SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff806659ea059, Address of the instruction which caused the bugcheck
Arg3: ffff868e61394c00, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202
SYSTEM_MANUFACTURER:  Micro-Star International Co., Ltd
SYSTEM_PRODUCT_NAME:  MS-7C02
SYSTEM_SKU:  To be filled by O.E.M.
SYSTEM_VERSION:  1.0
BIOS_VENDOR:  American Megatrends Inc.
BIOS_VERSION:  1.D0
BIOS_DATE:  11/07/2019
BASEBOARD_MANUFACTURER:  Micro-Star International Co., Ltd
BASEBOARD_PRODUCT:  B450 TOMAHAWK (MS-7C02)
BASEBOARD_VERSION:  1.0
DUMP_TYPE:  2
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff806659ea059
BUGCHECK_P3: ffff868e61394c00
BUGCHECK_P4: 0
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
nt!ObpCreateHandle+4d9
fffff806`659ea059 410fb644241a    movzx   eax,byte ptr [r12+1Ah]
CONTEXT:  ffff868e61394c00 -- (.cxr 0xffff868e61394c00)
rax=ffffd78613bf5118 rbx=000000000000017c rcx=ffffd78613bf5080
rdx=0000000000000000 rsi=0000000000000000 rdi=ffff9b07217e6c00
rip=fffff806659ea059 rsp=ffff868e613955f0 rbp=ffff868e61395710
r8=00000000ffffffff  r9=7fff9b07217e6c00 r10=7ffffffffffffffc
r11=ffff868e613955d0 r12=0000000000000000 r13=ffffd78613bf5080
r14=ffffd78613ff2a30 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050286
nt!ObpCreateHandle+0x4d9:
fffff806`659ea059 410fb644241a    movzx   eax,byte ptr [r12+1Ah] ds:002b:00000000`0000001a=??
Resetting default scope
BUGCHECK_STR:  0x3B_c0000005
CPU_COUNT: c
CPU_MHZ: e10
CPU_VENDOR:  AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 71
CPU_STEPPING: 0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT:  1
DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT
PROCESS_NAME:  svchost.exe
CURRENT_IRQL:  0
ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3
ANALYSIS_SESSION_TIME:  01-28-2020 20:59:23.0870
ANALYSIS_VERSION: 10.0.18362.1 x86fre
LAST_CONTROL_TRANSFER:  from fffff806659eb559 to fffff806659ea059
STACK_TEXT:
ffff868e`613955f0 fffff806`659eb559 : ffffd786`13ff2a00 ffff868e`613958a8 ffffd786`00000040 ffffd786`0b2f54e0 : nt!ObpCreateHandle+0x4d9
ffff868e`61395820 fffff806`65a30300 : 00000000`00000000 00000010`4f0f90e8 00000000`00000001 00000000`00000000 : nt!ObOpenObjectByNameEx+0x329
ffff868e`61395960 fffff806`65a2fa38 : 00000010`4f0f9070 00000000`00100001 00000010`4f0f90e8 00000010`4f0f90d8 : nt!IopCreateFile+0x820
ffff868e`61395a00 fffff806`655d2b18 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtOpenFile+0x58
ffff868e`61395a90 00007ffc`3cb7c724 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000010`4f0f9018 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`3cb7c724
THREAD_SHA1_HASH_MOD_FUNC:  e7dcb32f17b71966a83837b4606b05bbd531a8ff
THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  c4083e7280bbc081cb0aa68d01657b8786da160c
THREAD_SHA1_HASH_MOD:  f08ac56120cad14894587db086f77ce277bfae84
FOLLOWUP_IP:
nt!ObpCreateHandle+4d9
fffff806`659ea059 410fb644241a    movzx   eax,byte ptr [r12+1Ah]
FAULT_INSTR_CODE:  44b60f41
SYMBOL_STACK_INDEX:  0
SYMBOL_NAME:  nt!ObpCreateHandle+4d9
FOLLOWUP_NAME:  MachineOwner
MODULE_NAME: nt
IMAGE_NAME:  ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP:  0
IMAGE_VERSION:  10.0.18362.418
STACK_COMMAND:  .cxr 0xffff868e61394c00 ; kb
BUCKET_ID_FUNC_OFFSET:  4d9
FAILURE_BUCKET_ID:  0x3B_c0000005_nt!ObpCreateHandle
BUCKET_ID:  0x3B_c0000005_nt!ObpCreateHandle
PRIMARY_PROBLEM_CLASS:  0x3B_c0000005_nt!ObpCreateHandle
TARGET_TIME:  2020-01-28T17:12:44.000Z
OSBUILD:  18362
OSSERVICEPACK:  418
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK:  784
PRODUCT_TYPE:  1
OSPLATFORM_TYPE:  x64
OSNAME:  Windows 10
OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS Personal
OS_LOCALE:
USER_LCID:  0
OSBUILD_TIMESTAMP:  unknown_date
BUILDDATESTAMP_STR:  190318-1202
BUILDLAB_STR:  19h1_release
BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME:  6348
ANALYSIS_SOURCE:  KM
FAILURE_ID_HASH_STRING:  km:0x3b_c0000005_nt!obpcreatehandle
FAILURE_ID_HASH:  {dcd9630c-1938-35ea-221a-7b842c7aa859}
