Microsoft (R) Windows Debugger Version 10.0.16299.15 AMD64Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\102817-27781-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 10 Kernel Version 16299 MP (16 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 16299.15.amd64fre.rs3_release.170928-1534
Machine Name:
Kernel base = 0xfffff801`e2a90000 PsLoadedModuleList = 0xfffff801`e2df1fd0
Debug session time: Sat Oct 28 13:32:11.461 2017 (UTC + 2:00)
System Uptime: 0 days 0:33:40.289
Loading Kernel Symbols
.
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
..............................................................
................................................................
...........................................................
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {ffff840d4b3348b8, ff, 0, fffff801e2af4bf3}
Probably caused by : ntkrnlmp.exe ( nt!KiEndThreadAccountingPeriod+93 )
Followup: MachineOwner
---------
10: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffff840d4b3348b8, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff801e2af4bf3, address which referenced memory
Debugging Details:
------------------
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 10.0.16299.19 (WinBuild.160101.0800)
SYSTEM_PRODUCT_NAME: To Be Filled By O.E.M.
SYSTEM_SKU: To Be Filled By O.E.M.
SYSTEM_VERSION: To Be Filled By O.E.M.
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: P3.20
BIOS_DATE: 08/25/2017
BASEBOARD_MANUFACTURER: ASRock
BASEBOARD_PRODUCT: X370 Killer SLI
BASEBOARD_VERSION:
DUMP_TYPE: 2
BUGCHECK_P1: ffff840d4b3348b8
BUGCHECK_P2: ff
BUGCHECK_P3: 0
BUGCHECK_P4: fffff801e2af4bf3
READ_ADDRESS: fffff801e2e88380: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
ffff840d4b3348b8
CURRENT_IRQL: d
FAULTING_IP:
nt!KiEndThreadAccountingPeriod+93
fffff801`e2af4bf3 498b0cc2 mov rcx,qword ptr [r10+rax*8]
CPU_COUNT: 10
CPU_MHZ: bb2
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 1
CPU_STEPPING: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: chrome.exe
ANALYSIS_SESSION_HOST: DESKTOP-BHGAPCH
ANALYSIS_SESSION_TIME: 10-28-2017 23:14:53.0580
ANALYSIS_VERSION: 10.0.16299.15 amd64fre
TRAP_FRAME: ffffdd80a296ddf0 -- (.trap 0xffffdd80a296ddf0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000004 rbx=0000000000000000 rcx=0000000000000033
rdx=0000000000000002 rsi=0000000000000000 rdi=0000000000000000
rip=fffff801e2af4bf3 rsp=ffffdd80a296df80 rbp=ffffae821fd10b80
r8=000000000003e454 r9=0000000000000020 r10=ffff840d4b334898
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di pl nz ac pe nc
nt!KiEndThreadAccountingPeriod+0x93:
fffff801`e2af4bf3 498b0cc2 mov rcx,qword ptr [r10+rax*8] ds:ffff840d`4b3348b8=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff801e2bff1e9 to fffff801e2bf3960
STACK_TEXT:
ffffdd80`a296dca8 fffff801`e2bff1e9 : 00000000`0000000a ffff840d`4b3348b8 00000000`000000ff 00000000`00000000 : nt!KeBugCheckEx
ffffdd80`a296dcb0 fffff801`e2bfd57d : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffdd80`a296ddf0 fffff801`e2af4bf3 : 00000000`00000000 ffff05e1`ad1fb1a6 ffff840d`3ea2e700 00000000`00000000 : nt!KiPageFault+0x23d
ffffdd80`a296df80 fffff801`e2bf5050 : ffff840d`3cce9c00 ffff840d`3ccd5480 000000aa`861ff248 00000000`00000580 : nt!KiEndThreadAccountingPeriod+0x93
ffffdd80`a296dfb0 fffff801`e2bf54c7 : ffff840d`4b134080 00000000`00000000 00000000`00000000 ffff840d`3e6b9c10 : nt!KiInterruptSubDispatchNoLockNoEtw+0xc0
ffffae82`1fd10b00 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatchNoLockNoEtw+0x37
THREAD_SHA1_HASH_MOD_FUNC: 1355271353bf64ae7d40cf74a6b4118c432449f6
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 4eb5bf2f9c8e883eae90ee238555fd3d84d0e550
THREAD_SHA1_HASH_MOD: ee8fcf1fb60cb6e3e2f60ddbed2ec02b5748a693
FOLLOWUP_IP:
nt!KiEndThreadAccountingPeriod+93
fffff801`e2af4bf3 498b0cc2 mov rcx,qword ptr [r10+rax*8]
FAULT_INSTR_CODE: c20c8b49
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!KiEndThreadAccountingPeriod+93
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 59dc593b
IMAGE_VERSION: 10.0.16299.19
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 93
FAILURE_BUCKET_ID: AV_nt!KiEndThreadAccountingPeriod
BUCKET_ID: AV_nt!KiEndThreadAccountingPeriod
PRIMARY_PROBLEM_CLASS: AV_nt!KiEndThreadAccountingPeriod
TARGET_TIME: 2017-10-28T11:32:11.000Z
OSBUILD: 16299
OSSERVICEPACK: 19
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 784
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2017-10-10 07:23:07
BUILDDATESTAMP_STR: 160101.0800
BUILDLAB_STR: WinBuild
BUILDOSVER_STR: 10.0.16299.19
ANALYSIS_SESSION_ELAPSED_TIME: 575
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_nt!kiendthreadaccountingperiod
FAILURE_ID_HASH: {7a809042-ee97-4189-e45a-6c3a9015ffc5}
Followup: MachineOwner
---------