PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffffffffffff8c, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: ffffdd3b32469307, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
DUMP_TYPE: 2
BUGCHECK_P1: ffffffffffffff8c
BUGCHECK_P2: 0
BUGCHECK_P3: ffffdd3b32469307
BUGCHECK_P4: 2
READ_ADDRESS: fffff807197733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
ffffffffffffff8c
FAULTING_IP:
win32kfull!NtUserSetTimer+57
ffffdd3b`32469307 1a488b sbb cl,byte ptr [rax-75h]
MM_INTERNAL_CODE: 2
CPU_COUNT: 10
CPU_MHZ: e74
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 8
CPU_STEPPING: 2
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: explorer.exe
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 12-25-2019 12:30:36.0185
ANALYSIS_VERSION: 10.0.18362.1 x86fre
TRAP_FRAME: ffff8e87dcd588b0 -- (.trap 0xffff8e87dcd588b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000001 rbx=0000000000000000 rcx=0000000000000001
rdx=0000000000000080 rsi=0000000000000000 rdi=0000000000000000
rip=ffffdd3b32469307 rsp=ffff8e87dcd58a40 rbp=0000000000000000
r8=ffff9289d650c810 r9=0000000000000000 r10=fffff807192fa9c0
r11=ffff8e87dcd58a20 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
win32kfull!NtUserSetTimer+0x57:
ffffdd3b`32469307 1a488b sbb cl,byte ptr [rax-75h] ds:ffffffff`ffffff8c=??
Resetting default scope
MISALIGNED_IP:
win32kfull!NtUserSetTimer+57
ffffdd3b`32469307 1a488b sbb cl,byte ptr [rax-75h]
LAST_CONTROL_TRANSFER: from fffff807193e35d6 to fffff807193c14e0
STACK_TEXT:
ffff8e87`dcd58608 fffff807`193e35d6 : 00000000`00000050 ffffffff`ffffff8c 00000000`00000000 ffff8e87`dcd588b0 : nt!KeBugCheckEx
ffff8e87`dcd58610 fffff807`19272eef : 00000000`00000000 00000000`00000000 00000000`00000000 ffffffff`ffffff8c : nt!MiSystemFault+0x1d6866
ffff8e87`dcd58710 fffff807`193cf520 : 00000000`0001022c ffff8e87`dcd58930 c0590000`00000000 ffff8e87`dcd589d9 : nt!MmAccessFault+0x34f
ffff8e87`dcd588b0 ffffdd3b`32469307 : 00000000`00000001 00000000`0001022c 00000000`027aea58 00000000`00000001 : nt!KiPageFault+0x360
ffff8e87`dcd58a40 fffff807`193d3251 : 00000000`00000000 ffff8e87`dcd58b80 00000000`027aea58 ffff8e87`dcd58aa8 : win32kfull!NtUserSetTimer+0x57
ffff8e87`dcd58a90 00007ffb`7a5313a4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x2bc
00000000`027aea38 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`7a5313a4
THREAD_SHA1_HASH_MOD_FUNC: ee20e6f2829c1b10768cda3eaee23932f2c452a6
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 624f25c3c9c644b99e555fef6a7f3f59e4b24238
THREAD_SHA1_HASH_MOD: ae4bd38e9ba92a6f2c429b420c473de0b218cf72
FOLLOWUP_IP:
win32kfull!NtUserSetTimer+57
ffffdd3b`32469307 1a488b sbb cl,byte ptr [rax-75h]
FAULT_INSTR_CODE: 58b481a
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: win32kfull!NtUserSetTimer+57
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: hardware
IMAGE_NAME: hardware
DEBUG_FLR_IMAGE_TIMESTAMP: 0
IMAGE_VERSION: 10.0.18362.535
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: IP_MISALIGNED_win32kfull.sys
BUCKET_ID: IP_MISALIGNED_win32kfull.sys
PRIMARY_PROBLEM_CLASS: IP_MISALIGNED_win32kfull.sys
TARGET_TIME: 2019-12-25T02:15:38.000Z
OSBUILD: 18362
OSSERVICEPACK: 535
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1980-01-11 18:53:20
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 5468
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:ip_misaligned_win32kfull.sys
FAILURE_ID_HASH: {a4dbea1d-84d7-234f-0297-2512e5417445}
Followup: MachineOwner
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80616b00f62, Address of the instruction which caused the bugcheck
Arg3: fffffd860a18cad0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
DUMP_TYPE: 2
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff80616b00f62
BUGCHECK_P3: fffffd860a18cad0
BUGCHECK_P4: 0
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
nt!EtwpTrackBinaryForSession+5a
fffff806`16b00f62 8b4b10 mov ecx,dword ptr [rbx+10h]
CONTEXT: fffffd860a18cad0 -- (.cxr 0xfffffd860a18cad0)
rax=0000000000000064 rbx=ff0f988abf808460 rcx=00000000000000fe
rdx=ffffcc8598f1ac80 rsi=ffffcc8598f1adc0 rdi=0000000000000064
rip=fffff80616b00f62 rsp=fffffd860a18d4c0 rbp=ffffcc8598f1a9c0
r8=fffffd860a18d4c8 r9=0000000000000000 r10=0000000000000001
r11=ffff988ac163f460 r12=0000000000000200 r13=fffffd860a18d538
r14=0000000000000064 r15=ffffcc8598f1ac80
iopl=0 nv up ei ng nz na po cy
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00250287
nt!EtwpTrackBinaryForSession+0x5a:
fffff806`16b00f62 8b4b10 mov ecx,dword ptr [rbx+10h] ds:002b:ff0f988a`bf808470=????????
