BSOD - 0x7f UNEXPECTED_KERNEL_MODE_TRAP caused by ntoskrnl.exe - Windows 7 x64

Depleted

Member
Joined
Mar 21, 2019
Posts
5
Hello,

My PC has been plagued by this reoccuring BSOD caused by ntoskrnl.exe for 5 days now and I've made no hardware or software changes in this time, just windows updates and then a reinstall of the OS and drivers to try and cure the problem but nothing has worked, the BSOD happens every night at 6:26am and sometimes again at 12:26am if i'm watching twitch on chrome and the computer is inactive.
I've done sfc scans and found nothing, memory diagnostics and found nothing, i've updated my motherboard bios and it's not helped, I've tried driver verifier and that caused a bsod for a detected violation with malwarebytes swissarmy driver.

Any help fixing this problem would be very appreciated, thank you!

Win 7 64bit home premium (oem disc) (installation was nearly two years old but I "Upgraded" the installation in hopes of fixing the problem)
Intel i7 4790k (not overclocked and turbo disabled)
Asus 1080Ti (10% underclocked)
Asus Maximus Hero VI (latest firmware)
Corsair HX750 psu
Corsair vengeance 2133mhz xmp 1.5v 2x8gb



Dump FileCrash TimeBug Check StringBug Check CodeParameter 1Parameter 2Parameter 3Parameter 4Caused By DriverCaused By AddressFile DescriptionProduct NameCompanyFile VersionProcessorCrash AddressStack Address 1Stack Address 2Stack Address 3Computer NameFull PathProcessors CountMajor VersionMinor VersionDump File SizeDump File Time
032119-6318-01.dmp21/03/2019 06:26:31UNEXPECTED_KERNEL_MODE_TRAP0x0000007f000000000000000800000000000506f8ntoskrnl.exentoskrnl.exe+93ba0NT Kernel & SystemMicrosoft® Windows® Operating SystemMicrosoft Corporation6.1.7601.24387 (win7sp1_ldr_escrow.190305-1700)x64ntoskrnl.exe+93ba0 C:\Windows\Minidump\032119-6318-01.dmp8157601354,58221/03/2019 06:29:18
[TD]00000000 80050033[/TD]
[TD]fffff800 031b2462[/TD]

Dump FileCrash TimeBug Check StringBug Check CodeParameter 1Parameter 2Parameter 3Parameter 4Caused By DriverCaused By AddressFile DescriptionProduct NameCompanyFile VersionProcessorCrash AddressStack Address 1Stack Address 2Stack Address 3Computer NameFull PathProcessors CountMajor VersionMinor VersionDump File SizeDump File Time
032119-7566-01.dmp21/03/2019 12:26:28UNEXPECTED_KERNEL_MODE_TRAP0x0000007f000000000000000800000000000506f8ntoskrnl.exentoskrnl.exe+93ba0NT Kernel & SystemMicrosoft® Windows® Operating SystemMicrosoft Corporation6.1.7601.24387 (win7sp1_ldr_escrow.190305-1700)x64ntoskrnl.exe+93ba0 C:\Windows\Minidump\032119-7566-01.dmp8157601352,79021/03/2019 12:29:26
[TD]00000000 80050033[/TD]
[TD]fffff800 031ae462[/TD]
 

Attachments

The UNEXPECTED_KERNEL_MODE_TRAP bug check has a value of 0x0000007F. This bug check indicates that the Intel CPU generated a trap and the kernel failed to catch this trap.
Code:
Microsoft (R) Windows Debugger Version 10.0.17763.132 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\031719-10826-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       SRV*C:\SymCache*http://msdl.microsoft.com/download/symbols
Symbol search path is: SRV*C:\SymCache*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700
Machine Name:
Kernel base = 0xfffff800`03016000 PsLoadedModuleList = 0xfffff800`0324fc90
Debug session time: Sun Mar 17 07:26:32.726 2019 (UTC + 1:00)
System Uptime: 0 days 2:58:35.492
Loading Kernel Symbols
...............................................................
................................................................
...........................
Loading User Symbols
Loading unloaded module list
...........
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 7F, {8, 80050033, 506f8, fffff80003169462}

*** WARNING: Unable to verify timestamp for nvlddmkm.sys
*** ERROR: Module load completed but symbols could not be loaded for nvlddmkm.sys
Probably caused by : nvlddmkm.sys ( nvlddmkm+1f498f )

Followup:     MachineOwner
---------

7: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault).  The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
        use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
        use .trap on that value
Else
        .trap on the appropriate frame will show where the trap was taken
        (on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: 0000000080050033
Arg3: 00000000000506f8
Arg4: fffff80003169462

Debugging Details:
------------------


KEY_VALUES_STRING: 1


STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700

SYSTEM_MANUFACTURER:  ASUS

SYSTEM_PRODUCT_NAME:  All Series

SYSTEM_SKU:  All

SYSTEM_VERSION:  System Version

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  1402

BIOS_DATE:  01/28/2014

BASEBOARD_MANUFACTURER:  ASUSTeK COMPUTER INC.

BASEBOARD_PRODUCT:  MAXIMUS VI HERO

BASEBOARD_VERSION:  Rev 1.xx

DUMP_TYPE:  2

BUGCHECK_P1: 8

BUGCHECK_P2: 80050033

BUGCHECK_P3: 506f8

BUGCHECK_P4: fffff80003169462

BUGCHECK_STR:  0x7f_8

TRAP_FRAME:  fffff880035b4090 -- (.trap 0xfffff880035b4090)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8800d5b7028 rbx=0000000000000000 rcx=0000000000000076
rdx=fffff8800fbad620 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80003169462 rsp=fffff8800d5b7000 rbp=fffff8800d5b7120
r8=0000000000000000  r9=0000000000000000 r10=fffffa8014fd2b50
r11=fffff8800d5b7078 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!EtwWriteEx+0x12:
fffff800`03169462 4156            push    r14
Resetting default scope

CPU_COUNT: 8

CPU_MHZ: fa0

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 3c

CPU_STEPPING: 3

CPU_MICROCODE: 6,3c,3,0 (F,M,S,R)  SIG: 12'00000000 (cache) 12'00000000 (init)

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT

PROCESS_NAME:  csrss.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  MICHAL

ANALYSIS_SESSION_TIME:  03-21-2019 15:41:44.0883

ANALYSIS_VERSION: 10.0.17763.132 amd64fre

STACK_OVERFLOW: Stack Limit: fffff8800d5b7000. Use (kF) and (!stackusage) to investigate stack usage.

LAST_CONTROL_TRANSFER:  from fffff800030b7f69 to fffff800030a9ba0

STACK_TEXT:
fffff880`035b3f48 fffff800`030b7f69 : 00000000`0000007f 00000000`00000008 00000000`80050033 00000000`000506f8 : nt!KeBugCheckEx
fffff880`035b3f50 fffff800`030b4a4b : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`035b4090 fffff800`03169462 : 00000000`0000000e 00000000`00000001 fffff880`0d5b71d0 00000000`00000002 : nt!KiDoubleFaultAbort+0x28b
fffff880`0d5b7000 fffff800`031696b8 : 00000000`00000000 00000000`00000014 00000000`00000000 00000000`00000000 : nt!EtwWriteEx+0x12
fffff880`0d5b7030 fffff880`0f60798f : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!EtwWrite+0x28
fffff880`0d5b7080 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff880`0d5b70e0 : nvlddmkm+0x1f498f


THREAD_SHA1_HASH_MOD_FUNC:  20e2fc4436fdad8b1b950799298da9a5844b9cba

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  49476d891ede5df1c57d68f34242a6d46a43f83f

THREAD_SHA1_HASH_MOD:  f2113cf119696bbdf4b93f6a6ccb797757579413

FOLLOWUP_IP:
nvlddmkm+1f498f
fffff880`0f60798f ??              ???

