BiosVersion = 2409
BiosReleaseDate = 12/02/2020
BaseBoardManufacturer = ASUSTeK COMPUTER INC.
BaseBoardProduct = B450M-DRAGON
BaseBoardVersion = Rev X.0x
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: ffff965877240cf1, Address of the instruction which caused the BugCheck
Arg3: ffffbd08476dee50, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1687
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 3917
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 155
Key : Analysis.Init.Elapsed.mSec
Value: 14389
Key : Analysis.Memory.CommitPeak.Mb
Value: 153
Key : Bugcheck.Code.DumpHeader
Value: 0x3b
Key : Bugcheck.Code.Register
Value: 0x3b
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 051423-14312-01.dmp
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: ffff965877240cf1
BUGCHECK_P3: ffffbd08476dee50
BUGCHECK_P4: 0
CONTEXT: ffffbd08476dee50 -- (.cxr 0xffffbd08476dee50)
rax=0000000000000000 rbx=ffff960b406028a0 rcx=ffff960b406028e0
rdx=0000000000000ef3 rsi=ffffbd08476df908 rdi=0000000000000ef3
rip=ffff965877240cf1 rsp=ffffbd08476df850 rbp=0000000000005700
r8=0000000000000000 r9=0000000000000000 r10=0000000000000ef3
r11=ffff960b406028e0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000001
iopl=0 nv up ei ng nz na po cy
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050287
win32kbase!GdiHandleManager::AcquireEntryIndex+0xe1:
ffff9658`77240cf1 41fe410d inc byte ptr [r9+0Dh] ds:002b:00000000`0000000d=??
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: dwm.exe
STACK_TEXT:
ffffbd08`476df850 ffff9658`7723dcc9 : 00000000`00000ef3 00000000`000004c4 00000000`00005704 00000000`00000000 : win32kbase!GdiHandleManager::AcquireEntryIndex+0xe1
ffffbd08`476df890 ffff9658`7725c9c9 : ffff960b`44325f50 00000000`00000000 00000000`00005780 00000000`00000000 : win32kbase!HmgInsertObjectInternal+0x89
ffffbd08`476df900 ffff9658`7725c965 : ffff9805`38bc7080 ffffce80`fae4cca8 00000000`00000000 fffff802`487c6434 : win32kbase!RGNOBJ::hrgnAssociate+0x19
ffffbd08`476df930 fffff802`487c0ffe : ffff960b`44325f50 ffffce80`fae4cc98 00000000`00000000 fffff802`487c0cfc : win32kbase!CRegion::GetRegionHandleAndReset+0x45
ffffbd08`476df960 fffff802`487c0500 : ffffce80`f48a3ca0 ffffce81`02473820 00000000`00000000 00000000`00000000 : dxgkrnl!CCompositionSurface::GetSurfaceUpdate+0xee
ffffbd08`476df9b0 ffff9658`77261c31 : ffffce81`02473820 ffffbd08`476dfb80 00000000`00005780 ffffbd08`476dfad0 : dxgkrnl!CCompositionFrame::GetSurfaceUpdates+0x430
ffffbd08`476dfa40 ffff9658`7754eda6 : 00000000`00000000 000000bc`6ec7f4f8 000000bc`6ec7f504 00000000`00000000 : win32kbase!NtDCompositionGetFrameSurfaceUpdates+0x171
ffffbd08`476dfad0 fffff802`3860f4f5 : ffff9805`38bc7080 00000000`00000000 00000000`00000000 ffff9805`00000000 : win32k!NtDCompositionGetFrameSurfaceUpdates+0x16
ffffbd08`476dfb00 00007ff9`112636e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
000000bc`6ec7f4a8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`112636e4
SYMBOL_NAME: win32kbase!GdiHandleManager::AcquireEntryIndex+e1
MODULE_NAME: win32kbase
IMAGE_NAME: win32kbase.sys
IMAGE_VERSION: 10.0.19041.2965
STACK_COMMAND: .cxr 0xffffbd08476dee50 ; kb
BUCKET_ID_FUNC_OFFSET: e1
FAILURE_BUCKET_ID: AV_win32kbase!GdiHandleManager::AcquireEntryIndex
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {4b7cd9a2-f1e7-2f43-33bc-5facf1aaa2a3}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common BugCheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: 0000000000000000, The address that the exception occurred at
Arg3: 0000000000000008, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception
Debugging Details:
------------------
*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: ExceptionRecord ***
*** ***
*************************************************************************
*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: ContextRecord ***
*** ***
*************************************************************************
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2343
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 73451
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 124
Key : Analysis.Init.Elapsed.mSec
Value: 9911
Key : Analysis.Memory.CommitPeak.Mb
Value: 135
Key : Bugcheck.Code.DumpHeader
Value: 0x1e
Key : Bugcheck.Code.Register
Value: 0x1e
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 051323-16656-01.dmp
BUGCHECK_CODE: 1e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: 0
BUGCHECK_P3: 8
BUGCHECK_P4: 0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: ffff800000000000 -- (.trap 0xffff800000000000)
Unable to read trap frame at ffff8000`00000000
