BSOD Mini dump issue

Nov 23, 2018
5
0
10
Hi can anyone please help me diagnose this issue? I had multiple screen freezes and caused a BSOD loop.

This is the mini dump:
Crash Dump Analysis provided by OSR Open Systems Resources, Inc. (http://www.osr.com)
Online Crash Dump Analysis Service
See http://www.osronline.com for more information
Windows 8 Kernel Version 17134 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Machine Name:
Kernel base = 0xfffff803`7faa6000 PsLoadedModuleList = 0xfffff803`7fe54150
Debug session time: Sat Jan 12 15:19:06.726 2019 (UTC - 5:00)
System Uptime: 0 days 0:00:06.356
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8037faabef2, Address of the instruction which caused the bugcheck
Arg3: ffffef893ce2f640, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at "0x%08lx" referenced memory at "0x%08lx". The memory could not be "%s".

FAULTING_IP:
nt!KxWaitForLockOwnerShipWithIrql+12
fffff803`7faabef2 48890a mov qword ptr [rdx],rcx

CONTEXT: ffffef893ce2f640 -- (.cxr 0xffffef893ce2f640)
rax=0000000000000000 rbx=ffff800439f3ea40 rcx=ffffef893ce30090
rdx=2a28200000000000 rsi=ffff80043e9bd080 rdi=ffffef893ce30090
rip=fffff8037faabef2 rsp=ffffef893ce30030 rbp=0000000000000002
r8=ffffef893ce300c8 r9=0000000000000000 r10=ffff800439f3eaa0
r11=0000000fffffffff r12=ffffef893ce302c0 r13=0000000000000702
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di ng nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010082
nt!KxWaitForLockOwnerShipWithIrql+0x12:
fffff803`7faabef2 48890a mov qword ptr [rdx],rcx ds:002b:2a282000`00000000=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT

BUGCHECK_STR: 0x3B

PROCESS_NAME: csrss.exe

CURRENT_IRQL: 0

BAD_PAGES_DETECTED: d476

LAST_CONTROL_TRANSFER: from fffff8037fb38eec to fffff8037faabef2

STACK_TEXT:
ffffef89`3ce30030 fffff803`7fb38eec : ffff8004`39f3ea40 00000000`00000005 ffffef89`3ce30080 fffff80e`0dfdd0e0 : nt!KxWaitForLockOwnerShipWithIrql+0x12
ffffef89`3ce30060 fffff80e`0defab85 : ffff9f04`46e35010 ffffef89`3ce30202 ffffef89`3ce30240 fffff80e`0dfeeee0 : nt!ExReleaseResourceLite+0xfc
ffffef89`3ce300c0 fffff80e`0defa730 : 00000000`00000000 00000000`00000001 ffffef89`3ce30240 00000000`00000000 : Ntfs!NtfsCleanupIrpContext+0x305
ffffef89`3ce30120 fffff80e`0dfdc28b : 00000000`00000000 00000000`00000000 ffffef89`3ce30210 fffff80e`0db99532 : Ntfs!NtfsExtendedCompleteRequestInternal+0x140
ffffef89`3ce30190 fffff803`7fb3ee69 : ffff8004`39c06bf0 ffffef89`3ce30590 ffff8004`39f0db80 ffff8004`33721df0 : Ntfs!NtfsFsdCleanup+0x1db
ffffef89`3ce304c0 fffff80e`0db97207 : ffffef89`3ce30590 fffff80e`0db953b4 ffff8004`39f0db80 00000000`00000012 : nt!IofCallDriver+0x59
ffffef89`3ce30500 fffff80e`0db951c6 : ffffef89`3ce30590 00000000`00000000 ffff8004`33721df0 00000000`00000000 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x157
ffffef89`3ce30570 fffff803`7fb3ee69 : ffff8004`39f479f0 fffff803`7fb3f135 00000000`00000000 ffffef89`3ce307a0 : FLTMGR!FltpDispatch+0xb6
ffffef89`3ce305d0 fffff803`7ff6d7fe : ffff8004`39f479f0 00000000`00000000 00000000`00000000 fffff803`7fae400c : nt!IofCallDriver+0x59
ffffef89`3ce30610 fffff803`7ff6c4e7 : ffff8004`33721df0 ffff8004`33721df0 00000000`000000c5 00000000`00000001 : nt!IopCloseFile+0x15e
ffffef89`3ce306a0 fffff803`7ff9b82b : fffff803`7ff6b430 fffff803`7ff6b430 ffffef89`00000000 ffff8004`33700c40 : nt!IopParseDevice+0x10b7
ffffef89`3ce30870 fffff803`7ff69cdf : ffff8004`39e6eb00 ffffef89`3ce30ae8 00000000`00000040 ffff8004`31777b00 : nt!ObpLookupObjectName+0x73b
ffffef89`3ce30a50 fffff803`7ff8af8a : 00000000`00000001 00000000`00000028 00000000`00000001 00000215`fae13280 : nt!ObOpenObjectByNameEx+0x1df
ffffef89`3ce30b90 fffff803`7fc60743 : ffff8004`00000170 00000000`00000000 ffff8004`3e9bd080 00000215`fae13280 : nt!NtQueryAttributesFile+0x19a
ffffef89`3ce30e40 00007ffa`6737b144 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
0000006f`f1ffeea8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7ffa`6737b144