SYMBOL_STACK_INDEX:  5

SYMBOL_NAME:  nvlddmkm+1f498f

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  5c78d76b

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  X64_0x7f_8_nvlddmkm+1f498f

BUCKET_ID:  X64_0x7f_8_nvlddmkm+1f498f

PRIMARY_PROBLEM_CLASS:  X64_0x7f_8_nvlddmkm+1f498f

TARGET_TIME:  2019-03-17T06:26:32.000Z

OSBUILD:  7601

OSSERVICEPACK:  1000

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  784

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 7

OSEDITION:  Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS Personal

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  2019-03-06 03:38:53

BUILDDATESTAMP_STR:  190305-1700

BUILDLAB_STR:  win7sp1_ldr_escrow

BUILDOSVER_STR:  6.1.7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700

ANALYSIS_SESSION_ELAPSED_TIME:  5e0

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:x64_0x7f_8_nvlddmkm+1f498f

FAILURE_ID_HASH:  {0b3576d0-af59-979f-cfe6-afee6a20bf9f}

Followup:     MachineOwner
---------

7: kd> !vm
GetPointerFromAddress: unable to read from fffff800032b3100
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff800032b32f0
GetUlongPtrFromAddress: unable to read from fffff800032b34a8
GetPointerFromAddress: unable to read from fffff800032b30d8
GetUlongPtrFromAddress: unable to read from fffff800032050c0
GetUlongPtrFromAddress: unable to read from fffff800032b62c0
GetUlongPtrFromAddress: unable to read from fffff80003239830
GetUlongPtrFromAddress: unable to read from fffff80003250080
GetUlongPtrFromAddress: unable to read from fffff800032227e8
GetUlongPtrFromAddress: unable to read from fffff800032382f0
GetUlongFromAddress: unable to read from fffff8000324fd28
GetUlongPtrFromAddress: unable to read from fffff8000324ff98
fffff800032b3940: Unable to get paged pool info
GetUlongFromAddress: unable to read from fffff80003250568
GetUlongFromAddress: unable to read from fffff80003238300
GetUlongFromAddress: unable to read from fffff80003238304
GetUlongFromAddress: unable to read from fffff80003238308
GetUlongFromAddress: unable to read from fffff8000323830c
GetUlongPtrFromAddress: unable to read from fffff80003237dc8
GetUlongFromAddress: unable to read from fffff800032b3080
GetUlongFromAddress: unable to read from fffff80003239324
GetUlongPtrFromAddress: unable to read from fffff80003238318
GetUlongPtrFromAddress: unable to read from fffff80003222808
GetUlongPtrFromAddress: unable to read from fffff800031f64c8
GetUlongPtrFromAddress: unable to read from fffff80003205100

************ NO PAGING FILE *********************

GetUlongFromAddress: unable to read from fffff80003238360

Physical Memory:                0 (          0 Kb)
Available Pages:                0 (          0 Kb)
ResAvail Pages:                 0 (          0 Kb)

********** Running out of physical memory **********

Locked IO Pages:                0 (          0 Kb)
Free System PTEs:               0 (          0 Kb)

********** Running out of system PTEs **************

Modified Pages:                 0 (          0 Kb)
Modified PF Pages:              0 (          0 Kb)
Modified No Write Pages:        0 (          0 Kb)
GetUlongFromAddress: unable to read from fffff800032b30b0
fffff80003210880: Unable to get pool descriptor
GetUlongFromAddress: unable to read from fffff800032b30a0
NonPagedPool Usage:             0 (          0 Kb)
NonPagedPool Max:               0 (          0 Kb)
GetUlongFromAddress: unable to read from fffff800032b3098
PagedPool Usage:                0 (          0 Kb)
PagedPool Maximum:              0 (          0 Kb)
GetUlongFromAddress: unable to read from fffff80003226f50
GetUlongFromAddress: unable to read from fffff800032b3018
Processor Commit:               0 (          0 Kb)
Unable to read nt!_LIST_ENTRY.Flink at fffff800032383d0
Session Commit:                 0 (          0 Kb)
Syspart SharedCommit 0
Shared Commit:                  0 (          0 Kb)
Special Pool:                   0 (          0 Kb)
Kernel Stacks:                  0 (          0 Kb)
Pages For MDLs:                 0 (          0 Kb)
Pages For AWE:                  0 (          0 Kb)
NonPagedPool Commit:            0 (          0 Kb)
PagedPool Commit:               0 (          0 Kb)
Driver Commit:                  0 (          0 Kb)
Boot Commit:                    0 (          0 Kb)
System PageTables:              0 (          0 Kb)
ProcessLockedFilePages:         0 (          0 Kb)
Pagefile Hash Pages:            0 (          0 Kb)
Sum System Commit:              0 (          0 Kb)

********** Number of committed pages is near limit ********
Unable to read/NULL value _LIST_ENTRY @ fffff80003231940

ProcessCommitUsage could not be calculated
Committed pages:          1675674 (    6702696 Kb)
Commit limit:                   0 (          0 Kb)
7: kd> kv
# Child-SP          RetAddr           : Args to Child                                                           : Call Site
00 fffff880`035b3f48 fffff800`030b7f69 : 00000000`0000007f 00000000`00000008 00000000`80050033 00000000`000506f8 : nt!KeBugCheckEx
01 fffff880`035b3f50 fffff800`030b4a4b : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
02 fffff880`035b4090 fffff800`03169462 : 00000000`0000000e 00000000`00000001 fffff880`0d5b71d0 00000000`00000002 : nt!KiDoubleFaultAbort+0x28b (TrapFrame @ fffff880`035b4090)
03 fffff880`0d5b7000 fffff800`031696b8 : 00000000`00000000 00000000`00000014 00000000`00000000 00000000`00000000 : nt!EtwWriteEx+0x12
04 fffff880`0d5b7030 fffff880`0f60798f : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!EtwWrite+0x28
05 fffff880`0d5b7080 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff880`0d5b70e0 : nvlddmkm+0x1f498f
7: kd> .trap fffff880`035b4090
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8800d5b7028 rbx=0000000000000000 rcx=0000000000000076
rdx=fffff8800fbad620 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80003169462 rsp=fffff8800d5b7000 rbp=fffff8800d5b7120
r8=0000000000000000  r9=0000000000000000 r10=fffffa8014fd2b50
r11=fffff8800d5b7078 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!EtwWriteEx+0x12:
fffff800`03169462 4156            push    r14
7: kd> u @rip
nt!EtwWriteEx+0x12:
fffff800`03169462 4156            push    r14
fffff800`03169464 4157            push    r15
fffff800`03169466 4881ec80000000  sub     rsp,80h
fffff800`0316946d 458bf9          mov     r15d,r9d
fffff800`03169470 4533c9          xor     r9d,r9d
fffff800`03169473 4d8bd8          mov     r11,r8
fffff800`03169476 488bfa          mov     rdi,rdx
fffff800`03169479 4c894808        mov     qword ptr [rax+8],r9
7: kd> !poolused 2
GetPointerFromAddress: unable to read from fffff800032b3100
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff800032b32f0
GetUlongPtrFromAddress: unable to read from fffff800032b34a8
GetPointerFromAddress: unable to read from fffff80003226f88
GetUlongFromAddress: unable to read from fffff80003226f80
GetUlongFromAddress: unable to read from fffff80003226f68
Unable to get PoolTrackTable - pool tagging is disabled, enable it to use this command
Use gflags.exe and check the box that says "Enable pool tagging".
Because this is the minidump not all information is available. But it comes out that the driver of the Nvidia graphics card is guilty
Code:
7: kd> lmvm nvlddmkm
Browse full module list
start             end                 module name
fffff880`0f413000 fffff880`107f0000   nvlddmkm T (no symbols)          
    Loaded symbol image file: nvlddmkm.sys
    Image path: \SystemRoot\system32\DRIVERS\nvlddmkm.sys
    Image name: nvlddmkm.sys
    Browse all global symbols  functions  data
    Timestamp:        Thu Feb 28 22:55:39 2019 (5C78D76B)
    CheckSum:         01386972
    ImageSize:        013DD000
    Translations:     0000.04b0 0000.04e4 0409.04b0 0409.04e4
    Information from resource tables:
There is an even newer version of the driver:
NVIDIA DRIVERS GeForce Game Ready Driver WHQL
Update it
The DRIVER_VERIFIER_DETECTED_VIOLATION bug check has a value of 0x000000C4. This is the general bug check code for fatal errors found by Driver Verifier.

Code:
Microsoft (R) Windows Debugger Version 10.0.17763.132 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\031819-11934-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       SRV*C:\SymCache*http://msdl.microsoft.com/download/symbols
Symbol search path is: SRV*C:\SymCache*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700
Machine Name:
Kernel base = 0xfffff800`0300a000 PsLoadedModuleList = 0xfffff800`03243c90
Debug session time: Mon Mar 18 12:21:53.548 2019 (UTC + 1:00)
System Uptime: 0 days 0:02:49.313
Loading Kernel Symbols
...............................................................
................................................................
..........................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck C4, {f6, 170, fffffa8013dee680, fffff880042142d9}

*** WARNING: Unable to verify timestamp for 690b33e1-0462-4e84-9bea-c7552b45432a.sys
*** ERROR: Module load completed but symbols could not be loaded for 690b33e1-0462-4e84-9bea-c7552b45432a.sys
Probably caused by : 690b33e1-0462-4e84-9bea-c7552b45432a.sys ( 690b33e1_0462_4e84_9bea_c7552b45432a+12d9 )

Followup:     MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_VERIFIER_DETECTED_VIOLATION (c4)
A device driver attempting to corrupt the system has been caught.  This is
because the driver was specified in the registry as being suspect (by the
administrator) and the kernel has enabled substantial checking of this driver.
If the driver attempts to corrupt the system, bugchecks 0xC4, 0xC1 and 0xA will
be among the most commonly seen crashes.
Arguments:
Arg1: 00000000000000f6, Referencing user handle as KernelMode.
Arg2: 0000000000000170, Handle value being referenced.
Arg3: fffffa8013dee680, Address of the current process.
Arg4: fffff880042142d9, Address inside the driver that is performing the incorrect reference.

Debugging Details:
------------------


KEY_VALUES_STRING: 1


STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700

SYSTEM_MANUFACTURER:  ASUS

SYSTEM_PRODUCT_NAME:  All Series

SYSTEM_SKU:  All

SYSTEM_VERSION:  System Version

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  1402

BIOS_DATE:  01/28/2014

BASEBOARD_MANUFACTURER:  ASUSTeK COMPUTER INC.

