Multiple BSOD, Getting more frequent

Aug 20, 2018
3
0
10
About a week ago got first BSOD, over time has gotten more frequent. Reset windows (with keeping personal files) at 7:30PST yesterday, and it seems to have only made it worse. Will be posting the only dump files I have in hopes of someone being able to help.

Have already:
Run windows memory test - Nothing wrong
Made sure every driver I have is updated
Ran /sfc with no problems
ran DISM with no problems

Things I am in the process of trying:
Running malwarebytes to find anything with that
Getting Memtest86 downloaded and onto a flashdrive for boot

My PC Specs:
Motherboard: ASRock 970M Pro3
Processor: AMD FX-8320E Eight-Core Processor
Ram: 8G of Kingston Ram/8 Of another brand
Graphics Cards: GTX 1070 Windforce
PSU: CORSAIR RM Series RM650 650W ATX12V v2.31
Harddrive: 1T WD Blue HDD

All debugged with WINDBG

FIRST BSOD DUMP FROM 7AM WHILE I WAS SLEEPING - PC NOT BEING USED

Microsoft (R) Windows Debugger Version 10.0.18206.1001 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Windows\Minidump\082018-33265-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 17134 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 17134.1.amd64fre.rs4_release.180410-1804
Machine Name:
Kernel base = 0xfffff801`02617000 PsLoadedModuleList = 0xfffff801`029c5170
Debug session time: Mon Aug 20 07:43:55.591 2018 (UTC - 7:00)
System Uptime: 1 days 7:13:02.686
Loading Kernel Symbols
...............................................................
................................................................
......................................................
Loading User Symbols
Loading unloaded module list
.................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c0000005, ffffede0be9a824a, fffffe874bad8020, 0}

Probably caused by : win32kbase.sys ( win32kbase!DirectComposition::CApplicationChannel::GetBatchFragment+3ba )

Followup: MachineOwner
---------

nt!KeBugCheckEx:
fffff801`027bfca0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffffe87`4bad7750=000000000000003b
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: ffffede0be9a824a, Address of the instruction which caused the bugcheck
Arg3: fffffe874bad8020, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1


STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 17134.1.amd64fre.rs4_release.180410-1804

SYSTEM_PRODUCT_NAME: To Be Filled By O.E.M.

SYSTEM_SKU: To Be Filled By O.E.M.

SYSTEM_VERSION: To Be Filled By O.E.M.

BIOS_VENDOR: American Megatrends Inc.

BIOS_VERSION: P1.60

BIOS_DATE: 06/17/2016

BASEBOARD_MANUFACTURER: ASRock

BASEBOARD_PRODUCT: 970M Pro3

BASEBOARD_VERSION:

DUMP_TYPE: 2

BUGCHECK_P1: c0000005

BUGCHECK_P2: ffffede0be9a824a

BUGCHECK_P3: fffffe874bad8020

BUGCHECK_P4: 0

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.

FAULTING_IP:
win32kbase!DirectComposition::CApplicationChannel::GetBatchFragment+3ba
ffffede0`be9a824a 488b3b mov rdi,qword ptr [rbx]

CONTEXT: fffffe874bad8020 -- (.cxr 0xfffffe874bad8020)
rax=ffffed8ec35134b0 rbx=0000000100000000 rcx=ffffed8ec00dee00
rdx=ffffed8ec2a5f6b0 rsi=ffffed8ec35134b0 rdi=0000000000000000
rip=ffffede0be9a824a rsp=fffffe874bad8a10 rbp=fffffe874bad8a58
r8=0000000000000ed0 r9=ffff9d8a24544520 r10=ffffed8ec3513570
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=ffffed8ec2a5f6b0 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010206
win32kbase!DirectComposition::CApplicationChannel::GetBatchFragment+0x3ba:
ffffede0`be9a824a 488b3b mov rdi,qword ptr [rbx] ds:002b:00000001`00000000=????????????????
Resetting default scope

