IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000800000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff804354c0dce, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3296
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 12116
Key : Analysis.Init.CPU.mSec
Value: 546
Key : Analysis.Init.Elapsed.mSec
Value: 10532
Key : Analysis.Memory.CommitPeak.Mb
Value: 74
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: a
BUGCHECK_P1: 800000
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff804354c0dce
WRITE_ADDRESS: fffff80435efa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
0000000000800000
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: chrome.exe
TRAP_FRAME: ffff808b9bed4840 -- (.trap 0xffff808b9bed4840)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000000000023a rbx=0000000000000000 rcx=ffff808b9bed4a38
rdx=0000000000800000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff804354c0dce rsp=ffff808b9bed49d0 rbp=ffff808b9bed4ab9
r8=ffff968000007000 r9=0000000000000072 r10=00000000001fe877
r11=ffff808b9bed49d0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
nt!KxWaitForLockOwnerShip+0xe:
fffff804`354c0dce 48890a mov qword ptr [rdx],rcx ds:00000000`00800000=????????????????
Resetting default scope
STACK_TEXT:
ffff808b`9bed46f8 fffff804`35609169 : 00000000`0000000a 00000000`00800000 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffff808b`9bed4700 fffff804`35605469 : 00000000`00000002 ffff8181`dc145088 00000000`00000000 ffffc93f`46bebb18 : nt!KiBugCheckDispatch+0x69
ffff808b`9bed4840 fffff804`354c0dce : 00000000`00000001 00000000`00000002 00000000`001fe872 fffff804`35e50a80 : nt!KiPageFault+0x469
ffff808b`9bed49d0 fffff804`3543ea29 : 00000000`00000000 00000000`00000000 ffff808b`9bed4ab9 ffff9380`05fb9560 : nt!KxWaitForLockOwnerShip+0xe
ffff808b`9bed4a00 fffff804`3543b047 : 00000000`001fe872 80000000`00000000 00000000`00000001 00000000`00000072 : nt!MiInsertPageInFreeOrZeroedList+0x839
ffff808b`9bed4b20 fffff804`354b0ade : ffff808b`9bed4dd0 ffffb608`e5dcc0c0 00000000`00000000 ffff808b`9bed5810 : nt!MiDeletePteList+0x547
ffff808b`9bed4c00 fffff804`357f9c0d : ffffb608`dde34080 ffffb608`e76e0588 ffff808b`00000000 fffff804`00000000 : nt!MiDecommitPages+0x121e
ffff808b`9bed57d0 fffff804`357f9273 : ffff808b`9bed5950 00000000`00000000 ffff808b`9bed5950 ffffb608`e76e0560 : nt!MiDecommitRegion+0x7d
ffff808b`9bed5850 fffff804`357f8b65 : 00000000`00000000 ffffb608`ea3f0de0 00000000`000005dc fffff804`357f761a : nt!MmFreeVirtualMemory+0x6d3
ffff808b`9bed59a0 fffff804`35608bb5 : ffffb608`dde34080 000056b4`00000001 00000000`00000000 ffff808b`9bed5a80 : nt!NtFreeVirtualMemory+0x95
ffff808b`9bed5a00 00007ff9`295ed134 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
000000aa`9c80d078 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`295ed134
SYMBOL_NAME: nt!KxWaitForLockOwnerShip+e
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.1237
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: e
FAILURE_BUCKET_ID: AV_nt!KxWaitForLockOwnerShip
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {724b07b1-4226-85fe-f372-16d33b9a3b93}
Followup: MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000080440, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8017c287f4d, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for USBXHCI.SYS
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4624
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 18727
Key : Analysis.Init.CPU.mSec
Value: 577
Key : Analysis.Init.Elapsed.mSec
Value: 14100
Key : Analysis.Memory.CommitPeak.Mb
Value: 89
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: a
BUGCHECK_P1: 80440
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8017c287f4d
READ_ADDRESS: fffff8017ccfa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
0000000000080440
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: fffff801826b0930 -- (.trap 0xfffff801826b0930)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000000003d0 rbx=0000000000000000 rcx=00000000000803d0
rdx=0000000000000002 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8017c287f4d rsp=fffff801826b0ac0 rbp=0000000073ebb800
r8=00000000000000fc r9=00000000000000ff r10=00000000000000ff
r11=fffff8017a587180 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!KiDeferredReadySingleThread+0xacd:
fffff801`7c287f4d f6417002 test byte ptr [rcx+70h],2 ds:00000000`00080440=??
