Windows 10: Help with BSOD!!!!!

Discus and support Help with BSOD!!!!! in Windows 10 BSOD Crashes and Debugging to solve the problem; Okay so this is what who crashed says. On Thu 2/23/2017 2:41:17 AM GMT your computer crashed crash dump file:... Discussion in 'Windows 10 BSOD Crashes and Debugging' started by Redbatman, Feb 22, 2017.

  1. Redbatman Win User

    Help with BSOD!!!!!


    Okay so this is what who crashed says.

    On Thu 2/23/2017 2:41:17 AM GMT your computer crashed
    crash dump file: C:\WINDOWS\Minidump\022217-21250-01.dmp
    This was probably caused by the following module: ntoskrnl.exe (nt+0x14A6F0)
    Bugcheck code: 0x139 (0x3, 0xFFFFA2005E012610, 0xFFFFA2005E012568, 0x0)
    Error: KERNEL_SECURITY_CHECK_FAILURE
    file path: C:\WINDOWS\system32\ntoskrnl.exe
    product: Microsoft® Windows® Operating System
    company: Microsoft Corporation
    description: NT Kernel & System
    Bug check description: The kernel has detected the corruption of a critical data structure.
    The crash took place in the Windows kernel. Possibly this problem is caused by another driver that cannot be identified at this time.

    What should I do?



    :)
     
    Redbatman, Feb 22, 2017
    #1

  2. Need help with BSOD, daily BSOD errors

    Hello,

    My system reboots multiple times a day cause of a BSOD.

    I update BIOS to latest version.

    Did run MemTest86 to check if there is any faulty memory. Nothing was found. To be sure I renewed both memory sims. Still the error occurs.

    Now I have this WinDB check but need some help with it.

    Who can point me to the right direction?

    Thank you

    Best regards,

    Michel

    Microsoft (R) Windows Debugger Version 10.0.10586.567 AMD64

    Copyright (c) Microsoft Corporation. All rights reserved.

    Loading Dump File [C:\Windows\MEMORY.DMP]

    Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.

    ************* Symbol Path validation summary **************

    Response Time (ms) Location

    Deferred SRV*C:\Windows\symbol_cache*Symbol information

    Symbol search path is: SRV*C:\Windows\symbol_cache*Symbol information

    Executable search path is:

    Windows 10 Kernel Version 14393 MP (4 procs) Free x64

    Product: WinNt, suite: TerminalServer SingleUserTS

    Built by: 14393.321.amd64fre.rs1_release_inmarket.161004-2338

    Machine Name:

    Kernel base = 0xfffff802`97090000 PsLoadedModuleList = 0xfffff802`97394080

    Debug session time: Wed Oct 26 20:25:13.839 2016 (UTC + 2:00)

    System Uptime: 0 days 14:01:52.513

    Loading Kernel Symbols

    ...............................................................

    ................................................................

    ................................................................

    ...............

    Loading User Symbols

    PEB is paged out (Peb.Ldr = 000000ab`28d7b018). Type ".hh dbgerr001" for details

    Loading unloaded module list

    .......................

    *******************************************************************************

    * *

    * Bugcheck Analysis *

    * *

    *******************************************************************************

    Use !analyze -v to get detailed debugging information.

    BugCheck 50, {ffff804af9e6b860, 0, fffff80b3ed6c59f, 2}

    *** ERROR: Module load completed but symbols could not be loaded for cbfs5.sys

    Probably caused by : memory_corruption

    Followup: memory_corruption

    ---------

    2: kd> !analyze -v

    *******************************************************************************

    * *

    * Bugcheck Analysis *

    * *

    *******************************************************************************

    PAGE_FAULT_IN_NONPAGED_AREA (50)

    Invalid system memory was referenced. This cannot be protected by try-except.

    Typically the address is just plain bad or it is pointing at freed memory.

    Arguments:

    Arg1: ffff804af9e6b860, memory referenced.

    Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.

    Arg3: fffff80b3ed6c59f, If non-zero, the instruction address which referenced the bad memory

    address.

    Arg4: 0000000000000002, (reserved)

    Debugging Details:

    ------------------

    DUMP_CLASS: 1

    DUMP_QUALIFIER: 401

    BUILD_VERSION_STRING: 14393.321.amd64fre.rs1_release_inmarket.161004-2338

    SYSTEM_MANUFACTURER: Gigabyte Technology Co., Ltd.

    SYSTEM_PRODUCT_NAME: B85M-HD3

    SYSTEM_SKU: To be filled by O.E.M.

    SYSTEM_VERSION: To be filled by O.E.M.

    BIOS_VENDOR: American Megatrends Inc.

    BIOS_VERSION: F12

    BIOS_DATE: 08/13/2015

    BASEBOARD_MANUFACTURER: Gigabyte Technology Co., Ltd.

