Machine Name: Kernel base = 0xfffff800`e5010000 PsLoadedModuleList = 0xfffff800`e52eecd0 Debug session time: Tue May 10 18:57:01.191 2016 (UTC - 4:00) System Uptime: 0 days 0:00:19.759 ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e) This is a very common bugcheck. Usually the exception address pinpoints the driver/function that caused the problem. Always note this address as well as the link date of the driver/image that contains this address. Some common problems are exception code 0x80000003. This means a hard coded breakpoint or assertion was hit, but this system was booted /NODEBUG. This is not supposed to happen as developers should never have hardcoded breakpoints in retail code, but ... If this happens, make sure a debugger gets connected, and the system is booted /DEBUG. This will let us see why this breakpoint is happening. Arguments: Arg1: ffffffffc0000096, The exception code that was not handled Arg2: fffff80165633ec7, The address that the exception occurred at Arg3: ffffd001e3aca888, Exception Record Address Arg4: ffffd001e3aca0a0, Context Record Address Debugging Details: ------------------ TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2 EXCEPTION_CODE: (NTSTATUS) 0xc0000096 - {EXCEPTION} Privileged instruction. FAULTING_IP: atikmdag+213ec7 fffff801`65633ec7 0f33 rdpmc EXCEPTION_RECORD: ffffd001e3aca888 -- (.exr 0xffffd001e3aca888) ExceptionAddress: fffff80165633ec7 (atikmdag+0x0000000000213ec7) ExceptionCode: c0000096 ExceptionFlags: 00000000 NumberParameters: 0 CONTEXT: ffffd001e3aca0a0 -- (.cxr 0xffffd001e3aca0a0) rax=ffffffff05f9e652 rbx=ffffffff05f9e652 rcx=0000000000000000 rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000 rip=fffff80165633ec7 rsp=ffffd001e3acaac8 rbp=ffffd001e3acabe0 r8=000000007263694d r9=0000000000100000 r10=0000000000000000 r11=ffffffff05f9e652 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000001 iopl=0 nv up ei ng nz na pe nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010282 atikmdag+0x213ec7: fffff801`65633ec7 0f33 rdpmc Resetting default scope CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: System CURRENT_IRQL: 0 ERROR_CODE: (NTSTATUS) 0xc0000096 - {EXCEPTION} Privileged instruction. BUGCHECK_STR: AV DEFAULT_BUCKET_ID: STATUS_PRIVILEGED_INSTRUCTION EXCEPTION_STR: 0x0 LAST_CONTROL_TRANSFER: from fffff8016562980d to fffff80165633ec7 STACK_TEXT: ffffd001`e3acaac8 fffff801`6562980d : fffff801`656629f0 ffffe000`16022000 ffffd001`e3b80000 00000000`0000c000 : atikmdag+0x213ec7 ffffd001`e3acaad0 fffff801`656629f0 : ffffe000`16022000 ffffd001`e3b80000 00000000`0000c000 ffffd001`e3acabe0 : atikmdag+0x20980d ffffd001`e3acaad8 ffffe000`16022000 : ffffd001`e3b80000 00000000`0000c000 ffffd001`e3acabe0 fffff801`663bfe2c : atikmdag+0x2429f0 ffffd001`e3acaae0 ffffd001`e3b80000 : 00000000`0000c000 ffffd001`e3acabe0 fffff801`663bfe2c 00000000`00000000 : 0xffffe000`16022000 ffffd001`e3acaae8 00000000`0000c000 : ffffd001`e3acabe0 fffff801`663bfe2c 00000000`00000000 0000001f`16022010 : 0xffffd001`e3b80000 ffffd001`e3acaaf0 ffffd001`e3acabe0 : fffff801`663bfe2c 00000000`00000000 0000001f`16022010 ffffd001`00000008 : 0xc000 ffffd001`e3acaaf8 fffff801`663bfe2c : 00000000`00000000 0000001f`16022010 ffffd001`00000008 7263694d`40000005 : 0xffffd001`e3acabe0 ffffd001`e3acab00 00000000`00000000 : 0000001f`16022010 ffffd001`00000008 7263694d`40000005 76482074`666f736f : atikmdag+0xf9fe2c FOLLOWUP_IP: atikmdag+213ec7 fffff801`65633ec7 0f33 rdpmc SYMBOL_STACK_INDEX: 0 SYMBOL_NAME: atikmdag+213ec7 FOLLOWUP_NAME: MachineOwner MODULE_NAME: atikmdag IMAGE_NAME: atikmdag.sys DEBUG_FLR_IMAGE_TIMESTAMP: 56f002ff STACK_COMMAND: .cxr 0xffffd001e3aca0a0 ; kb FAILURE_BUCKET_ID: X64_AV_atikmdag+213ec7 BUCKET_ID: X64_AV_atikmdag+213ec7 Followup: MachineOwner