I think the biggest one (http://piloupsd.me/MEMORY.zip) is a Kernel-dump...
Follow along with the video below to see how to install our site as a web app on your home screen.
Note: This feature may not be available in some browsers.
And here is another one. The activated GPU was the Intel. https://mega.co.nz/#!htsSWCqI!-qoCJLtrJlr0NZJvwqMTi2ol7KTND2-QGBDbqpLWHkwWell, this time, Verifier worked. I had a BSOD with an exception related to Verifier !
The dump is here : http://piloupsd.me/MEMORY2.zip.
Thanks.
And here is another one. The activated GPU was the Intel. https://mega.co.nz/#!htsSWCqI!-qoCJLtrJlr0NZJvwqMTi2ol7KTND2-QGBDbqpLWHkwWell, this time, Verifier worked. I had a BSOD with an exception related to Verifier !
The dump is here : http://piloupsd.me/MEMORY2.zip.
Thanks.
Well, this time, Verifier worked. I had a BSOD with an exception related to Verifier !
The dump is here : http://piloupsd.me/MEMORY2.zip.
Thanks.
6: kd> .bugcheck
Bugcheck code 000000C4
Arguments 00000000`000000f6 00000000`00000260 ffffe001`ae740900 fffff800`73aa8859
[COLOR="#800080"]
//Referencing user handle in kernel mode[/COLOR]
[COLOR="#800080"]
//Thread that caused the crash[/COLOR]
6: kd> !thread ffffe001ae762880
THREAD ffffe001ae762880 Cid 0da4.1328 Teb: 00007ff6f2cce000 Win32Thread: fffff90141932550 RUNNING on processor 6
Not impersonating
DeviceMap ffffc000cf68f7e0
Owning Process ffffe001ae740900 Image: nvspcaps64.exe
Attached Process N/A Image: N/A
Wait Start TickCount 23197 Ticks: 0
Context Switch Count 71 IdealProcessor: 4
UserTime 00:00:00.000
KernelTime 00:00:00.046
Win32 Start Address 0x00007ff6f2f14eb8
Stack Init ffffd00022c72c90 Current ffffd00022c70e50
Base ffffd00022c73000 Limit ffffd00022c6d000 Call 0
Priority 14 BasePriority 8 UnusualBoost 6 ForegroundBoost 0 IoPriority 2 PagePriority 5
Child-SP RetAddr : Args to Child : Call Site
ffffd000`22c71848 fffff801`3de906b0 : 00000000`000000c4 00000000`000000f6 00000000`00000260 ffffe001`ae740900 : nt!KeBugCheckEx
ffffd000`22c71850 fffff801`3de95fa0 : ffffe001`ae740900 00000000`00000000 ffffe001`00000000 fffff6fc`009ee1d0 : nt!VerifierBugCheckIfAppropriate+0x3c
ffffd000`22c71890 fffff801`3dd582bb : 0003f3c0`00794000 ffffe001`ada84730 ffffd000`22c71d60 ffffe001`ae762880 : nt!VfCheckUserHandle+0x1b8
ffffd000`22c71970 fffff801`3dbf8f95 : ffffd000`22c72900 00000000`00000002 ffffe001`ada84730 fffff801`3db66e00 : nt!ObReferenceObjectByHandleWithTag+0x1f10b
ffffd000`22c71a10 fffff801`3dc3a6a9 : 00000000`00000010 fffff801`3dc3a680 00000000`00000010 00000000`00010246 : nt!ObReferenceObjectByHandle+0x25
ffffd000`22c71a60 fffff801`3dc39772 : ffffd000`22c729ac 00000000`00000004 00000000`00000000 ffffd000`22c71e98 : nt!CmObReferenceObjectByHandle+0x29
ffffd000`22c71aa0 fffff801`3d9671b3 : ffffd000`22c729ac 00000000`00000004 ffffe001`b2052060 ffffd000`22c71ec0 : nt!NtSetValueKey+0x136
ffffd000`22c71c70 fffff801`3d95f600 : fffff800`73aa8859 00000000`00000008 ffffd000`22c71ef1 00000000`00000011 : nt!KiSystemServiceCopyEnd+0x13 (TrapFrame @ ffffd000`22c71ce0)
ffffd000`22c71e78 fffff800`73aa8859 : 00000000`00000008 ffffd000`22c71ef1 00000000`00000011 ffffffff`80001154 : nt!KiServiceLinkage
