PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: fffff8023b764c00, memory referenced.
Arg2: 0000000000000010, value 0 = read operation, 1 = write operation.
Arg3: fffff8023b764c00, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000000, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
DUMP_TYPE: 2
BUGCHECK_P1: fffff8023b764c00
BUGCHECK_P2: 10
BUGCHECK_P3: fffff8023b764c00
BUGCHECK_P4: 0
READ_ADDRESS: fffff80231b733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8023b764c00
FAULTING_IP:
+0
fffff802`3b764c00 ?? ???
MM_INTERNAL_CODE: 0
CPU_COUNT: c
CPU_MHZ: d42
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 8
CPU_STEPPING: 2
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: LightingService.exe
CURRENT_IRQL: 2
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 01-03-2020 00:41:20.0403
ANALYSIS_VERSION: 10.0.18362.1 x86fre
TRAP_FRAME: ffffcd8464eae7f0 -- (.trap 0xffffcd8464eae7f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff80231982678 rbx=0000000000000000 rcx=00000000042b3300
rdx=ffff8902d8185cb0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8023b764c00 rsp=ffffcd8464eae988 rbp=ffffcd8464eaeb80
r8=0000000000000028 r9=00000000042b3328 r10=0000000000000001
r11=ffffcd8464eae870 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
fffff802`3b764c00 ?? ???
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff802317e3863 to fffff802317c14e0
FAILED_INSTRUCTION_ADDRESS:
+0
fffff802`3b764c00 ?? ???
STACK_TEXT:
ffffcd84`64eae548 fffff802`317e3863 : 00000000`00000050 fffff802`3b764c00 00000000`00000010 ffffcd84`64eae7f0 : nt!KeBugCheckEx
ffffcd84`64eae550 fffff802`31672eef : fffff802`00000000 00000000`00000010 00000000`00000000 fffff802`3b764c00 : nt!MiSystemFault+0x1d6af3
ffffcd84`64eae650 fffff802`317cf520 : 00000000`00000001 00000000`00000006 00000000`00000006 ffffcd84`64eae980 : nt!MmAccessFault+0x34f
ffffcd84`64eae7f0 fffff802`3b764c00 : fffff802`3b95a02c ffffab0b`f4628001 00000000`042b3300 00000000`0152e450 : nt!KiPageFault+0x360
ffffcd84`64eae988 fffff802`3b95a02c : ffffab0b`f4628001 00000000`042b3300 00000000`0152e450 00000000`00000020 : 0xfffff802`3b764c00
ffffcd84`64eae990 fffff802`3b959e85 : 00000000`00000000 00000000`016fe7a8 ffffab0b`f4628080 ffff897d`77800000 : dxgkrnl!DxgkEnumAdapters2Impl+0x19c
ffffcd84`64eaead0 fffff802`317d2d18 : ffffab0b`f4628080 00000000`00000000 ffffcd84`64eaeb80 ffffab0b`f4628080 : dxgkrnl!DxgkEnumAdapters2+0x15
ffffcd84`64eaeb00 00007ffe`0dac3714 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`0152e428 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`0dac3714
THREAD_SHA1_HASH_MOD_FUNC: 617fea6b30e003865238afefa686512dad102212
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: e439dc0b1fa3377bc3680dae567fa7979562adca
THREAD_SHA1_HASH_MOD: 22de13d81b9a7977839a59d8f867efc6fb218cf7
FOLLOWUP_IP:
dxgkrnl!DxgkEnumAdapters2Impl+19c
fffff802`3b95a02c eb28 jmp dxgkrnl!DxgkEnumAdapters2Impl+0x1c6 (fffff802`3b95a056)
FAULT_INSTR_CODE: 8b4c28eb
SYMBOL_STACK_INDEX: 5
SYMBOL_NAME: dxgkrnl!DxgkEnumAdapters2Impl+19c
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: dxgkrnl
IMAGE_NAME: dxgkrnl.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 0
IMAGE_VERSION: 10.0.18362.449
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 19c
FAILURE_BUCKET_ID: AV_INVALID_BAD_IP_dxgkrnl!DxgkEnumAdapters2Impl
BUCKET_ID: AV_INVALID_BAD_IP_dxgkrnl!DxgkEnumAdapters2Impl
PRIMARY_PROBLEM_CLASS: AV_INVALID_BAD_IP_dxgkrnl!DxgkEnumAdapters2Impl
TARGET_TIME: 2020-01-02T19:25:10.000Z
OSBUILD: 18362
OSSERVICEPACK: 535
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1980-01-11 18:53:20
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 63d6
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_invalid_bad_ip_dxgkrnl!dxgkenumadapters2impl
FAILURE_ID_HASH: {430c071e-a7a5-1bae-0e41-2fc364560b9c}
Followup: MachineOwner
---------
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000001, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff80523d3c218, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
DUMP_TYPE: 2
BUGCHECK_P1: 1
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff80523d3c218
WORKER_ROUTINE:
+0
00000000`00000001 ?? ???
