SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common BugCheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff803394988fa, The address that the exception occurred at
Arg3: fffffe0497eae678, Exception Record Address
Arg4: fffffe0497eadec0, Context Record Address
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : AV.Fault
Value: Read
Key : Analysis.CPU.mSec
Value: 8124
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 153235
Key : Analysis.Init.CPU.mSec
Value: 608
Key : Analysis.Init.Elapsed.mSec
Value: 1418
Key : Analysis.Memory.CommitPeak.Mb
Value: 81
Key : WER.OS.Branch
Value: 19h1_release
Key : WER.OS.Timestamp
Value: 2019-03-18T12:02:00Z
Key : WER.OS.Version
Value: 10.0.18362.1
BUGCHECK_CODE: 7e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff803394988fa
BUGCHECK_P3: fffffe0497eae678
BUGCHECK_P4: fffffe0497eadec0
EXCEPTION_RECORD: fffffe0497eae678 -- (.exr 0xfffffe0497eae678)
ExceptionAddress: fffff803394988fa (dxgmms2!VIDMM_GLOBAL::ProcessDeferredCommand+0x0000000000000bda)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
CONTEXT: fffffe0497eadec0 -- (.cxr 0xfffffe0497eadec0)
rax=1000000000000000 rbx=ffffe60e2fdc0c10 rcx=ffffe60e2fd69680
rdx=ffffe60e2fdc0c10 rsi=ffffe60e2fdb7000 rdi=0000000000000000
rip=fffff803394988fa rsp=fffffe0497eae8b0 rbp=fffffe0497eae9b0
r8=fffffe0497eae8b8 r9=ffffe60e2fd834e0 r10=0000000000000000
r11=fffff80339420000 r12=0000000000000000 r13=ffffb3821f7c6e70
r14=ffffe60e3ca8c110 r15=fffffe0497eaec50
iopl=0 nv up ei pl nz na po nc
cs=0010 ss=0000 ds=002b es=002b fs=0053 gs=002b efl=00010206
dxgmms2!VIDMM_GLOBAL::ProcessDeferredCommand+0xbda:
fffff803`394988fa 4c396808 cmp qword ptr [rax+8],r13 ds:002b:10000000`00000008=????????????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
READ_ADDRESS: fffff8046d5713b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffffffffffffff
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
EXCEPTION_STR: 0xc0000005
STACK_TEXT:
fffffe04`97eae8b0 fffff803`394a9e10 : ffffe60e`2fdc0c00 fffff803`39462000 ffffe60e`2fdb7000 ffffe60e`2fdc0c00 : dxgmms2!VIDMM_GLOBAL::ProcessDeferredCommand+0xbda
fffffe04`97eaeb20 fffff803`394a7729 : ffffb382`057b4a10 fffff804`6d58f400 ffffe60e`2fd69600 00000000`00000000 : dxgmms2!VIDMM_WORKER_THREAD::Run+0x26d0
fffffe04`97eaed20 fffff804`6d127c35 : ffffe60e`2fd69680 fffff803`394a7720 ffffb382`057b4a10 00000000`a91b3ffe : dxgmms2!VidMmWorkerThreadProc+0x9
fffffe04`97eaed50 fffff804`6d1cb0b8 : fffff804`68882180 ffffe60e`2fd69680 fffff804`6d127be0 de42a98c`46108046 : nt!PspSystemThreadStartup+0x55
fffffe04`97eaeda0 00000000`00000000 : fffffe04`97eaf000 fffffe04`97ea9000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: dxgmms2!VIDMM_GLOBAL::ProcessDeferredCommand+bda
MODULE_NAME: dxgmms2
IMAGE_NAME: dxgmms2.sys
IMAGE_VERSION: 10.0.18362.1500
STACK_COMMAND: .cxr 0xfffffe0497eadec0 ; kb
BUCKET_ID_FUNC_OFFSET: bda
FAILURE_BUCKET_ID: AV_dxgmms2!VIDMM_GLOBAL::ProcessDeferredCommand
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {b2278b94-ad39-cfd1-b64e-2c23c686ba7f}
Followup: MachineOwner
---------
