I been receiving BSOD when trying to Game/stream there are time it works completely fine, and then other times it wants to give the BSOD. I disabled some stuff in my task scheduler which fixes the problems at some point.
I would like to find a fix so i don't have to having this issue..
Debugging Details:
------------------
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 10.0.15063.674 (WinBuild.160101.0800)
SYSTEM_MANUFACTURER: To be filled by O.E.M.
SYSTEM_PRODUCT_NAME: To be filled by O.E.M.
SYSTEM_SKU: SKU
SYSTEM_VERSION: To be filled by O.E.M.
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 1001
BIOS_DATE: 06/07/2017
BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
BASEBOARD_PRODUCT: 970 PRO GAMING/AURA
BASEBOARD_VERSION: Rev 1.xx
DUMP_TYPE: 2
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff8003badd154
BUGCHECK_P3: ffffc400580cb750
BUGCHECK_P4: 0
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
FAULTING_IP:
nt!KxWaitForLockOwnerShip+14
fffff800`3badd154 48890a mov qword ptr [rdx],rcx
CONTEXT: ffffc400580cb750 -- (.cxr 0xffffc400580cb750)
rax=0000000000000087 rbx=0000000000000000 rcx=ffffc400580cc1a0
rdx=b803000000000000 rsi=0000000000000001 rdi=ffffc400580cc1a0
rip=fffff8003badd154 rsp=ffffc400580cc140 rbp=ffffc400580cc209
r8=ffff960000007000 r9=fffff8003be0a070 r10=000000000000001b
r11=ffff960000007000 r12=0000000000000000 r13=0000000000000000
r14=fffff8003be09100 r15=000000000031c41b
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246
nt!KxWaitForLockOwnerShip+0x14:
fffff800`3badd154 48890a mov qword ptr [rdx],rcx ds:002b:b8030000`00000000=????????????????
Resetting default scope
CPU_COUNT: 8
CPU_MHZ: 10ef
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 15
CPU_MODEL: 2
CPU_STEPPING: 0
BLACKBOXBSD: 1 (!blackboxbsd)
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: 0x3B
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-45FU84S
ANALYSIS_SESSION_TIME: 10-24-2017 15:43:56.0054
ANALYSIS_VERSION: 10.0.17016.1000 amd64fre
LAST_CONTROL_TRANSFER: from fffff8003bb22669 to fffff8003badd154
STACK_TEXT:
ffffc400`580cc140 fffff800`3bb22669 : ffff9300`0954c510 fffff800`00000001 00000000`fffffffe ffff9300`0954c300 : nt!KxWaitForLockOwnerShip+0x14
ffffc400`580cc170 fffff800`3bb21b4c : 00000000`0031c41b fffff23f`ff62e0a0 00000000`0031e5c2 00000000`00000001 : nt!MiInsertPageInFreeOrZeroedList+0x819
ffffc400`580cc270 fffff800`3bb213e4 : ffff9300`00b1dec0 fffff800`3bad7cf8 ffff9300`00000000 ffff9300`00b1dec0 : nt!MiPfnShareCountIsZero+0xcc
ffffc400`580cc2c0 fffff800`3bb11092 : fffff23f`ff62e0d8 fffff23f`ff62e028 00000000`000000e5 fffff23f`ff62dff8 : nt!MiDeletePteRun+0x2b4
ffffc400`580cc430 fffff800`3bb0b98d : ffff9707`601d4748 ffff9707`5d64e080 ffff9707`601d4748 ffff9707`601d4180 : nt!MiDeleteVirtualAddresses+0x972
ffffc400`580cc6e0 fffff800`3bf17247 : ffff9707`5d64e080 ffff9707`5d30d0f0 ffff9707`5d30d0f0 ffff9707`5d64e080 : nt!MiDeleteVad+0x3ad
ffffc400`580cc860 fffff800`3bf1772e : 00000000`00000000 ffff9707`54f938e0 ffff9707`5d30d0f0 ffff9707`601d4180 : nt!MiCleanVad+0x27
ffffc400`580cc890 fffff800`3bf5559f : 00000000`00040000 00000000`00000000 ffff9707`601d4180 ffff9707`00000000 : nt!MmCleanProcessAddressSpace+0x13e
ffffc400`580cc910 fffff800`3bec6641 : ffff9707`601d4180 ffffad0d`141ef060 ffff9707`601d4180 00000000`00000000 : nt!PspRundownSingleProcess+0x11f