SYMBOL_NAME: PAGE_NOT_ZERO

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: Unknown_Module

IMAGE_NAME: Unknown_Image

DEBUG_FLR_IMAGE_TIMESTAMP: 0

STACK_COMMAND: .cxr 0xffffef893ce2f640 ; kb

BUCKET_ID: PAGE_NOT_ZERO

Followup: MachineOwner
---------

*** Memory manager detected 54390 instance(s) of page corruption, target is likely to have memory corruption.





then this:


Crash Dump Analysis provided by OSR Open Systems Resources, Inc. (http://www.osr.com)
Online Crash Dump Analysis Service
See http://www.osronline.com for more information
Windows 8 Kernel Version 17134 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Machine Name:
Kernel base = 0xfffff800`7449a000 PsLoadedModuleList = 0xfffff800`74848150
Debug session time: Sat Jan 12 15:31:16.912 2019 (UTC - 5:00)
System Uptime: 0 days 0:00:09.656
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff800744c5b64, Address of the instruction which caused the bugcheck
Arg3: ffff878b6b297830, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at "0x%08lx" referenced memory at "0x%08lx". The memory could not be "%s".

FAULTING_IP:
nt!KxWaitForLockOwnerShip+14
fffff800`744c5b64 48890a mov qword ptr [rdx],rcx

CONTEXT: ffff878b6b297830 -- (.cxr 0xffff878b6b297830)
rax=0000000000000000 rbx=0000000000000000 rcx=ffff878b6b298298
rdx=0800000000000000 rsi=fffff8007487d8c0 rdi=ffff878b6b298298
rip=fffff800744c5b64 rsp=ffff878b6b298220 rbp=ffff878b6b2982d9
r8=0000000000000000 r9=0000000000000000 r10=0000000000000001
r11=0000000000000002 r12=0000000020206f49 r13=fffff8007487d8c8
r14=0000000000000200 r15=0000000000000003
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246
nt!KxWaitForLockOwnerShip+0x14:
fffff800`744c5b64 48890a mov qword ptr [rdx],rcx ds:002b:08000000`00000000=????????????????
Resetting default scope

DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT

BUGCHECK_STR: 0x3B

PROCESS_NAME: svchost.exe

CURRENT_IRQL: 2

BAD_PAGES_DETECTED: d5b7

LAST_CONTROL_TRANSFER: from fffff80074784bc3 to fffff800744c5b64

STACK_TEXT:
ffff878b`6b298220 fffff800`74784bc3 : fffff800`7487da20 00000000`00000000 fffff800`7487d8c8 ffffdc8d`0af17900 : nt!KxWaitForLockOwnerShip+0x14
ffff878b`6b298250 fffff800`744a79d6 : fffff800`00000000 00000000`00001000 ffff878b`20206f49 ffffdc8d`00000000 : nt!ExAllocatePoolWithTag+0x7b3
ffff878b`6b298340 fffff800`744a7a77 : 00000000`00000001 ffffdc8d`0a977ef0 00000000`00100081 00000000`00000020 : nt!IopVerifierExAllocatePool+0x22
ffff878b`6b298370 fffff800`7493c84f : 00000000`c000000d ffffdc8d`0a977ef0 ffffdc8d`0579ab70 ffff878b`6b298588 : nt!IopGetSetSpecificExtension+0x93
ffff878b`6b2983c0 fffff800`749613d4 : ffffdc8d`0a977ef0 00000000`00000000 00000000`00000030 00000000`00000000 : nt!IopAllocateFoExtensionsOnCreate+0x83
ffff878b`6b298410 fffff800`7495fa76 : 00000000`000000a6 ffffdc8d`0579ab70 ffffdc8d`05745c70 ffffdc8d`03660001 : nt!IopAllocRealFileObject+0x3a4
ffff878b`6b2984e0 fffff800`74a285b7 : 00000000`00000000 ffffdc8d`09cc7b10 dc8d0af1`79c0ffff ffffdc8d`0af179f0 : nt!IopParseDevice+0x646
ffff878b`6b2986b0 fffff800`7498f82b : fffff800`74a284f0 ffff878b`6b298820 ffffdc8d`0af179c0 00000000`00000079 : nt!IopParseFile+0xc7
ffff878b`6b298720 fffff800`7495dcdf : ffffdc8d`0aeb7b10 ffff878b`6b298998 ffff878b`00000240 ffffdc8d`03775840 : nt!ObpLookupObjectName+0x73b
ffff878b`6b298900 fffff800`7495a045 : ffffdc8d`00000001 00000000`00000000 00000000`00000000 00000000`00000028 : nt!ObOpenObjectByNameEx+0x1df
ffff878b`6b298a40 fffff800`749ec425 : ffff878b`6b298e38 ffffdc8d`0588a7e0 ffff878b`6b298e60 ffff878b`6b298ea0 : nt!IopCreateFile+0x3f5
ffff878b`6b298ae0 fffff809`8f47e845 : 00000000`00000000 ffff878b`6b298d61 ffff878b`6b298e40 ffff878b`6b298e01 : nt!IoCreateFileEx+0x115
ffff878b`6b298b80 fffff809`8f47eac8 : ffffdc8d`06a3e880 ffff878b`6b298eb0 ffff878b`6b298e38 ffff878b`6b298e40 : FLTMGR!FltpCreateFile+0x1cd
ffff878b`6b298c80 fffff809`8ee13e41 : ffffdc8d`05609a00 ffffdc8d`06a3e880 ffff878b`6b298e38 ffff878b`6b298e40 : FLTMGR!FltCreateFileEx2+0xd8