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: ffffd7bffaec1570
Arg3: 4000000000000000
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 8843
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 10696
Key : Analysis.Init.CPU.mSec
Value: 968
Key : Analysis.Init.Elapsed.mSec
Value: 2036
Key : Analysis.Memory.CommitPeak.Mb
Value: 71
Key : MemoryManagement.PFN
Value: 0
Key : WER.OS.Branch
Value: 19h1_release
Key : WER.OS.Timestamp
Value: 2019-03-18T12:02:00Z
Key : WER.OS.Version
Value: 10.0.18362.1
BUGCHECK_CODE: 1a
BUGCHECK_P1: 41792
BUGCHECK_P2: ffffd7bffaec1570
BUGCHECK_P3: 4000000000000000
BUGCHECK_P4: 0
MEMORY_CORRUPTOR: ONE_BIT
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: chrome.exe
STACK_TEXT:
ffff828a`42fcad18 fffff805`2da034b8 : 00000000`0000001a 00000000`00041792 ffffd7bf`faec1570 40000000`00000000 : nt!KeBugCheckEx
ffff828a`42fcad20 fffff805`2d858d27 : 00000000`00000000 ffffd7bf`faec1570 00000000`00000000 00000000`00000000 : nt!MiDeleteVa+0x1a8998
ffff828a`42fcae30 fffff805`2d8591e1 : ffff828a`42fcb280 ffffd7eb`dffd7608 00000000`00000000 0a000001`c3283867 : nt!MiWalkPageTablesRecursively+0x1e7
ffff828a`42fcaef0 fffff805`2d8591e1 : ffff828a`42fcb280 ffffd7eb`f5effeb8 00000000`00000000 0a000001`aad27867 : nt!MiWalkPageTablesRecursively+0x6a1
ffff828a`42fcafb0 fffff805`2d8591e1 : ffff828a`42fcb280 ffffd7eb`f5faf7f8 00000000`00000000 0a000000`3551a867 : nt!MiWalkPageTablesRecursively+0x6a1
ffff828a`42fcb070 fffff805`2d85896c : ffff828a`42fcb280 ffffd7eb`f5fafd78 ffff828a`00000000 ffff828a`42fcb1f9 : nt!MiWalkPageTablesRecursively+0x6a1
ffff828a`42fcb130 fffff805`2d8ac7f8 : ffff828a`42fcb280 00000000`00000002 00000000`00000001 00000000`00000000 : nt!MiWalkPageTables+0x36c
ffff828a`42fcb230 fffff805`2d864f30 : ffffffff`ffffffff ffffb008`ec5743f8 ffff828a`00000001 00000000`00000000 : nt!MiDeletePagablePteRange+0x268
ffff828a`42fcb5d0 fffff805`2de726dd : ffffb008`ec2ea080 ffffb008`ec2ea080 ffffb008`ee65bb80 ffffb008`ec5743f0 : nt!MiDeleteVad+0x860
ffff828a`42fcb790 fffff805`2de41d70 : ffffb008`ee65bb80 ffffb008`ee950c30 ffffb008`ec2ea080 00000000`00000000 : nt!MiUnmapVad+0x49
ffff828a`42fcb7c0 fffff805`2de412df : ffffb008`ee65b680 ffffb008`ee65b680 ffffb008`ec574080 fffff805`2dc68180 : nt!MiCleanVad+0x30
ffff828a`42fcb7f0 fffff805`2de9c801 : ffffffff`00000000 ffffffff`ffffffff ffff828a`42fcba01 ffffb008`ec574080 : nt!MmCleanProcessAddressSpace+0x137
ffff828a`42fcb870 fffff805`2de44993 : ffffb008`ec574080 ffff8a86`587fb8e0 ffff828a`42fcba99 00000000`00000000 : nt!PspRundownSingleProcess+0x139
ffff828a`42fcb8f0 fffff805`2decb3d3 : 00000000`00000000 fffff805`29142101 00000011`ea394000 00000000`00000000 : nt!PspExitThread+0x60b
ffff828a`42fcba00 fffff805`2d852e31 : ffffb008`ec2ea080 ffff828a`00000000 00007ffe`00000000 00007ffe`00000000 : nt!KiSchedulerApcTerminate+0x33
ffff828a`42fcba40 fffff805`2d9c8010 : 00001864`00220001 ffff828a`42fcbb00 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x481
ffff828a`42fcbb00 fffff805`2d9d53ff : ffffb008`ec2ea080 00000011`ec3ff568 ffff828a`42fcbc58 ffffffff`ec549980 : nt!KiInitiateUserApc+0x70