Resetting default scope
STACK_TEXT:
fffff801`826b07e8 fffff801`7c409169 : 00000000`0000000a 00000000`00080440 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff801`826b07f0 fffff801`7c405469 : fffff801`81dd4cb0 ffffe002`dac08030 00000000`00000000 00000000`00000001 : nt!KiBugCheckDispatch+0x69
fffff801`826b0930 fffff801`7c287f4d : fffff801`826b0c38 fffff801`826b0eb0 ffffe002`d6bb45a0 fffff801`81db010e : nt!KiPageFault+0x469
fffff801`826b0ac0 fffff801`7c2871c1 : 00000000`00000000 fffff801`826b0df8 00000000`00000000 00000000`00000000 : nt!KiDeferredReadySingleThread+0xacd
fffff801`826b0cb0 fffff801`7c2854b7 : 00000000`00000000 ffffe002`d6cfed10 ffffe002`dd45b080 ffffe002`da565008 : nt!KiExitDispatcher+0x141
fffff801`826b0d20 fffff801`7c284f57 : 00000000`00000000 fffff801`826b0e06 00000000`00000000 00000000`00000000 : nt!IopfCompleteRequest+0x547
fffff801`826b0e10 fffff801`97bc5056 : 00000000`00000018 fffff801`826b0eb0 ffffe002`e08ef010 fffff801`826ab000 : nt!IofCompleteRequest+0x17
fffff801`826b0e40 fffff801`95153aa8 : 00000000`00000002 ffffe002`da770720 ffffe002`db3edd70 fffff801`826b0f24 : mouclass!MouseClassServiceCallback+0x476
fffff801`826b0ee0 fffff801`7c28508e : 00000000`00000000 fffff801`826b1000 00000000`00000001 fffff801`00000000 : mouhid!MouHid_ReadComplete+0x758
fffff801`826b0f80 fffff801`7c284f57 : 00000000`00000008 00000000`00000006 ffffe002`db3dd1d0 ffffe002`dba03630 : nt!IopfCompleteRequest+0x11e
fffff801`826b1070 fffff801`950daef5 : ffffe002`dba03630 00000000`00000009 ffffe002`dba03620 00000000`00000009 : nt!IofCompleteRequest+0x17
fffff801`826b10a0 fffff801`950da7ed : ffffe002`db3dd1d0 ffffe002`db3dd102 ffffe002`db3dd1d0 00000000`00000009 : HIDCLASS!HidpDistributeInterruptReport+0x3f5
fffff801`826b11a0 fffff801`7c28508e : ffffe002`dba04010 ffffe002`dba04010 fffff801`826b1201 ffffe002`dba0448b : HIDCLASS!HidpInterruptReadComplete+0x37d
fffff801`826b1240 fffff801`7c284f57 : 00000000`00000001 00000000`00000000 ffffe002`db3c6060 00000000`00000002 : nt!IopfCompleteRequest+0x11e
fffff801`826b1330 fffff801`80fa811a : 00000000`00000000 ffffe002`da8af9e0 ffffe002`dba04010 fffff801`826b1410 : nt!IofCompleteRequest+0x17
fffff801`826b1360 fffff801`80fa5bbf : ffffe002`db1e3802 ffffe002`db3ca0d0 ffffe002`dba04010 00000000`00000000 : Wdf01000!FxRequest::CompleteInternal+0x23a [minkernel\wdf\framework\shared\core\fxrequest.cpp @ 869]
fffff801`826b13f0 fffff801`97a0bdbd : 00000000`ffffff02 ffffe002`db1e36b0 ffffe002`db3c6440 ffffe002`db3c6440 : Wdf01000!imp_WdfRequestComplete+0x8f [minkernel\wdf\framework\shared\core\fxrequestapi.cpp @ 436]
fffff801`826b1450 00000000`ffffff02 : ffffe002`db1e36b0 ffffe002`db3c6440 ffffe002`db3c6440 00000000`00000008 : USBXHCI+0xbdbd
fffff801`826b1458 ffffe002`db1e36b0 : ffffe002`db3c6440 ffffe002`db3c6440 00000000`00000008 fffff801`826b14f8 : 0xffffff02
fffff801`826b1460 ffffe002`db3c6440 : ffffe002`db3c6440 00000000`00000008 fffff801`826b14f8 00000000`00000008 : 0xffffe002`db1e36b0
fffff801`826b1468 ffffe002`db3c6440 : 00000000`00000008 fffff801`826b14f8 00000000`00000008 fffff801`826b1500 : 0xffffe002`db3c6440
fffff801`826b1470 00000000`00000008 : fffff801`826b14f8 00000000`00000008 fffff801`826b1500 00000000`00000008 : 0xffffe002`db3c6440
fffff801`826b1478 fffff801`826b14f8 : 00000000`00000008 fffff801`826b1500 00000000`00000008 00000000`00000000 : 0x8
fffff801`826b1480 00000000`00000008 : fffff801`826b1500 00000000`00000008 00000000`00000000 ffffe002`db3c6440 : 0xfffff801`826b14f8
fffff801`826b1488 fffff801`826b1500 : 00000000`00000008 00000000`00000000 ffffe002`db3c6440 fffff801`97a0bc81 : 0x8