BASEBOARD_PRODUCT:  MAXIMUS VI HERO

BASEBOARD_VERSION:  Rev 1.xx

DUMP_TYPE:  2

BUGCHECK_P1: f6

BUGCHECK_P2: 170

BUGCHECK_P3: fffffa8013dee680

BUGCHECK_P4: fffff880042142d9

BUGCHECK_STR:  0xc4_f6

CPU_COUNT: 8

CPU_MHZ: fa0

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 3c

CPU_STEPPING: 3

CPU_MICROCODE: 6,3c,3,0 (F,M,S,R)  SIG: 12'00000000 (cache) 12'00000000 (init)

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT

PROCESS_NAME:  ASUSGPUFanServ

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  MICHAL

ANALYSIS_SESSION_TIME:  03-21-2019 15:51:24.0587

ANALYSIS_VERSION: 10.0.17763.132 amd64fre

LAST_CONTROL_TRANSFER:  from fffff800035044fc to fffff8000309dba0

STACK_TEXT:
fffff880`0ddc83b8 fffff800`035044fc : 00000000`000000c4 00000000`000000f6 00000000`00000170 fffffa80`13dee680 : nt!KeBugCheckEx
fffff880`0ddc83c0 fffff800`03519ab4 : 00000000`00000170 fffffa80`13dee680 00000000`00000002 fffff980`1b9b6ff8 : nt!VerifierBugCheckIfAppropriate+0x3c
fffff880`0ddc8400 fffff800`0337daae : ffffffff`ffffffff fffff880`0ddc8630 00000000`00000000 fffff980`1afd0f00 : nt!VfCheckUserHandle+0x1b4
fffff880`0ddc84e0 fffff800`032f5e15 : fffff800`032aa500 fffff800`000f001f 00000000`00000000 fffff880`0ddc8700 : nt! ?? ::NNGAKEGL::`string'+0x17d0e
fffff880`0ddc85b0 fffff800`03519848 : fffff980`1afd0ff8 00000000`00000002 fffff880`0ddc87a8 fffff800`030a13b0 : nt!ObReferenceObjectByHandle+0x25
fffff880`0ddc8600 fffff880`042142d9 : fffff980`1b9b6ee0 00000000`00000002 fffff980`1afd0ff8 fffff880`0ddc87a8 : nt!VerifierObReferenceObjectByHandle+0x48
fffff880`0ddc8650 fffff980`1b9b6ee0 : 00000000`00000002 fffff980`1afd0ff8 fffff880`0ddc87a8 fffff880`0ddc87b8 : 690b33e1_0462_4e84_9bea_c7552b45432a+0x12d9
fffff880`0ddc8658 00000000`00000002 : fffff980`1afd0ff8 fffff880`0ddc87a8 fffff880`0ddc87b8 00000000`00000000 : 0xfffff980`1b9b6ee0
fffff880`0ddc8660 fffff980`1afd0ff8 : fffff880`0ddc87a8 fffff880`0ddc87b8 00000000`00000000 00000000`00000001 : 0x2
fffff880`0ddc8668 fffff880`0ddc87a8 : fffff880`0ddc87b8 00000000`00000000 00000000`00000001 fffff800`03504324 : 0xfffff980`1afd0ff8
fffff880`0ddc8670 fffff880`0ddc87b8 : 00000000`00000000 00000000`00000001 fffff800`03504324 ffffc3d0`f4659a00 : 0xfffff880`0ddc87a8
fffff880`0ddc8678 00000000`00000000 : 00000000`00000001 fffff800`03504324 ffffc3d0`f4659a00 fffff800`00000000 : 0xfffff880`0ddc87b8


THREAD_SHA1_HASH_MOD_FUNC:  fca5c6296a59a9f4fed63cbd7fdd4db2acb04f10

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  157113a541ea308cac83b54b829b207d6aaf3d1c

THREAD_SHA1_HASH_MOD:  d7663a66a9e62eff1a754c6f89085c95ec7f36cf

FOLLOWUP_IP:
690b33e1_0462_4e84_9bea_c7552b45432a+12d9
fffff880`042142d9 89442450        mov     dword ptr [rsp+50h],eax

FAULT_INSTR_CODE:  50244489

SYMBOL_STACK_INDEX:  6

SYMBOL_NAME:  690b33e1_0462_4e84_9bea_c7552b45432a+12d9

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: 690b33e1_0462_4e84_9bea_c7552b45432a

IMAGE_NAME:  690b33e1-0462-4e84-9bea-c7552b45432a.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  540ff16d

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  X64_0xc4_f6_690b33e1_0462_4e84_9bea_c7552b45432a+12d9

BUCKET_ID:  X64_0xc4_f6_690b33e1_0462_4e84_9bea_c7552b45432a+12d9

PRIMARY_PROBLEM_CLASS:  X64_0xc4_f6_690b33e1_0462_4e84_9bea_c7552b45432a+12d9

TARGET_TIME:  2019-03-18T11:21:53.000Z

OSBUILD:  7601

OSSERVICEPACK:  1000

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  784

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 7

OSEDITION:  Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS Personal

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  2019-03-06 03:38:53

BUILDDATESTAMP_STR:  190305-1700

BUILDLAB_STR:  win7sp1_ldr_escrow

BUILDOSVER_STR:  6.1.7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700

ANALYSIS_SESSION_ELAPSED_TIME:  7c7

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:x64_0xc4_f6_690b33e1_0462_4e84_9bea_c7552b45432a+12d9

FAILURE_ID_HASH:  {2beb80ad-ddb7-b3a9-ee0a-6523137b31cf}

Followup:     MachineOwner
---------

1: kd> !process fffffa8013dee680
GetPointerFromAddress: unable to read from fffff800032a7000
PROCESS fffffa8013dee680
    SessionId: none  Cid: 1cd0    Peb: 7efdf000  ParentCid: 08bc
    DirBase: 195075000  ObjectTable: fffff8a00eab8560  HandleCount: <Data Not Accessible>
    Image: ASUSGPUFanServ
    VadRoot fffffa8010a63a80 Vads 74 Clone 0 Private 449. Modified 495. Locked 0.
    DeviceMap fffff8a001d319a0
    Token                             fffff8a010c1b060
    ReadMemory error: Cannot get nt!KeMaximumIncrement value.
fffff78000000000: Unable to get shared data
    ElapsedTime                       00:00:00.000
    UserTime                          00:00:00.000
    KernelTime                        00:00:00.000
    QuotaPoolUsage[PagedPool]         124232
    QuotaPoolUsage[NonPagedPool]      8768
    Working Set Sizes (now,min,max)  (1593, 50, 345) (6372KB, 200KB, 1380KB)
    PeakWorkingSetSize                1593
    VirtualSize                       65 Mb
    PeakVirtualSize                   78 Mb
    PageFaultCount                    1628
    MemoryPriority                    BACKGROUND
    BasePriority                      6
    CommitCharge                      536

        THREAD fffffa8013df5b50  Cid 1cd0.1cd4  Teb: 000000007efdb000 Win32Thread: fffff900c3122a10 RUNNING on processor 1
        IRP List:
            Unable to read nt!_IRP @ fffff9801b9b6ee0
        Not impersonating
GetUlongFromAddress: unable to read from fffff800031e9c20
        Owning Process            fffffa8013dee680       Image:         ASUSGPUFanServ
        Attached Process          N/A            Image:         N/A
fffff78000000000: Unable to get shared data
        Wait Start TickCount      10853      
        Context Switch Count      2405           IdealProcessor: 1                 LargeStack
        ReadMemory error: Cannot get nt!KeMaximumIncrement value.
        UserTime                  00:00:00.000
        KernelTime                00:00:00.000
        Win32 Start Address 0x0000000001367a90
        Stack Init fffff8800ddc8c70 Current fffff8800ddc7d30
        Base fffff8800ddc9000 Limit fffff8800ddc0000 Call 0000000000000000
        Priority 7 BasePriority 6 PriorityDecrement 0 IoPriority 1 PagePriority 3
        Child-SP          RetAddr           Call Site
        fffff880`0ddc83b8 fffff800`035044fc nt!KeBugCheckEx
        fffff880`0ddc83c0 fffff800`03519ab4 nt!VerifierBugCheckIfAppropriate+0x3c
        fffff880`0ddc8400 fffff800`0337daae nt!VfCheckUserHandle+0x1b4
        fffff880`0ddc84e0 fffff800`032f5e15 nt! ?? ::NNGAKEGL::`string'+0x17d0e
        fffff880`0ddc85b0 fffff800`03519848 nt!ObReferenceObjectByHandle+0x25
        fffff880`0ddc8600 fffff880`042142d9 nt!VerifierObReferenceObjectByHandle+0x48
        fffff880`0ddc8650 fffff980`1b9b6ee0 690b33e1_0462_4e84_9bea_c7552b45432a+0x12d9
        fffff880`0ddc8658 00000000`00000002 0xfffff980`1b9b6ee0
        fffff880`0ddc8660 fffff980`1afd0ff8 0x2
        fffff880`0ddc8668 fffff880`0ddc87a8 0xfffff980`1afd0ff8
        fffff880`0ddc8670 fffff880`0ddc87b8 0xfffff880`0ddc87a8
        fffff880`0ddc8678 00000000`00000000 0xfffff880`0ddc87b8