ffff828a`42fcbc40 00007ffe`ee9fce14 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
00000011`ec3ff538 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`ee9fce14
MODULE_NAME: hardware
IMAGE_NAME: memory_corruption
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}
Followup: MachineOwner
---------
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 000000000000001d, Type of memory safety violation
Arg2: ffffa3811208abf0, Address of the trap frame for the exception that caused the BugCheck
Arg3: ffffa3811208ab48, Address of the exception record for the exception that caused the BugCheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 15593
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 107391
Key : Analysis.Init.CPU.mSec
Value: 1014
Key : Analysis.Init.Elapsed.mSec
Value: 1887
Key : Analysis.Memory.CommitPeak.Mb
Value: 80
Key : FailFast.Name
Value: INVALID_BALANCED_TREE
Key : FailFast.Type
Value: 29
Key : Memory.System.Errors.BadPageCount
Value: 201
Key : Memory.System.Errors.ScrubErrors
Value: 201
Key : WER.OS.Branch
Value: 19h1_release
Key : WER.OS.Timestamp
Value: 2019-03-18T12:02:00Z
Key : WER.OS.Version
Value: 10.0.18362.1
BUGCHECK_CODE: 139
BUGCHECK_P1: 1d
BUGCHECK_P2: ffffa3811208abf0
BUGCHECK_P3: ffffa3811208ab48
BUGCHECK_P4: 0
TRAP_FRAME: ffffa3811208abf0 -- (.trap 0xffffa3811208abf0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=bfff800ccff6efe8 rbx=0000000000000000 rcx=000000000000001d
rdx=ffff800ccff6efe8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8037540c9a3 rsp=ffffa3811208ad88 rbp=0000000000000022
r8=ffff800cd8d80fe8 r9=0000000000000000 r10=ffff800cd389afe8
r11=bfff800ccff6efe8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po cy
nt!RtlRbRemoveNode+0x199a93:
fffff803`7540c9a3 cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: ffffa3811208ab48 -- (.exr 0xffffa3811208ab48)
ExceptionAddress: fffff8037540c9a3 (nt!RtlRbRemoveNode+0x0000000000199a93)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 000000000000001d
Subcode: 0x1d FAST_FAIL_INVALID_BALANCED_TREE
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: Discord.exe
BAD_PAGES_DETECTED: c9
ERROR_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 000000000000001d
EXCEPTION_STR: 0xc0000409
STACK_TEXT:
ffffa381`1208a8c8 fffff803`753d5929 : 00000000`00000139 00000000`0000001d ffffa381`1208abf0 ffffa381`1208ab48 : nt!KeBugCheckEx
ffffa381`1208a8d0 fffff803`753d5d50 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffa381`1208aa10 fffff803`753d40e3 : 00000000`00000003 00000000`00000210 00000000`00000103 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffffa381`1208abf0 fffff803`7540c9a3 : 0000000f`01ce0002 000101ce`00220000 fffff803`75272c90 00000000`00000022 : nt!KiRaiseSecurityCheckFailure+0x323
ffffa381`1208ad88 fffff803`75272c90 : 00000000`00000022 ffff800c`cff70cc0 00000000`00000000 ffff800c`cff6efe0 : nt!RtlRbRemoveNode+0x199a93
ffffa381`1208ada0 fffff803`7527274a : ffff800c`c1e00280 ffff800c`c1e00280 ffff800c`e97ce480 ffffa381`1208aeb0 : nt!RtlpHpVsChunkCoalesce+0xb0
