SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80644f000de, Address of the instruction which caused the bugcheck
Arg3: ffffbb00d7b24d30, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
SYSTEM_MANUFACTURER: System manufacturer
SYSTEM_PRODUCT_NAME: System Product Name
SYSTEM_SKU: SKU
SYSTEM_VERSION: System Version
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 0406
BIOS_DATE: 06/15/2019
BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
BASEBOARD_PRODUCT: PRIME X570-P
BASEBOARD_VERSION: Rev X.0x
DUMP_TYPE: 2
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff80644f000de
BUGCHECK_P3: ffffbb00d7b24d30
BUGCHECK_P4: 0
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
nt!EtwpAllocateFilter+ea
fffff806`44f000de 483b901284110f cmp rdx,qword ptr [rax+0F118412h]
CONTEXT: ffffbb00d7b24d30 -- (.cxr 0xffffbb00d7b24d30)
rax=0000000000000000 rbx=ffffe3000f7b3d88 rcx=0000000000000006
rdx=0000000000000006 rsi=0000000000000000 rdi=0000000000000088
rip=fffff80644f000de rsp=ffffbb00d7b25720 rbp=ffffbb00d7b258c0
r8=ffffbb00d7b258c0 r9=ffffe3000f7b3d28 r10=0000000000000000
r11=0000000000000001 r12=ffffe3000f7b3d00 r13=0000000000000000
r14=0000000000000006 r15=0000000000000088
iopl=0 nv up ei ng nz ac po cy
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050297
nt!EtwpAllocateFilter+0xea:
fffff806`44f000de 483b901284110f cmp rdx,qword ptr [rax+0F118412h] ds:002b:00000000`0f118412=????????????????
Resetting default scope
BUGCHECK_STR: 0x3B_c0000005
CPU_COUNT: c
CPU_MHZ: ed1
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 71
CPU_STEPPING: 0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
PROCESS_NAME: WmiPrvSE.exe
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-BKJR0DQ
ANALYSIS_SESSION_TIME: 03-14-2020 20:29:53.0908
ANALYSIS_VERSION: 10.0.18362.1 amd64fre
LAST_CONTROL_TRANSFER: from fffff80644f01013 to fffff80644f000de
STACK_TEXT:
ffffbb00`d7b25720 fffff806`44f01013 : 00000000`00000cc4 ffffe300`0f7b3030 fffff400`058cc460 ffffe300`024c8ad8 : nt!EtwpAllocateFilter+0xea
ffffbb00`d7b25750 fffff806`44dd2e29 : ffffe300`0f7b3d00 ffffbf8d`47cdd000 ffffbf8d`47cdd000 ffffffff`ffffffff : nt!EtwpValidateFilterDescriptors+0x167
ffffbb00`d7b257a0 fffff806`44c78308 : 00000000`00000001 ffffbb00`d7b258e0 ffffbf8d`47cdd000 00000000`00000000 : nt!EtwpValidateEnableNotification+0x15a401
ffffbb00`d7b257e0 fffff806`44c197c4 : 00000000`00000005 00000000`00000011 00000000`00000011 00000000`00000000 : nt!EtwpEnableGuid+0xc0
ffffbb00`d7b259e0 fffff806`447d2e18 : 00000000`00000011 00000189`353566a0 00000000`0000008e 00000189`353566a0 : nt!NtTraceControl+0x414
ffffbb00`d7b25a90 00007ffc`44a3f854 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000033`5567f548 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`44a3f854
CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
fffff80644f000e0-fffff80644f000e3 4 bytes - nt!EtwpAllocateFilter+ec
[ d1 75 39 41:90 12 84 11 ]
fffff80644f000e7 - nt!EtwpAllocateFilter+f3 (+0x07)
[ b9:99 ]
5 errors : !nt (fffff80644f000e0-fffff80644f000e7)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: LARGE
STACK_COMMAND: .cxr 0xffffbb00d7b24d30 ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
BUCKET_ID: MEMORY_CORRUPTION_LARGE
PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
TARGET_TIME: 2020-03-05T15:05:28.000Z
OSBUILD: 18362
OSSERVICEPACK: 657
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 784
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2005-04-23 04:40:32
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 25d4
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:memory_corruption_large
FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
Followup: memory_corruption
---------
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: fffff1891e11247a, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff804655000e1, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32kfull.sys
Could not read faulting driver name
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
SYSTEM_MANUFACTURER: System manufacturer
