KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000004, The thread's stack pointer was outside the legal stack
extents for the thread.
Arg2: ffffc881e976eff0, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffc881e976ef48, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 10.0.18362.418 (WinBuild.160101.0800)
SYSTEM_MANUFACTURER: System manufacturer
SYSTEM_PRODUCT_NAME: System Product Name
SYSTEM_SKU: SKU
SYSTEM_VERSION: System Version
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 0409
BIOS_DATE: 08/24/2018
BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
BASEBOARD_PRODUCT: PRIME B450M-K
BASEBOARD_VERSION: Rev X.0x
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
DUMP_TYPE: 2
BUGCHECK_P1: 4
BUGCHECK_P2: ffffc881e976eff0
BUGCHECK_P3: ffffc881e976ef48
BUGCHECK_P4: 0
TRAP_FRAME: 944bedc6980b6dc2 -- (.trap 0x944bedc6980b6dc2)
Unable to read trap frame at 944bedc6`980b6dc2
EXCEPTION_RECORD: 287441e8243441ec -- (.exr 0x287441e8243441ec)
Cannot read Exception record @ 287441e8243441ec
CPU_COUNT: 10
CPU_MHZ: c7a
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 8
CPU_STEPPING: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
BUGCHECK_STR: 0x139
PROCESS_NAME: vegas140.exe
CURRENT_IRQL: 2
DEFAULT_BUCKET_ID: FAIL_FAST_INCORRECT_STACK
WATSON_BKT_EVENT: BEX
ERROR_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>
EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000004
ANALYSIS_SESSION_HOST: DESKTOP-ME9UFOB
ANALYSIS_SESSION_TIME: 04-16-2020 17:48:10.0458
ANALYSIS_VERSION: 10.0.18362.1 amd64fre
BAD_STACK_POINTER: ffffc881e976ecc8
LAST_CONTROL_TRANSFER: from fffff8050c7d30e9 to fffff8050c7c1220
STACK_TEXT:
ffffc881`e976ecc8 fffff805`0c7d30e9 : 00000000`00000139 00000000`00000004 ffffc881`e976eff0 ffffc881`e976ef48 : nt!KeBugCheckEx
ffffc881`e976ecd0 fffff805`0c7d3510 : 3bf10142`37b10146 00c193e2`0c819319 9fce2d2c`938e2d28 a4febf8c`a8bebf88 : nt!KiBugCheckDispatch+0x69
ffffc881`e976ee10 fffff805`0c7d18a5 : fffff805`0c7271e8 fffff805`0ca0ed44 ffffc881`e976f7d0 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffffc881`e976eff0 fffff805`0c84eec7 : 00000000`00000000 00000000`00000360 0005e56c`00ab6000 00000000`0010001f : nt!KiRaiseSecurityCheckFailure+0x325
ffffc881`e976f180 fffff805`0c82e7f8 : 00000000`00000000 00000000`00000000 ffffc881`e976f6f0 00007fff`00000003 : nt!RtlpGetStackLimitsEx+0x12e8bb
ffffc881`e976f1b0 fffff805`0c6c790e : ffffd887`bec1ac38 ffffc881`e976fe30 ffffd887`bec1ac38 ffffec80`01a2ecf0 : nt!RtlDispatchException+0x16b928
ffffc881`e976f900 fffff805`0c7c20a2 : 287441e8`243441ec ecbb2cb7`e0fb2cb3 944bedc6`980b6dc2 af7bff66`a33bff62 : nt!KiDispatchException+0x16e
ffffc881`e976ffb0 fffff805`0c7c2070 : fffff805`0c7d3216 00000000`00000000 ffffd887`bec1ae50 00000000`00140001 : nt!KxExceptionDispatchOnExceptionStack+0x12
ffffd887`bec1aaf8 fffff805`0c7d3216 : 00000000`00000000 ffffd887`bec1ae50 00000000`00140001 00000000`0000bfff : nt!KiExceptionDispatchOnExceptionStackContinue
ffffd887`bec1ab00 fffff805`0c7cefa2 : 00000000`80000003 00000000`00000000 00000000`00000002 fffff805`0c786307 : nt!KiExceptionDispatch+0x116