ffffd000`22c71e80 fffff800`73aa83b1 : 00000000`00000004 ffffd000`22c729ac 00000000`00000004 00000000`00000004 : nvlddmkm+0x99859
ffffd000`22c71f40 fffff800`73af0017 : fffff800`73aa8320 ffffd000`22c72870 ffffd000`22c72180 ffffd000`22c728a8 : nvlddmkm+0x993b1
ffffd000`22c71fe0 fffff800`73ac02cb : 00000000`00000000 fffff801`3d862e27 ffffffff`ffffffff ffffd000`22c720c0 : nvlddmkm+0xe1017
ffffd000`22c72030 fffff800`73ab3db8 : ffffd000`22c72448 00000000`00000000 ffffd000`22c72180 00000000`00000000 : nvlddmkm+0xb12cb
ffffd000`22c72080 fffff800`7428dd0b : 00000000`00000010 fffff800`7428dc2c 00000000`00000010 00000000`00010282 : nvlddmkm+0xa4db8
ffffd000`22c72360 fffff800`73ab3264 : fffff800`73f0a370 ffffd000`22c72459 ffffe001`b3312000 00000000`00000000 : nvlddmkm!nvDumpConfig+0x24c8ab
ffffd000`22c723a0 fffff800`74272945 : ffffd000`22c72768 ffffd000`22c72529 ffffd000`22c72768 ffffd000`22c72768 : nvlddmkm+0xa4264
ffffd000`22c724c0 fffff800`74302aa5 : 00000000`00000000 00000000`00000000 00000000`4e562a2a 00000000`01000003 : nvlddmkm!nvDumpConfig+0x2314e5
ffffd000`22c72590 fffff800`73763a34 : ffffe001`b336b010 ffffe001`b336b010 ffffd000`22c725e8 00000000`00000018 : nvlddmkm!nvDumpConfig+0x2c1645
ffffd000`22c725c0 fffff800`73734fef : ffffe001`b336b010 ffffd000`22c72b80 00000000`00000000 fffff801`3d867db2 : dxgkrnl!DXGADAPTER::DdiEscape+0x48
ffffd000`22c725f0 fffff960`00172fd3 : 00000000`00000000 ffffe001`ae762880 00000000`00b9d740 00000000`00000000 : dxgkrnl!DxgkEscape+0x54f
ffffd000`22c72ab0 fffff801`3d9671b3 : 00000000`00000008 00000000`00000011 00000000`00000001 00007ffa`6074c070 : win32k!NtGdiDdDDIEscape+0x53
ffffd000`22c72b00 00007ffa`5f6014aa : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 (TrapFrame @ ffffd000`22c72b00)
00000000`009fc678 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`5f6014aa
6: kd> !handle 260
PROCESS ffffe001ae740900
SessionId: 1 Cid: 0da4 Peb: 7ff6f2cc8000 ParentCid: 036c
DirBase: 1e26ce000 ObjectTable: ffffc000df23a880 HandleCount: <Data Not Accessible>
Image: nvspcaps64.exe
Handle Error reading handle count.
0260: Object: ffffc000dc1b48d0 GrantedAccess: 00020006 (Inherit) Entry: ffffc000e0239980
Object: ffffc000dc1b48d0 Type: (ffffe001ada84730) Key
ObjectHeader: ffffc000dc1b48a0 (new version)
HandleCount: 1 PointerCount: 32768
Directory Object: 00000000 Name: \REGISTRY\MACHINE\SYSTEM\CONTROLSET001\CONTROL\CLASS\{4D36E968-E325-11CE-BFC1-08002BE10318}\0001\NVSPCAPS
[COLOR="#800080"]
//Nvlddmkm referenced the NVSPCAPS registry key, the Nvidia Geforce Shadow Play capturing program[/COLOR]
6: kd> lmvm nvlddmkm
start end module name
fffff800`73a0f000 fffff800`7450e000 nvlddmkm (export symbols) nvlddmkm.sys
Loaded symbol image file: nvlddmkm.sys
Image path: \SystemRoot\system32\DRIVERS\nvlddmkm.sys
Image name: nvlddmkm.sys
Timestamp: Mon Oct 28 21:38:03 2013 (526ED93B) [COLOR="#800080"]//Outdated[/COLOR]
CheckSum: 00AD0AFE
ImageSize: 00AFF000
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4
Has Sysnative Forums helped you? Please consider donating to help us support the site!