    BASEBOARD_PRODUCT: B85M-HD3

    BASEBOARD_VERSION: x.x

    DUMP_TYPE: 1

    BUGCHECK_P1: ffff804af9e6b860

    BUGCHECK_P2: 0

    BUGCHECK_P3: fffff80b3ed6c59f

    BUGCHECK_P4: 2

    READ_ADDRESS: ffff804af9e6b860

    FAULTING_IP:

    NTFS!NtfsFindPrefixHashEntry+1df

    fffff80b`3ed6c59f 44394710 cmp dword ptr [rdi+10h],r8d

    MM_INTERNAL_CODE: 2

    DEBUG_FLR_IMAGE_TIMESTAMP: 0

    FAULTING_MODULE: fffff80b3ec70000 NTFS

    CPU_COUNT: 4

    CPU_MHZ: c79

    CPU_VENDOR: GenuineIntel

    CPU_FAMILY: 6

    CPU_MODEL: 3c

    CPU_STEPPING: 3

    CPU_MICROCODE: 6,3c,3,0 (F,M,S,R) SIG: 1E'00000000 (cache) 1E'00000000 (init)

    DEFAULT_BUCKET_ID: CODE_CORRUPTION

    BUGCHECK_STR: AV

    PROCESS_NAME: ekrn.exe

    CURRENT_IRQL: 0

    ANALYSIS_SESSION_HOST: MKA1

    ANALYSIS_SESSION_TIME: 10-26-2016 20:43:17.0239

    ANALYSIS_VERSION: 10.0.10586.567 amd64fre

    TRAP_FRAME: ffffcd81042b09b0 -- (.trap 0xffffcd81042b09b0)

    NOTE: The trap frame does not contain all registers.

    Some register values may be zeroed or incorrect.

    rax=ffff800ae96bf000 rbx=0000000000000000 rcx=0000000000000000

    rdx=0000000000000003 rsi=0000000000000000 rdi=0000000000000000

    rip=fffff80b3ed6c59f rsp=ffffcd81042b0b40 rbp=0000000000000000

    r8=000000003a56041d r9=000000000fca8be7 r10=ffff800af06a6360

    r11=ffffcd81042b0c48 r12=0000000000000000 r13=0000000000000000

    r14=0000000000000000 r15=0000000000000000

    iopl=0 nv up ei pl nz na po nc

    NTFS!NtfsFindPrefixHashEntry+0x1df:

    fffff80b`3ed6c59f 44394710 cmp dword ptr [rdi+10h],r8d ds:00000000`00000010=????????

    Resetting default scope

    LAST_CONTROL_TRANSFER: from fffff8029720f6da to fffff802971da2c0

    STACK_TEXT:

    ffffcd81`042b06b8 fffff802`9720f6da : 00000000`00000050 ffff804a`f9e6b860 00000000`00000000 ffffcd81`042b09b0 : nt!KeBugCheckEx

    ffffcd81`042b06c0 fffff802`9710100a : 00000000`00000000 00000000`00000000 ffffcd81`042b09b0 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x2624a

    ffffcd81`042b07b0 fffff802`971e38fc : ffffb989`09090a09 fffff80b`3ec8eb38 ffffb989`73e26f02 ffff800a`e8e9e150 : nt!MmAccessFault+0x9ca

    ffffcd81`042b09b0 fffff80b`3ed6c59f : ffffb989`6da47180 ffffcd81`00000002 ffffb989`799fd080 ffffb989`6da484f8 : nt!KiPageFault+0x13c

    ffffcd81`042b0b40 fffff80b`3ed6b92b : ffffb989`6e56b508 ffffb989`6da484f8 ffff800a`df140150 00000000`00000001 : NTFS!NtfsFindPrefixHashEntry+0x1df

    ffffcd81`042b0c50 fffff80b`3ed686ce : ffffb989`6e56b508 ffffb989`7428ba60 ffffb989`6e56b508 ffffcd81`042b0e88 : NTFS!NtfsFindStartingNode+0x2cb

    ffffcd81`042b0d10 fffff80b`3ed67fad : ffffb989`6e56b508 ffffb989`7428ba60 ffffcd81`053cd190 ffffb989`7ce27000 : NTFS!NtfsCommonCreate+0x43e

    ffffcd81`042b0f50 fffff802`971dd157 : ffffcd81`053cd120 ffffb989`7a4deb20 00000000`00000012 00000000`0178d818 : NTFS!NtfsCommonCreateCallout+0x1d

    ffffcd81`042b0f80 fffff802`971dd11d : 00000000`00006000 ffffcd81`042b1000 ffffb989`799fd080 fffff802`970e70c4 : nt!KxSwitchKernelStackCallout+0x27

    ffffcd81`053ccf60 fffff802`970e70c4 : 00000000`00000006 00000000`00006000 fffff802`9744a3c0 fffff802`9713d0aa : nt!KiSwitchKernelStackContinue

    ffffcd81`053ccf80 fffff802`970e6e36 : ffffcd81`053c8000 00000000`00006000 00000000`00000000 ffffcd81`053cd000 : nt!KiExpandKernelStackAndCalloutOnStackSegment+0x134

    ffffcd81`053cd000 fffff802`970e6cff : 00000000`00000000 ffffcd81`053cd120 00000000`00000001 ffffb989`7428ba60 : nt!KiExpandKernelStackAndCalloutSwitchStack+0xa6

    ffffcd81`053cd060 fffff80b`3ed67aa0 : 00000000`00000000 00000000`00000000 ffffb989`6e56b508 ffffb989`7428ba60 : nt!KeExpandKernelStackAndCalloutInternal+0x2f

