bdc80 ffffd000`00000079 00000000`00000000 ffffd000`204328d8 : nt!KxWaitForLockOwnerShipWithIrql+0x12
  508. ffffd000`20432770 fffff800`bc81a033 : ffffe000`591bd002 ffffe000`591bd010 00000000`00000000 00000000`00000004 : nt!ExAcquireResourceSharedLite+0x34a
  509. ffffd000`20432800 fffff800`bc7a3a8c : ffffd000`20432a08 00000000`00000000 00000058`dc1ffad0 ffffe000`00000000 : dxgkrnl!DXGADAPTER::AcquireCoreResourceShared+0x63
  510. ffffd000`20432830 fffff800`bc88abcd : 00000058`dc1ffad0 00000058`dc1ffad0 00000000`00000000 00000000`00000020 : dxgkrnl!COREADAPTERACCESS::AcquireShared+0x4c
  511. ffffd000`20432870 fffff800`bc858e8e : 00000000`40000080 00000000`00000000 ffffd000`00000000 00000000`00000000 : dxgkrnl!DxgkSetSyncRefreshCountWaitTargetInternal+0x9f5
  512. ffffd000`20432ac0 fffff803`d3f6a2a3 : ffffe000`594e4600 00000000`00000000 ffffd000`20432ad8 ffffe000`59453500 : dxgkrnl!DxgkSetSyncRefreshCountWaitTarget+0x8e
  513. ffffd000`20432b00 00007ffe`64c06d74 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
  514. 00000058`dc1ffaa8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`64c06d74
  515. THREAD_SHA1_HASH_MOD_FUNC: 01f5be069b41ffdfedeec7f001c6cbcae028ed79
  516. THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 676628eb00138c6bfa201795ef7d4c8775d4ffbb
  517. THREAD_SHA1_HASH_MOD: d2496a4d735498beebaffc618e88b4ad5ec02e8c
  518. FOLLOWUP_IP:
  519. dxgkrnl!DXGADAPTER::AcquireCoreResourceShared+63
  520. fffff800`bc81a033 4084f6 test sil,sil
  521. FAULT_INSTR_CODE: ff68440
  522. SYMBOL_STACK_INDEX: 2
  523. SYMBOL_NAME: dxgkrnl!DXGADAPTER::AcquireCoreResourceShared+63
  524. FOLLOWUP_NAME: MachineOwner
  525. MODULE_NAME: dxgkrnl
  526.  
  527. IMAGE_NAME: dxgkrnl.sys
  528.  
  529. DEBUG_FLR_IMAGE_TIMESTAMP: 59328b1e
  530. IMAGE_VERSION: 10.0.10586.962
  531. STACK_COMMAND: .cxr 0xffffd00020431d20 ; kb
  532. BUCKET_ID_FUNC_OFFSET: 63
  533. FAILURE_BUCKET_ID: 0x3B_dxgkrnl!DXGADAPTER::AcquireCoreResourceShared
  534. BUCKET_ID: 0x3B_dxgkrnl!DXGADAPTER::AcquireCoreResourceShared
  535. PRIMARY_PROBLEM_CLASS: 0x3B_dxgkrnl!DXGADAPTER::AcquireCoreResourceShared
  536. TARGET_TIME: 2017-07-27T00:10:20.000Z
  537. OSBUILD: 10586
  538. OSSERVICEPACK: 1007
  539. SERVICEPACK_NUMBER: 0
  540. OS_REVISION: 0
  541. SUITE_MASK: 272
  542. PRODUCT_TYPE: 1
  543. OSPLATFORM_TYPE: x64
  544. OSNAME: Windows 10
  545. OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
  546. USER_LCID: 0
  547. OSBUILD_TIMESTAMP: 2017-07-07 03:05:50
  548. BUILDDATESTAMP_STR: 170706-2002
  549. BUILDLAB_STR: th2_release
  550. BUILDOSVER_STR: 10.0.10586.1007
  551. ANALYSIS_SESSION_ELAPSED_TIME: 5e69
  552. ANALYSIS_SOURCE: KM
  553. FAILURE_ID_HASH_STRING: km:0x3b_dxgkrnl!dxgadapter::acquirecoreresourceshared
  554. FAILURE_ID_HASH: {3a1d92ac-79ba-fee2-3481-6000a374bbc8}
  555. Followup: MachineOwner
  556.  
