I looked at six of the dumps. All six point to hardware issues. Five of these indicate memory corruption. One blames Direct X and Monitor Manager. The longest up time before crashing was 40 seconds.
You can read the usual causes of these errors in the links below.
Error code 3B, SYSTEM_SERVICE_EXCEPTION - BSOD Index
Error code BE, ATTEMPTED_WRITE_TO_READONLY_MEMORY - BSOD Index
Error code 1A, MEMORY_MANAGEMENT - BSOD Index
Error code 50, PAGE_FAULT_IN_NONPAGED_AREA - BSOD Index
Have you overclocked anything? If so, return all OC to default values.
I suggest that you run Memtest to test your ram; run Prime to test your CPU and RAM; and run Furmark to test your graphics card. Check the tutorials below.
RAM - Test with Memtest86+
https://www.sevenforums.com/tutorials...t-prime95.html
Video Card - Stress Test with Furmark
I will also ask the hardware guys to look at this thread. I am, by no means, a hardware expert.
Please post the results of each of these tests.
Code:
Kernel base = 0xfffff800`02e51000 PsLoadedModuleList = 0xfffff800`0308ee50
Debug session time: Sat Sep 25 07:03:47.358 2010 (GMT-4)
System Uptime: 0 days 0:00:40.840
Loading Kernel Symbols
...............................................................
................................................................
....................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff8000319d74d, fffff880088a8770, 0}
Probably caused by : ntkrnlmp.exe ( nt!CmpKcbCacheLookup+1dd )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8000319d74d, Address of the exception record for the exception that caused the bugcheck
Arg3: fffff880088a8770, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
nt!CmpKcbCacheLookup+1dd
fffff800`0319d74d 418b45f4 mov eax,dword ptr [r13-0Ch]
CONTEXT: fffff880088a8770 -- (.cxr 0xfffff880088a8770)
rax=0000000000000005 rbx=0000000000000000 rcx=000000000000004b
rdx=0000000000000019 rsi=fffff8a001e62a18 rdi=fffff880088a9350
rip=fffff8000319d74d rsp=fffff880088a9140 rbp=fffff8a001e62420
r8=0000000000000009 r9=0000000000000000 r10=0000000000000014
r11=fffff880088a92d8 r12=fffff8a00260d948 r13=f7fff8a002672140
r14=0000000000000005 r15=0000000000000001
iopl=0 nv up ei ng nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010282
nt!CmpKcbCacheLookup+0x1dd:
fffff800`0319d74d 418b45f4 mov eax,dword ptr [r13-0Ch] ds:002b:f7fff8a0`02672134=????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: AVGIDSAgent.ex
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff8000319d74d
STACK_TEXT:
fffff880`088a9140 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!CmpKcbCacheLookup+0x1dd
FOLLOWUP_IP:
nt!CmpKcbCacheLookup+1dd
fffff800`0319d74d 418b45f4 mov eax,dword ptr [r13-0Ch]
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!CmpKcbCacheLookup+1dd
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
STACK_COMMAND: .cxr 0xfffff880088a8770 ; kb
FAILURE_BUCKET_ID: X64_0x3B_nt!CmpKcbCacheLookup+1dd
BUCKET_ID: X64_0x3B_nt!CmpKcbCacheLookup+1dd
Followup: MachineOwner
---------
Kernel base = 0xfffff800`02e16000 PsLoadedModuleList = 0xfffff800`03053e50
Debug session time: Fri Sep 24 17:41:51.207 2010 (GMT-4)
System Uptime: 0 days 0:00:18.316
Loading Kernel Symbols
...............................................................
................................................................
.
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck BE, {fffff8800404f478, 800000011708b121, fffff88004da3100, b}
Probably caused by : dxgkrnl.sys ( dxgkrnl!MONITOR_MGR::_GetMonitorInstance+cb )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
ATTEMPTED_WRITE_TO_READONLY_MEMORY (be)
An attempt was made to write to readonly memory. The guilty driver is on the
stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: fffff8800404f478, Virtual address for the attempted write.