Followup:     MachineOwner
---------
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: 0000000000000000, The address that the exception occurred at
Arg3: 0000000000000008, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception
Debugging Details:
------------------
*************************************************************************
***                                                                   ***
***                                                                   ***
***    Either you specified an unqualified symbol, or your debugger   ***
***    doesn't have full symbol information.  Unqualified symbol      ***
***    resolution is turned off by default. Please either specify a   ***
***    fully qualified symbol module!symbolname, or enable resolution ***
***    of unqualified symbols by typing ".symopt- 100". Note that     ***
***    enabling unqualified symbol resolution with network symbol     ***
***    server shares in the symbol path may cause the debugger to     ***
***    appear to hang for long periods of time when an incorrect      ***
***    symbol name is typed or the network symbol server is down.     ***
***                                                                   ***
***    For some commands to work properly, your symbol path           ***
***    must point to .pdb files that have full type information.      ***
***                                                                   ***
***    Certain .pdb files (such as the public OS symbols) do not      ***
***    contain the required information.  Contact the group that      ***
***    provided you with these symbols if you need this command to    ***
***    work.                                                          ***
***                                                                   ***
***    Type referenced: ExceptionRecord                               ***
***                                                                   ***
*************************************************************************
*************************************************************************
***                                                                   ***
***                                                                   ***
***    Either you specified an unqualified symbol, or your debugger   ***
***    doesn't have full symbol information.  Unqualified symbol      ***
***    resolution is turned off by default. Please either specify a   ***
***    fully qualified symbol module!symbolname, or enable resolution ***
***    of unqualified symbols by typing ".symopt- 100". Note that     ***
***    enabling unqualified symbol resolution with network symbol     ***
***    server shares in the symbol path may cause the debugger to     ***
***    appear to hang for long periods of time when an incorrect      ***
***    symbol name is typed or the network symbol server is down.     ***
***                                                                   ***
***    For some commands to work properly, your symbol path           ***
***    must point to .pdb files that have full type information.      ***
***                                                                   ***
***    Certain .pdb files (such as the public OS symbols) do not      ***
***    contain the required information.  Contact the group that      ***
***    provided you with these symbols if you need this command to    ***
***    work.                                                          ***
***                                                                   ***
***    Type referenced: ContextRecord                                 ***
***                                                                   ***
*************************************************************************
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202
SYSTEM_MANUFACTURER:  Micro-Star International Co., Ltd
SYSTEM_PRODUCT_NAME:  MS-7C02
SYSTEM_SKU:  To be filled by O.E.M.
