Microsoft (R) Windows Debugger Version 10.0.10586.567 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Windows\Minidump\062516-56328-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available ************* Symbol Path validation summary ************** Response Time (ms) Location Deferred SRV*c:\symbols*http://msdl.microsoft.com/download/symbols Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols Executable search path is: Windows 10 Kernel Version 10586 MP (8 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Personal Built by: 10586.420.amd64fre.th2_release_sec.160527-1834 Machine Name: Kernel base = 0xfffff800`b2205000 PsLoadedModuleList = 0xfffff800`b24e3cf0 Debug session time: Sat Jun 25 19:41:11.161 2016 (UTC - 4:00) System Uptime: 0 days 0:04:39.809 Loading Kernel Symbols ............................................................... ................................................................ .................................... Loading User Symbols Loading unloaded module list ....... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 50, {fffff801b25357ec, 0, fffff800b22a33da, 2} Could not read faulting driver name Probably caused by : Pool_Corruption ( nt!ExDeferredFreePool+3ad ) Followup: Pool_corruption --------- 2: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* PAGE_FAULT_IN_NONPAGED_AREA (50) Invalid system memory was referenced. This cannot be protected by try-except. Typically the address is just plain bad or it is pointing at freed memory. Arguments: Arg1: fffff801b25357ec, memory referenced. Arg2: 0000000000000000, value 0 = read operation, 1 = write operation. Arg3: fffff800b22a33da, If non-zero, the instruction address which referenced the bad memory address. Arg4: 0000000000000002, (reserved) Debugging Details: ------------------ Could not read faulting driver name DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 10586.420.amd64fre.th2_release_sec.160527-1834 SYSTEM_MANUFACTURER: System manufacturer SYSTEM_PRODUCT_NAME: System Product Name SYSTEM_SKU: SKU SYSTEM_VERSION: System Version BIOS_VENDOR: American Megatrends Inc. BIOS_VERSION: 1801 BIOS_DATE: 03/24/2016 BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC. BASEBOARD_PRODUCT: Z170-A BASEBOARD_VERSION: Rev 1.xx DUMP_TYPE: 2 DUMP_FILE_ATTRIBUTES: 0x8 Kernel Generated Triage Dump BUGCHECK_P1: fffff801b25357ec BUGCHECK_P2: 0 BUGCHECK_P3: fffff800b22a33da BUGCHECK_P4: 2 READ_ADDRESS: fffff800b2583520: Unable to get MiVisibleState fffff801b25357ec FAULTING_IP: nt!RtlpLookupFunctionEntryForStackWalks+7a fffff800`b22a33da 8b02 mov eax,dword ptr [rdx] MM_INTERNAL_CODE: 2 CPU_COUNT: 8 CPU_MHZ: fa8 CPU_VENDOR: GenuineIntel CPU_FAMILY: 6 CPU_MODEL: 5e CPU_STEPPING: 3 CPU_MICROCODE: 6,5e,3,0 (F,M,S,R) SIG: 74'00000000 (cache) 74'00000000 (init) CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT BUGCHECK_STR: AV PROCESS_NAME: witcher3.exe CURRENT_IRQL: 1 ANALYSIS_SESSION_HOST: MATT-PC ANALYSIS_SESSION_TIME: 06-26-2016 02:54:50.0494 ANALYSIS_VERSION: 10.0.10586.567 amd64fre IRP_ADDRESS: ffffcf8122554dd8 TRAP_FRAME: ffffd000225526e0 -- (.trap 0xffffd000225526e0) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=000000003ffffdfb rbx=0000000000000000 rcx=00000000fffff800 rdx=fffff801b25357ec rsi=0000000000000000 rdi=0000000000000000 rip=fffff800b22a33da rsp=ffffd00022552870 rbp=0000000000000001 r8=0000000000000000 r9=00000000155554aa r10=fffff800b2536000 r11=0000000000000000 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl nz na po nc nt!RtlpLookupFunctionEntryForStackWalks+0x7a: fffff800`b22a33da 8b02 mov eax,dword ptr [rdx] ds:fffff801`b25357ec=???????? Resetting default scope LAST_CONTROL_TRANSFER: from fffff800b23745c1 to fffff800b23477a0 STACK_TEXT: ffffd000`22552488 fffff800`b23745c1 : 00000000`00000050 fffff801`b25357ec 00000000`00000000 ffffd000`225526e0 : nt!KeBugCheckEx ffffd000`22552490 fffff800`b2270621 : 00000000`00000000 00000000`0009c69c ffffd000`225526e0 ffffd000`22552858 : nt! ?? ::FNODOBFM::`string'+0x1e3c1 ffffd000`22552580 fffff800`b2350abc : ffffc001`dba92a30 ffffc001`e2c10900 00000000`00000000 ffffc001`e2c10a0c : nt!MmAccessFault+0x5f1 ffffd000`225526e0 fffff800`b22a33da : 00001a02`00001a02 fffff800`b22a371b fffff800`b2549818 fffff800`b2549818 : nt!KiPageFault+0x13c ffffd000`22552870 fffff800`b22a172c : 00000000`00000000 ffffd000`22552a80 00000000`00000011 