Windows 10: Help with BSOD!!!!!

Discus and support Help with BSOD!!!!! in Windows 10 BSOD Crashes and Debugging to solve the problem; Okay so this is what who crashed says. On Thu 2/23/2017 2:41:17 AM GMT your computer crashed crash dump file:... Discussion in 'Windows 10 BSOD Crashes and Debugging' started by Redbatman, Feb 22, 2017.

  1. Redbatman Win User

    Help with BSOD!!!!!


    Okay so this is what who crashed says.

    On Thu 2/23/2017 2:41:17 AM GMT your computer crashed
    crash dump file: C:\WINDOWS\Minidump\022217-21250-01.dmp
    This was probably caused by the following module: ntoskrnl.exe (nt+0x14A6F0)
    Bugcheck code: 0x139 (0x3, 0xFFFFA2005E012610, 0xFFFFA2005E012568, 0x0)
    Error: KERNEL_SECURITY_CHECK_FAILURE
    file path: C:\WINDOWS\system32\ntoskrnl.exe
    product: Microsoft® Windows® Operating System
    company: Microsoft Corporation
    description: NT Kernel & System
    Bug check description: The kernel has detected the corruption of a critical data structure.
    The crash took place in the Windows kernel. Possibly this problem is caused by another driver that cannot be identified at this time.

    What should I do?



    :)
     
    Redbatman, Feb 22, 2017
    #1

  2. Need help with BSOD, daily BSOD errors

    Hello,

    My system reboots multiple times a day cause of a BSOD.

    I update BIOS to latest version.

    Did run MemTest86 to check if there is any faulty memory. Nothing was found. To be sure I renewed both memory sims. Still the error occurs.

    Now I have this WinDB check but need some help with it.

    Who can point me to the right direction?

    Thank you

    Best regards,

    Michel

    Microsoft (R) Windows Debugger Version 10.0.10586.567 AMD64

    Copyright (c) Microsoft Corporation. All rights reserved.

    Loading Dump File [C:\Windows\MEMORY.DMP]

    Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.

    ************* Symbol Path validation summary **************

    Response Time (ms) Location

    Deferred SRV*C:\Windows\symbol_cache*Symbol information

    Symbol search path is: SRV*C:\Windows\symbol_cache*Symbol information

    Executable search path is:

    Windows 10 Kernel Version 14393 MP (4 procs) Free x64

    Product: WinNt, suite: TerminalServer SingleUserTS

    Built by: 14393.321.amd64fre.rs1_release_inmarket.161004-2338

    Machine Name:

    Kernel base = 0xfffff802`97090000 PsLoadedModuleList = 0xfffff802`97394080

    Debug session time: Wed Oct 26 20:25:13.839 2016 (UTC + 2:00)

    System Uptime: 0 days 14:01:52.513

    Loading Kernel Symbols

    ...............................................................

    ................................................................

    ................................................................

    ...............

    Loading User Symbols

    PEB is paged out (Peb.Ldr = 000000ab`28d7b018). Type ".hh dbgerr001" for details

    Loading unloaded module list

    .......................

    *******************************************************************************

    * *

    * Bugcheck Analysis *

    * *

    *******************************************************************************

    Use !analyze -v to get detailed debugging information.

    BugCheck 50, {ffff804af9e6b860, 0, fffff80b3ed6c59f, 2}

    *** ERROR: Module load completed but symbols could not be loaded for cbfs5.sys

    Probably caused by : memory_corruption

    Followup: memory_corruption

    ---------

    2: kd> !analyze -v

    *******************************************************************************

    * *

    * Bugcheck Analysis *

    * *

    *******************************************************************************

    PAGE_FAULT_IN_NONPAGED_AREA (50)

    Invalid system memory was referenced. This cannot be protected by try-except.

    Typically the address is just plain bad or it is pointing at freed memory.

    Arguments:

    Arg1: ffff804af9e6b860, memory referenced.

    Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.

    Arg3: fffff80b3ed6c59f, If non-zero, the instruction address which referenced the bad memory

    address.

    Arg4: 0000000000000002, (reserved)

    Debugging Details:

    ------------------

    DUMP_CLASS: 1

    DUMP_QUALIFIER: 401

    BUILD_VERSION_STRING: 14393.321.amd64fre.rs1_release_inmarket.161004-2338

    SYSTEM_MANUFACTURER: Gigabyte Technology Co., Ltd.

    SYSTEM_PRODUCT_NAME: B85M-HD3

    SYSTEM_SKU: To be filled by O.E.M.

    SYSTEM_VERSION: To be filled by O.E.M.

    BIOS_VENDOR: American Megatrends Inc.

    BIOS_VERSION: F12

    BIOS_DATE: 08/13/2015

    BASEBOARD_MANUFACTURER: Gigabyte Technology Co., Ltd.