WORK_ITEM: fffff80523d3c218
CURRENT_IRQL: 2
CPU_COUNT: c
CPU_MHZ: d42
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 8
CPU_STEPPING: 2
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: System
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 01-03-2020 00:41:24.0561
ANALYSIS_VERSION: 10.0.18362.1 x86fre
TRAP_FRAME: fffff8051cc8a5e0 -- (.trap 0xfffff8051cc8a5e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000001 rbx=0000000000000000 rcx=ffffbb8bc6211c70
rdx=fffff8051cc8a7f8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80523d3c218 rsp=fffff8051cc8a778 rbp=fffff8051cc8a819
r8=ffffbb8bc3eeb400 r9=ffffbb8bc6211c70 r10=0000000000000001
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
USBXHCI!UsbDevice_TransferEventHandler:
fffff805`23d3c218 4c8bdc mov r11,rsp
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff805179d32e9 to fffff805179c14e0
STACK_TEXT:
fffff805`1cc8a498 fffff805`179d32e9 : 00000000`0000000a 00000000`00000001 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff805`1cc8a4a0 fffff805`179cf62b : ffffbb8b`c9956723 ffffbb8b`c3606d00 fffff805`1cc8a7b0 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff805`1cc8a5e0 fffff805`23d3c218 : fffff805`23d1ea3c ffffbb8b`c3f03220 00000000`00000000 ffffbb8b`c3f15c70 : nt!KiPageFault+0x46b
fffff805`1cc8a778 fffff805`23d1ea3c : ffffbb8b`c3f03220 00000000`00000000 ffffbb8b`c3f15c70 fffff805`17af024b : USBXHCI!UsbDevice_TransferEventHandler
fffff805`1cc8a780 fffff805`23d1f55c : 00000000`00000000 00000000`00000001 00000000`00000000 ffffbb8b`c3f03020 : USBXHCI!Interrupter_DeferredWorkProcessor+0x578
fffff805`1cc8a880 fffff805`1b3226ac : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : USBXHCI!Interrupter_WdfEvtInterruptDpc+0xc
fffff805`1cc8a8b0 fffff805`1786ae95 : fffff805`150bb180 00000000`00000001 fffff805`1cc8a8a8 00000000`00000000 : Wdf01000!FxInterrupt::_InterruptDpcThunk+0x9c [minkernel\wdf\framework\shared\irphandlers\pnp\km\interruptobjectkm.cpp @ 404]
fffff805`1cc8a8f0 fffff805`1786a4ef : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExecuteAllDpcs+0x305
fffff805`1cc8aa30 fffff805`179c5024 : 00000000`00000000 fffff805`150bb180 fffff805`17d91400 ffffbb8b`cc7c3080 : nt!KiRetireDpcList+0x1ef
fffff805`1cc8ac60 00000000`00000000 : fffff805`1cc8b000 fffff805`1cc85000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x84
THREAD_SHA1_HASH_MOD_FUNC: 8e685a3c44fe7d136a3d528bc2f97deee2215a44
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 498b74906e5087260a8c9e4277a5d2dd022a078d
THREAD_SHA1_HASH_MOD: 806cf8a12c50abcbde9d22747b4898f5489011b8
FOLLOWUP_IP:
USBXHCI!Interrupter_DeferredWorkProcessor+578
fffff805`23d1ea3c e9bd020000 jmp USBXHCI!Interrupter_DeferredWorkProcessor+0x83a (fffff805`23d1ecfe)
FAULT_INSTR_CODE: 2bde9
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: USBXHCI!Interrupter_DeferredWorkProcessor+578
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: USBXHCI
IMAGE_NAME: USBXHCI.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 0
IMAGE_VERSION: 10.0.18362.207
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 578
FAILURE_BUCKET_ID: AV_USBXHCI!Interrupter_DeferredWorkProcessor
BUCKET_ID: AV_USBXHCI!Interrupter_DeferredWorkProcessor
PRIMARY_PROBLEM_CLASS: AV_USBXHCI!Interrupter_DeferredWorkProcessor
TARGET_TIME: 2020-01-02T06:29:15.000Z
OSBUILD: 18362
OSSERVICEPACK: 535
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1980-01-11 18:53:20
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 601c
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_usbxhci!interrupter_deferredworkprocessor