ffffd887`bec1ace0 fffff805`0c605e0e : 00000000`00000000 00000000`00035a11 ffffec80`00a0e300 ffffec80`00a0e450 : nt!KiGeneralProtectionFault+0x322
ffffd887`bec1ae70 fffff805`0c619c7c : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxWaitForLockOwnerShip+0xe
ffffd887`bec1aea0 fffff805`0c615ee2 : 00000000`0008ba45 ffffec80`01a2ed08 00000000`00000000 00000000`00000000 : nt!MiInsertPageInFreeOrZeroedList+0x78c
ffffd887`bec1af80 fffff805`0c6842e9 : fffffbe4`00000010 001eb887`00000002 00000000`00000000 001eb887`00000000 : nt!MiInsertLargePageInFreeOrZeroList+0x372
ffffd887`bec1b1a0 fffff805`0c6840de : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiDemoteLocalLargePage+0x199
ffffd887`bec1b280 fffff805`0c678566 : 00000000`00000000 00000000`00000002 00000000`00000000 fffff805`00000001 : nt!MiGetFreeOrZeroPageAnyColor+0x62
ffffd887`bec1b2c0 fffff805`0c677c61 : fffff805`0ca6a480 00000000`00000044 00000000`00000044 ffffec80`00000000 : nt!MiGetPage+0x346
ffffd887`bec1b3a0 fffff805`0c6fe847 : 00000000`00000004 1a000000`89316867 ffffec80`01a28c70 fffff805`0ca6a480 : nt!MiGetPageChain+0x181
ffffd887`bec1b590 fffff805`0c67552c : ffffd887`bec1b880 ffffd887`bec1b668 00000000`00000002 00000000`00000001 : nt!MiCreateSharedZeroPages+0x77
ffffd887`bec1b620 fffff805`0c67a45c : 00000000`00000018 ffffd887`bec1b880 ffffec80`019ee0a0 00000000`00000002 : nt!MiResolveDemandZeroFault+0x2dc
ffffd887`bec1b710 fffff805`0c674bbc : ffffd887`bec1b880 00000000`00000002 ffffd887`bec1b858 ffff9083`4854e660 : nt!MiResolveProtoPteFault+0xabc
ffffd887`bec1b810 fffff805`0c672cf9 : 00000000`00000100 00000000`00000004 00000000`c0000016 fffff805`0c7c842f : nt!MiDispatchFault+0x80c
ffffd887`bec1b960 fffff805`0c7cf320 : ffffb888`1f7db080 ffffb888`226c3d80 00007ff9`f2d90000 00000000`00000000 : nt!MmAccessFault+0x169
ffffd887`bec1bb00 00007ff7`75c20266 : 00000000`0942d5b0 00000000`b9e3f2a0 00000000`7ffe0386 00000000`b9e3f230 : nt!KiPageFault+0x360
00000000`b9e3f210 00000000`0942d5b0 : 00000000`b9e3f2a0 00000000`7ffe0386 00000000`b9e3f230 00000000`b9e3f280 : 0x00007ff7`75c20266
00000000`b9e3f218 00000000`b9e3f2a0 : 00000000`7ffe0386 00000000`b9e3f230 00000000`b9e3f280 00000000`b9e3f240 : 0x942d5b0
00000000`b9e3f220 00000000`7ffe0386 : 00000000`b9e3f230 00000000`b9e3f280 00000000`b9e3f240 00000000`000002a5 : 0xb9e3f2a0
00000000`b9e3f228 00000000`b9e3f230 : 00000000`b9e3f280 00000000`b9e3f240 00000000`000002a5 00007ff7`75c203e0 : SharedUserData+0x386
00000000`b9e3f230 00000000`b9e3f280 : 00000000`b9e3f240 00000000`000002a5 00007ff7`75c203e0 00000000`00000000 : 0xb9e3f230
00000000`b9e3f238 00000000`b9e3f240 : 00000000`000002a5 00007ff7`75c203e0 00000000`00000000 00000000`00ed0b50 : 0xb9e3f280
00000000`b9e3f240 00000000`000002a5 : 00007ff7`75c203e0 00000000`00000000 00000000`00ed0b50 00000000`0942d528 : 0xb9e3f240
00000000`b9e3f248 00007ff7`75c203e0 : 00000000`00000000 00000000`00ed0b50 00000000`0942d528 00007ff9`f2d917d6 : 0x2a5