    ffffcd81`053cd0b0 fffff80b`3e595206 : ffffb989`6da47030 ffffb989`7428ba60 ffffcd81`053cd300 ffffb989`79da8300 : NTFS!NtfsFsdCreate+0x1c0

    ffffcd81`053cd2d0 fffff80b`3e5c4065 : fffff80b`3e5b4060 00000000`00000040 00000000`00000001 00000000`00000040 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x1a6

    ffffcd81`053cd360 fffff80b`40dc2bf4 : 00000000`00003100 00000000`00003128 ffffb989`00000040 00000000`00000000 : FLTMGR!FltpCreate+0x2f5

    ffffcd81`053cd410 fffff80b`40dc10f1 : 00000000`00000005 ffffb989`792308c0 ffffb989`7428ba60 ffffb989`7428bfb0 : cbfs5+0x2bf4

    ffffcd81`053cd440 fffff802`974e8144 : 00000000`00000005 ffffcd81`053cd750 ffffb989`792308c0 ffffb989`00000000 : cbfs5+0x10f1

    ffffcd81`053cd480 fffff802`97528542 : fffff802`974e7780 fffff802`974e7780 ffffcd81`053cd750 ffffb989`713bb770 : nt!IopParseDevice+0x9c4

    ffffcd81`053cd650 fffff802`974ec28d : ffffb989`7c3ec001 ffffcd81`053cd8b0 00000000`00000040 ffffb989`6db39b00 : nt!ObpLookupObjectName+0x8b2

    ffffcd81`053cd820 fffff802`974cf069 : 00000000`00000001 ffffb989`79c272f8 000000ca`c15e5818 00000000`00000028 : nt!ObOpenObjectByNameEx+0x1dd

    ffffcd81`053cd960 fffff802`974cec79 : 000000ca`c15e57a0 00470065`006e0069 000000ca`c15e5818 000000ca`c15e57b8 : nt!IopCreateFile+0x3d9

    ffffcd81`053cda00 fffff802`971e4f93 : 00000000`00000f44 fffff802`974ffe8b 00000000`00000000 00000000`00000000 : nt!NtCreateFile+0x79

    ffffcd81`053cda90 00007ff9`f84158f4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13

    000000ca`c15e5728 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`f84158f4

    STACK_COMMAND: kb

    CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt

    fffff80297091594-fffff80297091595 2 bytes - nt!MiDuplicateCloneLeaf+38

    [ 80 fa:00 df ]

    fffff80297098bda-fffff80297098bdb 2 bytes - nt!MiCloneReserveVadCommit+62 (+0x7646)

    [ 80 f6:00 ed ]

    fffff80297098c63-fffff80297098c64 2 bytes - nt!MiCloneReserveVadCommit+eb (+0x89)

    [ 80 f6:00 ed ]

    fffff8029709e53f-fffff8029709e540 2 bytes - nt!MiFlushDirtyBitsToPfn+73 (+0x58dc)

    [ 80 f6:00 ed ]

    fffff8029709e598-fffff8029709e599 2 bytes - nt!MiFlushDirtyBitsToPfn+cc (+0x59)

    [ 80 f6:00 ed ]

    fffff8029709e67e-fffff8029709e67f 2 bytes - nt!MiFlushDirtyBitsToPfn+1b2 (+0xe6)

    [ 80 fa:00 df ]

    fffff802970a3f3c-fffff802970a3f3d 2 bytes - nt!MiExchangeWsle+54 (+0x58be)

    [ 80 f6:00 ed ]

    fffff802970a3f82-fffff802970a3f83 2 bytes - nt!MiExchangeWsle+9a (+0x46)

    [ 80 fa:00 df ]

    fffff802970a4276-fffff802970a4277 2 bytes - nt!MiAllocateContiguousMemory+226 (+0x2f4)

    [ 80 fa:00 df ]

    fffff802970a42ab-fffff802970a42ac 2 bytes - nt!MiAllocateContiguousMemory+25b (+0x35)

    [ 80 f6:00 ed ]

    fffff802970a4631-fffff802970a4632 2 bytes - nt!MmUnmapIoSpace+71 (+0x386)

    [ 80 f6:00 ed ]

    fffff802970a4704-fffff802970a4705 2 bytes - nt!MiZeroAndFlushPtes+40 (+0xd3)

    [ 80 f6:00 ed ]

    fffff802970a4816-fffff802970a4817 2 bytes - nt!MiZeroAndFlushPtes+152 (+0x112)

    [ 80 f6:00 ed ]

    fffff802970a4a14-fffff802970a4a15 2 bytes - nt!MiMapContiguousMemory+114 (+0x1fe)

    [ 80 fa:00 df ]

    fffff802970a4a5a-fffff802970a4a5b 2 bytes - nt!MiMapContiguousMemory+15a (+0x46)

    [ 80 f6:00 ed ]

    fffff802970a4aa8-fffff802970a4aa9 2 bytes - nt!MiMapContiguousMemory+1a8 (+0x4e)

    [ 80 fa:00 df ]

    fffff802970a56ad-fffff802970a56ae 2 bytes - nt!MiMappingHasIoReferences+d (+0xc05)

    [ 80 f6:00 ed ]

    fffff802970a59be-fffff802970a59bf 2 bytes - nt!MiDrainZeroLookasides+ae (+0x311)