FAILURE_ID_HASH: {4cd765ba-30c8-4354-8255-dbe5c6ad7d64}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80704e43416, Address of the instruction which caused the bugcheck
Arg3: ffff8b8c9f648d20, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
SYSTEM_MANUFACTURER: System manufacturer
SYSTEM_PRODUCT_NAME: System Product Name
SYSTEM_SKU: SKU
SYSTEM_VERSION: System Version
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 5220
BIOS_DATE: 09/12/2019
BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
BASEBOARD_PRODUCT: ROG STRIX X470-F GAMING
BASEBOARD_VERSION: Rev X.0x
DUMP_TYPE: 2
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff80704e43416
BUGCHECK_P3: ffff8b8c9f648d20
BUGCHECK_P4: 0
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
nt!RtlpHpVsChunkSplit+5a6
fffff807`04e43416 334ff8 xor ecx,dword ptr [rdi-8]
CONTEXT: ffff8b8c9f648d20 -- (.cxr 0xffff8b8c9f648d20)
rax=0000000000a30000 rbx=0000000000000000 rcx=000000000c601a33
rdx=0000000000070000 rsi=ffffc18122bbbf90 rdi=0000000000a30000
rip=fffff80704e43416 rsp=ffff8b8c9f649710 rbp=ffff8b8c9f649789
r8=598c8c620cc2e5cb r9=0000000000000000 r10=0000000000000000
r11=0101010101010101 r12=ffffc18121a00290 r13=ffffc18122bac000
r14=0000000000000059 r15=ffffc18121a00280
iopl=0 nv up ei pl nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050206
nt!RtlpHpVsChunkSplit+0x5a6:
fffff807`04e43416 334ff8 xor ecx,dword ptr [rdi-8] ds:002b:00000000`00a2fff8=????????
Resetting default scope
BUGCHECK_STR: 0x3B_c0000005
CPU_COUNT: c
CPU_MHZ: d42
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 8
CPU_STEPPING: 2
BLACKBOXNTFS: 1 (!blackboxntfs)
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: smss.exe
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 01-03-2020 00:41:27.0264
ANALYSIS_VERSION: 10.0.18362.1 x86fre
LAST_CONTROL_TRANSFER: from fffff80704e42d79 to fffff80704e43416
STACK_TEXT:
ffff8b8c`9f649710 fffff807`04e42d79 : 00010059`00000007 ffffc181`22bbba00 ffffd186`00000000 00000000`00000000 : nt!RtlpHpVsChunkSplit+0x5a6
ffff8b8c`9f6497e0 fffff807`04f1019d : ffffe20d`0000005a ffffe20d`00000580 ffffe20d`00000580 00000000`00000000 : nt!RtlpHpVsContextAllocateInternal+0x3c9
ffff8b8c`9f649850 fffff807`04e3305b : fffff807`05272380 ffff8b8c`9f6499d0 ffffe20d`00000001 00000000`00000000 : nt!RtlpHpVsContextMultiAlloc+0x69
ffff8b8c`9f6498d0 fffff807`0516f06d : ffffd186`00000011 00000000`00000000 00000000`00000000 00000000`00000540 : nt!ExAllocateHeapPool+0x95b
ffff8b8c`9f649a10 fffff807`082402b3 : 00130000`00018276 ffff8b8c`9f64a3c0 00000000`00000000 00000000`00000000 : nt!ExAllocatePoolWithTag+0x5d
ffff8b8c`9f649a60 fffff807`08241586 : ffffd186`b64618a8 ffffd186`b65fa180 00000000`00000000 00130000`00018276 : Ntfs!NtfsCreateFcb+0x193
ffff8b8c`9f649ba0 fffff807`08265129 : ffffc181`2274a170 ffff8b8c`9f64a120 ffff8b8c`9f64a3c0 00000000`00000000 : Ntfs!NtfsOpenFile+0x2a6
ffff8b8c`9f649e60 fffff807`08267ffe : ffffd186`b64618a8 ffff8b8c`9f64a120 ffffd186`b64618a8 ffffd186`b6e87520 : Ntfs!NtfsCommonCreate+0x979
ffff8b8c`9f64a050 fffff807`04e31f79 : ffffd186`b65fa030 ffffd186`b6e87520 ffffd186`b2f5f700 ffffd186`b65de090 : Ntfs!NtfsFsdCreate+0x1fe
ffff8b8c`9f64a280 fffff807`076e55de : ffffd186`b6e87520 ffffd186`b6e87900 ffffd186`b6e87520 ffffd186`b6efd0c0 : nt!IofCallDriver+0x59
ffff8b8c`9f64a2c0 fffff807`0771cd27 : ffff8b8c`9f64a380 00000000`00000050 00000000`00000001 00000000`00000000 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x15e
ffff8b8c`9f64a340 fffff807`04e31f79 : 00000000`00000000 ffffd186`b6e86004 00000000`00000000 00000000`00000000 : FLTMGR!FltpCreate+0x307