SYSTEM_VERSION:  1.0
BIOS_VENDOR:  American Megatrends Inc.
BIOS_VERSION:  1.D0
BIOS_DATE:  11/07/2019
BASEBOARD_MANUFACTURER:  Micro-Star International Co., Ltd
BASEBOARD_PRODUCT:  B450 TOMAHAWK (MS-7C02)
BASEBOARD_VERSION:  1.0
DUMP_TYPE:  2
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: 0
BUGCHECK_P3: 8
BUGCHECK_P4: 0
CPU_COUNT: c
CPU_MHZ: e10
CPU_VENDOR:  AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 71
CPU_STEPPING: 0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT:  1
DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT
BUGCHECK_STR:  0x1E
PROCESS_NAME:  OneDriveSetup.exe
CURRENT_IRQL:  0
ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3
ANALYSIS_SESSION_TIME:  01-28-2020 20:59:20.0448
ANALYSIS_VERSION: 10.0.18362.1 x86fre
EXCEPTION_RECORD:  ffffa954aa552000 -- (.exr 0xffffa954aa552000)
ExceptionAddress: 0000000000000000
   ExceptionCode: df677867
  ExceptionFlags: 0a000003
NumberParameters: 0
TRAP_FRAME:  ffff800000000000 -- (.trap 0xffff800000000000)
Unable to read trap frame at ffff8000`00000000
LAST_CONTROL_TRANSFER:  from fffff8061d62fd3f to fffff8061d5c1220
STACK_TEXT:
ffff9588`df3b59b8 fffff806`1d62fd3f : 00000000`0000001e ffffffff`c0000005 00000000`00000000 00000000`00000008 : nt!KeBugCheckEx
ffff9588`df3b59c0 fffff806`1d5d321d : ffffa954`aa552000 ffff9588`df3b6250 ffff8000`00000000 00000000`00000000 : nt!KiDispatchException+0x16859f
ffff9588`df3b6070 fffff806`1d5cf405 : 00000000`00000000 00000000`00000000 ffffd30b`237d0b60 ffffd30b`22cfc2f0 : nt!KiExceptionDispatch+0x11d
ffff9588`df3b6250 00000000`00000000 : 00000000`00000000 ffff9588`00000000 00000000`ffffffff ffff9588`df3b64dc : nt!KiPageFault+0x445
THREAD_SHA1_HASH_MOD_FUNC:  2e9ab7e93b3f60731b8608f9c5cc37cdb42d594f
THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  e894a2d72ef7a7c3c73cc911d0eff5f54df0de86
THREAD_SHA1_HASH_MOD:  d084f7dfa548ce4e51810e4fd5914176ebc66791
FOLLOWUP_IP:
nt!KiDispatchException+16859f
fffff806`1d62fd3f cc              int     3
FAULT_INSTR_CODE:  86f741cc
SYMBOL_STACK_INDEX:  1
SYMBOL_NAME:  nt!KiDispatchException+16859f
FOLLOWUP_NAME:  MachineOwner
MODULE_NAME: nt
IMAGE_NAME:  ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP:  0
IMAGE_VERSION:  10.0.18362.418
STACK_COMMAND:  .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET:  16859f
FAILURE_BUCKET_ID:  0x1E_nt!KiDispatchException
BUCKET_ID:  0x1E_nt!KiDispatchException
PRIMARY_PROBLEM_CLASS:  0x1E_nt!KiDispatchException
TARGET_TIME:  2020-01-28T17:16:01.000Z
OSBUILD:  18362
OSSERVICEPACK:  418
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK:  784
PRODUCT_TYPE:  1
OSPLATFORM_TYPE:  x64
OSNAME:  Windows 10
OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS Personal
OS_LOCALE:
USER_LCID:  0
OSBUILD_TIMESTAMP:  unknown_date
BUILDDATESTAMP_STR:  190318-1202
BUILDLAB_STR:  19h1_release
BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME:  5ad8
ANALYSIS_SOURCE:  KM
FAILURE_ID_HASH_STRING:  km:0x1e_nt!kidispatchexception
FAILURE_ID_HASH:  {4c003660-11e1-3fb7-2474-3522eb7ee67b}
Followup:     MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 00000000000032a0, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80168c7b5fc, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202
SYSTEM_MANUFACTURER:  Micro-Star International Co., Ltd
SYSTEM_PRODUCT_NAME:  MS-7C02
SYSTEM_SKU:  To be filled by O.E.M.