    [ 80 fa:00 df ]

    fffff802970a5ac3-fffff802970a5ac4 2 bytes - nt!MiSetImageProtection+17 (+0x105)

    [ 80 f6:00 ed ]

    fffff802970a5b32-fffff802970a5b33 2 bytes - nt!MiRemoveImagePageFromSystemWorkingSet+46 (+0x6f)

    [ 80 f6:00 ed ]

    fffff802970a5c62-fffff802970a5c63 2 bytes - nt!MiSetSystemCodeProtection+52 (+0x130)

    [ 80 f6:00 ed ]

    fffff802970a5d64-fffff802970a5d66 3 bytes - nt!MiSetSystemCodeProtection+154 (+0x102)

    [ 40 fb f6:80 76 ed ]

    fffff802970a5d79-fffff802970a5d7a 2 bytes - nt!MiSetSystemCodeProtection+169 (+0x15)

    [ 80 fa:00 df ]

    fffff802970a5fc9-fffff802970a5fcb 3 bytes - nt!MiSetSystemCodeProtection+3b9 (+0x250)

    [ 40 fb f6:80 76 ed ]

    fffff802970a5ffb-fffff802970a5ffc 2 bytes - nt!MiSetSystemCodeProtection+3eb (+0x32)

    [ 80 fa:00 df ]

    fffff802970a604e-fffff802970a604f 2 bytes - nt!MiSetSystemCodeProtection+43e (+0x53)

    [ 80 f6:00 ed ]

    fffff802970a607b-fffff802970a607e 4 bytes - nt!MiSetSystemCodeProtection+46b (+0x2d)

    [ a0 7d fb f6:40 bb 76 ed ]

    fffff802970a608d-fffff802970a6091 5 bytes - nt!MiSetSystemCodeProtection+47d (+0x12)

    [ d0 be 7d fb f6:a0 5d bb 76 ed ]

    fffff802970a6199-fffff802970a619a 2 bytes - nt!MiMoveValidWsle+8d (+0x10c)

    [ 80 f6:00 ed ]

    fffff802970a61c2-fffff802970a61c3 2 bytes - nt!MiMoveValidWsle+b6 (+0x29)

    [ 80 fa:00 df ]

    fffff802970a6456-fffff802970a6457 2 bytes - nt!MiMakeDriverPagesPrivate+52 (+0x294)

    [ 80 f6:00 ed ]

    fffff802970a6553-fffff802970a6554 2 bytes - nt!MiMakeDriverPagesPrivate+14f (+0xfd)

    [ 80 fa:00 df ]

    fffff802970a65c2-fffff802970a65c3 2 bytes - nt!MiMakeDriverPagesPrivate+1be (+0x6f)

    [ 80 fa:00 df ]

    fffff802970a65e5-fffff802970a65e6 2 bytes - nt!MiMakeDriverPagesPrivate+1e1 (+0x23)

    [ 80 fa:00 df ]

    fffff802970a6686-fffff802970a6687 2 bytes - nt!MiMakeDriverPagesPrivate+282 (+0xa1)

    [ 80 fa:00 df ]

    fffff802970a67b2-fffff802970a67b3 2 bytes - nt!MiMakeDriverPagesPrivate+3ae (+0x12c)

    [ 80 fa:00 df ]

    fffff802970a67fc-fffff802970a67fd 2 bytes - nt!MiMakeDriverPagesPrivate+3f8 (+0x4a)

    [ 80 fa:00 df ]

    fffff802970a68cf-fffff802970a68d0 2 bytes - nt!MiTradeActivePage+5b (+0xd3)

    [ 80 fa:00 df ]

    fffff802970a6949-fffff802970a694a 2 bytes - nt!MiTradeActivePage+d5 (+0x7a)

    [ 80 f6:00 ed ]

    fffff802970a6c0b-fffff802970a6c0c 2 bytes - nt!MiGetTopLevelPfn+5b (+0x2c2)

    [ 80 fa:00 df ]

    fffff802970a7613-fffff802970a7614 2 bytes - nt!MiFindContiguousPages+213 (+0xa08)

    [ 80 fa:00 df ]

    fffff802970a7902-fffff802970a7903 2 bytes - nt!MiPfnsWorthTrying+72 (+0x2ef)

    [ 80 fa:00 df ]

    fffff802970a7a8b-fffff802970a7a8c 2 bytes - nt!MiPfnsWorthTrying+1fb (+0x189)

    [ 80 fa:00 df ]

    fffff802970a7ed4-fffff802970a7ed5 2 bytes - nt!MiAllocateMostlyContiguous+244 (+0x449)

    [ 80 fa:00 df ]

    fffff802970a7fe9-fffff802970a7fea 2 bytes - nt!MiAllocateMostlyContiguous+359 (+0x115)

    [ 80 fa:00 df ]

    fffff802970a85d3-fffff802970a85d4 2 bytes - nt!MiActivePageClaimCandidate+33 (+0x5ea)

    [ 80 fa:00 df ]

    fffff802970a8709-fffff802970a870b 3 bytes - nt!MiActivePageClaimCandidate+169 (+0x136)

    [ 40 fb f6:80 76 ed ]

    fffff802970a875c-fffff802970a875d 2 bytes - nt!MiActivePageClaimCandidate+1bc (+0x53)