ffff8b8c`9f64a3f0 fffff807`04e31024 : 00000000`00000003 00000000`00000000 00000000`00000000 fffff807`04e317e3 : nt!IofCallDriver+0x59
ffff8b8c`9f64a430 fffff807`053e61eb : ffff8b8c`9f64a701 ffffd186`b6e86004 ffff8b8c`9f64a6d0 ffffd186`b6e86010 : nt!IoCallDriverWithTracing+0x34
ffff8b8c`9f64a480 fffff807`054be277 : ffffd186`b63cdd60 00000000`00000004 ffffd186`b0b77020 00000000`00100001 : nt!IopParseDevice+0x62b
ffff8b8c`9f64a5f0 fffff807`053ed1bf : fffff807`054be1b0 ffff8b8c`9f64a760 ffffd186`b6edbd10 00000000`000000bd : nt!IopParseFile+0xc7
ffff8b8c`9f64a660 fffff807`053eb621 : ffffd186`b0b77000 ffff8b8c`9f64a8a8 00000000`00000040 ffffd186`b0b036c0 : nt!ObpLookupObjectName+0x78f
ffff8b8c`9f64a820 fffff807`05430df0 : ffffd186`00000001 0000001a`3c47ef50 00000000`00000001 00000000`00000000 : nt!ObOpenObjectByNameEx+0x201
ffff8b8c`9f64a960 fffff807`05430528 : 0000001a`3c47eea0 00000000`00120020 0000001a`3c47ef50 0000001a`3c47ef80 : nt!IopCreateFile+0x820
ffff8b8c`9f64aa00 fffff807`04fd2d18 : 00000000`000000b8 00000000`00000000 00000000`77566d4d ffff8b8c`9f64aa00 : nt!NtOpenFile+0x58
ffff8b8c`9f64aa90 00007ffb`4e83c724 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000001a`3c47ee38 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`4e83c724
THREAD_SHA1_HASH_MOD_FUNC: 911fe46be287a2351e225d7409f5d5633483c625
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 489236984e9f5c37db055345eea769dab1da997c
THREAD_SHA1_HASH_MOD: fde16a2ecd1e8ec5ac2d7e020efd013d0566deaa
FOLLOWUP_IP:
nt!RtlpHpVsChunkSplit+5a6
fffff807`04e43416 334ff8 xor ecx,dword ptr [rdi-8]
FAULT_INSTR_CODE: 3bf84f33
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!RtlpHpVsChunkSplit+5a6
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 12dcb470
IMAGE_VERSION: 10.0.18362.535
STACK_COMMAND: .cxr 0xffff8b8c9f648d20 ; kb
BUCKET_ID_FUNC_OFFSET: 5a6
FAILURE_BUCKET_ID: 0x3B_c0000005_nt!RtlpHpVsChunkSplit
BUCKET_ID: 0x3B_c0000005_nt!RtlpHpVsChunkSplit
PRIMARY_PROBLEM_CLASS: 0x3B_c0000005_nt!RtlpHpVsChunkSplit
TARGET_TIME: 2020-01-02T06:42:21.000Z
OSBUILD: 18362
OSSERVICEPACK: 535
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1980-01-11 18:53:20
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 3c5d
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x3b_c0000005_nt!rtlphpvschunksplit
FAILURE_ID_HASH: {1a8d0ef2-7999-15ae-5f58-50d223d97ed2}
Followup: MachineOwner
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: ffffed10c0009ca4, Address of the instruction which caused the bugcheck
Arg3: fffff0876f751c20, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
SYSTEM_MANUFACTURER: System manufacturer
SYSTEM_PRODUCT_NAME: System Product Name
SYSTEM_SKU: SKU
SYSTEM_VERSION: System Version
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 5220
BIOS_DATE: 09/12/2019
BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
BASEBOARD_PRODUCT: ROG STRIX X470-F GAMING
BASEBOARD_VERSION: Rev X.0x
DUMP_TYPE: 2
BUGCHECK_P1: c0000005
BUGCHECK_P2: ffffed10c0009ca4
BUGCHECK_P3: fffff0876f751c20
BUGCHECK_P4: 0
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
win32kbase!LegacyInputDispatcher::WaitAndDispatch+a4
ffffed10`c0009ca4 0100 add dword ptr [rax],eax
CONTEXT: fffff0876f751c20 -- (.cxr 0xfffff0876f751c20)
rax=0000000000000005 rbx=0000000000000001 rcx=0000000000000005
rdx=000000000000000b rsi=0000000000002000 rdi=0000000000000003
rip=ffffed10c0009ca4 rsp=fffff0876f752610 rbp=fffff0876f752710
r8=0000000000000000 r9=0000000000000000 r10=ffff868040e40180
r11=ffffd68102820140 r12=0000000000000001 r13=ffffed10c01bfb10