Resetting default scope
BUGCHECK_STR: 0x3B_c0000005
CPU_COUNT: 10
CPU_MHZ: e74
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 8
CPU_STEPPING: 2
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: NVIDIA Web Helper.exe
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 12-25-2019 12:30:32.0534
ANALYSIS_VERSION: 10.0.18362.1 x86fre
LAST_CONTROL_TRANSFER: from fffff806169d1ecf to fffff80616b00f62
STACK_TEXT:
fffffd86`0a18d4c0 fffff806`169d1ecf : ffffcc85`98f1a9c0 fffffd86`0a18d610 ffffcc85`98e741c8 00000000`00000000 : nt!EtwpTrackBinaryForSession+0x5a
fffffd86`0a18d510 fffff806`169b63a8 : ffffcc85`909f7b01 ffffcc85`909f7b01 fffffd86`0a18d838 ffffcc85`9e76bd50 : nt!EtwpProviderArrivalCallback+0x15c9db
fffffd86`0a18d790 fffff806`1681677d : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!EtwpAddRegEntryToGroup+0x19f268
fffffd86`0a18d8b0 fffff806`16816585 : 00000000`00000000 fffffd86`0a18db80 ffffcc85`9e76bd50 00000000`00000000 : nt!EtwpSetProviderTraitsCommon+0x1bd
fffffd86`0a18d960 fffff806`16819522 : ffffcc85`9e76bd50 00000000`0000001e 00000000`50777445 ffffcc85`9e76bd50 : nt!EtwpSetProviderTraitsUm+0x165
fffffd86`0a18d9e0 fffff806`163d3251 : ffffcc85`0000001e 00000000`0052dbd0 00000000`00000018 00000000`0052db58 : nt!NtTraceControl+0x312
fffffd86`0a18da90 00007ffc`3433f854 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x2bc
00000000`0043dd98 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`3433f854
THREAD_SHA1_HASH_MOD_FUNC: 5fbc9de7c1ccbf9e71a0735e661f859bc8c034db
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: e569e70d6e8ac5bb69412c2e27dd41a3c16b83bb
THREAD_SHA1_HASH_MOD: 30a3e915496deaace47137d5b90c3ecc03746bf6
FOLLOWUP_IP:
nt!EtwpTrackBinaryForSession+5a
fffff806`16b00f62 8b4b10 mov ecx,dword ptr [rbx+10h]
FAULT_INSTR_CODE: 49104b8b
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!EtwpTrackBinaryForSession+5a
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 12dcb470
IMAGE_VERSION: 10.0.18362.535
STACK_COMMAND: .cxr 0xfffffd860a18cad0 ; kb
BUCKET_ID_FUNC_OFFSET: 5a
FAILURE_BUCKET_ID: 0x3B_c0000005_nt!EtwpTrackBinaryForSession
BUCKET_ID: 0x3B_c0000005_nt!EtwpTrackBinaryForSession
PRIMARY_PROBLEM_CLASS: 0x3B_c0000005_nt!EtwpTrackBinaryForSession
TARGET_TIME: 2019-12-24T19:54:41.000Z
OSBUILD: 18362
OSSERVICEPACK: 535
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1980-01-11 18:53:20
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 7480
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x3b_c0000005_nt!etwptrackbinaryforsession
FAILURE_ID_HASH: {2a41ee62-3e9e-3fee-13f6-61f81377d3b0}
Followup: MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffffffa002f010, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff804587ebb91, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
DUMP_TYPE: 2
BUGCHECK_P1: ffffffffa002f010
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff804587ebb91
READ_ADDRESS: fffff80458b733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
ffffffffa002f010
CURRENT_IRQL: 2
FAULTING_IP:
nt!MiDeleteSystemPagableVm+1d0151