    BASEBOARD_PRODUCT: B85M-HD3

    BASEBOARD_VERSION: x.x

    DUMP_TYPE: 1

    BUGCHECK_P1: ffff804af9e6b860

    BUGCHECK_P2: 0

    BUGCHECK_P3: fffff80b3ed6c59f

    BUGCHECK_P4: 2

    READ_ADDRESS: ffff804af9e6b860

    FAULTING_IP:

    NTFS!NtfsFindPrefixHashEntry+1df

    fffff80b`3ed6c59f 44394710 cmp dword ptr [rdi+10h],r8d

    MM_INTERNAL_CODE: 2

    DEBUG_FLR_IMAGE_TIMESTAMP: 0

    FAULTING_MODULE: fffff80b3ec70000 NTFS

    CPU_COUNT: 4

    CPU_MHZ: c79

    CPU_VENDOR: GenuineIntel

    CPU_FAMILY: 6

    CPU_MODEL: 3c

    CPU_STEPPING: 3

    CPU_MICROCODE: 6,3c,3,0 (F,M,S,R) SIG: 1E'00000000 (cache) 1E'00000000 (init)

    DEFAULT_BUCKET_ID: CODE_CORRUPTION

    BUGCHECK_STR: AV

    PROCESS_NAME: ekrn.exe

    CURRENT_IRQL: 0

    ANALYSIS_SESSION_HOST: MKA1

    ANALYSIS_SESSION_TIME: 10-26-2016 20:43:17.0239

    ANALYSIS_VERSION: 10.0.10586.567 amd64fre

    TRAP_FRAME: ffffcd81042b09b0 -- (.trap 0xffffcd81042b09b0)

    NOTE: The trap frame does not contain all registers.

    Some register values may be zeroed or incorrect.

    rax=ffff800ae96bf000 rbx=0000000000000000 rcx=0000000000000000

    rdx=0000000000000003 rsi=0000000000000000 rdi=0000000000000000

    rip=fffff80b3ed6c59f rsp=ffffcd81042b0b40 rbp=0000000000000000

    r8=000000003a56041d r9=000000000fca8be7 r10=ffff800af06a6360

    r11=ffffcd81042b0c48 r12=0000000000000000 r13=0000000000000000

    r14=0000000000000000 r15=0000000000000000

    iopl=0 nv up ei pl nz na po nc

    NTFS!NtfsFindPrefixHashEntry+0x1df:

    fffff80b`3ed6c59f 44394710 cmp dword ptr [rdi+10h],r8d ds:00000000`00000010=????????

    Resetting default scope

    LAST_CONTROL_TRANSFER: from fffff8029720f6da to fffff802971da2c0

    STACK_TEXT:

    ffffcd81`042b06b8 fffff802`9720f6da : 00000000`00000050 ffff804a`f9e6b860 00000000`00000000 ffffcd81`042b09b0 : nt!KeBugCheckEx

    ffffcd81`042b06c0 fffff802`9710100a : 00000000`00000000 00000000`00000000 ffffcd81`042b09b0 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x2624a

    ffffcd81`042b07b0 fffff802`971e38fc : ffffb989`09090a09 fffff80b`3ec8eb38 ffffb989`73e26f02 ffff800a`e8e9e150 : nt!MmAccessFault+0x9ca

    ffffcd81`042b09b0 fffff80b`3ed6c59f : ffffb989`6da47180 ffffcd81`00000002 ffffb989`799fd080 ffffb989`6da484f8 : nt!KiPageFault+0x13c

    ffffcd81`042b0b40 fffff80b`3ed6b92b : ffffb989`6e56b508 ffffb989`6da484f8 ffff800a`df140150 00000000`00000001 : NTFS!NtfsFindPrefixHashEntry+0x1df

    ffffcd81`042b0c50 fffff80b`3ed686ce : ffffb989`6e56b508 ffffb989`7428ba60 ffffb989`6e56b508 ffffcd81`042b0e88 : NTFS!NtfsFindStartingNode+0x2cb

    ffffcd81`042b0d10 fffff80b`3ed67fad : ffffb989`6e56b508 ffffb989`7428ba60 ffffcd81`053cd190 ffffb989`7ce27000 : NTFS!NtfsCommonCreate+0x43e

    ffffcd81`042b0f50 fffff802`971dd157 : ffffcd81`053cd120 ffffb989`7a4deb20 00000000`00000012 00000000`0178d818 : NTFS!NtfsCommonCreateCallout+0x1d

    ffffcd81`042b0f80 fffff802`971dd11d : 00000000`00006000 ffffcd81`042b1000 ffffb989`799fd080 fffff802`970e70c4 : nt!KxSwitchKernelStackCallout+0x27

    ffffcd81`053ccf60 fffff802`970e70c4 : 00000000`00000006 00000000`00006000 fffff802`9744a3c0 fffff802`9713d0aa : nt!KiSwitchKernelStackContinue

    ffffcd81`053ccf80 fffff802`970e6e36 : ffffcd81`053c8000 00000000`00006000 00000000`00000000 ffffcd81`053cd000 : nt!KiExpandKernelStackAndCalloutOnStackSegment+0x134

    ffffcd81`053cd000 fffff802`970e6cff : 00000000`00000000 ffffcd81`053cd120 00000000`00000001 ffffb989`7428ba60 : nt!KiExpandKernelStackAndCalloutSwitchStack+0xa6

    ffffcd81`053cd060 fffff80b`3ed67aa0 : 00000000`00000000 00000000`00000000 ffffb989`6e56b508 ffffb989`7428ba60 : nt!KeExpandKernelStackAndCalloutInternal+0x2f