Arg2: 800000011708b121, PTE contents.
Arg3: fffff88004da3100, (reserved)
Arg4: 000000000000000b, (reserved)
Debugging Details:
------------------
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xBE
PROCESS_NAME: csrss.exe
CURRENT_IRQL: 0
TRAP_FRAME: fffff88004da3100 -- (.trap 0xfffff88004da3100)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000001 rbx=0000000000000000 rcx=fffffa80058eed98
rdx=0000000000100100 rsi=0000000000000000 rdi=0000000000000000
rip=fffff880041155b7 rsp=fffff88004da3290 rbp=0000000000100100
r8=0000000000000000 r9=fffff88004da3340 r10=0000000000000000
r11=fffff88001873120 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
dxgkrnl!MONITOR_MGR::_GetMonitorInstance+0xcb:
fffff880`041155b7 ff15bb9ef3ff call qword ptr [dxgkrnl!_imp_KeAcquireGuardedMutex (fffff880`0404f478)] ds:fffff880`0404f478={nt!KeAcquireGuardedMutex (fffff800`02e9d920)}
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002f06ae2 to fffff80002e86740
STACK_TEXT:
fffff880`04da2f98 fffff800`02f06ae2 : 00000000`000000be fffff880`0404f478 80000001`1708b121 fffff880`04da3100 : nt!KeBugCheckEx
fffff880`04da2fa0 fffff800`02e8482e : 00000000`00000001 fffffa80`058eed98 fffff6fb`7dbf1000 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x4237e
fffff880`04da3100 fffff880`041155b7 : 00000000`0000000f 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x16e
fffff880`04da3290 fffff880`04111d9f : 00000000`00100100 00000000`00100100 fffffa80`05b71000 00000000`00000001 : dxgkrnl!MONITOR_MGR::_GetMonitorInstance+0xcb
fffff880`04da32e0 fffff880`040d50e1 : 00000000`00000000 00000000`fffff8fb 00000000`00100100 00000000`00000000 : dxgkrnl!MonitorGetMonitorHandle+0x143
fffff880`04da3340 fffff880`040d5f58 : 00000000`00000010 00000000`ffffffff 00000000`00000000 00000000`00000000 : dxgkrnl!VIDPN_MGR::OnMonitorConnectionChanged+0x13d
fffff880`04da33b0 fffff880`04115d6c : fffffa80`058eedd0 00000000`00000001 fffff8a0`01ce3c00 fffffa80`04e045d0 : dxgkrnl!VIDPN_MGR::_MonitorEventHandler+0x6ec
fffff880`04da3410 fffff880`041132e7 : fffffa80`058eecf0 00000000`00100100 00000000`00000001 00000000`00000001 : dxgkrnl!MONITOR_MGR::_IssueMonitorEvent+0x130
fffff880`04da3470 fffff880`041108e8 : fffffa80`04e045d0 fffffa80`05b71000 fffffa80`05b71000 00000000`00000005 : dxgkrnl!MONITOR_MGR::_HandleCreatePhysicalMonitor+0xcf
fffff880`04da34f0 fffff880`040c1cdf : fffffa80`00000000 fffffa80`fffffdda fffffa80`04e04480 00000000`00000700 : dxgkrnl!MonitorCreatePhysicalMonitor+0x13c
fffff880`04da3570 fffff880`040c36fe : fffffa80`04e04480 fffffa80`04e045d0 00000000`00100100 fffffa80`04e04480 : dxgkrnl!DpiPdoAddPdo+0x567
fffff880`04da3610 fffff880`040bf338 : fffffa80`04e04480 00000000`00000000 fffffa80`04e045d0 00000000`00000001 : dxgkrnl!DpiPdoHandleChildConnectionChange+0xce