ffff878b`6b298db0 fffff809`8edf6c48 : ffffdc8d`05785b60 00000000`00000000 00000000`00000000 ffffdc8d`0ae2ffa0 : Wof!WofRelativeStreamOpen+0x245
ffff878b`6b298f50 fffff809`8ee1ebce : ffff878b`6b298fb8 ffffdc8d`05785be0 ffffa184`a1902a20 00000000`00000000 : Wof!FileProvOpenBackingObject+0x24
ffff878b`6b298fa0 fffff809`8ee0e705 : 00000000`00000000 00000000`00000000 00000000`00000000 ffff878b`6b299100 : Wof!FileProvCbLocateGenerateContext+0x4e
ffff878b`6b298fe0 fffff809`8ee0e371 : ffffdc8d`0a7dfc58 ffffdc8d`0a7dfc58 ffffdc8d`0a7dfc00 ffff878b`6b299100 : Wof!WofCreateOpenContext+0x299
ffff878b`6b2990b0 fffff809`8f445cd4 : ffffdc8d`0a7dfc58 00000000`00000000 ffffdc8d`0a7dfb70 00000000`00000000 : Wof!WofPostCreateCallback+0x581
ffff878b`6b2991d0 fffff809`8f445683 : 00000000`00000000 ffffdc8d`0b07ff00 ffffdc8d`0579ab70 00000000`00000000 : FLTMGR!FltpPerformPostCallbacks+0x2f4
ffff878b`6b2992a0 fffff809`8f44726a : ffffdc8d`0b07ff68 ffffdc8d`0a7dfb70 00000000`00000008 ffffdc8d`0b07fb80 : FLTMGR!FltpPassThroughCompletionWorker+0x73
ffff878b`6b299310 fffff809`8f47bbcd : ffff878b`6b2993c0 ffffdc8d`0b07ff68 ffffdc8d`0afd7990 fffff800`74961270 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x1ba
ffff878b`6b299380 fffff800`74532e69 : ffffdc8d`0579ab00 00000000`00000005 00000000`00000005 ffffdc8d`057468d0 : FLTMGR!FltpCreate+0x2dd
ffff878b`6b299430 fffff800`7495fba3 : 00000000`00000005 ffff878b`6b299740 ffffdc8d`0afd7990 ffffdc8d`00000000 : nt!IofCallDriver+0x59
ffff878b`6b299470 fffff800`7498f82b : fffff800`7495f430 fffff800`7495f430 ffff878b`00000000 ffffdc8d`05745c40 : nt!IopParseDevice+0x773
ffff878b`6b299640 fffff800`7495dcdf : ffffdc8d`0b02fb00 ffff878b`6b2998b8 00000000`00000840 ffffdc8d`03775840 : nt!ObpLookupObjectName+0x73b
ffff878b`6b299820 fffff800`7495a045 : 00000000`00000001 00000000`00000000 00000000`00000000 00000000`00000028 : nt!ObOpenObjectByNameEx+0x1df
ffff878b`6b299960 fffff800`749ab908 : 000000b6`ef2fcdf0 00000000`00000000 000000b6`ef2fcd70 000000b6`ef2fcd60 : nt!IopCreateFile+0x3f5
ffff878b`6b299a00 fffff800`74654743 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtOpenFile+0x58
ffff878b`6b299a90 00007ffc`bfd8b004 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
000000b6`ef2fcd08 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7ffc`bfd8b004