00000000`b9e3f250 00000000`00000000 : 00000000`00ed0b50 00000000`0942d528 00007ff9`f2d917d6 00000000`7ffe0386 : 0x00007ff7`75c203e0
THREAD_SHA1_HASH_MOD_FUNC: 0f96a9e851987615e9cc1f37fd617aa80b225a25
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 63e669abf034ffd0ec9d4a7a59b3f4d41e3dddfa
THREAD_SHA1_HASH_MOD: cb872e3d67eb764c79ee5d65208299fea8045d2b
FOLLOWUP_IP:
nt!KiFastFailDispatch+d0
fffff805`0c7d3510 c644242000 mov byte ptr [rsp+20h],0
FAULT_INSTR_CODE: 202444c6
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!KiFastFailDispatch+d0
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 0
IMAGE_VERSION: 10.0.18362.418
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: d0
FAILURE_BUCKET_ID: 0x139_MISSING_GSFRAME_STACKPTR_ERROR_nt!KiFastFailDispatch
BUCKET_ID: 0x139_MISSING_GSFRAME_STACKPTR_ERROR_nt!KiFastFailDispatch
PRIMARY_PROBLEM_CLASS: 0x139_MISSING_GSFRAME_STACKPTR_ERROR_nt!KiFastFailDispatch
TARGET_TIME: 2020-04-16T14:11:25.000Z
OSBUILD: 18362
OSSERVICEPACK: 418
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: unknown_date
BUILDDATESTAMP_STR: 160101.0800
BUILDLAB_STR: WinBuild
BUILDOSVER_STR: 10.0.18362.418
ANALYSIS_SESSION_ELAPSED_TIME: 62b
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x139_missing_gsframe_stackptr_error_nt!kifastfaildispatch
FAILURE_ID_HASH: {7b0febb5-6007-4f2b-3d38-57fef278d8d5}
Followup: MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 000000000000002d, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8001fce64c6, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 10.0.18362.418 (WinBuild.160101.0800)
SYSTEM_MANUFACTURER: System manufacturer
SYSTEM_PRODUCT_NAME: System Product Name
SYSTEM_SKU: SKU
SYSTEM_VERSION: System Version
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 0409
BIOS_DATE: 08/24/2018
BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
BASEBOARD_PRODUCT: PRIME B450M-K
BASEBOARD_VERSION: Rev X.0x
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
DUMP_TYPE: 2
BUGCHECK_P1: 2d
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8001fce64c6
READ_ADDRESS: fffff800201733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
000000000000002d
CURRENT_IRQL: 2
FAULTING_IP:
nt!RtlpHpLfhSubsegmentDecommitPages+c6
fffff800`1fce64c6 410fb6472d movzx eax,byte ptr [r15+2Dh]
CPU_COUNT: 10
CPU_MHZ: c7a
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 8
CPU_STEPPING: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: System
ANALYSIS_SESSION_HOST: DESKTOP-ME9UFOB
ANALYSIS_SESSION_TIME: 04-16-2020 17:48:16.0220
ANALYSIS_VERSION: 10.0.18362.1 amd64fre
TRAP_FRAME: ffff8f04d35a3790 -- (.trap 0xffff8f04d35a3790)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000000004ff rbx=0000000000000000 rcx=ffff9303be400340
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8001fce64c6 rsp=ffff8f04d35a3920 rbp=0000000000000001
r8=00000000ffffffff r9=0000000000000001 r10=0000000000000001
r11=ffff9303c86db050 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!RtlpHpLfhSubsegmentDecommitPages+0xc6:
fffff800`1fce64c6 410fb6472d movzx eax,byte ptr [r15+2Dh] ds:00000000`0000002d=??