SYSTEM_VERSION:  1.0
BIOS_VENDOR:  American Megatrends Inc.
BIOS_VERSION:  1.D0
BIOS_DATE:  11/07/2019
BASEBOARD_MANUFACTURER:  Micro-Star International Co., Ltd
BASEBOARD_PRODUCT:  B450 TOMAHAWK (MS-7C02)
BASEBOARD_VERSION:  1.0
DUMP_TYPE:  2
BUGCHECK_P1: 32a0
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff80168c7b5fc
READ_ADDRESS: fffff801691733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
00000000000032a0
CURRENT_IRQL:  2
FAULTING_IP:
nt!MiHandleTransitionFault+cc
fffff801`68c7b5fc 498b0b          mov     rcx,qword ptr [r11]
CPU_COUNT: c
CPU_MHZ: e10
CPU_VENDOR:  AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 71
CPU_STEPPING: 0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT:  1
DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT
BUGCHECK_STR:  AV
PROCESS_NAME:  OneDriveSetup.exe
ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3
ANALYSIS_SESSION_TIME:  01-28-2020 20:59:17.0215
ANALYSIS_VERSION: 10.0.18362.1 x86fre
TRAP_FRAME:  ffffcc0aa4ff0450 -- (.trap 0xffffcc0aa4ff0450)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0200000000000000
rdx=0000000000065400 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80168c7b5fc rsp=ffffcc0aa4ff05e0 rbp=ffffaf0005027730
r8=ffffaf0005027730  r9=ffffaf00050219a0 r10=0000000000000001
r11=00000000000032a0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz ac po nc
nt!MiHandleTransitionFault+0xcc:
fffff801`68c7b5fc 498b0b          mov     rcx,qword ptr [r11] ds:00000000`000032a0=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER:  from fffff80168dd30e9 to fffff80168dc1220
STACK_TEXT:
ffffcc0a`a4ff0308 fffff801`68dd30e9 : 00000000`0000000a 00000000`000032a0 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffcc0a`a4ff0310 fffff801`68dcf42b : 00000000`00000000 fffff801`6906a480 00000000`00000000 00000000`00000001 : nt!KiBugCheckDispatch+0x69
ffffcc0a`a4ff0450 fffff801`68c7b5fc : 8282f319`32a004c0 00000000`00000000 ffffaf00`05090970 ffffcc0a`a4ff06a8 : nt!KiPageFault+0x46b
ffffcc0a`a4ff05e0 fffff801`68c7ac65 : ffffcc0a`a4ff0880 ffffe289`381a3060 00000001`ab5de8c0 00000000`00000000 : nt!MiHandleTransitionFault+0xcc
ffffcc0a`a4ff0650 fffff801`68c7a1be : ffffcc0a`a4ff0880 00000000`00000000 ffffaf00`05027730 00000000`00000000 : nt!MiResolveTransitionFault+0x4a5
ffffcc0a`a4ff0710 fffff801`68c74bbc : ffffcc0a`a4ff0880 00000000`00000000 ffffcc0a`a4ff0858 ffffe289`381a3060 : nt!MiResolveProtoPteFault+0x81e
ffffcc0a`a4ff0810 fffff801`68c72cf9 : 00000000`00000100 00000000`00000001 00000000`c0000016 ffff8282`f36ae1f0 : nt!MiDispatchFault+0x80c
ffffcc0a`a4ff0960 fffff801`68dcf320 : ffff8282`f2e56080 00007ffe`b4324901 00000000`004df000 ffff8282`f35570c0 : nt!MmAccessFault+0x169
ffffcc0a`a4ff0b00 00000000`76cd3ad4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x360
