I really need help solving my case i have included the .dmp and what it contains unless you don't want to download please help with the crashes love you <3
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {28, 2, 0, fffff8008cb9f759}
Probably caused by : memory_corruption
Followup: memory_corruption
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000028, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8008cb9f759, address which referenced memory
Debugging Details:
------------------
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 10.0.14393.693 (rs1_release.161220-1747)
SYSTEM_MANUFACTURER: Notebook
SYSTEM_PRODUCT_NAME: P65_67HSHP
SYSTEM_SKU: Not Applicable
SYSTEM_VERSION: Not Applicable
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 1.05.02 12/27/2016
BIOS_DATE: 12/27/2016
BASEBOARD_MANUFACTURER: Notebook
BASEBOARD_PRODUCT: P65_67HSHP
BASEBOARD_VERSION: Not Applicable
DUMP_TYPE: 2
BUGCHECK_P1: 28
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8008cb9f759
READ_ADDRESS: fffff8008cdc0338: Unable to get MiVisibleState
0000000000000028
CURRENT_IRQL: 2
FAULTING_IP:
nt! ?? ::FNODOBFM::`string'+2cbc9
fffff800`8cb9f759 488b4628 mov rax,qword ptr [rsi+28h]
CPU_COUNT: 8
CPU_MHZ: af8
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 9e
CPU_STEPPING: 9
CPU_MICROCODE: 6,9e,9,0 (F,M,S,R) SIG: 48'00000000 (cache) 48'00000000 (init)
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
BUGCHECK_STR: AV
PROCESS_NAME: csgo.exe
ANALYSIS_SESSION_HOST: DESKTOP-KTMBEDR
ANALYSIS_SESSION_TIME: 03-03-2017 11:11:52.0130
ANALYSIS_VERSION: 10.0.14321.1024 amd64fre
TRAP_FRAME: ffff8e81d512b100 -- (.trap 0xffff8e81d512b100)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffa30000000028 rbx=0000000000000000 rcx=0000000000000000
rdx=ffffa30000000028 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8008cb9f759 rsp=ffff8e81d512b290 rbp=0000000000000000
r8=ffffaa03b2481180 r9=0000000000000001 r10=0000000fffffffff
r11=ffffa30000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
nt! ?? ::FNODOBFM::`string'+0x2cbc9:
fffff800`8cb9f759 488b4628 mov rax,qword ptr [rsi+28h] ds:00000000`00000028=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8008cb6e829 to fffff8008cb636f0
STACK_TEXT:
ffff8e81`d512afb8 fffff800`8cb6e829 : 00000000`0000000a 00000000`00000028 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffff8e81`d512afc0 fffff800`8cb6ce07 : 00000000`00de77a3 fffff800`8cd3c090 00000000`f7fef106 fffff800`8caea61b : nt!KiBugCheckDispatch+0x69
ffff8e81`d512b100 fffff800`8cb9f759 : ffff1f27`d6f60c80 fffff800`8ca54d9f 00000000`00000001 ffff1f27`d6f60ca0 : nt!KiPageFault+0x247
ffff8e81`d512b290 fffff800`8ca85c9a : 00000000`00000000 ffffef80`000b0810 ffff8e81`d512b680 00000000`16102000 : nt! ?? ::FNODOBFM::`string'+0x2cbc9
ffff8e81`d512b390 fffff800`8cefbd04 : 00000000`00000003 00000000`00000001 00000000`00001000 00000000`00001000 : nt!MmProbeAndLockPages+0x25a
ffff8e81`d512b4a0 fffff800`8cefb92f : 00000000`022fe700 00000000`00000010 ffffaa03`b24b9dc0 00000000`00000001 : nt!MmCopyVirtualMemory+0x364
ffff8e81`d512b950 fffff800`8cefb7cb : ffffaa03`b7a2c640 00000000`022fe6f8 ffff8e81`d512ba28 00000000`023fdbd8 : nt!MiReadWriteVirtualMemory+0x15f
ffff8e81`d512b9d0 fffff800`8cb6e393 : 00000000`579945d0 00000000`00000410 00000000`00000000 00000000`023fd6e8 : nt!NtReadVirtualMemory+0x1b
ffff8e81`d512ba10 00007ff8`50a068b4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`022fe6d8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`50a068b4
STACK_COMMAND: kb
CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
fffff8008ca88f52 - nt!MiIsAddressValid+c2
[ f6:ef ]
fffff8008cb9f043-fffff8008cb9f044 2 bytes - nt! ?? ::FNODOBFM::`string'+2c4b3 (+0x1160f1)