fffff804`587ebb91 488b4010 mov rax,qword ptr [rax+10h]
CPU_COUNT: 10
CPU_MHZ: e74
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 8
CPU_STEPPING: 2
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: WerFault.exe
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 12-25-2019 12:30:28.0512
ANALYSIS_VERSION: 10.0.18362.1 x86fre
TRAP_FRAME: fffff60cd7817710 -- (.trap 0xfffff60cd7817710)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffffffa002f000 rbx=0000000000000000 rcx=fffff80458a68c40
rdx=ffffffffa002f200 rsi=0000000000000000 rdi=0000000000000000
rip=fffff804587ebb91 rsp=fffff60cd78178a0 rbp=fffff60cd78179a0
r8=0000000000000001 r9=ffffffffa002f200 r10=0000007ffffffff8
r11=fffff00000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!MiDeleteSystemPagableVm+0x1d0151:
fffff804`587ebb91 488b4010 mov rax,qword ptr [rax+10h] ds:ffffffff`a002f010=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff804587d32e9 to fffff804587c14e0
STACK_TEXT:
fffff60c`d78175c8 fffff804`587d32e9 : 00000000`0000000a ffffffff`a002f010 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff60c`d78175d0 fffff804`587cf62b : 00000000`0000003e 00000000`000003e0 ffffc98a`af8f3780 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff60c`d7817710 fffff804`587ebb91 : fffff804`58a68c40 00000000`00000080 ffff85d9`41988000 00000000`00000000 : nt!KiPageFault+0x46b
fffff60c`d78178a0 fffff804`58657ab2 : 00000000`00000001 00000000`00001000 00000000`00001000 00000000`00001000 : nt!MiDeleteSystemPagableVm+0x1d0151
fffff60c`d7817a70 fffff804`5865798a : fffff804`58a6e988 fffff804`58a6e118 00000000`00000010 00000000`00000100 : nt!MmFreePoolMemory+0xf6
fffff60c`d7817b00 fffff804`586ed270 : fffff804`58a6e988 fffff804`58a6e118 00000000`00000010 00000003`28331000 : nt!RtlpHpEnvFreeVA+0x12
fffff60c`d7817b30 fffff804`586ecac6 : 00000000`01000000 ffffb283`31000000 00000000`00032278 00000000`00000000 : nt!RtlpHpVaMgrRangeFree+0x54
fffff60c`d7817b60 fffff804`5865796d : fffff804`58a6e128 fffff804`586e9966 00000000`00000000 fffff804`586ea828 : nt!RtlpHpVaMgrCtxFree+0x6a
fffff60c`d7817bc0 fffff804`586ed3c9 : 00000000`00000000 00000000`00000001 ffffb283`26b13470 00000000`00000000 : nt!RtlpHpFreeVA+0x89
fffff60c`d7817c00 fffff804`58646321 : ffffb283`22200000 ffffb283`31000000 ffffb283`22200000 00000000`00000040 : nt!RtlpHpLargeFree+0x145
fffff60c`d7817cb0 fffff804`5896f0a9 : ffffb283`00000000 ffffc98a`00000000 fffff60c`00000010 00000000`00000000 : nt!ExFreeHeapPool+0x7a1
fffff60c`d7817dd0 fffff804`58c2b472 : 00000000`0000002e fffff60c`d7817f00 00000000`00000000 ffffb283`256f0d40 : nt!ExFreePool+0x9
fffff60c`d7817e00 fffff804`58bf36e1 : fffff60c`d7818150 fffff60c`d7818940 ffffb283`2ccaa570 ffffb283`2ccaa570 : nt!CmpGetSymbolicLinkTarget+0x3c2
fffff60c`d7818050 fffff804`58bef2d4 : ffffc98a`0000001c fffff60c`d78183a0 fffff60c`d7818368 00000000`00000000 : nt!CmpDoParseKey+0x1e71
fffff60c`d78182f0 fffff804`58bed1bf : ffffc98a`ad772010 ffffb283`2ccaa501 00000000`00000000 00000000`00000001 : nt!CmpParseKey+0x274
fffff60c`d7818510 fffff804`58beb621 : ffffc98a`ad772000 fffff60c`d7818758 00000000`00000040 ffffc98a`a4efa980 : nt!ObpLookupObjectName+0x78f