CPU_COUNT: 8

CPU_MHZ: c79

CPU_VENDOR: AuthenticAMD

CPU_FAMILY: 15

CPU_MODEL: 2

CPU_STEPPING: 0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXPNP: 1 (!blackboxpnp)


CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT

BUGCHECK_STR: 0x3B

PROCESS_NAME: dwm.exe

CURRENT_IRQL: 0

ANALYSIS_SESSION_HOST: LEGENDAIRY

ANALYSIS_SESSION_TIME: 08-20-2018 16:54:25.0298

ANALYSIS_VERSION: 10.0.18206.1001 amd64fre

LAST_CONTROL_TRANSFER: from ffffede0be9a5553 to ffffede0be9a824a

STACK_TEXT:
fffffe87`4bad8a10 ffffede0`be9a5553 : 00000000`00000000 00000000`00000001 00000000`00000001 fffff801`02ab4203 : win32kbase!DirectComposition::CApplicationChannel::GetBatchFragment+0x3ba
fffffe87`4bad8aa0 fffff801`027d0343 : ffff9d8a`24669080 fffffe87`4bad8b80 000001d4`c12e74e0 00000000`00000000 : win32kbase!NtDCompositionSubmitDWMBatch+0x123
fffffe87`4bad8b00 00007ffe`c7c03844 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000029`847ffbe8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`c7c03844


THREAD_SHA1_HASH_MOD_FUNC: f714e47f133ceaa0a6909e319fb05ae98d76a4ac

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 85e9d1ec05d110e1b6c7083c1d9537408fa7eac8

THREAD_SHA1_HASH_MOD: cbee550e13fe5059646a547b99c5144e886c6dbb

FOLLOWUP_IP:
win32kbase!DirectComposition::CApplicationChannel::GetBatchFragment+3ba
ffffede0`be9a824a 488b3b mov rdi,qword ptr [rbx]

FAULT_INSTR_CODE: 443b8b48

SYMBOL_STACK_INDEX: 0

SYMBOL_NAME: win32kbase!DirectComposition::CApplicationChannel::GetBatchFragment+3ba

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: win32kbase

IMAGE_NAME: win32kbase.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 0

IMAGE_VERSION: 10.0.17134.228

STACK_COMMAND: .cxr 0xfffffe874bad8020 ; kb

BUCKET_ID_FUNC_OFFSET: 3ba

FAILURE_BUCKET_ID: 0x3B_win32kbase!DirectComposition::CApplicationChannel::GetBatchFragment

BUCKET_ID: 0x3B_win32kbase!DirectComposition::CApplicationChannel::GetBatchFragment

PRIMARY_PROBLEM_CLASS: 0x3B_win32kbase!DirectComposition::CApplicationChannel::GetBatchFragment

TARGET_TIME: 2018-08-20T14:43:55.000Z

OSBUILD: 17134

OSSERVICEPACK: 228

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2018-08-02 20:10:45

BUILDDATESTAMP_STR: 180410-1804

BUILDLAB_STR: rs4_release

BUILDOSVER_STR: 10.0.17134.1.amd64fre.rs4_release.180410-1804

ANALYSIS_SESSION_ELAPSED_TIME: 199d

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:0x3b_win32kbase!directcomposition::capplicationchannel::getbatchfragment

FAILURE_ID_HASH: {9d85e48d-7150-e0fa-2e2f-1945b1b93423}

Followup: MachineOwner
---------


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Second BSOD - Watching Youtube (Nothing else running besides discord and steam)

Microsoft (R) Windows Debugger Version 10.0.18206.1001 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Windows\Minidump\082018-27734-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 17134 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 17134.1.amd64fre.rs4_release.180410-1804
Machine Name:
Kernel base = 0xfffff801`aba1d000 PsLoadedModuleList = 0xfffff801`abdcb170
Debug session time: Mon Aug 20 16:00:59.508 2018 (UTC - 7:00)
System Uptime: 0 days 1:23:27.320
Loading Kernel Symbols
...............................................................
................................................................
.....................................................
Loading User Symbols
Loading unloaded module list
.........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c0000005, ffffff63377ef59b, fffff585496de240, 0}

Probably caused by : win32kbase.sys ( win32kbase!HmgInsertObjectHelper::Insert+3b )

Followup: MachineOwner
---------

nt!KeBugCheckEx:
fffff801`abbc5ca0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffff585`496dd970=000000000000003b
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: ffffff63377ef59b, Address of the instruction which caused the bugcheck
Arg3: fffff585496de240, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1


STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 17134.1.amd64fre.rs4_release.180410-1804

SYSTEM_PRODUCT_NAME: To Be Filled By O.E.M.