STACK_TEXT:
ffff8109`065c60c8 fffff803`3fc60cd3 : 00000000`0000001e ffffffff`c0000005 00000000`00000000 00000000`00000008 : nt!KeBugCheckEx
ffff8109`065c60d0 fffff803`3fc0fe6c : 00000000`00001000 ffff8109`065c6970 ffff8000`00000000 00000000`00000000 : nt!KiDispatchException+0x1795c3
ffff8109`065c6790 fffff803`3fc0b8bd : ffffb50e`8f287180 ffffb50e`90d1d5e0 00000000`00000000 ffffb50e`90c6f6b0 : nt!KiExceptionDispatch+0x12c
ffff8109`065c6970 00000000`00000000 : ffff8109`065c6b00 ffff8109`065c6b00 ffffb50e`90c6f001 00000000`00000000 : nt!KiPageFault+0x43d
SYMBOL_NAME: nt!KiDispatchException+1795c3
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.2965
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 1795c3
FAILURE_BUCKET_ID: AV_nt!KiDispatchException
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {00781d15-b897-afab-75cd-f83221cbf387}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffd60a20adf5f0, Address of the trap frame for the exception that caused the BugCheck
Arg3: ffffd60a20adf548, Address of the exception record for the exception that caused the BugCheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1921
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 3394
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 155
Key : Analysis.Init.Elapsed.mSec
Value: 2057
Key : Analysis.Memory.CommitPeak.Mb
Value: 134
Key : Bugcheck.Code.DumpHeader
Value: 0x139
Key : Bugcheck.Code.Register
Value: 0x139
Key : FailFast.Name
Value: CORRUPT_LIST_ENTRY
Key : FailFast.Type
Value: 3
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 051423-13125-01.dmp
BUGCHECK_CODE: 139
BUGCHECK_P1: 3
BUGCHECK_P2: ffffd60a20adf5f0
BUGCHECK_P3: ffffd60a20adf548
BUGCHECK_P4: 0
TRAP_FRAME: ffffd60a20adf5f0 -- (.trap 0xffffd60a20adf5f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff800e93192de0 rbx=0000000000000000 rcx=0000000000000003
rdx=ffff800e93019760 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80441482a34 rsp=ffffd60a20adf780 rbp=ffffe70020000180
r8=ffff800e93192d20 r9=0000000000000001 r10=ffff800e83b1edd0
r11=ffffd60a20adf840 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!IopQueueIrpToFileObject+0x142674:
fffff804`41482a34 cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: ffffd60a20adf548 -- (.exr 0xffffd60a20adf548)
ExceptionAddress: fffff80441482a34 (nt!IopQueueIrpToFileObject+0x0000000000142674)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: chrome.exe
ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000003
EXCEPTION_STR: 0xc0000409
STACK_TEXT:
ffffd60a`20adf2c8 fffff804`4140fd29 : 00000000`00000139 00000000`00000003 ffffd60a`20adf5f0 ffffd60a`20adf548 : nt!KeBugCheckEx
ffffd60a`20adf2d0 fffff804`41410290 : 00000000`00000002 ffffe700`1ff36180 00000000`00000000 fffff804`4121a106 : nt!KiBugCheckDispatch+0x69
ffffd60a`20adf410 fffff804`4140e25d : 00000000`00000000 fffff804`3d073180 ffff800e`8fe323c0 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffffd60a`20adf5f0 fffff804`41482a34 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x31d
ffffd60a`20adf780 fffff804`41610868 : 00000000`00000001 000021f8`01631a78 00000000`00000000 ffff800e`93192d20 : nt!IopQueueIrpToFileObject+0x142674
ffffd60a`20adf7d0 fffff804`415cccb9 : ffffd60a`20adf8d0 ffffd60a`20adf980 ffff800e`9301b850 00000000`00000000 : nt!IopSynchronousServiceTail+0x98
ffffd60a`20adf870 fffff804`415f8e56 : ffff800e`93192d20 000021f8`01631a78 ffff800e`9301b850 000021f8`01631a78 : nt!IopWriteFile+0x23d
ffffd60a`20adf970 fffff804`4140f4f5 : 00000000`00000000 00000000`00000000 00000000`00000000 000021f8`01631a78 : nt!NtWriteFile+0x996
ffffd60a`20adfa90 00007ffb`2a4ed164 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
0000008d`e8ffdb88 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`2a4ed164
SYMBOL_NAME: nt!KiFastFailDispatch+d0
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.2965
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: d0
FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {3aede96a-54dd-40d6-d4cb-2a161a843851}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
APC_INDEX_MISMATCH (1)
This is a kernel internal error. The most common reason to see this
BugCheck is when a filesystem or a driver has a mismatched number of
calls to disable and re-enable APCs. The key data item is the
Thread->CombinedApcDisable field. This consists of two separate 16-bit
fields, the SpecialApcDisable and the KernelApcDisable. A negative value
of either indicates that a driver has disabled special or normal APCs
(respectively) without re-enabling them; a positive value indicates that
a driver has enabled special or normal APCs (respectively) too many times.