    ffffcd81`053cd0b0 fffff80b`3e595206 : ffffb989`6da47030 ffffb989`7428ba60 ffffcd81`053cd300 ffffb989`79da8300 : NTFS!NtfsFsdCreate+0x1c0

    ffffcd81`053cd2d0 fffff80b`3e5c4065 : fffff80b`3e5b4060 00000000`00000040 00000000`00000001 00000000`00000040 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x1a6

    ffffcd81`053cd360 fffff80b`40dc2bf4 : 00000000`00003100 00000000`00003128 ffffb989`00000040 00000000`00000000 : FLTMGR!FltpCreate+0x2f5

    ffffcd81`053cd410 fffff80b`40dc10f1 : 00000000`00000005 ffffb989`792308c0 ffffb989`7428ba60 ffffb989`7428bfb0 : cbfs5+0x2bf4

    ffffcd81`053cd440 fffff802`974e8144 : 00000000`00000005 ffffcd81`053cd750 ffffb989`792308c0 ffffb989`00000000 : cbfs5+0x10f1

    ffffcd81`053cd480 fffff802`97528542 : fffff802`974e7780 fffff802`974e7780 ffffcd81`053cd750 ffffb989`713bb770 : nt!IopParseDevice+0x9c4

    ffffcd81`053cd650 fffff802`974ec28d : ffffb989`7c3ec001 ffffcd81`053cd8b0 00000000`00000040 ffffb989`6db39b00 : nt!ObpLookupObjectName+0x8b2

    ffffcd81`053cd820 fffff802`974cf069 : 00000000`00000001 ffffb989`79c272f8 000000ca`c15e5818 00000000`00000028 : nt!ObOpenObjectByNameEx+0x1dd

    ffffcd81`053cd960 fffff802`974cec79 : 000000ca`c15e57a0 00470065`006e0069 000000ca`c15e5818 000000ca`c15e57b8 : nt!IopCreateFile+0x3d9

    ffffcd81`053cda00 fffff802`971e4f93 : 00000000`00000f44 fffff802`974ffe8b 00000000`00000000 00000000`00000000 : nt!NtCreateFile+0x79

    ffffcd81`053cda90 00007ff9`f84158f4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13

    000000ca`c15e5728 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`f84158f4

    STACK_COMMAND: kb

    CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt

    fffff80297091594-fffff80297091595 2 bytes - nt!MiDuplicateCloneLeaf+38

    [ 80 fa:00 df ]

    fffff80297098bda-fffff80297098bdb 2 bytes - nt!MiCloneReserveVadCommit+62 (+0x7646)

    [ 80 f6:00 ed ]

    fffff80297098c63-fffff80297098c64 2 bytes - nt!MiCloneReserveVadCommit+eb (+0x89)

    [ 80 f6:00 ed ]

    fffff8029709e53f-fffff8029709e540 2 bytes - nt!MiFlushDirtyBitsToPfn+73 (+0x58dc)

    [ 80 f6:00 ed ]

    fffff8029709e598-fffff8029709e599 2 bytes - nt!MiFlushDirtyBitsToPfn+cc (+0x59)

    [ 80 f6:00 ed ]

    fffff8029709e67e-fffff8029709e67f 2 bytes - nt!MiFlushDirtyBitsToPfn+1b2 (+0xe6)

    [ 80 fa:00 df ]

    fffff802970a3f3c-fffff802970a3f3d 2 bytes - nt!MiExchangeWsle+54 (+0x58be)

    [ 80 f6:00 ed ]

    fffff802970a3f82-fffff802970a3f83 2 bytes - nt!MiExchangeWsle+9a (+0x46)

    [ 80 fa:00 df ]

    fffff802970a4276-fffff802970a4277 2 bytes - nt!MiAllocateContiguousMemory+226 (+0x2f4)

    [ 80 fa:00 df ]

    fffff802970a42ab-fffff802970a42ac 2 bytes - nt!MiAllocateContiguousMemory+25b (+0x35)

    [ 80 f6:00 ed ]

    fffff802970a4631-fffff802970a4632 2 bytes - nt!MmUnmapIoSpace+71 (+0x386)

    [ 80 f6:00 ed ]

    fffff802970a4704-fffff802970a4705 2 bytes - nt!MiZeroAndFlushPtes+40 (+0xd3)

    [ 80 f6:00 ed ]

    fffff802970a4816-fffff802970a4817 2 bytes - nt!MiZeroAndFlushPtes+152 (+0x112)

    [ 80 f6:00 ed ]

    fffff802970a4a14-fffff802970a4a15 2 bytes - nt!MiMapContiguousMemory+114 (+0x1fe)

    [ 80 fa:00 df ]

    fffff802970a4a5a-fffff802970a4a5b 2 bytes - nt!MiMapContiguousMemory+15a (+0x46)

    [ 80 f6:00 ed ]

    fffff802970a4aa8-fffff802970a4aa9 2 bytes - nt!MiMapContiguousMemory+1a8 (+0x4e)

    [ 80 fa:00 df ]

    fffff802970a56ad-fffff802970a56ae 2 bytes - nt!MiMappingHasIoReferences+d (+0xc05)

