KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8038d1b62cd, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 17134.1.amd64fre.rs4_release.180410-1804
SYSTEM_MANUFACTURER: Gigabyte Technology Co., Ltd.
SYSTEM_PRODUCT_NAME: AX370-Gaming 5
SYSTEM_SKU: Default string
SYSTEM_VERSION: Default string
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: F23
BIOS_DATE: 08/08/2018
BASEBOARD_MANUFACTURER: Gigabyte Technology Co., Ltd.
BASEBOARD_PRODUCT: AX370-Gaming 5
BASEBOARD_VERSION: Default string
DUMP_TYPE: 2
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff8038d1b62cd
BUGCHECK_P3: 0
BUGCHECK_P4: ffffffffffffffff
READ_ADDRESS: fffff8038d452388: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
ffffffffffffffff
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
nt!SwapContext+2bd
fffff803`8d1b62cd 0fc719 xrstors [rcx]
EXCEPTION_PARAMETER2: ffffffffffffffff
BUGCHECK_STR: 0x1E_c0000005_R
CPU_COUNT: 10
CPU_MHZ: e6d
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 1
CPU_STEPPING: 1
BLACKBOXBSD: 1 (!blackboxbsd)
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: dllhost.exe
CURRENT_IRQL: 2
ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5
ANALYSIS_SESSION_TIME: 01-28-2019 20:45:01.0265
ANALYSIS_VERSION: 10.0.18303.1000 amd64fre
EXCEPTION_RECORD: 000000000000027f -- (.exr 0x27f)
Cannot read Exception record @ 000000000000027f
LAST_CONTROL_TRANSFER: from fffff8038d0c59ad to fffff8038d1af0a0
STACK_TEXT:
ffffb68c`f1644958 fffff803`8d0c59ad : 00000000`0000001e ffffffff`c0000005 fffff803`8d1b62cd 00000000`00000000 : nt!KeBugCheckEx
ffffb68c`f1644960 fffff803`8d1bfd42 : 00000000`0000027f 00000000`00000000 00000000`00000000 0002ffff`00001f80 : nt!KiDispatchException+0x58d
ffffb68c`f1645010 fffff803`8d1bc49c : 00005c00`00000000 00000600`00000000 0000f300`00000000 0000f800`00000000 : nt!KiExceptionDispatch+0xc2
ffffb68c`f16451f0 fffff803`8d1b62cd : ffff3f80`1a421180 ffff3a80`1a431400 0000fc00`00000000 00001800`00000000 : nt!KiGeneralProtectionFault+0x2dc
ffffb68c`f1645380 fffff303`8d1b5d46 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!SwapContext+0x2bd
ffffb68c`f16453c0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000001 : 0xfffff303`8d1b5d46
THREAD_SHA1_HASH_MOD_FUNC: 4bafef5224e4e4de236896b191e27930d24dfadd
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 229db4d9976b182062648040fdf70dd1cd9b8fe2
THREAD_SHA1_HASH_MOD: f08ac56120cad14894587db086f77ce277bfae84
FOLLOWUP_IP:
nt!SwapContext+2bd
fffff803`8d1b62cd 0fc719 xrstors [rcx]
FAULT_INSTR_CODE: eb19c70f
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: nt!SwapContext+2bd
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 5c2b0c3d
IMAGE_VERSION: 10.0.17134.523
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 2bd
FAILURE_BUCKET_ID: 0x1E_c0000005_R_nt!SwapContext
BUCKET_ID: 0x1E_c0000005_R_nt!SwapContext
PRIMARY_PROBLEM_CLASS: 0x1E_c0000005_R_nt!SwapContext
TARGET_TIME: 2019-01-27T14:38:00.000Z
OSBUILD: 17134
OSSERVICEPACK: 523
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2019-01-01 09:44:13
BUILDDATESTAMP_STR: 180410-1804
BUILDLAB_STR: rs4_release
BUILDOSVER_STR: 10.0.17134.1.amd64fre.rs4_release.180410-1804
ANALYSIS_SESSION_ELAPSED_TIME: 11df2
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x1e_c0000005_r_nt!swapcontext
FAILURE_ID_HASH: {0538fb4b-ed77-9787-a8df-20ada630ff74}
Followup: MachineOwner
---------
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: fffff700000a2040
Arg3: 0000360000000000
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 17134.1.amd64fre.rs4_release.180410-1804
SYSTEM_MANUFACTURER: Gigabyte Technology Co., Ltd.
