Page 2 of 3 FirstFirst 123 LastLast
  1.    11 Jul 2016 #11
    Join Date : Nov 2015
    Posts : 2,808
    64bit Win 10 Pro ver 1709 Build 16299.19

    As you have been getting so many crashes today it would be worth running the System File Checker to check and repair in case any system files have got corrupted.
      My ComputersSystem Spec
  2.    11 Jul 2016 #12
    Join Date : Jul 2016
    Cleveland
    Posts : 12
    Windows 10 x64 Professional
    Thread Starter

    Running that now. Just uninstalled and reinstalled the drivers for all my Razer devices - both the keyboard and mouse. I'll update this post with what is found or if I crash again.

    EDIT:

    Windows Resource Protection found corrupt files but was unable to fix some
    of them. Details are included in the CBS.Log windir\Logs\CBS\CBS.log. For
    example C:\Windows\Logs\CBS\CBS.log. Note that logging is currently not
    supported in offline servicing scenarios.

    Uploading the CBS log. This definitely looks more than a little sketchy...
      My ComputerSystem Spec
  3.    11 Jul 2016 #13
    Join Date : Nov 2015
    Posts : 2,808
    64bit Win 10 Pro ver 1709 Build 16299.19

    Windows Resource Protection found corrupt files but was unable to fix some
    of them. Details are included in the CBS.Log windir\Logs\CBS\CBS.log. For
    example C:\Windows\Logs\CBS\CBS.log. Note that logging is currently not
    supported in offline servicing scenarios.
    Actually it is not all that bad, the CBS.log refers to the opencl.dll file which is a known issue that will be repaired in a future release of W10. So I think you are OK for system files

    For more information see the note in the SFC Tutorial.
      My ComputersSystem Spec
  4.    11 Jul 2016 #14
    Join Date : Jul 2016
    Cleveland
    Posts : 12
    Windows 10 x64 Professional
    Thread Starter

    Alright. That's not too bad, then. Nothing seems to have blown up since I uninstalled the Razer devices (though I'm having trouble reinstalling their drivers and getting them recognised, but that's something I can work out later). I'll update this post if I get hit by another BSOD. Hoping I don't, though. This got old yesterday. x_x

    EDIT: I'm wondering if maybe I should just reinstall Windows at this point. I started to get a new BSOD, but before I could collect information on it, I got another UNEXPECTED_KERNEL_MODE_TRAP, and they've been getting so frequent, I can't keep things stable enough to collect and report the data. As soon as I'm able, I'll post what I have (posting now from my laptop)...

    EDIT EDIT: New memory dump and the last two diagnostic logs while I can get them here:

    Code:
    Microsoft (R) Windows Debugger Version 10.0.10586.567 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [C:\Windows\CrashDump\MEMORY.DMP]
    Kernel Bitmap Dump File: Full address space is available
    
    
    ************* Symbol Path validation summary **************
    Response                         Time (ms)     Location
    Deferred                                       SRV*C:\symbols*http://msdl.microsoft.com/download/symbols
    Symbol search path is: SRV*C:\symbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 10 Kernel Version 10586 MP (8 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 10586.420.amd64fre.th2_release_sec.160527-1834
    Machine Name:
    Kernel base = 0xfffff803`fd479000 PsLoadedModuleList = 0xfffff803`fd757cf0
    Debug session time: Mon Jul 11 13:05:51.059 2016 (UTC - 4:00)
    System Uptime: 0 days 0:02:16.738
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ....................................
    Loading User Symbols
    .....
    Loading unloaded module list
    ......
    Loading Wow64 Symbols
    ................................................................
    ....................
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 7F, {8, ffffd0009b6c8b30, 4a3f160, 771dec2f}
    
    
    "KERNELBASE.dll" was not found in the image list.
    Debugger will attempt to load "KERNELBASE.dll" at given base 00000000`00000000.
    
    Please provide the full image name, including the extension (i.e. kernel32.dll)
    for more reliable results.Base address and size overrides can be given as
    .reload <image.ext>=<base>,<size>.
    Unable to add module at 00000000`00000000
    Probably caused by : ntkrnlmp.exe ( nt!KiDoubleFaultAbort+b3 )
    
    Followup:     MachineOwner
    ---------
    
    3: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    UNEXPECTED_KERNEL_MODE_TRAP (7f)
    This means a trap occurred in kernel mode, and it's a trap of a kind
    that the kernel isn't allowed to have/catch (bound trap) or that
    is always instant death (double fault).  The first number in the
    bugcheck params is the number of the trap (8 = double fault, etc)
    Consult an Intel x86 family manual to learn more about what these
    traps are. Here is a *portion* of those codes:
    If kv shows a taskGate
            use .tss on the part before the colon, then kv.
    Else if kv shows a trapframe
            use .trap on that value
    Else
            .trap on the appropriate frame will show where the trap was taken
            (on x86, this will be the ebp that goes with the procedure KiTrap)
    Endif
    kb will then show the corrected stack.
    Arguments:
    Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
    Arg2: ffffd0009b6c8b30
    Arg3: 0000000004a3f160
    Arg4: 00000000771dec2f
    
    Debugging Details:
    ------------------
    
    
    "KERNELBASE.dll" was not found in the image list.
    Debugger will attempt to load "KERNELBASE.dll" at given base 00000000`00000000.
    
    Please provide the full image name, including the extension (i.e. kernel32.dll)
    for more reliable results.Base address and size overrides can be given as
    .reload <image.ext>=<base>,<size>.
    Unable to add module at 00000000`00000000
    
    DUMP_CLASS: 1
    
    DUMP_QUALIFIER: 402
    
    BUILD_VERSION_STRING:  10586.420.amd64fre.th2_release_sec.160527-1834
    
    SYSTEM_MANUFACTURER:  System manufacturer
    
    SYSTEM_PRODUCT_NAME:  System Product Name
    
    SYSTEM_SKU:  SKU
    
    SYSTEM_VERSION:  System Version
    
    BIOS_VENDOR:  American Megatrends Inc.
    
    BIOS_VERSION:  1701
    
    BIOS_DATE:  03/25/2016
    
    BASEBOARD_MANUFACTURER:  ASUSTeK COMPUTER INC.
    
    BASEBOARD_PRODUCT:  MAXIMUS VIII HERO
    
    BASEBOARD_VERSION:  Rev 1.xx
    
    DUMP_TYPE:  0
    
    BUGCHECK_P1: 8
    
    BUGCHECK_P2: ffffd0009b6c8b30
    
    BUGCHECK_P3: 4a3f160
    
    BUGCHECK_P4: 771dec2f
    
    BUGCHECK_STR:  0x7f_8
    
    TRAP_FRAME:  ffffd0009b6c8b30 -- (.trap 0xffffd0009b6c8b30)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000000082a518ce rbx=0000000000000000 rcx=0000000007a4cb1f
    rdx=0000000082a518c1 rsi=0000000000000000 rdi=0000000000000000
    rip=00000000771dec2f rsp=0000000004a3f160 rbp=0000000004a3f194
     r8=000000000000002b  r9=0000000077226d3c r10=0000000000000000
    r11=000000000493e720 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei ng nz na pe nc
    ntdll_771b0000!RtlpHpVsChunkSplit+0x1df:
    0023:771dec2f 890f            mov     dword ptr [edi],ecx ds:00000000`00000000=????????
    Resetting default scope
    
    CPU_COUNT: 8
    
    CPU_MHZ: fa8
    
    CPU_VENDOR:  GenuineIntel
    
    CPU_FAMILY: 6
    
    CPU_MODEL: 5e
    
    CPU_STEPPING: 3
    
    CPU_MICROCODE: 6,5e,3,0 (F,M,S,R)  SIG: 74'00000000 (cache) 74'00000000 (init)
    
    DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT
    
    PROCESS_NAME:  SkypeHost.exe
    
    CURRENT_IRQL:  0
    
    ANALYSIS_SESSION_HOST:  SYLVANDELL
    
    ANALYSIS_SESSION_TIME:  07-11-2016 13:09:34.0951
    
    ANALYSIS_VERSION: 10.0.10586.567 amd64fre
    
    LAST_CONTROL_TRANSFER:  from fffff803fd5c63e9 to fffff803fd5bb7a0
    
    STACK_TEXT:  
    ffffd000`9b6c89e8 fffff803`fd5c63e9 : 00000000`0000007f 00000000`00000008 ffffd000`9b6c8b30 00000000`04a3f160 : nt!KeBugCheckEx
    ffffd000`9b6c89f0 fffff803`fd5c4473 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
    ffffd000`9b6c8b30 00000000`771dec2f : 00000604`05c3ca18 01460060`0146005c 00000000`00000000 03cfe000`05c2e000 : nt!KiDoubleFaultAbort+0xb3
    00000000`04a3f160 00000604`05c3ca18 : 01460060`0146005c 00000000`00000000 03cfe000`05c2e000 00000000`00008000 : ntdll_771b0000!RtlpHpVsChunkSplit+0x1df
    00000000`04a3f168 01460060`0146005c : 00000000`00000000 03cfe000`05c2e000 00000000`00008000 0146005c`00000000 : 0x00000604`05c3ca18
    00000000`04a3f170 00000000`00000000 : 03cfe000`05c2e000 00000000`00008000 0146005c`00000000 04a3f1d0`00460464 : 0x01460060`0146005c
    
    
    STACK_COMMAND:  kb
    
    THREAD_SHA1_HASH_MOD_FUNC:  4142b595a17613defb9bb0e1fb6341c4837ceb8c
    
    THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  c3847806ef28d0cfd62700c8a72052288e28568c
    
    THREAD_SHA1_HASH_MOD:  196a48285591bdf86f42ad5ce6995c0486094f64
    
    FOLLOWUP_IP: 
    nt!KiDoubleFaultAbort+b3
    fffff803`fd5c4473 90              nop
    
    FAULT_INSTR_CODE:  6666c390
    
    SYMBOL_STACK_INDEX:  2
    
    SYMBOL_NAME:  nt!KiDoubleFaultAbort+b3
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrnlmp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  5749178b
    
    BUCKET_ID_FUNC_OFFSET:  b3
    
    FAILURE_BUCKET_ID:  0x7f_8_nt!KiDoubleFaultAbort
    
    BUCKET_ID:  0x7f_8_nt!KiDoubleFaultAbort
    
    PRIMARY_PROBLEM_CLASS:  0x7f_8_nt!KiDoubleFaultAbort
    
    TARGET_TIME:  2016-07-11T17:05:51.000Z
    
    OSBUILD:  10586
    
    OSSERVICEPACK:  0
    
    SERVICEPACK_NUMBER: 0
    
    OS_REVISION: 0
    
    SUITE_MASK:  272
    
    PRODUCT_TYPE:  1
    
    OSPLATFORM_TYPE:  x64
    
    OSNAME:  Windows 10
    
    OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS
    
    OS_LOCALE:  
    
    USER_LCID:  0
    
    OSBUILD_TIMESTAMP:  2016-05-27 23:59:07
    
    BUILDDATESTAMP_STR:  160527-1834
    
    BUILDLAB_STR:  th2_release_sec
    
    BUILDOSVER_STR:  10.0.10586.420.amd64fre.th2_release_sec.160527-1834
    
    ANALYSIS_SESSION_ELAPSED_TIME: 2cf
    
    ANALYSIS_SOURCE:  KM
    
    FAILURE_ID_HASH_STRING:  km:0x7f_8_nt!kidoublefaultabort
    
    FAILURE_ID_HASH:  {d1f8395a-8c58-45da-6ebf-e8bb4aad2fc5}
    
    Followup:     MachineOwner
    ---------



    EDIT: Another - PAGE_FAULT_IN_NONPAGED_AREA (win32kbase.sys). Posted from laptop. Will add more data as I'm able...