  557. ========================================================================
  558. =================== Dump File: 072817-12421-01.dmp ===================
  559. ========================================================================
  560. Mini Kernel Dump File: Only registers and stack trace are available
  561. Windows 10 Kernel Version 10586 MP (6 procs) Free x64
  562. Product: WinNt, suite: TerminalServer SingleUserTS
  563. Built by: 10586.1007.amd64fre.th2_release.170706-2002
  564. Kernel base = 0xfffff802`6a080000 PsLoadedModuleList = 0xfffff802`6a35dc70
  565. Debug session time: Thu Jul 27 13:39:15.195 2017 (UTC - 4:00)
  566. System Uptime: 0 days 17:28:22.917
  567.  
  568. BugCheck 4A, {7ffbb19b61c4, 2, 0, ffffd00022d2db80}
  569. Probably caused by : ntkrnlmp.exe ( nt!KiSystemServiceExit+24a )
  570. Followup: MachineOwner
  571.  
  572. IRQL_GT_ZERO_AT_SYSTEM_SERVICE (4a)
  573. Returning to usermode from a system call at an IRQL > PASSIVE_LEVEL.
  574.  
  575. Arguments:
  576. Arg1: 00007ffbb19b61c4, Address of system function (system call routine)
  577. Arg2: 0000000000000002, Current IRQL
  578. Arg3: 0000000000000000, 0
  579. Arg4: ffffd00022d2db80, 0
  580.  
  581. Debugging Details:
  582. DUMP_CLASS: 1
  583. DUMP_QUALIFIER: 400
  584. BUILD_VERSION_STRING: 10.0.10586.1007 (th2_release.170706-2002)
  585. BIOS_VENDOR: American Megatrends Inc.
  586. BIOS_VERSION: P1.00
  587. BIOS_DATE: 10/17/2012
  588. BASEBOARD_MANUFACTURER: ASRock
  589. BASEBOARD_PRODUCT: 970 Extreme3 R2.0
  590. BASEBOARD_VERSION:
  591. DUMP_TYPE: 2
  592.  
  593. PROCESS_NAME: RuntimeBroker.
  594.  
  595. BUGCHECK_STR: RAISED_IRQL_FAULT
  596. FAULTING_IP:
  597. +0
  598. 00007ffb`b19b61c4 ?? ???
  599. CPU_COUNT: 6
  600. CPU_MHZ: f97
  601. CPU_VENDOR: AuthenticAMD
  602. CPU_FAMILY: 15
  603. CPU_MODEL: 2
  604. CPU_STEPPING: 0
  605. CUSTOMER_CRASH_COUNT: 1
  606. DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
  607. CURRENT_IRQL: 2
  608. LAST_CONTROL_TRANSFER: from fffff8026a1cd5e9 to fffff8026a1c29f0
  609. STACK_TEXT:
  610. ffffd000`22d2d948 fffff802`6a1cd5e9 : 00000000`0000004a 00007ffb`b19b61c4 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
  611. ffffd000`22d2d950 fffff802`6a1cd4f5 : 000000a1`459fe2a8 000000a1`459fe2a0 00000000`00000000 ffffd862`0d173f9c : nt!KiBugCheckDispatch+0x69
  612. ffffd000`22d2da90 00007ffb`b19b61c4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x24a
  613. 000000a1`459fe428 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`b19b61c4
  614. STACK_COMMAND: kb
  615. THREAD_SHA1_HASH_MOD_FUNC: 713a38487ff3d82058f51d9870e0b3de39cbf964
  616. THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 246a369aaf459d947cd16ea5fd3045aca5047f8c
  617. THREAD_SHA1_HASH_MOD: 2a7ca9d3ab5386d53fea7498e1d81b9c4a4c036b
  618. FOLLOWUP_IP:
  619. nt!KiSystemServiceExit+24a
  620. fffff802`6a1cd4f5 4883ec50 sub rsp,50h
  621. FAULT_INSTR_CODE: 50ec8348
  622. SYMBOL_STACK_INDEX: 2
  623. SYMBOL_NAME: nt!KiSystemServiceExit+24a
  624. FOLLOWUP_NAME: MachineOwner
  625. MODULE_NAME: nt
  626.  
