Microsoft (R) Windows Debugger Version 10.0.10586.567 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\Users\mtrakal\Desktop\W7F_26-06-2016_verifier_enabled_new_graphic_driver\062616-11500-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Symbol Path validation summary **************
Response Time (ms) Location
Deferred SRV*C:\SymCache*http://msdl.microsoft.com/download/symbols
Symbol search path is: SRV*C:\SymCache*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 10 Kernel Version 10586 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 10586.420.amd64fre.th2_release_sec.160527-1834
Machine Name:
Kernel base = 0xfffff802`bf28c000 PsLoadedModuleList = 0xfffff802`bf56acf0
Debug session time: Sun Jun 26 23:15:24.840 2016 (UTC + 2:00)
System Uptime: 0 days 0:00:21.549
Loading Kernel Symbols
.
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
..............................................................
................................................................
.............................
Loading User Symbols
Loading unloaded module list
............
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff960f9d62012, ffffd000204a00d0, 0}
Probably caused by : hardware ( win32k!NtUserInternalGetWindowText+2 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff960f9d62012, Address of the instruction which caused the bugcheck
Arg3: ffffd000204a00d0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 10586.420.amd64fre.th2_release_sec.160527-1834
SYSTEM_MANUFACTURER: Gigabyte Technology Co., Ltd.
SYSTEM_PRODUCT_NAME: Z87X-D3H
SYSTEM_SKU: To be filled by O.E.M.
SYSTEM_VERSION: To be filled by O.E.M.
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: F9
BIOS_DATE: 08/25/2014
BASEBOARD_MANUFACTURER: Gigabyte Technology Co., Ltd.
BASEBOARD_PRODUCT: Z87X-D3H-CF
BASEBOARD_VERSION: x.x
DUMP_TYPE: 2
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff960f9d62012
BUGCHECK_P3: ffffd000204a00d0
BUGCHECK_P4: 0
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
FAULTING_IP:
win32k!NtUserInternalGetWindowText+2
fffff960`f9d62012 428700 xchg eax,dword ptr [rax]
CONTEXT: ffffd000204a00d0 -- (.cxr 0xffffd000204a00d0)
rax=0000000000000000 rbx=ffffe00150605240 rcx=00000000000201a2
rdx=0000009ac088f880 rsi=0000000000000000 rdi=0000000000000020
rip=fffff960f9d62012 rsp=ffffd000204a0af8 rbp=ffffd000204a0b80
r8=0000000000000100 r9=0000024242e0d600 r10=fffff960f9d62012
r11=0000009ac072b000 r12=0000024242e0d600 r13=0000024242e0d600
r14=0000024242e20920 r15=00000000000201a2
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246
win32k!NtUserInternalGetWindowText+0x2:
fffff960`f9d62012 428700 xchg eax,dword ptr [rax] ds:002b:00000000`00000000=????????
Resetting default scope
CPU_COUNT: 4
CPU_MHZ: c79
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 3c
CPU_STEPPING: 3
CPU_MICROCODE: 6,3c,3,0 (F,M,S,R) SIG: 1E'00000000 (cache) 1E'00000000 (init)
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: dwm.exe
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: MTRAKAL-DESKTOP
ANALYSIS_SESSION_TIME: 06-26-2016 23:33:08.0594
ANALYSIS_VERSION: 10.0.10586.567 amd64fre
MISALIGNED_IP:
win32k!NtUserInternalGetWindowText+2
fffff960`f9d62012 428700 xchg eax,dword ptr [rax]
LAST_CONTROL_TRANSFER: from fffff802bf3d90a3 to fffff960f9d62012
STACK_TEXT:
ffffd000`204a0af8 fffff802`bf3d90a3 : ffffe001`50605240 ffffe001`5027f3f0 00000000`00000020 00000000`00000004 : win32k!NtUserInternalGetWindowText+0x2
ffffd000`204a0b00 00007ff9`55b02d54 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
0000009a`c088f808 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`55b02d54
THREAD_SHA1_HASH_MOD_FUNC: 3d502dcdcf596f4e0d45adeb6e391483a76ba25c
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: ac13addbef0222e72a90feb8d00764d02e06f27a
THREAD_SHA1_HASH_MOD: 14def60f802f7024de106530d89d4e395d710f43
FOLLOWUP_IP:
win32k!NtUserInternalGetWindowText+2
fffff960`f9d62012 428700 xchg eax,dword ptr [rax]
FAULT_INSTR_CODE: 8742
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: win32k!NtUserInternalGetWindowText+2
FOLLOWUP_NAME: MachineOwner
IMAGE_NAME: hardware
DEBUG_FLR_IMAGE_TIMESTAMP: 0
IMAGE_VERSION: 10.0.10586.20
STACK_COMMAND: .cxr 0xffffd000204a00d0 ; kb
MODULE_NAME: hardware
FAILURE_BUCKET_ID: IP_MISALIGNED
BUCKET_ID: IP_MISALIGNED
PRIMARY_PROBLEM_CLASS: IP_MISALIGNED
TARGET_TIME: 2016-06-26T21:15:24.000Z
OSBUILD: 10586
OSSERVICEPACK: 0
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2016-05-28 05:59:07
BUILDDATESTAMP_STR: 160527-1834
BUILDLAB_STR: th2_release_sec
BUILDOSVER_STR: 10.0.10586.420.amd64fre.th2_release_sec.160527-1834
ANALYSIS_SESSION_ELAPSED_TIME: 39a
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:ip_misaligned
FAILURE_ID_HASH: {201b0e5d-db2a-63d2-77be-8ce8ff234750}
Followup: MachineOwner
---------