SYSTEM_PRODUCT_NAME: System Product Name
SYSTEM_SKU: SKU
SYSTEM_VERSION: System Version
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 0406
BIOS_DATE: 06/15/2019
BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
BASEBOARD_PRODUCT: PRIME X570-P
BASEBOARD_VERSION: Rev X.0x
DUMP_TYPE: 2
BUGCHECK_P1: fffff1891e11247a
BUGCHECK_P2: 0
BUGCHECK_P3: fffff804655000e1
BUGCHECK_P4: 2
READ_ADDRESS: fffff804659723b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff1891e11247a
FAULTING_IP:
nt!SepMaximumAccessCheck+411
fffff804`655000e1 12841141fc4489 adc al,byte ptr [rcx+rdx-76BB03BFh]
MM_INTERNAL_CODE: 2
CPU_COUNT: c
CPU_MHZ: ed1
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 71
CPU_STEPPING: 0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
BUGCHECK_STR: AV
PROCESS_NAME: chrome.exe
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-BKJR0DQ
ANALYSIS_SESSION_TIME: 03-14-2020 20:32:32.0617
ANALYSIS_VERSION: 10.0.18362.1 amd64fre
TRAP_FRAME: fffff18994cc2560 -- (.trap 0xfffff18994cc2560)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff18994cc27c8 rbx=0000000000000000 rcx=fffff18994cc2838
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff804655000e1 rsp=fffff18994cc26f0 rbp=ffff9580feee1060
r8=ffff9580be6c73b4 r9=0000000000000000 r10=0000000000000001
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe cy
nt!SepMaximumAccessCheck+0x411:
fffff804`655000e1 12841141fc4489 adc al,byte ptr [rcx+rdx-76BB03BFh] ds:fffff189`1e11247a=??
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff804655e31d6 to fffff804655c10a0
STACK_TEXT:
fffff189`94cc22b8 fffff804`655e31d6 : 00000000`00000050 fffff189`1e11247a 00000000`00000000 fffff189`94cc2560 : nt!KeBugCheckEx
fffff189`94cc22c0 fffff804`654730bf : 00000000`00000000 00000000`00000000 00000000`00000000 fffff189`1e11247a : nt!MiSystemFault+0x1d64a6
fffff189`94cc23c0 fffff804`655cf120 : fffff189`94cc25a9 fffff804`6544c1d0 00000000`00000000 fffff189`94cc2a40 : nt!MmAccessFault+0x34f
fffff189`94cc2560 fffff804`655000e1 : ffff9580`be6c7518 fffff804`654b6196 ffff0898`b1f24eea 00000000`0019c1ac : nt!KiPageFault+0x360
fffff189`94cc26f0 fffff804`65472c88 : ffff9580`feee1060 ffff9580`c4bcd540 00000000`0019c100 00000000`00000000 : nt!SepMaximumAccessCheck+0x411
fffff189`94cc27d0 fffff804`65471127 : 00000000`ffffffff fffff189`94cc2a50 ffff9580`be6c7530 00000000`00020000 : nt!SepAccessCheck+0x778
fffff189`94cc2930 fffff804`6546eb21 : 00000000`00000000 fffff189`94cc2c00 ffffc187`74bcda10 00000000`00000001 : nt!SeAccessCheckWithHintWithAdminlessChecks+0x3d7
fffff189`94cc2ae0 fffff804`659e92b9 : ffff9580`be6c73a0 00000000`00000000 ffffc187`59af1390 ffffc187`02000000 : nt!SeAccessCheck+0xd1
fffff189`94cc2b90 fffff804`659ea4a9 : ffffc187`74bcd901 fffff189`94cc2e48 ffffc187`00000040 ffffc187`4ceac4e0 : nt!ObpCreateHandle+0x7e9
fffff189`94cc2dc0 fffff804`659f2e6c : fffff189`00000001 00000000`00000000 ffffbb3d`4474c8a0 ffffc187`4ceac4e0 : nt!ObOpenObjectByNameEx+0x329
fffff189`94cc2f00 ffffbb62`29cc57d8 : 00000000`00000000 fffff189`94cc36d0 00000000`00000001 00000271`cc7e0040 : nt!ObOpenObjectByName+0x5c
fffff189`94cc2f50 00000000`00000000 : fffff189`94cc36d0 00000000`00000001 00000271`cc7e0040 fffff804`02000000 : win32kfull+0xc57d8
CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
fffff804655000e0-fffff804655000e3 4 bytes - nt!SepMaximumAccessCheck+410
[ 1c 8b 01 89:90 12 84 11 ]
4 errors : !nt (fffff804655000e0-fffff804655000e3)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: LARGE
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
BUCKET_ID: MEMORY_CORRUPTION_LARGE
PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
TARGET_TIME: 2020-02-17T21:30:17.000Z
OSBUILD: 18362
OSSERVICEPACK: 356
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 784
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: unknown_date
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 7e9b
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:memory_corruption_large
FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
Followup: memory_corruption
---------
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffe70e1c5d8d0e, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff8046f1000e1, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
DUMP_TYPE: 2
BUGCHECK_P1: ffffe70e1c5d8d0e
BUGCHECK_P2: 0
BUGCHECK_P3: fffff8046f1000e1
BUGCHECK_P4: 2
READ_ADDRESS: fffff8046ef723b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
ffffe70e1c5d8d0e
FAULTING_IP:
nt!MiGenerateSystemImageNames+41
fffff804`6f1000e1 12841166833a5c adc al,byte ptr [rcx+rdx+5C3A8366h]
MM_INTERNAL_CODE: 2
CPU_COUNT: c
CPU_MHZ: ed1
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 71
CPU_STEPPING: 0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
BUGCHECK_STR: AV
PROCESS_NAME: System
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-BKJR0DQ
ANALYSIS_SESSION_TIME: 03-14-2020 20:32:35.0253
ANALYSIS_VERSION: 10.0.18362.1 amd64fre
TRAP_FRAME: ffffe70dc0230590 -- (.trap 0xffffe70dc0230590)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff828183081d34 rbx=0000000000000000 rcx=ffffe70dc02309a8
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8046f1000e1 rsp=ffffe70dc0230720 rbp=0000000000000000
r8=0000000000000000 r9=ffff828183081d34 r10=ffff828183081cc0
r11=000000000000005d r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac po nc
nt!MiGenerateSystemImageNames+0x41:
fffff804`6f1000e1 12841166833a5c adc al,byte ptr [rcx+rdx+5C3A8366h] ds:ffffe70e`1c5d8d0e=??
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8046ebe31d6 to fffff8046ebc10a0
STACK_TEXT:
ffffe70d`c02302e8 fffff804`6ebe31d6 : 00000000`00000050 ffffe70e`1c5d8d0e 00000000`00000000 ffffe70d`c0230590 : nt!KeBugCheckEx
ffffe70d`c02302f0 fffff804`6ea730bf : 00000000`00000000 00000000`00000000 00000000`00000000 ffffe70e`1c5d8d0e : nt!MiSystemFault+0x1d64a6
ffffe70d`c02303f0 fffff804`6ebcf120 : 00000000`00000000 00000000`00000000 ffffffff`80004e88 fffff804`6ea33926 : nt!MmAccessFault+0x34f
ffffe70d`c0230590 fffff804`6f1000e1 : ffff9985`dc015c80 fffff804`00000040 00000000`00000000 00000000`00000003 : nt!KiPageFault+0x360
ffffe70d`c0230720 fffff804`6f0ff85b : ffffe70d`c02309a8 ffffe70d`c0230860 00000000`00000000 fffff804`6ea45e97 : nt!MiGenerateSystemImageNames+0x41
ffffe70d`c0230760 fffff804`6f10e0f6 : ffffe70d`c02309a8 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmLoadSystemImageEx+0x8f
ffffe70d`c0230910 fffff804`6f10dbd8 : ffffe70d`c0230a50 ffff9985`db88b500 00000000`00000000 00000000`00000000 : nt!MmLoadSystemImage+0x26
ffffe70d`c0230950 fffff804`6f10d8ae : ffff9985`e2359660 00000000`00000000 00000000`00000100 ffff9985`e2359a70 : nt!IopLoadDriver+0x224
ffffe70d`c0230b30 fffff804`6eabd645 : ffff9985`00000000 ffffffff`80004e88 ffff9985`ed5dd040 ffff9985`ed5dd040 : nt!IopLoadUnloadDriver+0x4e
ffffe70d`c0230b70 fffff804`6eb2a715 : ffff9985`ed5dd040 00000000`00000080 ffff9985`db889300 00000000`00000001 : nt!ExpWorkerThread+0x105
ffffe70d`c0230c10 fffff804`6ebc86ea : ffffd201`cee80180 ffff9985`ed5dd040 fffff804`6eb2a6c0 fffff804`6ea37011 : nt!PspSystemThreadStartup+0x55
ffffe70d`c0230c60 00000000`00000000 : ffffe70d`c0231000 ffffe70d`c022b000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x2a
CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
fffff8046f1000e0-fffff8046f1000e3 4 bytes - nt!MiGenerateSystemImageNames+40
[ 49 8d 51 fe:90 12 84 11 ]
4 errors : !nt (fffff8046f1000e0-fffff8046f1000e3)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: LARGE
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
BUCKET_ID: MEMORY_CORRUPTION_LARGE
PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
TARGET_TIME: 2020-02-16T19:15:03.000Z
OSBUILD: 18362
OSSERVICEPACK: 356
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 784
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: unknown_date
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 26f0
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:memory_corruption_large
FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
Followup: memory_corruption
---------