SYSTEM_PRODUCT_NAME: AX370-Gaming 5
SYSTEM_SKU: Default string
SYSTEM_VERSION: Default string
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: F23
BIOS_DATE: 08/08/2018
BASEBOARD_MANUFACTURER: Gigabyte Technology Co., Ltd.
BASEBOARD_PRODUCT: AX370-Gaming 5
BASEBOARD_VERSION: Default string
DUMP_TYPE: 2
BUGCHECK_P1: 41792
BUGCHECK_P2: fffff700000a2040
BUGCHECK_P3: 360000000000
BUGCHECK_P4: 0
BUGCHECK_STR: 0x1a_41792
CPU_COUNT: 10
CPU_MHZ: e6d
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 1
CPU_STEPPING: 1
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXPNP: 1 (!blackboxpnp)
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: BroCrashRep
CURRENT_IRQL: 2
ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5
ANALYSIS_SESSION_TIME: 01-28-2019 20:45:03.0681
ANALYSIS_VERSION: 10.0.18303.1000 amd64fre
LAST_CONTROL_TRANSFER: from fffff8008def085a to fffff8008e0490a0
STACK_TEXT:
ffff9e8b`3583df98 fffff800`8def085a : 00000000`0000001a 00000000`00041792 fffff700`000a2040 00003600`00000000 : nt!KeBugCheckEx
ffff9e8b`3583dfa0 fffff800`8deed6d9 : 00000000`00000000 00003600`00000000 00000000`00000000 00000000`00000000 : nt!MiDeleteVa+0x15ba
ffff9e8b`3583e0c0 fffff800`8deedae2 : ffff9e8b`3583e690 fffff700`000a2040 ffff9e8b`00000000 ffff9e8b`00000000 : nt!MiWalkPageTablesRecursively+0x299
ffff9e8b`3583e1a0 fffff800`8deedae2 : ffff9e8b`3583e690 fffff77b`80000510 ffff9e8b`00000001 ffff9e8b`00000000 : nt!MiWalkPageTablesRecursively+0x6a2
ffff9e8b`3583e280 fffff800`8deedae2 : ffff9e8b`3583e690 fffff77b`bdc00000 ffff9e8b`00000002 ffff9e8b`00000000 : nt!MiWalkPageTablesRecursively+0x6a2
ffff9e8b`3583e360 fffff800`8deeb7e7 : ffff9e8b`3583e690 fffff77b`bddee000 ffff851c`00000003 ffffb405`00000000 : nt!MiWalkPageTablesRecursively+0x6a2
ffff9e8b`3583e440 fffff800`8ded5ef3 : ffff9e8b`3583e690 ffffb405`00000001 ffffb405`00000000 ffffb405`00000000 : nt!MiWalkPageTables+0x1e7
ffff9e8b`3583e530 fffff800`8e358b65 : ffffb405`de794700 ffffb405`00000000 ffffb405`d46324d0 ffffb405`de794700 : nt!MiDeleteVad+0x8d3
ffff9e8b`3583e860 fffff800`8e358987 : ffffb405`dc863100 ffffb405`dc863100 ffffb405`d46324d0 ffffb405`d43a2980 : nt!MiCleanVad+0x4d
ffff9e8b`3583e890 fffff800`8e346339 : ffffffff`00000000 ffffffff`ffffffff ffff9e8b`3583eb01 ffffb405`d43a2480 : nt!MmCleanProcessAddressSpace+0x11f
ffff9e8b`3583e910 fffff800`8e354d8c : ffffb405`d43a2480 ffffa00b`55516060 ffff9e8b`3583eb80 00000000`00000000 : nt!PspRundownSingleProcess+0x129
ffff9e8b`3583e990 fffff800`8e419c8b : 00000000`00000000 ffff9e8b`3583eb01 00000000`004ed000 ffffb405`de794700 : nt!PspExitThread+0x5ac
ffff9e8b`3583ea90 fffff800`8e059743 : ffffb405`00001338 ffffb405`de794700 ffffb405`d43a2480 00000000`00000000 : nt!NtTerminateProcess+0xeb
ffff9e8b`3583eb00 00007ffb`99aaaf24 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`003bf5c8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`99aaaf24
THREAD_SHA1_HASH_MOD_FUNC: efc1eb0d927f56954ae38ab97099bbcdaa5c8f3b
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: fb06e88b485fe33f0d970a4c0981ae0fb682abd0
THREAD_SHA1_HASH_MOD: 7f608ac2fbce9034a3386b1d51652e4911d30234
FOLLOWUP_IP:
nt!MiDeleteVa+15ba
fffff800`8def085a cc int 3
FAULT_INSTR_CODE: c38b4ccc