        *** Error in reading nt!_ETHREAD @ fffffa8013e06680

1: kd> !handle
GetPointerFromAddress: unable to read from fffff800032a7000

PROCESS fffffa8013dee680
    SessionId: none  Cid: 1cd0    Peb: 7efdf000  ParentCid: 08bc
    DirBase: 195075000  ObjectTable: fffff8a00eab8560  HandleCount: <Data Not Accessible>
    Image: ASUSGPUFanServ

GetPointerFromAddress: unable to read from fffff80003226580
fffff8a00eab8560: Unable to read handle table
This time, the Asus GPU Tweak II program is to blame

Code:
Microsoft (R) Windows Debugger Version 10.0.17763.132 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\031819-14554-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       SRV*C:\SymCache*http://msdl.microsoft.com/download/symbols
Symbol search path is: SRV*C:\SymCache*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700
Machine Name:
Kernel base = 0xfffff800`0304b000 PsLoadedModuleList = 0xfffff800`03284c90
Debug session time: Mon Mar 18 07:26:29.661 2019 (UTC + 1:00)
System Uptime: 0 days 5:59:34.315
Loading Kernel Symbols
...............................................................
................................................................
...........................
Loading User Symbols
Loading unloaded module list
..............
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 7F, {8, 80050033, 506f8, fffff8000319e462}

Probably caused by : Unknown_Image ( ANALYSIS_INCONCLUSIVE )

Followup:     MachineOwner
---------

6: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault).  The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
        use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
        use .trap on that value
Else
        .trap on the appropriate frame will show where the trap was taken
        (on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: 0000000080050033
Arg3: 00000000000506f8
Arg4: fffff8000319e462

Debugging Details:
------------------


KEY_VALUES_STRING: 1


STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700

SYSTEM_MANUFACTURER:  ASUS

SYSTEM_PRODUCT_NAME:  All Series

SYSTEM_SKU:  All

SYSTEM_VERSION:  System Version

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  1402

BIOS_DATE:  01/28/2014

BASEBOARD_MANUFACTURER:  ASUSTeK COMPUTER INC.

BASEBOARD_PRODUCT:  MAXIMUS VI HERO

BASEBOARD_VERSION:  Rev 1.xx

DUMP_TYPE:  2

BUGCHECK_P1: 8

BUGCHECK_P2: 80050033

BUGCHECK_P3: 506f8

BUGCHECK_P4: fffff8000319e462

BUGCHECK_STR:  0x7f_8

BAD_STACK_POINTER:  fffff8800333af48

CPU_COUNT: 8

CPU_MHZ: fa0

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 3c

CPU_STEPPING: 3

CPU_MICROCODE: 6,3c,3,0 (F,M,S,R)  SIG: 12'00000000 (cache) 12'00000000 (init)

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  ZEROED_STACK_0x7f_8

PROCESS_NAME:  csrss.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  MICHAL

ANALYSIS_SESSION_TIME:  03-21-2019 15:58:14.0579

ANALYSIS_VERSION: 10.0.17763.132 amd64fre

LAST_CONTROL_TRANSFER:  from 0000000000000000 to fffff800030deba0

STACK_TEXT:
fffff880`0333af48 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx


THREAD_SHA1_HASH_MOD_FUNC:  81a83ae0317433a47fcc36991983df3b6e638b71

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  6e16edd8c7dd677734fdbcd2397a2e35e9fae964

THREAD_SHA1_HASH_MOD:  76cd06466d098060a9eb26e5fd2a25cb1f3fe0a3

SYMBOL_NAME:  ANALYSIS_INCONCLUSIVE

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: Unknown_Module

IMAGE_NAME:  Unknown_Image

DEBUG_FLR_IMAGE_TIMESTAMP:  0

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID:  ZEROED_STACK_0x7f_8

PRIMARY_PROBLEM_CLASS:  ZEROED_STACK_0x7f_8

FAILURE_BUCKET_ID:  ZEROED_STACK_0x7f_8

TARGET_TIME:  2019-03-18T06:26:29.000Z

OSBUILD:  7601

OSSERVICEPACK:  1000

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  784

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 7

OSEDITION:  Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS Personal

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  2019-03-06 03:38:53

BUILDDATESTAMP_STR:  190305-1700

BUILDLAB_STR:  win7sp1_ldr_escrow

BUILDOSVER_STR:  6.1.7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700

ANALYSIS_SESSION_ELAPSED_TIME:  5ad

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:zeroed_stack_0x7f_8

FAILURE_ID_HASH:  {bd1940d8-ed36-69da-df17-1bf11350d0e6}

Followup:     MachineOwner
---------

6: kd> knL
# Child-SP          RetAddr           Call Site
00 fffff880`0333af48 00000000`00000000 nt!KeBugCheckEx
6: kd> !vm
GetPointerFromAddress: unable to read from fffff800032e8100
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff800032e82f0
GetUlongPtrFromAddress: unable to read from fffff800032e84a8
GetPointerFromAddress: unable to read from fffff800032e80d8
GetUlongPtrFromAddress: unable to read from fffff8000323a0c0
GetUlongPtrFromAddress: unable to read from fffff800032eb2c0
GetUlongPtrFromAddress: unable to read from fffff8000326e830
GetUlongPtrFromAddress: unable to read from fffff80003285080
GetUlongPtrFromAddress: unable to read from fffff800032577e8
GetUlongPtrFromAddress: unable to read from fffff8000326d2f0
GetUlongFromAddress: unable to read from fffff80003284d28
GetUlongPtrFromAddress: unable to read from fffff80003284f98
fffff800032e8940: Unable to get paged pool info
GetUlongFromAddress: unable to read from fffff80003285568
GetUlongFromAddress: unable to read from fffff8000326d300
GetUlongFromAddress: unable to read from fffff8000326d304
GetUlongFromAddress: unable to read from fffff8000326d308
GetUlongFromAddress: unable to read from fffff8000326d30c
GetUlongPtrFromAddress: unable to read from fffff8000326cdc8
GetUlongFromAddress: unable to read from fffff800032e8080
GetUlongFromAddress: unable to read from fffff8000326e324
GetUlongPtrFromAddress: unable to read from fffff8000326d318
GetUlongPtrFromAddress: unable to read from fffff80003257808
GetUlongPtrFromAddress: unable to read from fffff8000322b4c8
GetUlongPtrFromAddress: unable to read from fffff8000323a100

************ NO PAGING FILE *********************

GetUlongFromAddress: unable to read from fffff8000326d360

Physical Memory:                0 (          0 Kb)
Available Pages:                0 (          0 Kb)
ResAvail Pages:                 0 (          0 Kb)

********** Running out of physical memory **********

Locked IO Pages:                0 (          0 Kb)
Free System PTEs:               0 (          0 Kb)

********** Running out of system PTEs **************

Modified Pages:                 0 (          0 Kb)
Modified PF Pages:              0 (          0 Kb)
Modified No Write Pages:        0 (          0 Kb)
GetUlongFromAddress: unable to read from fffff800032e80b0
fffff80003245880: Unable to get pool descriptor
GetUlongFromAddress: unable to read from fffff800032e80a0
NonPagedPool Usage:             0 (          0 Kb)
NonPagedPool Max:               0 (          0 Kb)
GetUlongFromAddress: unable to read from fffff800032e8098
PagedPool Usage:                0 (          0 Kb)
PagedPool Maximum:              0 (          0 Kb)
GetUlongFromAddress: unable to read from fffff8000325bf50
GetUlongFromAddress: unable to read from fffff800032e8018
Processor Commit:               0 (          0 Kb)
Unable to read nt!_LIST_ENTRY.Flink at fffff8000326d3d0
Session Commit:                 0 (          0 Kb)
Syspart SharedCommit 0
Shared Commit:                  0 (          0 Kb)
Special Pool:                   0 (          0 Kb)
Kernel Stacks:                  0 (          0 Kb)
Pages For MDLs:                 0 (          0 Kb)
Pages For AWE:                  0 (          0 Kb)
NonPagedPool Commit:            0 (          0 Kb)
PagedPool Commit:               0 (          0 Kb)
Driver Commit:                  0 (          0 Kb)
Boot Commit:                    0 (          0 Kb)
System PageTables:              0 (          0 Kb)
ProcessLockedFilePages:         0 (          0 Kb)
Pagefile Hash Pages:            0 (          0 Kb)
Sum System Commit:              0 (          0 Kb)

