KMODE_EXCEPTION_NOT_HANDLED (1e) Mavi Ekran Hatası

GutterO

Hectopat
Katılım
18 Ağustos 2017
Mesajlar
4
Daha fazla  
Cinsiyet
Erkek
Dosyaları paylaştım.
dmp.rar
 
Son düzenleyen: Moderatör:
Tüm gün içinde aldığım mavi ekranları sizinle paylaşsam sorun olur mu?
Buyurun: tumdmplar.rar
 
Son düzenleyen: Moderatör:
Hayır hiç denemedim ama söylediklerinizi yapacağım teşekkür ederim.
BIOS update yaptım. Asus araçlarını kaldırdım. Logitech araçlarını kaldırdım.
DDU ile driverları yükleyip kaldırdım. Yardımlarınız için teşekkür ederim ama eğer yine mavi ekran alırsam hemen dmp paylaşacağım.
 
Son düzenleyen: Moderatör:
İlk olarak bellek testi yapar mısınız?


Bir de Windows sürümünüz çok eski. Mutlaka güncelleyin:


Kod:
Microsoft (R) Windows Debugger Version 10.0.18869.1002 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\Recep Baltas\Downloads\Compressed\081817-4812-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 15063 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Machine Name:
Kernel base = 0xfffff803`42203000 PsLoadedModuleList = 0xfffff803`4254f5c0
Debug session time: Fri Aug 18 17:27:40.843 2017 (UTC + 3:00)
System Uptime: 0 days 0:31:16.545
Loading Kernel Symbols
..

Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.

.............................................................
................................................................
.........................................................
Loading User Symbols
Loading unloaded module list
......
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff803`4236f560 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:fffff803`4445b050=000000000000001e
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80f82315be0, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for dxgmms2.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 2

Key : Analysis.Elapsed.Sec
Value: 20

Key : Analysis.Memory.CommitPeak.Mb
Value: 66


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 10.0.15063.540 (WinBuild.160101.0800)

DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump

DUMP_TYPE: 2

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff80f82315be0

BUGCHECK_P3: 0

BUGCHECK_P4: ffffffffffffffff

READ_ADDRESS: fffff803425e4358: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
ffffffffffffffff

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP:
dxgmms2+15be0
fffff80f`82315be0 ffe0 jmp rax

EXCEPTION_PARAMETER2: ffffffffffffffff

BUGCHECK_STR: 0x1E_c0000005_R

CPU_COUNT: 8

CPU_MHZ: 1068

CPU_VENDOR: GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 9e

CPU_STEPPING: 9

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT

PROCESS_NAME: System

CURRENT_IRQL: 2

ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5

ANALYSIS_SESSION_TIME: 05-19-2019 21:17:30.0375

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

LAST_CONTROL_TRANSFER: from fffff803423fe0b6 to fffff8034236f560

STACK_TEXT:
fffff803`4445b048 fffff803`423fe0b6 : 00000000`0000001e ffffffff`c0000005 fffff80f`82315be0 00000000`00000000 : nt!KeBugCheckEx
fffff803`4445b050 fffff803`42375a3d : fffff803`4258d000 fffff803`42203000 000536a0`00889000 fffff80f`82315be0 : nt!KiFatalExceptionHandler+0x22
fffff803`4445b090 fffff803`4222ed94 : 00000000`00000000 fffff803`4445b1c0 00000000`00000000 00000000`00000002 : nt!RtlpExecuteHandlerForException+0xd
fffff803`4445b0c0 fffff803`4222db36 : fffff803`4445bf98 fffff803`4445bce0 fffff803`4445bf98 fffff803`4445bf98 : nt!RtlDispatchException+0x404
fffff803`4445b7b0 fffff803`4237a98e : 00000000`00000002 00000000`00000007 fffff803`4445bf70 fffff803`42a8eef5 : nt!KiDispatchException+0x1f6
fffff803`4445be60 fffff803`42378c34 : ffffcf86`c72790f0 ffffcf86`cc0b2000 00000000`00000000 00000000`000000ff : nt!KiExceptionDispatch+0xce
fffff803`4445c040 fffff80f`82315be0 : fffff80f`82305525 00000000`0004187a 00000000`0004187a 00000000`00000000 : nt!KiGeneralProtectionFault+0xf4
fffff803`4445c1d8 fffff80f`82305525 : 00000000`0004187a 00000000`0004187a 00000000`00000000 fffff80f`0000002f : dxgmms2+0x15be0
fffff803`4445c1e0 00000000`0004187a : 00000000`0004187a 00000000`00000000 fffff80f`0000002f 00000000`0000002f : dxgmms2+0x5525
fffff803`4445c1e8 00000000`0004187a : 00000000`00000000 fffff80f`0000002f 00000000`0000002f ffffcf86`00000000 : 0x4187a
fffff803`4445c1f0 00000000`00000000 : fffff80f`0000002f 00000000`0000002f ffffcf86`00000000 00000000`00000002 : 0x4187a


THREAD_SHA1_HASH_MOD_FUNC: 33231b57691c76cf762e038dc196879fa97bd91a

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 3b250b0b63de9ab897b6ee063aa53006749d152e

THREAD_SHA1_HASH_MOD: a683acd7799930b805ad47c79a24be2963b1605c

FOLLOWUP_IP:
dxgmms2+15be0
fffff80f`82315be0 ffe0 jmp rax

FAULT_INSTR_CODE: cccce0ff

SYMBOL_STACK_INDEX: 7

SYMBOL_NAME: dxgmms2+15be0

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: dxgmms2

IMAGE_NAME:  dxgmms2.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 7c54eb18

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 15be0

FAILURE_BUCKET_ID: 0x1E_c0000005_R_dxgmms2!unknown_function

BUCKET_ID: 0x1E_c0000005_R_dxgmms2!unknown_function

PRIMARY_PROBLEM_CLASS: 0x1E_c0000005_R_dxgmms2!unknown_function

TARGET_TIME: 2017-08-18T14:27:40.000Z

OSBUILD: 15063

OSSERVICEPACK: 540

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2017-08-01 04:23:25

BUILDDATESTAMP_STR: 160101.0800

BUILDLAB_STR: WinBuild

BUILDOSVER_STR: 10.0.15063.540

ANALYSIS_SESSION_ELAPSED_TIME: 500a

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:0x1e_c0000005_r_dxgmms2!unknown_function

FAILURE_ID_HASH: {6fc992a2-5edf-7a24-bf2a-af1c2de96632}

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80f82315be0, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 1

Key : Analysis.Elapsed.Sec
Value: 1

Key : Analysis.Memory.CommitPeak.Mb
Value: 66


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 10.0.15063.540 (WinBuild.160101.0800)

DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump

DUMP_TYPE: 2

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff80f82315be0

BUGCHECK_P3: 0

BUGCHECK_P4: ffffffffffffffff

READ_ADDRESS: Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
ffffffffffffffff

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP:
dxgmms2+15be0
fffff80f`82315be0 ffe0 jmp rax

EXCEPTION_PARAMETER2: ffffffffffffffff

BUGCHECK_STR: 0x1E_c0000005_R

CPU_COUNT: 8

CPU_MHZ: 1068

CPU_VENDOR: GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 9e

CPU_STEPPING: 9

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT

PROCESS_NAME: System

CURRENT_IRQL: 2

ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5

ANALYSIS_SESSION_TIME: 05-19-2019 21:17:52.0112

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

LAST_CONTROL_TRANSFER: from fffff803423fe0b6 to fffff8034236f560

STACK_TEXT:
fffff803`4445b048 fffff803`423fe0b6 : 00000000`0000001e ffffffff`c0000005 fffff80f`82315be0 00000000`00000000 : nt!KeBugCheckEx
fffff803`4445b050 fffff803`42375a3d : fffff803`4258d000 fffff803`42203000 000536a0`00889000 fffff80f`82315be0 : nt!KiFatalExceptionHandler+0x22
fffff803`4445b090 fffff803`4222ed94 : 00000000`00000000 fffff803`4445b1c0 00000000`00000000 00000000`00000002 : nt!RtlpExecuteHandlerForException+0xd
fffff803`4445b0c0 fffff803`4222db36 : fffff803`4445bf98 fffff803`4445bce0 fffff803`4445bf98 fffff803`4445bf98 : nt!RtlDispatchException+0x404
fffff803`4445b7b0 fffff803`4237a98e : 00000000`00000002 00000000`00000007 fffff803`4445bf70 fffff803`42a8eef5 : nt!KiDispatchException+0x1f6
fffff803`4445be60 fffff803`42378c34 : ffffcf86`c72790f0 ffffcf86`cc0b2000 00000000`00000000 00000000`000000ff : nt!KiExceptionDispatch+0xce
fffff803`4445c040 fffff80f`82315be0 : fffff80f`82305525 00000000`0004187a 00000000`0004187a 00000000`00000000 : nt!KiGeneralProtectionFault+0xf4
fffff803`4445c1d8 fffff80f`82305525 : 00000000`0004187a 00000000`0004187a 00000000`00000000 fffff80f`0000002f : dxgmms2+0x15be0
fffff803`4445c1e0 00000000`0004187a : 00000000`0004187a 00000000`00000000 fffff80f`0000002f 00000000`0000002f : dxgmms2+0x5525
fffff803`4445c1e8 00000000`0004187a : 00000000`00000000 fffff80f`0000002f 00000000`0000002f ffffcf86`00000000 : 0x4187a
fffff803`4445c1f0 00000000`00000000 : fffff80f`0000002f 00000000`0000002f ffffcf86`00000000 00000000`00000002 : 0x4187a


THREAD_SHA1_HASH_MOD_FUNC: 33231b57691c76cf762e038dc196879fa97bd91a

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 3b250b0b63de9ab897b6ee063aa53006749d152e

THREAD_SHA1_HASH_MOD: a683acd7799930b805ad47c79a24be2963b1605c

FOLLOWUP_IP:
dxgmms2+15be0
fffff80f`82315be0 ffe0 jmp rax

FAULT_INSTR_CODE: cccce0ff

SYMBOL_STACK_INDEX: 7

SYMBOL_NAME: dxgmms2+15be0

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: dxgmms2

IMAGE_NAME:  dxgmms2.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 7c54eb18

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 15be0

FAILURE_BUCKET_ID: 0x1E_c0000005_R_dxgmms2!unknown_function

BUCKET_ID: 0x1E_c0000005_R_dxgmms2!unknown_function

PRIMARY_PROBLEM_CLASS: 0x1E_c0000005_R_dxgmms2!unknown_function

TARGET_TIME: 2017-08-18T14:27:40.000Z

OSBUILD: 15063

OSSERVICEPACK: 540

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2017-08-01 04:23:25

BUILDDATESTAMP_STR: 160101.0800

BUILDLAB_STR: WinBuild

BUILDOSVER_STR: 10.0.15063.540

ANALYSIS_SESSION_ELAPSED_TIME: 7cf

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:0x1e_c0000005_r_dxgmms2!unknown_function

FAILURE_ID_HASH: {6fc992a2-5edf-7a24-bf2a-af1c2de96632}

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80f82315be0, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 2

Key : Analysis.Elapsed.Sec
Value: 2

Key : Analysis.Memory.CommitPeak.Mb
Value: 66


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 10.0.15063.540 (WinBuild.160101.0800)

DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump

DUMP_TYPE: 2

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff80f82315be0

BUGCHECK_P3: 0

BUGCHECK_P4: ffffffffffffffff

READ_ADDRESS: Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
ffffffffffffffff

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP:
dxgmms2+15be0
fffff80f`82315be0 ffe0 jmp rax

EXCEPTION_PARAMETER2: ffffffffffffffff

BUGCHECK_STR: 0x1E_c0000005_R

CPU_COUNT: 8

CPU_MHZ: 1068

CPU_VENDOR: GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 9e

CPU_STEPPING: 9

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT

PROCESS_NAME: System

CURRENT_IRQL: 2

ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5

ANALYSIS_SESSION_TIME: 05-19-2019 21:17:54.0596

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

LAST_CONTROL_TRANSFER: from fffff803423fe0b6 to fffff8034236f560

STACK_TEXT:
fffff803`4445b048 fffff803`423fe0b6 : 00000000`0000001e ffffffff`c0000005 fffff80f`82315be0 00000000`00000000 : nt!KeBugCheckEx
fffff803`4445b050 fffff803`42375a3d : fffff803`4258d000 fffff803`42203000 000536a0`00889000 fffff80f`82315be0 : nt!KiFatalExceptionHandler+0x22
fffff803`4445b090 fffff803`4222ed94 : 00000000`00000000 fffff803`4445b1c0 00000000`00000000 00000000`00000002 : nt!RtlpExecuteHandlerForException+0xd
fffff803`4445b0c0 fffff803`4222db36 : fffff803`4445bf98 fffff803`4445bce0 fffff803`4445bf98 fffff803`4445bf98 : nt!RtlDispatchException+0x404
fffff803`4445b7b0 fffff803`4237a98e : 00000000`00000002 00000000`00000007 fffff803`4445bf70 fffff803`42a8eef5 : nt!KiDispatchException+0x1f6
fffff803`4445be60 fffff803`42378c34 : ffffcf86`c72790f0 ffffcf86`cc0b2000 00000000`00000000 00000000`000000ff : nt!KiExceptionDispatch+0xce
fffff803`4445c040 fffff80f`82315be0 : fffff80f`82305525 00000000`0004187a 00000000`0004187a 00000000`00000000 : nt!KiGeneralProtectionFault+0xf4
fffff803`4445c1d8 fffff80f`82305525 : 00000000`0004187a 00000000`0004187a 00000000`00000000 fffff80f`0000002f : dxgmms2+0x15be0
fffff803`4445c1e0 00000000`0004187a : 00000000`0004187a 00000000`00000000 fffff80f`0000002f 00000000`0000002f : dxgmms2+0x5525
fffff803`4445c1e8 00000000`0004187a : 00000000`00000000 fffff80f`0000002f 00000000`0000002f ffffcf86`00000000 : 0x4187a
fffff803`4445c1f0 00000000`00000000 : fffff80f`0000002f 00000000`0000002f ffffcf86`00000000 00000000`00000002 : 0x4187a