  627. IMAGE_NAME: ntkrnlmp.exe
  628.  
  629. DEBUG_FLR_IMAGE_TIMESTAMP: 595f32ce
  630. IMAGE_VERSION: 10.0.10586.1007
  631. BUCKET_ID_FUNC_OFFSET: 24a
  632. FAILURE_BUCKET_ID: RAISED_IRQL_FAULT_RuntimeBroker._nt!KiSystemServiceExit
  633. BUCKET_ID: RAISED_IRQL_FAULT_RuntimeBroker._nt!KiSystemServiceExit
  634. PRIMARY_PROBLEM_CLASS: RAISED_IRQL_FAULT_RuntimeBroker._nt!KiSystemServiceExit
  635. TARGET_TIME: 2017-07-27T17:39:15.000Z
  636. OSBUILD: 10586
  637. OSSERVICEPACK: 1007
  638. SERVICEPACK_NUMBER: 0
  639. OS_REVISION: 0
  640. SUITE_MASK: 272
  641. PRODUCT_TYPE: 1
  642. OSPLATFORM_TYPE: x64
  643. OSNAME: Windows 10
  644. OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
  645. USER_LCID: 0
  646. OSBUILD_TIMESTAMP: 2017-07-07 03:05:50
  647. BUILDDATESTAMP_STR: 170706-2002
  648. BUILDLAB_STR: th2_release
  649. BUILDOSVER_STR: 10.0.10586.1007
  650. ANALYSIS_SESSION_ELAPSED_TIME: b85
  651. ANALYSIS_SOURCE: KM
  652. FAILURE_ID_HASH_STRING: km:raised_irql_fault_runtimebroker._nt!kisystemserviceexit
  653. FAILURE_ID_HASH: {51ce11f7-0789-ab36-c276-77026fa47e9d}
  654. Followup: MachineOwner
  655.  
  656. ========================================================================
  657. =================== Dump File: 072417-13750-01.dmp ===================
  658. ========================================================================
  659. Mini Kernel Dump File: Only registers and stack trace are available
  660. Windows 10 Kernel Version 10586 MP (6 procs) Free x64
  661. Product: WinNt, suite: TerminalServer SingleUserTS
  662. Built by: 10586.1007.amd64fre.th2_release.170706-2002
  663. Kernel base = 0xfffff802`77a79000 PsLoadedModuleList = 0xfffff802`77d56c70
  664. Debug session time: Sun Jul 23 23:26:31.759 2017 (UTC - 4:00)
  665. System Uptime: 1 days 6:01:07.480
  666.  
  667. BugCheck 3B, {c0000005, fffff80277b46132, ffffd00024c1d8c0, 0}
  668. Probably caused by : ntkrnlmp.exe ( nt!KxWaitForLockOwnerShipWithIrql+12 )
  669. Followup: MachineOwner
  670.  
  671. SYSTEM_SERVICE_EXCEPTION (3b)
  672. An exception happened while executing a system service routine.
  673.  
  674. Arguments:
  675. Arg1: 00000000c0000005, Exception code that caused the bugcheck
  676. Arg2: fffff80277b46132, Address of the instruction which caused the bugcheck
  677. Arg3: ffffd00024c1d8c0, Address of the context record for the exception that caused the bugcheck
  678. Arg4: 0000000000000000, zero.
  679.  