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8001fdd30e9 to fffff8001fdc1220
STACK_TEXT:
ffff8f04`d35a3648 fffff800`1fdd30e9 : 00000000`0000000a 00000000`0000002d 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffff8f04`d35a3650 fffff800`1fdcf42b : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffff8f04`d35a3790 fffff800`1fce64c6 : 00000000`00000000 00000000`00000000 00010046`00920001 fffff800`1fc44380 : nt!KiPageFault+0x46b
ffff8f04`d35a3920 fffff800`1fce59b3 : ffff9303`be400340 00000000`00000000 ffff9303`d39c6bff fffff800`00000001 : nt!RtlpHpLfhSubsegmentDecommitPages+0xc6
ffff8f04`d35a39b0 fffff800`1fce5a01 : ffff9303`be400a40 ffff9303`be400280 00000000`00000001 00000000`00000001 : nt!RtlpHpLfhOwnerCompact+0x67
ffff8f04`d35a3a10 fffff800`1fce5916 : ffff9303`be400410 00000000`00000000 00000000`00000000 00000000`00000000 : nt!RtlpHpLfhOwnerCompact+0xb5
ffff8f04`d35a3a70 fffff800`1fce44c6 : ffff9303`be400000 00000000`00000000 ffff9303`be400280 ffff9303`be400280 : nt!RtlpHpLfhContextCompact+0xae
ffff8f04`d35a3ab0 fffff800`1fce5691 : 00000000`00000001 ffff9303`be400000 ffffd785`884ab700 ffff9303`c5cba180 : nt!RtlpHpHeapCompact+0x76
ffff8f04`d35a3ae0 fffff800`1fcbd465 : 00000000`00000001 ffff9303`00000000 fffff800`2b4fd400 00000000`00000000 : nt!ExpHpCompactionRoutine+0x211
ffff8f04`d35a3b70 fffff800`1fd2a725 : ffff9303`c5cba040 00000000`00000080 ffff9303`be88f040 00000067`b4bbbdff : nt!ExpWorkerThread+0x105
ffff8f04`d35a3c10 fffff800`1fdc886a : ffffb400`274a3180 ffff9303`c5cba040 fffff800`1fd2a6d0 ffff9303`c581f8a0 : nt!PspSystemThreadStartup+0x55
ffff8f04`d35a3c60 00000000`00000000 : ffff8f04`d35a4000 ffff8f04`d359e000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x2a
THREAD_SHA1_HASH_MOD_FUNC: 26a692102e7ff76ec7eb337338c8922138755d24
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: cccaac848a2a27fd5061b5ac68336639745136e5
THREAD_SHA1_HASH_MOD: dc844b1b94baa204d070855e43bbbd27eee98b94
FOLLOWUP_IP:
nt!RtlpHpLfhSubsegmentDecommitPages+c6
fffff800`1fce64c6 410fb6472d movzx eax,byte ptr [r15+2Dh]
FAULT_INSTR_CODE: 47b60f41
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!RtlpHpLfhSubsegmentDecommitPages+c6
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 0
IMAGE_VERSION: 10.0.18362.418
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: c6
FAILURE_BUCKET_ID: AV_nt!RtlpHpLfhSubsegmentDecommitPages
BUCKET_ID: AV_nt!RtlpHpLfhSubsegmentDecommitPages
PRIMARY_PROBLEM_CLASS: AV_nt!RtlpHpLfhSubsegmentDecommitPages
TARGET_TIME: 2020-04-16T13:47:33.000Z
OSBUILD: 18362
OSSERVICEPACK: 418
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: unknown_date
BUILDDATESTAMP_STR: 160101.0800
BUILDLAB_STR: WinBuild
BUILDOSVER_STR: 10.0.18362.418
ANALYSIS_SESSION_ELAPSED_TIME: 59d
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_nt!rtlphplfhsubsegmentdecommitpages
FAILURE_ID_HASH: {3ea916f4-98f1-2e2d-978b-851f95bd1f17}
Followup: MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 000000008b64c880, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8051133e856, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 10.0.18362.418 (WinBuild.160101.0800)