[ 80 fa:00 a3 ]
fffff8008cb9f44a-fffff8008cb9f44c 3 bytes - nt! ?? ::FNODOBFM::`string'+2c8ba (+0x407)
[ 40 fb f6:c0 f7 ef ]
fffff8008cb9f477-fffff8008cb9f478 2 bytes - nt! ?? ::FNODOBFM::`string'+2c8e7 (+0x2d)
[ 80 fa:00 a3 ]
fffff8008cb9f4a2-fffff8008cb9f4a4 3 bytes - nt! ?? ::FNODOBFM::`string'+2c912 (+0x2b)
[ 40 fb f6:c0 f7 ef ]
fffff8008cb9f4cf-fffff8008cb9f4d0 2 bytes - nt! ?? ::FNODOBFM::`string'+2c93f (+0x2d)
[ 80 fa:00 a3 ]
fffff8008cb9f832-fffff8008cb9f833 2 bytes - nt! ?? ::FNODOBFM::`string'+2cca2 (+0x363)
[ 80 fa:00 a3 ]
fffff8008cb9f846-fffff8008cb9f847 2 bytes - nt! ?? ::FNODOBFM::`string'+2ccb6 (+0x14)
[ 80 fa:00 a3 ]
fffff8008cb9f91f-fffff8008cb9f920 2 bytes - nt! ?? ::FNODOBFM::`string'+2cd8f (+0xd9)
[ 80 fa:00 a3 ]
fffff8008cb9f929-fffff8008cb9f92a 2 bytes - nt! ?? ::FNODOBFM::`string'+2cd99 (+0x0a)
[ 80 fa:00 a3 ]
fffff8008cb9fe8d-fffff8008cb9fe8f 3 bytes - nt! ?? ::FNODOBFM::`string'+2d2fd (+0x564)
[ 40 fb f6:c0 f7 ef ]
fffff8008cb9feea-fffff8008cb9feeb 2 bytes - nt! ?? ::FNODOBFM::`string'+2d35a (+0x5d)
[ 80 fa:00 a3 ]
fffff8008cb9ff97 - nt! ?? ::FNODOBFM::`string'+2d407 (+0xad)
[ f6:ef ]
27 errors : !nt (fffff8008ca88f52-fffff8008cb9ff97)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: LARGE
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
BUCKET_ID: MEMORY_CORRUPTION_LARGE
PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
TARGET_TIME: 2017-03-03T16:54:58.000Z
OSBUILD: 14393
OSSERVICEPACK: 693
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 784
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2016-12-21 00:50:57
BUILDDATESTAMP_STR: 161220-1747
BUILDLAB_STR: rs1_release
BUILDOSVER_STR: 10.0.14393.693
ANALYSIS_SESSION_ELAPSED_TIME: 10ce
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:memory_corruption_large
FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
Followup: memory_corruption
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {28, 2, 0, fffff8008cb9f759}
Probably caused by : memory_corruption
Followup: memory_corruption
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000028, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8008cb9f759, address which referenced memory
Debugging Details:
------------------
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 10.0.14393.693 (rs1_release.161220-1747)
SYSTEM_MANUFACTURER: Notebook
SYSTEM_PRODUCT_NAME: P65_67HSHP
SYSTEM_SKU: Not Applicable
SYSTEM_VERSION: Not Applicable
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 1.05.02 12/27/2016
BIOS_DATE: 12/27/2016
BASEBOARD_MANUFACTURER: Notebook
BASEBOARD_PRODUCT: P65_67HSHP
BASEBOARD_VERSION: Not Applicable
DUMP_TYPE: 2
BUGCHECK_P1: 28
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8008cb9f759
READ_ADDRESS: fffff8008cdc0338: Unable to get MiVisibleState
0000000000000028
CURRENT_IRQL: 2
FAULTING_IP:
nt! ?? ::FNODOBFM::`string'+2cbc9
fffff800`8cb9f759 488b4628 mov rax,qword ptr [rsi+28h]
CPU_COUNT: 8
CPU_MHZ: af8
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 9e
CPU_STEPPING: 9
CPU_MICROCODE: 6,9e,9,0 (F,M,S,R) SIG: 48'00000000 (cache) 48'00000000 (init)
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
BUGCHECK_STR: AV
PROCESS_NAME: csgo.exe
ANALYSIS_SESSION_HOST: DESKTOP-KTMBEDR
ANALYSIS_SESSION_TIME: 03-03-2017 11:11:52.0130
ANALYSIS_VERSION: 10.0.14321.1024 amd64fre
TRAP_FRAME: ffff8e81d512b100 -- (.trap 0xffff8e81d512b100)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffa30000000028 rbx=0000000000000000 rcx=0000000000000000
rdx=ffffa30000000028 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8008cb9f759 rsp=ffff8e81d512b290 rbp=0000000000000000