  680. Debugging Details:
  681. DUMP_CLASS: 1
  682. DUMP_QUALIFIER: 400
  683. BUILD_VERSION_STRING: 10.0.10586.1007 (th2_release.170706-2002)
  684. BIOS_VENDOR: American Megatrends Inc.
  685. BIOS_VERSION: P1.00
  686. BIOS_DATE: 10/17/2012
  687. BASEBOARD_MANUFACTURER: ASRock
  688. BASEBOARD_PRODUCT: 970 Extreme3 R2.0
  689. BASEBOARD_VERSION:
  690. DUMP_TYPE: 2
  691. EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
  692. FAULTING_IP:
  693. nt!KxWaitForLockOwnerShipWithIrql+12
  694. fffff802`77b46132 48890a mov qword ptr [rdx],rcx
  695. CONTEXT: ffffd00024c1d8c0 -- (.cxr 0xffffd00024c1d8c0)
  696. rax=0000000000000000 rbx=ffffe00027316920 rcx=ffffd00024c1e330
  697. rdx=2000000000000000 rsi=fffff80278171600 rdi=ffffd00024c1e330
  698. rip=fffff80277b46132 rsp=ffffd00024c1e2e0 rbp=ffffd00024c1e370
  699. r8=ffffd00024c1e3a0 r9=0000000000000000 r10=0000000000000000
  700. r11=fffff80277bc768f r12=0000000000000000 r13=ffffe000280de030
  701. r14=0000000000000001 r15=0000000000000000
  702. iopl=0 nv up di ng nz na po nc
  703. cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010086
  704. nt!KxWaitForLockOwnerShipWithIrql+0x12:
  705. fffff802`77b46132 48890a mov qword ptr [rdx],rcx ds:002b:20000000`00000000=????????????????
  706. Resetting default scope
  707. CPU_COUNT: 6
  708. CPU_MHZ: f97
  709. CPU_VENDOR: AuthenticAMD
  710. CPU_FAMILY: 15
  711. CPU_MODEL: 2
  712. CPU_STEPPING: 0
  713. CUSTOMER_CRASH_COUNT: 1
  714. DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
  715. BUGCHECK_STR: 0x3B
  716.  
  717. PROCESS_NAME: RuntimeBroker.
  718.  
  719. CURRENT_IRQL: 0
  720. LAST_CONTROL_TRANSFER: from fffff80277a8aaaa to fffff80277b46132
  721. STACK_TEXT:
  722. ffffd000`24c1e2e0 fffff802`77a8aaaa : ffffe000`27316920 fffff802`000005dd 00000000`00000000 fffff802`77ad130e : nt!KxWaitForLockOwnerShipWithIrql+0x12
  723. ffffd000`24c1e310 fffff802`77e77dc8 : ffffc000`c8b74302 ffffe000`280de030 fffff802`78171658 ffffc000`d12f7350 : nt!ExAcquireResourceSharedLite+0x34a
  724. ffffd000`24c1e3a0 fffff802`77ad3677 : 00000000`00001000 00000660`00000000 00000000`00000660 ffffd000`24c1e524 : nt!SeLockSubjectContext+0x28
  725. ffffd000`24c1e3d0 fffff802`77ad2e62 : 00000000`00000001 fffff802`00000000 ffffc000`cecc1770 ffffe000`21a25800 : nt!SeAccessCheckWithHint+0x807
  726. ffffd000`24c1e580 fffff802`77e78521 : ffffe000`00000000 00000501`00010001 0000001c`00008004 ffffffff`00000002 : nt!SeAccessCheck+0x62
  727. ffffd000`24c1e5f0 fffff802`77e5f8e3 : 00000000`00000e18 00000000`c0000022 00000000`00000000 ffffd000`24c1e860 : nt!RtlIsSandboxedToken+0x7d
  728. ffffd000`24c1e670 fffff802`77e6160c : ffffe000`280de000 ffffd000`24c1e860 ffffc000`00000040 ffffe000`21b46d90 : nt!ObpLookupObjectName+0xe3
  729. ffffd000`24c1e7f0 fffff802`77e40866 : 00020019`00000001 ffffe000`21b46d90 00000033`e79fd588 00000000`00000000 : nt!ObOpenObjectByNameEx+0x1ec