THREAD_SHA1_HASH_MOD_FUNC: 33231b57691c76cf762e038dc196879fa97bd91a

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 3b250b0b63de9ab897b6ee063aa53006749d152e

THREAD_SHA1_HASH_MOD: a683acd7799930b805ad47c79a24be2963b1605c

FOLLOWUP_IP:
dxgmms2+15be0
fffff80f`82315be0 ffe0 jmp rax

FAULT_INSTR_CODE: cccce0ff

SYMBOL_STACK_INDEX: 7

SYMBOL_NAME: dxgmms2+15be0

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: dxgmms2

IMAGE_NAME:  dxgmms2.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 7c54eb18

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 15be0

FAILURE_BUCKET_ID: 0x1E_c0000005_R_dxgmms2!unknown_function

BUCKET_ID: 0x1E_c0000005_R_dxgmms2!unknown_function

PRIMARY_PROBLEM_CLASS: 0x1E_c0000005_R_dxgmms2!unknown_function

TARGET_TIME: 2017-08-18T14:27:40.000Z

OSBUILD: 15063

OSSERVICEPACK: 540

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2017-08-01 04:23:25

BUILDDATESTAMP_STR: 160101.0800

BUILDLAB_STR: WinBuild

BUILDOSVER_STR: 10.0.15063.540

ANALYSIS_SESSION_ELAPSED_TIME: 81e

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:0x1e_c0000005_r_dxgmms2!unknown_function

FAILURE_ID_HASH: {6fc992a2-5edf-7a24-bf2a-af1c2de96632}

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80f82315be0, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 2

Key : Analysis.Elapsed.Sec
Value: 2

Key : Analysis.Memory.CommitPeak.Mb
Value: 66


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 10.0.15063.540 (WinBuild.160101.0800)

DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump

DUMP_TYPE: 2

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff80f82315be0

BUGCHECK_P3: 0

BUGCHECK_P4: ffffffffffffffff

READ_ADDRESS: Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
ffffffffffffffff

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP:
dxgmms2+15be0
fffff80f`82315be0 ffe0 jmp rax

EXCEPTION_PARAMETER2: ffffffffffffffff

BUGCHECK_STR: 0x1E_c0000005_R

CPU_COUNT: 8

CPU_MHZ: 1068

CPU_VENDOR: GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 9e

CPU_STEPPING: 9

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT

PROCESS_NAME: System

CURRENT_IRQL: 2

ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5

ANALYSIS_SESSION_TIME: 05-19-2019 21:17:57.0404

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

LAST_CONTROL_TRANSFER: from fffff803423fe0b6 to fffff8034236f560

STACK_TEXT:
fffff803`4445b048 fffff803`423fe0b6 : 00000000`0000001e ffffffff`c0000005 fffff80f`82315be0 00000000`00000000 : nt!KeBugCheckEx
fffff803`4445b050 fffff803`42375a3d : fffff803`4258d000 fffff803`42203000 000536a0`00889000 fffff80f`82315be0 : nt!KiFatalExceptionHandler+0x22
fffff803`4445b090 fffff803`4222ed94 : 00000000`00000000 fffff803`4445b1c0 00000000`00000000 00000000`00000002 : nt!RtlpExecuteHandlerForException+0xd
fffff803`4445b0c0 fffff803`4222db36 : fffff803`4445bf98 fffff803`4445bce0 fffff803`4445bf98 fffff803`4445bf98 : nt!RtlDispatchException+0x404
fffff803`4445b7b0 fffff803`4237a98e : 00000000`00000002 00000000`00000007 fffff803`4445bf70 fffff803`42a8eef5 : nt!KiDispatchException+0x1f6
fffff803`4445be60 fffff803`42378c34 : ffffcf86`c72790f0 ffffcf86`cc0b2000 00000000`00000000 00000000`000000ff : nt!KiExceptionDispatch+0xce
fffff803`4445c040 fffff80f`82315be0 : fffff80f`82305525 00000000`0004187a 00000000`0004187a 00000000`00000000 : nt!KiGeneralProtectionFault+0xf4
fffff803`4445c1d8 fffff80f`82305525 : 00000000`0004187a 00000000`0004187a 00000000`00000000 fffff80f`0000002f : dxgmms2+0x15be0
fffff803`4445c1e0 00000000`0004187a : 00000000`0004187a 00000000`00000000 fffff80f`0000002f 00000000`0000002f : dxgmms2+0x5525
fffff803`4445c1e8 00000000`0004187a : 00000000`00000000 fffff80f`0000002f 00000000`0000002f ffffcf86`00000000 : 0x4187a
fffff803`4445c1f0 00000000`00000000 : fffff80f`0000002f 00000000`0000002f ffffcf86`00000000 00000000`00000002 : 0x4187a


THREAD_SHA1_HASH_MOD_FUNC: 33231b57691c76cf762e038dc196879fa97bd91a

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 3b250b0b63de9ab897b6ee063aa53006749d152e

THREAD_SHA1_HASH_MOD: a683acd7799930b805ad47c79a24be2963b1605c

FOLLOWUP_IP:
dxgmms2+15be0
fffff80f`82315be0 ffe0 jmp rax

FAULT_INSTR_CODE: cccce0ff

SYMBOL_STACK_INDEX: 7

SYMBOL_NAME: dxgmms2+15be0

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: dxgmms2

IMAGE_NAME:  dxgmms2.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 7c54eb18

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 15be0

FAILURE_BUCKET_ID: 0x1E_c0000005_R_dxgmms2!unknown_function

BUCKET_ID: 0x1E_c0000005_R_dxgmms2!unknown_function

PRIMARY_PROBLEM_CLASS: 0x1E_c0000005_R_dxgmms2!unknown_function

TARGET_TIME: 2017-08-18T14:27:40.000Z

OSBUILD: 15063

OSSERVICEPACK: 540

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2017-08-01 04:23:25

BUILDDATESTAMP_STR: 160101.0800

BUILDLAB_STR: WinBuild

BUILDOSVER_STR: 10.0.15063.540

ANALYSIS_SESSION_ELAPSED_TIME: 7e9

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:0x1e_c0000005_r_dxgmms2!unknown_function

FAILURE_ID_HASH: {6fc992a2-5edf-7a24-bf2a-af1c2de96632}

Followup: MachineOwner
---------


Microsoft (R) Windows Debugger Version 10.0.18869.1002 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\Recep Baltas\Downloads\Compressed\081817-4656-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 15063 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Machine Name:
Kernel base = 0xfffff803`f069b000 PsLoadedModuleList = 0xfffff803`f09e75c0
Debug session time: Fri Aug 18 00:45:22.398 2017 (UTC + 3:00)
System Uptime: 0 days 0:34:11.100
Loading Kernel Symbols
.

Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.

..............................................................
................................................................
.......................................................
Loading User Symbols
Loading unloaded module list
...........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff803`f0807560 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:fffff803`f285b6c0=000000000000001e
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff803f070ca43, The address that the exception occurred at
Arg3: ffffffffffffffff, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 2

Key : Analysis.Elapsed.Sec
Value: 64

Key : Analysis.Memory.CommitPeak.Mb
Value: 66


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 10.0.15063.540 (WinBuild.160101.0800)

DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump

DUMP_TYPE: 2

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff803f070ca43

BUGCHECK_P3: ffffffffffffffff

BUGCHECK_P4: 0

WRITE_ADDRESS: fffff803f0a7c358: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
0000000000000000

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP:
nt!KiTimerWaitTest+b3
fffff803`f070ca43 f0480fba6d4000 lock bts qword ptr [rbp+40h],0

EXCEPTION_PARAMETER1: ffffffffffffffff

BUGCHECK_STR: 0x1E_c0000005

CPU_COUNT: 8

CPU_MHZ: 1068

CPU_VENDOR: GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 9e

CPU_STEPPING: 9

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT

PROCESS_NAME: System

CURRENT_IRQL: 2

ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5

ANALYSIS_SESSION_TIME: 05-19-2019 21:16:36.0549

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

TRAP_FRAME:  ffffb501972b1230 -- (.trap 0xffffb501972b1230)
Unable to read trap frame at ffffb501`972b1230

LAST_CONTROL_TRANSFER: from fffff803f08960b6 to fffff803f0807560

STACK_TEXT:
fffff803`f285b6b8 fffff803`f08960b6 : 00000000`0000001e ffffffff`c0000005 fffff803`f070ca43 ffffffff`ffffffff : nt!KeBugCheckEx
fffff803`f285b6c0 fffff803`f080da3d : fffff803`f0a25000 fffff803`f069b000 000536a0`00889000 ffffb501`954b1a98 : nt!KiFatalExceptionHandler+0x22
fffff803`f285b700 fffff803`f06c6d94 : 00000000`00000000 fffff803`f285b830 00000000`00000000 fffff807`faf3b9b6 : nt!RtlpExecuteHandlerForException+0xd
fffff803`f285b730 fffff803`f06c5b36 : fffff803`f285c608 fffff803`f285c350 fffff803`f285c608 fffff803`f285c608 : nt!RtlDispatchException+0x404
fffff803`f285be20 fffff803`f081298e : 00000000`00000000 00000000`00000000 ffffb501`972b1230 fffff807`f9c56a0b : nt!KiDispatchException+0x1f6
fffff803`f285c4d0 fffff803`f0810b05 : 00000000`00000000 00000300`20100000 2d6a319b`22fc77a2 cc1b5953`ae6ab4a1 : nt!KiExceptionDispatch+0xce
fffff803`f285c6b0 fffff803`f070ca43 : 00000500`000005d0 ffffb501`8f695000 00000000`00000100 ffffffff`00000000 : nt!KiStackFault+0x105
fffff803`f285c840 fffff803`f070c6ff : fffff803`ef569180 ffffb501`00000000 fffff803`f285ca98 00000000`00000003 : nt!KiTimerWaitTest+0xb3
fffff803`f285c8f0 fffff803`f070d707 : fffff803`ef569180 00000000`003e95c2 00000000`00000000 00000000`000131bb : nt!KiProcessExpiredTimerList+0xaf
fffff803`f285c9e0 fffff803`f080a60a : 00000000`00000000 fffff803`ef569180 00000000`001a6fe0 fffff803`f0a94a40 : nt!KiRetireDpcList+0x367
fffff803`f285cbe0 00000000`00000000 : fffff803`f285d000 fffff803`f2856000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x5a


THREAD_SHA1_HASH_MOD_FUNC: e35a957f93ce65caabf319c76ce5221cbfaffe50

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 2887175b5f3da4f48c8e58cc466ab0d4aac81424

THREAD_SHA1_HASH_MOD: b28610981796779b4ac02f58898fde25728a775c

FOLLOWUP_IP:
nt!KiTimerWaitTest+b3
fffff803`f070ca43 f0480fba6d4000 lock bts qword ptr [rbp+40h],0

FAULT_INSTR_CODE: ba0f48f0

SYMBOL_STACK_INDEX: 7

SYMBOL_NAME: nt!KiTimerWaitTest+b3

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP: 597fd80d

IMAGE_VERSION: 10.0.15063.540

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: b3

FAILURE_BUCKET_ID: 0x1E_c0000005_nt!KiTimerWaitTest

BUCKET_ID: 0x1E_c0000005_nt!KiTimerWaitTest

PRIMARY_PROBLEM_CLASS: 0x1E_c0000005_nt!KiTimerWaitTest

TARGET_TIME: 2017-08-17T21:45:22.000Z

OSBUILD: 15063

OSSERVICEPACK: 540

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2017-08-01 04:23:25

BUILDDATESTAMP_STR: 160101.0800

BUILDLAB_STR: WinBuild

BUILDOSVER_STR: 10.0.15063.540

ANALYSIS_SESSION_ELAPSED_TIME: facc

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:0x1e_c0000005_nt!kitimerwaittest

FAILURE_ID_HASH: {0b1bac46-2a62-8b1e-2945-6087e0228943}

Followup: MachineOwner
---------


Microsoft (R) Windows Debugger Version 10.0.18869.1002 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\Recep Baltas\Downloads\Compressed\081817-4828-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 15063 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Machine Name:
Kernel base = 0xfffff802`ca67e000 PsLoadedModuleList = 0xfffff802`ca9ca5c0
Debug session time: Fri Aug 18 16:54:23.396 2017 (UTC + 3:00)
System Uptime: 0 days 1:23:03.098
Loading Kernel Symbols
..

Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.

.............................................................
................................................................
...........................................................
Loading User Symbols
Loading unloaded module list
............................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff802`ca7ea560 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:fffff802`cc85b6c0=000000000000001e
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff802ca6efa98, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 2

Key : Analysis.Elapsed.Sec
Value: 75

Key : Analysis.Memory.CommitPeak.Mb
Value: 66


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 10.0.15063.540 (WinBuild.160101.0800)

DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump

DUMP_TYPE: 2

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff802ca6efa98

BUGCHECK_P3: 0

BUGCHECK_P4: ffffffffffffffff

READ_ADDRESS: fffff802caa5f358: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
ffffffffffffffff

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP:
nt!KiTimerWaitTest+108
fffff802`ca6efa98 f0490fbaad1059000000 lock bts qword ptr [r13+5910h],0

EXCEPTION_PARAMETER2: ffffffffffffffff

BUGCHECK_STR: 0x1E_c0000005_R

CPU_COUNT: 8

CPU_MHZ: 1068

CPU_VENDOR: GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 9e

CPU_STEPPING: 9

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT

PROCESS_NAME: System

CURRENT_IRQL: 2

ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5

ANALYSIS_SESSION_TIME: 05-19-2019 21:16:26.0484

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

TRAP_FRAME:  ffffce8a207ebe80 -- (.trap 0xffffce8a207ebe80)
Unable to read trap frame at ffffce8a`207ebe80

LAST_CONTROL_TRANSFER: from fffff802ca8790b6 to fffff802ca7ea560

STACK_TEXT:
fffff802`cc85b6b8 fffff802`ca8790b6 : 00000000`0000001e ffffffff`c0000005 fffff802`ca6efa98 00000000`00000000 : nt!KeBugCheckEx
fffff802`cc85b6c0 fffff802`ca7f0a3d : fffff802`caa08000 fffff802`ca67e000 000536a0`00889000 ffffce8a`18174000 : nt!KiFatalExceptionHandler+0x22
fffff802`cc85b700 fffff802`ca6a9d94 : 00000000`00000000 fffff802`cc85b830 00000000`00000000 fffff80a`38e4b9b6 : nt!RtlpExecuteHandlerForException+0xd
fffff802`cc85b730 fffff802`ca6a8b36 : fffff802`cc85c608 fffff802`cc85c350 fffff802`cc85c608 fffff802`cc85c608 : nt!RtlDispatchException+0x404
fffff802`cc85be20 fffff802`ca7f598e : fffff80a`000003c0 fffff80a`384d7d20 ffffce8a`207ebe80 00003175`df814300 : nt!KiDispatchException+0x1f6
fffff802`cc85c4d0 fffff802`ca7f3c34 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0xce
fffff802`cc85c6b0 fffff802`ca6efa98 : 00000500`00000000 ffffce8a`00000000 00000000`00000100 ffffffff`00000000 : nt!KiGeneralProtectionFault+0xf4
fffff802`cc85c840 fffff802`ca6ef6ff : fffff802`c961c180 ffffce8a`00000000 fffff802`cc85ca98 00000000`00000000 : nt!KiTimerWaitTest+0x108
fffff802`cc85c8f0 fffff802`ca6f0707 : fffff802`c961c180 00000000`003e95bc 00000000`00000000 00000000`0002e6a2 : nt!KiProcessExpiredTimerList+0xaf
fffff802`cc85c9e0 fffff802`ca7ed60a : 00000000`00000000 fffff802`c961c180 00000000`001a6fe0 fffff802`caa77a40 : nt!KiRetireDpcList+0x367
fffff802`cc85cbe0 00000000`00000000 : fffff802`cc85d000 fffff802`cc856000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x5a


THREAD_SHA1_HASH_MOD_FUNC: fb0c6f85f4c78de1bdfcfc45b2e86ed9be95905d

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 40bb150c915506284a8bacf3e23c65187c26e7af

THREAD_SHA1_HASH_MOD: b28610981796779b4ac02f58898fde25728a775c

FOLLOWUP_IP:
nt!KiTimerWaitTest+108
fffff802`ca6efa98 f0490fbaad1059000000 lock bts qword ptr [r13+5910h],0

FAULT_INSTR_CODE: ba0f49f0

SYMBOL_STACK_INDEX: 7

SYMBOL_NAME: nt!KiTimerWaitTest+108

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP: 597fd80d

IMAGE_VERSION: 10.0.15063.540

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 108

FAILURE_BUCKET_ID: 0x1E_c0000005_R_nt!KiTimerWaitTest

BUCKET_ID: 0x1E_c0000005_R_nt!KiTimerWaitTest

PRIMARY_PROBLEM_CLASS: 0x1E_c0000005_R_nt!KiTimerWaitTest

TARGET_TIME: 2017-08-18T13:54:23.000Z

OSBUILD: 15063

OSSERVICEPACK: 540

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2017-08-01 04:23:25

BUILDDATESTAMP_STR: 160101.0800

BUILDLAB_STR: WinBuild

BUILDOSVER_STR: 10.0.15063.540

ANALYSIS_SESSION_ELAPSED_TIME: 1278a

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:0x1e_c0000005_r_nt!kitimerwaittest

FAILURE_ID_HASH: {60392e1e-177d-1e45-9fd7-b743dcff84fd}

Followup: MachineOwner
---------


Microsoft (R) Windows Debugger Version 10.0.18869.1002 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\Recep Baltas\Downloads\Compressed\081817-4625-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 15063 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 15063.0.amd64fre.rs2_release.170317-1834
Machine Name:
Kernel base = 0xfffff800`b828f000 PsLoadedModuleList = 0xfffff800`b85db5c0
Debug session time: Fri Aug 18 00:10:27.819 2017 (UTC + 3:00)
System Uptime: 0 days 0:35:55.520
Loading Kernel Symbols
.

Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.

..............................................................
................................................................
.........................................................
Loading User Symbols
Loading unloaded module list
...........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff800`b83fb560 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:ffffaf00`3202d3d0=000000000000003b
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: ffff828da6249b44, Address of the instruction which caused the bugcheck
Arg3: ffffaf003202dca0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32kfull.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 7

Key : Analysis.Elapsed.Sec
Value: 129

Key : Analysis.Memory.CommitPeak.Mb
Value: 70


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 15063.0.amd64fre.rs2_release.170317-1834

SYSTEM_MANUFACTURER: System manufacturer

SYSTEM_PRODUCT_NAME: System Product Name

SYSTEM_SKU: SKU

SYSTEM_VERSION: System Version

BIOS_VENDOR: American Megatrends Inc.

BIOS_VERSION: 0906

BIOS_DATE: 03/22/2017

BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.

BASEBOARD_PRODUCT: STRIX Z270G GAMING

BASEBOARD_VERSION: Rev 1.xx

DUMP_TYPE: 2

BUGCHECK_P1: c0000005

BUGCHECK_P2: ffff828da6249b44

BUGCHECK_P3: ffffaf003202dca0

BUGCHECK_P4: 0

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP:
win32kfull+49b44
ffff828d`a6249b44 488b8878010000 mov rcx,qword ptr [rax+178h]

CONTEXT:  ffffaf003202dca0 -- (.cxr 0xffffaf003202dca0)
rax=04ff82c44011dab0 rbx=ffff82c442440450 rcx=00000000bf000000
rdx=00000000050004f2 rsi=0000000000000064 rdi=0000000000000200
rip=ffff828da6249b44 rsp=ffffaf003202e690 rbp=0000000000000064
r8=ffffaf003202e4a0 r9=000000000000002f r10=fffff800b8215f10
r11=fffff800b828f000 r12=0000000000000000 r13=000000000020e3fb
r14=ffff82c440130728 r15=000000000000000f
iopl=0 nv up ei pl nz na pe cy
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010203
win32kfull+0x49b44:
ffff828d`a6249b44 488b8878010000 mov rcx,qword ptr [rax+178h] ds:002b:04ff82c4`4011dc28=????????????????
Resetting default scope

BUGCHECK_STR: 0x3B_c0000005

CPU_COUNT: 8

CPU_MHZ: 1068

CPU_VENDOR: GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 9e

CPU_STEPPING: 9

CPU_MICROCODE: 6,9e,9,0 (F,M,S,R) SIG: 42'00000000 (cache) 42'00000000 (init)

BLACKBOXBSD: 1 (!blackboxbsd)


CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT

PROCESS_NAME: csrss.exe

CURRENT_IRQL: 0

ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5

ANALYSIS_SESSION_TIME: 05-19-2019 21:16:16.0451

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

LAST_CONTROL_TRANSFER: from ffff878e0b8e13c0 to ffff828da6249b44

STACK_TEXT:
ffffaf00`3202e690 ffff878e`0b8e13c0 : 00000000`00000200 00000000`00000001 ffff878e`0b8e13c8 ffffaf00`3202e810 : win32kfull+0x49b44
ffffaf00`3202e698 00000000`00000200 : 00000000`00000001 ffff878e`0b8e13c8 ffffaf00`3202e810 ffff878e`09ff48b0 : 0xffff878e`0b8e13c0
ffffaf00`3202e6a0 00000000`00000001 : ffff878e`0b8e13c8 ffffaf00`3202e810 ffff878e`09ff48b0 00000000`00000001 : 0x200
ffffaf00`3202e6a8 ffff878e`0b8e13c8 : ffffaf00`3202e810 ffff878e`09ff48b0 00000000`00000001 ffff828d`a65d1fff : 0x1
ffffaf00`3202e6b0 ffffaf00`3202e810 : ffff878e`09ff48b0 00000000`00000001 ffff828d`a65d1fff ffff82c4`400c6ab0 : 0xffff878e`0b8e13c8
ffffaf00`3202e6b8 ffff878e`09ff48b0 : 00000000`00000001 ffff828d`a65d1fff ffff82c4`400c6ab0 00000000`003e95b8 : 0xffffaf00`3202e810
ffffaf00`3202e6c0 00000000`00000001 : ffff828d`a65d1fff ffff82c4`400c6ab0 00000000`003e95b8 ffff828d`a67302e0 : 0xffff878e`09ff48b0
ffffaf00`3202e6c8 ffff828d`a65d1fff : ffff82c4`400c6ab0 00000000`003e95b8 ffff828d`a67302e0 00000000`00000002 : 0x1
ffffaf00`3202e6d0 ffff828d`a624987e : 00000000`00000001 ffffaf00`3202e810 00000000`00000004 00000000`00000002 : win32kbase!EnterCrit+0x9f
ffffaf00`3202e710 00000000`00000001 : ffffaf00`3202e810 00000000`00000004 00000000`00000002 ffffaf00`00000004 : win32kfull+0x4987e
ffffaf00`3202e718 ffffaf00`3202e810 : 00000000`00000004 00000000`00000002 ffffaf00`00000004 ffffaf00`3202e810 : 0x1
ffffaf00`3202e720 00000000`00000004 : 00000000`00000002 ffffaf00`00000004 ffffaf00`3202e810 00000000`00000000 : 0xffffaf00`3202e810
ffffaf00`3202e728 00000000`00000002 : ffffaf00`00000004 ffffaf00`3202e810 00000000`00000000 ffff878e`0a0271c0 : 0x4
ffffaf00`3202e730 ffffaf00`00000004 : ffffaf00`3202e810 00000000`00000000 ffff878e`0a0271c0 ffffdf81`95d1d240 : 0x2
ffffaf00`3202e738 ffffaf00`3202e810 : 00000000`00000000 ffff878e`0a0271c0 ffffdf81`95d1d240 00000000`00000000 : 0xffffaf00`00000004
ffffaf00`3202e740 00000000`00000000 : ffff878e`0a0271c0 ffffdf81`95d1d240 00000000`00000000 00000000`00000000 : 0xffffaf00`3202e810


THREAD_SHA1_HASH_MOD_FUNC: 146857873b571aa86d5b599ca0447c891d1a56d3

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 8fdd0a27375a5d050f7a146094778879872d9030

THREAD_SHA1_HASH_MOD: 916a6a589eb994e3aaaae4ad4510eeb8f3b7eb5a

FOLLOWUP_IP:
win32kfull+49b44
ffff828d`a6249b44 488b8878010000 mov rcx,qword ptr [rax+178h]

FAULT_INSTR_CODE: 78888b48

SYMBOL_STACK_INDEX: 0

SYMBOL_NAME: win32kfull+49b44

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: win32kfull

IMAGE_NAME:  win32kfull.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 2354c46

STACK_COMMAND: .cxr 0xffffaf003202dca0 ; kb

BUCKET_ID_FUNC_OFFSET: 49b44

FAILURE_BUCKET_ID: 0x3B_c0000005_win32kfull!unknown_function

BUCKET_ID: 0x3B_c0000005_win32kfull!unknown_function

PRIMARY_PROBLEM_CLASS: 0x3B_c0000005_win32kfull!unknown_function

TARGET_TIME: 2017-08-17T21:10:27.000Z

OSBUILD: 15063

OSSERVICEPACK: 540

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2017-08-01 04:23:25

BUILDDATESTAMP_STR: 170317-1834

BUILDLAB_STR: rs2_release

BUILDOSVER_STR: 10.0.15063.0.amd64fre.rs2_release.170317-1834

ANALYSIS_SESSION_ELAPSED_TIME: 1f93d

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:0x3b_c0000005_win32kfull!unknown_function

FAILURE_ID_HASH: {c8562915-20db-1d44-10f6-80418b3fecc4}

Followup: MachineOwner
---------


Microsoft (R) Windows Debugger Version 10.0.18869.1002 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\Recep Baltas\Downloads\Compressed\081717-4921-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 15063 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 15063.0.amd64fre.rs2_release.170317-1834
Machine Name:
Kernel base = 0xfffff801`4388c000 PsLoadedModuleList = 0xfffff801`43bd85c0
Debug session time: Thu Aug 17 20:43:15.365 2017 (UTC + 3:00)
System Uptime: 0 days 0:00:11.071
Loading Kernel Symbols
.

Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.

..............................................................
................................................................
......................................................
Loading User Symbols
Loading unloaded module list
.......
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff801`439f8560 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:ffffae00`f4ee32f0=0000000000000050
6: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffbdfda8b0032c, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff8060d2b1934, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 4

Key : Analysis.Elapsed.Sec
Value: 144

Key : Analysis.Memory.CommitPeak.Mb
Value: 65


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 15063.0.amd64fre.rs2_release.170317-1834

SYSTEM_MANUFACTURER: System manufacturer

SYSTEM_PRODUCT_NAME: System Product Name

SYSTEM_SKU: SKU

SYSTEM_VERSION: System Version

BIOS_VENDOR: American Megatrends Inc.

BIOS_VERSION: 0906

BIOS_DATE: 03/22/2017

BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.

BASEBOARD_PRODUCT: STRIX Z270G GAMING

BASEBOARD_VERSION: Rev 1.xx

DUMP_TYPE: 2

BUGCHECK_P1: ffffbdfda8b0032c

BUGCHECK_P2: 0

BUGCHECK_P3: fffff8060d2b1934

BUGCHECK_P4: 2

READ_ADDRESS: fffff80143c6d358: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
ffffbdfda8b0032c

FAULTING_IP:
IOMap64+1934
fffff806`0d2b1934 8b0482 mov eax,dword ptr [rdx+rax*4]

MM_INTERNAL_CODE: 2

CPU_COUNT: 8

CPU_MHZ: 1068

CPU_VENDOR: GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 9e

CPU_STEPPING: 9

CPU_MICROCODE: 6,9e,9,0 (F,M,S,R) SIG: 42'00000000 (cache) 42'00000000 (init)

BLACKBOXBSD: 1 (!blackboxbsd)


CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT

BUGCHECK_STR: AV

PROCESS_NAME: GpuFanHelper.exe

CURRENT_IRQL: 0

ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5

ANALYSIS_SESSION_TIME: 05-19-2019 21:15:30.0143

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

TRAP_FRAME:  ffffae00f4ee3580 -- (.trap 0xffffae00f4ee3580)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000000c00cb rbx=0000000000000000 rcx=0000000000000001
rdx=ffffbdfda8800000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8060d2b1934 rsp=ffffae00f4ee3710 rbp=ffff9782a8828c20
r8=0000000000000000 r9=ffff9782a7e345c0 r10=0000000000000001
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
IOMap64+0x1934:
fffff806`0d2b1934 8b0482 mov eax,dword ptr [rdx+rax*4] ds:ffffbdfd`a8b0032c=????????
Resetting default scope

LAST_CONTROL_TRANSFER: from fffff80143a2dfb4 to fffff801439f8560

STACK_TEXT:
ffffae00`f4ee32e8 fffff801`43a2dfb4 : 00000000`00000050 ffffbdfd`a8b0032c 00000000`00000000 ffffae00`f4ee3580 : nt!KeBugCheckEx
ffffae00`f4ee32f0 fffff801`439192d6 : 00000000`00000000 ffffbdfd`a8b0032c ffffae00`f4ee3580 ffff9782`a8ab1080 : nt!MiSystemFault+0x116e84
ffffae00`f4ee3390 fffff801`43a01d72 : 00000000`00000002 00000000`00000000 ffff9782`a8ab1580 00000000`00000001 : nt!MmAccessFault+0xae6
ffffae00`f4ee3580 fffff806`0d2b1934 : ffff9782`a8c1ef18 00000000`00000000 ffff9782`a8828ad0 ffff9782`a8c1eee0 : nt!KiPageFault+0x132
ffffae00`f4ee3710 ffff9782`a8c1ef18 : 00000000`00000000 ffff9782`a8828ad0 ffff9782`a8c1eee0 ffff9782`a8828c20 : IOMap64+0x1934
ffffae00`f4ee3718 00000000`00000000 : ffff9782`a8828ad0 ffff9782`a8c1eee0 ffff9782`a8828c20 fffff806`0d2b163d : 0xffff9782`a8c1ef18


THREAD_SHA1_HASH_MOD_FUNC: 478dd3aaec51d8bf998407944823e3ebbc8e722a

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 98c100427eea7f2845f9ac62e9b8a5b78783ad52

THREAD_SHA1_HASH_MOD: 8671a1c461e046c8f3cd570e417f7017d14e394b

FOLLOWUP_IP:
IOMap64+1934
fffff806`0d2b1934 8b0482 mov eax,dword ptr [rdx+rax*4]

FAULT_INSTR_CODE: eb82048b

SYMBOL_STACK_INDEX: 4

SYMBOL_NAME: IOMap64+1934

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: IOMap64

IMAGE_NAME:  IOMap64.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 5448513c

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 1934

FAILURE_BUCKET_ID: AV_R_INVALID_IOMap64!unknown_function

BUCKET_ID: AV_R_INVALID_IOMap64!unknown_function

PRIMARY_PROBLEM_CLASS: AV_R_INVALID_IOMap64!unknown_function

TARGET_TIME: 2017-08-17T17:43:15.000Z

OSBUILD: 15063

OSSERVICEPACK: 540

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2017-08-01 04:23:25

BUILDDATESTAMP_STR: 170317-1834

BUILDLAB_STR: rs2_release

BUILDOSVER_STR: 10.0.15063.0.amd64fre.rs2_release.170317-1834

ANALYSIS_SESSION_ELAPSED_TIME: 235c6

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:av_r_invalid_iomap64!unknown_function

FAILURE_ID_HASH: {24e98ca5-f46a-9570-8c6c-621e5780430e}

Followup: MachineOwner
---------


Microsoft (R) Windows Debugger Version 10.0.18869.1002 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\Recep Baltas\Downloads\Compressed\081717-4562-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 15063 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 15063.0.amd64fre.rs2_release.170317-1834
Machine Name:
Kernel base = 0xfffff800`11299000 PsLoadedModuleList = 0xfffff800`115e55c0
Debug session time: Thu Aug 17 20:34:55.989 2017 (UTC + 3:00)
System Uptime: 0 days 0:00:08.696
Loading Kernel Symbols
.

Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.

..............................................................
................................................................
...................................................
Loading User Symbols
Loading unloaded module list
.......
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff800`11405560 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:ffffd300`9d1c2390=000000000000001a
4: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 000000000006194a, The subtype of the bugcheck.
Arg2: 0000000000000000
Arg3: 0000000000000001
Arg4: 0000000000000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 4

Key : Analysis.Elapsed.Sec
Value: 146

Key : Analysis.Memory.CommitPeak.Mb
Value: 65


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 15063.0.amd64fre.rs2_release.170317-1834

SYSTEM_MANUFACTURER: System manufacturer

SYSTEM_PRODUCT_NAME: System Product Name

SYSTEM_SKU: SKU

SYSTEM_VERSION: System Version

BIOS_VENDOR: American Megatrends Inc.

BIOS_VERSION: 0906

BIOS_DATE: 03/22/2017

BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.

BASEBOARD_PRODUCT: STRIX Z270G GAMING

BASEBOARD_VERSION: Rev 1.xx

DUMP_TYPE: 2

BUGCHECK_P1: 6194a

BUGCHECK_P2: 0

BUGCHECK_P3: 1

BUGCHECK_P4: 0

BUGCHECK_STR: 0x1a_6194a

CPU_COUNT: 8

CPU_MHZ: 1068

CPU_VENDOR: GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 9e

CPU_STEPPING: 9

CPU_MICROCODE: 6,9e,9,0 (F,M,S,R) SIG: 42'00000000 (cache) 42'00000000 (init)

BLACKBOXBSD: 1 (!blackboxbsd)


CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT

PROCESS_NAME: GpuFanHelper.exe

CURRENT_IRQL: 2

ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5

ANALYSIS_SESSION_TIME: 05-19-2019 21:15:24.0415

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

LAST_CONTROL_TRANSFER: from fffff800114526be to fffff80011405560

STACK_TEXT:
ffffd300`9d1c2388 fffff800`114526be : 00000000`0000001a 00000000`0006194a 00000000`00000000 00000000`00000001 : nt!KeBugCheckEx
ffffd300`9d1c2390 fffff800`11452300 : 00000000`000d4000 00000000`00000000 00000000`00000001 00000000`00000001 : nt!MiDereferenceIoPages+0xd576a
ffffd300`9d1c2440 fffff800`1137bf88 : 00000000`00000000 ffffd300`9e5c0000 00000000`00040000 00000000`00000040 : nt!MiZeroAndFlushPtes+0xd6278
ffffd300`9d1c2670 fffff802`5c591ae2 : ffffe585`025d0560 ffffe585`025d69c0 00000000`00000001 00000000`00000000 : nt!MmUnmapIoSpace+0x68
ffffd300`9d1c26a0 ffffe585`025d0560 : ffffe585`025d69c0 00000000`00000001 00000000`00000000 ffffd300`9d1c2720 : IOMap64+0x1ae2
ffffd300`9d1c26a8 ffffe585`025d69c0 : 00000000`00000001 00000000`00000000 ffffd300`9d1c2720 ffff9480`00993780 : 0xffffe585`025d0560
ffffd300`9d1c26b0 00000000`00000001 : 00000000`00000000 ffffd300`9d1c2720 ffff9480`00993780 00000000`00000000 : 0xffffe585`025d69c0
ffffd300`9d1c26b8 00000000`00000000 : ffffd300`9d1c2720 ffff9480`00993780 00000000`00000000 ffffe585`02edfa50 : 0x1


THREAD_SHA1_HASH_MOD_FUNC: e89b9ba7f5da08f45c88d3018c44ae012e21f592

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 4ca521458d441d73fd6780ba68cf23c287eb2e2b

THREAD_SHA1_HASH_MOD: 8671a1c461e046c8f3cd570e417f7017d14e394b

FOLLOWUP_IP:
IOMap64+1ae2
fffff802`5c591ae2 4f89bcece0520000 mov qword ptr [r12+r13*8+52E0h],r15

FAULT_INSTR_CODE: ecbc894f

SYMBOL_STACK_INDEX: 4

SYMBOL_NAME: IOMap64+1ae2

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: IOMap64

IMAGE_NAME:  IOMap64.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 5448513c

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 1ae2

FAILURE_BUCKET_ID: 0x1a_6194a_IOMap64!unknown_function

BUCKET_ID: 0x1a_6194a_IOMap64!unknown_function

PRIMARY_PROBLEM_CLASS: 0x1a_6194a_IOMap64!unknown_function

TARGET_TIME: 2017-08-17T17:34:55.000Z

OSBUILD: 15063

OSSERVICEPACK: 540

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2017-08-01 04:23:25

BUILDDATESTAMP_STR: 170317-1834

BUILDLAB_STR: rs2_release

BUILDOSVER_STR: 10.0.15063.0.amd64fre.rs2_release.170317-1834

ANALYSIS_SESSION_ELAPSED_TIME: 23d39

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:0x1a_6194a_iomap64!unknown_function

FAILURE_ID_HASH: {cb8efea1-bd7c-6759-ca10-6f209680f912}

Followup: MachineOwner
---------


Microsoft (R) Windows Debugger Version 10.0.18869.1002 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\Recep Baltas\Downloads\Compressed\081817-4734-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 15063 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Machine Name:
Kernel base = 0xfffff801`dbc8b000 PsLoadedModuleList = 0xfffff801`dbfd75c0
Debug session time: Fri Aug 18 04:06:50.306 2017 (UTC + 3:00)
System Uptime: 0 days 2:35:05.009
Loading Kernel Symbols
..

Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.

.............................................................
................................................................
................................................................
...
Loading User Symbols
Loading unloaded module list
...........
For analysis of this file, run !analyze -v
FLTMGR!FltpDeleteContextList+0x86:
fffff80b`2aa96566 0fb74818        movzx   ecx,word ptr [rax+18h] ds:002b:efff978d`2a722748=????
4: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80b2aa96566, The address that the exception occurred at
Arg3: ffffce81ae7133f8, Exception Record Address
Arg4: ffffce81ae712c40, Context Record Address

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : AV.Fault
Value: Read

Key : Analysis.CPU.Sec
Value: 1

Key : Analysis.Elapsed.Sec
Value: 1

Key : Analysis.Memory.CommitPeak.Mb
Value: 70


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 10.0.15063.540 (WinBuild.160101.0800)

SYSTEM_MANUFACTURER: System manufacturer

SYSTEM_PRODUCT_NAME: System Product Name

SYSTEM_SKU: SKU

SYSTEM_VERSION: System Version

BIOS_VENDOR: American Megatrends Inc.

BIOS_VERSION: 0906

BIOS_DATE: 03/22/2017

BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.

BASEBOARD_PRODUCT: STRIX Z270G GAMING

BASEBOARD_VERSION: Rev 1.xx

DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump

DUMP_TYPE: 2

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff80b2aa96566

BUGCHECK_P3: ffffce81ae7133f8

BUGCHECK_P4: ffffce81ae712c40

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP:
FLTMGR!FltpDeleteContextList+86
fffff80b`2aa96566 0fb74818 movzx ecx,word ptr [rax+18h]

EXCEPTION_RECORD:  ffffce81ae7133f8 -- (.exr 0xffffce81ae7133f8)
ExceptionAddress: fffff80b2aa96566 (FLTMGR!FltpDeleteContextList+0x0000000000000086)
   ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

CONTEXT:  ffffce81ae712c40 -- (.cxr 0xffffce81ae712c40)
rax=efff978d2a722730 rbx=ffffa78a225f2648 rcx=ffff978d2a75ec28
rdx=0000000000005804 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80b2aa96566 rsp=ffffce81ae713630 rbp=fffff80b2aa60000
r8=0000000000005806 r9=0000000000000000 r10=ffff978d2a75e7d0
r11=ffffa78a21823ea0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000706 r15=ffffa78a20360860
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0000 ds=002b es=002b fs=0053 gs=002b efl=00010286
FLTMGR!FltpDeleteContextList+0x86:
fffff80b`2aa96566 0fb74818 movzx ecx,word ptr [rax+18h] ds:002b:efff978d`2a722748=????
Resetting default scope

CPU_COUNT: 8

CPU_MHZ: 1068

CPU_VENDOR: GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 9e

CPU_STEPPING: 9

CPU_MICROCODE: 6,9e,9,0 (F,M,S,R) SIG: 42'00000000 (cache) 42'00000000 (init)

BLACKBOXBSD: 1 (!blackboxbsd)


CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT

PROCESS_NAME: System

CURRENT_IRQL: 0

FOLLOWUP_IP:
FLTMGR!FltpDeleteContextList+86
fffff80b`2aa96566 0fb74818 movzx ecx,word ptr [rax+18h]

BUGCHECK_STR: AV

READ_ADDRESS: fffff801dc06c358: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
ffffffffffffffff

ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

EXCEPTION_CODE_STR: c0000005

EXCEPTION_PARAMETER1: 0000000000000000

EXCEPTION_PARAMETER2: ffffffffffffffff

ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5

ANALYSIS_SESSION_TIME: 05-19-2019 21:22:23.0162

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

LAST_CONTROL_TRANSFER: from fffff80b2aa9860e to fffff80b2aa96566

STACK_TEXT:
ffffce81`ae713630 fffff80b`2aa9860e : ffff978d`30ec1f48 00000000`00000705 ffffffff`ffffffff ffff978d`2d9f3588 : FLTMGR!FltpDeleteContextList+0x86
ffffce81`ae713660 fffff80b`2aa98f32 : ffff978d`30ec1f00 00000000`00000705 ffff978d`30ec1f00 ffffa78a`20360860 : FLTMGR!CleanupStreamListCtrl+0x4a
ffffce81`ae7136a0 fffff801`dc1bda3f : ffffa78a`20360860 fffff80b`2b4084ee ffffa78a`20360860 00000000`00000706 : FLTMGR!DeleteStreamListCtrlCallback+0x92
ffffce81`ae7136e0 fffff80b`2b4c1f6e : ffffa78a`20360860 ffffce81`ae7137f8 00000000`00000705 ffff978d`2ae08450 : nt!FsRtlTeardownPerStreamContexts+0x4f
ffffce81`ae713720 fffff80b`2b4c1dc5 : ffffce81`ae7137b0 ffff978d`3111cb28 ffffa78a`20360720 00000008`3111cb00 : NTFS!NtfsDeleteScb+0x12e
ffffce81`ae7137a0 fffff80b`2b4082b5 : 00000000`00000001 ffffa78a`20360860 ffff978d`3111cc18 00000000`00000000 : NTFS!NtfsRemoveScb+0xc5
ffffce81`ae7137f0 fffff80b`2b4c1aef : ffffa78a`20360720 fffff80b`2b50d1d0 ffffce81`ae713932 ffffa78a`20360b00 : NTFS!NtfsPrepareFcbForRemoval+0x75
ffffce81`ae713830 fffff80b`2b4091d3 : ffff978d`315b0ca8 ffffce81`ae713932 ffffa78a`20360b30 ffffa78a`20360720 : NTFS!NtfsTeardownStructures+0x8f
ffffce81`ae7138b0 fffff80b`2b4c464c : ffffce81`ae713a48 ffffa78a`00000000 ffff978d`315b0ca8 ffffce81`ae713a48 : NTFS!NtfsDecrementCloseCounts+0xd3
ffffce81`ae7138f0 fffff80b`2b50d3ad : ffff978d`315b0ca8 ffffa78a`20360860 ffffa78a`20360720 ffff978d`2ae08180 : NTFS!NtfsCommonClose+0x3fc
ffffce81`ae7139c0 fffff801`dbcc8ca8 : 00000000`00000000 ffff978d`33a736c0 fffff801`dc0094e0 fffff801`dc083380 : NTFS!NtfsFspCloseInternal+0x1c9
ffffce81`ae713b00 fffff801`dbd67ac7 : 00000000`00000000 00000000`00000080 ffff978d`28026480 ffff978d`33a736c0 : nt!ExpWorkerThread+0xd8
ffffce81`ae713b90 fffff801`dbdfc9e6 : fffff801`dab51180 ffff978d`33a736c0 fffff801`dbd67a80 00000000`00000000 : nt!PspSystemThreadStartup+0x47
ffffce81`ae713be0 00000000`00000000 : ffffce81`ae714000 ffffce81`ae70d000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16


THREAD_SHA1_HASH_MOD_FUNC: 6d7927a3edc40b14cdb357e09c00f9c4d5cb7d22

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: f87803992c13ee0a0a1414319f52a06aecce77eb

THREAD_SHA1_HASH_MOD: 68ef0f0096c33eca4038053e64f4c77ce9f83484

FAULT_INSTR_CODE: 1848b70f

SYMBOL_STACK_INDEX: 0

SYMBOL_NAME: FLTMGR!FltpDeleteContextList+86

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: FLTMGR

IMAGE_NAME:  FLTMGR.SYS

DEBUG_FLR_IMAGE_TIMESTAMP: 0

IMAGE_VERSION: 10.0.15063.413

STACK_COMMAND: .cxr 0xffffce81ae712c40 ; kb

BUCKET_ID_FUNC_OFFSET: 86

FAILURE_BUCKET_ID: AV_FLTMGR!FltpDeleteContextList

BUCKET_ID: AV_FLTMGR!FltpDeleteContextList

PRIMARY_PROBLEM_CLASS: AV_FLTMGR!FltpDeleteContextList

TARGET_TIME: 2017-08-18T01:06:50.000Z

OSBUILD: 15063

OSSERVICEPACK: 540

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2017-08-01 04:23:25

BUILDDATESTAMP_STR: 160101.0800

BUILDLAB_STR: WinBuild

BUILDOSVER_STR: 10.0.15063.540

ANALYSIS_SESSION_ELAPSED_TIME: 7a7

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:av_fltmgr!fltpdeletecontextlist

FAILURE_ID_HASH: {43e99fff-500f-8d6b-330e-cd11df88a24c}

Followup: MachineOwner
---------



Microsoft (R) Windows Debugger Version 10.0.18869.1002 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\Recep Baltas\Downloads\Compressed\081817-4843-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 15063 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Machine Name:
Kernel base = 0xfffff803`0f81c000 PsLoadedModuleList = 0xfffff803`0fb685c0
Debug session time: Fri Aug 18 13:47:40.167 2017 (UTC + 3:00)
System Uptime: 0 days 2:58:15.869
Loading Kernel Symbols
.

Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.

..............................................................
................................................................
................................................................

Loading User Symbols
Loading unloaded module list
.....................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff803`0f988560 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:ffffd100`ab2ec2f0=0000000000000050
4: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffe0fd4fd001f4, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff804fb4b1934, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 2

Key : Analysis.Elapsed.Sec
Value: 23

Key : Analysis.Memory.CommitPeak.Mb
Value: 66


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 10.0.15063.540 (WinBuild.160101.0800)

SYSTEM_MANUFACTURER: System manufacturer

SYSTEM_PRODUCT_NAME: System Product Name

SYSTEM_SKU: SKU

SYSTEM_VERSION: System Version

BIOS_VENDOR: American Megatrends Inc.

BIOS_VERSION: 0906

BIOS_DATE: 03/22/2017

BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.

BASEBOARD_PRODUCT: STRIX Z270G GAMING

BASEBOARD_VERSION: Rev 1.xx

DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump

DUMP_TYPE: 2

BUGCHECK_P1: ffffe0fd4fd001f4

BUGCHECK_P2: 0

BUGCHECK_P3: fffff804fb4b1934

BUGCHECK_P4: 2

READ_ADDRESS: fffff8030fbfd358: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
ffffe0fd4fd001f4

FAULTING_IP:
IOMap64+1934
fffff804`fb4b1934 8b0482 mov eax,dword ptr [rdx+rax*4]

MM_INTERNAL_CODE: 2

CPU_COUNT: 8

CPU_MHZ: 1068

CPU_VENDOR: GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 9e

CPU_STEPPING: 9

CPU_MICROCODE: 6,9e,9,0 (F,M,S,R) SIG: 42'00000000 (cache) 42'00000000 (init)

BLACKBOXBSD: 1 (!blackboxbsd)


CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT

BUGCHECK_STR: AV

PROCESS_NAME: GpuFanHelper.e

CURRENT_IRQL: 0

ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5

ANALYSIS_SESSION_TIME: 05-19-2019 21:16:49.0968

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

TRAP_FRAME:  ffffd100ab2ec580 -- (.trap 0xffffd100ab2ec580)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000000c007d rbx=0000000000000000 rcx=0000000000000001
rdx=ffffe0fd4fa00000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff804fb4b1934 rsp=ffffd100ab2ec710 rbp=ffff8c0d80181890
r8=0000000000000000 r9=ffff8c0d80ef5b00 r10=0000000000000001
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
IOMap64+0x1934:
fffff804`fb4b1934 8b0482 mov eax,dword ptr [rdx+rax*4] ds:ffffe0fd`4fd001f4=????????
Resetting default scope

LAST_CONTROL_TRANSFER: from fffff8030f9bdfb4 to fffff8030f988560

STACK_TEXT:
ffffd100`ab2ec2e8 fffff803`0f9bdfb4 : 00000000`00000050 ffffe0fd`4fd001f4 00000000`00000000 ffffd100`ab2ec580 : nt!KeBugCheckEx
ffffd100`ab2ec2f0 fffff803`0f8a92d6 : 00000000`00000000 ffffe0fd`4fd001f4 ffffd100`ab2ec580 ffff8c0d`824c4100 : nt!MiSystemFault+0x116e84
ffffd100`ab2ec390 fffff803`0f991d72 : 00000000`00000002 00000000`00000000 ffff8c0d`824c4600 00000000`00000001 : nt!MmAccessFault+0xae6
ffffd100`ab2ec580 fffff804`fb4b1934 : ffff8c0d`7f21a938 00000000`00000000 ffff8c0d`80181740 ffff8c0d`7f21a900 : nt!KiPageFault+0x132
ffffd100`ab2ec710 ffff8c0d`7f21a938 : 00000000`00000000 ffff8c0d`80181740 ffff8c0d`7f21a900 ffff8c0d`80181890 : IOMap64+0x1934
ffffd100`ab2ec718 00000000`00000000 : ffff8c0d`80181740 ffff8c0d`7f21a900 ffff8c0d`80181890 fffff804`fb4b163d : 0xffff8c0d`7f21a938