fffff880`04da3660 fffff880`040bf089 : fffffa80`05b6e000 00000000`00000000 fffffa80`04e045d0 00000000`00000000 : dxgkrnl!DpiFdoInvalidateChildStatus+0xc4
fffff880`04da36c0 fffff880`040bbf1c : fffffa80`04e045d0 fffffa80`04e045d0 00000000`00000002 fffffa80`04e045d0 : dxgkrnl!DpiFdoInvalidateChildRelations+0x189
fffff880`04da37a0 fffff880`040bff70 : fffffa80`00000040 fffffa80`04e045d0 fffffa80`04e04480 00000000`00000000 : dxgkrnl!DpiFdoCreateRelatedObjects+0x48
fffff880`04da37d0 fffff880`040c033d : 00000000`00000000 fffffa80`04e045d0 fffff880`04da3c00 00000000`00000000 : dxgkrnl!DpiFdoStartAdapter+0x6b8
fffff880`04da3a20 fffff880`040b8503 : 000007fe`00000000 fffff8a0`01ca84d0 fffff880`04da3ca0 00000000`00000000 : dxgkrnl!DpiFdoStartAdapterThread+0x121
fffff880`04da3a80 fffff880`0187625a : 00000000`000001b4 fffff880`01873510 00000000`00000000 00000000`000007ff : dxgkrnl!DpiSessionCreateCallback+0x1b
fffff880`04da3ab0 fffff880`01876106 : 00000000`00000000 00000000`00000044 fffffa80`04f61730 00000000`00000001 : watchdog!SMgrSessionOpen+0xc6
fffff880`04da3af0 fffff960`000154ec : fffffa80`04f61730 fffff880`04da3ca0 00000000`00000044 fffffa80`04a7dca0 : watchdog!SMgrNotifySessionChange+0x22
fffff880`04da3b30 fffff960`00015814 : fffffa80`04f61730 fffffa80`04f61730 fffffa80`04f61730 000007fe`fd0de740 : win32k!InitializeGreCSRSS+0x20
fffff880`04da3be0 fffff800`02e85993 : fffffa80`037b8060 00000000`001f0003 00000000`00000007 fffff880`04da3c01 : win32k!NtUserInitialize+0xa0
fffff880`04da3c20 000007fe`fd0733da : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`002cf488 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7fe`fd0733da
STACK_COMMAND: kb
FOLLOWUP_IP:
dxgkrnl!MONITOR_MGR::_GetMonitorInstance+cb
fffff880`041155b7 ff15bb9ef3ff call qword ptr [dxgkrnl!_imp_KeAcquireGuardedMutex (fffff880`0404f478)]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: dxgkrnl!MONITOR_MGR::_GetMonitorInstance+cb
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: dxgkrnl
IMAGE_NAME: dxgkrnl.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4ac5509e
FAILURE_BUCKET_ID: X64_0xBE_dxgkrnl!MONITOR_MGR::_GetMonitorInstance+cb
BUCKET_ID: X64_0xBE_dxgkrnl!MONITOR_MGR::_GetMonitorInstance+cb
Followup: MachineOwner
---------
Kernel base = 0xfffff800`02e51000 PsLoadedModuleList = 0xfffff800`0308ee50
Debug session time: Sat Sep 25 07:02:19.688 2010 (GMT-4)
System Uptime: 0 days 0:01:17.796
Loading Kernel Symbols
...............................................................
................................................................
......................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1A, {41790, fffffa8000af68f0, ffff, 0}
Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+33906 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041790, The subtype of the bugcheck.