  730. ffffd000`24c1e910 fffff802`77e405b3 : 00000033`e79fd8dc 00000033`e79fd8d8 00000000`0000254c 00000000`00000000 : nt!CmOpenKey+0x2a6
  731. ffffd000`24c1eac0 fffff802`77bc62a3 : 00000033`e79fdcd0 00000033`e79fdc80 ffffe000`2398f840 ffffd000`24c1eb80 : nt!NtOpenKeyEx+0xf
  732. ffffd000`24c1eb00 00007ff9`c07272a4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
  733. 00000033`e79fd518 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`c07272a4
  734. THREAD_SHA1_HASH_MOD_FUNC: e8b049dc017e1a805cf05ca51c9b5f5cb326d21f
  735. THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 3810b35f0207c6530b36e471cffd1da0d7a827e1
  736. THREAD_SHA1_HASH_MOD: b28610981796779b4ac02f58898fde25728a775c
  737. FOLLOWUP_IP:
  738. nt!KxWaitForLockOwnerShipWithIrql+12
  739. fffff802`77b46132 48890a mov qword ptr [rdx],rcx
  740. FAULT_INSTR_CODE: 4d0a8948
  741. SYMBOL_STACK_INDEX: 0
  742. SYMBOL_NAME: nt!KxWaitForLockOwnerShipWithIrql+12
  743. FOLLOWUP_NAME: MachineOwner
  744. MODULE_NAME: nt
  745.  
  746. IMAGE_NAME: ntkrnlmp.exe
  747.  
  748. DEBUG_FLR_IMAGE_TIMESTAMP: 595f32ce
  749. IMAGE_VERSION: 10.0.10586.1007
  750. STACK_COMMAND: .cxr 0xffffd00024c1d8c0 ; kb
  751. BUCKET_ID_FUNC_OFFSET: 12
  752. FAILURE_BUCKET_ID: 0x3B_nt!KxWaitForLockOwnerShipWithIrql
  753. BUCKET_ID: 0x3B_nt!KxWaitForLockOwnerShipWithIrql
  754. PRIMARY_PROBLEM_CLASS: 0x3B_nt!KxWaitForLockOwnerShipWithIrql
  755. TARGET_TIME: 2017-07-24T03:26:31.000Z
  756. OSBUILD: 10586
  757. OSSERVICEPACK: 1007
  758. SERVICEPACK_NUMBER: 0
  759. OS_REVISION: 0
  760. SUITE_MASK: 272
  761. PRODUCT_TYPE: 1
  762. OSPLATFORM_TYPE: x64
  763. OSNAME: Windows 10
  764. OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
  765. USER_LCID: 0
  766. OSBUILD_TIMESTAMP: 2017-07-07 03:05:50
  767. BUILDDATESTAMP_STR: 170706-2002
  768. BUILDLAB_STR: th2_release
  769. BUILDOSVER_STR: 10.0.10586.1007
  770. ANALYSIS_SESSION_ELAPSED_TIME: 8d83
  771. ANALYSIS_SOURCE: KM
  772. FAILURE_ID_HASH_STRING: km:0x3b_nt!kxwaitforlockownershipwithirql
  773. FAILURE_ID_HASH: {c3fcce84-82a0-ac56-6588-32a985eb9681}
  774. Followup: MachineOwner
  775.  
  776. ========================================================================
  777. =================== Dump File: 072517-12546-01.dmp ===================
  778. ========================================================================
  779. Mini Kernel Dump File: Only registers and stack trace are available
  780. Windows 10 Kernel Version 10586 MP (6 procs) Free x64
  781. Product: WinNt, suite: TerminalServer SingleUserTS
  782. Built by: 10586.1007.amd64fre.th2_release.170706-2002
  783. Kernel base = 0xfffff801`f8a13000 PsLoadedModuleList = 0xfffff801`f8cf0c70
  784. Debug session time: Mon Jul 24 15:16:24.983 2017 (UTC - 4:00)
  785. System Uptime: 0 days 15:49:25.705
  786.  