********** Number of committed pages is near limit ********
Unable to read/NULL value _LIST_ENTRY @ fffff80003266940

ProcessCommitUsage could not be calculated
Committed pages:          1672317 (    6689268 Kb)
Commit limit:                   0 (          0 Kb)
6: kd> kv
# Child-SP          RetAddr           : Args to Child                                                           : Call Site
00 fffff880`0333af48 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
6: kd> !poolused 2
GetPointerFromAddress: unable to read from fffff800032e8100
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff800032e82f0
GetUlongPtrFromAddress: unable to read from fffff800032e84a8
GetPointerFromAddress: unable to read from fffff8000325bf88
GetUlongFromAddress: unable to read from fffff8000325bf80
GetUlongFromAddress: unable to read from fffff8000325bf68
Unable to get PoolTrackTable - pool tagging is disabled, enable it to use this command
Use gflags.exe and check the box that says "Enable pool tagging".
Code:
Microsoft (R) Windows Debugger Version 10.0.17763.132 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\031919-15818-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       SRV*C:\SymCache*http://msdl.microsoft.com/download/symbols
Symbol search path is: SRV*C:\SymCache*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700
Machine Name:
Kernel base = 0xfffff800`03051000 PsLoadedModuleList = 0xfffff800`0328ac90
Debug session time: Tue Mar 19 07:26:31.167 2019 (UTC + 1:00)
System Uptime: 0 days 18:55:55.933
Loading Kernel Symbols
...............................................................
................................................................
..............................
Loading User Symbols
Loading unloaded module list
................................................
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 7F, {8, 80050033, 506f8, fffff800031a4462}

Probably caused by : Unknown_Image ( ANALYSIS_INCONCLUSIVE )

Followup:     MachineOwner
---------

6: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault).  The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
        use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
        use .trap on that value
Else
        .trap on the appropriate frame will show where the trap was taken
        (on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: 0000000080050033
Arg3: 00000000000506f8
Arg4: fffff800031a4462

Debugging Details:
------------------


KEY_VALUES_STRING: 1


STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700

SYSTEM_MANUFACTURER:  ASUS

SYSTEM_PRODUCT_NAME:  All Series

SYSTEM_SKU:  All

SYSTEM_VERSION:  System Version

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  1402

BIOS_DATE:  01/28/2014

BASEBOARD_MANUFACTURER:  ASUSTeK COMPUTER INC.

BASEBOARD_PRODUCT:  MAXIMUS VI HERO

BASEBOARD_VERSION:  Rev 1.xx

DUMP_TYPE:  2

BUGCHECK_P1: 8

BUGCHECK_P2: 80050033

BUGCHECK_P3: 506f8

BUGCHECK_P4: fffff800031a4462

BUGCHECK_STR:  0x7f_8

BAD_STACK_POINTER:  fffff8800333af48

CPU_COUNT: 8

CPU_MHZ: fa0

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 3c

CPU_STEPPING: 3

CPU_MICROCODE: 6,3c,3,0 (F,M,S,R)  SIG: 12'00000000 (cache) 12'00000000 (init)

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  ZEROED_STACK_0x7f_8

PROCESS_NAME:  csrss.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  MICHAL

ANALYSIS_SESSION_TIME:  03-21-2019 16:00:15.0608

ANALYSIS_VERSION: 10.0.17763.132 amd64fre

LAST_CONTROL_TRANSFER:  from 0000000000000000 to fffff800030e4ba0

STACK_TEXT:
fffff880`0333af48 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx


THREAD_SHA1_HASH_MOD_FUNC:  81a83ae0317433a47fcc36991983df3b6e638b71

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  6e16edd8c7dd677734fdbcd2397a2e35e9fae964

THREAD_SHA1_HASH_MOD:  76cd06466d098060a9eb26e5fd2a25cb1f3fe0a3

SYMBOL_NAME:  ANALYSIS_INCONCLUSIVE

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: Unknown_Module

IMAGE_NAME:  Unknown_Image

DEBUG_FLR_IMAGE_TIMESTAMP:  0

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID:  ZEROED_STACK_0x7f_8

PRIMARY_PROBLEM_CLASS:  ZEROED_STACK_0x7f_8

FAILURE_BUCKET_ID:  ZEROED_STACK_0x7f_8

TARGET_TIME:  2019-03-19T06:26:31.000Z

OSBUILD:  7601

OSSERVICEPACK:  1000

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  784

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 7

OSEDITION:  Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS Personal

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  2019-03-06 03:38:53

BUILDDATESTAMP_STR:  190305-1700

BUILDLAB_STR:  win7sp1_ldr_escrow

BUILDOSVER_STR:  6.1.7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700

ANALYSIS_SESSION_ELAPSED_TIME:  580

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:zeroed_stack_0x7f_8

FAILURE_ID_HASH:  {bd1940d8-ed36-69da-df17-1bf11350d0e6}

Followup:     MachineOwner
---------
Code:
Microsoft (R) Windows Debugger Version 10.0.17763.132 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\032019-7581-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       SRV*C:\SymCache*http://msdl.microsoft.com/download/symbols
Symbol search path is: SRV*C:\SymCache*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700
Machine Name:
Kernel base = 0xfffff800`03051000 PsLoadedModuleList = 0xfffff800`0328ac90
Debug session time: Wed Mar 20 07:26:30.235 2019 (UTC + 1:00)
System Uptime: 0 days 18:21:28.000
Loading Kernel Symbols
...............................................................
................................................................
.............................
Loading User Symbols
Loading unloaded module list
..................
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 7F, {8, 80050033, 506f8, fffff800031a4462}

Probably caused by : Unknown_Image ( ANALYSIS_INCONCLUSIVE )

Followup:     MachineOwner
---------

7: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault).  The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
        use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
        use .trap on that value
Else
        .trap on the appropriate frame will show where the trap was taken
        (on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: 0000000080050033
Arg3: 00000000000506f8
Arg4: fffff800031a4462

Debugging Details:
------------------


KEY_VALUES_STRING: 1


STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700

SYSTEM_MANUFACTURER:  ASUS

SYSTEM_PRODUCT_NAME:  All Series

SYSTEM_SKU:  All

SYSTEM_VERSION:  System Version

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  1603

BIOS_DATE:  08/15/2014

BASEBOARD_MANUFACTURER:  ASUSTeK COMPUTER INC.

BASEBOARD_PRODUCT:  MAXIMUS VI HERO

BASEBOARD_VERSION:  Rev 1.xx

DUMP_TYPE:  2

BUGCHECK_P1: 8

BUGCHECK_P2: 80050033

BUGCHECK_P3: 506f8

BUGCHECK_P4: fffff800031a4462

BUGCHECK_STR:  0x7f_8

BAD_STACK_POINTER:  fffff880033b3f48

CPU_COUNT: 8

CPU_MHZ: fa0

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 3c

CPU_STEPPING: 3

CPU_MICROCODE: 6,3c,3,0 (F,M,S,R)  SIG: 19'00000000 (cache) 19'00000000 (init)

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  ZEROED_STACK_0x7f_8

PROCESS_NAME:  csrss.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  MICHAL

ANALYSIS_SESSION_TIME:  03-21-2019 16:01:12.0106

ANALYSIS_VERSION: 10.0.17763.132 amd64fre

LAST_CONTROL_TRANSFER:  from 0000000000000000 to fffff800030e4ba0

STACK_TEXT:
fffff880`033b3f48 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx


THREAD_SHA1_HASH_MOD_FUNC:  81a83ae0317433a47fcc36991983df3b6e638b71

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  6e16edd8c7dd677734fdbcd2397a2e35e9fae964

THREAD_SHA1_HASH_MOD:  76cd06466d098060a9eb26e5fd2a25cb1f3fe0a3

SYMBOL_NAME:  ANALYSIS_INCONCLUSIVE

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: Unknown_Module

IMAGE_NAME:  Unknown_Image

DEBUG_FLR_IMAGE_TIMESTAMP:  0

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID:  ZEROED_STACK_0x7f_8

PRIMARY_PROBLEM_CLASS:  ZEROED_STACK_0x7f_8

FAILURE_BUCKET_ID:  ZEROED_STACK_0x7f_8

TARGET_TIME:  2019-03-20T06:26:30.000Z

OSBUILD:  7601

OSSERVICEPACK:  1000

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  784

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 7

OSEDITION:  Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS Personal

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  2019-03-06 03:38:53

BUILDDATESTAMP_STR:  190305-1700

BUILDLAB_STR:  win7sp1_ldr_escrow

BUILDOSVER_STR:  6.1.7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700

ANALYSIS_SESSION_ELAPSED_TIME:  59f

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:zeroed_stack_0x7f_8

FAILURE_ID_HASH:  {bd1940d8-ed36-69da-df17-1bf11350d0e6}

Followup:     MachineOwner
---------
Code:
Microsoft (R) Windows Debugger Version 10.0.17763.132 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\032119-6318-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       SRV*C:\SymCache*http://msdl.microsoft.com/download/symbols
Symbol search path is: SRV*C:\SymCache*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700
Machine Name:
Kernel base = 0xfffff800`0305f000 PsLoadedModuleList = 0xfffff800`03298c90
Debug session time: Thu Mar 21 07:26:31.741 2019 (UTC + 1:00)
System Uptime: 0 days 23:57:19.506
Loading Kernel Symbols
...............................................................
................................................................
...............................
Loading User Symbols
Loading unloaded module list
............................
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 7F, {8, 80050033, 506f8, fffff800031b2462}

Probably caused by : Unknown_Image ( ANALYSIS_INCONCLUSIVE )

Followup:     MachineOwner
---------

7: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault).  The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
        use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
        use .trap on that value
Else
        .trap on the appropriate frame will show where the trap was taken
        (on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: 0000000080050033
Arg3: 00000000000506f8
Arg4: fffff800031b2462

Debugging Details:
------------------


KEY_VALUES_STRING: 1


STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700

SYSTEM_MANUFACTURER:  ASUS

SYSTEM_PRODUCT_NAME:  All Series

SYSTEM_SKU:  All

SYSTEM_VERSION:  System Version

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  1603

BIOS_DATE:  08/15/2014

BASEBOARD_MANUFACTURER:  ASUSTeK COMPUTER INC.