    [ 80 f6:00 ed ]

    fffff802970a8772-fffff802970a8773 2 bytes - nt!MiActivePageClaimCandidate+1d2 (+0x16)

    [ ff f6:7f ed ]

    fffff802970a88de-fffff802970a88e2 5 bytes - nt!MiActivePageClaimCandidate+33e (+0x16c)

    [ d0 be 7d fb f6:a0 5d bb 76 ed ]

    WARNING: !chkimg output was truncated to 50 lines. Invoke !chkimg without '-lo [num_lines]' to view entire output.

    fffff802972db387-fffff802972db389 3 bytes - nt!ExFreePoolWithTag+387

    [ 40 fb f6:80 76 ed ]

    fffff802972db83d-fffff802972db83e 2 bytes - nt!ExFreePoolWithTag+83d (+0x4b6)

    [ 80 f6:00 ed ]

    fffff802972dcc85-fffff802972dcc87 3 bytes - nt!ExDeferredFreePool+4e5 (+0x1448)

    [ 40 fb f6:80 76 ed ]

    fffff802972dccb9-fffff802972dccba 2 bytes - nt!ExDeferredFreePool+519 (+0x34)

    [ 80 fa:00 df ]

    fffff802972e4f30-fffff802972e4f31 2 bytes - nt!_guard_dispatch_icall_fptr

    [ 70 67:b0 fa ]

    fffff8029745c490-fffff8029745c491 2 bytes - nt!MmDuplicateMemory+230

    [ 80 fa:00 df ]

    fffff8029745c4e8-fffff8029745c4e9 2 bytes - nt!MmDuplicateMemory+288 (+0x58)

    [ 80 fa:00 df ]

    fffff8029745c56d-fffff8029745c56e 2 bytes - nt!MmDuplicateMemory+30d (+0x85)

    [ 80 fa:00 df ]

    fffff8029745c798-fffff8029745c799 2 bytes - nt!MmDuplicateMemory+538 (+0x22b)

    [ 80 fa:00 df ]

    fffff8029745ce20-fffff8029745ce21 2 bytes - nt!MiMarkKernelPageTablePages+c (+0x688)

    [ 80 f6:00 ed ]

    fffff8029745ce71-fffff8029745ce72 2 bytes - nt!MiMarkKernelPageTablePages+5d (+0x51)

    [ 00 f7:80 ed ]

    fffff8029745d370-fffff8029745d371 2 bytes - nt!MmMarkHiberPhase+70 (+0x4ff)

    [ 80 fa:00 df ]

    fffff8029745d387-fffff8029745d388 2 bytes - nt!MmMarkHiberPhase+87 (+0x17)

    [ 80 fa:00 df ]

    fffff8029745d97a-fffff8029745d97b 2 bytes - nt!MiMarkHiberNotCachedPages+2a (+0x5f3)

    [ 80 fa:00 df ]

    fffff8029745da92-fffff8029745da93 2 bytes - nt!MiMarkNonPagedHiberPhasePages+66 (+0x118)

    [ 80 fa:00 df ]

    fffff8029745db5d-fffff8029745db5e 2 bytes - nt!MiMarkKernelPageTablesHelper+3d (+0xcb)

    [ 80 f6:00 ed ]

    fffff8029745de0c-fffff8029745de0d 2 bytes - nt!MiEnumerateKernelLeafPtes+10 (+0x2af)

    [ 80 f6:00 ed ]

    fffff8029745de16-fffff8029745de17 2 bytes - nt!MiEnumerateKernelLeafPtes+1a (+0x0a)

    [ 00 f7:80 ed ]

    fffff8029746064a-fffff8029746064b 2 bytes - nt!MmInitializeProcessor+3a (+0x2834)

    [ 80 f6:00 ed ]

    fffff80297464d1b-fffff80297464d1c 2 bytes - nt! ?? ::OKHAJAOM::`string'+28ab (+0x46d1)

    [ 80 fa:00 df ]

    fffff80297464da3-fffff80297464da4 2 bytes - nt! ?? ::OKHAJAOM::`string'+2933 (+0x88)

    [ 80 fa:00 df ]

    fffff80297464e4b-fffff80297464e4c 2 bytes - nt! ?? ::OKHAJAOM::`string'+29db (+0xa8)

    [ 80 fa:00 df ]

    fffff80297464f55-fffff80297464f56 2 bytes - nt! ?? ::OKHAJAOM::`string'+2ae5 (+0x10a)

    [ 80 fa:00 df ]

    fffff8029746d55e-fffff8029746d55f 2 bytes - nt!MmFreeIndependentPages+52

    [ 80 fa:00 df ]

    fffff802974c5d5c-fffff802974c5d5d 2 bytes - nt!MmChangeImageProtection+158 (+0x587fe)

    [ 80 fa:00 df ]

    fffff802974c5f63-fffff802974c5f64 2 bytes - nt!MiAllocateDriverPage+9b (+0x207)

    [ 80 fa:00 df ]

    fffff802974c5fce-fffff802974c5fcf 2 bytes - nt!MiValidateImagePfn+3a (+0x6b)

    [ 80 fa:00 df ]

    fffff802974c6018-fffff802974c6019 2 bytes - nt!MiValidateImagePfn+84 (+0x4a)