    Adding memory dump:

    Code:
    Microsoft (R) Windows Debugger Version 10.0.10586.567 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [C:\Windows\CrashDump\MEMORY.DMP]
    Kernel Bitmap Dump File: Full address space is available
    
    
    ************* Symbol Path validation summary **************
    Response                         Time (ms)     Location
    Deferred                                       SRV*C:\symbols*http://msdl.microsoft.com/download/symbols
    Symbol search path is: SRV*C:\symbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 10 Kernel Version 10586 MP (8 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 10586.420.amd64fre.th2_release_sec.160527-1834
    Machine Name:
    Kernel base = 0xfffff800`77e1a000 PsLoadedModuleList = 0xfffff800`780f8cf0
    Debug session time: Mon Jul 11 13:18:51.348 2016 (UTC - 4:00)
    System Uptime: 0 days 0:10:36.028
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ....................................
    Loading User Symbols
    ................................................................
    ................................................................
    ................................................................
    ...............................................................
    Loading unloaded module list
    .............................
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 50, {fffff90142370010, 2, fffff9610e3fbfbc, 0}
    
    Probably caused by : win32kbase.sys ( win32kbase!AllocThreadBufferWithTag+9c )
    
    Followup:     MachineOwner
    ---------
    
    2: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    PAGE_FAULT_IN_NONPAGED_AREA (50)
    Invalid system memory was referenced.  This cannot be protected by try-except.
    Typically the address is just plain bad or it is pointing at freed memory.
    Arguments:
    Arg1: fffff90142370010, memory referenced.
    Arg2: 0000000000000002, value 0 = read operation, 1 = write operation.
    Arg3: fffff9610e3fbfbc, If non-zero, the instruction address which referenced the bad memory
        address.
    Arg4: 0000000000000000, (reserved)
    
    Debugging Details:
    ------------------
    
    
    DUMP_CLASS: 1
    
    DUMP_QUALIFIER: 402
    
    BUILD_VERSION_STRING:  10586.420.amd64fre.th2_release_sec.160527-1834
    
    SYSTEM_MANUFACTURER:  System manufacturer
    
    SYSTEM_PRODUCT_NAME:  System Product Name
    
    SYSTEM_SKU:  SKU
    
    SYSTEM_VERSION:  System Version
    
    BIOS_VENDOR:  American Megatrends Inc.
    
    BIOS_VERSION:  1701
    
    BIOS_DATE:  03/25/2016
    
    BASEBOARD_MANUFACTURER:  ASUSTeK COMPUTER INC.
    
    BASEBOARD_PRODUCT:  MAXIMUS VIII HERO
    
    BASEBOARD_VERSION:  Rev 1.xx
    
    DUMP_TYPE:  0
    
    BUGCHECK_P1: fffff90142370010
    
    BUGCHECK_P2: 2
    
    BUGCHECK_P3: fffff9610e3fbfbc
    
    BUGCHECK_P4: 0
    
    READ_ADDRESS:  fffff90142370010 Paged session pool
    
    FAULTING_IP: 
    win32kbase!AllocThreadBufferWithTag+9c
    fffff961`0e3fbfbc 48897310        mov     qword ptr [rbx+10h],rsi
    
    MM_INTERNAL_CODE:  0
    
    IMAGE_NAME:  win32kbase.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  57491aee
    
    MODULE_NAME: win32kbase
    
    FAULTING_MODULE: fffff9610e390000 win32kbase
    
    CPU_COUNT: 8
    
    CPU_MHZ: fa8
    
    CPU_VENDOR:  GenuineIntel
    
    CPU_FAMILY: 6
    
    CPU_MODEL: 5e
    
    CPU_STEPPING: 3
    
    CPU_MICROCODE: 6,5e,3,0 (F,M,S,R)  SIG: 74'00000000 (cache) 74'00000000 (init)
    
    DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT
    
    BUGCHECK_STR:  AV
    
    PROCESS_NAME:  explorer.exe
    
    CURRENT_IRQL:  2
    
    ANALYSIS_SESSION_HOST:  SYLVANDELL
    
    ANALYSIS_SESSION_TIME:  07-11-2016 13:22:22.0411
    
    ANALYSIS_VERSION: 10.0.10586.567 amd64fre
    
    TRAP_FRAME:  ffffd001dd92ecd0 -- (.trap 0xffffd001dd92ecd0)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=ffffe0014418ce40 rbx=0000000000000000 rcx=ffffe0013e4e6080
    rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff9610e3fbfbc rsp=ffffd001dd92ee60 rbp=000000006f746547
     r8=0000000000000080  r9=fffff90000001e80 r10=0000000000000800
    r11=ffffe0013e9b1000 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei ng nz na pe nc
    win32kbase!AllocThreadBufferWithTag+0x9c:
    fffff961`0e3fbfbc 48897310        mov     qword ptr [rbx+10h],rsi ds:00000000`00000010=????????????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80077f894be to fffff80077f5c7a0
    