SYMBOL_NAME: PAGE_NOT_ZERO

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: Unknown_Module

IMAGE_NAME: Unknown_Image

DEBUG_FLR_IMAGE_TIMESTAMP: 0

STACK_COMMAND: .cxr 0xffff878b6b297830 ; kb

BUCKET_ID: PAGE_NOT_ZERO

Followup: MachineOwner
---------

*** Memory manager detected 54711 instance(s) of page corruption, target is likely to have memory corruption.




and then this:



Crash Dump Analysis provided by OSR Open Systems Resources, Inc. (http://www.osr.com)
Online Crash Dump Analysis Service
See http://www.osronline.com for more information
Windows 8 Kernel Version 17134 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Machine Name:
Kernel base = 0xfffff801`f2e94000 PsLoadedModuleList = 0xfffff801`f3242150
Debug session time: Sat Jan 12 15:35:20.216 2019 (UTC - 5:00)
System Uptime: 0 days 0:00:06.980
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff801f2ebfb64, Address of the instruction which caused the bugcheck
Arg3: fffff905bf185f20, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at "0x%08lx" referenced memory at "0x%08lx". The memory could not be "%s".

FAULTING_IP:
nt!KxWaitForLockOwnerShip+14
fffff801`f2ebfb64 48890a mov qword ptr [rdx],rcx

CONTEXT: fffff905bf185f20 -- (.cxr 0xfffff905bf185f20)
rax=0000000000000000 rbx=0000000000000000 rcx=fffff905bf186988
rdx=2002000000000000 rsi=fffff801f32778c0 rdi=fffff905bf186988
rip=fffff801f2ebfb64 rsp=fffff905bf186910 rbp=fffff905bf1869c9
r8=0000000000000000 r9=0000000000000000 r10=0000000000000001
r11=0000000000000002 r12=0000000061546552 r13=fffff801f32778c8
r14=0000000000000200 r15=0000000000000004
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246
nt!KxWaitForLockOwnerShip+0x14:
fffff801`f2ebfb64 48890a mov qword ptr [rdx],rcx ds:002b:20020000`00000000=????????????????
Resetting default scope

DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT

BUGCHECK_STR: 0x3B

PROCESS_NAME: csrss.exe

CURRENT_IRQL: 2

BAD_PAGES_DETECTED: 43d0

LAST_CONTROL_TRANSFER: from fffff801f317ebc3 to fffff801f2ebfb64

STACK_TEXT:
fffff905`bf186910 fffff801`f317ebc3 : fffff801`f32785a0 fffff801`f2f30c7f 00000000`00000000 00000000`00000000 : nt!KxWaitForLockOwnerShip+0x14
fffff905`bf186940 fffff801`f2e9a0c6 : fffff905`00000000 00000000`00001000 00000000`61546552 00000000`00000000 : nt!ExAllocatePoolWithTag+0x7b3
fffff905`bf186a30 fffff801`f2e99ed0 : ffffe203`baff4eb0 ffffe203`bc46edd0 ffffe203`baff4f00 fffff905`00000000 : nt!ExpExpandResourceOwnerTable+0x4e
fffff905`bf186a90 fffff801`f2f2482f : fffff905`bf186b40 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ExpFindCurrentThread+0x160
fffff905`bf186ad0 fffff801`f2f245d0 : 00000000`00000002 ffffe203`bc46edd0 fffff905`bf186d60 00000000`00000001 : nt!ExpAcquireResourceSharedLite+0x19f
fffff905`bf186b70 fffff80e`feedf22b : fffff905`00000000 ffffa20b`cd9c49e0 00000000`00000000 ffffe203`b964ac40 : nt!ExAcquireResourceSharedLite+0x40
fffff905`bf186bb0 fffff80e`feedeca4 : fffff905`bf186d60 ffffe203`baf909f0 00000000`0000000c fffff905`00000002 : Ntfs!NtfsCommonQueryInformation+0x3bb
fffff905`bf186cc0 fffff80e`feedebb0 : fffff905`bf186d60 ffffe203`baf909f0 ffffe203`baf909f0 ffffe203`baf909f0 : Ntfs!NtfsFsdDispatchSwitch+0xd4
fffff905`bf186d40 fffff801`f2f2ce69 : ffffe203`b705d030 fffff801`f2ed20bc 00000000`0000000c 00000000`00000004 : Ntfs!NtfsFsdDispatchWait+0x40
fffff905`bf186fc0 fffff80e`fd09db85 : ffffe203`baf909f0 ffffe203`b705d030 00000000`00000000 ffffe203`baff3d60 : nt!IofCallDriver+0x59
fffff905`bf187000 fffff80e`fd09d9c5 : ffffe203`bafd1f00 00000000`00000000 fffff905`bf187138 ffffe203`b90cadf0 : FLTMGR!FltpQueryInformationFile+0x115