Arg2: fffffa8000af68f0
Arg3: 000000000000ffff
Arg4: 0000000000000000
Debugging Details:
------------------
BUGCHECK_STR: 0x1a_41790
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: WerFault.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff80002f34f9e to fffff80002ec1740
STACK_TEXT:
fffff880`0b9df828 fffff800`02f34f9e : 00000000`0000001a 00000000`00041790 fffffa80`00af68f0 00000000`0000ffff : nt!KeBugCheckEx
fffff880`0b9df830 fffff800`02ef4df9 : 00000000`00000000 000007fe`fb4affff fffffa80`00000000 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x33906
fffff880`0b9df9f0 fffff800`031da1d0 : fffffa80`068ce820 0007ffff`00000000 00000000`00000000 00000000`00000000 : nt!MiRemoveMappedView+0xd9
fffff880`0b9dfb10 fffff800`031da5db : 00000000`00000000 000007fe`fb390000 fffffa80`00000001 fffffa80`05fb64e0 : nt!MiUnmapViewOfSection+0x1b0
fffff880`0b9dfbd0 fffff800`02ec0993 : fffffa80`068e4120 fffff880`0b9dfca0 fffffa80`04d68810 00000000`00000000 : nt!NtUnmapViewOfSection+0x5f
fffff880`0b9dfc20 00000000`7763015a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0012a668 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7763015a
STACK_COMMAND: kb
FOLLOWUP_IP:
nt! ?? ::FNODOBFM::`string'+33906
fffff800`02f34f9e cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+33906
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
FAILURE_BUCKET_ID: X64_0x1a_41790_nt!_??_::FNODOBFM::_string_+33906
BUCKET_ID: X64_0x1a_41790_nt!_??_::FNODOBFM::_string_+33906
Followup: MachineOwner
---------
System Uptime: 0 days 0:00:31.231
Loading Kernel Symbols
...............................................................
................................................................
...................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 50, {fffff89fc52d83a5, 1, fffff88010b9adae, 5}
Could not read faulting driver name
Probably caused by : memory_corruption
Followup: memory_corruption
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffff89fc52d83a5, memory referenced.
Arg2: 0000000000000001, value 0 = read operation, 1 = write operation.
Arg3: fffff88010b9adae, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000005, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800030c60e0
fffff89fc52d83a5
FAULTING_IP:
dxgkrnl!BTL_TOPOLOGY_CONSTRUCTOR::_ANCHOR_INFO::_FindAnchorAdaptersCallback+556
fffff880`10b9adae f3ff8bc54883c4 rep dec dword ptr [rbx-3B7CB73Bh]
MM_INTERNAL_CODE: 5
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
BUGCHECK_STR: 0x50
PROCESS_NAME: nvvsvc.exe
CURRENT_IRQL: 0
TRAP_FRAME: fffff880060f40b0 -- (.trap 0xfffff880060f40b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000028 rbx=0000000000000000 rcx=0000000000002611
rdx=fffff88002f70000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88010b9adae rsp=fffff880060f4240 rbp=0000000000000000
r8=0000000000013088 r9=0000000000000150 r10=fffff80002e1e000
r11=000000000000079d r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
dxgkrnl!BTL_TOPOLOGY_CONSTRUCTOR::_ANCHOR_INFO::_FindAnchorAdaptersCallback+0x556:
fffff880`10b9adae f3ff8bc54883c4 rep dec dword ptr [rbx-3B7CB73Bh] ds:0cd0:ffffffff`c48348c5=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002f0d8c1 to fffff80002e8e740