    STACK_TEXT:  
    ffffd001`dd92ea78 fffff800`77f894be : 00000000`00000050 fffff901`42370010 00000000`00000002 ffffd001`dd92ecd0 : nt!KeBugCheckEx
    ffffd001`dd92ea80 fffff800`77e85621 : 00000000`00000002 fffff901`42de3000 ffffd001`dd92ecd0 00000000`00002000 : nt! ?? ::FNODOBFM::`string'+0x1e2be
    ffffd001`dd92eb70 fffff800`77f65abc : 00000000`00000000 fffff901`42370000 00000000`00001000 ffffd001`dd48ccc0 : nt!MmAccessFault+0x5f1
    ffffd001`dd92ecd0 fffff961`0e3fbfbc : 00000001`00010101 00000000`00000000 fffff901`422843c0 ffffd001`00000001 : nt!KiPageFault+0x13c
    ffffd001`dd92ee60 fffff961`0e062ba0 : 00000000`00000000 ffffd001`dd92efb0 00000000`00000001 ffffd001`dd92eed0 : win32kbase!AllocThreadBufferWithTag+0x9c
    ffffd001`dd92ee90 fffff961`0e0506cf : 00000000`00000000 fffff901`42762620 00000000`00ffffff fffff901`40000d60 : win32kfull!EngTextOut+0x430
    ffffd001`dd92f350 fffff961`0e061294 : ffffd001`dd92fb80 00000000`00000034 00000000`00000010 00000000`00000000 : win32kfull!GreExtTextOutWLocked+0x1b7f
    ffffd001`dd92fb20 fffff961`0e060ddf : 00000000`00000000 fffff901`400810d0 fffff901`400816e8 00000000`00000001 : win32kfull!GreExtTextOutWInternal+0xec
    ffffd001`dd92fbf0 fffff800`77f670a3 : 00000000`00000001 00000000`16ebcba8 00000000`00108825 ffffffff`f6011e79 : win32kfull!NtGdiExtTextOutW+0x2df
    ffffd001`dd92fdd0 00007fff`0ba31404 : 00007fff`0ba03741 00000000`00000010 00000000`00000002 00000000`0398fc28 : nt!KiSystemServiceCopyEnd+0x13
    00000000`16ebbdd8 00007fff`0ba03741 : 00000000`00000010 00000000`00000002 00000000`0398fc28 00000000`00000034 : GDI32!NtGdiExtTextOutW+0x14
    00000000`16ebbde0 00007fff`0ba02948 : 00000000`00000000 00000000`00000002 00000000`00000000 00000000`00000000 : GDI32!ExtTextOutW+0x691
    00000000`16ebbea0 00007fff`0ba0248a : 00000000`00010002 00000000`00000000 00000000`00cbc018 00000004`00040002 : GDI32!CUspShapingDrawingSurface::GenericGlyphOut+0x288
    00000000`16ebc0b0 00007fff`0ba02399 : 00000000`00cccc50 00000000`00000000 00000000`090404e0 00000000`00000000 : GDI32!CUspShapingDrawingSurface::DrawGlyphs+0xca
    00000000`16ebc180 00007fff`0ba051e3 : 00000000`00000000 00000000`16ebc2f9 00000000`16ebc3c8 00000000`00000000 : GDI32!GenericEngineDrawGlyphs+0xc9
    00000000`16ebc210 00007fff`0ba0540f : 00000000`00000002 00000000`00000000 00000000`00000000 00007fff`0ba022d0 : GDI32!ShapingDrawGlyphs+0x183
    00000000`16ebc330 00007fff`0ba16f5e : 00000000`00000034 00007fff`0ba05230 ffffffff`f6011e79 00000000`00000017 : GDI32!ShlTextOut+0x1df
    00000000`16ebc560 00007fff`0ba01010 : 00000000`00cb7fd0 00000000`00000000 00000000`0000000b 00000000`00000000 : GDI32!ScriptTextOut+0x93e
    00000000`16ebc870 00007fff`0ba00c28 : 00000000`0000012b 00000000`00000001 00000000`16ebca10 00000000`00000000 : GDI32!InternalStringOut+0x138
    00000000`16ebc910 00007fff`0ba00a32 : 00000000`00000000 00000000`00000000 00000000`00000002 00000000`00000000 : GDI32!ScriptStringOut+0xe8
    00000000`16ebcb00 00007fff`0ba0045e : 00000190`0000001d 00000060`00000000 00007fff`0ba00400 27000000`000d000c : GDI32!LpkCharsetDraw+0x5b2
    00000000`16ebcce0 00007fff`0bd0e65e : 00000000`00000034 00000000`16ebce50 00000000`16ebd200 ffffffff`f6011e79 : GDI32!LpkDrawTextEx+0x5e
    00000000`16ebcd50 00007fff`0bd0dd90 : 00000000`00000000 00007fff`08bdd17b 00000000`00000000 00000000`00000000 : USER32!DrawTextExWorker+0x8ae
    00000000`16ebcfe0 00007fff`08bde14b : 00000000`00000000 00007fff`0ba002ef 00000000`00000000 00000010`0000012f : USER32!DrawTextW+0x40
    00000000`16ebd050 00007fff`08bde098 : 00000000`16ebd190 00000000`16ebd3d0 ffffffff`c1011e04 00000000`16ebd3d0 : UxTheme!DrawTextCallback+0x37 [d:\th\shell\themes\uxtheme\imgeffect.cpp @ 30]
    00000000`16ebd090 00007fff`08be1801 : 00000000`00000000 ffffffff`c1011e04 00000000`16ebd370 ffffffff`c1011e04 : UxTheme!DrawTextWithGlow+0x378 [d:\th\shell\themes\uxtheme\imgeffect.cpp @ 788]
    00000000`16ebd270 00007fff`08bd43b0 : 00000000`00000000 00000000`16ebd628 ffffffff`ffffffff 00000000`1768fe80 : UxTheme!CTextDraw::DrawTextW+0x3a1 [d:\th\shell\themes\uxtheme\textdraw.cpp @ 391]
    00000000`16ebd510 00007fff`0689e8df : 00000000`1108d660 00000000`10328de0 00000000`00000000 ffffffff`c1011e04 : UxTheme!DrawThemeText+0xe0 [d:\th\shell\themes\uxtheme\wrapper.cpp @ 836]
    00000000`16ebd5b0 00007fff`0689e3d6 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : comctl32!CToolbar::DrawString+0x17b
    00000000`16ebd690 00007fff`0689db0c : 00000000`1108d660 00000000`0614fd10 00000000`16ebd8f0 00000000`1108d660 : comctl32!CToolbar::DrawFace+0x3c2
    00000000`16ebd7f0 00007fff`0689ce07 : 00000000`00000000 00007fff`0689ff20 00000e90`00000000 00000000`00000005 : comctl32!CToolbar::DrawButton+0x5cc
    00000000`16ebda30 00007fff`0689cc86 : 00000000`02bd8200 00000000`16ebde2c 00000000`03011d15 00000000`16ebde2c : comctl32!CToolbar::DrawToolbarH+0xf7
    00000000`16ebdaf0 00007fff`0689cb03 : 00000000`1108d660 00000000`16ebdc89 00000000`00000001 00000000`00000000 : comctl32!CToolbar::TBPaintImpl+0xd6
    00000000`16ebdc20 00007fff`06899fb0 : 00000000`00000000 00000000`0000000f 00000000`00000000 00007fff`00000000 : comctl32!CToolbar::TBPaint+0x193
    00000000`16ebdcf0 00007fff`0689975e : 00000000`00030762 00000000`00000000 00000000`0000000f 00000000`00000000 : comctl32!CToolbar::ToolbarWndProc+0x3e0
    00000000`16ebded0 00007fff`0bd01169 : 00000000`00000000 00000000`0000000f 00000000`00000001 00007fff`0bd00aba : comctl32!CToolbar::s_ToolbarWndProc+0x4e
    00000000`16ebdf10 00007fff`0bd00aba : 00000000`16ebe310 00007fff`06899710 00000000`00030762 00000000`00030762 : USER32!UserCallWinProcCheckWow+0x1f9
    00000000`16ebe000 00007fff`0687c67f : 00000000`16ebe310 00000000`00000000 00000000`00000000 00000000`00000001 : USER32!CallWindowProcW+0x10a
    00000000`16ebe050 00007fff`0687c267 : 00000000`0000000f 00000000`00000000 00000000`0000000f 00000000`00000000 : comctl32!CallNextSubclassProc+0x29f
    00000000`16ebe120 00007ffe`f5a4497e : 00000000`0000000f 00000000`16ebe1c0 00000000`00000000 00000000`00030762 : comctl32!DefSubclassProc+0x77
    00000000`16ebe170 00007fff`0687c4de : 00000000`16ebe310 00000000`00000000 00000000`00000000 00000000`00000001 : explorerframe!CBreadcrumbBar::_TBWndProc+0x6e
    00000000`16ebe1f0 00007fff`0687c332 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`0000000f : comctl32!CallNextSubclassProc+0xfe
    00000000`16ebe2c0 00007fff`0bd01169 : 00000000`00030762 00000000`00000000 00000000`00000001 00007fff`08be70e0 : comctl32!MasterSubclassProc+0xa2
    00000000`16ebe360 00007fff`0bd00ee2 : 00000000`00000000 00007fff`0687c290 00000000`00030762 00000000`00000000 : USER32!UserCallWinProcCheckWow+0x1f9
    00000000`16ebe450 00007fff`0bd10bee : 00007fff`0e684ff0 00000000`00000000 00000000`16ebe568 00007fff`0bd14d2c : USER32!DispatchClientMessage+0xa2
    00000000`16ebe4b0 00007fff`0e688ba4 : 00000000`00000000 00000000`00030762 00000000`0000000f 00000000`00000000 : USER32!_fnDWORD+0x3e
    00000000`16ebe510 00007fff`0bd227d4 : 00007fff`0bd00d19 00000000`013dc8f0 00000000`16ebe5d8 00000000`00030752 : ntdll!KiUserCallbackDispatcherContinue
    00000000`16ebe598 00007fff`0bd00d19 : 00000000`013dc8f0 00000000`16ebe5d8 00000000`00030752 00000000`00000000 : USER32!NtUserDispatchMessage+0x14
    00000000`16ebe5a0 00007fff`0cf5c9c4 : 00000000`ffffffff 00000000`ffffffff 00000000`00000001 00000000`00000001 : USER32!DispatchMessageWorker+0x229
    00000000`16ebe620 00007fff`0cf5c848 : 00000000`00cddb18 00007fff`0b06447d 00007ffe`f5ab4130 00007ffe`f5a35200 : SHELL32!SHProcessMessagesUntilEventsEx+0x164
    00000000`16ebe6f0 00007fff`0cf88b03 : 00000000`17508550 00000000`174f4960 00007ffe`f5a791c0 00000000`00000000 : SHELL32!SHProcessMessagesUntilEvent+0x3c
    00000000`16ebe740 00007fff`0cf883ce : 00000000`17777480 00000000`00000001 00000000`17777480 00000000`00000001 : SHELL32!CDefView::_SetItemCollection+0x303
    00000000`16ebe7f0 00007fff`0cf88e41 : 00000000`00000020 00000000`00cddb18 0000e6ca`581145d3 00000000`00cdda20 : SHELL32!CDefView::_CreateNewCollection+0x152
    00000000`16ebe880 00007fff`0cf8c7ca : 00007ffe`f5a3fef0 00007ffe`f5a3fef0 00000000`17777620 00000000`17777620 : SHELL32!CDefView::_CreateInitialCollection+0x2d
    00000000`16ebe8b0 00007ffe`f5a92ca5 : 00007fff`0cf8fc30 00000000`00cdde40 00000000`00cdde40 00007fff`0cf8c220 : SHELL32!CDefView::CreateViewWindow3+0x5aa
    00000000`16ebe9c0 00007ffe`f5a3e7c3 : 00000000`10f59c70 00000000`00cdda30 00000000`00000000 00000000`00000000 : explorerframe!FileCabinet_CreateViewWindow2+0x2a9
    00000000`16ebeb40 00007ffe`f5a7f459 : 00007ffe`00000001 00000000`00cdda30 00000000`16ebec30 00007fff`0e600abd : explorerframe!CShellBrowser::CreateViewWindow+0xd3
    00000000`16ebebb0 00007ffe`f5a7f584 : 00000000`110a7c40 00000000`110a7c40 00000000`110a7c40 00007ffe`f5a28220 : explorerframe!CShellViewFactory::_CreateNewConnection+0x155
    00000000`16ebec70 00007ffe`f5a3ac3a : 00000000`17502830 00007ffe`f5a7f530 00000000`17508570 00000000`00000000 : explorerframe!CShellViewFactory::BeginCreateConnection+0x54
    00000000`16ebecf0 00007ffe`f5a3af70 : 00000000`00000000 00000000`17508270 00000000`00000000 00000000`00cdda10 : explorerframe!CShellBrowser::_CreateConnectionForItem+0x27e
    00000000`16ebeec0 00007ffe`f5a3eead : 00000000`17508270 00000000`16ebf010 00000000`20000000 00000000`17508270 : explorerframe!CShellBrowser::_CreateNewConnection+0xa0
    00000000`16ebef10 00007ffe`f5b460c1 : 00000000`00000000 00000000`00cdda10 00000000`00000000 00007fff`0cf77ab0 : explorerframe!CShellBrowser::_NavigateToPidl+0x249
    00000000`16ebf100 00007ffe`f5ac8b6a : 00000000`00000700 00000000`16ebf1d1 00000000`050abaa8 00007fff`0cf77ab0 : explorerframe!CShellBrowser::_OnGoto+0xf1
    00000000`16ebf140 00007ffe`f5a404c9 : 00000000`00000000 00000000`00000700 00000000`00000000 00000000`00000000 : explorerframe!CShellBrowser::WndProcBS+0x8b44a
    00000000`16ebf230 00007fff`0bd01169 : 00000000`00000000 00000000`00000000 00000000`10d09d60 00000000`00000001 : explorerframe!IEFrameWndProc+0x89
    00000000`16ebf290 00007fff`0bd00c97 : 00000000`013dde50 00007ffe`f5a40440 00000000`00010a1e 00000000`00bcc800 : USER32!UserCallWinProcCheckWow+0x1f9
    00000000`16ebf380 00007ffe`f5a357d3 : 00007ffe`f5c076b8 00007ffe`f5c076b8 00000000`ffffffff 00000000`110a77e0 : USER32!DispatchMessageWorker+0x1a7
    00000000`16ebf400 00007ffe`f5a9599b : 00000000`00000003 00000000`00000000 00000000`10d09d60 00000000`00000000 : explorerframe!CExplorerFrame::FrameMessagePump+0xe3
    00000000`16ebf490 00007ffe`f5a95332 : 00000000`10d09d60 00000000`10c8b600 00000000`050aabe0 00000000`00000002 : explorerframe!BrowserThreadProc+0x73
    00000000`16ebf4e0 00007ffe`f5a952e2 : 10066871`00000001 00000000`10fd4050 00000000`00000000 00007fff`0bd120db : explorerframe!BrowserNewThreadProc+0x3a
    00000000`16ebf510 00007ffe`f5a86a87 : 00000000`00000001 00007fff`0b2990f7 00000000`00000000 00007f59`f29da6c1 : explorerframe!CExplorerTask::InternalResumeRT+0x12
    00000000`16ebf540 00007fff`0b2430ac : 00000000`00000e90 00000000`00000cc0 00000000`000000ff 00000000`00000000 : explorerframe!CRunnableTask::Run+0x647
    00000000`16ebf610 00007fff`0b241cb2 : 00000000`10fd4350 00000000`00c30cb0 00000000`00000010 00000000`00000000 : windows_storage!CShellTask::TT_Run+0x5c
    00000000`16ebf640 00007fff`0b2400de : 00000000`00c30cb0 00000000`00c30cb0 00000000`00000000 00000000`00000010 : windows_storage!CShellTaskThread::ThreadProc+0xda
    00000000`16ebf6f0 00007fff`0b069080 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : windows_storage!CShellTaskThread::s_ThreadProc+0x3e
    00000000`16ebf720 00007fff`0c108102 : 00000000`00000000 00000000`00000000 00007fff`0b068f90 00000000`00000000 : SHCORE!??$MakeAndInitialize@VCClosableStreamWrapper@@UIStream@@PEAU2@$$T@Details@WRL@Microsoft@@YAJPEAPEAUIStream@@$$QEAPEAU3@$$QEA$$T@Z+0x1c4
    00000000`16ebf810 00007fff`0e63c5b4 : 00007fff`0c1080e0 00000000`00000000 00000000`00000000 00000000`00000000 : KERNEL32!BaseThreadInitThunk+0x22
    00000000`16ebf840 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ntdll!RtlUserThreadStart+0x34
    
    
    STACK_COMMAND:  kb
    
    THREAD_SHA1_HASH_MOD_FUNC:  35ba007028e44a03714790ad7574c6f2ef35822b
    
    THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  0f933350d2b7cc9076f70653e03a8186ea1bd9fc
    