ffffa381`1208ae10 fffff803`752749bd : 00000000`0000003f ffff800c`00000000 00010000`00000000 00000000`00000000 : nt!RtlpHpVsContextFree+0x18a
ffffa381`1208aeb0 fffff803`7556e0a9 : ffffa381`1208b1f0 00000000`00000310 ffff800c`e5035a50 01000000`00100000 : nt!ExFreeHeapPool+0x56d
ffffa381`1208afd0 fffff800`fb7fc817 : ffffa909`19c84088 ffff09c9`622c6331 00000000`00000001 01000000`00100000 : nt!ExFreePool+0x9
ffffa381`1208b000 fffff800`fb8edab9 : ffff800c`e5035a50 fffff800`fb8ddffc ffff800c`e5035ad0 00000000`00000000 : dxgkrnl!operator delete[]+0x17
ffffa381`1208b030 fffff800`fb8ed028 : ffffa909`19c84088 ffff800c`00000000 00000000`00000001 ffffa381`1208b1c0 : dxgkrnl!DXGADAPTERALLOCATION::~DXGADAPTERALLOCATION+0xd
ffffa381`1208b060 fffff800`fb809b44 : ffff800c`cc936820 00000000`00000001 ffff800c`d87345d0 00000000`00000000 : dxgkrnl!DXGSHAREDRESOURCE::~DXGSHAREDRESOURCE+0x8c
ffffa381`1208b090 fffff800`fb8dde0a : ffff800c`e5035a50 ffff800c`d87345d0 00000000`00000001 ffff800c`d87345d0 : dxgkrnl!DXGSHAREDRESOURCE::`vector deleting destructor'+0x14
ffffa381`1208b0c0 fffff800`fb8d4b6b : 00000000`00000000 ffffa381`1208b1f0 ffff800c`d8734500 00000000`00000000 : dxgkrnl!DXGSHAREDRESOURCE::Destroy+0x2a
ffffa381`1208b0f0 fffff800`fb8d32d8 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff800`fb911d6d : dxgkrnl!DXGDEVICE::DestroyAllocations+0x6a7
ffffa381`1208b290 fffff800`fb911d87 : ffff800c`cc936820 00000000`00000000 ffff800c`cc936900 ffff800c`00000000 : dxgkrnl!DXGDEVICE::DestroyResource+0x74
ffffa381`1208b2d0 fffff800`fb911ab2 : ffff800c`cc936820 ffff800c`cc936900 00000000`00000000 ffff800c`cc936998 : dxgkrnl!DXGDEVICE::DrainResources+0x5b
ffffa381`1208b320 fffff800`fb911fac : ffff800c`cc936820 ffff800c`e1754dc0 00000000`0000000b 00000000`00000000 : dxgkrnl!DXGDEVICE::DestroyAllDeviceState+0x14e
ffffa381`1208b360 fffff800`fb8e2f0e : 00000000`00000000 ffffa381`1208b490 ffff800c`cc936820 ffff800c`cc936820 : dxgkrnl!ADAPTER_RENDER::DestroyDevice+0xd8
ffffa381`1208b390 fffff800`fb8e5835 : ffff800c`d2ff6630 00000000`00000000 ffff800c`d2ff6630 00000000`00000000 : dxgkrnl!DXGPROCESS::Destroy+0x44e
ffffa381`1208b600 fffff800`fb7f8eb4 : 00000000`00000000 ffff800c`d2ff6630 ffffa909`19afab80 ffffa909`2026f080 : dxgkrnl!DXGPROCESS::DestroyDxgProcess+0x105
ffffa381`1208b740 fffff803`75822a06 : 00000000`00000000 00000000`00000000 00000000`00004038 00000000`00000000 : dxgkrnl!DxgkProcessNotify+0xa4
ffffa381`1208b780 fffff803`75864c3c : ffffa909`2026f000 ffffa909`2026f080 00000000`00000000 00000000`00000000 : nt!PspCallProcessNotifyRoutines+0x212
ffffa381`1208b850 fffff803`7584494f : ffffa909`225c8688 00000000`00000000 ffffa381`1208ba29 00000000`00000000 : nt!PspExitProcess+0x70
ffffa381`1208b880 fffff803`758cb3d3 : 00000000`80000003 00000000`00000001 00000000`0a163000 00000000`00000000 : nt!PspExitThread+0x5c7
ffffa381`1208b990 fffff803`75252e31 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSchedulerApcTerminate+0x33
ffffa381`1208b9d0 fffff803`753c8010 : 00000000`00000001 ffffa381`1208ba90 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x481