THREAD_SHA1_HASH_MOD_FUNC: 478dd3aaec51d8bf998407944823e3ebbc8e722a

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 98c100427eea7f2845f9ac62e9b8a5b78783ad52

THREAD_SHA1_HASH_MOD: 8671a1c461e046c8f3cd570e417f7017d14e394b

FOLLOWUP_IP:
IOMap64+1934
fffff804`fb4b1934 8b0482 mov eax,dword ptr [rdx+rax*4]

FAULT_INSTR_CODE: eb82048b

SYMBOL_STACK_INDEX: 4

SYMBOL_NAME: IOMap64+1934

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: IOMap64

IMAGE_NAME:  IOMap64.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 5448513c

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 1934

FAILURE_BUCKET_ID: AV_R_INVALID_IOMap64!unknown_function

BUCKET_ID: AV_R_INVALID_IOMap64!unknown_function

PRIMARY_PROBLEM_CLASS: AV_R_INVALID_IOMap64!unknown_function

TARGET_TIME: 2017-08-18T10:47:40.000Z

OSBUILD: 15063

OSSERVICEPACK: 540

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2017-08-01 04:23:25

BUILDDATESTAMP_STR: 160101.0800

BUILDLAB_STR: WinBuild

BUILDOSVER_STR: 10.0.15063.540

ANALYSIS_SESSION_ELAPSED_TIME: 5a6d

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:av_r_invalid_iomap64!unknown_function

FAILURE_ID_HASH: {24e98ca5-f46a-9570-8c6c-621e5780430e}

Followup: MachineOwner
---------


Microsoft (R) Windows Debugger Version 10.0.18869.1002 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\Recep Baltas\Downloads\Compressed\081717-4593-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 15063 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 15063.0.amd64fre.rs2_release.170317-1834
Machine Name:
Kernel base = 0xfffff802`ac07d000 PsLoadedModuleList = 0xfffff802`ac3c95c0
Debug session time: Thu Aug 17 23:33:49.594 2017 (UTC + 3:00)
System Uptime: 0 days 0:18:38.298
Loading Kernel Symbols
.

Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.

..............................................................
................................................................
.........................................................
Loading User Symbols
Loading unloaded module list
.....
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff802`ac1e9560 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:ffffa500`068f4650=000000000000001e
6: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff804fbe33d52, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 4

Key : Analysis.Elapsed.Sec
Value: 164

Key : Analysis.Memory.CommitPeak.Mb
Value: 66


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 15063.0.amd64fre.rs2_release.170317-1834

SYSTEM_MANUFACTURER: System manufacturer

SYSTEM_PRODUCT_NAME: System Product Name

SYSTEM_SKU: SKU

SYSTEM_VERSION: System Version

BIOS_VENDOR: American Megatrends Inc.

BIOS_VERSION: 0906

BIOS_DATE: 03/22/2017

BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.

BASEBOARD_PRODUCT: STRIX Z270G GAMING

BASEBOARD_VERSION: Rev 1.xx

DUMP_TYPE: 2

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff804fbe33d52

BUGCHECK_P3: 0

BUGCHECK_P4: ffffffffffffffff

READ_ADDRESS: fffff802ac45e358: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
ffffffffffffffff

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP:
intelppm+3d52
fffff804`fbe33d52 c3 ret

EXCEPTION_PARAMETER2: ffffffffffffffff

BUGCHECK_STR: 0x1E_c0000005_R

CPU_COUNT: 8

CPU_MHZ: 1068

CPU_VENDOR: GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 9e

CPU_STEPPING: 9

CPU_MICROCODE: 6,9e,9,0 (F,M,S,R) SIG: 42'00000000 (cache) 42'00000000 (init)

BLACKBOXBSD: 1 (!blackboxbsd)


CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT

PROCESS_NAME: System

CURRENT_IRQL: 0

ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5

ANALYSIS_SESSION_TIME: 05-19-2019 21:15:42.0227

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

TRAP_FRAME:  cd4c10b67d630cd7 -- (.trap 0xcd4c10b67d630cd7)
Unable to read trap frame at cd4c10b6`7d630cd7

LAST_CONTROL_TRANSFER: from fffff802ac2780b6 to fffff802ac1e9560

STACK_TEXT:
ffffa500`068f4648 fffff802`ac2780b6 : 00000000`0000001e ffffffff`c0000005 fffff804`fbe33d52 00000000`00000000 : nt!KeBugCheckEx
ffffa500`068f4650 fffff802`ac1efa3d : fffff802`ac407000 fffff802`ac07d000 000536a0`00889000 fffff804`fbe33d52 : nt!KiFatalExceptionHandler+0x22
ffffa500`068f4690 fffff802`ac0a8d94 : 00000000`00000000 ffffa500`068f47c0 00000000`00000000 00000000`00000002 : nt!RtlpExecuteHandlerForException+0xd
ffffa500`068f46c0 fffff802`ac0a7b36 : ffffa500`068f5598 ffffa500`068f52e0 ffffa500`068f5598 ffffa500`068f5598 : nt!RtlDispatchException+0x404
ffffa500`068f4db0 fffff802`ac1f498e : 00000000`00000000 00000000`00000000 cd4c10b6`7d630cd7 00000000`00000000 : nt!KiDispatchException+0x1f6
ffffa500`068f5460 fffff802`ac1f2c34 : ffff60b7`b1d73036 00000000`00000000 00000000`00000000 ffffa500`068cd5a4 : nt!KiExceptionDispatch+0xce
ffffa500`068f5640 fffff804`fbe33d52 : 80fff804`fbe31360 9d000000`00000000 ac000000`00000000 80ff8103`4355f010 : nt!KiGeneralProtectionFault+0xf4
ffffa500`068f57d8 80fff804`fbe31360 : 9d000000`00000000 ac000000`00000000 80ff8103`4355f010 80ffa500`068c7180 : intelppm+0x3d52
ffffa500`068f57e0 9d000000`00000000 : ac000000`00000000 80ff8103`4355f010 80ffa500`068c7180 00000000`00000046 : 0x80fff804`fbe31360
ffffa500`068f57e8 ac000000`00000000 : 80ff8103`4355f010 80ffa500`068c7180 00000000`00000046 fffff802`ac0f36f9 : 0x9d000000`00000000
ffffa500`068f57f0 80ff8103`4355f010 : 80ffa500`068c7180 00000000`00000046 fffff802`ac0f36f9 00000000`00000000 : 0xac000000`00000000
ffffa500`068f57f8 80ffa500`068c7180 : 00000000`00000046 fffff802`ac0f36f9 00000000`00000000 00000000`0000006f : 0x80ff8103`4355f010
ffffa500`068f5800 00000000`00000046 : fffff802`ac0f36f9 00000000`00000000 00000000`0000006f 00000000`00000000 : 0x80ffa500`068c7180
ffffa500`068f5808 fffff802`ac0f36f9 : 00000000`00000000 00000000`0000006f 00000000`00000000 00000000`00000017 : 0x46
ffffa500`068f5810 fffff802`ac0f2f53 : 00000000`00000003 00000000`00000002 ffff8103`4355f100 00000000`00000000 : nt!PpmIdleExecuteTransition+0x619
ffffa500`068f5a80 fffff802`ac1ec5dc : 00000000`00000000 ffffa500`068c7180 ffffa500`068d3d80 ffff8103`3f576440 : nt!PoIdle+0x343
ffffa500`068f5be0 00000000`00000000 : ffffa500`068f6000 ffffa500`068ef000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x2c


THREAD_SHA1_HASH_MOD_FUNC: c2d4a7e7fd320894d9c9c4604e68b07fc7557a8f

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 74a3cb85afd865cd275703c2a7644622a404bae1

THREAD_SHA1_HASH_MOD: 8bfa170b56017b97d64f9552cea766743e2f8e1a

FOLLOWUP_IP:
intelppm+3d52
fffff804`fbe33d52 c3 ret

FAULT_INSTR_CODE: ccccccc3

SYMBOL_STACK_INDEX: 7

SYMBOL_NAME: intelppm+3d52

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: intelppm

IMAGE_NAME:  intelppm.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 0

IMAGE_VERSION: 10.0.15063.413

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 3d52

FAILURE_BUCKET_ID: 0x1E_c0000005_R_intelppm!unknown_function

BUCKET_ID: 0x1E_c0000005_R_intelppm!unknown_function

PRIMARY_PROBLEM_CLASS: 0x1E_c0000005_R_intelppm!unknown_function

TARGET_TIME: 2017-08-17T20:33:49.000Z

OSBUILD: 15063

OSSERVICEPACK: 540

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2017-08-01 04:23:25

BUILDDATESTAMP_STR: 170317-1834

BUILDLAB_STR: rs2_release

BUILDOSVER_STR: 10.0.15063.0.amd64fre.rs2_release.170317-1834

ANALYSIS_SESSION_ELAPSED_TIME: 28233

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:0x1e_c0000005_r_intelppm!unknown_function

FAILURE_ID_HASH: {d2c87d4a-7718-5900-56e8-3560bdf175c1}

Followup: MachineOwner
---------

6: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff804fbe33d52, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 3

Key : Analysis.Elapsed.Sec
Value: 3

Key : Analysis.Memory.CommitPeak.Mb
Value: 67


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 15063.0.amd64fre.rs2_release.170317-1834

SYSTEM_MANUFACTURER: System manufacturer

SYSTEM_PRODUCT_NAME: System Product Name

SYSTEM_SKU: SKU

SYSTEM_VERSION: System Version

BIOS_VENDOR: American Megatrends Inc.

BIOS_VERSION: 0906

BIOS_DATE: 03/22/2017

BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.

BASEBOARD_PRODUCT: STRIX Z270G GAMING

BASEBOARD_VERSION: Rev 1.xx

DUMP_TYPE: 2

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff804fbe33d52

BUGCHECK_P3: 0

BUGCHECK_P4: ffffffffffffffff

READ_ADDRESS: Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
ffffffffffffffff

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP:
intelppm+3d52
fffff804`fbe33d52 c3 ret

EXCEPTION_PARAMETER2: ffffffffffffffff

BUGCHECK_STR: 0x1E_c0000005_R

CPU_COUNT: 8

CPU_MHZ: 1068

CPU_VENDOR: GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 9e

CPU_STEPPING: 9

CPU_MICROCODE: 6,9e,9,0 (F,M,S,R) SIG: 42'00000000 (cache) 42'00000000 (init)

BLACKBOXBSD: 1 (!blackboxbsd)


CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT

PROCESS_NAME: System

CURRENT_IRQL: 0

ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5

ANALYSIS_SESSION_TIME: 05-19-2019 21:18:27.0974

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

TRAP_FRAME:  cd4c10b67d630cd7 -- (.trap 0xcd4c10b67d630cd7)
Unable to read trap frame at cd4c10b6`7d630cd7

LAST_CONTROL_TRANSFER: from fffff802ac2780b6 to fffff802ac1e9560

STACK_TEXT:
ffffa500`068f4648 fffff802`ac2780b6 : 00000000`0000001e ffffffff`c0000005 fffff804`fbe33d52 00000000`00000000 : nt!KeBugCheckEx
ffffa500`068f4650 fffff802`ac1efa3d : fffff802`ac407000 fffff802`ac07d000 000536a0`00889000 fffff804`fbe33d52 : nt!KiFatalExceptionHandler+0x22
ffffa500`068f4690 fffff802`ac0a8d94 : 00000000`00000000 ffffa500`068f47c0 00000000`00000000 00000000`00000002 : nt!RtlpExecuteHandlerForException+0xd
ffffa500`068f46c0 fffff802`ac0a7b36 : ffffa500`068f5598 ffffa500`068f52e0 ffffa500`068f5598 ffffa500`068f5598 : nt!RtlDispatchException+0x404
ffffa500`068f4db0 fffff802`ac1f498e : 00000000`00000000 00000000`00000000 cd4c10b6`7d630cd7 00000000`00000000 : nt!KiDispatchException+0x1f6
ffffa500`068f5460 fffff802`ac1f2c34 : ffff60b7`b1d73036 00000000`00000000 00000000`00000000 ffffa500`068cd5a4 : nt!KiExceptionDispatch+0xce
ffffa500`068f5640 fffff804`fbe33d52 : 80fff804`fbe31360 9d000000`00000000 ac000000`00000000 80ff8103`4355f010 : nt!KiGeneralProtectionFault+0xf4
ffffa500`068f57d8 80fff804`fbe31360 : 9d000000`00000000 ac000000`00000000 80ff8103`4355f010 80ffa500`068c7180 : intelppm+0x3d52
ffffa500`068f57e0 9d000000`00000000 : ac000000`00000000 80ff8103`4355f010 80ffa500`068c7180 00000000`00000046 : 0x80fff804`fbe31360
ffffa500`068f57e8 ac000000`00000000 : 80ff8103`4355f010 80ffa500`068c7180 00000000`00000046 fffff802`ac0f36f9 : 0x9d000000`00000000
ffffa500`068f57f0 80ff8103`4355f010 : 80ffa500`068c7180 00000000`00000046 fffff802`ac0f36f9 00000000`00000000 : 0xac000000`00000000
ffffa500`068f57f8 80ffa500`068c7180 : 00000000`00000046 fffff802`ac0f36f9 00000000`00000000 00000000`0000006f : 0x80ff8103`4355f010
ffffa500`068f5800 00000000`00000046 : fffff802`ac0f36f9 00000000`00000000 00000000`0000006f 00000000`00000000 : 0x80ffa500`068c7180
ffffa500`068f5808 fffff802`ac0f36f9 : 00000000`00000000 00000000`0000006f 00000000`00000000 00000000`00000017 : 0x46
ffffa500`068f5810 fffff802`ac0f2f53 : 00000000`00000003 00000000`00000002 ffff8103`4355f100 00000000`00000000 : nt!PpmIdleExecuteTransition+0x619
ffffa500`068f5a80 fffff802`ac1ec5dc : 00000000`00000000 ffffa500`068c7180 ffffa500`068d3d80 ffff8103`3f576440 : nt!PoIdle+0x343
ffffa500`068f5be0 00000000`00000000 : ffffa500`068f6000 ffffa500`068ef000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x2c