00000000`0888ece0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x76cd3ad4
THREAD_SHA1_HASH_MOD_FUNC:  d760e5ad96c3deeaf533b947df7cd48ae927122d
THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  a635d4c68f4b3150c8d81b0ddca8444e31408b07
THREAD_SHA1_HASH_MOD:  9f457f347057f10e1df248e166a3e95e6570ecfe
FOLLOWUP_IP:
nt!MiHandleTransitionFault+cc
fffff801`68c7b5fc 498b0b          mov     rcx,qword ptr [r11]
FAULT_INSTR_CODE:  8b0b8b49
SYMBOL_STACK_INDEX:  3
SYMBOL_NAME:  nt!MiHandleTransitionFault+cc
FOLLOWUP_NAME:  MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP:  0
IMAGE_VERSION:  10.0.18362.418
STACK_COMMAND:  .thread ; .cxr ; kb
IMAGE_NAME:  memory_corruption
BUCKET_ID_FUNC_OFFSET:  cc
FAILURE_BUCKET_ID:  AV_nt!MiHandleTransitionFault
BUCKET_ID:  AV_nt!MiHandleTransitionFault
PRIMARY_PROBLEM_CLASS:  AV_nt!MiHandleTransitionFault
TARGET_TIME:  2020-01-28T17:17:52.000Z
OSBUILD:  18362
OSSERVICEPACK:  418
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK:  784
PRODUCT_TYPE:  1
OSPLATFORM_TYPE:  x64
OSNAME:  Windows 10
OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS Personal
OS_LOCALE:
USER_LCID:  0
OSBUILD_TIMESTAMP:  unknown_date
BUILDDATESTAMP_STR:  190318-1202
BUILDLAB_STR:  19h1_release
BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME:  3d8b
ANALYSIS_SOURCE:  KM
FAILURE_ID_HASH_STRING:  km:av_nt!mihandletransitionfault
FAILURE_ID_HASH:  {8adeffa4-a0db-ebe8-c3a7-125f48600a0d}
Followup:     MachineOwner
---------
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffe60a29e10c70, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff80308a97f6e, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202
SYSTEM_MANUFACTURER:  Micro-Star International Co., Ltd
SYSTEM_PRODUCT_NAME:  MS-7C02
SYSTEM_SKU:  To be filled by O.E.M.
SYSTEM_VERSION:  1.0
BIOS_VENDOR:  American Megatrends Inc.
BIOS_VERSION:  1.D0
BIOS_DATE:  11/07/2019
BASEBOARD_MANUFACTURER:  Micro-Star International Co., Ltd
BASEBOARD_PRODUCT:  B450 TOMAHAWK (MS-7C02)
BASEBOARD_VERSION:  1.0
DUMP_TYPE:  2
BUGCHECK_P1: ffffe60a29e10c70
BUGCHECK_P2: 0
BUGCHECK_P3: fffff80308a97f6e
BUGCHECK_P4: 2
READ_ADDRESS: fffff80308f733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
ffffe60a29e10c70
FAULTING_IP:
nt!ExAcquireRundownProtectionCacheAwareEx+1e
fffff803`08a97f6e 498b00          mov     rax,qword ptr [r8]
MM_INTERNAL_CODE:  2
CPU_COUNT: c
CPU_MHZ: e10
CPU_VENDOR:  AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 71
CPU_STEPPING: 0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT:  1
DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT
BUGCHECK_STR:  AV
PROCESS_NAME:  svchost.exe
CURRENT_IRQL:  0
ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3
ANALYSIS_SESSION_TIME:  01-28-2020 20:59:13.0575
ANALYSIS_VERSION: 10.0.18362.1 x86fre