SYSTEM_SKU: To Be Filled By O.E.M.

SYSTEM_VERSION: To Be Filled By O.E.M.

BIOS_VENDOR: American Megatrends Inc.

BIOS_VERSION: P1.60

BIOS_DATE: 06/17/2016

BASEBOARD_MANUFACTURER: ASRock

BASEBOARD_PRODUCT: 970M Pro3

BASEBOARD_VERSION:

DUMP_TYPE: 2

BUGCHECK_P1: c0000005

BUGCHECK_P2: ffffff63377ef59b

BUGCHECK_P3: fffff585496de240

BUGCHECK_P4: 0

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.

FAULTING_IP:
win32kbase!HmgInsertObjectHelper::Insert+3b
ffffff63`377ef59b 4885c0 test rax,rax

CONTEXT: fffff585496de240 -- (.cxr 0xfffff585496de240)
rax=ffffffffbc040ca6 rbx=fffff585496dec90 rcx=ffffcb83aaf4a440
rdx=0000000000000001 rsi=0000000000000000 rdi=ffffff2b82d93540
rip=ffffff63377ef59b rsp=fffff585496dec30 rbp=fffff585496decc0
r8=0000000000000000 r9=0000000000000000 r10=ffffcb83ab31eff0
r11=ffffff2b800000a0 r12=ffffde05950d0920 r13=ffffcb83aa9be000
r14=ffffff633793e000 r15=0000000005010ad9
iopl=0 nv up ei ng nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010282
win32kbase!HmgInsertObjectHelper::Insert+0x3b:
ffffff63`377ef59b 4885c0 test rax,rax
Resetting default scope

CPU_COUNT: 8

CPU_MHZ: c79

CPU_VENDOR: AuthenticAMD

CPU_FAMILY: 15

CPU_MODEL: 2

CPU_STEPPING: 0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXPNP: 1 (!blackboxpnp)


CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT

BUGCHECK_STR: 0x3B

PROCESS_NAME: wallpaper32.exe

CURRENT_IRQL: 0

ANALYSIS_SESSION_HOST: LEGENDAIRY

ANALYSIS_SESSION_TIME: 08-20-2018 16:51:28.0830

ANALYSIS_VERSION: 10.0.18206.1001 amd64fre

LAST_CONTROL_TRANSFER: from ffffff6337807e29 to ffffff63377ef59b

STACK_TEXT:
fffff585`496dec30 ffffff63`37807e29 : ffffff2b`82d93540 ffffff63`3748ece0 00000000`00000000 ffffcb83`aa9de550 : win32kbase!HmgInsertObjectHelper::Insert+0x3b
fffff585`496dec60 fffff806`be654c91 : 00000000`00000000 ffffde05`95363780 ffffde05`90e70010 ffffcb83`aa9be000 : win32kbase!GreCreateRectRgn+0xb9
fffff585`496decd0 fffff806`be618512 : ffffffff`c01e0006 fffff585`00000000 00000000`05010ad9 ffffff2b`80196010 : dxgkrnl!DXGPRESENT::CheckVisRgn+0x331
fffff585`496ded60 fffff806`be619885 : ffffcb83`aa9be000 00000000`00000000 00000000`00000000 00000000`00000000 : dxgkrnl!DXGCONTEXT::present+0x1ac2
fffff585`496df860 ffffff63`37803727 : 00000000`0991e140 ffffcb83`aaf4a440 00000000`00000000 00000000`00000000 : dxgkrnl!DxgkPresent+0x8a5
fffff585`496dfad0 fffff801`abbd6343 : 00000000`00000000 ffffcb83`a50e2b00 00000000`00000000 ffffcb83`a5ee4460 : win32kbase!NtGdiDdDDIPresent+0x17
fffff585`496dfb00 00000000`77053484 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0991e0e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77053484