r14=ffffed268067c830 r15=0000000000000000
iopl=0 nv up ei ng nz ac po cy
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050297
win32kbase!LegacyInputDispatcher::WaitAndDispatch+0xa4:
ffffed10`c0009ca4 0100 add dword ptr [rax],eax ds:002b:00000000`00000005=????????
Resetting default scope
BUGCHECK_STR: 0x3B_c0000005
CPU_COUNT: c
CPU_MHZ: d42
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 8
CPU_STEPPING: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: csrss.exe
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 01-03-2020 00:41:29.0498
ANALYSIS_VERSION: 10.0.18362.1 x86fre
MISALIGNED_IP:
win32kbase!LegacyInputDispatcher::WaitAndDispatch+a4
ffffed10`c0009ca4 0100 add dword ptr [rax],eax
LAST_CONTROL_TRANSFER: from ffffed10bfc0c77e to ffffed10c0009ca4
STACK_TEXT:
fffff087`6f752610 ffffed10`bfc0c77e : 00000000`00000003 00000000`00000003 ffffed10`bff21308 00000000`00000004 : win32kbase!LegacyInputDispatcher::WaitAndDispatch+0xa4
fffff087`6f752740 ffffed10`c004e883 : ffffd681`02954080 ffffd681`02954080 00000000`00000000 00000000`00000005 : win32kfull!RawInputThread+0x95e
fffff087`6f7529c0 ffffed10`bfc2afef : ffffd681`02954080 00000000`00000000 00000000`00000005 00000000`00000000 : win32kbase!xxxCreateSystemThreads+0xa3
fffff087`6f752ad0 fffff800`35fd2d18 : ffffd681`02954080 00000000`00000005 0000022f`f5604190 00000000`000003c4 : win32kfull!NtUserCallNoParam+0x6f
fffff087`6f752b00 00007ffc`30951144 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000be`c87ffa18 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`30951144
THREAD_SHA1_HASH_MOD_FUNC: f83ed3486aadbc5e8d04e90cf6c1e0d421c604c2
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: b8f534408fd5c38d87137e6017f683a522b54f94
THREAD_SHA1_HASH_MOD: 9db53d325739810430f71cfe83fa568a36016a90
FOLLOWUP_IP:
win32kbase!LegacyInputDispatcher::WaitAndDispatch+a4
ffffed10`c0009ca4 0100 add dword ptr [rax],eax
FAULT_INSTR_CODE: 3b000001
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: win32kbase!LegacyInputDispatcher::WaitAndDispatch+a4
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: hardware
IMAGE_NAME: hardware
DEBUG_FLR_IMAGE_TIMESTAMP: 0
IMAGE_VERSION: 10.0.18362.535
STACK_COMMAND: .cxr 0xfffff0876f751c20 ; kb
FAILURE_BUCKET_ID: IP_MISALIGNED_win32kbase.sys
BUCKET_ID: IP_MISALIGNED_win32kbase.sys
PRIMARY_PROBLEM_CLASS: IP_MISALIGNED_win32kbase.sys
TARGET_TIME: 2020-01-02T18:44:35.000Z
OSBUILD: 18362
OSSERVICEPACK: 535
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1980-01-11 18:53:20
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 4977
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:ip_misaligned_win32kbase.sys
FAILURE_ID_HASH: {1b8016c6-78a7-5881-8c18-2704f15d4870}
Followup: MachineOwner
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c000001d, Exception code that caused the bugcheck
Arg2: fffff8024082c8a0, Address of the instruction which caused the bugcheck
Arg3: ffffc68b8a63df90, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
SYSTEM_MANUFACTURER: System manufacturer
SYSTEM_PRODUCT_NAME: System Product Name
SYSTEM_SKU: SKU
SYSTEM_VERSION: System Version
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 5220
BIOS_DATE: 09/12/2019
BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
BASEBOARD_PRODUCT: ROG STRIX X470-F GAMING
BASEBOARD_VERSION: Rev X.0x
DUMP_TYPE: 2
BUGCHECK_P1: c000001d
BUGCHECK_P2: fffff8024082c8a0
BUGCHECK_P3: ffffc68b8a63df90
BUGCHECK_P4: 0
EXCEPTION_CODE: (NTSTATUS) 0xc000001d - <Unable to get error code text>
FAULTING_IP:
+0
fffff802`4082c8a0 ?? ???