TRAP_FRAME:  ffffdf01c9a7d5e0 -- (.trap 0xffffdf01c9a7d5e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffe609ba858810
rdx=00000000750b0020 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80308a97f6e rsp=ffffdf01c9a7d778 rbp=ffffdf01c9a7d829
r8=ffffe60a29e10c70  r9=0000000000000002 r10=fffff80308a97f50
r11=0000000000000001 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
nt!ExAcquireRundownProtectionCacheAwareEx+0x1e:
fffff803`08a97f6e 498b00          mov     rax,qword ptr [r8] ds:ffffe60a`29e10c70=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER:  from fffff80308be33d6 to fffff80308bc1220
STACK_TEXT:
ffffdf01`c9a7d338 fffff803`08be33d6 : 00000000`00000050 ffffe60a`29e10c70 00000000`00000000 ffffdf01`c9a7d5e0 : nt!KeBugCheckEx
ffffdf01`c9a7d340 fffff803`08a72edf : ffffb601`08395000 00000000`00000000 00000000`00000000 ffffe60a`29e10c70 : nt!MiSystemFault+0x1d66a6
ffffdf01`c9a7d440 fffff803`08bcf320 : 00000000`00000000 fffff803`0d82d137 ffffe609`bba48c10 00000000`00000000 : nt!MmAccessFault+0x34f
ffffdf01`c9a7d5e0 fffff803`08a97f6e : fffff803`0cee48b7 ffffe609`b3ef8270 ffffe609`00000000 ffffe609`00000001 : nt!KiPageFault+0x360
ffffdf01`c9a7d778 fffff803`0cee48b7 : ffffe609`b3ef8270 ffffe609`00000000 ffffe609`00000001 ffffe609`bba489a0 : nt!ExAcquireRundownProtectionCacheAwareEx+0x1e
ffffdf01`c9a7d780 fffff803`0cee2f5c : ffffdf01`c9a7d920 ffffdf01`c9a7d900 00000000`00000003 fffff803`0cee6400 : FLTMGR!FltpPerformPreCallbacks+0x157
ffffdf01`c9a7d890 fffff803`0cf1c7c5 : ffffdf01`c9a7d9f8 ffffdf01`c9a7db80 ffffe609`bb689080 ffffe609`bb3d8dd0 : FLTMGR!FltpPassThroughFastIo+0x8c
ffffdf01`c9a7d8f0 fffff803`08fe53cf : ffffe609`bb3d8dd0 00000000`00000000 00000000`00000000 ffffe609`00000000 : FLTMGR!FltpFastIoRead+0x165
ffffdf01`c9a7d9a0 fffff803`08bd2b18 : 00000000`00000000 00000000`00000000 00000000`00000000 00000007`d6bfeb78 : nt!NtReadFile+0x39f
ffffdf01`c9a7da90 00007ffa`4e2fc184 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000007`d6bfeab8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`4e2fc184
THREAD_SHA1_HASH_MOD_FUNC:  e054e86016b0f4b4e225ff092b1923257edb9ec7
THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  458334932c5ee47e4d353a07c39c263646a80ab1
THREAD_SHA1_HASH_MOD:  b450f9c3db367884ac7ee312e3a651b5e2f46491
FOLLOWUP_IP:
nt!ExAcquireRundownProtectionCacheAwareEx+1e
fffff803`08a97f6e 498b00          mov     rax,qword ptr [r8]
FAULT_INSTR_CODE:  a8008b49
SYMBOL_STACK_INDEX:  4
SYMBOL_NAME:  nt!ExAcquireRundownProtectionCacheAwareEx+1e
FOLLOWUP_NAME:  MachineOwner
MODULE_NAME: nt
IMAGE_NAME:  ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP:  0
IMAGE_VERSION:  10.0.18362.418
STACK_COMMAND:  .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET:  1e
FAILURE_BUCKET_ID:  AV_R_INVALID_nt!ExAcquireRundownProtectionCacheAwareEx
BUCKET_ID:  AV_R_INVALID_nt!ExAcquireRundownProtectionCacheAwareEx