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!MiDeleteVa+15ba
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 5c2b0c3d
IMAGE_VERSION: 10.0.17134.523
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: memory_corruption
BUCKET_ID_FUNC_OFFSET: 15ba
FAILURE_BUCKET_ID: 0x1a_41792_nt!MiDeleteVa
BUCKET_ID: 0x1a_41792_nt!MiDeleteVa
PRIMARY_PROBLEM_CLASS: 0x1a_41792_nt!MiDeleteVa
TARGET_TIME: 2019-01-27T15:02:26.000Z
OSBUILD: 17134
OSSERVICEPACK: 523
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2019-01-01 09:44:13
BUILDDATESTAMP_STR: 180410-1804
BUILDLAB_STR: rs4_release
BUILDOSVER_STR: 10.0.17134.1.amd64fre.rs4_release.180410-1804
ANALYSIS_SESSION_ELAPSED_TIME: 9720
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x1a_41792_nt!mideleteva
FAILURE_ID_HASH: {ad6dfca3-101b-35a8-d6e1-12de9ecbc1f5}
Followup: MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000010, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80057b05cbf, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 17134.1.amd64fre.rs4_release.180410-1804
SYSTEM_MANUFACTURER: Gigabyte Technology Co., Ltd.
SYSTEM_PRODUCT_NAME: AX370-Gaming 5
SYSTEM_SKU: Default string
SYSTEM_VERSION: Default string
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: F25
BIOS_DATE: 01/16/2019
BASEBOARD_MANUFACTURER: Gigabyte Technology Co., Ltd.
BASEBOARD_PRODUCT: AX370-Gaming 5
BASEBOARD_VERSION: Default string
DUMP_TYPE: 2
BUGCHECK_P1: 10
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff80057b05cbf
READ_ADDRESS: fffff80057ee8388: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
0000000000000010
CURRENT_IRQL: 2
FAULTING_IP:
nt!MiInsertPageInFreeOrZeroedList+29f
fffff800`57b05cbf 49034510 add rax,qword ptr [r13+10h]
CPU_COUNT: 10
CPU_MHZ: bb2
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 1
CPU_STEPPING: 1
BLACKBOXBSD: 1 (!blackboxbsd)
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: System
ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5
ANALYSIS_SESSION_TIME: 01-28-2019 20:44:58.0131
ANALYSIS_VERSION: 10.0.18303.1000 amd64fre
TRAP_FRAME: fffff60991987120 -- (.trap 0xfffff60991987120)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000008
rdx=fe3fffffffffffff rsi=0000000000000000 rdi=0000000000000000
rip=fffff80057b05cbf rsp=fffff609919872b0 rbp=0000000000000201
r8=0000000000000003 r9=8000000000000000 r10=fffffb8000005040
r11=fffff880058e00c0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr ac po nc
nt!MiInsertPageInFreeOrZeroedList+0x29f:
fffff800`57b05cbf 49034510 add rax,qword ptr [r13+10h] ds:00000000`00000010=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80057c55c69 to fffff80057c450a0
STACK_TEXT:
fffff609`91986fd8 fffff800`57c55c69 : 00000000`0000000a 00000000`00000010 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff609`91986fe0 fffff800`57c528e5 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff609`91987219 : nt!KiBugCheckDispatch+0x69
fffff609`91987120 fffff800`57b05cbf : fffff609`91987450 fffff609`91987450 ffff9d88`00000001 fffff609`919873c0 : nt!KiPageFault+0x425
fffff609`919872b0 fffff800`57b03452 : 00000000`001da003 fffff880`058e0090 00000000`00000000 9d889850`00000004 : nt!MiInsertPageInFreeOrZeroedList+0x29f