THREAD_SHA1_HASH_MOD_FUNC: 158e110338dd2ec42d18c76cef418faebb68bcca

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 1c3620e016af596a1864138c3d48d9b26f90f29b

THREAD_SHA1_HASH_MOD: 82fd36d942e0cda9ade66e0bbd507d02eeb6c078

FOLLOWUP_IP:
win32kbase!HmgInsertObjectHelper::Insert+3b
ffffff63`377ef59b 4885c0 test rax,rax

FAULT_INSTR_CODE: 74c08548

SYMBOL_STACK_INDEX: 0

SYMBOL_NAME: win32kbase!HmgInsertObjectHelper::Insert+3b

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: win32kbase

IMAGE_NAME: win32kbase.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 0

IMAGE_VERSION: 10.0.17134.228

STACK_COMMAND: .cxr 0xfffff585496de240 ; kb

BUCKET_ID_FUNC_OFFSET: 3b

FAILURE_BUCKET_ID: 0x3B_win32kbase!HmgInsertObjectHelper::Insert

BUCKET_ID: 0x3B_win32kbase!HmgInsertObjectHelper::Insert

PRIMARY_PROBLEM_CLASS: 0x3B_win32kbase!HmgInsertObjectHelper::Insert

TARGET_TIME: 2018-08-20T23:00:59.000Z

OSBUILD: 17134

OSSERVICEPACK: 228

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2018-08-02 20:10:45

BUILDDATESTAMP_STR: 180410-1804

BUILDLAB_STR: rs4_release

BUILDOSVER_STR: 10.0.17134.1.amd64fre.rs4_release.180410-1804

ANALYSIS_SESSION_ELAPSED_TIME: 8283

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:0x3b_win32kbase!hmginsertobjecthelper::insert

FAILURE_ID_HASH: {b2d2907e-845b-dc0e-1362-98e0f5a5d7be}

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: ffffff63377ef59b, Address of the instruction which caused the bugcheck
Arg3: fffff585496de240, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1


STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 17134.1.amd64fre.rs4_release.180410-1804

SYSTEM_PRODUCT_NAME: To Be Filled By O.E.M.

SYSTEM_SKU: To Be Filled By O.E.M.

SYSTEM_VERSION: To Be Filled By O.E.M.

BIOS_VENDOR: American Megatrends Inc.

BIOS_VERSION: P1.60

BIOS_DATE: 06/17/2016

BASEBOARD_MANUFACTURER: ASRock

BASEBOARD_PRODUCT: 970M Pro3

BASEBOARD_VERSION:

DUMP_TYPE: 2

BUGCHECK_P1: c0000005

BUGCHECK_P2: ffffff63377ef59b

BUGCHECK_P3: fffff585496de240

BUGCHECK_P4: 0

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.

FAULTING_IP:
win32kbase!HmgInsertObjectHelper::Insert+3b
ffffff63`377ef59b 4885c0 test rax,rax

CONTEXT: fffff585496de240 -- (.cxr 0xfffff585496de240)
rax=ffffffffbc040ca6 rbx=fffff585496dec90 rcx=ffffcb83aaf4a440
rdx=0000000000000001 rsi=0000000000000000 rdi=ffffff2b82d93540
rip=ffffff63377ef59b rsp=fffff585496dec30 rbp=fffff585496decc0
r8=0000000000000000 r9=0000000000000000 r10=ffffcb83ab31eff0
r11=ffffff2b800000a0 r12=ffffde05950d0920 r13=ffffcb83aa9be000
r14=ffffff633793e000 r15=0000000005010ad9
iopl=0 nv up ei ng nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010282
win32kbase!HmgInsertObjectHelper::Insert+0x3b:
ffffff63`377ef59b 4885c0 test rax,rax
Resetting default scope