CONTEXT: ffffc68b8a63df90 -- (.cxr 0xffffc68b8a63df90)
rax=fffff80234f82678 rbx=0000000000000000 rcx=000000000119e680
rdx=0000000000000101 rsi=0000000000000000 rdi=000000000119e670
rip=fffff8024082c8a0 rsp=ffffc68b8a63e988 rbp=ffffc68b8a63eb80
r8=0000000000000001 r9=0000000000000006 r10=fffff80240ec9e70
r11=ffffc68b8a63eac8 r12=0000000000000006 r13=000000000119fda0
r14=000000000129ee88 r15=00000000776d3601
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246
fffff802`4082c8a0 ?? ???
Resetting default scope
BUGCHECK_STR: 0x3B_c000001d
CPU_COUNT: c
CPU_MHZ: d42
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 8
CPU_STEPPING: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: LightingService.exe
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 01-03-2020 00:41:32.0360
ANALYSIS_VERSION: 10.0.18362.1 x86fre
LAST_CONTROL_TRANSFER: from fffff80240ec9f6c to fffff8024082c8a0
STACK_TEXT:
ffffc68b`8a63e988 fffff802`40ec9f6c : 00000000`00000000 00000000`0119fda0 00000000`0129eb78 00000000`00a18000 : 0xfffff802`4082c8a0
ffffc68b`8a63e990 fffff802`40ec9e85 : 00000000`00000000 00000000`0129eb78 ffffd00e`82eb9080 ffff9a7b`63000000 : dxgkrnl!DxgkEnumAdapters2Impl+0xdc
ffffc68b`8a63ead0 fffff802`34dd2d18 : ffffd00e`82eb9080 00000000`00000000 ffffc68b`8a63eb80 ffffd00e`82eb9080 : dxgkrnl!DxgkEnumAdapters2+0x15
ffffc68b`8a63eb00 00007ff8`3d823714 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`0119e648 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`3d823714
THREAD_SHA1_HASH_MOD_FUNC: adc59d7312b854ed49e719a2ef60e204eaff16aa
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 34b2660d1cefffa528153748c7aad3ba320eff7d
THREAD_SHA1_HASH_MOD: 0a5d04a59a737196880b39f94877fada46227b94
FOLLOWUP_IP:
dxgkrnl!DxgkEnumAdapters2Impl+dc
fffff802`40ec9f6c 488bc8 mov rcx,rax
FAULT_INSTR_CODE: e8c88b48
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: dxgkrnl!DxgkEnumAdapters2Impl+dc
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: dxgkrnl
IMAGE_NAME: dxgkrnl.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 0
IMAGE_VERSION: 10.0.18362.449
STACK_COMMAND: .cxr 0xffffc68b8a63df90 ; kb
BUCKET_ID_FUNC_OFFSET: dc
FAILURE_BUCKET_ID: 0x3B_c000001d_dxgkrnl!DxgkEnumAdapters2Impl
BUCKET_ID: 0x3B_c000001d_dxgkrnl!DxgkEnumAdapters2Impl
PRIMARY_PROBLEM_CLASS: 0x3B_c000001d_dxgkrnl!DxgkEnumAdapters2Impl
TARGET_TIME: 2020-01-02T18:53:54.000Z
OSBUILD: 18362
OSSERVICEPACK: 535
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1980-01-11 18:53:20
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 10e0e
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x3b_c000001d_dxgkrnl!dxgkenumadapters2impl
FAILURE_ID_HASH: {e248fd06-c0dc-eba7-dda1-76d527805df5}
Followup: MachineOwner
---------