ffffa381`1208ba90 fffff803`753d53ff : ffffa909`225c8080 00000000`11bbe998 00000000`ffffffff fffff803`00001cbf : nt!KiInitiateUserApc+0x70
ffffa381`1208bbd0 00007ffa`75798704 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
00000000`11bbe978 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`75798704
SYMBOL_NAME: PAGE_NOT_ZERO
MODULE_NAME: hardware
IMAGE_NAME: hardware_ram
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: PAGE_NOT_ZERO_0x139
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {2d547d65-0fa4-e377-ce77-fe92fd743dbf}
Followup: MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffa48658a2ccf8, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8066eca52fa, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 9218
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 14125
Key : Analysis.Init.CPU.mSec
Value: 874
Key : Analysis.Init.Elapsed.mSec
Value: 2173
Key : Analysis.Memory.CommitPeak.Mb
Value: 72
Key : WER.OS.Branch
Value: 19h1_release
Key : WER.OS.Timestamp
Value: 2019-03-18T12:02:00Z
Key : WER.OS.Version
Value: 10.0.18362.1
BUGCHECK_CODE: a
BUGCHECK_P1: ffffa48658a2ccf8
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8066eca52fa
READ_ADDRESS: fffff8066f1713b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffa48658a2ccf8
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: QtWebEngineProcess.exe
TRAP_FRAME: fffffb08f02e3590 -- (.trap 0xfffffb08f02e3590)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffdfffffffffff rbx=0000000000000000 rcx=ffffbd0fc6ce7e70
rdx=ffffa552a954a7f8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8066eca52fa rsp=fffffb08f02e3720 rbp=fffffb08f02e3820
r8=ffff9e00018e8590 r9=fffffb08f02e39c0 r10=00007ffc751defc8
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
nt!MiResolveMappedFileFault+0xda:
fffff806`6eca52fa 4c8b33 mov r14,qword ptr [rbx] ds:00000000`00000000=????????????????
Resetting default scope
STACK_TEXT:
fffffb08`f02e3448 fffff806`6edd5929 : 00000000`0000000a ffffa486`58a2ccf8 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffffb08`f02e3450 fffff806`6edd1c69 : 00000000`00000000 00000000`6f068180 00000000`00000000 00000000`00000001 : nt!KiBugCheckDispatch+0x69
fffffb08`f02e3590 fffff806`6eca52fa : e48678a2`ccf80460 ffff9e00`00000000 ffff9e00`0162c5a0 fffffb08`f02e37e8 : nt!KiPageFault+0x469
fffffb08`f02e3720 fffff806`6ecd5278 : fffffb08`f02e39c0 ffffbd0f`c6ce7e70 ffff9e00`018e8590 fffffb08`f02e3998 : nt!MiResolveMappedFileFault+0xda
fffffb08`f02e3850 fffff806`6eccf99c : fffffb08`f02e39c0 00000000`00000000 fffffb08`f02e3998 ffffbd0f`c6ce7e70 : nt!MiResolveProtoPteFault+0xaf8
fffffb08`f02e3950 fffff806`6eccdad9 : 00000000`00000100 00000000`00000100 00000000`c0000016 00000227`4757d000 : nt!MiDispatchFault+0x80c
fffffb08`f02e3aa0 fffff806`6edd1b5e : 00000227`44b8f910 fffffb08`f02e3cc0 00000000`00000001 00000000`00000000 : nt!MmAccessFault+0x169
fffffb08`f02e3c40 00007ffc`751defc8 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
00000080`d237e518 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`751defc8
SYMBOL_NAME: nt!MiResolveMappedFileFault+da