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
DUMP_TYPE: 2
BUGCHECK_P1: 8b64c880
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8051133e856
READ_ADDRESS: fffff805117733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
000000008b64c880
CURRENT_IRQL: 2
FAULTING_IP:
nt!MiDecrementCombinedPte+2a
fffff805`1133e856 498b30 mov rsi,qword ptr [r8]
CPU_COUNT: 10
CPU_MHZ: c7a
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 8
CPU_STEPPING: 2
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: vegas140.exe
ANALYSIS_SESSION_HOST: DESKTOP-ME9UFOB
ANALYSIS_SESSION_TIME: 04-16-2020 17:48:07.0914
ANALYSIS_VERSION: 10.0.18362.1 amd64fre
TRAP_FRAME: ffff88007b3bec20 -- (.trap 0xffff88007b3bec20)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000ffffffff rbx=0000000000000000 rcx=ffffa004332e9580
rdx=ffff8d0f5185ed00 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8051133e856 rsp=ffff88007b3bedb0 rbp=ffff8d0f5185ed00
r8=000000008b64c880 r9=02200000003553b5 r10=0000000fffffffff
r11=fffffff000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!MiDecrementCombinedPte+0x2a:
fffff805`1133e856 498b30 mov rsi,qword ptr [r8] ds:00000000`8b64c880=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff805113d30e9 to fffff805113c1220
STACK_TEXT:
ffff8800`7b3bead8 fffff805`113d30e9 : 00000000`0000000a 00000000`8b64c880 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffff8800`7b3beae0 fffff805`113cf42b : 00000000`00000000 00000000`00000000 00000000`00000000 fffff805`11219486 : nt!KiBugCheckDispatch+0x69
ffff8800`7b3bec20 fffff805`1133e856 : fffff080`096e5b80 00000000`00000000 ffffc380`01a23320 ffffc380`01a2cd40 : nt!KiPageFault+0x46b
ffff8800`7b3bedb0 fffff805`11217027 : 80000000`00000000 00000000`00000004 ffff8800`7b3beef0 8a000003`553b5963 : nt!MiDecrementCombinedPte+0x2a
ffff8800`7b3bedf0 fffff805`112b15c7 : 00000000`00000003 ffff8800`7b3bf540 ffff8800`7b3bf540 ffff8800`7b3bf490 : nt!MiDeletePteRun+0xdc7
ffff8800`7b3bf010 fffff805`112ad0e2 : ffffa004`332e9580 fffff080`096e6000 00000000`00004000 00000000`00000000 : nt!MiDeleteVaTail+0x77
ffff8800`7b3bf040 fffff805`112ad271 : ffff8800`7b3bf490 fffff0f8`4004b728 00000000`00000000 0a000000`8b666867 : nt!MiWalkPageTablesRecursively+0x512
ffff8800`7b3bf100 fffff805`112ad271 : ffff8800`7b3bf490 fffff0f8`7c200258 00000000`00000000 0a000000`765f6867 : nt!MiWalkPageTablesRecursively+0x6a1
ffff8800`7b3bf1c0 fffff805`112ad271 : ffff8800`7b3bf490 fffff0f8`7c3e1000 fffff0f8`00000000 0a000001`91acd867 : nt!MiWalkPageTablesRecursively+0x6a1
ffff8800`7b3bf280 fffff805`112ac9fc : ffff8800`7b3bf490 00000000`00006000 00000000`00000000 ffff8800`7b3bf3d0 : nt!MiWalkPageTablesRecursively+0x6a1
ffff8800`7b3bf340 fffff805`112aae68 : ffff8800`7b3bf490 ffff8d0f`00000002 00000000`00000001 00000000`00000000 : nt!MiWalkPageTables+0x36c
ffff8800`7b3bf440 fffff805`112b8fc0 : ffffffff`ffffffff ffffa004`332e93f8 ffffa004`00000001 00000000`00000000 : nt!MiDeletePagablePteRange+0x268