Arguments:
Arg1: 00007ffcee28dbb4, Address of system call function or worker routine
Arg2: 0000000000000000, Thread->ApcStateIndex
Arg3: 000000000000ffff, (Thread->SpecialApcDisable << 16) | Thread->KernelApcDisable
Arg4: ffffbc02bc38eb80, Call type (0 - system call, 1 - worker routine)
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1593
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 4927
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 171
Key : Analysis.Init.Elapsed.mSec
Value: 11950
Key : Analysis.Memory.CommitPeak.Mb
Value: 145
Key : Bugcheck.Code.DumpHeader
Value: 0x1
Key : Bugcheck.Code.Register
Value: 0x1
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 051323-18171-01.dmp
BUGCHECK_CODE: 1
BUGCHECK_P1: 7ffcee28dbb4
BUGCHECK_P2: 0
BUGCHECK_P3: ffff
BUGCHECK_P4: ffffbc02bc38eb80
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: audiodg.exe
STACK_TEXT:
ffffbc02`bc38e948 fffff806`62a0fd29 : 00000000`00000001 00007ffc`ee28dbb4 00000000`00000000 00000000`0000ffff : nt!KeBugCheckEx
ffffbc02`bc38e950 fffff806`62a0fbdf : 00000000`00000000 ffffbc02`bc38eb80 ffffc30f`efdf0080 ffffc30f`efdf11f0 : nt!KiBugCheckDispatch+0x69
ffffbc02`bc38ea90 00007ffc`ee28dbb4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x334
000000f0`2ef7f4b8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`ee28dbb4
SYMBOL_NAME: nt!KiSystemServiceExitPico+334
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.2965
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 334
FAILURE_BUCKET_ID: 0x1_SysCallNum_5b_nt!KiSystemServiceExitPico
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {be677231-5295-87f7-b1f8-864a27d439ad}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common BugCheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: 0000000000000000, The address that the exception occurred at
Arg3: 0000000000000008, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception
Debugging Details:
------------------
*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: ExceptionRecord ***
*** ***
*************************************************************************
*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: ContextRecord ***
*** ***
*************************************************************************
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2389
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 47675
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 92
Key : Analysis.Init.Elapsed.mSec
Value: 12887
Key : Analysis.Memory.CommitPeak.Mb
Value: 145
Key : Bugcheck.Code.DumpHeader
Value: 0x1e
Key : Bugcheck.Code.Register
Value: 0x1e
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 051423-11906-01.dmp
BUGCHECK_CODE: 1e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: 0
BUGCHECK_P3: 8
BUGCHECK_P4: 0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: dwm.exe
TRAP_FRAME: ffff800000000000 -- (.trap 0xffff800000000000)
Unable to read trap frame at ffff8000`00000000
STACK_TEXT:
ffffd28a`05859a18 fffff802`46460cd3 : 00000000`0000001e ffffffff`c0000005 00000000`00000000 00000000`00000008 : nt!KeBugCheckEx
ffffd28a`05859a20 fffff802`4640fe6c : 00000000`00001000 ffffd28a`0585a2c0 ffff8000`00000000 00000000`00000000 : nt!KiDispatchException+0x1795c3
ffffd28a`0585a0e0 fffff802`4640b8bd : 0000007f`fffffff8 00000000`00000000 00000000`00000000 ffff8e0a`ac5f5080 : nt!KiExceptionDispatch+0x12c
ffffd28a`0585a2c0 00000000`00000000 : 00000000`00000000 ffff8e0a`aa73a290 ffffffff`ffffffff 00000000`00000001 : nt!KiPageFault+0x43d
SYMBOL_NAME: nt!KiDispatchException+1795c3
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.2965
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 1795c3
FAILURE_BUCKET_ID: AV_nt!KiDispatchException
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {00781d15-b897-afab-75cd-f83221cbf387}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffffffffffffd0, memory referenced.