fffff905`bf187090 fffff80e`fd09d83e : ffffe203`b9418880 fffff80e`fd0695dd ffffe203`b9418880 fffff801`f2f26eb8 : FLTMGR!QueryStandardLinkInformation+0x4d
fffff905`bf187110 fffff80e`fd068cea : ffffe203`b94187e0 ffffe203`bc4408e0 ffffe203`bc4408e0 ffffe203`baff11b8 : FLTMGR!FltpSetStreamListStandardInformationFlags+0x7e
fffff905`bf187190 fffff80e`fd069c9c : ffffe203`bafd1b80 ffffe203`baff11b0 00000000`00000000 fffff80e`fedfa777 : FLTMGR!FltpGetFileNameInformation+0x6da
fffff905`bf187230 fffff80e`fed2cd1f : ffffe203`00000000 fffff780`00000320 fffff905`bf1872d0 00000000`00000008 : FLTMGR!FltGetFileNameInformation+0x1bc
fffff905`bf1872b0 fffff80e`fed2d884 : ffffa20b`cd9c2380 ffffe203`b9616730 00000000`00000000 fffff905`00000000 : fileinfo!FIStreamQueryInfo+0xcf
fffff905`bf187350 fffff80e`fd065cd4 : ffffe203`b9616960 fffff905`bf187448 ffffe203`bafd1f20 00000000`00000000 : fileinfo!FIPostCreateCallback+0x334
fffff905`bf187400 fffff80e`fd065683 : 00000000`00000000 ffffe203`bafd1f00 ffffe203`b90cadf0 00000000`00000000 : FLTMGR!FltpPerformPostCallbacks+0x2f4
fffff905`bf1874d0 fffff80e`fd06726a : ffffe203`bafd1f68 ffffe203`babc40a0 00000000`00000008 ffffe203`bafd1b80 : FLTMGR!FltpPassThroughCompletionWorker+0x73
fffff905`bf187540 fffff80e`fd09bbcd : fffff905`bf1875f0 ffffe203`bafd1f68 ffffe203`baffb4d0 fffff801`f335b177 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x1ba
fffff905`bf1875b0 fffff801`f2f2ce69 : fffff905`bf187b00 00000000`00000045 ffffe203`bafd1f68 ffffe203`bafd1b80 : FLTMGR!FltpCreate+0x2dd
fffff905`bf187660 fffff801`f3359ba3 : 00000000`00000045 fffff905`bf187970 ffffe203`baff3d60 fffff905`00000001 : nt!IofCallDriver+0x59
fffff905`bf1876a0 fffff801`f338982b : fffff801`f3359430 fffff801`f3359430 fffff905`00000000 ffffe203`b9093850 : nt!IopParseDevice+0x773
fffff905`bf187870 fffff801`f3357cdf : ffffe203`baff3000 fffff905`bf187ae8 00000000`00000040 ffffe203`b70c69a0 : nt!ObpLookupObjectName+0x73b
fffff905`bf187a50 fffff801`f3378f8a : 00000000`00000001 00000000`00000028 00000000`00000001 0000026e`116174d0 : nt!ObOpenObjectByNameEx+0x1df
fffff905`bf187b90 fffff801`f304e743 : ffffe203`00000170 00000000`00000000 ffffe203`babf4080 0000026e`116174d0 : nt!NtQueryAttributesFile+0x19a
fffff905`bf187e40 00007ffd`7d26b144 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000094`75c3efc8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7ffd`7d26b144


SYMBOL_NAME: PAGE_NOT_ZERO

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: Unknown_Module

IMAGE_NAME: Unknown_Image

DEBUG_FLR_IMAGE_TIMESTAMP: 0

STACK_COMMAND: .cxr 0xfffff905bf185f20 ; kb

BUCKET_ID: PAGE_NOT_ZERO

Followup: MachineOwner
---------

*** Memory manager detected 17360 instance(s) of page corruption, target is likely to have memory corruption.



Any help would be muchly appreciated thanks.
 
Nov 23, 2018
5
0
10
MERGED QUESTION
Question from superjam34 : "Memtest shutdown bsod ntoskl.exe psu or overheat issue?"

Hi i have had random bsod issues relating to ntoskl.exe even while browsing. I was advised to do memcheck but it causes shutdown after about 3 minutes running the memtest(memory diagnostic runs fine). I have removed/swapped the ram etc so dont think thats the problem plus im sure this would come up with errors rather than a shut down. I therefore think its either cpu overheat or the psu. Can i test the psu without buying an expensive meter? The cpu seems to run at 45-50 in bios and 30-50 whilst browsing via heat monitor so not sure will be that...

Any help would be great. Thanks