BASEBOARD_PRODUCT:  MAXIMUS VI HERO

BASEBOARD_VERSION:  Rev 1.xx

DUMP_TYPE:  2

BUGCHECK_P1: 8

BUGCHECK_P2: 80050033

BUGCHECK_P3: 506f8

BUGCHECK_P4: fffff800031b2462

BUGCHECK_STR:  0x7f_8

BAD_STACK_POINTER:  fffff880033b3f48

CPU_COUNT: 8

CPU_MHZ: fa0

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 3c

CPU_STEPPING: 3

CPU_MICROCODE: 6,3c,3,0 (F,M,S,R)  SIG: 19'00000000 (cache) 19'00000000 (init)

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  ZEROED_STACK_0x7f_8

PROCESS_NAME:  csrss.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  MICHAL

ANALYSIS_SESSION_TIME:  03-21-2019 16:01:41.0330

ANALYSIS_VERSION: 10.0.17763.132 amd64fre

LAST_CONTROL_TRANSFER:  from 0000000000000000 to fffff800030f2ba0

STACK_TEXT:
fffff880`033b3f48 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx


THREAD_SHA1_HASH_MOD_FUNC:  81a83ae0317433a47fcc36991983df3b6e638b71

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  6e16edd8c7dd677734fdbcd2397a2e35e9fae964

THREAD_SHA1_HASH_MOD:  76cd06466d098060a9eb26e5fd2a25cb1f3fe0a3

SYMBOL_NAME:  ANALYSIS_INCONCLUSIVE

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: Unknown_Module

IMAGE_NAME:  Unknown_Image

DEBUG_FLR_IMAGE_TIMESTAMP:  0

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID:  ZEROED_STACK_0x7f_8

PRIMARY_PROBLEM_CLASS:  ZEROED_STACK_0x7f_8

FAILURE_BUCKET_ID:  ZEROED_STACK_0x7f_8

TARGET_TIME:  2019-03-21T06:26:31.000Z

OSBUILD:  7601

OSSERVICEPACK:  1000

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  784

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 7

OSEDITION:  Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS Personal

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  2019-03-06 03:38:53

BUILDDATESTAMP_STR:  190305-1700

BUILDLAB_STR:  win7sp1_ldr_escrow

BUILDOSVER_STR:  6.1.7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700

ANALYSIS_SESSION_ELAPSED_TIME:  56a

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:zeroed_stack_0x7f_8

FAILURE_ID_HASH:  {bd1940d8-ed36-69da-df17-1bf11350d0e6}

Followup:     MachineOwner
---------
Code:
Microsoft (R) Windows Debugger Version 10.0.17763.132 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\032119-7566-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       SRV*C:\SymCache*http://msdl.microsoft.com/download/symbols
Symbol search path is: SRV*C:\SymCache*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700
Machine Name:
Kernel base = 0xfffff800`0305b000 PsLoadedModuleList = 0xfffff800`03294c90
Debug session time: Thu Mar 21 13:26:28.867 2019 (UTC + 1:00)
System Uptime: 0 days 5:57:14.632
Loading Kernel Symbols
...............................................................
................................................................
.............................
Loading User Symbols
Loading unloaded module list
.........................
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 7F, {8, 80050033, 506f8, fffff800031ae462}

Probably caused by : Unknown_Image ( ANALYSIS_INCONCLUSIVE )

Followup:     MachineOwner
---------

7: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault).  The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
        use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
        use .trap on that value
Else
        .trap on the appropriate frame will show where the trap was taken
        (on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: 0000000080050033
Arg3: 00000000000506f8
Arg4: fffff800031ae462

Debugging Details:
------------------


KEY_VALUES_STRING: 1


STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700

SYSTEM_MANUFACTURER:  ASUS

SYSTEM_PRODUCT_NAME:  All Series

SYSTEM_SKU:  All

SYSTEM_VERSION:  System Version

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  1603

BIOS_DATE:  08/15/2014

BASEBOARD_MANUFACTURER:  ASUSTeK COMPUTER INC.

BASEBOARD_PRODUCT:  MAXIMUS VI HERO

BASEBOARD_VERSION:  Rev 1.xx

DUMP_TYPE:  2

BUGCHECK_P1: 8

BUGCHECK_P2: 80050033

BUGCHECK_P3: 506f8

BUGCHECK_P4: fffff800031ae462

BUGCHECK_STR:  0x7f_8

BAD_STACK_POINTER:  fffff880033b3f48

CPU_COUNT: 8

CPU_MHZ: fa0

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 3c

CPU_STEPPING: 3

CPU_MICROCODE: 6,3c,3,0 (F,M,S,R)  SIG: 19'00000000 (cache) 19'00000000 (init)

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  ZEROED_STACK_0x7f_8

PROCESS_NAME:  csrss.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  MICHAL

ANALYSIS_SESSION_TIME:  03-21-2019 16:02:24.0754

ANALYSIS_VERSION: 10.0.17763.132 amd64fre

LAST_CONTROL_TRANSFER:  from 0000000000000000 to fffff800030eeba0

STACK_TEXT:
fffff880`033b3f48 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx


THREAD_SHA1_HASH_MOD_FUNC:  81a83ae0317433a47fcc36991983df3b6e638b71

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  6e16edd8c7dd677734fdbcd2397a2e35e9fae964

THREAD_SHA1_HASH_MOD:  76cd06466d098060a9eb26e5fd2a25cb1f3fe0a3

SYMBOL_NAME:  ANALYSIS_INCONCLUSIVE

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: Unknown_Module

IMAGE_NAME:  Unknown_Image

DEBUG_FLR_IMAGE_TIMESTAMP:  0

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID:  ZEROED_STACK_0x7f_8

PRIMARY_PROBLEM_CLASS:  ZEROED_STACK_0x7f_8

FAILURE_BUCKET_ID:  ZEROED_STACK_0x7f_8

TARGET_TIME:  2019-03-21T12:26:28.000Z

OSBUILD:  7601

OSSERVICEPACK:  1000

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  784

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 7

OSEDITION:  Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS Personal

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  2019-03-06 03:38:53

BUILDDATESTAMP_STR:  190305-1700

BUILDLAB_STR:  win7sp1_ldr_escrow

BUILDOSVER_STR:  6.1.7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700

ANALYSIS_SESSION_ELAPSED_TIME:  57f

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:zeroed_stack_0x7f_8

FAILURE_ID_HASH:  {bd1940d8-ed36-69da-df17-1bf11350d0e6}

Followup:     MachineOwner
---------
In case of 5 dumps i need full memory dumps to determine what may be the cause (in the case of minidumps this can not be determined because the driver is unknown)
In case of Asus GPU Tweak II the driver is outdated:
Code:
 lmvm 690b33e1_0462_4e84_9bea_c7552b45432a
Browse full module list
start             end                 module name
fffff880`04213000 fffff880`0421b000   690b33e1_0462_4e84_9bea_c7552b45432a T (no symbols)           
    Loaded symbol image file: 690b33e1-0462-4e84-9bea-c7552b45432a.sys
    Image path: 690b33e1-0462-4e84-9bea-c7552b45432a.sys
    Image name: 690b33e1-0462-4e84-9bea-c7552b45432a.sys
    Browse all global symbols  functions  data
    Timestamp:        Tue Sep  9 23:36:29 2014 (540FF16D)
    CheckSum:         0000D3F8
    ImageSize:        00008000
    Translations:     0000.04b0 0000.04e4 0409.04b0 0409.04e4
    Information from resource tables:
Update it or uninstall
 
Thank you very much for taking the time to look and analyse my issue, I can say that Nvidias latest series 4** of drivers have given me nothing but trouble in many games, poor performance, the driver kernel crashing while the system is idle, even sometimes my monitors and my tv lose signal and I'm forced to reboot the system, I had installed the latest ones a few days ago so I'll try updating them again and if the problem persists i'll revert to the last known decent drivers which are 387.13, I've uninstalled the asus gpu tweak software for now as i only used it to configure the rgb lighting on my graphics card.

I had thought would the minidumps be enough information as before i changed the dump setting it generated a dump file that was 1.4gb big and I'm not quite sure how i could go about uploading that for analysis but if need be for a full detailed analysis i'll revert the setting to generate the big dump file and i'll stick it in my dropbox then make a new post with the link.