    [ 80 f6:00 ed ]

    fffff802970a59be-fffff802970a59bf 2 bytes - nt!MiDrainZeroLookasides+ae (+0x311)

    [ 80 fa:00 df ]

    fffff802970a5ac3-fffff802970a5ac4 2 bytes - nt!MiSetImageProtection+17 (+0x105)

    [ 80 f6:00 ed ]

    fffff802970a5b32-fffff802970a5b33 2 bytes - nt!MiRemoveImagePageFromSystemWorkingSet+46 (+0x6f)

    [ 80 f6:00 ed ]

    fffff802970a5c62-fffff802970a5c63 2 bytes - nt!MiSetSystemCodeProtection+52 (+0x130)

    [ 80 f6:00 ed ]

    fffff802970a5d64-fffff802970a5d66 3 bytes - nt!MiSetSystemCodeProtection+154 (+0x102)

    [ 40 fb f6:80 76 ed ]

    fffff802970a5d79-fffff802970a5d7a 2 bytes - nt!MiSetSystemCodeProtection+169 (+0x15)

    [ 80 fa:00 df ]

    fffff802970a5fc9-fffff802970a5fcb 3 bytes - nt!MiSetSystemCodeProtection+3b9 (+0x250)

    [ 40 fb f6:80 76 ed ]

    fffff802970a5ffb-fffff802970a5ffc 2 bytes - nt!MiSetSystemCodeProtection+3eb (+0x32)

    [ 80 fa:00 df ]

    fffff802970a604e-fffff802970a604f 2 bytes - nt!MiSetSystemCodeProtection+43e (+0x53)

    [ 80 f6:00 ed ]

    fffff802970a607b-fffff802970a607e 4 bytes - nt!MiSetSystemCodeProtection+46b (+0x2d)

    [ a0 7d fb f6:40 bb 76 ed ]

    fffff802970a608d-fffff802970a6091 5 bytes - nt!MiSetSystemCodeProtection+47d (+0x12)

    [ d0 be 7d fb f6:a0 5d bb 76 ed ]

    fffff802970a6199-fffff802970a619a 2 bytes - nt!MiMoveValidWsle+8d (+0x10c)

    [ 80 f6:00 ed ]

    fffff802970a61c2-fffff802970a61c3 2 bytes - nt!MiMoveValidWsle+b6 (+0x29)

    [ 80 fa:00 df ]

    fffff802970a6456-fffff802970a6457 2 bytes - nt!MiMakeDriverPagesPrivate+52 (+0x294)

    [ 80 f6:00 ed ]

    fffff802970a6553-fffff802970a6554 2 bytes - nt!MiMakeDriverPagesPrivate+14f (+0xfd)

    [ 80 fa:00 df ]

    fffff802970a65c2-fffff802970a65c3 2 bytes - nt!MiMakeDriverPagesPrivate+1be (+0x6f)

    [ 80 fa:00 df ]

    fffff802970a65e5-fffff802970a65e6 2 bytes - nt!MiMakeDriverPagesPrivate+1e1 (+0x23)

    [ 80 fa:00 df ]

    fffff802970a6686-fffff802970a6687 2 bytes - nt!MiMakeDriverPagesPrivate+282 (+0xa1)

    [ 80 fa:00 df ]

    fffff802970a67b2-fffff802970a67b3 2 bytes - nt!MiMakeDriverPagesPrivate+3ae (+0x12c)

    [ 80 fa:00 df ]

    fffff802970a67fc-fffff802970a67fd 2 bytes - nt!MiMakeDriverPagesPrivate+3f8 (+0x4a)

    [ 80 fa:00 df ]

    fffff802970a68cf-fffff802970a68d0 2 bytes - nt!MiTradeActivePage+5b (+0xd3)

    [ 80 fa:00 df ]

    fffff802970a6949-fffff802970a694a 2 bytes - nt!MiTradeActivePage+d5 (+0x7a)

    [ 80 f6:00 ed ]

    fffff802970a6c0b-fffff802970a6c0c 2 bytes - nt!MiGetTopLevelPfn+5b (+0x2c2)

    [ 80 fa:00 df ]

    fffff802970a7613-fffff802970a7614 2 bytes - nt!MiFindContiguousPages+213 (+0xa08)

    [ 80 fa:00 df ]

    fffff802970a7902-fffff802970a7903 2 bytes - nt!MiPfnsWorthTrying+72 (+0x2ef)

    [ 80 fa:00 df ]

    fffff802970a7a8b-fffff802970a7a8c 2 bytes - nt!MiPfnsWorthTrying+1fb (+0x189)

    [ 80 fa:00 df ]

    fffff802970a7ed4-fffff802970a7ed5 2 bytes - nt!MiAllocateMostlyContiguous+244 (+0x449)

    [ 80 fa:00 df ]

    fffff802970a7fe9-fffff802970a7fea 2 bytes - nt!MiAllocateMostlyContiguous+359 (+0x115)

    [ 80 fa:00 df ]

    fffff802970a85d3-fffff802970a85d4 2 bytes - nt!MiActivePageClaimCandidate+33 (+0x5ea)

    [ 80 fa:00 df ]

    fffff802970a8709-fffff802970a870b 3 bytes - nt!MiActivePageClaimCandidate+169 (+0x136)