ffffe000`a19b0840 : nt!RtlpLookupFunctionEntryForStackWalks+0x7a ffffd000`225528e0 fffff800`b22a158f : ffffcf81`2312c000 fffff800`b23a1670 ffffcf81`00000000 fffff800`b22a371b : nt!RtlpWalkFrameChain+0x15c ffffd000`22553000 fffff800`b229f798 : 00000000`00000003 ffffe000`a037aa98 00000000`00000020 ffffd000`2254d000 : nt!RtlWalkFrameChain+0x8f ffffd000`22553050 fffff800`b28c8ae4 : ffffe000`a037aa80 ffffd000`225533d9 ffffe000`a1b21f20 ffffe000`a1765ec0 : nt!RtlCaptureStackBackTrace+0x44 ffffd000`22553080 fffff800`b28c8b97 : ffffd000`2254d000 ffffd000`22554000 fffff800`b2598340 fffff800`b24135bf : nt!IovpLogStackCallout+0x1c ffffd000`225530b0 fffff800`b28c8901 : 00000000`00000002 ffffcf81`2312cfe0 ffffe000`a1757080 00000000`00000000 : nt!ViPoolLogStackTrace+0x9f ffffd000`225530f0 fffff800`b241243d : 00000000`00000020 ffffd000`225533d9 ffffe000`a1b21f20 00000000`00000000 : nt!VfFreePoolNotification+0x5d ffffd000`22553120 fffff800`b2436b5d : ffffcf81`22554e50 fffff800`00000240 00000000`00000000 00000000`00000000 : nt!ExpFreePoolChecks+0x81 ffffd000`22553150 fffff800`b2287e99 : ffffcf81`22554f00 fffff800`b28cc2c6 ffffe000`a7742300 00000000`00000000 : nt!ExDeferredFreePool+0x3ad ffffd000`22553230 fffff800`b228714c : ffffcf81`22554e50 ffffe000`00000001 ffffd000`22553301 00000000`00000000 : nt!IopCompleteRequest+0x79 ffffd000`22553320 fffff800`b28b90fd : ffffcf81`22554e50 ffffd000`22553402 ffffc001`e2e08e80 fffff801`00000000 : nt!IopfCompleteRequest+0x40c ffffd000`22553440 fffff801`96c5a46c : fffff801`943f7895 00000000`00000000 00000000`00000000 ffffe000`a188d570 : nt!IovCompleteRequest+0x1c1 ffffd000`22553520 fffff800`b28b8ebe : ffffe000`a188d570 ffffcf81`22554e50 00000000`00000000 00000000`00000000 : Npfs!NpFsdFileSystemControl+0xdc ffffd000`22553560 fffff800`b2280fb2 : ffffe000`a6a3ee00 00000000`00000001 ffffcf81`22554e50 ffffe000`a188d570 : nt!IovCallDriver+0x252 ffffd000`225535a0 fffff801`943f7895 : ffffd000`22553690 00000000`00000000 00000000`c000090d ffffe000`a1b21f00 : nt!IofCallDriver+0x72 ffffd000`225535e0 fffff801`944259b5 : 00000000`c0000910 ffffe000`a7627a40 ffffe000`a64c9701 00000000`00000000 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x1a5 ffffd000`22553670 fffff800`b28b8ebe : ffffcf81`22554e50 fffff800`b2607852 ffffe000`a64c9710 fffff800`b25c4d32 : FLTMGR!FltpFsControl+0x115 ffffd000`225536d0 fffff800`b2280fb2 : ffffe000`a1b21f20 ffffd000`22553a80 ffffe000`a1b21f20 ffffe000`a7627a40 : nt!IovCallDriver+0x252 ffffd000`22553710 fffff800`b2607852 : ffffe000`a1b21f20 ffffd000`22553a80 00000000`00000001 00000000`000001c8 : nt!IofCallDriver+0x72 ffffd000`22553750 fffff800`b25c4d32 : 00000020`d87fe538 ffffd000`22553a80 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0x1162 ffffd000`22553920 fffff800`b23520a3 : ffffe000`a1757080 00000020`d87fe4f8 ffffd000`225539a8 00000020`d87fe608 : nt!NtFsControlFile+0x56 ffffd000`22553990 00007ff8`6e1f5804 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 00000020`d87fe4d8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`6e1f5804 STACK_COMMAND: kb THREAD_SHA1_HASH_MOD_FUNC: 7594414eef497e7c2d2be7c5b50e7cb70c875fc4 THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 7d28ee5e8fbf6bd6ce73720ba7174bb73d477f64 THREAD_SHA1_HASH_MOD: d3bfc44c98cc0fe627de7f0c6daee62d35c06703 FOLLOWUP_IP: nt!ExDeferredFreePool+3ad fffff800`b2436b5d 4d8bc6 mov r8,r14 FAULT_INSTR_CODE: 49c68b4d SYMBOL_STACK_INDEX: c SYMBOL_NAME: nt!ExDeferredFreePool+3ad FOLLOWUP_NAME: Pool_corruption IMAGE_NAME: Pool_Corruption DEBUG_FLR_IMAGE_TIMESTAMP: 0 IMAGE_VERSION: 10.0.10586.420 MODULE_NAME: Pool_Corruption BUCKET_ID_FUNC_OFFSET: 3ad FAILURE_BUCKET_ID: AV_R_INVALID_nt!ExDeferredFreePool BUCKET_ID: AV_R_INVALID_nt!ExDeferredFreePool PRIMARY_PROBLEM_CLASS: AV_R_INVALID_nt!ExDeferredFreePool TARGET_TIME: 2016-06-25T23:41:11.000Z OSBUILD: 10586 OSSERVICEPACK: 0 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 784 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 10 OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 2016-05-27 23:59:07 BUILDDATESTAMP_STR: 160527-1834 BUILDLAB_STR: th2_release_sec BUILDOSVER_STR: 10.0.10586.420.amd64fre.th2_release_sec.160527-1834 ANALYSIS_SESSION_ELAPSED_TIME: 3c8 ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:av_r_invalid_nt!exdeferredfreepool FAILURE_ID_HASH: {028c647e-835a-75c4-058d-04f80fc3ba93} Followup: Pool_corruption ---------