PRIMARY_PROBLEM_CLASS:  AV_R_INVALID_nt!ExAcquireRundownProtectionCacheAwareEx
TARGET_TIME:  2020-01-28T17:15:00.000Z
OSBUILD:  18362
OSSERVICEPACK:  418
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK:  784
PRODUCT_TYPE:  1
OSPLATFORM_TYPE:  x64
OSNAME:  Windows 10
OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS Personal
OS_LOCALE:
USER_LCID:  0
OSBUILD_TIMESTAMP:  unknown_date
BUILDDATESTAMP_STR:  190318-1202
BUILDLAB_STR:  19h1_release
BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME:  4a7b
ANALYSIS_SOURCE:  KM
FAILURE_ID_HASH_STRING:  km:av_r_invalid_nt!exacquirerundownprotectioncacheawareex
FAILURE_ID_HASH:  {8c4e56f0-7b8e-3ab5-4d50-017b8f0ea0c2}
Followup:     MachineOwner
---------
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffff80050d19ec70, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff8012d297f6e, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202
SYSTEM_MANUFACTURER:  Micro-Star International Co., Ltd
SYSTEM_PRODUCT_NAME:  MS-7C02
SYSTEM_SKU:  To be filled by O.E.M.
SYSTEM_VERSION:  1.0
BIOS_VENDOR:  American Megatrends Inc.
BIOS_VERSION:  1.D0
BIOS_DATE:  11/07/2019
BASEBOARD_MANUFACTURER:  Micro-Star International Co., Ltd
BASEBOARD_PRODUCT:  B450 TOMAHAWK (MS-7C02)
BASEBOARD_VERSION:  1.0
DUMP_TYPE:  2
BUGCHECK_P1: ffff80050d19ec70
BUGCHECK_P2: 0
BUGCHECK_P3: fffff8012d297f6e
BUGCHECK_P4: 2
READ_ADDRESS: fffff8012d7733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
ffff80050d19ec70
FAULTING_IP:
nt!ExAcquireRundownProtectionCacheAwareEx+1e
fffff801`2d297f6e 498b00          mov     rax,qword ptr [r8]
MM_INTERNAL_CODE:  2
CPU_COUNT: c
CPU_MHZ: e10
CPU_VENDOR:  AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 71
CPU_STEPPING: 0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT:  1
DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT
BUGCHECK_STR:  AV
PROCESS_NAME:  svchost.exe
CURRENT_IRQL:  0
ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3
ANALYSIS_SESSION_TIME:  01-28-2020 20:59:09.0873
ANALYSIS_VERSION: 10.0.18362.1 x86fre
TRAP_FRAME:  ffffae0fd13335e0 -- (.trap 0xffffae0fd13335e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffff800504f14810
rdx=0000000009e28020 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8012d297f6e rsp=ffffae0fd1333778 rbp=ffffae0fd1333829
r8=ffff80050d19ec70  r9=0000000000000002 r10=fffff8012d297f50
r11=0000000000000001 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
nt!ExAcquireRundownProtectionCacheAwareEx+0x1e:
fffff801`2d297f6e 498b00          mov     rax,qword ptr [r8] ds:ffff8005`0d19ec70=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER:  from fffff8012d3e33d6 to fffff8012d3c1220
STACK_TEXT:
ffffae0f`d1333338 fffff801`2d3e33d6 : 00000000`00000050 ffff8005`0d19ec70 00000000`00000000 ffffae0f`d13335e0 : nt!KeBugCheckEx