    [ 40 fb f6:80 76 ed ]

    fffff802970a875c-fffff802970a875d 2 bytes - nt!MiActivePageClaimCandidate+1bc (+0x53)

    [ 80 f6:00 ed ]

    fffff802970a8772-fffff802970a8773 2 bytes - nt!MiActivePageClaimCandidate+1d2 (+0x16)

    [ ff f6:7f ed ]

    fffff802970a88de-fffff802970a88e2 5 bytes - nt!MiActivePageClaimCandidate+33e (+0x16c)

    [ d0 be 7d fb f6:a0 5d bb 76 ed ]

    WARNING: !chkimg output was truncated to 50 lines. Invoke !chkimg without '-lo [num_lines]' to view entire output.

    fffff802972db387-fffff802972db389 3 bytes - nt!ExFreePoolWithTag+387

    [ 40 fb f6:80 76 ed ]

    fffff802972db83d-fffff802972db83e 2 bytes - nt!ExFreePoolWithTag+83d (+0x4b6)

    [ 80 f6:00 ed ]

    fffff802972dcc85-fffff802972dcc87 3 bytes - nt!ExDeferredFreePool+4e5 (+0x1448)

    [ 40 fb f6:80 76 ed ]

    fffff802972dccb9-fffff802972dccba 2 bytes - nt!ExDeferredFreePool+519 (+0x34)

    [ 80 fa:00 df ]

    fffff802972e4f30-fffff802972e4f31 2 bytes - nt!_guard_dispatch_icall_fptr

    [ 70 67:b0 fa ]

    fffff8029745c490-fffff8029745c491 2 bytes - nt!MmDuplicateMemory+230

    [ 80 fa:00 df ]

    fffff8029745c4e8-fffff8029745c4e9 2 bytes - nt!MmDuplicateMemory+288 (+0x58)

    [ 80 fa:00 df ]

    fffff8029745c56d-fffff8029745c56e 2 bytes - nt!MmDuplicateMemory+30d (+0x85)

    [ 80 fa:00 df ]

    fffff8029745c798-fffff8029745c799 2 bytes - nt!MmDuplicateMemory+538 (+0x22b)

    [ 80 fa:00 df ]

    fffff8029745ce20-fffff8029745ce21 2 bytes - nt!MiMarkKernelPageTablePages+c (+0x688)

    [ 80 f6:00 ed ]

    fffff8029745ce71-fffff8029745ce72 2 bytes - nt!MiMarkKernelPageTablePages+5d (+0x51)

    [ 00 f7:80 ed ]

    fffff8029745d370-fffff8029745d371 2 bytes - nt!MmMarkHiberPhase+70 (+0x4ff)

    [ 80 fa:00 df ]

    fffff8029745d387-fffff8029745d388 2 bytes - nt!MmMarkHiberPhase+87 (+0x17)

    [ 80 fa:00 df ]

    fffff8029745d97a-fffff8029745d97b 2 bytes - nt!MiMarkHiberNotCachedPages+2a (+0x5f3)

    [ 80 fa:00 df ]

    fffff8029745da92-fffff8029745da93 2 bytes - nt!MiMarkNonPagedHiberPhasePages+66 (+0x118)

    [ 80 fa:00 df ]

    fffff8029745db5d-fffff8029745db5e 2 bytes - nt!MiMarkKernelPageTablesHelper+3d (+0xcb)

    [ 80 f6:00 ed ]

    fffff8029745de0c-fffff8029745de0d 2 bytes - nt!MiEnumerateKernelLeafPtes+10 (+0x2af)

    [ 80 f6:00 ed ]

    fffff8029745de16-fffff8029745de17 2 bytes - nt!MiEnumerateKernelLeafPtes+1a (+0x0a)

    [ 00 f7:80 ed ]

    fffff8029746064a-fffff8029746064b 2 bytes - nt!MmInitializeProcessor+3a (+0x2834)

    [ 80 f6:00 ed ]

    fffff80297464d1b-fffff80297464d1c 2 bytes - nt! ?? ::OKHAJAOM::`string'+28ab (+0x46d1)

    [ 80 fa:00 df ]

    fffff80297464da3-fffff80297464da4 2 bytes - nt! ?? ::OKHAJAOM::`string'+2933 (+0x88)

    [ 80 fa:00 df ]

    fffff80297464e4b-fffff80297464e4c 2 bytes - nt! ?? ::OKHAJAOM::`string'+29db (+0xa8)

    [ 80 fa:00 df ]

    fffff80297464f55-fffff80297464f56 2 bytes - nt! ?? ::OKHAJAOM::`string'+2ae5 (+0x10a)

    [ 80 fa:00 df ]

    fffff8029746d55e-fffff8029746d55f 2 bytes - nt!MmFreeIndependentPages+52

    [ 80 fa:00 df ]

    fffff802974c5d5c-fffff802974c5d5d 2 bytes - nt!MmChangeImageProtection+158 (+0x587fe)

    [ 80 fa:00 df ]

    fffff802974c5f63-fffff802974c5f64 2 bytes - nt!MiAllocateDriverPage+9b (+0x207)

    [ 80 fa:00 df ]

    fffff802974c5fce-fffff802974c5fcf 2 bytes - nt!MiValidateImagePfn+3a (+0x6b)