ffffc400`580cc990 fffff800`3bf85ff9 : 00000000`00000000 ffff9707`601d4101 000000ed`a5beb000 ffff9707`5d64e080 : nt!PspExitThread+0x57d
ffffc400`580cca90 fffff800`3bc03413 : ffff9707`601d4180 ffff9707`5d64e080 ffffc400`580ccb80 00000248`e90a0730 : nt!NtTerminateProcess+0xe9
ffffc400`580ccb00 00007ffe`c5cc5924 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
000000ed`a599fc68 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`c5cc5924
THREAD_SHA1_HASH_MOD_FUNC: f0f3d9486af072eb3d6ab4ef499ea4554d77fa53
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 57572964400ea30c7808cd8e852d59ba8fd2cfd3
THREAD_SHA1_HASH_MOD: dc844b1b94baa204d070855e43bbbd27eee98b94
FOLLOWUP_IP:
nt!KxWaitForLockOwnerShip+14
fffff800`3badd154 48890a mov qword ptr [rdx],rcx
FAULT_INSTR_CODE: 660a8948
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!KxWaitForLockOwnerShip+14
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 59cdf43a
IMAGE_VERSION: 10.0.15063.674
STACK_COMMAND: .cxr 0xffffc400580cb750 ; kb
BUCKET_ID_FUNC_OFFSET: 14
FAILURE_BUCKET_ID: 0x3B_nt!KxWaitForLockOwnerShip
BUCKET_ID: 0x3B_nt!KxWaitForLockOwnerShip
PRIMARY_PROBLEM_CLASS: 0x3B_nt!KxWaitForLockOwnerShip
TARGET_TIME: 2017-10-13T02:59:09.000Z
OSBUILD: 15063
OSSERVICEPACK: 674
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 784
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2017-09-29 03:20:26
BUILDDATESTAMP_STR: 160101.0800
BUILDLAB_STR: WinBuild
BUILDOSVER_STR: 10.0.15063.674
ANALYSIS_SESSION_ELAPSED_TIME: d9fa
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x3b_nt!kxwaitforlockownership
FAILURE_ID_HASH: {2589b5c6-b48c-6cd6-cb9e-7b9e4f7654fd}
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8003badd154, Address of the instruction which caused the bugcheck
Arg3: ffffc400580cb750, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
I would like to find a fix so i don't have to having this issue..
Debugging Details:
------------------
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 10.0.15063.674 (WinBuild.160101.0800)
SYSTEM_MANUFACTURER: To be filled by O.E.M.
SYSTEM_PRODUCT_NAME: To be filled by O.E.M.
SYSTEM_SKU: SKU
SYSTEM_VERSION: To be filled by O.E.M.
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 1001
BIOS_DATE: 06/07/2017
BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
BASEBOARD_PRODUCT: 970 PRO GAMING/AURA
BASEBOARD_VERSION: Rev 1.xx
DUMP_TYPE: 2
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff8003badd154
BUGCHECK_P3: ffffc400580cb750
BUGCHECK_P4: 0
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
FAULTING_IP:
nt!KxWaitForLockOwnerShip+14
fffff800`3badd154 48890a mov qword ptr [rdx],rcx
CONTEXT: ffffc400580cb750 -- (.cxr 0xffffc400580cb750)
rax=0000000000000087 rbx=0000000000000000 rcx=ffffc400580cc1a0
rdx=b803000000000000 rsi=0000000000000001 rdi=ffffc400580cc1a0
rip=fffff8003badd154 rsp=ffffc400580cc140 rbp=ffffc400580cc209
r8=ffff960000007000 r9=fffff8003be0a070 r10=000000000000001b
r11=ffff960000007000 r12=0000000000000000 r13=0000000000000000
r14=fffff8003be09100 r15=000000000031c41b
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246
nt!KxWaitForLockOwnerShip+0x14:
fffff800`3badd154 48890a mov qword ptr [rdx],rcx ds:002b:b8030000`00000000=????????????????