Thank you :)
 
Full dump memory can you share it with Google Drive for example. Dropbox can also be
 
Full dump memory can you share it with Google Drive for example. Dropbox can also be

Hello,

I've been busy the past few days redecorating my house and didn't get a chance for the dump to be built until this morning but here it is, a brand new 1.15gb dump file as the same BSOD occured even though drivers are up to date and i removed that gpu tweak tool.
MEMORY.DMP
 
The NVIDIA graphics driver is still a problem
Code:
Microsoft (R) Windows Debugger Version 10.0.17763.132 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\MEMORY (1).DMP]
Kernel Summary Dump File: Kernel address space is available, User address space may not be available.


************* Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       SRV*C:\SymCache*http://msdl.microsoft.com/download/symbols
Symbol search path is: SRV*C:\SymCache*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700
Machine Name:
Kernel base = 0xfffff800`03002000 PsLoadedModuleList = 0xfffff800`0323bc90
Debug session time: Sun Mar 24 07:25:42.557 2019 (UTC + 1:00)
System Uptime: 0 days 15:49:36.808
Loading Kernel Symbols
...............Page 200003acf too large to be in the dump file.
................................................
................................................................
.............................
Loading User Symbols
PEB is paged out (Peb.Ldr = 000007ff`fffdf018).  Type ".hh dbgerr001" for details
Loading unloaded module list
........
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 7F, {8, 80050033, 506f8, fffff80003155462}

Page 2003a2c00 too large to be in the dump file.
Page 2003a2c00 too large to be in the dump file.
*** ERROR: Module load completed but symbols could not be loaded for nvlddmkm.sys
Probably caused by : nvlddmkm.sys ( nvlddmkm+a2b02e )

Followup:     MachineOwner
Since the RAM and disk are operational, and changing the drivers does not help, maybe the graphics card itself is defective? And how are its clocks set to default settings is it the same? Have you tried to update the graphics card BIOS (BIOS, not the driver)?
 
Wait, wait. Looking through all the stacks in the stack for the system I noticed functions also called by ... Realtek soundcard driver and HDMI NVIDIA sound card. Also the driver from the Corsair Utility Engine added to the voice
Code:
[fffffa800c74a040 System]
   4.000038  fffffa800c75fb50 ffc84c2a Blocked    win32k!VideoPortCallout+0x120
   4.00003c  fffffa800c75f660 ffc84c2a Blocked    watchdog!SMgrGdiCallout+0x63
   4.000040  fffffa800c75e040 ffc84c2a Blocked    nt!PnpNotifyUserMode+0x158
   4.000074  fffffa800c760b50 ffc84c2d Blocked    nt!MiModifiedPageWriter+0x5a
   4.0000a4  fffffa800c76fb50 ffc84544 Blocked    nt!CcQueueLazyWriteScanThread+0x85
   4.0000b0  fffffa800c784040 ffc84d17 Blocked    nt!AlpcpReceiveMessagePort+0x4e0
   4.0000b8  fffffa800c7955b0 ffc84544 Blocked    nt!EtwpLogger+0x100
   4.0000bc  fffffa800c7c2040 ffc84544 Blocked    nt!EtwpLogger+0x100
   4.0000c0  fffffa800c7d0040 ffc84544 Blocked    nt!EtwpLogger+0x100
   4.0000c4  fffffa800c7d0790 ffc84544 Blocked    nt!EtwpLogger+0x100
   4.0000c8  fffffa800c7dbb50 ffc84584 Blocked    nt!EtwpLogger+0x100
   4.0000d0  fffffa800c976b50 ffc84584 Blocked    nt!EtwpLogger+0x100
   4.0000d4  fffffa800c9b9040 ffd48229 Blocked    nt!EtwpLogger+0x100
   4.0000d8  fffffa800c9be990 ffc84dd2 Blocked    nt!WdipSemCheckTimeout+0x12c
   4.0000dc  fffffa800c714040 fffffeec Blocked    ACPI!ACPIWorkerThread+0x74
   4.0000e4  fffffa800ca4e6f0 ffffffa1 Blocked    ACPI!PciRootBusBiosMethodDispatcherOnResume+0x51
*** ERROR: Module load completed but symbols could not be loaded for MpFilter.sys
   4.0000e8  fffffa800cb88040 ffc84684 Blocked    MpFilter+0x29d69
   4.0000f0  fffffa800cc5a8c0 ffffff8c Blocked    ndis!ndisThreadPoolTimerHandler+0x21
   4.0000f8  fffffa800cc60430 ffc845f8 Blocked    ndis!ndisCmWaitThread+0x6e
   4.0000fc  fffffa800d0a5b50 ffd0568f Blocked    volsnap!VspWorkerThread+0x80
   4.000100  fffffa800d0a6b50 ffc84544 Blocked    volsnap!VspWorkerThread+0x80
   4.000104  fffffa800d0a7b50 ffc84544 Blocked    volsnap!VspWorkerThread+0x80
   4.000108  fffffa800d0a8b50 ffd4540c Blocked    volsnap!VspWorkerThread+0x80
   4.00010c  fffffa800d0a9b50 ffffff4e Blocked    volsnap!VspWorkerThread+0x80
   4.000110  fffffa800d0aab50 ffffff4e Blocked    volsnap!VspWorkerThread+0x80
   4.000114  fffffa800d0abb50 ffffff4e Blocked    volsnap!VspWorkerThread+0x80
   4.000118  fffffa800d0acb50 ffffff4e Blocked    volsnap!VspWorkerThread+0x80
   4.00011c  fffffa800d0afb50 ffffff4e Blocked    volsnap!VspWorkerThread+0x80
   4.000124  fffffa800d118930 ffffff30 Blocked    watchdog!SMgrGdiCalloutThread+0x4f
   4.00012c  fffffa800d57a4f0 ffffff2d Blocked    blbdrive!BlbIoWorkerThread+0x33
   4.000148  fffffa800d735040 ffffff1e Blocked    dxgkrnl!DpiPdoPollingThread+0x51
   4.00014c  fffffa800d7356a0 ffffff1e Blocked    dxgkrnl!DpiPowerArbiterThread+0x5a
   4.000184  fffffa800da565c0 fffff9d9 Blocked    CorsairVBusDriver+0x3e15
*** ERROR: Module load completed but symbols could not be loaded for nvvad64v.sys
   4.000188  fffffa800da87b50 fffffeeb Blocked    nvvad64v+0x8f17
*** ERROR: Module load completed but symbols could not be loaded for nvhda64v.sys
   4.00018c  fffffa800daa6b50 fffffee6 Blocked    nvhda64v+0x348c
   4.000190  fffffa800da66b50 ffc84810 Blocked    nvhda64v+0x348c
   4.000194  fffffa800da6f710 fffffee6 Blocked    nvhda64v+0x348c
   4.000198  fffffa800da7ab50 fffffee6 Blocked    nvhda64v+0x348c
*** ERROR: Module load completed but symbols could not be loaded for RTKVHD64.sys
   4.0001ac  fffffa800da47b50 fffffee4 Blocked    RTKVHD64+0x19b62
   4.0001b0  fffffa800da43b50 fffffee4 Blocked    RTKVHD64+0x19b62
   4.0001b4  fffffa800da44a60 fffffee4 Blocked    RTKVHD64+0x19b62
   4.0001b8  fffffa800db06b50 fffffee4 Blocked    RTKVHD64+0x19b62
   4.0001bc  fffffa800da276e0 fffffee4 Blocked    RTKVHD64+0x19b62
   4.0001c0  fffffa800da4a660 fffffee4 Blocked    RTKVHD64+0x19b62
   4.0001c4  fffffa800dadcaf0 fffffee4 Blocked    RTKVHD64+0x19b62
   4.0001c8  fffffa800da4ca90 fffffee3 Blocked    RTKVHD64+0x19b62
   4.0001cc  fffffa800ccf6680 ffc84524 Blocked    RTKVHD64+0x2b59fc
   4.0001ec  fffffa800d99c420 ffc84690 Blocked    nvlddmkm+0x10e298
   4.0001f0  fffffa800e2a4b50 ffc84527 Blocked    nvlddmkm+0x13a93f
   4.000218  fffffa800e884610 ffc84bdd Blocked    dxgmms1!VidSchiWaitForSchedulerEvents+0x1bc
   4.000250  fffffa800ea40060 ffc84cc1 Blocked    nt!IoRemoveIoCompletion+0x5c
   4.000334  fffffa800ed10650 ffc84697 Blocked    luafv!SynchronousFsControl+0x216
   4.0001dc  fffffa800ee57650 ffc84cf3 Blocked    nt!EtwpLogger+0x100
   4.000618  fffffa800de24040 ffc8599b Blocked    HTTP!UlpScavengerThread+0x81
   4.000660  fffffa800e2f7360 ffd284bf Blocked    mpsdrv!IP6StringToAddress+0x626
   4.001774  fffffa800fdcca10 ffd56939 Blocked    nt!EtwpLogger+0x100
   4.0015d8  fffffa800fd3ba00 ffc84544 Blocked    nt!EtwpLogger+0x100
   4.001644  fffffa800c8e15c0 ffd54560 Blocked    srv2!SrvProcWorkerThread+0x152
   4.001698  fffffa800c87b040 ffffee1b Blocked    srv2!SrvProcWorkerThread+0x152
   4.000d70  fffffa800c8edb50 ffd54411 Blocked    srv2!SrvProcWorkerThread+0x152
   4.00180c  fffffa800c88e2a0 ffffee19 Blocked    srv2!SrvProcWorkerThread+0x152
   4.001810  fffffa800fc56040 ffffee19 Blocked    srv2!SrvProcWorkerThread+0x152
   4.00181c  fffffa800c7e7040 ffffee18 Blocked    srv2!SrvProcWorkerThread+0x152
   4.001828  fffffa800fdd4b50 ffffee17 Blocked    srv2!SrvProcWorkerThread+0x152
   4.00182c  fffffa800c8fbb50 ffffee17 Blocked    srv2!SrvProcWorkerThread+0x152
   4.001834  fffffa800c8f5b50 ffd544b6 Blocked    srv2!SrvProcWorkerThread+0x152
   4.001838  fffffa800c8fc040 ffffee16 Blocked    srv2!SrvProcWorkerThread+0x152
   4.001840  fffffa800c912b50 ffd5482e Blocked    srv2!SrvProcWorkerThread+0x152
   4.001848  fffffa800c90a040 ffffee14 Blocked    srv2!SrvProcWorkerThread+0x152
   4.00184c  fffffa800c918b50 ffffee14 Blocked    srv2!SrvProcWorkerThread+0x152
   4.001888  fffffa800c916b50 ffffee13 Blocked    srv2!SrvProcWorkerThread+0x152
   4.001890  fffffa800c8ae2d0 ffffee12 Blocked    srv2!SrvProcWorkerThread+0x152
   4.0018a4  fffffa800c919b50 ffffee12 Blocked    srv2!SrvProcWorkerThread+0x152
   4.0018ac  fffffa800c919660 ffffee11 Blocked    srv2!SrvProcWorkerThread+0x152
   4.001de0  fffffa801022ab50 ffc84544 Blocked    nt!EtwpLogger+0x100
   4.001edc  fffffa8010377b50 ffc84584 Blocked    nt!EtwpLogger+0x100
   4.001ee8  fffffa8010218750 ffffed33 Blocked    mwac+0xed45
   4.0020c0  fffffa80106f5060 ffc84544 Blocked    nt!EtwpLogger+0x100
*** ERROR: Module load completed but symbols could not be loaded for farflt.sys
   4.001d84  fffffa800deb2940 ffc84911 Blocked    farflt+0xa99b
   4.001e94  fffffa8010739b50 ffc848d1 Blocked    farflt+0xa99b
   4.0022d4  fffffa800eb1b6d0 ffc84544 Blocked    nt!EtwpLogger+0x100
*** ERROR: Module load completed but symbols could not be loaded for mbam.sys
   4.001b6c  fffffa800dfcf6a0 ffc84657 Blocked    mbam+0x1673
   4.0016e0  fffffa800f946060 ffc84544 Blocked    nt!EtwpLogger+0x100
Realtek soundcard driver is outdated:
Code:
6: kd> lmvm RTKVHD64
Browse full module list
start             end                 module name
fffff880`05268000 fffff880`057cf000   RTKVHD64   (no symbols)           
    Loaded symbol image file: RTKVHD64.sys
    Image path: \SystemRoot\system32\drivers\RTKVHD64.sys
    Image name: RTKVHD64.sys
    Browse all global symbols  functions  data
    Timestamp:        Tue Nov  8 02:44:57 2016 (5821ACA9)
    CheckSum:         0053BEA7
    ImageSize:        00567000
    File version:     6.0.1.7982
    Product version:  6.0.1.7982
    File flags:       8 (Mask 3F) Private
    File OS:          40004 NT Win32
    File type:        3.9 Driver
    File date:        00000000.00000000
    Translations:     0409.04b0
    Information from resource tables:
        CompanyName:      Realtek Semiconductor Corp.
        ProductName:      Realtek(r) High Definition Audio Function Driver
        InternalName:     RTKVHD64.sys 7982
        OriginalFilename: RTKVHD64.sys
        ProductVersion:   6.0.1.7982
        FileVersion:      6.0.1.7982 built by: WinDDK
        FileDescription:  Realtek(r) High Definition Audio Function Driver
        LegalCopyright:   Copyright (c) Realtek Semiconductor Corp.1998-2013
Similarly Corsair driver:
Code:
6: kd> lmvm corsairvbusdriver
Browse full module list
start             end                 module name
fffff880`03078000 fffff880`03086000   CorsairVBusDriver   (no symbols)           
    Loaded symbol image file: CorsairVBusDriver.sys
    Image path: \SystemRoot\system32\DRIVERS\CorsairVBusDriver.sys
    Image name: CorsairVBusDriver.sys
    Browse all global symbols  functions  data
    Timestamp:        Thu May 25 06:04:01 2017 (5926D641)
    CheckSum:         000147C3
    ImageSize:        0000E000
    Translations:     0000.04b0 0000.04e4 0409.04b0 0409.04e4
    Information from resource tables:
Please update both drivers
 