ffff8800`7b3bf7e0 fffff805`117c786d : 4687a805`00000000 00000000`012dc7d0 ffffa004`3a325ec0 00000000`00000000 : nt!MiDeleteVad+0x860
ffff8800`7b3bf9a0 fffff805`117c7663 : ffffa004`3a325ec0 00000000`00000000 00000012`dc7d0000 00000000`00000000 : nt!MiUnmapVad+0x49
ffff8800`7b3bf9d0 fffff805`117c74f9 : ffffa004`332e9080 00000012`00000008 ffffa004`2468fae0 00000000`00000000 : nt!MiUnmapViewOfSection+0x133
ffff8800`7b3bfab0 fffff805`113d2b18 : ffffa004`300aa0c0 00000012`dc7d0000 ffff8800`7b3bfb80 ffffa004`332e9080 : nt!NtUnmapViewOfSectionEx+0x99
ffff8800`7b3bfb00 00007ffb`f275f974 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`010ff648 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`f275f974
THREAD_SHA1_HASH_MOD_FUNC: 9a2c125304243c61739d942aa866c1a6ab3ba43c
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 469d6be0c3fa98f1773d217bb636d6e5353222b3
THREAD_SHA1_HASH_MOD: aaa5a324bf1bd3082ad2b464ee2ed2f6d50e564c
FOLLOWUP_IP:
nt!MiDecrementCombinedPte+2a
fffff805`1133e856 498b30 mov rsi,qword ptr [r8]
FAULT_INSTR_CODE: f0308b49
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!MiDecrementCombinedPte+2a
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 0
IMAGE_VERSION: 10.0.18362.418
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: memory_corruption
BUCKET_ID_FUNC_OFFSET: 2a
FAILURE_BUCKET_ID: AV_nt!MiDecrementCombinedPte
BUCKET_ID: AV_nt!MiDecrementCombinedPte
PRIMARY_PROBLEM_CLASS: AV_nt!MiDecrementCombinedPte
TARGET_TIME: 2020-04-16T10:31:12.000Z
OSBUILD: 18362
OSSERVICEPACK: 418
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: unknown_date
BUILDDATESTAMP_STR: 160101.0800
BUILDLAB_STR: WinBuild
BUILDOSVER_STR: 10.0.18362.418
ANALYSIS_SESSION_ELAPSED_TIME: d14
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_nt!midecrementcombinedpte
FAILURE_ID_HASH: {2a0b0fd5-f49c-c11b-58f7-bf573724b1e1}
Followup: MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8011553e856, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 10.0.18362.418 (WinBuild.160101.0800)
SYSTEM_MANUFACTURER: System manufacturer
SYSTEM_PRODUCT_NAME: System Product Name
SYSTEM_SKU: SKU
SYSTEM_VERSION: System Version
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 0409
BIOS_DATE: 08/24/2018
BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
BASEBOARD_PRODUCT: PRIME B450M-K
BASEBOARD_VERSION: Rev X.0x
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
DUMP_TYPE: 2
BUGCHECK_P1: 0
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8011553e856
READ_ADDRESS: fffff801159733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
0000000000000000
CURRENT_IRQL: 2
FAULTING_IP:
nt!MiDecrementCombinedPte+2a
fffff801`1553e856 498b30 mov rsi,qword ptr [r8]
CPU_COUNT: 10
CPU_MHZ: c7a
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 8
CPU_STEPPING: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: chrome.exe
ANALYSIS_SESSION_HOST: DESKTOP-ME9UFOB
ANALYSIS_SESSION_TIME: 04-16-2020 17:48:24.0078
ANALYSIS_VERSION: 10.0.18362.1 amd64fre