    THREAD_SHA1_HASH_MOD:  f92e684e53c42da42cf2daf39b9d1e2c2d6190da
    
    FOLLOWUP_IP: 
    win32kbase!AllocThreadBufferWithTag+9c
    fffff961`0e3fbfbc 48897310        mov     qword ptr [rbx+10h],rsi
    
    FAULT_INSTR_CODE:  10738948
    
    SYMBOL_STACK_INDEX:  4
    
    SYMBOL_NAME:  win32kbase!AllocThreadBufferWithTag+9c
    
    FOLLOWUP_NAME:  MachineOwner
    
    IMAGE_VERSION:  10.0.10586.420
    
    BUCKET_ID_FUNC_OFFSET:  9c
    
    FAILURE_BUCKET_ID:  AV_INVALID_win32kbase!AllocThreadBufferWithTag
    
    BUCKET_ID:  AV_INVALID_win32kbase!AllocThreadBufferWithTag
    
    PRIMARY_PROBLEM_CLASS:  AV_INVALID_win32kbase!AllocThreadBufferWithTag
    
    TARGET_TIME:  2016-07-11T17:18:51.000Z
    
    OSBUILD:  10586
    
    OSSERVICEPACK:  0
    
    SERVICEPACK_NUMBER: 0
    
    OS_REVISION: 0
    
    SUITE_MASK:  272
    
    PRODUCT_TYPE:  1
    
    OSPLATFORM_TYPE:  x64
    
    OSNAME:  Windows 10
    
    OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS
    
    OS_LOCALE:  
    
    USER_LCID:  0
    
    OSBUILD_TIMESTAMP:  2016-05-27 23:59:07
    
    BUILDDATESTAMP_STR:  160527-1834
    
    BUILDLAB_STR:  th2_release_sec
    
    BUILDOSVER_STR:  10.0.10586.420.amd64fre.th2_release_sec.160527-1834
    
    ANALYSIS_SESSION_ELAPSED_TIME: 394
    
    ANALYSIS_SOURCE:  KM
    
    FAILURE_ID_HASH_STRING:  km:av_invalid_win32kbase!allocthreadbufferwithtag
    
    FAILURE_ID_HASH:  {c1911162-bf8c-c715-2a74-fb4500df8522}
    
    Followup:     MachineOwner
    ---------
    
    2: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    PAGE_FAULT_IN_NONPAGED_AREA (50)
    Invalid system memory was referenced.  This cannot be protected by try-except.
    Typically the address is just plain bad or it is pointing at freed memory.
    Arguments:
    Arg1: fffff90142370010, memory referenced.
    Arg2: 0000000000000002, value 0 = read operation, 1 = write operation.
    Arg3: fffff9610e3fbfbc, If non-zero, the instruction address which referenced the bad memory
        address.
    Arg4: 0000000000000000, (reserved)
    
    Debugging Details:
    ------------------
    
    
    DUMP_CLASS: 1
    
    DUMP_QUALIFIER: 402
    
    BUILD_VERSION_STRING:  10586.420.amd64fre.th2_release_sec.160527-1834
    
    SYSTEM_MANUFACTURER:  System manufacturer
    
    SYSTEM_PRODUCT_NAME:  System Product Name
    
    SYSTEM_SKU:  SKU
    
    SYSTEM_VERSION:  System Version
    
    BIOS_VENDOR:  American Megatrends Inc.
    
    BIOS_VERSION:  1701
    
    BIOS_DATE:  03/25/2016
    
    BASEBOARD_MANUFACTURER:  ASUSTeK COMPUTER INC.
    
    BASEBOARD_PRODUCT:  MAXIMUS VIII HERO
    
    BASEBOARD_VERSION:  Rev 1.xx
    
    DUMP_TYPE:  0
    
    BUGCHECK_P1: fffff90142370010
    
    BUGCHECK_P2: 2
    
    BUGCHECK_P3: fffff9610e3fbfbc
    
    BUGCHECK_P4: 0
    
    READ_ADDRESS:  fffff90142370010 Paged session pool
    
    FAULTING_IP: 
    win32kbase!AllocThreadBufferWithTag+9c
    fffff961`0e3fbfbc 48897310        mov     qword ptr [rbx+10h],rsi
    
    MM_INTERNAL_CODE:  0
    
    IMAGE_NAME:  win32kbase.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  57491aee
    
    MODULE_NAME: win32kbase
    
    FAULTING_MODULE: fffff9610e390000 win32kbase
    
    CPU_COUNT: 8
    
    CPU_MHZ: fa8
    
    CPU_VENDOR:  GenuineIntel
    
    CPU_FAMILY: 6
    
    CPU_MODEL: 5e
    
    CPU_STEPPING: 3
    
    CPU_MICROCODE: 6,5e,3,0 (F,M,S,R)  SIG: 74'00000000 (cache) 74'00000000 (init)
    
    DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT
    
    BUGCHECK_STR:  AV
    
    PROCESS_NAME:  explorer.exe
    
    CURRENT_IRQL:  2
    
    ANALYSIS_SESSION_HOST:  SYLVANDELL
    
    ANALYSIS_SESSION_TIME:  07-11-2016 13:22:23.0932
    
    ANALYSIS_VERSION: 10.0.10586.567 amd64fre
    
    TRAP_FRAME:  ffffd001dd92ecd0 -- (.trap 0xffffd001dd92ecd0)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=ffffe0014418ce40 rbx=0000000000000000 rcx=ffffe0013e4e6080
    rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff9610e3fbfbc rsp=ffffd001dd92ee60 rbp=000000006f746547
     r8=0000000000000080  r9=fffff90000001e80 r10=0000000000000800
    r11=ffffe0013e9b1000 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei ng nz na pe nc
    win32kbase!AllocThreadBufferWithTag+0x9c:
    fffff961`0e3fbfbc 48897310        mov     qword ptr [rbx+10h],rsi ds:00000000`00000010=????????????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80077f894be to fffff80077f5c7a0
    