STACK_TEXT:
fffff880`060f3f48 fffff800`02f0d8c1 : 00000000`00000050 fffff89f`c52d83a5 00000000`00000001 fffff880`060f40b0 : nt!KeBugCheckEx
fffff880`060f3f50 fffff800`02e8c82e : 00000000`00000001 fffff8a0`00aa3ae0 fffff8a0`018d7800 fffffa80`00000798 : nt! ?? ::FNODOBFM::`string'+0x40e8b
fffff880`060f40b0 fffff880`10b9adae : fffff8a0`fffff833 fffff8a0`00aa3ae0 fffff8a0`00b24e80 fffff8a0`06b6b1f0 : nt!KiPageFault+0x16e
fffff880`060f4240 fffff880`10b9fc7b : 00000000`00000002 fffffa80`00000000 fffff880`00000000 fffff880`10af8906 : dxgkrnl!BTL_TOPOLOGY_CONSTRUCTOR::_ANCHOR_INFO::_FindAnchorAdaptersCallback+0x556
fffff880`060f4300 fffff880`10b29b5d : fffffa80`05c99000 fffffa80`04da11a8 fffffa80`05c99000 fffff880`10b9fa71 : dxgkrnl!CCD_BTL::_FillTopology+0x13cf
fffff880`060f4360 fffff880`10b9a82e : fffff880`060f4440 00000000`00000002 fffff880`060f48d0 00000000`129b2731 : dxgkrnl!DXGGLOBAL::IterateAdaptersWithCallback+0x71
fffff880`060f43c0 fffff880`10b92bf6 : fffffa80`05c99000 fffff880`060f44e0 ffff0000`16a1d17b fffffa80`04da1168 : dxgkrnl!BTL_TOPOLOGY_CONSTRUCTOR::_ANCHOR_INFO::_Query+0x9a
fffff880`060f4420 fffff880`10b8f41f : fffff880`060f4630 00000000`00000002 00000000`00000000 00000000`00000000 : dxgkrnl!CCD_TOPOLOGY::QueryTopologyClass+0x92
fffff880`060f44c0 fffff880`10b8f369 : fffff880`060f4630 00000000`00000002 00000000`00000000 00000000`00000000 : dxgkrnl!CCD_RECENT_TOPOLOGY_RETRIEVER::LoadByTopologySetId+0xa3
fffff880`060f4500 fffff880`10b91da7 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff880`10b8f494 : dxgkrnl!CCD_RECENT_TOPOLOGY_RETRIEVER::LoadByConnectedSetId+0x7d
fffff880`060f4540 fffff880`10b413bf : 00000000`0000000f 00000000`0000000f 00000000`00000000 fffff880`060f4950 : dxgkrnl!CCD_TOPOLOGY::RetrievePersisted+0x333
fffff880`060f47c0 fffff880`10b42250 : fffff900`c078eb50 fffff900`c078eb50 fffff880`060f4a20 00000000`00000000 : dxgkrnl!DxgkGetPathsModality+0x337
fffff880`060f4930 fffff880`10b42338 : fffff900`c078eb50 fffff880`060f4bb0 00000000`c0000023 fffff880`060f4c38 : dxgkrnl!GetRequestedPathsModality+0xdc
fffff880`060f49c0 fffff960`0028dbc6 : 00000000`79737355 fffff880`060f4ae8 00000000`00000001 00000000`00000002 : dxgkrnl!DxgkQueryDisplayConfig+0x90
fffff880`060f4a20 fffff960`001b0d37 : 00000000`ffffc84a fffff880`060f4bb0 00000000`00000004 fffff800`02e9a772 : win32k!DrvQueryDisplayConfig+0x132
fffff880`060f4ab0 fffff800`02e8d993 : 00000000`00000001 fffffa80`05926060 00000000`01165290 00000000`017c4ba8 : win32k!NtUserQueryDisplayConfig+0x293
fffff880`060f4bb0 00000000`76b5729a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`017c4b88 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x76b5729a
STACK_COMMAND: kb
CHKIMG_EXTENSION: !chkimg -lo 50 -d !dxgkrnl
fffff88010b9ada7 - dxgkrnl!BTL_TOPOLOGY_CONSTRUCTOR::_ANCHOR_INFO::_FindAnchorAdaptersCallback+54f
[ 8b:83 ]
1 error : !dxgkrnl (fffff88010b9ada7)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: ONE_BIT
FAILURE_BUCKET_ID: X64_MEMORY_CORRUPTION_ONE_BIT
BUCKET_ID: X64_MEMORY_CORRUPTION_ONE_BIT
Followup: memory_corruption
---------