r8=ffffaa03b2481180 r9=0000000000000001 r10=0000000fffffffff
r11=ffffa30000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
nt! ?? ::FNODOBFM::`string'+0x2cbc9:
fffff800`8cb9f759 488b4628 mov rax,qword ptr [rsi+28h] ds:00000000`00000028=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8008cb6e829 to fffff8008cb636f0
STACK_TEXT:
ffff8e81`d512afb8 fffff800`8cb6e829 : 00000000`0000000a 00000000`00000028 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffff8e81`d512afc0 fffff800`8cb6ce07 : 00000000`00de77a3 fffff800`8cd3c090 00000000`f7fef106 fffff800`8caea61b : nt!KiBugCheckDispatch+0x69
ffff8e81`d512b100 fffff800`8cb9f759 : ffff1f27`d6f60c80 fffff800`8ca54d9f 00000000`00000001 ffff1f27`d6f60ca0 : nt!KiPageFault+0x247
ffff8e81`d512b290 fffff800`8ca85c9a : 00000000`00000000 ffffef80`000b0810 ffff8e81`d512b680 00000000`16102000 : nt! ?? ::FNODOBFM::`string'+0x2cbc9
ffff8e81`d512b390 fffff800`8cefbd04 : 00000000`00000003 00000000`00000001 00000000`00001000 00000000`00001000 : nt!MmProbeAndLockPages+0x25a
ffff8e81`d512b4a0 fffff800`8cefb92f : 00000000`022fe700 00000000`00000010 ffffaa03`b24b9dc0 00000000`00000001 : nt!MmCopyVirtualMemory+0x364
ffff8e81`d512b950 fffff800`8cefb7cb : ffffaa03`b7a2c640 00000000`022fe6f8 ffff8e81`d512ba28 00000000`023fdbd8 : nt!MiReadWriteVirtualMemory+0x15f
ffff8e81`d512b9d0 fffff800`8cb6e393 : 00000000`579945d0 00000000`00000410 00000000`00000000 00000000`023fd6e8 : nt!NtReadVirtualMemory+0x1b
ffff8e81`d512ba10 00007ff8`50a068b4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`022fe6d8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`50a068b4
STACK_COMMAND: kb
CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
fffff8008ca88f52 - nt!MiIsAddressValid+c2
[ f6:ef ]
fffff8008cb9f043-fffff8008cb9f044 2 bytes - nt! ?? ::FNODOBFM::`string'+2c4b3 (+0x1160f1)
[ 80 fa:00 a3 ]
fffff8008cb9f44a-fffff8008cb9f44c 3 bytes - nt! ?? ::FNODOBFM::`string'+2c8ba (+0x407)
[ 40 fb f6:c0 f7 ef ]
fffff8008cb9f477-fffff8008cb9f478 2 bytes - nt! ?? ::FNODOBFM::`string'+2c8e7 (+0x2d)
[ 80 fa:00 a3 ]
fffff8008cb9f4a2-fffff8008cb9f4a4 3 bytes - nt! ?? ::FNODOBFM::`string'+2c912 (+0x2b)
[ 40 fb f6:c0 f7 ef ]
fffff8008cb9f4cf-fffff8008cb9f4d0 2 bytes - nt! ?? ::FNODOBFM::`string'+2c93f (+0x2d)
[ 80 fa:00 a3 ]
fffff8008cb9f832-fffff8008cb9f833 2 bytes - nt! ?? ::FNODOBFM::`string'+2cca2 (+0x363)
[ 80 fa:00 a3 ]
fffff8008cb9f846-fffff8008cb9f847 2 bytes - nt! ?? ::FNODOBFM::`string'+2ccb6 (+0x14)
[ 80 fa:00 a3 ]
fffff8008cb9f91f-fffff8008cb9f920 2 bytes - nt! ?? ::FNODOBFM::`string'+2cd8f (+0xd9)
[ 80 fa:00 a3 ]
fffff8008cb9f929-fffff8008cb9f92a 2 bytes - nt! ?? ::FNODOBFM::`string'+2cd99 (+0x0a)
[ 80 fa:00 a3 ]
fffff8008cb9fe8d-fffff8008cb9fe8f 3 bytes - nt! ?? ::FNODOBFM::`string'+2d2fd (+0x564)
[ 40 fb f6:c0 f7 ef ]
fffff8008cb9feea-fffff8008cb9feeb 2 bytes - nt! ?? ::FNODOBFM::`string'+2d35a (+0x5d)
[ 80 fa:00 a3 ]
fffff8008cb9ff97 - nt! ?? ::FNODOBFM::`string'+2d407 (+0xad)
[ f6:ef ]
27 errors : !nt (fffff8008ca88f52-fffff8008cb9ff97)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: LARGE
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
BUCKET_ID: MEMORY_CORRUPTION_LARGE
PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
TARGET_TIME: 2017-03-03T16:54:58.000Z
OSBUILD: 14393
OSSERVICEPACK: 693
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 784
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2016-12-21 00:50:57
BUILDDATESTAMP_STR: 161220-1747
BUILDLAB_STR: rs1_release
BUILDOSVER_STR: 10.0.14393.693
ANALYSIS_SESSION_ELAPSED_TIME: 10ce
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:memory_corruption_large
FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
Followup: memory_corruption
---------