    STACK_TEXT:  
    ffffd001`dd92ea78 fffff800`77f894be : 00000000`00000050 fffff901`42370010 00000000`00000002 ffffd001`dd92ecd0 : nt!KeBugCheckEx
    ffffd001`dd92ea80 fffff800`77e85621 : 00000000`00000002 fffff901`42de3000 ffffd001`dd92ecd0 00000000`00002000 : nt! ?? ::FNODOBFM::`string'+0x1e2be
    ffffd001`dd92eb70 fffff800`77f65abc : 00000000`00000000 fffff901`42370000 00000000`00001000 ffffd001`dd48ccc0 : nt!MmAccessFault+0x5f1
    ffffd001`dd92ecd0 fffff961`0e3fbfbc : 00000001`00010101 00000000`00000000 fffff901`422843c0 ffffd001`00000001 : nt!KiPageFault+0x13c
    ffffd001`dd92ee60 fffff961`0e062ba0 : 00000000`00000000 ffffd001`dd92efb0 00000000`00000001 ffffd001`dd92eed0 : win32kbase!AllocThreadBufferWithTag+0x9c
    ffffd001`dd92ee90 fffff961`0e0506cf : 00000000`00000000 fffff901`42762620 00000000`00ffffff fffff901`40000d60 : win32kfull!EngTextOut+0x430
    ffffd001`dd92f350 fffff961`0e061294 : ffffd001`dd92fb80 00000000`00000034 00000000`00000010 00000000`00000000 : win32kfull!GreExtTextOutWLocked+0x1b7f
    ffffd001`dd92fb20 fffff961`0e060ddf : 00000000`00000000 fffff901`400810d0 fffff901`400816e8 00000000`00000001 : win32kfull!GreExtTextOutWInternal+0xec
    ffffd001`dd92fbf0 fffff800`77f670a3 : 00000000`00000001 00000000`16ebcba8 00000000`00108825 ffffffff`f6011e79 : win32kfull!NtGdiExtTextOutW+0x2df
    ffffd001`dd92fdd0 00007fff`0ba31404 : 00007fff`0ba03741 00000000`00000010 00000000`00000002 00000000`0398fc28 : nt!KiSystemServiceCopyEnd+0x13
    00000000`16ebbdd8 00007fff`0ba03741 : 00000000`00000010 00000000`00000002 00000000`0398fc28 00000000`00000034 : GDI32!NtGdiExtTextOutW+0x14
    00000000`16ebbde0 00007fff`0ba02948 : 00000000`00000000 00000000`00000002 00000000`00000000 00000000`00000000 : GDI32!ExtTextOutW+0x691
    00000000`16ebbea0 00007fff`0ba0248a : 00000000`00010002 00000000`00000000 00000000`00cbc018 00000004`00040002 : GDI32!CUspShapingDrawingSurface::GenericGlyphOut+0x288
    00000000`16ebc0b0 00007fff`0ba02399 : 00000000`00cccc50 00000000`00000000 00000000`090404e0 00000000`00000000 : GDI32!CUspShapingDrawingSurface::DrawGlyphs+0xca
    00000000`16ebc180 00007fff`0ba051e3 : 00000000`00000000 00000000`16ebc2f9 00000000`16ebc3c8 00000000`00000000 : GDI32!GenericEngineDrawGlyphs+0xc9
    00000000`16ebc210 00007fff`0ba0540f : 00000000`00000002 00000000`00000000 00000000`00000000 00007fff`0ba022d0 : GDI32!ShapingDrawGlyphs+0x183
    00000000`16ebc330 00007fff`0ba16f5e : 00000000`00000034 00007fff`0ba05230 ffffffff`f6011e79 00000000`00000017 : GDI32!ShlTextOut+0x1df
    00000000`16ebc560 00007fff`0ba01010 : 00000000`00cb7fd0 00000000`00000000 00000000`0000000b 00000000`00000000 : GDI32!ScriptTextOut+0x93e
    00000000`16ebc870 00007fff`0ba00c28 : 00000000`0000012b 00000000`00000001 00000000`16ebca10 00000000`00000000 : GDI32!InternalStringOut+0x138
    00000000`16ebc910 00007fff`0ba00a32 : 00000000`00000000 00000000`00000000 00000000`00000002 00000000`00000000 : GDI32!ScriptStringOut+0xe8
    00000000`16ebcb00 00007fff`0ba0045e : 00000190`0000001d 00000060`00000000 00007fff`0ba00400 27000000`000d000c : GDI32!LpkCharsetDraw+0x5b2
    00000000`16ebcce0 00007fff`0bd0e65e : 00000000`00000034 00000000`16ebce50 00000000`16ebd200 ffffffff`f6011e79 : GDI32!LpkDrawTextEx+0x5e
    00000000`16ebcd50 00007fff`0bd0dd90 : 00000000`00000000 00007fff`08bdd17b 00000000`00000000 00000000`00000000 : USER32!DrawTextExWorker+0x8ae
    00000000`16ebcfe0 00007fff`08bde14b : 00000000`00000000 00007fff`0ba002ef 00000000`00000000 00000010`0000012f : USER32!DrawTextW+0x40
    00000000`16ebd050 00007fff`08bde098 : 00000000`16ebd190 00000000`16ebd3d0 ffffffff`c1011e04 00000000`16ebd3d0 : UxTheme!DrawTextCallback+0x37 [d:\th\shell\themes\uxtheme\imgeffect.cpp @ 30]
    00000000`16ebd090 00007fff`08be1801 : 00000000`00000000 ffffffff`c1011e04 00000000`16ebd370 ffffffff`c1011e04 : UxTheme!DrawTextWithGlow+0x378 [d:\th\shell\themes\uxtheme\imgeffect.cpp @ 788]
    00000000`16ebd270 00007fff`08bd43b0 : 00000000`00000000 00000000`16ebd628 ffffffff`ffffffff 00000000`1768fe80 : UxTheme!CTextDraw::DrawTextW+0x3a1 [d:\th\shell\themes\uxtheme\textdraw.cpp @ 391]
    00000000`16ebd510 00007fff`0689e8df : 00000000`1108d660 00000000`10328de0 00000000`00000000 ffffffff`c1011e04 : UxTheme!DrawThemeText+0xe0 [d:\th\shell\themes\uxtheme\wrapper.cpp @ 836]
    00000000`16ebd5b0 00007fff`0689e3d6 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : comctl32!CToolbar::DrawString+0x17b
    00000000`16ebd690 00007fff`0689db0c : 00000000`1108d660 00000000`0614fd10 00000000`16ebd8f0 00000000`1108d660 : comctl32!CToolbar::DrawFace+0x3c2
    00000000`16ebd7f0 00007fff`0689ce07 : 00000000`00000000 00007fff`0689ff20 00000e90`00000000 00000000`00000005 : comctl32!CToolbar::DrawButton+0x5cc
    00000000`16ebda30 00007fff`0689cc86 : 00000000`02bd8200 00000000`16ebde2c 00000000`03011d15 00000000`16ebde2c : comctl32!CToolbar::DrawToolbarH+0xf7
    00000000`16ebdaf0 00007fff`0689cb03 : 00000000`1108d660 00000000`16ebdc89 00000000`00000001 00000000`00000000 : comctl32!CToolbar::TBPaintImpl+0xd6
    00000000`16ebdc20 00007fff`06899fb0 : 00000000`00000000 00000000`0000000f 00000000`00000000 00007fff`00000000 : comctl32!CToolbar::TBPaint+0x193
    00000000`16ebdcf0 00007fff`0689975e : 00000000`00030762 00000000`00000000 00000000`0000000f 00000000`00000000 : comctl32!CToolbar::ToolbarWndProc+0x3e0
    00000000`16ebded0 00007fff`0bd01169 : 00000000`00000000 00000000`0000000f 00000000`00000001 00007fff`0bd00aba : comctl32!CToolbar::s_ToolbarWndProc+0x4e
    00000000`16ebdf10 00007fff`0bd00aba : 00000000`16ebe310 00007fff`06899710 00000000`00030762 00000000`00030762 : USER32!UserCallWinProcCheckWow+0x1f9
    00000000`16ebe000 00007fff`0687c67f : 00000000`16ebe310 00000000`00000000 00000000`00000000 00000000`00000001 : USER32!CallWindowProcW+0x10a
    00000000`16ebe050 00007fff`0687c267 : 00000000`0000000f 00000000`00000000 00000000`0000000f 00000000`00000000 : comctl32!CallNextSubclassProc+0x29f
    00000000`16ebe120 00007ffe`f5a4497e : 00000000`0000000f 00000000`16ebe1c0 00000000`00000000 00000000`00030762 : comctl32!DefSubclassProc+0x77
    00000000`16ebe170 00007fff`0687c4de : 00000000`16ebe310 00000000`00000000 00000000`00000000 00000000`00000001 : explorerframe!CBreadcrumbBar::_TBWndProc+0x6e
    00000000`16ebe1f0 00007fff`0687c332 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`0000000f : comctl32!CallNextSubclassProc+0xfe
    00000000`16ebe2c0 00007fff`0bd01169 : 00000000`00030762 00000000`00000000 00000000`00000001 00007fff`08be70e0 : comctl32!MasterSubclassProc+0xa2
    00000000`16ebe360 00007fff`0bd00ee2 : 00000000`00000000 00007fff`0687c290 00000000`00030762 00000000`00000000 : USER32!UserCallWinProcCheckWow+0x1f9
    00000000`16ebe450 00007fff`0bd10bee : 00007fff`0e684ff0 00000000`00000000 00000000`16ebe568 00007fff`0bd14d2c : USER32!DispatchClientMessage+0xa2
    00000000`16ebe4b0 00007fff`0e688ba4 : 00000000`00000000 00000000`00030762 00000000`0000000f 00000000`00000000 : USER32!_fnDWORD+0x3e
    00000000`16ebe510 00007fff`0bd227d4 : 00007fff`0bd00d19 00000000`013dc8f0 00000000`16ebe5d8 00000000`00030752 : ntdll!KiUserCallbackDispatcherContinue
    00000000`16ebe598 00007fff`0bd00d19 : 00000000`013dc8f0 00000000`16ebe5d8 00000000`00030752 00000000`00000000 : USER32!NtUserDispatchMessage+0x14
    00000000`16ebe5a0 00007fff`0cf5c9c4 : 00000000`ffffffff 00000000`ffffffff 00000000`00000001 00000000`00000001 : USER32!DispatchMessageWorker+0x229
    00000000`16ebe620 00007fff`0cf5c848 : 00000000`00cddb18 00007fff`0b06447d 00007ffe`f5ab4130 00007ffe`f5a35200 : SHELL32!SHProcessMessagesUntilEventsEx+0x164
    00000000`16ebe6f0 00007fff`0cf88b03 : 00000000`17508550 00000000`174f4960 00007ffe`f5a791c0 00000000`00000000 : SHELL32!SHProcessMessagesUntilEvent+0x3c
    00000000`16ebe740 00007fff`0cf883ce : 00000000`17777480 00000000`00000001 00000000`17777480 00000000`00000001 : SHELL32!CDefView::_SetItemCollection+0x303
    00000000`16ebe7f0 00007fff`0cf88e41 : 00000000`00000020 00000000`00cddb18 0000e6ca`581145d3 00000000`00cdda20 : SHELL32!CDefView::_CreateNewCollection+0x152
    00000000`16ebe880 00007fff`0cf8c7ca : 00007ffe`f5a3fef0 00007ffe`f5a3fef0 00000000`17777620 00000000`17777620 : SHELL32!CDefView::_CreateInitialCollection+0x2d
    00000000`16ebe8b0 00007ffe`f5a92ca5 : 00007fff`0cf8fc30 00000000`00cdde40 00000000`00cdde40 00007fff`0cf8c220 : SHELL32!CDefView::CreateViewWindow3+0x5aa
    00000000`16ebe9c0 00007ffe`f5a3e7c3 : 00000000`10f59c70 00000000`00cdda30 00000000`00000000 00000000`00000000 : explorerframe!FileCabinet_CreateViewWindow2+0x2a9
    00000000`16ebeb40 00007ffe`f5a7f459 : 00007ffe`00000001 00000000`00cdda30 00000000`16ebec30 00007fff`0e600abd : explorerframe!CShellBrowser::CreateViewWindow+0xd3
    00000000`16ebebb0 00007ffe`f5a7f584 : 00000000`110a7c40 00000000`110a7c40 00000000`110a7c40 00007ffe`f5a28220 : explorerframe!CShellViewFactory::_CreateNewConnection+0x155
    00000000`16ebec70 00007ffe`f5a3ac3a : 00000000`17502830 00007ffe`f5a7f530 00000000`17508570 00000000`00000000 : explorerframe!CShellViewFactory::BeginCreateConnection+0x54
    00000000`16ebecf0 00007ffe`f5a3af70 : 00000000`00000000 00000000`17508270 00000000`00000000 00000000`00cdda10 : explorerframe!CShellBrowser::_CreateConnectionForItem+0x27e
    00000000`16ebeec0 00007ffe`f5a3eead : 00000000`17508270 00000000`16ebf010 00000000`20000000 00000000`17508270 : explorerframe!CShellBrowser::_CreateNewConnection+0xa0
    00000000`16ebef10 00007ffe`f5b460c1 : 00000000`00000000 00000000`00cdda10 00000000`00000000 00007fff`0cf77ab0 : explorerframe!CShellBrowser::_NavigateToPidl+0x249
    00000000`16ebf100 00007ffe`f5ac8b6a : 00000000`00000700 00000000`16ebf1d1 00000000`050abaa8 00007fff`0cf77ab0 : explorerframe!CShellBrowser::_OnGoto+0xf1
    00000000`16ebf140 00007ffe`f5a404c9 : 00000000`00000000 00000000`00000700 00000000`00000000 00000000`00000000 : explorerframe!CShellBrowser::WndProcBS+0x8b44a
    00000000`16ebf230 00007fff`0bd01169 : 00000000`00000000 00000000`00000000 00000000`10d09d60 00000000`00000001 : explorerframe!IEFrameWndProc+0x89
    00000000`16ebf290 00007fff`0bd00c97 : 00000000`013dde50 00007ffe`f5a40440 00000000`00010a1e 00000000`00bcc800 : USER32!UserCallWinProcCheckWow+0x1f9
    00000000`16ebf380 00007ffe`f5a357d3 : 00007ffe`f5c076b8 00007ffe`f5c076b8 00000000`ffffffff 00000000`110a77e0 : USER32!DispatchMessageWorker+0x1a7
    00000000`16ebf400 00007ffe`f5a9599b : 00000000`00000003 00000000`00000000 00000000`10d09d60 00000000`00000000 : explorerframe!CExplorerFrame::FrameMessagePump+0xe3
    00000000`16ebf490 00007ffe`f5a95332 : 00000000`10d09d60 00000000`10c8b600 00000000`050aabe0 00000000`00000002 : explorerframe!BrowserThreadProc+0x73
    00000000`16ebf4e0 00007ffe`f5a952e2 : 10066871`00000001 00000000`10fd4050 00000000`00000000 00007fff`0bd120db : explorerframe!BrowserNewThreadProc+0x3a
    00000000`16ebf510 00007ffe`f5a86a87 : 00000000`00000001 00007fff`0b2990f7 00000000`00000000 00007f59`f29da6c1 : explorerframe!CExplorerTask::InternalResumeRT+0x12
    00000000`16ebf540 00007fff`0b2430ac : 00000000`00000e90 00000000`00000cc0 00000000`000000ff 00000000`00000000 : explorerframe!CRunnableTask::Run+0x647
    00000000`16ebf610 00007fff`0b241cb2 : 00000000`10fd4350 00000000`00c30cb0 00000000`00000010 00000000`00000000 : windows_storage!CShellTask::TT_Run+0x5c
    00000000`16ebf640 00007fff`0b2400de : 00000000`00c30cb0 00000000`00c30cb0 00000000`00000000 00000000`00000010 : windows_storage!CShellTaskThread::ThreadProc+0xda
    00000000`16ebf6f0 00007fff`0b069080 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : windows_storage!CShellTaskThread::s_ThreadProc+0x3e
    00000000`16ebf720 00007fff`0c108102 : 00000000`00000000 00000000`00000000 00007fff`0b068f90 00000000`00000000 : SHCORE!??$MakeAndInitialize@VCClosableStreamWrapper@@UIStream@@PEAU2@$$T@Details@WRL@Microsoft@@YAJPEAPEAUIStream@@$$QEAPEAU3@$$QEA$$T@Z+0x1c4
    00000000`16ebf810 00007fff`0e63c5b4 : 00007fff`0c1080e0 00000000`00000000 00000000`00000000 00000000`00000000 : KERNEL32!BaseThreadInitThunk+0x22
    00000000`16ebf840 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ntdll!RtlUserThreadStart+0x34
    