fffff609`919873b0 fffff800`57b17865 : ffffce0c`00000011 fffff609`00000001 00000000`00000000 fffff800`00000000 : nt!MiInsertLargePageInFreeOrZeroList+0x4a2
fffff609`91987590 fffff800`57b17660 : 00000000`00000200 fffff800`57e69f40 00000000`00000320 00000000`00000032 : nt!MiDemoteLocalLargePage+0x195
fffff609`91987660 fffff800`57af2507 : 00000000`00000000 00000000`00000202 fffff800`57d936b0 00000000`00000202 : nt!MiGetFreeOrZeroPageAnyColor+0x60
fffff609`919876a0 fffff800`57f6345d : fffff800`57e69f40 ffff9d88`00000032 00000000`00000200 0a000001`00000000 : nt!MiGetPage+0x5f7
fffff609`91987770 fffff800`57fb2d4d : 00000000`00000000 ffff9d88`904d2850 ffff9d88`9055b040 00000000`00000000 : nt!MiPfPrepareSequentialReadList+0x2ed
fffff609`91987840 fffff800`57b7f3d0 : 00000000`092c0000 fffff800`57ac1080 00000000`00000000 00000000`00000000 : nt!MmPrefetchForCacheManager+0x75
fffff609`919878a0 fffff800`57ac12fb : 00000000`00000000 fffff800`57ac1080 00000000`00000000 ffff9d88`9059d2b0 : nt!CcPerformReadAhead+0x2d4
fffff609`91987a60 fffff800`57b50b05 : 00000000`00000000 ffff9d88`9055b040 ffff9d88`9043a0f0 ffff9d88`9043a0f0 : nt!CcWorkerThread+0x27b
fffff609`91987b80 fffff800`57bcb2d7 : ffff9d88`9055b040 00000000`00000080 ffff9d88`904d8440 ffff9d88`9055b040 : nt!ExpWorkerThread+0xf5
fffff609`91987c10 fffff800`57c4c516 : ffffe401`d9a21180 ffff9d88`9055b040 fffff800`57bcb290 00000000`00000000 : nt!PspSystemThreadStartup+0x47
fffff609`91987c60 00000000`00000000 : fffff609`91988000 fffff609`91982000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
THREAD_SHA1_HASH_MOD_FUNC: 543bbf5a65f08e8c39069d0378ab3752e47f01ec
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: ebafb24f4ec05b2e15faac5cb7ada6da8ee48aa2
THREAD_SHA1_HASH_MOD: 38bc5fec3f0409c265cf5c87da6f8f8859d0711c
FOLLOWUP_IP:
nt!MiInsertPageInFreeOrZeroedList+29f
fffff800`57b05cbf 49034510 add rax,qword ptr [r13+10h]
FAULT_INSTR_CODE: 10450349
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!MiInsertPageInFreeOrZeroedList+29f
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 5c2b0c3d
IMAGE_VERSION: 10.0.17134.523
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: memory_corruption
BUCKET_ID_FUNC_OFFSET: 29f
FAILURE_BUCKET_ID: AV_nt!MiInsertPageInFreeOrZeroedList
BUCKET_ID: AV_nt!MiInsertPageInFreeOrZeroedList
PRIMARY_PROBLEM_CLASS: AV_nt!MiInsertPageInFreeOrZeroedList
TARGET_TIME: 2019-01-27T15:13:02.000Z
OSBUILD: 17134
OSSERVICEPACK: 523
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2019-01-01 09:44:13
BUILDDATESTAMP_STR: 180410-1804
BUILDLAB_STR: rs4_release
BUILDOSVER_STR: 10.0.17134.1.amd64fre.rs4_release.180410-1804
ANALYSIS_SESSION_ELAPSED_TIME: 17168
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_nt!miinsertpageinfreeorzeroedlist
FAILURE_ID_HASH: {779c7427-9286-2607-95ab-7b33d42c5f3a}
Followup: MachineOwner
---------
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff800362d40b0, The address that the exception occurred at
Arg3: ffffe40756992ac8, Exception Record Address
Arg4: ffffe40756992310, Context Record Address
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 17134.1.amd64fre.rs4_release.180410-1804
SYSTEM_MANUFACTURER: Gigabyte Technology Co., Ltd.