THREAD_SHA1_HASH_MOD_FUNC: c2d4a7e7fd320894d9c9c4604e68b07fc7557a8f

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 74a3cb85afd865cd275703c2a7644622a404bae1

THREAD_SHA1_HASH_MOD: 8bfa170b56017b97d64f9552cea766743e2f8e1a

FOLLOWUP_IP:
intelppm+3d52
fffff804`fbe33d52 c3 ret

FAULT_INSTR_CODE: ccccccc3

SYMBOL_STACK_INDEX: 7

SYMBOL_NAME: intelppm+3d52

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: intelppm

IMAGE_NAME:  intelppm.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 0

IMAGE_VERSION: 10.0.15063.413

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 3d52

FAILURE_BUCKET_ID: 0x1E_c0000005_R_intelppm!unknown_function

BUCKET_ID: 0x1E_c0000005_R_intelppm!unknown_function

PRIMARY_PROBLEM_CLASS: 0x1E_c0000005_R_intelppm!unknown_function

TARGET_TIME: 2017-08-17T20:33:49.000Z

OSBUILD: 15063

OSSERVICEPACK: 540

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2017-08-01 04:23:25

BUILDDATESTAMP_STR: 170317-1834

BUILDLAB_STR: rs2_release

BUILDOSVER_STR: 10.0.15063.0.amd64fre.rs2_release.170317-1834

ANALYSIS_SESSION_ELAPSED_TIME: f45

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:0x1e_c0000005_r_intelppm!unknown_function

FAILURE_ID_HASH: {d2c87d4a-7718-5900-56e8-3560bdf175c1}

Followup: MachineOwner
---------


Microsoft (R) Windows Debugger Version 10.0.18869.1002 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\Recep Baltas\Downloads\Compressed\081817-4531-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 15063 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 15063.0.amd64fre.rs2_release.170317-1834
Machine Name:
Kernel base = 0xfffff800`3327d000 PsLoadedModuleList = 0xfffff800`335c95c0
Debug session time: Fri Aug 18 10:48:39.801 2017 (UTC + 3:00)
System Uptime: 0 days 5:27:47.118
Loading Kernel Symbols
.

Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.

..............................................................
................................................................
............................................................
Loading User Symbols
Loading unloaded module list
..................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff800`333e9560 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:ffffb700`9b6a32f0=0000000000000050
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffb7009f7bb008, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff8011c691966, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000000, (reserved)

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for IOMap64.sys

Could not read faulting driver name

KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 2

Key : Analysis.Elapsed.Sec
Value: 4

Key : Analysis.Memory.CommitPeak.Mb
Value: 66


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 15063.0.amd64fre.rs2_release.170317-1834

SYSTEM_MANUFACTURER: System manufacturer

SYSTEM_PRODUCT_NAME: System Product Name

SYSTEM_SKU: SKU

SYSTEM_VERSION: System Version

BIOS_VENDOR: American Megatrends Inc.

BIOS_VERSION: 0906

BIOS_DATE: 03/22/2017

BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.

BASEBOARD_PRODUCT: STRIX Z270G GAMING

BASEBOARD_VERSION: Rev 1.xx

DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump

DUMP_TYPE: 2

BUGCHECK_P1: ffffb7009f7bb008

BUGCHECK_P2: 0

BUGCHECK_P3: fffff8011c691966

BUGCHECK_P4: 0

READ_ADDRESS: fffff8003365e358: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
ffffb7009f7bb008

FAULTING_IP:
IOMap64+1966
fffff801`1c691966 0fb60410 movzx eax,byte ptr [rax+rdx]

MM_INTERNAL_CODE: 0

CPU_COUNT: 8

CPU_MHZ: 1068

CPU_VENDOR: GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 9e

CPU_STEPPING: 9

CPU_MICROCODE: 6,9e,9,0 (F,M,S,R) SIG: 42'00000000 (cache) 42'00000000 (init)

BLACKBOXBSD: 1 (!blackboxbsd)


CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT

BUGCHECK_STR: AV

PROCESS_NAME: AsRogAuraGpuDl

CURRENT_IRQL: 2

ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5

ANALYSIS_SESSION_TIME: 05-19-2019 21:16:45.0306

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

TRAP_FRAME:  ffffb7009b6a3580 -- (.trap 0xffffb7009b6a3580)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000008 rbx=0000000000000000 rcx=0000000000000000
rdx=ffffb7009f7bb000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8011c691966 rsp=ffffb7009b6a3710 rbp=ffff84832dcc59e0
r8=0000000000000000 r9=ffff84832f277d80 r10=0000000000000001
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
IOMap64+0x1966:
fffff801`1c691966 0fb60410 movzx eax,byte ptr [rax+rdx] ds:ffffb700`9f7bb008=??
Resetting default scope

LAST_CONTROL_TRANSFER: from fffff8003341ed8a to fffff800333e9560

STACK_TEXT:
ffffb700`9b6a32e8 fffff800`3341ed8a : 00000000`00000050 ffffb700`9f7bb008 00000000`00000000 ffffb700`9b6a3580 : nt!KeBugCheckEx
ffffb700`9b6a32f0 fffff800`3330a2d6 : 00000000`00000000 ffffb700`9f7bb008 ffffb700`9b6a3580 ffff8483`2e031080 : nt!MiSystemFault+0x116c5a
ffffb700`9b6a3390 fffff800`333f2d72 : 00000000`00000002 00000000`00000000 ffff8483`2e031580 00000000`00000001 : nt!MmAccessFault+0xae6
ffffb700`9b6a3580 fffff801`1c691966 : ffff8483`2d508b88 00000000`00000000 ffff8483`2dcc5890 ffff8483`2d508b50 : nt!KiPageFault+0x132
ffffb700`9b6a3710 ffff8483`2d508b88 : 00000000`00000000 ffff8483`2dcc5890 ffff8483`2d508b50 ffff8483`2dcc59e0 : IOMap64+0x1966
ffffb700`9b6a3718 00000000`00000000 : ffff8483`2dcc5890 ffff8483`2d508b50 ffff8483`2dcc59e0 fffff801`1c69163d : 0xffff8483`2d508b88


THREAD_SHA1_HASH_MOD_FUNC: 478dd3aaec51d8bf998407944823e3ebbc8e722a

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: cf1dd2499bebcbb5f32ce877d3afb4336606b22f

THREAD_SHA1_HASH_MOD: 8671a1c461e046c8f3cd570e417f7017d14e394b

FOLLOWUP_IP:
IOMap64+1966
fffff801`1c691966 0fb60410 movzx eax,byte ptr [rax+rdx]

FAULT_INSTR_CODE: 1004b60f

SYMBOL_STACK_INDEX: 4

SYMBOL_NAME: IOMap64+1966

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: IOMap64

IMAGE_NAME:  IOMap64.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 5448513c

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 1966

FAILURE_BUCKET_ID: AV_R_INVALID_IOMap64!unknown_function

BUCKET_ID: AV_R_INVALID_IOMap64!unknown_function

PRIMARY_PROBLEM_CLASS: AV_R_INVALID_IOMap64!unknown_function

TARGET_TIME: 2017-08-18T07:48:39.000Z

OSBUILD: 15063

OSSERVICEPACK: 540

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2017-08-01 04:23:25

BUILDDATESTAMP_STR: 170317-1834

BUILDLAB_STR: rs2_release

BUILDOSVER_STR: 10.0.15063.0.amd64fre.rs2_release.170317-1834

ANALYSIS_SESSION_ELAPSED_TIME: fb8

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:av_r_invalid_iomap64!unknown_function

FAILURE_ID_HASH: {24e98ca5-f46a-9570-8c6c-621e5780430e}

Followup: MachineOwner
---------


KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff803f070ca43, The address that the exception occurred at
Arg3: ffffffffffffffff, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception

Debugging Details:
------------------

DBGHELP: Timeout to store: C:\ProgramData\Dbg\sym*https://msdl.microsoft.com/download/symbols

KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 2

Key : Analysis.Elapsed.Sec
Value: 65

Key : Analysis.Memory.CommitPeak.Mb
Value: 66


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 10.0.15063.540 (WinBuild.160101.0800)

DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump

DUMP_TYPE: 2

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff803f070ca43

BUGCHECK_P3: ffffffffffffffff

BUGCHECK_P4: 0

WRITE_ADDRESS: fffff803f0a7c358: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
0000000000000000

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP:
nt!KiTimerWaitTest+b3
fffff803`f070ca43 f0480fba6d4000 lock bts qword ptr [rbp+40h],0

EXCEPTION_PARAMETER1: ffffffffffffffff

BUGCHECK_STR: 0x1E_c0000005

CPU_COUNT: 8

CPU_MHZ: 1068

CPU_VENDOR: GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 9e

CPU_STEPPING: 9

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT

PROCESS_NAME: System

CURRENT_IRQL: 2

ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5

ANALYSIS_SESSION_TIME: 05-19-2019 21:16:53.0051

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

TRAP_FRAME:  ffffb501972b1230 -- (.trap 0xffffb501972b1230)
Unable to read trap frame at ffffb501`972b1230

LAST_CONTROL_TRANSFER: from fffff803f08960b6 to fffff803f0807560

STACK_TEXT:
fffff803`f285b6b8 fffff803`f08960b6 : 00000000`0000001e ffffffff`c0000005 fffff803`f070ca43 ffffffff`ffffffff : nt!KeBugCheckEx
fffff803`f285b6c0 fffff803`f080da3d : fffff803`f0a25000 fffff803`f069b000 000536a0`00889000 ffffb501`954b1a98 : nt!KiFatalExceptionHandler+0x22
fffff803`f285b700 fffff803`f06c6d94 : 00000000`00000000 fffff803`f285b830 00000000`00000000 fffff807`faf3b9b6 : nt!RtlpExecuteHandlerForException+0xd
fffff803`f285b730 fffff803`f06c5b36 : fffff803`f285c608 fffff803`f285c350 fffff803`f285c608 fffff803`f285c608 : nt!RtlDispatchException+0x404
fffff803`f285be20 fffff803`f081298e : 00000000`00000000 00000000`00000000 ffffb501`972b1230 fffff807`f9c56a0b : nt!KiDispatchException+0x1f6
fffff803`f285c4d0 fffff803`f0810b05 : 00000000`00000000 00000300`20100000 2d6a319b`22fc77a2 cc1b5953`ae6ab4a1 : nt!KiExceptionDispatch+0xce
fffff803`f285c6b0 fffff803`f070ca43 : 00000500`000005d0 ffffb501`8f695000 00000000`00000100 ffffffff`00000000 : nt!KiStackFault+0x105
fffff803`f285c840 fffff803`f070c6ff : fffff803`ef569180 ffffb501`00000000 fffff803`f285ca98 00000000`00000003 : nt!KiTimerWaitTest+0xb3
fffff803`f285c8f0 fffff803`f070d707 : fffff803`ef569180 00000000`003e95c2 00000000`00000000 00000000`000131bb : nt!KiProcessExpiredTimerList+0xaf
fffff803`f285c9e0 fffff803`f080a60a : 00000000`00000000 fffff803`ef569180 00000000`001a6fe0 fffff803`f0a94a40 : nt!KiRetireDpcList+0x367
fffff803`f285cbe0 00000000`00000000 : fffff803`f285d000 fffff803`f2856000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x5a


THREAD_SHA1_HASH_MOD_FUNC: e35a957f93ce65caabf319c76ce5221cbfaffe50

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 2887175b5f3da4f48c8e58cc466ab0d4aac81424