    
    STACK_COMMAND:  kb
    
    THREAD_SHA1_HASH_MOD_FUNC:  35ba007028e44a03714790ad7574c6f2ef35822b
    
    THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  0f933350d2b7cc9076f70653e03a8186ea1bd9fc
    
    THREAD_SHA1_HASH_MOD:  f92e684e53c42da42cf2daf39b9d1e2c2d6190da
    
    FOLLOWUP_IP: 
    win32kbase!AllocThreadBufferWithTag+9c
    fffff961`0e3fbfbc 48897310        mov     qword ptr [rbx+10h],rsi
    
    FAULT_INSTR_CODE:  10738948
    
    SYMBOL_STACK_INDEX:  4
    
    SYMBOL_NAME:  win32kbase!AllocThreadBufferWithTag+9c
    
    FOLLOWUP_NAME:  MachineOwner
    
    IMAGE_VERSION:  10.0.10586.420
    
    BUCKET_ID_FUNC_OFFSET:  9c
    
    FAILURE_BUCKET_ID:  AV_INVALID_win32kbase!AllocThreadBufferWithTag
    
    BUCKET_ID:  AV_INVALID_win32kbase!AllocThreadBufferWithTag
    
    PRIMARY_PROBLEM_CLASS:  AV_INVALID_win32kbase!AllocThreadBufferWithTag
    
    TARGET_TIME:  2016-07-11T17:18:51.000Z
    
    OSBUILD:  10586
    
    OSSERVICEPACK:  0
    
    SERVICEPACK_NUMBER: 0
    
    OS_REVISION: 0
    
    SUITE_MASK:  272
    
    PRODUCT_TYPE:  1
    
    OSPLATFORM_TYPE:  x64
    
    OSNAME:  Windows 10
    
    OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS
    
    OS_LOCALE:  
    
    USER_LCID:  0
    
    OSBUILD_TIMESTAMP:  2016-05-27 23:59:07
    
    BUILDDATESTAMP_STR:  160527-1834
    
    BUILDLAB_STR:  th2_release_sec
    
    BUILDOSVER_STR:  10.0.10586.420.amd64fre.th2_release_sec.160527-1834
    
    ANALYSIS_SESSION_ELAPSED_TIME: 384
    
    ANALYSIS_SOURCE:  KM
    
    FAILURE_ID_HASH_STRING:  km:av_invalid_win32kbase!allocthreadbufferwithtag
    
    FAILURE_ID_HASH:  {c1911162-bf8c-c715-2a74-fb4500df8522}
    
    Followup:     MachineOwner
    ---------
    
    2: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    PAGE_FAULT_IN_NONPAGED_AREA (50)
    Invalid system memory was referenced.  This cannot be protected by try-except.
    Typically the address is just plain bad or it is pointing at freed memory.
    Arguments:
    Arg1: fffff90142370010, memory referenced.
    Arg2: 0000000000000002, value 0 = read operation, 1 = write operation.
    Arg3: fffff9610e3fbfbc, If non-zero, the instruction address which referenced the bad memory
        address.
    Arg4: 0000000000000000, (reserved)
    
    Debugging Details:
    ------------------
    
    
    DUMP_CLASS: 1
    
    DUMP_QUALIFIER: 402
    
    BUILD_VERSION_STRING:  10586.420.amd64fre.th2_release_sec.160527-1834
    
    SYSTEM_MANUFACTURER:  System manufacturer
    
    SYSTEM_PRODUCT_NAME:  System Product Name
    
    SYSTEM_SKU:  SKU
    
    SYSTEM_VERSION:  System Version
    
    BIOS_VENDOR:  American Megatrends Inc.
    
    BIOS_VERSION:  1701
    
    BIOS_DATE:  03/25/2016
    
    BASEBOARD_MANUFACTURER:  ASUSTeK COMPUTER INC.
    
    BASEBOARD_PRODUCT:  MAXIMUS VIII HERO
    
    BASEBOARD_VERSION:  Rev 1.xx
    
    DUMP_TYPE:  0
    
    BUGCHECK_P1: fffff90142370010
    
    BUGCHECK_P2: 2
    
    BUGCHECK_P3: fffff9610e3fbfbc
    
    BUGCHECK_P4: 0
    
    READ_ADDRESS:  fffff90142370010 Paged session pool
    
    FAULTING_IP: 
    win32kbase!AllocThreadBufferWithTag+9c
    fffff961`0e3fbfbc 48897310        mov     qword ptr [rbx+10h],rsi
    
    MM_INTERNAL_CODE:  0
    
    IMAGE_NAME:  win32kbase.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  57491aee
    
    MODULE_NAME: win32kbase
    
    FAULTING_MODULE: fffff9610e390000 win32kbase
    
    CPU_COUNT: 8
    
    CPU_MHZ: fa8
    
    CPU_VENDOR:  GenuineIntel
    
    CPU_FAMILY: 6
    
    CPU_MODEL: 5e
    
    CPU_STEPPING: 3
    
    CPU_MICROCODE: 6,5e,3,0 (F,M,S,R)  SIG: 74'00000000 (cache) 74'00000000 (init)
    
    DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT
    
    BUGCHECK_STR:  AV
    
    PROCESS_NAME:  explorer.exe
    
    CURRENT_IRQL:  2
    
    ANALYSIS_SESSION_HOST:  SYLVANDELL
    
    ANALYSIS_SESSION_TIME:  07-11-2016 13:22:24.0836
    
    ANALYSIS_VERSION: 10.0.10586.567 amd64fre
    
    TRAP_FRAME:  ffffd001dd92ecd0 -- (.trap 0xffffd001dd92ecd0)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=ffffe0014418ce40 rbx=0000000000000000 rcx=ffffe0013e4e6080
    rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff9610e3fbfbc rsp=ffffd001dd92ee60 rbp=000000006f746547
     r8=0000000000000080  r9=fffff90000001e80 r10=0000000000000800
    r11=ffffe0013e9b1000 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei ng nz na pe nc
    win32kbase!AllocThreadBufferWithTag+0x9c:
    fffff961`0e3fbfbc 48897310        mov     qword ptr [rbx+10h],rsi ds:00000000`00000010=????????????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80077f894be to fffff80077f5c7a0
    