That's so weird - my nvidia graphics driver is the latest version, i even used display driver uninstaller to remove the drivers after you said to update them and i reinstalled them using the custom install mode to remove all existing profiles incase something was messed up. I've reinstalled these nvidia drivers twice now. I could roll back to drivers from 2017 as they were the last of the 3** series and i didn't have issues with them.

The corsair drivers are for my mouse, the Icue software automatically updates the firmware, driver, and software daily, I could try uninstalling the driver and software and reinstalling the software so it reinstalls the drivers though incase something went tits up as corsair don't provide support for drivers just the software.

As for updating my graphics card bios that's something i've never heard of doing before nor do i have any idea how to go about that, the product support page for my graphics card only has a driver and software tweak download, nothing about bios, after doing some research about my gpu bios it's the latest version and the only other options to flash it with are the bios versions for the other models under mine, my graphics card works fine as far as i can tell, it works flawlessly in games, i've stress tested it for over 12 hours and there was no hiccups or artifacting, i brought the card brand new from scan on 24/10/2017, i've only recently had these bsod issues because of windows updates and or nvidias 4** series of drivers.

I've uninstalled the realtek drivers, they were only recently installed when i flashed my bios and decided to update every driver too in hopes of fixing the bsod issue, they are the latest version available for my motherboard.

As for the nvidia hdmi sound thing that's a feature bundled in with the drivers, my graphics card has a dvi slot, hdmi and display port, and i use all three ports, my primary monitor is display port, my secondary monitor and my tv are cloned but the monitor is dvi and the tv is hdmi, i never utilise the tv's sound as if im sitting on my bed watching something i'll be wearing my headset which is plugged into my soundblaster Z soundcard.

I'm tempted to roll back the nvidia drivers to 398.36 series as those are the last ones i know of which i didnt have issues with, but saying that after doing the ddu uninstall and custom installation of these 419.35 drivers for the second time my monitors havent lost signal randomly, this is very confusing.....

I did some googling and quite a few people are having bsod issues with nvidia drivers taking the blame but some tech savvy people have suggested certain windows updates are to blame, however the threads i found were for windows 10 and i didn't have the specific kb update they had specified.

Before i made this thread i was at my wits end and i even went to reinstall windows 7 using the upgrade option so all my windows files were fresh, yet nothing i've done so far has fixed the issue, I love computers but damn do i hate them too sometimes.....
 
Last edited:
I also think about your power supply and I do not know if it is enough for your configuration. Have you tried to replace him with another?
 
I also think about your power supply and I do not know if it is enough for your configuration. Have you tried to replace him with another?
It's a gold rated 750w that's more than enough for my hardware - my computer is fine when under load so the psu is not faulting otherwise i'd have issues while trying to play games, it's when the system becomes idle it has a bsod at the same time at 6:26am because of some timed/scheduled function that im unaware of. My power settings are set to maximum performance.
 
In that case, it must be soft from Corsair. This Corsair Icue you got it in the latest version? Because maybe it is enough to solve the problem?
 
Your bSOD is a Double-Fault.
That means, after problems with your nVidia-driver you are getting within the Error-Handling another Fault := Double-Fault

Both Errors are a result of your overclocked RAM running with 2133MHz instead of 1600 the CPU is thougt for.
Intel® Core™ i7-4790K Prozessor (8 MB Cache, bis zu 4,40 GHz) Produktspezifikationen

is your MAXIMUS VI HERO designed for that speed?
Code:
Physical Memory Array Handle  0043h
  Memory Error Info Handle      [Not Provided]
  Total Width                   64 bits
  Data Width                    64 bits
  Size                          8192MB
  Form Factor                   09h - DIMM
  Device Set                    [None]
  Device Locator                ChannelB-DIMM0
  Bank Locator                  BANK 2
  Memory Type                   18h - Specification Reserved
  Type Detail                   0080h - Synchronous
  Speed                         2133MHz
  Manufacturer                  0215
  Serial Number                         
  Asset Tag Number                       
  Part Number                   CMZ16GX3M2A2133C10

invest in that, return to normal speed and test again.
 
Please be sure to zip up the full kernel dumps first if you upload anymore to Google. They will be much smaller.

You have to copy the memory.dmp file from \windows to Desktop or Documents first. You cannot zip in \windows (permission setting issues).
 

Has Sysnative Forums helped you? Please consider donating to help us support the site!

Back
Top