Arg2: 0000000000000002, X64: bit 0 set if the fault was due to a not-present PTE.
bit 1 is set if the fault was due to a write, clear if a read.
bit 3 is set if the processor decided the fault was due to a corrupted PTE.
bit 4 is set if the fault was due to attempted execute of a no-execute PTE.
- ARM64: bit 1 is set if the fault was due to a write, clear if a read.
bit 3 is set if the fault was due to attempted execute of a no-execute PTE.
Arg3: fffff80425c21236, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : AV.Type
Value: Write
Key : Analysis.CPU.mSec
Value: 1718
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 5293
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 61
Key : Analysis.Init.Elapsed.mSec
Value: 15757
Key : Analysis.Memory.CommitPeak.Mb
Value: 145
Key : Bugcheck.Code.DumpHeader
Value: 0x50
Key : Bugcheck.Code.Register
Value: 0x50
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 051423-14859-01.dmp
BUGCHECK_CODE: 50
BUGCHECK_P1: ffffffffffffffd0
BUGCHECK_P2: 2
BUGCHECK_P3: fffff80425c21236
BUGCHECK_P4: 2
READ_ADDRESS: fffff804266fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffffffffffffd0
MM_INTERNAL_CODE: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: dwm.exe
TRAP_FRAME: ffff8a06da8ae750 -- (.trap 0xffff8a06da8ae750)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000102 rbx=0000000000000000 rcx=0000000000000000
rdx=00000000746c6644 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80425c21236 rsp=ffff8a06da8ae8e0 rbp=ffff8a06da8aeb80
r8=0000000000000001 r9=0000000000000001 r10=0000000000000000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!ObfDereferenceObjectWithTag+0x26:
fffff804`25c21236 f0480fc15ed0 lock xadd qword ptr [rsi-30h],rbx ds:ffffffff`ffffffd0=????????????????
Resetting default scope
STACK_TEXT:
ffff8a06`da8ae4a8 fffff804`25e4ac53 : 00000000`00000050 ffffffff`ffffffd0 00000000`00000002 ffff8a06`da8ae750 : nt!KeBugCheckEx
ffff8a06`da8ae4b0 fffff804`25c6e7b0 : ffff930c`e2fbabe0 00000000`00000002 ffff8a06`da8ae7d0 00000000`00000000 : nt!MiSystemFault+0x1b2273
ffff8a06`da8ae5b0 fffff804`25e0b7d8 : ffffca88`b5404140 00000000`000000d0 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x400
ffff8a06`da8ae750 fffff804`25c21236 : 00000000`00000001 00000000`00000001 00000000`00000460 fffff804`260118ee : nt!KiPageFault+0x358
ffff8a06`da8ae8e0 fffff804`25c211fe : 00000000`00000102 00000000`00000001 00000000`00000001 00000000`00000001 : nt!ObfDereferenceObjectWithTag+0x26
ffff8a06`da8ae920 fffff804`25feb84a : 00000000`00000004 00000000`00000000 00000000`00000000 ffff930c`eb868270 : nt!HalPutDmaAdapter+0xe
ffff8a06`da8ae950 fffff804`25e0f4f5 : 0000c100`00000000 00000000`0015477d 00000144`d539eb88 00000000`00000001 : nt!NtRemoveIoCompletionEx+0x10a
ffff8a06`da8aea90 00007ffc`a5f6fe74 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
0000001b`9621f318 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`a5f6fe74
SYMBOL_NAME: nt!ObfDereferenceObjectWithTag+26
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.2965
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 26
FAILURE_BUCKET_ID: AV_W_(null)_nt!ObfDereferenceObjectWithTag
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {7fa2d22a-7fd5-fefb-a919-bf62d60b9d91}
Followup: MachineOwner
---------