TRAP_FRAME: fffff9066398e0f0 -- (.trap 0xfffff9066398e0f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000ffffffff rbx=0000000000000000 rcx=ffff8b89ae69f580
rdx=ffff9c8b06840b60 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8011553e856 rsp=fffff9066398e280 rbp=ffff9c8b06840b60
r8=0000000000000000 r9=00200000001ddd16 r10=0000000fffffffff
r11=fffffff000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!MiDecrementCombinedPte+0x2a:
fffff801`1553e856 498b30 mov rsi,qword ptr [r8] ds:00000000`00000000=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff801155d30e9 to fffff801155c1220
STACK_TEXT:
fffff906`6398dfa8 fffff801`155d30e9 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff906`6398dfb0 fffff801`155cf42b : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff906`6398e0f0 fffff801`1553e856 : ffff452c`b091b580 ffffd480`01a2c500 ffffd480`01a2c500 ffff8b89`ae69f580 : nt!KiPageFault+0x46b
fffff906`6398e280 fffff801`154bd0b3 : fffff906`6398e3c0 ffff8b89`ae69f080 fffff906`6398e3c0 00000000`00000000 : nt!MiDecrementCombinedPte+0x2a
fffff906`6398e2c0 fffff801`15615773 : ffff8b89`a9ed25d0 0000160d`0816c000 fffff906`6398e660 0000160d`0816c000 : nt!MiCopyOnWrite+0x8f3
fffff906`6398e560 fffff801`1552a635 : ffff8b89`b46d3080 fffff801`154b3f9a ffff8b89`a9ed25d0 ffff8b89`a9ed25d0 : nt!MiWalkVaRange+0x18fbcf
fffff906`6398e710 fffff801`15a57a1c : 00000000`00000002 fffff906`6398e860 ffff8b89`a9ed25d0 00000000`00000000 : nt!MiResetVirtualMemory+0x85
fffff906`6398e760 fffff801`15a50756 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiAllocateVirtualMemory+0x51c
fffff906`6398e8f0 fffff801`155d2b18 : ffffffff`ffffffff ffff8b89`b46d3080 00000000`00000000 000000f6`ac1ff278 : nt!NtAllocateVirtualMemory+0x196
fffff906`6398ea90 00007fff`8a73c3c4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000f6`ac1ff258 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`8a73c3c4
THREAD_SHA1_HASH_MOD_FUNC: 8dd960acc5fb270b6cfbf221a83ff96a378f7817
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 2d2d6da1e9c97579642d9840debbda83b86fb048
THREAD_SHA1_HASH_MOD: bc100a5647b828107ac4e18055e00abcbe1ec406
FOLLOWUP_IP:
nt!MiDecrementCombinedPte+2a
fffff801`1553e856 498b30 mov rsi,qword ptr [r8]
FAULT_INSTR_CODE: f0308b49
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!MiDecrementCombinedPte+2a
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 0
IMAGE_VERSION: 10.0.18362.418
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: memory_corruption
BUCKET_ID_FUNC_OFFSET: 2a
FAILURE_BUCKET_ID: AV_nt!MiDecrementCombinedPte
BUCKET_ID: AV_nt!MiDecrementCombinedPte
PRIMARY_PROBLEM_CLASS: AV_nt!MiDecrementCombinedPte
TARGET_TIME: 2020-04-16T06:47:31.000Z
OSBUILD: 18362
OSSERVICEPACK: 418
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: unknown_date
BUILDDATESTAMP_STR: 160101.0800
BUILDLAB_STR: WinBuild
BUILDOSVER_STR: 10.0.18362.418
ANALYSIS_SESSION_ELAPSED_TIME: be7
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_nt!midecrementcombinedpte
FAILURE_ID_HASH: {2a0b0fd5-f49c-c11b-58f7-bf573724b1e1}
Followup: MachineOwner
---------