CPU_COUNT: 8

CPU_MHZ: c79

CPU_VENDOR: AuthenticAMD

CPU_FAMILY: 15

CPU_MODEL: 2

CPU_STEPPING: 0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXPNP: 1 (!blackboxpnp)


CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT

BUGCHECK_STR: 0x3B

PROCESS_NAME: wallpaper32.exe

CURRENT_IRQL: 0

ANALYSIS_SESSION_HOST: LEGENDAIRY

ANALYSIS_SESSION_TIME: 08-20-2018 16:52:02.0260

ANALYSIS_VERSION: 10.0.18206.1001 amd64fre

LAST_CONTROL_TRANSFER: from ffffff6337807e29 to ffffff63377ef59b

STACK_TEXT:
fffff585`496dec30 ffffff63`37807e29 : ffffff2b`82d93540 ffffff63`3748ece0 00000000`00000000 ffffcb83`aa9de550 : win32kbase!HmgInsertObjectHelper::Insert+0x3b
fffff585`496dec60 fffff806`be654c91 : 00000000`00000000 ffffde05`95363780 ffffde05`90e70010 ffffcb83`aa9be000 : win32kbase!GreCreateRectRgn+0xb9
fffff585`496decd0 fffff806`be618512 : ffffffff`c01e0006 fffff585`00000000 00000000`05010ad9 ffffff2b`80196010 : dxgkrnl!DXGPRESENT::CheckVisRgn+0x331
fffff585`496ded60 fffff806`be619885 : ffffcb83`aa9be000 00000000`00000000 00000000`00000000 00000000`00000000 : dxgkrnl!DXGCONTEXT::present+0x1ac2
fffff585`496df860 ffffff63`37803727 : 00000000`0991e140 ffffcb83`aaf4a440 00000000`00000000 00000000`00000000 : dxgkrnl!DxgkPresent+0x8a5
fffff585`496dfad0 fffff801`abbd6343 : 00000000`00000000 ffffcb83`a50e2b00 00000000`00000000 ffffcb83`a5ee4460 : win32kbase!NtGdiDdDDIPresent+0x17
fffff585`496dfb00 00000000`77053484 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0991e0e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77053484


THREAD_SHA1_HASH_MOD_FUNC: 158e110338dd2ec42d18c76cef418faebb68bcca

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 1c3620e016af596a1864138c3d48d9b26f90f29b

THREAD_SHA1_HASH_MOD: 82fd36d942e0cda9ade66e0bbd507d02eeb6c078

FOLLOWUP_IP:
win32kbase!HmgInsertObjectHelper::Insert+3b
ffffff63`377ef59b 4885c0 test rax,rax

FAULT_INSTR_CODE: 74c08548

SYMBOL_STACK_INDEX: 0

SYMBOL_NAME: win32kbase!HmgInsertObjectHelper::Insert+3b

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: win32kbase

IMAGE_NAME: win32kbase.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 0

IMAGE_VERSION: 10.0.17134.228

STACK_COMMAND: .cxr 0xfffff585496de240 ; kb

BUCKET_ID_FUNC_OFFSET: 3b

FAILURE_BUCKET_ID: 0x3B_win32kbase!HmgInsertObjectHelper::Insert

BUCKET_ID: 0x3B_win32kbase!HmgInsertObjectHelper::Insert

PRIMARY_PROBLEM_CLASS: 0x3B_win32kbase!HmgInsertObjectHelper::Insert

TARGET_TIME: 2018-08-20T23:00:59.000Z

OSBUILD: 17134

OSSERVICEPACK: 228

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2018-08-02 20:10:45

BUILDDATESTAMP_STR: 180410-1804

BUILDLAB_STR: rs4_release

BUILDOSVER_STR: 10.0.17134.1.amd64fre.rs4_release.180410-1804

ANALYSIS_SESSION_ELAPSED_TIME: 7d7d

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:0x3b_win32kbase!hmginsertobjecthelper::insert