  787. BugCheck 3B, {c0000005, fffff801f8ae0132, ffffd00022cec9d0, 0}
  788. Probably caused by : ntkrnlmp.exe ( nt!KxWaitForLockOwnerShipWithIrql+12 )
  789. Followup: MachineOwner
  790.  
  791. SYSTEM_SERVICE_EXCEPTION (3b)
  792. An exception happened while executing a system service routine.
  793.  
  794. Arguments:
  795. Arg1: 00000000c0000005, Exception code that caused the bugcheck
  796. Arg2: fffff801f8ae0132, Address of the instruction which caused the bugcheck
  797. Arg3: ffffd00022cec9d0, Address of the context record for the exception that caused the bugcheck
  798. Arg4: 0000000000000000, zero.
  799.  
  800. Debugging Details:
  801. DUMP_CLASS: 1
  802. DUMP_QUALIFIER: 400
  803. BUILD_VERSION_STRING: 10.0.10586.1007 (th2_release.170706-2002)
  804. BIOS_VENDOR: American Megatrends Inc.
  805. BIOS_VERSION: P1.00
  806. BIOS_DATE: 10/17/2012
  807. BASEBOARD_MANUFACTURER: ASRock
  808. BASEBOARD_PRODUCT: 970 Extreme3 R2.0
  809. BASEBOARD_VERSION:
  810. DUMP_TYPE: 2
  811. EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
  812. FAULTING_IP:
  813. nt!KxWaitForLockOwnerShipWithIrql+12
  814. fffff801`f8ae0132 48890a mov qword ptr [rdx],rcx
  815. CONTEXT: ffffd00022cec9d0 -- (.cxr 0xffffd00022cec9d0)
  816. rax=0000000000000000 rbx=ffffe001af95b870 rcx=ffffd00022ced440
  817. rdx=2000000000000000 rsi=ffffe001b2a0db00 rdi=ffffd00022ced440
  818. rip=fffff801f8ae0132 rsp=ffffd00022ced3f0 rbp=ffffd00022ced480
  819. r8=ffffd00022ced4b0 r9=0000000000000001 r10=ffffe001b2a50010
  820. r11=ffffd00022ced4b0 r12=0000000000000000 r13=ffffe001b2a50010
  821. r14=0000000000000001 r15=0000000000000000
  822. iopl=0 nv up di ng nz na po nc
  823. cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010086
  824. nt!KxWaitForLockOwnerShipWithIrql+0x12:
  825. fffff801`f8ae0132 48890a mov qword ptr [rdx],rcx ds:002b:20000000`00000000=????????????????
  826. Resetting default scope
  827. CPU_COUNT: 6
  828. CPU_MHZ: f97
  829. CPU_VENDOR: AuthenticAMD
  830. CPU_FAMILY: 15
  831. CPU_MODEL: 2
  832. CPU_STEPPING: 0
  833. CUSTOMER_CRASH_COUNT: 1
  834. DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
  835. BUGCHECK_STR: 0x3B
  836.  
  837. PROCESS_NAME: SetPoint.exe
  838.  