    [ 80 fa:00 df ]

    fffff802974c6018-fffff802974c6019 2 bytes - nt!MiValidateImagePfn+84 (+0x4a)

    [ 80 f6:00 ed ]

    fffff802974c7476-fffff802974c747a 5 bytes - nt!MiInitializeWorkingSetList+f2 (+0x145e)

    [ d0 be 7d fb f6:a0 5d bb 76 ed ]

    fffff802974c74b9-fffff802974c74ba 2 bytes - nt!MiInitializeWorkingSetList+135 (+0x43)

    [ 80 fa:00 df ]

    fffff802974c750c-fffff802974c750d 2 bytes - nt!MiInitializeWorkingSetList+188 (+0x53)

    [ 80 fa:00 df ]

    fffff802974edfd8-fffff802974edfd9 2 bytes - nt!PfpPfnPrioRequest+98 (+0x26acc)

    [ 80 fa:00 df ]

    fffff802974ee017-fffff802974ee018 2 bytes - nt!PfpPfnPrioRequest+d7 (+0x3f)

    [ 80 fa:00 df ]

    fffff802975054bd-fffff802975054be 2 bytes - nt!MiReleaseProcessReferenceToSessionDataPage+a1 (+0x174a6)

    [ 80 fa:00 df ]

    fffff802975148a4-fffff802975148a6 3 bytes - nt!MiMapViewOfDataSection+c44 (+0xf3e7)

    [ 40 fb f6:80 76 ed ]

    fffff802975148e9-fffff802975148ed 5 bytes - nt!MiMapViewOfDataSection+c89 (+0x45)

    [ d7 be 7d fb f6:a7 5d bb 76 ed ]

    fffff80297515e9d-fffff80297515e9e 2 bytes - nt!MiReturnPageTablePageCommitment+16d (+0x15b4)

    [ 80 f6:00 ed ]

    fffff80297517c72-fffff80297517c73 2 bytes - nt!MiPfPrepareSequentialReadList+2e2 (+0x1dd5)

    [ 80 fa:00 df ]

    fffff8029751aa72-fffff8029751aa73 2 bytes - nt!MiRelocateImagePfn+72 (+0x2e00)

    [ 80 fa:00 df ]

    fffff8029751aa7f-fffff8029751aa80 2 bytes - nt!MiRelocateImagePfn+7f (+0x0d)

    [ 80 f6:00 ed ]

    fffff8029751aa9a-fffff8029751aa9b 2 bytes - nt!MiRelocateImagePfn+9a (+0x1b)

    [ ff f6:7f ed ]

    fffff8029752624e-fffff8029752624f 2 bytes - nt!MiPfPrepareReadList+4ce (+0xb7b4)

    [ 80 fa:00 df ]

    fffff802975463a6-fffff802975463a7 2 bytes - nt!MiCreateImageFileMap+fe (+0x20158)

    [ 80 fa:00 df ]

    fffff8029754a05b-fffff8029754a05c 2 bytes - nt!MiPrefetchDriverPages+23 (+0x3cb5)

    [ 80 f6:00 ed ]

    fffff8029754a8d1-fffff8029754a8d2 2 bytes - nt!MmCreateProcessAddressSpace+1dd (+0x876)

    [ 80 fa:00 df ]

    fffff8029754a964-fffff8029754a965 2 bytes - nt!MmCreateProcessAddressSpace+270 (+0x93)

    [ 80 f6:00 ed ]

    fffff8029754aa87-fffff8029754aa88 2 bytes - nt!MmCreateProcessAddressSpace+393 (+0x123)

    [ 80 fa:00 df ]

    fffff8029757448a-fffff8029757448b 2 bytes - nt!MiFreeDriverInitialization+5e (+0x29a03)

    [ 80 f6:00 ed ]

    fffff8029757465b-fffff8029757465c 2 bytes - nt!MiFreeInitializationCode+14f (+0x1d1)

    [ 80 fa:00 df ]

    fffff8029757f2ed-fffff8029757f2ee 2 bytes - nt!MiSelectSystemImageAddress+25 (+0xac92)

    [ 80 f6:00 ed ]

    fffff8029758700e-fffff8029758700f 2 bytes - nt!MmAllocateIndependentPages+6e (+0x7d21)

    [ 80 f6:00 ed ]

    fffff802975870b4-fffff802975870b5 2 bytes - nt!MmAllocateIndependentPages+114 (+0xa6)

    [ 80 fa:00 df ]

    fffff802975a1a7c-fffff802975a1a7d 2 bytes - nt!MmAllocateMappingAddress+94 (+0x1a9c8)

    [ 80 f6:00 ed ]

    fffff802975a70f9-fffff802975a70fd 5 bytes - nt!MiDereferenceSessionFinal+1a9 (+0x567d)

    [ d0 be 7d fb f6:a0 5d bb 76 ed ]

    fffff802975affea-fffff802975affec 3 bytes - nt!MiInitializeDynamicBitmap+fe (+0x8ef1)

    [ 40 fb f6:80 76 ed ]

    fffff802975b002e-fffff802975b0031 4 bytes - nt!MiInitializeDynamicBitmap+142 (+0x44)

    [ a0 7d fb f6:40 bb 76 ed ]

    fffff802975b0040-fffff802975b0044 5 bytes - nt!MiInitializeDynamicBitmap+154 (+0x12)

    [ d0 be 7d fb f6:a0 5d bb 76 ed ]

    fffff802975b012c-fffff802975b012d 2 bytes - nt!MiInitializeDynamicBitmap+240 (+0xec)

    [ 80 f6:00 ed ]

    fffff802975b016e-fffff802975b016f 2 bytes - nt!MiInitializeDynamicBitmap+282 (+0x42)

    [ 80 fa:00 df ]

    fffff802975b05dc-fffff802975b05dd 2 bytes - nt!MiSessionCreateInternal+12c (+0x46e)

    [ 80 f6:00 ed ]

    fffff802975b083a-fffff802975b083b 2 bytes - nt!MiMapNewSession+c2 (+0x25e)

    [ 80 fa:00 df ]

    fffff802975b084d-fffff802975b084f 3 bytes - nt!MiMapNewSession+d5 (+0x13)

    [ 40 fb f6:80 76 ed ]

    fffff802975b0856-fffff802975b0859 4 bytes - nt!MiMapNewSession+de (+0x09)

    [ a0 7d fb f6:40 bb 76 ed ]

    fffff802975b08ec-fffff802975b08f0 5 bytes - nt!MiMapNewSession+174 (+0x96)

    [ d0 be 7d fb f6:a0 5d bb 76 ed ]

    fffff802975b0951-fffff802975b0954 4 bytes - nt!MiMapNewSession+1d9 (+0x65)

    [ a0 7d fb f6:40 bb 76 ed ]

    fffff802975b0967-fffff802975b0968 2 bytes - nt!MiMapNewSession+1ef (+0x16)

    [ 80 fa:00 df ]

    fffff802975b097a-fffff802975b097c 3 bytes - nt!MiMapNewSession+202 (+0x13)

    [ 40 fb f6:80 76 ed ]

    fffff802975b09c9-fffff802975b09ca 2 bytes - nt!MiMapNewSession+251 (+0x4f)

    [ 80 fa:00 df ]

    fffff802975b0a30-fffff802975b0a32 3 bytes - nt!MiMapNewSession+2b8 (+0x67)

    [ 40 fb f6:80 76 ed ]

    fffff802975b0a69-fffff802975b0a6c 4 bytes - nt!MiMapNewSession+2f1 (+0x39)

    [ a0 7d fb f6:40 bb 76 ed ]

    fffff802975b0a7e-fffff802975b0a82 5 bytes - nt!MiMapNewSession+306 (+0x15)

    [ d0 be 7d fb f6:a0 5d bb 76 ed ]

    fffff802975ba135-fffff802975ba136 2 bytes - nt!MiReleaseDriverPtes+41 (+0x96b7)

    [ 80 f6:00 ed ]

    fffff802975ba229-fffff802975ba22a 2 bytes - nt!MiReleaseDriverPtes+135 (+0xf4)

    [ 80 f6:00 ed ]

    WARNING: !chkimg output was truncated to 50 lines. Invoke !chkimg without '-lo [num_lines]' to view entire output.

    4776 errors : !nt (fffff80297091594-fffff802976f62d2)

    MODULE_NAME: memory_corruption

    IMAGE_NAME: memory_corruption

    FOLLOWUP_NAME: memory_corruption

    MEMORY_CORRUPTOR: LARGE

    FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE

    BUCKET_ID: MEMORY_CORRUPTION_LARGE

    PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE

    TARGET_TIME: 2016-10-26T18:25:13.000Z

    OSBUILD: 14393

    OSSERVICEPACK: 0

    SERVICEPACK_NUMBER: 0

    OS_REVISION: 0

    SUITE_MASK: 272

    PRODUCT_TYPE: 1

    OSPLATFORM_TYPE: x64

    OSNAME: Windows 10

    OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS

    OS_LOCALE:

    USER_LCID: 0

    OSBUILD_TIMESTAMP: 2016-10-05 11:17:53

    BUILDDATESTAMP_STR: 161004-2338

    BUILDLAB_STR: rs1_release_inmarket

    BUILDOSVER_STR: 10.0.14393.321.amd64fre.rs1_release_inmarket.161004-2338

    ANALYSIS_SESSION_ELAPSED_TIME: 4d4f

    ANALYSIS_SOURCE: KM

    FAILURE_ID_HASH_STRING: km:memory_corruption_large

    FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

    Followup: memory_corruption

    ---------
     
    MichelKant, Feb 22, 2017
    #2
  3. XP ROCKS. Win User
    Need help with BSOD, daily BSOD errors

    ffffcd81`053cd410 fffff80b`40dc10f1 : 00000000`00000005 ffffb989`792308c0 ffffb989`7428ba60 ffffb989`7428bfb0 :
    cbfs5+0x2bf4

    ffffcd81`053cd440 fffff802`974e8144 : 00000000`00000005 ffffcd81`053cd750 ffffb989`792308c0 ffffb989`00000000 :
    cbfs5+0x10f1

    ffffcd81`053cd480 fffff802`97528542 : fffff802`974e7780 fffff802`974e7780 ffffcd81`053cd750 ffffb989`713bb770 : nt!IopParseDevice+0x9c4

    Update or reinstall your ELDOS Callback File System Driver, cbfs5.sys.