FAILURE_ID_HASH: {b2d2907e-845b-dc0e-1362-98e0f5a5d7be}

Followup: MachineOwner
---------


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

3rd Bsod of the day - Chrome open trying to make this thread, discord and steam also open

Microsoft (R) Windows Debugger Version 10.0.18206.1001 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Windows\Minidump\082018-32734-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 17134 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 17134.1.amd64fre.rs4_release.180410-1804
Machine Name:
Kernel base = 0xfffff801`212a7000 PsLoadedModuleList = 0xfffff801`21655170
Debug session time: Mon Aug 20 16:25:26.451 2018 (UTC - 7:00)
System Uptime: 0 days 0:23:31.262
Loading Kernel Symbols
...............................................................
................................................................
....................................................
Loading User Symbols
Loading unloaded module list
...........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck A, {100005910, 2, 1, fffff801212c50b9}

Probably caused by : dxgkrnl.sys ( dxgkrnl!BLTQUEUE::EnableVSyncEventSignaling+31 )

Followup: MachineOwner
---------

nt!KeBugCheckEx:
fffff801`2144fca0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffe28c`2cfcd510=000000000000000a
5: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000100005910, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff801212c50b9, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1


STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 17134.1.amd64fre.rs4_release.180410-1804

SYSTEM_PRODUCT_NAME: To Be Filled By O.E.M.

SYSTEM_SKU: To Be Filled By O.E.M.

SYSTEM_VERSION: To Be Filled By O.E.M.

BIOS_VENDOR: American Megatrends Inc.

BIOS_VERSION: P1.60

BIOS_DATE: 06/17/2016

BASEBOARD_MANUFACTURER: ASRock

BASEBOARD_PRODUCT: 970M Pro3

BASEBOARD_VERSION:

DUMP_TYPE: 2

BUGCHECK_P1: 100005910

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff801212c50b9

WRITE_ADDRESS: fffff801216f4388: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
0000000100005910

CURRENT_IRQL: 2

FAULTING_IP:
nt!KiTryUnwaitThread+179
fffff801`212c50b9 f0480fbaaf1059000000 lock bts qword ptr [rdi+5910h],0

CPU_COUNT: 8

CPU_MHZ: c79

CPU_VENDOR: AuthenticAMD

CPU_FAMILY: 15

CPU_MODEL: 2

CPU_STEPPING: 0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXPNP: 1 (!blackboxpnp)


CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT

BUGCHECK_STR: AV

PROCESS_NAME: WinStore.App.exe

ANALYSIS_SESSION_HOST: LEGENDAIRY

ANALYSIS_SESSION_TIME: 08-20-2018 16:49:26.0456

ANALYSIS_VERSION: 10.0.18206.1001 amd64fre

TRAP_FRAME: ffffe28c2cfcd650 -- (.trap 0xffffe28c2cfcd650)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000001 rbx=0000000000000000 rcx=0000000000000000
rdx=ffffe28c2b1e9af0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff801212c50b9 rsp=ffffe28c2cfcd7e0 rbp=ffffe28c2b1e9af0
r8=0000000000000000 r9=0000000000000000 r10=7ffffffffffffffc
r11=ffffe28c2cfcd840 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!KiTryUnwaitThread+0x179:
fffff801`212c50b9 f0480fbaaf1059000000 lock bts qword ptr [rdi+5910h],0 ds:00000000`00005910=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER: from fffff80121460869 to fffff8012144fca0