THREAD_SHA1_HASH_MOD: b28610981796779b4ac02f58898fde25728a775c

FOLLOWUP_IP:
nt!KiTimerWaitTest+b3
fffff803`f070ca43 f0480fba6d4000 lock bts qword ptr [rbp+40h],0

FAULT_INSTR_CODE: ba0f48f0

SYMBOL_STACK_INDEX: 7

SYMBOL_NAME: nt!KiTimerWaitTest+b3

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP: 597fd80d

IMAGE_VERSION: 10.0.15063.540

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: b3

FAILURE_BUCKET_ID: 0x1E_c0000005_nt!KiTimerWaitTest

BUCKET_ID: 0x1E_c0000005_nt!KiTimerWaitTest

PRIMARY_PROBLEM_CLASS: 0x1E_c0000005_nt!KiTimerWaitTest

TARGET_TIME: 2017-08-17T21:45:22.000Z

OSBUILD: 15063

OSSERVICEPACK: 540

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2017-08-01 04:23:25

BUILDDATESTAMP_STR: 160101.0800

BUILDLAB_STR: WinBuild

BUILDOSVER_STR: 10.0.15063.540

ANALYSIS_SESSION_ELAPSED_TIME: fe8b

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:0x1e_c0000005_nt!kitimerwaittest

FAILURE_ID_HASH: {0b1bac46-2a62-8b1e-2945-6087e0228943}

Followup: MachineOwner
---------


SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80189709cf9, Address of the instruction which caused the bugcheck
Arg3: ffff8b006234ef50, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 2

Key : Analysis.Elapsed.Sec
Value: 2

Key : Analysis.Memory.CommitPeak.Mb
Value: 66


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 10.0.15063.540 (WinBuild.160101.0800)

SYSTEM_MANUFACTURER: System manufacturer

SYSTEM_PRODUCT_NAME: System Product Name

SYSTEM_SKU: SKU

SYSTEM_VERSION: System Version

BIOS_VENDOR: American Megatrends Inc.

BIOS_VERSION: 0906

BIOS_DATE: 03/22/2017

BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.

BASEBOARD_PRODUCT: STRIX Z270G GAMING

BASEBOARD_VERSION: Rev 1.xx

DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump

DUMP_TYPE: 2

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff80189709cf9

BUGCHECK_P3: ffff8b006234ef50

BUGCHECK_P4: 0

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP:
nt!KiTryUnwaitThread+e9
fffff801`89709cf9 f0480fbaaf1059000000 lock bts qword ptr [rdi+5910h],0

CONTEXT:  ffff8b006234ef50 -- (.cxr 0xffff8b006234ef50)
rax=0000000000000001 rbx=ffffcb8519139080 rcx=0000000000000000
rdx=ffffcb85191391c0 rsi=ffffcb85191391c0 rdi=7fff8b005d540180
rip=fffff80189709cf9 rsp=ffff8b006234f940 rbp=ffff8b005d643180
r8=0000000000000000 r9=0000000000000000 r10=fffff80189b4b100
r11=ffffba0981777480 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202
nt!KiTryUnwaitThread+0xe9:
fffff801`89709cf9 f0480fbaaf1059000000 lock bts qword ptr [rdi+5910h],0 ds:002b:7fff8b00`5d545a90=????????????????
Resetting default scope

BUGCHECK_STR: 0x3B_c0000005

CPU_COUNT: 8

CPU_MHZ: 1068

CPU_VENDOR: GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 9e

CPU_STEPPING: 9

CPU_MICROCODE: 6,9e,9,0 (F,M,S,R) SIG: 42'00000000 (cache) 42'00000000 (init)

BLACKBOXBSD: 1 (!blackboxbsd)


CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT

PROCESS_NAME: audiodg.exe

CURRENT_IRQL: 2

ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5

ANALYSIS_SESSION_TIME: 05-19-2019 21:17:51.0407

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

LAST_CONTROL_TRANSFER: from fffff80189708079 to fffff80189709cf9

STACK_TEXT:
ffff8b00`6234f940 fffff801`89708079 : ffffcb85`16e81060 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiTryUnwaitThread+0xe9
ffff8b00`6234f9a0 fffff801`89b4b222 : 0000004e`75effa58 00000000`00000000 0000004e`75effa01 00000000`00000000 : nt!KeSetEvent+0x129
ffff8b00`6234fa30 fffff801`89812413 : ffffcb85`106227c0 00000000`01b03d1a 00000000`00000000 ffffcb85`16e81060 : nt!NtSetEvent+0x92
ffff8b00`6234fa80 00007ffb`d9225564 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
0000004e`75effbc8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`d9225564


THREAD_SHA1_HASH_MOD_FUNC: 44d6e36e19ba605184aa0576aa8a9b801de5022e

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: d595dbc7873d9236bdfe3d01760c0c9a38794a63

THREAD_SHA1_HASH_MOD: d084f7dfa548ce4e51810e4fd5914176ebc66791

FOLLOWUP_IP:
nt!KiTryUnwaitThread+e9
fffff801`89709cf9 f0480fbaaf1059000000 lock bts qword ptr [rdi+5910h],0

FAULT_INSTR_CODE: ba0f48f0

SYMBOL_STACK_INDEX: 0

SYMBOL_NAME: nt!KiTryUnwaitThread+e9

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP: 597fd80d

IMAGE_VERSION: 10.0.15063.540

STACK_COMMAND: .cxr 0xffff8b006234ef50 ; kb

BUCKET_ID_FUNC_OFFSET: e9

FAILURE_BUCKET_ID: 0x3B_c0000005_nt!KiTryUnwaitThread

BUCKET_ID: 0x3B_c0000005_nt!KiTryUnwaitThread

PRIMARY_PROBLEM_CLASS: 0x3B_c0000005_nt!KiTryUnwaitThread

TARGET_TIME: 2017-08-17T22:30:13.000Z

OSBUILD: 15063

OSSERVICEPACK: 540

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2017-08-01 04:23:25

BUILDDATESTAMP_STR: 160101.0800

BUILDLAB_STR: WinBuild

BUILDOSVER_STR: 10.0.15063.540

ANALYSIS_SESSION_ELAPSED_TIME: 89f

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:0x3b_c0000005_nt!kitryunwaitthread

FAILURE_ID_HASH: {5d7ff845-c6aa-f56d-5e43-2409865be7c6}

Followup: MachineOwner
---------


KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff803fa85ac94, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 4

Key : Analysis.Elapsed.Sec
Value: 85

Key : Analysis.Memory.CommitPeak.Mb
Value: 66


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 15063.0.amd64fre.rs2_release.170317-1834

SYSTEM_MANUFACTURER: System manufacturer

SYSTEM_PRODUCT_NAME: System Product Name

SYSTEM_SKU: SKU

SYSTEM_VERSION: System Version

BIOS_VENDOR: American Megatrends Inc.

BIOS_VERSION: 0906

BIOS_DATE: 03/22/2017

BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.

BASEBOARD_PRODUCT: STRIX Z270G GAMING

BASEBOARD_VERSION: Rev 1.xx

DUMP_TYPE: 2

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff803fa85ac94

BUGCHECK_P3: 0

BUGCHECK_P4: ffffffffffffffff

READ_ADDRESS: fffff803fabeb358: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
ffffffffffffffff

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP:
nt!KxWaitForLockOwnerShip+14
fffff803`fa85ac94 48890a mov qword ptr [rdx],rcx

EXCEPTION_PARAMETER2: ffffffffffffffff

BUGCHECK_STR: 0x1E_c0000005_R

CPU_COUNT: 8

CPU_MHZ: 1068

CPU_VENDOR: GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 9e

CPU_STEPPING: 9

CPU_MICROCODE: 6,9e,9,0 (F,M,S,R) SIG: 42'00000000 (cache) 42'00000000 (init)

BLACKBOXBSD: 1 (!blackboxbsd)


CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT

PROCESS_NAME: System

CURRENT_IRQL: 2

ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5

ANALYSIS_SESSION_TIME: 05-19-2019 21:15:48.0177

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

LAST_CONTROL_TRANSFER: from fffff803faa050b6 to fffff803fa976560

STACK_TEXT:
fffff803`fca5b378 fffff803`faa050b6 : 00000000`0000001e ffffffff`c0000005 fffff803`fa85ac94 00000000`00000000 : nt!KeBugCheckEx
fffff803`fca5b380 fffff803`fa97ca3d : fffff803`fab94000 fffff803`fa80a000 000536a0`00889000 ffffaf06`c7f34330 : nt!KiFatalExceptionHandler+0x22
fffff803`fca5b3c0 fffff803`fa835d94 : 00000000`00000000 fffff803`fca5b4f0 00000000`00000000 fffff80d`ee71fa00 : nt!RtlpExecuteHandlerForException+0xd
fffff803`fca5b3f0 fffff803`fa834b36 : fffff803`fca5c2c8 fffff803`fca5c010 fffff803`fca5c2c8 fffff803`fca5c2c8 : nt!RtlDispatchException+0x404
fffff803`fca5bae0 fffff803`fa98198e : fffff803`fca5c318 ffffaf06`ccc77110 ffffaf06`cb638010 00000000`00000103 : nt!KiDispatchException+0x1f6
fffff803`fca5c190 fffff803`fa97fc34 : ffffaf06`cc5e7000 fffff80d`eea27460 ffffaf06`00000000 ffffaf06`cc5e7000 : nt!KiExceptionDispatch+0xce
fffff803`fca5c370 fffff803`fa85ac94 : 00000000`00000000 00000000`ffffffff 00000000`00000000 fffff80d`eea9decb : nt!KiGeneralProtectionFault+0xf4
fffff803`fca5c500 fffff803`fa85ac64 : ffffaf06`d06fd010 fffff803`fca5c5b0 00000000`00000001 fffff80d`eea398ab : nt!KxWaitForLockOwnerShip+0x14
fffff803`fca5c530 fffff80d`ee86909a : ffffaf06`cc5e4000 fffff80d`eea3b1bc fffff803`fca5c5b0 00000000`00000001 : nt!KeAcquireInStackQueuedSpinLock+0x44
fffff803`fca5c560 ffffaf06`cc5e4000 : fffff80d`eea3b1bc fffff803`fca5c5b0 00000000`00000001 00000000`00000000 : nvlddmkm+0x1909a
fffff803`fca5c568 fffff80d`eea3b1bc : fffff803`fca5c5b0 00000000`00000001 00000000`00000000 ffffaf06`d06fd021 : 0xffffaf06`cc5e4000
fffff803`fca5c570 fffff803`fca5c5b0 : 00000000`00000001 00000000`00000000 ffffaf06`d06fd021 ffffaf06`cc5e7002 : nvlddmkm+0x1eb1bc
fffff803`fca5c578 00000000`00000001 : 00000000`00000000 ffffaf06`d06fd021 ffffaf06`cc5e7002 fffff80d`eea39f9d : 0xfffff803`fca5c5b0
fffff803`fca5c580 00000000`00000000 : ffffaf06`d06fd021 ffffaf06`cc5e7002 fffff80d`eea39f9d ffffaf06`cd139000 : 0x1


THREAD_SHA1_HASH_MOD_FUNC: 5d53fe4f1eaa8ef1f500257d8ec119fca26fb691

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: c56152d95445bc86e980d87f07a878a34894a8c9

THREAD_SHA1_HASH_MOD: 86cfe786c39c0221c86306f07cc8f475ea91d71b

FOLLOWUP_IP:
nt!KxWaitForLockOwnerShip+14
fffff803`fa85ac94 48890a mov qword ptr [rdx],rcx

FAULT_INSTR_CODE: 660a8948

SYMBOL_STACK_INDEX: 7

SYMBOL_NAME: nt!KxWaitForLockOwnerShip+14

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP: 597fd80d

IMAGE_VERSION: 10.0.15063.540

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 14

FAILURE_BUCKET_ID: 0x1E_c0000005_R_nt!KxWaitForLockOwnerShip

BUCKET_ID: 0x1E_c0000005_R_nt!KxWaitForLockOwnerShip

PRIMARY_PROBLEM_CLASS: 0x1E_c0000005_R_nt!KxWaitForLockOwnerShip

TARGET_TIME: 2017-08-17T13:52:00.000Z

OSBUILD: 15063

OSSERVICEPACK: 540

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2017-08-01 04:23:25

BUILDDATESTAMP_STR: 170317-1834

BUILDLAB_STR: rs2_release

BUILDOSVER_STR: 10.0.15063.0.amd64fre.rs2_release.170317-1834

ANALYSIS_SESSION_ELAPSED_TIME: 14edb

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:0x1e_c0000005_r_nt!kxwaitforlockownership

FAILURE_ID_HASH: {46e638f9-c452-7fad-a26d-265733d49ab4}

Followup: MachineOwner
---------
 
Bu siteyi kullanmak için çerezler gereklidir. Siteyi kullanmaya devam etmek için çerezleri kabul etmelisiniz. Daha Fazlasını Öğren.…