fffff60c`d78186d0 fffff804`58bf4b3c : 00000000`00000001 00000000`00000000 00000000`00000000 ffffc98a`a4efa980 : nt!ObOpenObjectByNameEx+0x201
fffff60c`d7818810 fffff804`58bf49bd : 00000068`73efa980 fffff60c`d7818b80 00000000`00000001 00000000`00000001 : nt!ObOpenObjectByName+0x5c
fffff60c`d7818860 fffff804`58bf69df : 00000000`00000f34 00000000`00501802 00000068`73efa910 00000000`02000000 : nt!CmOpenKey+0x29d
fffff60c`d7818ac0 fffff804`587d3251 : ffffc98a`af8b6080 00000068`73eface8 fffff60c`d7818b80 ffffffff`ffffffff : nt!NtOpenKeyEx+0xf
fffff60c`d7818b00 00007ffc`5a99e414 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x2bc
00000068`73efa8a8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`5a99e414
THREAD_SHA1_HASH_MOD_FUNC: e42b0de1f95003ce0f022ba8b43f6e278ac0d6a7
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: d8836c7bd3546fc51fdaa2ba311bf1465dfd12e0
THREAD_SHA1_HASH_MOD: 7c2b727fe0ab8515945a4d96a0f6fa917ccf2d6e
FOLLOWUP_IP:
nt!ExFreePool+9
fffff804`5896f0a9 4883c428 add rsp,28h
FAULT_INSTR_CODE: 28c48348
SYMBOL_STACK_INDEX: b
SYMBOL_NAME: nt!ExFreePool+9
FOLLOWUP_NAME: Pool_corruption
IMAGE_NAME: Pool_Corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
IMAGE_VERSION: 10.0.18362.535
MODULE_NAME: Pool_Corruption
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 9
FAILURE_BUCKET_ID: AV_nt!ExFreePool
BUCKET_ID: AV_nt!ExFreePool
PRIMARY_PROBLEM_CLASS: AV_nt!ExFreePool
TARGET_TIME: 2019-12-24T17:56:47.000Z
OSBUILD: 18362
OSSERVICEPACK: 535
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1980-01-11 18:53:20
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 9fd1
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_nt!exfreepool
FAILURE_ID_HASH: {2ae0a97e-dcd7-47ef-dbfb-430f2cbf58a1}
Followup: Pool_corruption
---------
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff807718279c3, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
DUMP_TYPE: 2
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff807718279c3
BUGCHECK_P3: 0
BUGCHECK_P4: ffffffffffffffff
READ_ADDRESS: fffff80771d733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
ffffffffffffffff
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
nt!KeIntSteerSnapPerf+c3
fffff807`718279c3 4d8b22 mov r12,qword ptr [r10]
EXCEPTION_PARAMETER2: ffffffffffffffff
BUGCHECK_STR: 0x1E_c0000005_R
CPU_COUNT: 10
CPU_MHZ: e74
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 8
CPU_STEPPING: 2
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: aswidsagent.exe
CURRENT_IRQL: 2
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 12-25-2019 12:30:24.0845
ANALYSIS_VERSION: 10.0.18362.1 x86fre
DPC_STACK_BASE: FFFF8B8D314A0FB0
EXCEPTION_RECORD: ffffc88e3072b620 -- (.exr 0xffffc88e3072b620)
ExceptionAddress: 0000000000000001
ExceptionCode: 3071bd10
ExceptionFlags: ffffc88e
NumberParameters: 1
Parameter[0]: 0000020000000004
LAST_CONTROL_TRANSFER: from fffff80771aa653e to fffff807719c14e0
STACK_TEXT:
ffff8b8d`3149f498 fffff807`71aa653e : 00000000`0000001e ffffffff`c0000005 fffff807`718279c3 00000000`00000000 : nt!KeBugCheckEx
ffff8b8d`3149f4a0 fffff807`719ca312 : fffff807`71d11000 fffff807`71800000 0005e548`00ab6000 00000000`0010001f : nt!KiFatalExceptionHandler+0x22
ffff8b8d`3149f4e0 fffff807`718c2fa5 : 00000000`00000000 00000000`00000000 ffff8b8d`3149fa50 00007fff`ffff0000 : nt!RtlpExecuteHandlerForException+0x12
ffff8b8d`3149f510 fffff807`718c753e : ffff8b8d`314a0448 ffff8b8d`314a0190 ffff8b8d`314a0448 00000000`00000000 : nt!RtlDispatchException+0x4a5
ffff8b8d`3149fc60 fffff807`719d341d : ffffc88e`3072b620 00000020`00000000 00000000`00000000 fffff807`73734922 : nt!KiDispatchException+0x16e
ffff8b8d`314a0310 fffff807`719cf1a2 : 00000000`00000001 fffff807`74449402 00000000`00000000 ffff8d81`830a6ef0 : nt!KiExceptionDispatch+0x11d
ffff8b8d`314a04f0 fffff807`718279c3 : 00000002`4224599a 00000000`00192d92 fffff807`71c3b580 00000000`00000000 : nt!KiGeneralProtectionFault+0x322
ffff8b8d`314a0680 fffff807`71827064 : ffff8d81`82b1df80 ffffc88e`2e8fe490 00000000`00000002 00000000`00000e74 : nt!KeIntSteerSnapPerf+0xc3
ffff8b8d`314a06f0 fffff807`71904b80 : fffff807`71c3b580 ffff8d81`82b1b180 00000000`00000000 ffff8d81`82b1b180 : nt!PpmParkSteerInterrupts+0x104
ffff8b8d`314a0bb0 fffff807`7186ae95 : ffff8d81`82b1df80 ffff8b8d`314a0d40 ffff8d81`82b20f90 ffff8d81`82b1b180 : nt!PpmCheckRun+0x40
ffff8b8d`314a0c40 fffff807`7186a4ef : 00000000`00000018 00000000`00989680 00000000`00007fe8 00000000`00000000 : nt!KiExecuteAllDpcs+0x305
ffff8b8d`314a0d80 fffff807`719c8525 : 00650067`0061006e ffff8d81`82b1b180 00000000`00000000 00000000`00000001 : nt!KiRetireDpcList+0x1ef
ffff8b8d`314a0fb0 fffff807`719c8310 : 00000000`00296867 000000e9`37fff700 00000000`00000ffd 00000000`00296867 : nt!KxRetireDpcList+0x5
ffff8b8d`35316ad0 fffff807`719c79e0 : 00000000`0005000d ffff8b8d`35316b80 ffffc88e`2ccaac00 00000000`00000000 : nt!KiDispatchInterruptContinue
ffff8b8d`35316b00 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDpcInterrupt+0x2f0
THREAD_SHA1_HASH_MOD_FUNC: 4a597e3f3543ea22626bcebe8b41dd24ea30f194
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: cae4fd72ee7fb3a5b1f6ce49e364d7065e5661c2
THREAD_SHA1_HASH_MOD: 38bc5fec3f0409c265cf5c87da6f8f8859d0711c
FOLLOWUP_IP:
nt!KeIntSteerSnapPerf+c3
fffff807`718279c3 4d8b22 mov r12,qword ptr [r10]
FAULT_INSTR_CODE: 4d228b4d
SYMBOL_STACK_INDEX: 7
SYMBOL_NAME: nt!KeIntSteerSnapPerf+c3
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 12dcb470
IMAGE_VERSION: 10.0.18362.535
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: c3
FAILURE_BUCKET_ID: 0x1E_c0000005_R_nt!KeIntSteerSnapPerf
BUCKET_ID: 0x1E_c0000005_R_nt!KeIntSteerSnapPerf
PRIMARY_PROBLEM_CLASS: 0x1E_c0000005_R_nt!KeIntSteerSnapPerf
TARGET_TIME: 2019-12-24T14:21:48.000Z
OSBUILD: 18362
OSSERVICEPACK: 535
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1980-01-11 18:53:20
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 768e
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x1e_c0000005_r_nt!keintsteersnapperf
FAILURE_ID_HASH: {ae8dc8d7-2ea8-02ca-d8fb-3f44cdce68c3}
Followup: MachineOwner
---------