STACK_TEXT:
ffffe28c`2cfcd508 fffff801`21460869 : 00000000`0000000a 00000001`00005910 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffffe28c`2cfcd510 fffff801`2145d4e5 : 00000000`00000000 00000000`00000000 ffff8400`b0d60180 fffff801`212c46d4 : nt!KiBugCheckDispatch+0x69
ffffe28c`2cfcd650 fffff801`212c50b9 : 00000000`000000ff ffffae0b`d2b30000 ffffae0b`00000000 fffff801`212aa718 : nt!KiPageFault+0x425
ffffe28c`2cfcd7e0 fffff801`212c2f9b : ffffae0b`d6cc41f8 00000000`00000000 ffff8400`b10c3180 00000000`00000000 : nt!KiTryUnwaitThread+0x179
ffffe28c`2cfcd840 fffff801`0f8b8e39 : ffffae0b`00000000 ffffe28c`2cfcda11 00000000`002f94a5 fffff801`0f6e44a0 : nt!KeSetEvent+0x13b
ffffe28c`2cfcd8d0 fffff801`0f836161 : ffffffff`00000000 ffffae0b`d63e2000 ffff8400`00000000 ffffbe8a`44a827a0 : dxgkrnl!BLTQUEUE::EnableVSyncEventSignaling+0x31
ffffe28c`2cfcd900 fffff801`0f81beda : ffffae0b`d63e4000 ffffae0b`d63e2000 00000000`00000000 ffffbe8a`44a827a0 : dxgkrnl!ADAPTER_DISPLAY::ControlVSyncAdapter+0x29
ffffe28c`2cfcd930 fffff801`0f7c76dd : 00000000`00000020 00000000`00000020 00000003`00000000 fffff89e`00000000 : dxgkrnl!DxgkWaitForVerticalBlankEventInternal+0x547ca
ffffe28c`2cfcda70 fffff89e`620052b1 : 00000001`0653dca5 00000000`002f94a5 00000001`06551a74 00000003`ae9ffa50 : dxgkrnl!DxgkWaitForVerticalBlankEvent+0xbd
ffffe28c`2cfcdad0 fffff801`21460343 : ffffae0b`dc658080 00000122`e74eb530 00000000`00000020 00000122`e74b35e0 : win32kbase!NtGdiDdDDIWaitForVerticalBlankEvent+0x11
ffffe28c`2cfcdb00 00007ffc`95db5b24 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000003`ae9ffb98 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`95db5b24


THREAD_SHA1_HASH_MOD_FUNC: 6512b7b7dbfe418b5cb87deaf44c5d487a5f7c3f

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 0e35ed13bba6241db776272b8108e8ee1652cb08

THREAD_SHA1_HASH_MOD: 9f02cff26eb3c22d1b0581203cf93f645b704beb

FOLLOWUP_IP:
dxgkrnl!BLTQUEUE::EnableVSyncEventSignaling+31
fffff801`0f8b8e39 4883c420 add rsp,20h

FAULT_INSTR_CODE: 20c48348

SYMBOL_STACK_INDEX: 5

SYMBOL_NAME: dxgkrnl!BLTQUEUE::EnableVSyncEventSignaling+31

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: dxgkrnl

IMAGE_NAME: dxgkrnl.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 3d1404a7

IMAGE_VERSION: 10.0.17134.228

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 31

FAILURE_BUCKET_ID: AV_dxgkrnl!BLTQUEUE::EnableVSyncEventSignaling

BUCKET_ID: AV_dxgkrnl!BLTQUEUE::EnableVSyncEventSignaling

PRIMARY_PROBLEM_CLASS: AV_dxgkrnl!BLTQUEUE::EnableVSyncEventSignaling

TARGET_TIME: 2018-08-20T23:25:26.000Z

OSBUILD: 17134

OSSERVICEPACK: 228

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2018-08-02 20:10:45

BUILDDATESTAMP_STR: 180410-1804

BUILDLAB_STR: rs4_release

BUILDOSVER_STR: 10.0.17134.1.amd64fre.rs4_release.180410-1804

ANALYSIS_SESSION_ELAPSED_TIME: 221b

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:av_dxgkrnl!bltqueue::enablevsynceventsignaling

FAILURE_ID_HASH: {6108c073-c784-2de1-bf99-14f0dfbb4143}

Followup: MachineOwner
---------

 
Aug 20, 2018
3
0
10
After running malware bytes it only came up with one thing, a suspicious registry value under the name of
PUP.Optional.Conduit, HKU\S-1-5-21-1056357216-95587974-754644923-1000\SOFTWARE\MICROSOFT\INTERNET EXPLORER\MAIN|START PAGE
Don't know if this helps, but I've quarantined it till further notice.