  839. CURRENT_IRQL: 0
  840. LAST_CONTROL_TRANSFER: from fffff801f8a24aaa to fffff801f8ae0132
  841. STACK_TEXT:
  842. ffffd000`22ced3f0 fffff801`f8a24aaa : ffffe001`af95b870 fffff801`44bbb42b 00000000`00020000 00000000`00000000 : nt!KxWaitForLockOwnerShipWithIrql+0x12
  843. ffffd000`22ced420 fffff801`f8e11dc8 : 00000000`00000002 ffffe001`b2a50030 ffffe001`b2a0db10 00000000`00120000 : nt!ExAcquireResourceSharedLite+0x34a
  844. ffffd000`22ced4b0 fffff801`f8e00f02 : 00000000`00000002 00000000`00000004 ffffe001`b2a0db10 00000000`00000000 : nt!SeLockSubjectContext+0x28
  845. ffffd000`22ced4e0 fffff801`f8dfa192 : fffff801`f8a13000 fffff801`f8a13000 00000000`00000001 fffff801`f8e00880 : nt!IopParseDevice+0x682
  846. ffffd000`22ced6b0 fffff801`f8dfb60c : ffffe001`b2a50000 ffffd000`22ced8a0 ffffc001`00000040 ffffe001`abf50f20 : nt!ObpLookupObjectName+0x992
  847. ffffd000`22ced830 fffff801`f8dd9f38 : ffffd000`00000001 ffffe001`b2a0db10 00000000`00000000 00000000`00000000 : nt!ObOpenObjectByNameEx+0x1ec
  848. ffffd000`22ced950 fffff801`f8dd9a99 : 00000000`0467f5f8 00000000`00000000 00000000`0467f420 00000000`0467f450 : nt!IopCreateFile+0x3d8
  849. ffffd000`22ceda00 fffff801`f8b602a3 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000001 : nt!NtCreateFile+0x79
  850. ffffd000`22ceda90 00007ffc`a36e5b74 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
  851. 00000000`0467f3a8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`a36e5b74
  852. THREAD_SHA1_HASH_MOD_FUNC: 47058392d69e5c76d05c439ef4f4528607234fa7
  853. THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 19643d115682ca763f8f4a9e2bf498559c549a20
  854. THREAD_SHA1_HASH_MOD: 9f457f347057f10e1df248e166a3e95e6570ecfe
  855. FOLLOWUP_IP:
  856. nt!KxWaitForLockOwnerShipWithIrql+12
  857. fffff801`f8ae0132 48890a mov qword ptr [rdx],rcx
  858. FAULT_INSTR_CODE: 4d0a8948
  859. SYMBOL_STACK_INDEX: 0
  860. SYMBOL_NAME: nt!KxWaitForLockOwnerShipWithIrql+12
  861. FOLLOWUP_NAME: MachineOwner
  862. MODULE_NAME: nt
  863.  
  864. IMAGE_NAME: ntkrnlmp.exe
  865.  
  866. DEBUG_FLR_IMAGE_TIMESTAMP: 595f32ce
  867. IMAGE_VERSION: 10.0.10586.1007
  868. STACK_COMMAND: .cxr 0xffffd00022cec9d0 ; kb
  869. BUCKET_ID_FUNC_OFFSET: 12
  870. FAILURE_BUCKET_ID: 0x3B_nt!KxWaitForLockOwnerShipWithIrql
  871. BUCKET_ID: 0x3B_nt!KxWaitForLockOwnerShipWithIrql
  872. PRIMARY_PROBLEM_CLASS: 0x3B_nt!KxWaitForLockOwnerShipWithIrql
  873. TARGET_TIME: 2017-07-24T19:16:24.000Z
  874. OSBUILD: 10586
  875. OSSERVICEPACK: 1007
  876. SERVICEPACK_NUMBER: 0
  877. OS_REVISION: 0
  878. SUITE_MASK: 272
  879. PRODUCT_TYPE: 1
  880. OSPLATFORM_TYPE: x64
  881. OSNAME: Windows 10
  882. OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
  883. USER_LCID: 0
  884. OSBUILD_TIMESTAMP: 2017-07-07 03:05:50
  885. BUILDDATESTAMP_STR: 170706-2002
  886. BUILDLAB_STR: th2_release
  887. BUILDOSVER_STR: 10.0.10586.1007
  888. ANALYSIS_SESSION_ELAPSED_TIME: 104b8
  889. ANALYSIS_SOURCE: KM
  890. FAILURE_ID_HASH_STRING: km:0x3b_nt!kxwaitforlockownershipwithirql
  891. FAILURE_ID_HASH: {c3fcce84-82a0-ac56-6588-32a985eb9681}
  892. Followup: MachineOwner
Advertisement
Add Comment
Please, Sign In to add comment