    /n software - A Bright Future for EldoS Products
     
    XP ROCKS., Feb 22, 2017
    #3
  4. Redbatman Win User

    Help with BSOD!!!!!

    Forgot this one too.

    On Thu 2/23/2017 2:41:17 AM GMT your computer crashed
    crash dump file: C:\WINDOWS\memory.dmp
    This was probably caused by the following module: win32kfull.sys (win32kfull+0x9076D)
    Bugcheck code: 0x139 (0x3, 0xFFFFA2005E012610, 0xFFFFA2005E012568, 0x0)
    Error: KERNEL_SECURITY_CHECK_FAILURE
    file path: C:\WINDOWS\system32\win32kfull.sys
    product: Microsoft® Windows® Operating System
    company: Microsoft Corporation
    description: Full/Desktop Win32k Kernel Driver
    Bug check description: The kernel has detected the corruption of a critical data structure.
    The crash took place in a standard Microsoft module. Your system configuration may be incorrect. Possibly this problem is caused by another driver on your system that cannot be identified at this time.
     
    Redbatman, Feb 22, 2017
    #4
  5. Help with BSOD!!!!! [​IMG]
    Attention:

    Before posting a BSOD thread, please read the instructions here: Blue Screen of Death (BSOD) Posting Instructions

    If you need to add new information, please make a new post in your initial BSOD thread. Please do not make an extra new thread.
     
    BSODHunter, Apr 5, 2018
    #5
Thema:

Help with BSOD!!!!!

Loading...
  1. Help with BSOD!!!!! - Similar Threads - Help BSOD

  2. I need help fixing my BSOD bootloop in my laptop, it occured after updating the latest...

    in Windows 10 Gaming
    I need help fixing my BSOD bootloop in my laptop, it occured after updating the latest...: This type or errors are being displayed. https://answers.microsoft.com/en-us/windows/forum/all/i-need-help-fixing-my-bsod-bootloop-in-my-laptop/b7d9ce41-f5a0-4199-883e-cd864f0288d6
  3. I need help fixing my BSOD bootloop in my laptop, it occured after updating the latest...

    in Windows 10 Software and Apps
    I need help fixing my BSOD bootloop in my laptop, it occured after updating the latest...: This type or errors are being displayed. https://answers.microsoft.com/en-us/windows/forum/all/i-need-help-fixing-my-bsod-bootloop-in-my-laptop/b7d9ce41-f5a0-4199-883e-cd864f0288d6
  4. BSOD IRQL_NOT_LESS_OR_EQUAL - Can anyone help me analyze the minidump?

    in Windows 10 Gaming
    BSOD IRQL_NOT_LESS_OR_EQUAL - Can anyone help me analyze the minidump?: Hi there,Can anyone help me analyze what's causing an issue with a PC.Here's the minidump.Thank you.******************************************************************************** ** Bugcheck Analysis **...
  5. BSOD IRQL_NOT_LESS_OR_EQUAL - Can anyone help me analyze the minidump?

    in Windows 10 Software and Apps
    BSOD IRQL_NOT_LESS_OR_EQUAL - Can anyone help me analyze the minidump?: Hi there,Can anyone help me analyze what's causing an issue with a PC.Here's the minidump.Thank you.******************************************************************************** ** Bugcheck Analysis **...
  6. BSOD IRQL_NOT_LESS_OR_EQUAL - Can anyone help me analyze the minidump?

    in Windows 10 BSOD Crashes and Debugging
    BSOD IRQL_NOT_LESS_OR_EQUAL - Can anyone help me analyze the minidump?: Hi there,Can anyone help me analyze what's causing an issue with a PC.Here's the minidump.Thank you.******************************************************************************** ** Bugcheck Analysis **...
  7. BSOD help

    in Windows 10 Gaming
    BSOD help: Recently been having issues with screen turning off and fans starting to spin at 100% for what seems to be no reasonJust recently got BSOD VIDEO_DXGKRNL_FATAL_ERROR.Happens when nothing is running and temps are fine seems...
  8. BSOD help

    in Windows 10 Software and Apps
    BSOD help: Recently been having issues with screen turning off and fans starting to spin at 100% for what seems to be no reasonJust recently got BSOD VIDEO_DXGKRNL_FATAL_ERROR.Happens when nothing is running and temps are fine seems...
  9. Please help. BSOD in Windows 11 when on certain Wifi network maybe

    in Windows 10 Gaming
    Please help. BSOD in Windows 11 when on certain Wifi network maybe: HiI have trouble with my daughter's computer.For some reason it BSOD several times per day when working on certain location wifi. When using the network sharing from Iphone, there is no problem. When using network from university, there is BSOD. There is also a Cisco Secure...
  10. Please help. BSOD in Windows 11 when on certain Wifi network maybe

    in Windows 10 Software and Apps
    Please help. BSOD in Windows 11 when on certain Wifi network maybe: HiI have trouble with my daughter's computer.For some reason it BSOD several times per day when working on certain location wifi. When using the network sharing from Iphone, there is no problem. When using network from university, there is BSOD. There is also a Cisco Secure...