MODULE_NAME: nt
IMAGE_VERSION: 10.0.18362.1440
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: da
FAILURE_BUCKET_ID: AV_nt!MiResolveMappedFileFault
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {1d098aa9-3360-d59f-97f1-7952eef5f856}
Followup: MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffa48658a2ccf8, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8066eca52fa, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 9218
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 14125
Key : Analysis.Init.CPU.mSec
Value: 874
Key : Analysis.Init.Elapsed.mSec
Value: 2173
Key : Analysis.Memory.CommitPeak.Mb
Value: 72
Key : WER.OS.Branch
Value: 19h1_release
Key : WER.OS.Timestamp
Value: 2019-03-18T12:02:00Z
Key : WER.OS.Version
Value: 10.0.18362.1
BUGCHECK_CODE: a
BUGCHECK_P1: ffffa48658a2ccf8
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8066eca52fa
READ_ADDRESS: fffff8066f1713b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffa48658a2ccf8
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: QtWebEngineProcess.exe
TRAP_FRAME: fffffb08f02e3590 -- (.trap 0xfffffb08f02e3590)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffdfffffffffff rbx=0000000000000000 rcx=ffffbd0fc6ce7e70
rdx=ffffa552a954a7f8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8066eca52fa rsp=fffffb08f02e3720 rbp=fffffb08f02e3820
r8=ffff9e00018e8590 r9=fffffb08f02e39c0 r10=00007ffc751defc8
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
nt!MiResolveMappedFileFault+0xda:
fffff806`6eca52fa 4c8b33 mov r14,qword ptr [rbx] ds:00000000`00000000=????????????????
Resetting default scope
STACK_TEXT:
fffffb08`f02e3448 fffff806`6edd5929 : 00000000`0000000a ffffa486`58a2ccf8 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffffb08`f02e3450 fffff806`6edd1c69 : 00000000`00000000 00000000`6f068180 00000000`00000000 00000000`00000001 : nt!KiBugCheckDispatch+0x69
fffffb08`f02e3590 fffff806`6eca52fa : e48678a2`ccf80460 ffff9e00`00000000 ffff9e00`0162c5a0 fffffb08`f02e37e8 : nt!KiPageFault+0x469
fffffb08`f02e3720 fffff806`6ecd5278 : fffffb08`f02e39c0 ffffbd0f`c6ce7e70 ffff9e00`018e8590 fffffb08`f02e3998 : nt!MiResolveMappedFileFault+0xda
fffffb08`f02e3850 fffff806`6eccf99c : fffffb08`f02e39c0 00000000`00000000 fffffb08`f02e3998 ffffbd0f`c6ce7e70 : nt!MiResolveProtoPteFault+0xaf8
fffffb08`f02e3950 fffff806`6eccdad9 : 00000000`00000100 00000000`00000100 00000000`c0000016 00000227`4757d000 : nt!MiDispatchFault+0x80c
fffffb08`f02e3aa0 fffff806`6edd1b5e : 00000227`44b8f910 fffffb08`f02e3cc0 00000000`00000001 00000000`00000000 : nt!MmAccessFault+0x169
fffffb08`f02e3c40 00007ffc`751defc8 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
00000080`d237e518 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`751defc8
SYMBOL_NAME: nt!MiResolveMappedFileFault+da
MODULE_NAME: nt
IMAGE_VERSION: 10.0.18362.1440
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: da
FAILURE_BUCKET_ID: AV_nt!MiResolveMappedFileFault
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {1d098aa9-3360-d59f-97f1-7952eef5f856}
Followup: MachineOwner
---------