    [ 80 f6:00 ed ]

    fffff802974c7476-fffff802974c747a 5 bytes - nt!MiInitializeWorkingSetList+f2 (+0x145e)

    [ d0 be 7d fb f6:a0 5d bb 76 ed ]

    fffff802974c74b9-fffff802974c74ba 2 bytes - nt!MiInitializeWorkingSetList+135 (+0x43)

    [ 80 fa:00 df ]

    fffff802974c750c-fffff802974c750d 2 bytes - nt!MiInitializeWorkingSetList+188 (+0x53)

    [ 80 fa:00 df ]

    fffff802974edfd8-fffff802974edfd9 2 bytes - nt!PfpPfnPrioRequest+98 (+0x26acc)

    [ 80 fa:00 df ]

    fffff802974ee017-fffff802974ee018 2 bytes - nt!PfpPfnPrioRequest+d7 (+0x3f)

    [ 80 fa:00 df ]

    fffff802975054bd-fffff802975054be 2 bytes - nt!MiReleaseProcessReferenceToSessionDataPage+a1 (+0x174a6)

    [ 80 fa:00 df ]

    fffff802975148a4-fffff802975148a6 3 bytes - nt!MiMapViewOfDataSection+c44 (+0xf3e7)

    [ 40 fb f6:80 76 ed ]

    fffff802975148e9-fffff802975148ed 5 bytes - nt!MiMapViewOfDataSection+c89 (+0x45)

    [ d7 be 7d fb f6:a7 5d bb 76 ed ]

    fffff80297515e9d-fffff80297515e9e 2 bytes - nt!MiReturnPageTablePageCommitment+16d (+0x15b4)

    [ 80 f6:00 ed ]

    fffff80297517c72-fffff80297517c73 2 bytes - nt!MiPfPrepareSequentialReadList+2e2 (+0x1dd5)

    [ 80 fa:00 df ]

    fffff8029751aa72-fffff8029751aa73 2 bytes - nt!MiRelocateImagePfn+72 (+0x2e00)

    [ 80 fa:00 df ]

    fffff8029751aa7f-fffff8029751aa80 2 bytes - nt!MiRelocateImagePfn+7f (+0x0d)

    [ 80 f6:00 ed ]

    fffff8029751aa9a-fffff8029751aa9b 2 bytes - nt!MiRelocateImagePfn+9a (+0x1b)

    [ ff f6:7f ed ]

    fffff8029752624e-fffff8029752624f 2 bytes - nt!MiPfPrepareReadList+4ce (+0xb7b4)

    [ 80 fa:00 df ]

    fffff802975463a6-fffff802975463a7 2 bytes - nt!MiCreateImageFileMap+fe (+0x20158)

    [ 80 fa:00 df ]

    fffff8029754a05b-fffff8029754a05c 2 bytes - nt!MiPrefetchDriverPages+23 (+0x3cb5)

    [ 80 f6:00 ed ]

    fffff8029754a8d1-fffff8029754a8d2 2 bytes - nt!MmCreateProcessAddressSpace+1dd (+0x876)

    [ 80 fa:00 df ]

    fffff8029754a964-fffff8029754a965 2 bytes - nt!MmCreateProcessAddressSpace+270 (+0x93)

    [ 80 f6:00 ed ]

    fffff8029754aa87-fffff8029754aa88 2 bytes - nt!MmCreateProcessAddressSpace+393 (+0x123)

    [ 80 fa:00 df ]

    fffff8029757448a-fffff8029757448b 2 bytes - nt!MiFreeDriverInitialization+5e (+0x29a03)

    [ 80 f6:00 ed ]

    fffff8029757465b-fffff8029757465c 2 bytes - nt!MiFreeInitializationCode+14f (+0x1d1)

    [ 80 fa:00 df ]

    fffff8029757f2ed-fffff8029757f2ee 2 bytes - nt!MiSelectSystemImageAddress+25 (+0xac92)

    [ 80 f6:00 ed ]

    fffff8029758700e-fffff8029758700f 2 bytes - nt!MmAllocateIndependentPages+6e (+0x7d21)

    [ 80 f6:00 ed ]

    fffff802975870b4-fffff802975870b5 2 bytes - nt!MmAllocateIndependentPages+114 (+0xa6)

    [ 80 fa:00 df ]

    fffff802975a1a7c-fffff802975a1a7d 2 bytes - nt!MmAllocateMappingAddress+94 (+0x1a9c8)

    [ 80 f6:00 ed ]

    fffff802975a70f9-fffff802975a70fd 5 bytes - nt!MiDereferenceSessionFinal+1a9 (+0x567d)

    [ d0 be 7d fb f6:a0 5d bb 76 ed ]

    fffff802975affea-fffff802975affec 3 bytes - nt!MiInitializeDynamicBitmap+fe (+0x8ef1)

    [ 40 fb f6:80 76 ed ]

    fffff802975b002e-fffff802975b0031 4 bytes - nt!MiInitializeDynamicBitmap+142 (+0x44)

    [ a0 7d fb f6:40 bb 76 ed ]

    fffff802975b0040-fffff802975b0044 5 bytes - nt!MiInitializeDynamicBitmap+154 (+0x12)

    [ d0 be 7d fb f6:a0 5d bb 76 ed ]

    fffff802975b012c-fffff802975b012d 2 bytes - nt!MiInitializeDynamicBitmap+240 (+0xec)

    [ 80 f6:00 ed ]

    fffff802975b016e-fffff802975b016f 2 bytes - nt!MiInitializeDynamicBitmap+282 (+0x42)

    [ 80 fa:00 df ]

    fffff802975b05dc-fffff802975b05dd 2 bytes - nt!MiSessionCreateInternal+12c (+0x46e)

    [ 80 f6:00 ed ]

    fffff802975b083a-fffff802975b083b 2 bytes - nt!MiMapNewSession+c2 (+0x25e)

    [ 80 fa:00 df ]

    fffff802975b084d-fffff802975b084f 3 bytes - nt!MiMapNewSession+d5 (+0x13)

    [ 40 fb f6:80 76 ed ]

    fffff802975b0856-fffff802975b0859 4 bytes - nt!MiMapNewSession+de (+0x09)

    [ a0 7d fb f6:40 bb 76 ed ]

    fffff802975b08ec-fffff802975b08f0 5 bytes - nt!MiMapNewSession+174 (+0x96)

    [ d0 be 7d fb f6:a0 5d bb 76 ed ]

    fffff802975b0951-fffff802975b0954 4 bytes - nt!MiMapNewSession+1d9 (+0x65)

    [ a0 7d fb f6:40 bb 76 ed ]

    fffff802975b0967-fffff802975b0968 2 bytes - nt!MiMapNewSession+1ef (+0x16)

    [ 80 fa:00 df ]

    fffff802975b097a-fffff802975b097c 3 bytes - nt!MiMapNewSession+202 (+0x13)

    [ 40 fb f6:80 76 ed ]

    fffff802975b09c9-fffff802975b09ca 2 bytes - nt!MiMapNewSession+251 (+0x4f)

    [ 80 fa:00 df ]

    fffff802975b0a30-fffff802975b0a32 3 bytes - nt!MiMapNewSession+2b8 (+0x67)

    [ 40 fb f6:80 76 ed ]

    fffff802975b0a69-fffff802975b0a6c 4 bytes - nt!MiMapNewSession+2f1 (+0x39)

    [ a0 7d fb f6:40 bb 76 ed ]

    fffff802975b0a7e-fffff802975b0a82 5 bytes - nt!MiMapNewSession+306 (+0x15)

    [ d0 be 7d fb f6:a0 5d bb 76 ed ]

    fffff802975ba135-fffff802975ba136 2 bytes - nt!MiReleaseDriverPtes+41 (+0x96b7)

    [ 80 f6:00 ed ]

    fffff802975ba229-fffff802975ba22a 2 bytes - nt!MiReleaseDriverPtes+135 (+0xf4)

    [ 80 f6:00 ed ]

    WARNING: !chkimg output was truncated to 50 lines. Invoke !chkimg without '-lo [num_lines]' to view entire output.

    4776 errors : !nt (fffff80297091594-fffff802976f62d2)

    MODULE_NAME: memory_corruption

    IMAGE_NAME: memory_corruption

    FOLLOWUP_NAME: memory_corruption

    MEMORY_CORRUPTOR: LARGE

    FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE

    BUCKET_ID: MEMORY_CORRUPTION_LARGE

    PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE

    TARGET_TIME: 2016-10-26T18:25:13.000Z

    OSBUILD: 14393

    OSSERVICEPACK: 0

    SERVICEPACK_NUMBER: 0

    OS_REVISION: 0

    SUITE_MASK: 272

    PRODUCT_TYPE: 1

    OSPLATFORM_TYPE: x64

    OSNAME: Windows 10

    OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS

    OS_LOCALE:

    USER_LCID: 0

    OSBUILD_TIMESTAMP: 2016-10-05 11:17:53

    BUILDDATESTAMP_STR: 161004-2338

    BUILDLAB_STR: rs1_release_inmarket

    BUILDOSVER_STR: 10.0.14393.321.amd64fre.rs1_release_inmarket.161004-2338

    ANALYSIS_SESSION_ELAPSED_TIME: 4d4f

    ANALYSIS_SOURCE: KM

    FAILURE_ID_HASH_STRING: km:memory_corruption_large

    FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

    Followup: memory_corruption

    ---------
     
    MichelKant, Feb 22, 2017
    #2
  3. XP ROCKS. Win User
    Need help with BSOD, daily BSOD errors

    ffffcd81`053cd410 fffff80b`40dc10f1 : 00000000`00000005 ffffb989`792308c0 ffffb989`7428ba60 ffffb989`7428bfb0 :
    cbfs5+0x2bf4

    ffffcd81`053cd440 fffff802`974e8144 : 00000000`00000005 ffffcd81`053cd750 ffffb989`792308c0 ffffb989`00000000 :
    cbfs5+0x10f1

    ffffcd81`053cd480 fffff802`97528542 : fffff802`974e7780 fffff802`974e7780 ffffcd81`053cd750 ffffb989`713bb770 : nt!IopParseDevice+0x9c4

    Update or reinstall your ELDOS Callback File System Driver, cbfs5.sys.