Resetting default scope
CPU_COUNT: 8
CPU_MHZ: 10ef
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 15
CPU_MODEL: 2
CPU_STEPPING: 0
BLACKBOXBSD: 1 (!blackboxbsd)
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: 0x3B
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-45FU84S
ANALYSIS_SESSION_TIME: 10-24-2017 15:43:56.0054
ANALYSIS_VERSION: 10.0.17016.1000 amd64fre
LAST_CONTROL_TRANSFER: from fffff8003bb22669 to fffff8003badd154
STACK_TEXT:
ffffc400`580cc140 fffff800`3bb22669 : ffff9300`0954c510 fffff800`00000001 00000000`fffffffe ffff9300`0954c300 : nt!KxWaitForLockOwnerShip+0x14
ffffc400`580cc170 fffff800`3bb21b4c : 00000000`0031c41b fffff23f`ff62e0a0 00000000`0031e5c2 00000000`00000001 : nt!MiInsertPageInFreeOrZeroedList+0x819
ffffc400`580cc270 fffff800`3bb213e4 : ffff9300`00b1dec0 fffff800`3bad7cf8 ffff9300`00000000 ffff9300`00b1dec0 : nt!MiPfnShareCountIsZero+0xcc
ffffc400`580cc2c0 fffff800`3bb11092 : fffff23f`ff62e0d8 fffff23f`ff62e028 00000000`000000e5 fffff23f`ff62dff8 : nt!MiDeletePteRun+0x2b4
ffffc400`580cc430 fffff800`3bb0b98d : ffff9707`601d4748 ffff9707`5d64e080 ffff9707`601d4748 ffff9707`601d4180 : nt!MiDeleteVirtualAddresses+0x972
ffffc400`580cc6e0 fffff800`3bf17247 : ffff9707`5d64e080 ffff9707`5d30d0f0 ffff9707`5d30d0f0 ffff9707`5d64e080 : nt!MiDeleteVad+0x3ad
ffffc400`580cc860 fffff800`3bf1772e : 00000000`00000000 ffff9707`54f938e0 ffff9707`5d30d0f0 ffff9707`601d4180 : nt!MiCleanVad+0x27
ffffc400`580cc890 fffff800`3bf5559f : 00000000`00040000 00000000`00000000 ffff9707`601d4180 ffff9707`00000000 : nt!MmCleanProcessAddressSpace+0x13e
ffffc400`580cc910 fffff800`3bec6641 : ffff9707`601d4180 ffffad0d`141ef060 ffff9707`601d4180 00000000`00000000 : nt!PspRundownSingleProcess+0x11f
ffffc400`580cc990 fffff800`3bf85ff9 : 00000000`00000000 ffff9707`601d4101 000000ed`a5beb000 ffff9707`5d64e080 : nt!PspExitThread+0x57d
ffffc400`580cca90 fffff800`3bc03413 : ffff9707`601d4180 ffff9707`5d64e080 ffffc400`580ccb80 00000248`e90a0730 : nt!NtTerminateProcess+0xe9
ffffc400`580ccb00 00007ffe`c5cc5924 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
000000ed`a599fc68 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`c5cc5924
THREAD_SHA1_HASH_MOD_FUNC: f0f3d9486af072eb3d6ab4ef499ea4554d77fa53
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 57572964400ea30c7808cd8e852d59ba8fd2cfd3
THREAD_SHA1_HASH_MOD: dc844b1b94baa204d070855e43bbbd27eee98b94
FOLLOWUP_IP:
nt!KxWaitForLockOwnerShip+14
fffff800`3badd154 48890a mov qword ptr [rdx],rcx
FAULT_INSTR_CODE: 660a8948
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!KxWaitForLockOwnerShip+14
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 59cdf43a
IMAGE_VERSION: 10.0.15063.674
STACK_COMMAND: .cxr 0xffffc400580cb750 ; kb
BUCKET_ID_FUNC_OFFSET: 14
FAILURE_BUCKET_ID: 0x3B_nt!KxWaitForLockOwnerShip
BUCKET_ID: 0x3B_nt!KxWaitForLockOwnerShip
PRIMARY_PROBLEM_CLASS: 0x3B_nt!KxWaitForLockOwnerShip
TARGET_TIME: 2017-10-13T02:59:09.000Z
OSBUILD: 15063
OSSERVICEPACK: 674
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 784
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2017-09-29 03:20:26
BUILDDATESTAMP_STR: 160101.0800
BUILDLAB_STR: WinBuild
BUILDOSVER_STR: 10.0.15063.674
ANALYSIS_SESSION_ELAPSED_TIME: d9fa
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x3b_nt!kxwaitforlockownership
FAILURE_ID_HASH: {2589b5c6-b48c-6cd6-cb9e-7b9e4f7654fd}
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8003badd154, Address of the instruction which caused the bugcheck
Arg3: ffffc400580cb750, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details: