*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000001, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8057420af47, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
DUMP_TYPE: 2
BUGCHECK_P1: 1
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8057420af47
READ_ADDRESS: fffff8056fb733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
0000000000000001
CURRENT_IRQL: 2
FAULTING_IP:
ndis!ndisMTopReceiveNetBufferLists+147
fffff805`7420af47 49837d0000 cmp qword ptr [r13],0
CPU_COUNT: c
CPU_MHZ: e09
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 71
CPU_STEPPING: 0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: System
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 12-16-2019 23:31:24.0337
ANALYSIS_VERSION: 10.0.18362.1 x86fre
TRAP_FRAME: fffff80574e67220 -- (.trap 0xfffff80574e67220)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000005 rbx=0000000000000000 rcx=ffff8b087d4ef510
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8057420af47 rsp=fffff80574e673b0 rbp=fffff80574e67451
r8=ffff8b0879b641a0 r9=0000000000000000 r10=0000000000000001
r11=ffffb2790f000001 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
ndis!ndisMTopReceiveNetBufferLists+0x147:
fffff805`7420af47 49837d0000 cmp qword ptr [r13],0 ds:00000000`00000000=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8056f7d32e9 to fffff8056f7c14e0
STACK_TEXT:
fffff805`74e670d8 fffff805`6f7d32e9 : 00000000`0000000a 00000000`00000001 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff805`74e670e0 fffff805`6f7cf62b : 00000008`00000004 fffff805`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff805`74e67220 fffff805`7420af47 : 00000007`00000001 ffff8b08`00000008 00000000`00000800 ffff8b08`00000000 : nt!KiPageFault+0x46b
fffff805`74e673b0 fffff805`74210eb0 : ffff8b08`79b641a0 fffff805`00000000 ffff8b08`79b641a0 fffff805`735b208d : ndis!ndisMTopReceiveNetBufferLists+0x147
fffff805`74e674b0 fffff805`74241756 : ffff8b08`7d4ea9f0 fffff805`74e67581 00000000`00000000 00000000`00000008 : ndis!ndisCallReceiveHandler+0x60
fffff805`74e67500 fffff805`7420e874 : 00000000`0010fe76 00000000`00000001 ffff8b08`79b641a0 00000000`00000001 : ndis!ndisInvokeNextReceiveHandler+0x207a6
fffff805`74e675d0 fffff805`7e5c5bb9 : ffff8b08`7d4aa000 ffff8b08`7d4aa000 00000000`00000000 ffff8b08`7d4aa5f0 : ndis!NdisMIndicateReceiveNetBufferLists+0x104
fffff805`74e67660 fffff805`7e5b2351 : 00000000`00000000 fffff170`9e1ad501 00000028`00000400 fffff805`74e677d8 : rt640x64!MpHandleRecvIntPriVLanJumbo+0xb41
fffff805`74e67750 fffff805`7420f2cc : 00000000`00000000 ffff8b08`7d7e7280 fffff805`80382be0 fffff805`00000000 : rt640x64!MPHandleMessageInterrupt+0x341
fffff805`74e677c0 fffff805`6f66ae95 : 00000000`00000000 00000000`00000001 fffff805`74e678a8 00000000`00000000 : ndis!ndisInterruptDpc+0x19c
fffff805`74e678f0 fffff805`6f66a4ef : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExecuteAllDpcs+0x305
fffff805`74e67a30 fffff805`6f7c5024 : 00000000`00000000 fffff805`6d608180 00000000`00000000 fffff805`6fb91400 : nt!KiRetireDpcList+0x1ef
fffff805`74e67c60 00000000`00000000 : fffff805`74e68000 fffff805`74e62000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x84
THREAD_SHA1_HASH_MOD_FUNC: e878c61b72aec1e87d18f42d5763235ada7c73e3
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: c1fdaa211506f9d97e7f6967ec912cf66439fb5d
THREAD_SHA1_HASH_MOD: 151fffff2e1d2e818079bf439acd32f0d5d2316b
FOLLOWUP_IP:
rt640x64!MpHandleRecvIntPriVLanJumbo+b41
fffff805`7e5c5bb9 4c8b6c2460 mov r13,qword ptr [rsp+60h]
FAULT_INSTR_CODE: 246c8b4c
SYMBOL_STACK_INDEX: 7
SYMBOL_NAME: rt640x64!MpHandleRecvIntPriVLanJumbo+b41
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: rt640x64
IMAGE_NAME: rt640x64.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 5bcde005
IMAGE_VERSION: 9.1.409.2015
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: b41
FAILURE_BUCKET_ID: AV_rt640x64!MpHandleRecvIntPriVLanJumbo
BUCKET_ID: AV_rt640x64!MpHandleRecvIntPriVLanJumbo
PRIMARY_PROBLEM_CLASS: AV_rt640x64!MpHandleRecvIntPriVLanJumbo
TARGET_TIME: 2019-12-11T21:43:56.000Z
OSBUILD: 18362
OSSERVICEPACK: 535
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1980-01-11 18:53:20
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 7569
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_rt640x64!mphandlerecvintprivlanjumbo
FAILURE_ID_HASH: {e85833a8-915f-a98a-61ce-bd85f0b49fd7}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffff868b74576253, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8004523ac31, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
DUMP_TYPE: 2
BUGCHECK_P1: ffff868b74576253
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8004523ac31
READ_ADDRESS: fffff800457733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
ffff868b74576253
CURRENT_IRQL: 2
FAULTING_IP:
nt!KeWaitForSingleObject+a1
fffff800`4523ac31 83790400 cmp dword ptr [rcx+4],0
CPU_COUNT: c
CPU_MHZ: e09
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 71
CPU_STEPPING: 0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: opera.exe
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 12-16-2019 23:31:28.0038
ANALYSIS_VERSION: 10.0.18362.1 x86fre
TRAP_FRAME: ffff868b90b3a810 -- (.trap 0xffff868b90b3a810)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffff868b7457624f
rdx=fffff78000000008 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8004523ac31 rsp=ffff868b90b3a9a0 rbp=ffff868b90b3aa21
r8=0000000000000001 r9=0000000000000000 r10=0000000000000001
r11=fffff780000003b0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
nt!KeWaitForSingleObject+0xa1:
fffff800`4523ac31 83790400 cmp dword ptr [rcx+4],0 ds:ffff868b`74576253=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800453d32e9 to fffff800453c14e0
STACK_TEXT:
ffff868b`90b3a6c8 fffff800`453d32e9 : 00000000`0000000a ffff868b`74576253 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffff868b`90b3a6d0 fffff800`453cf62b : 00000000`00000000 fffff800`45200000 ffffbc01`18700180 ffff84a9`8db3b2bc : nt!KiBugCheckDispatch+0x69
ffff868b`90b3a810 fffff800`4523ac31 : ffff8f0a`000000c0 ffff868b`00000000 ffff868b`90b3ab01 00000000`00000000 : nt!KiPageFault+0x46b
ffff868b`90b3a9a0 fffff800`457f3c5b : ffff8f0a`5fa0c0e0 00000000`00000006 00000000`00000001 00000237`1c4b7e00 : nt!KeWaitForSingleObject+0xa1
ffff868b`90b3aa80 fffff800`453d2d18 : ffff8f0a`581e0080 0000008b`d97afb58 ffff868b`90b3ab18 ffffffff`ffffd8f0 : nt!NtWaitForSingleObject+0x10b
ffff868b`90b3ab00 00007ffc`87b3c144 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000008b`d97afb28 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`87b3c144
THREAD_SHA1_HASH_MOD_FUNC: ce952d657f7eb7f8c759a1a1e40ec24a2db5ec7d
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: d6a9f5239c1326f9f1af0d932c71bd507aa2f284
THREAD_SHA1_HASH_MOD: ee8fcf1fb60cb6e3e2f60ddbed2ec02b5748a693
FOLLOWUP_IP:
nt!KeWaitForSingleObject+a1
fffff800`4523ac31 83790400 cmp dword ptr [rcx+4],0
FAULT_INSTR_CODE: 47983
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!KeWaitForSingleObject+a1
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 12dcb470
IMAGE_VERSION: 10.0.18362.535
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: a1
FAILURE_BUCKET_ID: AV_nt!KeWaitForSingleObject
BUCKET_ID: AV_nt!KeWaitForSingleObject
PRIMARY_PROBLEM_CLASS: AV_nt!KeWaitForSingleObject
TARGET_TIME: 2019-12-12T21:01:44.000Z
OSBUILD: 18362
OSSERVICEPACK: 535
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1980-01-11 18:53:20
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: af9
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_nt!kewaitforsingleobject
FAILURE_ID_HASH: {505415ce-6277-25db-2465-e86127b1616c}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 00000000000054a3, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8040e838cf2, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for nvlddmkm.sys
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
DUMP_TYPE: 2
BUGCHECK_P1: 54a3
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff8040e838cf2
WRITE_ADDRESS: fffff8040ed733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
00000000000054a3
CURRENT_IRQL: 2
FAULTING_IP:
nt!KxReleaseQueuedSpinLock+32
fffff804`0e838cf2 f0480fb139 lock cmpxchg qword ptr [rcx],rdi
CPU_COUNT: c
CPU_MHZ: e09
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 71
CPU_STEPPING: 0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: System
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 12-16-2019 23:31:32.0412
ANALYSIS_VERSION: 10.0.18362.1 x86fre
TRAP_FRAME: fffff80413267060 -- (.trap 0xfffff80413267060)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff80413267368 rbx=0000000000000000 rcx=00000000000054a3
rdx=fffff80413267270 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8040e838cf2 rsp=fffff804132671f0 rbp=fffff80413267320
r8=ffff9a09c48ff340 r9=0000000000000000 r10=fffff8040e838cc0
r11=fffff804132671f0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!KxReleaseQueuedSpinLock+0x32:
fffff804`0e838cf2 f0480fb139 lock cmpxchg qword ptr [rcx],rdi ds:00000000`000054a3=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8040e9d32e9 to fffff8040e9c14e0
STACK_TEXT:
fffff804`13266f18 fffff804`0e9d32e9 : 00000000`0000000a 00000000`000054a3 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff804`13266f20 fffff804`0e9cf62b : 00000000`00000002 00000000`00000000 00000000`00000000 00000000`00000002 : nt!KiBugCheckDispatch+0x69
fffff804`13267060 fffff804`0e838cf2 : ffff9a09`d04d04b0 ffff9a09`d055f4e0 ffff9a09`c831b628 fffff804`13267320 : nt!KiPageFault+0x46b
fffff804`132671f0 fffff804`1dc47bb8 : 00000000`00000000 ffff9a09`c831b000 fffff804`13267320 ffff9a09`c838b000 : nt!KxReleaseQueuedSpinLock+0x32
fffff804`13267220 fffff804`1dc470fe : ffff9a09`c838e002 ffff9a09`00000000 ffff9a09`00000000 ffff9a09`00000000 : dxgmms2!VidSchiProcessCompletedQueuePacketInternal+0x6f8
fffff804`132673d0 fffff804`1dc4479b : ffff9a09`c838e002 00000000`00000001 fffff804`13267629 00000000`00000000 : dxgmms2!VidSchiProcessDpcCompletedPacket+0x6ee
fffff804`13267530 fffff804`1bf44711 : fffff804`13267629 ffff9a09`c831b000 ffff9a09`c4c746e8 00000000`00000000 : dxgmms2!VidSchDdiNotifyDpc+0x22b
fffff804`132675e0 fffff804`1f097cb4 : ffff9a09`c4c74030 00000000`00000000 ffff9a09`c4c74030 ffff9a09`c49b4000 : dxgkrnl!DxgNotifyDpcCB+0x91
fffff804`13267690 ffff9a09`c4c74030 : 00000000`00000000 ffff9a09`c4c74030 ffff9a09`c49b4000 fffff804`1f097c47 : nvlddmkm+0xa7cb4
fffff804`13267698 00000000`00000000 : ffff9a09`c4c74030 ffff9a09`c49b4000 fffff804`1f097c47 ffff9a09`c49b4000 : 0xffff9a09`c4c74030
THREAD_SHA1_HASH_MOD_FUNC: 5d91316b45855d6276047261974539e1fdab1da2
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 19928186f760a71720824155545844098bc6be18
THREAD_SHA1_HASH_MOD: f9ab640266b35824718fb479bce6b94b41a7a7c6
FOLLOWUP_IP:
dxgmms2!VidSchiProcessCompletedQueuePacketInternal+6f8
fffff804`1dc47bb8 0fb68db0000000 movzx ecx,byte ptr [rbp+0B0h]
FAULT_INSTR_CODE: b08db60f
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: dxgmms2!VidSchiProcessCompletedQueuePacketInternal+6f8
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: dxgmms2
IMAGE_NAME: dxgmms2.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 0
IMAGE_VERSION: 10.0.18362.449
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 6f8
FAILURE_BUCKET_ID: AV_dxgmms2!VidSchiProcessCompletedQueuePacketInternal
BUCKET_ID: AV_dxgmms2!VidSchiProcessCompletedQueuePacketInternal
PRIMARY_PROBLEM_CLASS: AV_dxgmms2!VidSchiProcessCompletedQueuePacketInternal
TARGET_TIME: 2019-12-13T20:02:25.000Z
OSBUILD: 18362
OSSERVICEPACK: 535
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1980-01-11 18:53:20
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 11e47
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_dxgmms2!vidschiprocesscompletedqueuepacketinternal
FAILURE_ID_HASH: {b2c3b332-059a-e5f3-ac1f-2810d43d4dff}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: 000000000000001a, The address that the exception occurred at
Arg3: 0000000000000008, Parameter 0 of the exception
Arg4: 000000000000001a, Parameter 1 of the exception
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
DUMP_TYPE: 2
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: 1a
BUGCHECK_P3: 8
BUGCHECK_P4: 1a
WRITE_ADDRESS: fffff800691733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
000000000000001a
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
+0
00000000`0000001a ?? ???
EXCEPTION_PARAMETER1: 0000000000000008
EXCEPTION_PARAMETER2: 000000000000001a
BUGCHECK_STR: 0x1E_c0000005_X
CPU_COUNT: c
CPU_MHZ: e09
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 71
CPU_STEPPING: 0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 12-16-2019 23:31:35.0999
ANALYSIS_VERSION: 10.0.18362.1 x86fre
EXCEPTION_RECORD: ffff98cc66331000 -- (.exr 0xffff98cc66331000)
ExceptionAddress: 0000000000000000
ExceptionCode: 00511867
ExceptionFlags: 8a000004
NumberParameters: 0
TRAP_FRAME: ffff800000000000 -- (.trap 0xffff800000000000)
Unable to read trap frame at ffff8000`00000000
LAST_CONTROL_TRANSFER: from fffff80068e2fda7 to fffff80068dc14e0
STACK_TEXT:
ffffe88c`2a5c6f98 fffff800`68e2fda7 : 00000000`0000001e ffffffff`c0000005 00000000`0000001a 00000000`00000008 : nt!KeBugCheckEx
ffffe88c`2a5c6fa0 fffff800`68dd341d : ffff98cc`66331000 ffffe88c`2a5c7830 ffff8000`00000000 00000000`0000001a : nt!KiDispatchException+0x1689d7
ffffe88c`2a5c7650 fffff800`68dcf605 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0x11d
ffffe88c`2a5c7830 00000000`0000001a : ffffd48b`23162080 fffff800`00000000 00000000`00000000 fffff800`00000000 : nt!KiPageFault+0x445
ffffe88c`2a5c79c0 ffffd48b`23162080 : fffff800`00000000 00000000`00000000 fffff800`00000000 00000000`0000000e : 0x1a
ffffe88c`2a5c79c8 fffff800`00000000 : 00000000`00000000 fffff800`00000000 00000000`0000000e ffffe88c`2a5c7a48 : 0xffffd48b`23162080
ffffe88c`2a5c79d0 00000000`00000000 : fffff800`00000000 00000000`0000000e ffffe88c`2a5c7a48 00000000`0000001a : 0xfffff800`00000000
THREAD_SHA1_HASH_MOD_FUNC: 2e9ab7e93b3f60731b8608f9c5cc37cdb42d594f
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: ad4e40938d7ce4649a69b0de8cb803599f411381
THREAD_SHA1_HASH_MOD: d084f7dfa548ce4e51810e4fd5914176ebc66791
FOLLOWUP_IP:
nt!KiDispatchException+1689d7
fffff800`68e2fda7 cc int 3
FAULT_INSTR_CODE: 86f741cc
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!KiDispatchException+1689d7
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 12dcb470
IMAGE_VERSION: 10.0.18362.535
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 1689d7
FAILURE_BUCKET_ID: 0x1E_c0000005_X_nt!KiDispatchException
BUCKET_ID: 0x1E_c0000005_X_nt!KiDispatchException
PRIMARY_PROBLEM_CLASS: 0x1E_c0000005_X_nt!KiDispatchException
TARGET_TIME: 2019-12-16T20:03:48.000Z
OSBUILD: 18362
OSSERVICEPACK: 535
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1980-01-11 18:53:20
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 2ace
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x1e_c0000005_x_nt!kidispatchexception
FAILURE_ID_HASH: {72b01280-60ea-6404-b5e3-077cb4799617}
Followup: MachineOwner
---------