    /n software - A Bright Future for EldoS Products
     
    XP ROCKS., Feb 22, 2017
    #3
  4. Redbatman Win User

    Help with BSOD!!!!!

    Forgot this one too.

    On Thu 2/23/2017 2:41:17 AM GMT your computer crashed
    crash dump file: C:\WINDOWS\memory.dmp
    This was probably caused by the following module: win32kfull.sys (win32kfull+0x9076D)
    Bugcheck code: 0x139 (0x3, 0xFFFFA2005E012610, 0xFFFFA2005E012568, 0x0)
    Error: KERNEL_SECURITY_CHECK_FAILURE
    file path: C:\WINDOWS\system32\win32kfull.sys
    product: Microsoft® Windows® Operating System
    company: Microsoft Corporation
    description: Full/Desktop Win32k Kernel Driver
    Bug check description: The kernel has detected the corruption of a critical data structure.
    The crash took place in a standard Microsoft module. Your system configuration may be incorrect. Possibly this problem is caused by another driver on your system that cannot be identified at this time.
     
    Redbatman, Feb 22, 2017
    #4
  5. Help with BSOD!!!!! [​IMG]
    Attention:

    Before posting a BSOD thread, please read the instructions here: Blue Screen of Death (BSOD) Posting Instructions

    If you need to add new information, please make a new post in your initial BSOD thread. Please do not make an extra new thread.
     
    BSODHunter, Apr 5, 2018
    #5
Thema:

Help with BSOD!!!!!

Loading...
  1. Help with BSOD!!!!! - Similar Threads - Help BSOD

  2. Help troubleshoot BSOD issue

    in Windows 10 BSOD Crashes and Debugging
    Help troubleshoot BSOD issue: Can someone assist me in figuring out why BSOD occurred? Dump file in the link below. https://easyupload.io/6w1219 https://answers.microsoft.com/en-us/windows/forum/all/help-troubleshoot-bsod-issue/48543861-a3e0-46be-aee5-283f7693c03d
  3. BSOD help!

    in Windows 10 BSOD Crashes and Debugging
    BSOD help!: My computer randomly restarts or just powers off after using it for an hour or it survives a full day before restarting. The BSOD I get is unexpected kernel mode trap I tried researching and trying sfcscan, updating drivers, reinstalling windows and that did not work. Here is...
  4. Really hoping for help with BSOD issues

    in Windows 10 BSOD Crashes and Debugging
    Really hoping for help with BSOD issues: I recently build my new PC and I've been plagued with a few different BSOD's. I've tried googling and tried fixing on my own and nothing seems to be working. I'm getting them when I load into a game of DOTA 2 or after a bit of time while watching youtube. The most recent dump...
  5. HELP!! CRITICAL_PROCESS_DIED BSOD on Windows 10 with no Minidump

    in Windows 10 BSOD Crashes and Debugging
    HELP!! CRITICAL_PROCESS_DIED BSOD on Windows 10 with no Minidump: [IMG] Hi, I have a Lenovo x1 Carbon 6th Generation running Windows 10 Pro (1903), and it constantly has a BSOD with CRITICAL_PROCESS_DIED. Immediately before the BSOD, everything except the mouse pointer freezes, but I am unable to click on anything and can’t use key...
  6. Need help with BSOD Analyze

    in Windows 10 BSOD Crashes and Debugging
    Need help with BSOD Analyze: Hello everyone, i need some help with a BSOD. Here is the Dump and the sysinfo: https://1drv.ms/u/s!Au9u3lOwxBfmgnGyhbZhG5MgD75p?e=keYbd7 I've already replaced the PSU and GPU and updated the Chipset and GPU drivers. Memtest86 has been passed without any errors....
  7. Need help analysing minidumps after BSOD

    in Windows 10 BSOD Crashes and Debugging
    Need help analysing minidumps after BSOD: Hi, I upgraded my graphics card lately to an Asus RX5700 and i startet to get BSODs. I wiped the old drivers and installed new ones and i still get BSODs from time to time. Could you help me analyze the minidumps? Here is the link to the dumps:...
  8. BSOD help with minidump troubleshooting

    in Windows 10 BSOD Crashes and Debugging
    BSOD help with minidump troubleshooting: The minidump file is located here. https://easyupload.io/op3n7f If someone is able to find out what's wrong with it, please let me know how you were able to troubleshoot it. I used WinDB and all I got was ntkrnlmp.exe which isn't of any help....
  9. BSOD help. Can't acces computer

    in Windows 10 BSOD Crashes and Debugging
    BSOD help. Can't acces computer: Earlier today when I was watching youtube my computer crashed. The display froze and the audio spazzed. Then I got a blue screen. I think it said something like it was collecting data and would then restart. After it got to 100% it didn't restart but I assumed that it was...
  10. Windows 10 BSOD - hal.dll / ntoskrnl.exe / nvldmkm.sys - while playing games only - Help?

    in Windows 10 BSOD Crashes and Debugging
    Windows 10 BSOD - hal.dll / ntoskrnl.exe / nvldmkm.sys - while playing games only - Help?: I've been getting these issues for a while, but only while playing a few specific games (Sea of Thieves & Outer Worlds) purchased from the Microsoft Store, making these games almost unplayable. Game freezes after an indeterminate amount of time (Sea of Thieves can run well...