SYSTEM_PRODUCT_NAME: AX370-Gaming 5
SYSTEM_SKU: Default string
SYSTEM_VERSION: Default string
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: F23
BIOS_DATE: 08/08/2018
BASEBOARD_MANUFACTURER: Gigabyte Technology Co., Ltd.
BASEBOARD_PRODUCT: AX370-Gaming 5
BASEBOARD_VERSION: Default string
DUMP_TYPE: 2
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff800362d40b0
BUGCHECK_P3: ffffe40756992ac8
BUGCHECK_P4: ffffe40756992310
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
nt!MiDemoteCombinedPte+40
fffff800`362d40b0 498378f001 cmp qword ptr [r8-10h],1
EXCEPTION_RECORD: ffffe40756992ac8 -- (.exr 0xffffe40756992ac8)
ExceptionAddress: fffff800362d40b0 (nt!MiDemoteCombinedPte+0x0000000000000040)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
CONTEXT: ffffe40756992310 -- (.cxr 0xffffe40756992310)
rax=ffffecf67b3d9000 rbx=810021018acd3005 rcx=ffff8d0915cd8580
rdx=ffffecbfff943180 rsi=ffffecbfff943180 rdi=ffff86e304a06790
rip=fffff800362d40b0 rsp=ffffe40756992d00 rbp=ffff8d0915cd8580
r8=8000000000000000 r9=0000000000000000 r10=ffffecf67b3d9000
r11=ffffec8000000000 r12=ffff8d0915c7f480 r13=ffffe40756993460
r14=8000000000000000 r15=ffff8d0915cd8580
iopl=0 nv up ei ng nz na pe cy
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010283
nt!MiDemoteCombinedPte+0x40:
fffff800`362d40b0 498378f001 cmp qword ptr [r8-10h],1 ds:002b:7fffffff`fffffff0=????????????????