    STACK_TEXT:  
    ffffd001`dd92ea78 fffff800`77f894be : 00000000`00000050 fffff901`42370010 00000000`00000002 ffffd001`dd92ecd0 : nt!KeBugCheckEx
    ffffd001`dd92ea80 fffff800`77e85621 : 00000000`00000002 fffff901`42de3000 ffffd001`dd92ecd0 00000000`00002000 : nt! ?? ::FNODOBFM::`string'+0x1e2be
    ffffd001`dd92eb70 fffff800`77f65abc : 00000000`00000000 fffff901`42370000 00000000`00001000 ffffd001`dd48ccc0 : nt!MmAccessFault+0x5f1
    ffffd001`dd92ecd0 fffff961`0e3fbfbc : 00000001`00010101 00000000`00000000 fffff901`422843c0 ffffd001`00000001 : nt!KiPageFault+0x13c
    ffffd001`dd92ee60 fffff961`0e062ba0 : 00000000`00000000 ffffd001`dd92efb0 00000000`00000001 ffffd001`dd92eed0 : win32kbase!AllocThreadBufferWithTag+0x9c
    ffffd001`dd92ee90 fffff961`0e0506cf : 00000000`00000000 fffff901`42762620 00000000`00ffffff fffff901`40000d60 : win32kfull!EngTextOut+0x430
    ffffd001`dd92f350 fffff961`0e061294 : ffffd001`dd92fb80 00000000`00000034 00000000`00000010 00000000`00000000 : win32kfull!GreExtTextOutWLocked+0x1b7f
    ffffd001`dd92fb20 fffff961`0e060ddf : 00000000`00000000 fffff901`400810d0 fffff901`400816e8 00000000`00000001 : win32kfull!GreExtTextOutWInternal+0xec
    ffffd001`dd92fbf0 fffff800`77f670a3 : 00000000`00000001 00000000`16ebcba8 00000000`00108825 ffffffff`f6011e79 : win32kfull!NtGdiExtTextOutW+0x2df
    ffffd001`dd92fdd0 00007fff`0ba31404 : 00007fff`0ba03741 00000000`00000010 00000000`00000002 00000000`0398fc28 : nt!KiSystemServiceCopyEnd+0x13
    00000000`16ebbdd8 00007fff`0ba03741 : 00000000`00000010 00000000`00000002 00000000`0398fc28 00000000`00000034 : GDI32!NtGdiExtTextOutW+0x14
    00000000`16ebbde0 00007fff`0ba02948 : 00000000`00000000 00000000`00000002 00000000`00000000 00000000`00000000 : GDI32!ExtTextOutW+0x691
    00000000`16ebbea0 00007fff`0ba0248a : 00000000`00010002 00000000`00000000 00000000`00cbc018 00000004`00040002 : GDI32!CUspShapingDrawingSurface::GenericGlyphOut+0x288
    00000000`16ebc0b0 00007fff`0ba02399 : 00000000`00cccc50 00000000`00000000 00000000`090404e0 00000000`00000000 : GDI32!CUspShapingDrawingSurface::DrawGlyphs+0xca
    00000000`16ebc180 00007fff`0ba051e3 : 00000000`00000000 00000000`16ebc2f9 00000000`16ebc3c8 00000000`00000000 : GDI32!GenericEngineDrawGlyphs+0xc9
    00000000`16ebc210 00007fff`0ba0540f : 00000000`00000002 00000000`00000000 00000000`00000000 00007fff`0ba022d0 : GDI32!ShapingDrawGlyphs+0x183
    00000000`16ebc330 00007fff`0ba16f5e : 00000000`00000034 00007fff`0ba05230 ffffffff`f6011e79 00000000`00000017 : GDI32!ShlTextOut+0x1df
    00000000`16ebc560 00007fff`0ba01010 : 00000000`00cb7fd0 00000000`00000000 00000000`0000000b 00000000`00000000 : GDI32!ScriptTextOut+0x93e
    00000000`16ebc870 00007fff`0ba00c28 : 00000000`0000012b 00000000`00000001 00000000`16ebca10 00000000`00000000 : GDI32!InternalStringOut+0x138
    00000000`16ebc910 00007fff`0ba00a32 : 00000000`00000000 00000000`00000000 00000000`00000002 00000000`00000000 : GDI32!ScriptStringOut+0xe8
    00000000`16ebcb00 00007fff`0ba0045e : 00000190`0000001d 00000060`00000000 00007fff`0ba00400 27000000`000d000c : GDI32!LpkCharsetDraw+0x5b2
    00000000`16ebcce0 00007fff`0bd0e65e : 00000000`00000034 00000000`16ebce50 00000000`16ebd200 ffffffff`f6011e79 : GDI32!LpkDrawTextEx+0x5e
    00000000`16ebcd50 00007fff`0bd0dd90 : 00000000`00000000 00007fff`08bdd17b 00000000`00000000 00000000`00000000 : USER32!DrawTextExWorker+0x8ae
    00000000`16ebcfe0 00007fff`08bde14b : 00000000`00000000 00007fff`0ba002ef 00000000`00000000 00000010`0000012f : USER32!DrawTextW+0x40
    00000000`16ebd050 00007fff`08bde098 : 00000000`16ebd190 00000000`16ebd3d0 ffffffff`c1011e04 00000000`16ebd3d0 : UxTheme!DrawTextCallback+0x37 [d:\th\shell\themes\uxtheme\imgeffect.cpp @ 30]
    00000000`16ebd090 00007fff`08be1801 : 00000000`00000000 ffffffff`c1011e04 00000000`16ebd370 ffffffff`c1011e04 : UxTheme!DrawTextWithGlow+0x378 [d:\th\shell\themes\uxtheme\imgeffect.cpp @ 788]
    00000000`16ebd270 00007fff`08bd43b0 : 00000000`00000000 00000000`16ebd628 ffffffff`ffffffff 00000000`1768fe80 : UxTheme!CTextDraw::DrawTextW+0x3a1 [d:\th\shell\themes\uxtheme\textdraw.cpp @ 391]
    00000000`16ebd510 00007fff`0689e8df : 00000000`1108d660 00000000`10328de0 00000000`00000000 ffffffff`c1011e04 : UxTheme!DrawThemeText+0xe0 [d:\th\shell\themes\uxtheme\wrapper.cpp @ 836]
    00000000`16ebd5b0 00007fff`0689e3d6 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : comctl32!CToolbar::DrawString+0x17b
    00000000`16ebd690 00007fff`0689db0c : 00000000`1108d660 00000000`0614fd10 00000000`16ebd8f0 00000000`1108d660 : comctl32!CToolbar::DrawFace+0x3c2
    00000000`16ebd7f0 00007fff`0689ce07 : 00000000`00000000 00007fff`0689ff20 00000e90`00000000 00000000`00000005 : comctl32!CToolbar::DrawButton+0x5cc
    00000000`16ebda30 00007fff`0689cc86 : 00000000`02bd8200 00000000`16ebde2c 00000000`03011d15 00000000`16ebde2c : comctl32!CToolbar::DrawToolbarH+0xf7
    00000000`16ebdaf0 00007fff`0689cb03 : 00000000`1108d660 00000000`16ebdc89 00000000`00000001 00000000`00000000 : comctl32!CToolbar::TBPaintImpl+0xd6
    00000000`16ebdc20 00007fff`06899fb0 : 00000000`00000000 00000000`0000000f 00000000`00000000 00007fff`00000000 : comctl32!CToolbar::TBPaint+0x193
    00000000`16ebdcf0 00007fff`0689975e : 00000000`00030762 00000000`00000000 00000000`0000000f 00000000`00000000 : comctl32!CToolbar::ToolbarWndProc+0x3e0
    00000000`16ebded0 00007fff`0bd01169 : 00000000`00000000 00000000`0000000f 00000000`00000001 00007fff`0bd00aba : comctl32!CToolbar::s_ToolbarWndProc+0x4e
    00000000`16ebdf10 00007fff`0bd00aba : 00000000`16ebe310 00007fff`06899710 00000000`00030762 00000000`00030762 : USER32!UserCallWinProcCheckWow+0x1f9
    00000000`16ebe000 00007fff`0687c67f : 00000000`16ebe310 00000000`00000000 00000000`00000000 00000000`00000001 : USER32!CallWindowProcW+0x10a
    00000000`16ebe050 00007fff`0687c267 : 00000000`0000000f 00000000`00000000 00000000`0000000f 00000000`00000000 : comctl32!CallNextSubclassProc+0x29f
    00000000`16ebe120 00007ffe`f5a4497e : 00000000`0000000f 00000000`16ebe1c0 00000000`00000000 00000000`00030762 : comctl32!DefSubclassProc+0x77
    00000000`16ebe170 00007fff`0687c4de : 00000000`16ebe310 00000000`00000000 00000000`00000000 00000000`00000001 : explorerframe!CBreadcrumbBar::_TBWndProc+0x6e
    00000000`16ebe1f0 00007fff`0687c332 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`0000000f : comctl32!CallNextSubclassProc+0xfe
    00000000`16ebe2c0 00007fff`0bd01169 : 00000000`00030762 00000000`00000000 00000000`00000001 00007fff`08be70e0 : comctl32!MasterSubclassProc+0xa2
    00000000`16ebe360 00007fff`0bd00ee2 : 00000000`00000000 00007fff`0687c290 00000000`00030762 00000000`00000000 : USER32!UserCallWinProcCheckWow+0x1f9
    00000000`16ebe450 00007fff`0bd10bee : 00007fff`0e684ff0 00000000`00000000 00000000`16ebe568 00007fff`0bd14d2c : USER32!DispatchClientMessage+0xa2
    00000000`16ebe4b0 00007fff`0e688ba4 : 00000000`00000000 00000000`00030762 00000000`0000000f 00000000`00000000 : USER32!_fnDWORD+0x3e
    00000000`16ebe510 00007fff`0bd227d4 : 00007fff`0bd00d19 00000000`013dc8f0 00000000`16ebe5d8 00000000`00030752 : ntdll!KiUserCallbackDispatcherContinue
    00000000`16ebe598 00007fff`0bd00d19 : 00000000`013dc8f0 00000000`16ebe5d8 00000000`00030752 00000000`00000000 : USER32!NtUserDispatchMessage+0x14
    00000000`16ebe5a0 00007fff`0cf5c9c4 : 00000000`ffffffff 00000000`ffffffff 00000000`00000001 00000000`00000001 : USER32!DispatchMessageWorker+0x229
    00000000`16ebe620 00007fff`0cf5c848 : 00000000`00cddb18 00007fff`0b06447d 00007ffe`f5ab4130 00007ffe`f5a35200 : SHELL32!SHProcessMessagesUntilEventsEx+0x164
    00000000`16ebe6f0 00007fff`0cf88b03 : 00000000`17508550 00000000`174f4960 00007ffe`f5a791c0 00000000`00000000 : SHELL32!SHProcessMessagesUntilEvent+0x3c
    00000000`16ebe740 00007fff`0cf883ce : 00000000`17777480 00000000`00000001 00000000`17777480 00000000`00000001 : SHELL32!CDefView::_SetItemCollection+0x303
    00000000`16ebe7f0 00007fff`0cf88e41 : 00000000`00000020 00000000`00cddb18 0000e6ca`581145d3 00000000`00cdda20 : SHELL32!CDefView::_CreateNewCollection+0x152
    00000000`16ebe880 00007fff`0cf8c7ca : 00007ffe`f5a3fef0 00007ffe`f5a3fef0 00000000`17777620 00000000`17777620 : SHELL32!CDefView::_CreateInitialCollection+0x2d
    00000000`16ebe8b0 00007ffe`f5a92ca5 : 00007fff`0cf8fc30 00000000`00cdde40 00000000`00cdde40 00007fff`0cf8c220 : SHELL32!CDefView::CreateViewWindow3+0x5aa
    00000000`16ebe9c0 00007ffe`f5a3e7c3 : 00000000`10f59c70 00000000`00cdda30 00000000`00000000 00000000`00000000 : explorerframe!FileCabinet_CreateViewWindow2+0x2a9
    00000000`16ebeb40 00007ffe`f5a7f459 : 00007ffe`00000001 00000000`00cdda30 00000000`16ebec30 00007fff`0e600abd : explorerframe!CShellBrowser::CreateViewWindow+0xd3
    00000000`16ebebb0 00007ffe`f5a7f584 : 00000000`110a7c40 00000000`110a7c40 00000000`110a7c40 00007ffe`f5a28220 : explorerframe!CShellViewFactory::_CreateNewConnection+0x155
    00000000`16ebec70 00007ffe`f5a3ac3a : 00000000`17502830 00007ffe`f5a7f530 00000000`17508570 00000000`00000000 : explorerframe!CShellViewFactory::BeginCreateConnection+0x54
    00000000`16ebecf0 00007ffe`f5a3af70 : 00000000`00000000 00000000`17508270 00000000`00000000 00000000`00cdda10 : explorerframe!CShellBrowser::_CreateConnectionForItem+0x27e
    00000000`16ebeec0 00007ffe`f5a3eead : 00000000`17508270 00000000`16ebf010 00000000`20000000 00000000`17508270 : explorerframe!CShellBrowser::_CreateNewConnection+0xa0
    00000000`16ebef10 00007ffe`f5b460c1 : 00000000`00000000 00000000`00cdda10 00000000`00000000 00007fff`0cf77ab0 : explorerframe!CShellBrowser::_NavigateToPidl+0x249
    00000000`16ebf100 00007ffe`f5ac8b6a : 00000000`00000700 00000000`16ebf1d1 00000000`050abaa8 00007fff`0cf77ab0 : explorerframe!CShellBrowser::_OnGoto+0xf1
    00000000`16ebf140 00007ffe`f5a404c9 : 00000000`00000000 00000000`00000700 00000000`00000000 00000000`00000000 : explorerframe!CShellBrowser::WndProcBS+0x8b44a
    00000000`16ebf230 00007fff`0bd01169 : 00000000`00000000 00000000`00000000 00000000`10d09d60 00000000`00000001 : explorerframe!IEFrameWndProc+0x89
    00000000`16ebf290 00007fff`0bd00c97 : 00000000`013dde50 00007ffe`f5a40440 00000000`00010a1e 00000000`00bcc800 : USER32!UserCallWinProcCheckWow+0x1f9
    00000000`16ebf380 00007ffe`f5a357d3 : 00007ffe`f5c076b8 00007ffe`f5c076b8 00000000`ffffffff 00000000`110a77e0 : USER32!DispatchMessageWorker+0x1a7
    00000000`16ebf400 00007ffe`f5a9599b : 00000000`00000003 00000000`00000000 00000000`10d09d60 00000000`00000000 : explorerframe!CExplorerFrame::FrameMessagePump+0xe3
    00000000`16ebf490 00007ffe`f5a95332 : 00000000`10d09d60 00000000`10c8b600 00000000`050aabe0 00000000`00000002 : explorerframe!BrowserThreadProc+0x73
    00000000`16ebf4e0 00007ffe`f5a952e2 : 10066871`00000001 00000000`10fd4050 00000000`00000000 00007fff`0bd120db : explorerframe!BrowserNewThreadProc+0x3a
    00000000`16ebf510 00007ffe`f5a86a87 : 00000000`00000001 00007fff`0b2990f7 00000000`00000000 00007f59`f29da6c1 : explorerframe!CExplorerTask::InternalResumeRT+0x12
    00000000`16ebf540 00007fff`0b2430ac : 00000000`00000e90 00000000`00000cc0 00000000`000000ff 00000000`00000000 : explorerframe!CRunnableTask::Run+0x647
    00000000`16ebf610 00007fff`0b241cb2 : 00000000`10fd4350 00000000`00c30cb0 00000000`00000010 00000000`00000000 : windows_storage!CShellTask::TT_Run+0x5c
    00000000`16ebf640 00007fff`0b2400de : 00000000`00c30cb0 00000000`00c30cb0 00000000`00000000 00000000`00000010 : windows_storage!CShellTaskThread::ThreadProc+0xda
    00000000`16ebf6f0 00007fff`0b069080 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : windows_storage!CShellTaskThread::s_ThreadProc+0x3e
    00000000`16ebf720 00007fff`0c108102 : 00000000`00000000 00000000`00000000 00007fff`0b068f90 00000000`00000000 : SHCORE!??$MakeAndInitialize@VCClosableStreamWrapper@@UIStream@@PEAU2@$$T@Details@WRL@Microsoft@@YAJPEAPEAUIStream@@$$QEAPEAU3@$$QEA$$T@Z+0x1c4
    00000000`16ebf810 00007fff`0e63c5b4 : 00007fff`0c1080e0 00000000`00000000 00000000`00000000 00000000`00000000 : KERNEL32!BaseThreadInitThunk+0x22
    00000000`16ebf840 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ntdll!RtlUserThreadStart+0x34
    