ffffae0f`d1333340 fffff801`2d272edf : ffffdd0f`6bd6d000 00000000`00000000 00000000`00000000 ffff8005`0d19ec70 : nt!MiSystemFault+0x1d66a6
ffffae0f`d1333440 fffff801`2d3cf320 : 00000000`00000000 fffff801`2f22d137 ffff8005`06c157e0 00000000`00000000 : nt!MmAccessFault+0x34f
ffffae0f`d13335e0 fffff801`2d297f6e : fffff801`2e8e48b7 ffff8004`ff5f79d0 ffff8005`00000000 ffff8005`00000001 : nt!KiPageFault+0x360
ffffae0f`d1333778 fffff801`2e8e48b7 : ffff8004`ff5f79d0 ffff8005`00000000 ffff8005`00000001 ffff8005`06c15570 : nt!ExAcquireRundownProtectionCacheAwareEx+0x1e
ffffae0f`d1333780 fffff801`2e8e2f5c : ffffae0f`d1333920 ffffae0f`d1333900 00000000`00000003 fffff801`2e8e6400 : FLTMGR!FltpPerformPreCallbacks+0x157
ffffae0f`d1333890 fffff801`2e91c7c5 : ffffae0f`d13339f8 ffffae0f`d1333b80 ffff8005`06fd2080 ffff8005`06f50340 : FLTMGR!FltpPassThroughFastIo+0x8c
ffffae0f`d13338f0 fffff801`2d7e53cf : ffff8005`06f50340 00000000`00000000 00000000`00000000 ffff8005`00000000 : FLTMGR!FltpFastIoRead+0x165
ffffae0f`d13339a0 fffff801`2d3d2b18 : 00000000`00000000 00000000`00000000 00000000`00000000 00000050`ee57e7a8 : nt!NtReadFile+0x39f
ffffae0f`d1333a90 00007ffe`da3dc184 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000050`ee57e6e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`da3dc184
THREAD_SHA1_HASH_MOD_FUNC:  e054e86016b0f4b4e225ff092b1923257edb9ec7
THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  458334932c5ee47e4d353a07c39c263646a80ab1
THREAD_SHA1_HASH_MOD:  b450f9c3db367884ac7ee312e3a651b5e2f46491
FOLLOWUP_IP:
nt!ExAcquireRundownProtectionCacheAwareEx+1e
fffff801`2d297f6e 498b00          mov     rax,qword ptr [r8]
FAULT_INSTR_CODE:  a8008b49
SYMBOL_STACK_INDEX:  4
SYMBOL_NAME:  nt!ExAcquireRundownProtectionCacheAwareEx+1e
FOLLOWUP_NAME:  MachineOwner
MODULE_NAME: nt
IMAGE_NAME:  ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP:  0
IMAGE_VERSION:  10.0.18362.418
STACK_COMMAND:  .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET:  1e
FAILURE_BUCKET_ID:  AV_R_INVALID_nt!ExAcquireRundownProtectionCacheAwareEx
BUCKET_ID:  AV_R_INVALID_nt!ExAcquireRundownProtectionCacheAwareEx
PRIMARY_PROBLEM_CLASS:  AV_R_INVALID_nt!ExAcquireRundownProtectionCacheAwareEx
TARGET_TIME:  2020-01-28T17:11:23.000Z
OSBUILD:  18362
OSSERVICEPACK:  418
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK:  784
PRODUCT_TYPE:  1
OSPLATFORM_TYPE:  x64
OSNAME:  Windows 10
OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS Personal
OS_LOCALE:
USER_LCID:  0
OSBUILD_TIMESTAMP:  unknown_date
BUILDDATESTAMP_STR:  190318-1202
BUILDLAB_STR:  19h1_release
BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME:  64db
ANALYSIS_SOURCE:  KM
FAILURE_ID_HASH_STRING:  km:av_r_invalid_nt!exacquirerundownprotectioncacheawareex
FAILURE_ID_HASH:  {8c4e56f0-7b8e-3ab5-4d50-017b8f0ea0c2}
Followup:     MachineOwner
---------