Resetting default scope
CPU_COUNT: 10
CPU_MHZ: da5
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 1
CPU_STEPPING: 1
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXPNP: 1 (!blackboxpnp)
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: SearchUI.exe
CURRENT_IRQL: 2
FOLLOWUP_IP:
nt!MiDemoteCombinedPte+40
fffff800`362d40b0 498378f001 cmp qword ptr [r8-10h],1
BUGCHECK_STR: AV
READ_ADDRESS: fffff80036658388: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
ffffffffffffffff
ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5
ANALYSIS_SESSION_TIME: 01-28-2019 20:45:09.0477
ANALYSIS_VERSION: 10.0.18303.1000 amd64fre
LAST_CONTROL_TRANSFER: from fffff8003625cbfa to fffff800362d40b0
STACK_TEXT:
ffffe407`56992d00 fffff800`3625cbfa : 00000000`00000000 fffff800`362588ea 00000000`00000000 00000000`00000000 : nt!MiDemoteCombinedPte+0x40
ffffe407`56992dd0 fffff800`362596d9 : ffffe407`00000003 00000000`00000000 ffffecbf`ff940000 ffffe407`00000000 : nt!MiAgePte+0x37a
ffffe407`56992e60 fffff800`36259ae2 : ffffe407`56993460 ffffecbf`ff943180 ffffecf6`00000000 ffffe407`00000000 : nt!MiWalkPageTablesRecursively+0x299
ffffe407`56992f40 fffff800`36259ae2 : ffffe407`56993460 ffffecf6`5fffca18 ffffecf6`00000001 ffffe407`00000000 : nt!MiWalkPageTablesRecursively+0x6a2
ffffe407`56993020 fffff800`36259ae2 : ffffe407`56993460 ffffecf6`7b2fffe0 ffffecf6`00000002 ffffe407`00000000 : nt!MiWalkPageTablesRecursively+0x6a2
ffffe407`56993100 fffff800`362577e7 : ffffe407`56993460 ffffecf6`7b3d97f8 ffffe407`00000003 00000000`00000000 : nt!MiWalkPageTablesRecursively+0x6a2
ffffe407`569931e0 fffff800`36255af4 : ffffe407`56993460 00000000`00000002 00000000`00000000 00000000`00000000 : nt!MiWalkPageTables+0x1e7
ffffe407`569932d0 fffff800`362552ef : ffffd400`caccbbc0 ffff8d09`0f552b40 ffff8d09`0f552580 ffff8d09`0f552b40 : nt!MiAgeWorkingSet+0x384
ffffe407`569937e0 fffff800`362545e3 : fffff800`365d9f40 ffffe407`56993a80 ffff8d09`05a905a0 fffff800`00000000 : nt!MiTrimOrAgeWorkingSet+0x32f
ffffe407`569938b0 fffff800`362d57fb : fffff800`365d9f40 fffff800`365d9f40 00000000`0000013b 00000000`00000000 : nt!MiProcessWorkingSets+0x233
ffffe407`56993a60 fffff800`363812b7 : 00000000`ffffffff 00000000`00000004 00000000`ffffffff 00000000`00000001 : nt!MiWorkingSetManager+0x9f
ffffe407`56993b20 fffff800`3633b2d7 : ffff8d09`05b71040 00000000`00000080 fffff800`36381160 0005ac33`00000003 : nt!KeBalanceSetManager+0x157
ffffe407`56993c10 fffff800`363bc516 : ffffd400`ca3b9180 ffff8d09`05b71040 fffff800`3633b290 00000000`00000000 : nt!PspSystemThreadStartup+0x47
ffffe407`56993c60 00000000`00000000 : ffffe407`56994000 ffffe407`5698e000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
THREAD_SHA1_HASH_MOD_FUNC: e3a8964b8ac9f4183e9b225b40d450ed3989dd86
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: fe8690959fdfbd4826b27c07b0a0e784fc0081a0
THREAD_SHA1_HASH_MOD: 7f608ac2fbce9034a3386b1d51652e4911d30234
FAULT_INSTR_CODE: f0788349
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!MiDemoteCombinedPte+40
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 5c2b0c3d
IMAGE_VERSION: 10.0.17134.523
STACK_COMMAND: .cxr 0xffffe40756992310 ; kb
IMAGE_NAME: memory_corruption
BUCKET_ID_FUNC_OFFSET: 40
FAILURE_BUCKET_ID: AV_nt!MiDemoteCombinedPte
BUCKET_ID: AV_nt!MiDemoteCombinedPte
PRIMARY_PROBLEM_CLASS: AV_nt!MiDemoteCombinedPte
TARGET_TIME: 2019-01-27T14:24:58.000Z
OSBUILD: 17134
OSSERVICEPACK: 523
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2019-01-01 09:44:13
BUILDDATESTAMP_STR: 180410-1804
BUILDLAB_STR: rs4_release
BUILDOSVER_STR: 10.0.17134.1.amd64fre.rs4_release.180410-1804
ANALYSIS_SESSION_ELAPSED_TIME: 10008
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_nt!midemotecombinedpte
FAILURE_ID_HASH: {c577c73b-79a7-0c44-6c62-58e1d697b6d8}
Followup: MachineOwner
---------