    
    STACK_COMMAND:  kb
    
    THREAD_SHA1_HASH_MOD_FUNC:  35ba007028e44a03714790ad7574c6f2ef35822b
    
    THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  0f933350d2b7cc9076f70653e03a8186ea1bd9fc
    
    THREAD_SHA1_HASH_MOD:  f92e684e53c42da42cf2daf39b9d1e2c2d6190da
    
    FOLLOWUP_IP: 
    win32kbase!AllocThreadBufferWithTag+9c
    fffff961`0e3fbfbc 48897310        mov     qword ptr [rbx+10h],rsi
    
    FAULT_INSTR_CODE:  10738948
    
    SYMBOL_STACK_INDEX:  4
    
    SYMBOL_NAME:  win32kbase!AllocThreadBufferWithTag+9c
    
    FOLLOWUP_NAME:  MachineOwner
    
    IMAGE_VERSION:  10.0.10586.420
    
    BUCKET_ID_FUNC_OFFSET:  9c
    
    FAILURE_BUCKET_ID:  AV_INVALID_win32kbase!AllocThreadBufferWithTag
    
    BUCKET_ID:  AV_INVALID_win32kbase!AllocThreadBufferWithTag
    
    PRIMARY_PROBLEM_CLASS:  AV_INVALID_win32kbase!AllocThreadBufferWithTag
    
    TARGET_TIME:  2016-07-11T17:18:51.000Z
    
    OSBUILD:  10586
    
    OSSERVICEPACK:  0
    
    SERVICEPACK_NUMBER: 0
    
    OS_REVISION: 0
    
    SUITE_MASK:  272
    
    PRODUCT_TYPE:  1
    
    OSPLATFORM_TYPE:  x64
    
    OSNAME:  Windows 10
    
    OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS
    
    OS_LOCALE:  
    
    USER_LCID:  0
    
    OSBUILD_TIMESTAMP:  2016-05-27 23:59:07
    
    BUILDDATESTAMP_STR:  160527-1834
    
    BUILDLAB_STR:  th2_release_sec
    
    BUILDOSVER_STR:  10.0.10586.420.amd64fre.th2_release_sec.160527-1834
    
    ANALYSIS_SESSION_ELAPSED_TIME: 388
    
    ANALYSIS_SOURCE:  KM
    
    FAILURE_ID_HASH_STRING:  km:av_invalid_win32kbase!allocthreadbufferwithtag
    
    FAILURE_ID_HASH:  {c1911162-bf8c-c715-2a74-fb4500df8522}
    
    Followup:     MachineOwner
    ---------
    
    2: kd> .trap 0xffffd001dd92ecd0
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=ffffe0014418ce40 rbx=0000000000000000 rcx=ffffe0013e4e6080
    rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff9610e3fbfbc rsp=ffffd001dd92ee60 rbp=000000006f746547
     r8=0000000000000080  r9=fffff90000001e80 r10=0000000000000800
    r11=ffffe0013e9b1000 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei ng nz na pe nc
    win32kbase!AllocThreadBufferWithTag+0x9c:
    fffff961`0e3fbfbc 48897310        mov     qword ptr [rbx+10h],rsi ds:00000000`00000010=????????????????
    And diagnostic log will be attached.
    Last edited by Nierfenhimer; 11 Jul 2016 at 12:24.
      My ComputerSystem Spec
  5.    11 Jul 2016 #15
    Join Date : Jul 2016
    Cleveland
    Posts : 12
    Windows 10 x64 Professional
    Thread Starter

    Running in Safe Mode now, posting from laptop, and trying to move over all the bigger, more important stuff. I think I may just see if trying to reinstall Windows fixes this because I feel like I'm fighting a proverbial hydra, here. Everything was fine until just yesterday. I can't figure out what changed, why, or how it's been crashing things in such a horrible, cascading avalanche but... well, here we are.

    EDIT: Attempted a clean install of Windows and in the middle of installation, got another UNEXPECTED_KERNEL_MODE_TRAP. I can't even do anything about it. It didn't fully install, so I'm just... starting over. I am not even sure how to feel or what to do at this point. I'm frustrated and stressed out to the point of tears over this.

    EDIT: Looking into the possibility of hardware failures. Memtest turned up nothing overnight, but I'm not super convinced, since it seems okay installing Windows on one stick and not the other or both, and in any case without the video card installed.
    Last edited by Nierfenhimer; 11 Jul 2016 at 15:47.
      My ComputerSystem Spec
  6.    11 Jul 2016 #16
    Join Date : Jul 2016
    Cleveland
    Posts : 12
    Windows 10 x64 Professional
    Thread Starter

    Another update: I'm to the point of just repeatedly reinstalling Windows because sometimes it works and sometimes it fails. I'm finding that, even with memtest clearing both sticks of RAM, both together and separately, one seems to cause problems, as does the video card. I can't tell why. When the video card is in, it prompts SYSTEM_SERVICE_EXCEPTION BSODs during Windows installation that often cause it to fail altogether or hang indefinitely until the boot drive is formatted again.

    If this were a problem with the motherboard or CPU, I assume I wouldn't even be getting this far, correct? It installs Windows and seems fine with just the one particular stick of RAM, but at this point, I don't know what to think.
      My ComputerSystem Spec
  7.    12 Jul 2016 #17
    Join Date : Nov 2015
    Posts : 2,808
    64bit Win 10 Pro ver 1709 Build 16299.19

    I feel your pain

    With the escalation of all the problems it does have all the features of a failing motherboard but let's not give up yet. There may be some setting in the BIOS that is causing the MB to trigger errors under certain conditions. Make sure the BIOS settings are at optimised defaults with no overclocking. Make sure the RAM is inserted correctly, slots 2 and 4 should be used when using 2 sticks of RAM counting the slots in order with 1 being nearest the CPU. I have a feeling you may be using slots 1 and 2.
      My ComputersSystem Spec
  8.    12 Jul 2016 #18
    Join Date : Jul 2016
    Cleveland
    Posts : 12
    Windows 10 x64 Professional
    Thread Starter

    Working with a friend last night, we tried swapping the RAM about, eventually taking it down to just a single module of 8GB with no video card installed. I haven't actually had the opportunity to try overclocking anything yet, as I'm not big on doing so. At first it seemed okay, but the issues continued later into the night, eventually firing a KERNEL_SECURITY_CHECK_FAILURE during an installation, then when logging in after it recovered, a CLOCK_WATCHDOG_TIMEOUT.
    After this, we tried another fresh install as that messed up the last one, and before the installation CD even got to show me the drives available for install, I was presented with another UNEXPECTED_KERNEL_MODE_TRAP. Checking the motherboard afterward showed me the LED readout was showing either of two codes: A0 or 99. A0 is supposedly a non-error, just an initialisation message, but 99 indicates "Super IO initialisation" which apparently can mean a faulty motherboard or bad power supply. What do you think, given the circumstances?

    I took the day off to start deconstructing and getting parts ready to return, so I'm likely just going to package up everything I can to prepare for an exchange at the store - RAM, GPU, motherboard, CPU, the works.
      My ComputerSystem Spec
  9.    12 Jul 2016 #19
    Join Date : Nov 2015
    Posts : 2,808
    64bit Win 10 Pro ver 1709 Build 16299.19

    Um.. Q99 does sound bad but it has been known to show if the keyboard and mouse are not connected or working. Do you have any others you can try?

    With just one stick of memory this should be in slot 2.

    Assuming you have exhausted all these possibilities, I am inclined to agree that you might need a new MB.

    Did you have any recent lightning storms that could have sent a voltage spike to ruin the board?
      My ComputersSystem Spec
  10.    12 Jul 2016 #20
    Join Date : Jul 2016
    Cleveland
    Posts : 12
    Windows 10 x64 Professional
    Thread Starter

    Keyboard and mouse work with no problems. RAM was slotted correctly. No recent power fluctuations of which I'm immediately aware. I'm going to wait until the shop I bought all the parts from opens in an hour, then call them and ask if I can just bring the whole rig in for warranty repair since I got all my parts there barely a couple weeks ago and they're all still under warranty. Either way,
    Thanks for all your help, Phil - you've been one of many I've needed to keep my head on straight through all of this. I'm going to mark this as solved since it comes down to getting hardware replaced now, and I have the means to do so. Again, thank you for all your help!
      My ComputerSystem Spec

 
Page 2 of 3 FirstFirst 123 LastLast


Similar Threads
Thread Forum
Unexpected_kernel_mode_trap
062216-6796-01.dmp 22/06/2016 22:56:42 UNEXPECTED_KERNEL_MODE_TRAP 0x1000007f 00000000`00000008 ffffd000`b18b4a30 ffffd000`b18d1010 fffff83b`9d1d79d
BSOD Crashes and Debugging
BSOD or Total freeze, UNEXPECTED_KERNEL_MODE_TRAP
Hi, recently I've been having system crashes where the mouse just freezes and I have to hard restart / shutdown my pc. Otherwise the computer bluescreens and dumps a log. I have two copies of the last two cases of this BSOD pasted below. I have...
BSOD Crashes and Debugging
BSOD Unexpected_kernel_mode_trap
Hello everyone, First time posting here and I am completely lost on what to do. I have tried everything I could think of to fix this issue and have not been able to find a solution. Hoping someone here can help. I have been getting random BSOD's...
BSOD Crashes and Debugging
Bsod unexpected_kernel_mode_trap
Hello all, I have a custom PC build and I have experienced 3 BSOD over the past maybe 2 months all being "UNEXPECTED_KERNEL_MODE_TRAP. I have done some "research" (by that I mean googling) and lots of people say its Drivers. My system is fairly new...
BSOD Crashes and Debugging
BSOD Unexpected_kernel_mode_trap+system_check_exception+ several other
Hi, Been having several bsod-incidents after putting together my new windows 10 skylake gaming pc. So far I've had maybe 2 days of joy of gaming in the last month or so. After that two days of use, I started to experience bsod every now and then...
BSOD Crashes and Debugging
Our Sites
Site Links
About Us
Windows 10 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 10" and related materials are trademarks of Microsoft Corp.

Designer Media Ltd
All times are GMT -5. The time now is 00:55.
Find Us
Twitter Facebook Google+ Ten Forums iOS App Ten Forums Android App



Windows 10 Forums