fffff801`826b1490 00000000`00000008 : 00000000`00000000 ffffe002`db3c6440 fffff801`97a0bc81 ffffe002`db1e3850 : 0xfffff801`826b1500
fffff801`826b1498 00000000`00000000 : ffffe002`db3c6440 fffff801`97a0bc81 ffffe002`db1e3850 00000000`00000009 : 0x8
SYMBOL_NAME: mouclass!MouseClassServiceCallback+476
MODULE_NAME: mouclass
IMAGE_NAME: mouclass.sys
IMAGE_VERSION: 10.0.19041.1030
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 476
FAILURE_BUCKET_ID: AV_mouclass!MouseClassServiceCallback
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {3fadc39d-265d-0b16-bd05-b10d335aff49}
Followup: MachineOwner
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff8012cb47b92, Address of the instruction which caused the BugCheck
Arg3: fffffe05de60dbb0, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for nvlddmkm.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3514
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 75591
Key : Analysis.Init.CPU.mSec
Value: 577
Key : Analysis.Init.Elapsed.mSec
Value: 14111
Key : Analysis.Memory.CommitPeak.Mb
Value: 74
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff8012cb47b92
BUGCHECK_P3: fffffe05de60dbb0
BUGCHECK_P4: 0
CONTEXT: fffffe05de60dbb0 -- (.cxr 0xfffffe05de60dbb0)
rax=fffff8012d4a40e0 rbx=ffffd301689e4300 rcx=004a2f7c008ba0d4
rdx=ffffd301689e4300 rsi=ffffd301689e4328 rdi=ffffd30168bf0610
rip=fffff8012cb47b92 rsp=fffffe05de60e5b0 rbp=ffffd3016325b000
r8=0000000000000000 r9=0000000000000000 r10=0000000000000000
r11=000000000000001b r12=0000000000000000 r13=ffffd301688ffdb0
r14=0000000000000000 r15=ffffd301689f82d0
iopl=0 nv up ei pl nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050206
nvlddmkm+0x97b92:
fffff801`2cb47b92 f0ff4918 lock dec dword ptr [rcx+18h] ds:002b:004a2f7c`008ba0ec=????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: vulkandriverquery.exe
STACK_TEXT:
fffffe05`de60e5b0 ffffd301`683fd3f0 : ffffd301`6325b000 00000000`4d52564e fffff801`2cb52a35 00000000`0e1a1048 : nvlddmkm+0x97b92
fffffe05`de60e5b8 ffffd301`6325b000 : 00000000`4d52564e fffff801`2cb52a35 00000000`0e1a1048 fffff801`2cbd0012 : 0xffffd301`683fd3f0
fffffe05`de60e5c0 00000000`4d52564e : fffff801`2cb52a35 00000000`0e1a1048 fffff801`2cbd0012 ffffd301`685ce6c0 : 0xffffd301`6325b000
fffffe05`de60e5c8 fffff801`2cb52a35 : 00000000`0e1a1048 fffff801`2cbd0012 ffffd301`685ce6c0 00000000`4d52564e : 0x4d52564e
fffffe05`de60e5d0 00000000`0e1a1048 : fffff801`2cbd0012 ffffd301`685ce6c0 00000000`4d52564e ffffd301`6325b000 : nvlddmkm+0xa2a35
fffffe05`de60e5d8 fffff801`2cbd0012 : ffffd301`685ce6c0 00000000`4d52564e ffffd301`6325b000 fffff801`2cb5392f : 0xe1a1048
fffffe05`de60e5e0 ffffd301`685ce6c0 : 00000000`4d52564e ffffd301`6325b000 fffff801`2cb5392f ffffd301`68bf0610 : nvlddmkm+0x120012
fffffe05`de60e5e8 00000000`4d52564e : ffffd301`6325b000 fffff801`2cb5392f ffffd301`68bf0610 fffff801`2d02dcf6 : 0xffffd301`685ce6c0
fffffe05`de60e5f0 ffffd301`6325b000 : fffff801`2cb5392f ffffd301`68bf0610 fffff801`2d02dcf6 00000000`0e1a1048 : 0x4d52564e
fffffe05`de60e5f8 fffff801`2cb5392f : ffffd301`68bf0610 fffff801`2d02dcf6 00000000`0e1a1048 ffffd301`689e4328 : 0xffffd301`6325b000
fffffe05`de60e600 ffffd301`68bf0610 : fffff801`2d02dcf6 00000000`0e1a1048 ffffd301`689e4328 ffffd301`6325b000 : nvlddmkm+0xa392f
fffffe05`de60e608 fffff801`2d02dcf6 : 00000000`0e1a1048 ffffd301`689e4328 ffffd301`6325b000 fffff801`2cb603be : 0xffffd301`68bf0610
fffffe05`de60e610 00000000`0e1a1048 : ffffd301`689e4328 ffffd301`6325b000 fffff801`2cb603be 00000000`00000028 : nvlddmkm+0x57dcf6
fffffe05`de60e618 ffffd301`689e4328 : ffffd301`6325b000 fffff801`2cb603be 00000000`00000028 fffff801`2cd9d2b4 : 0xe1a1048
fffffe05`de60e620 ffffd301`6325b000 : fffff801`2cb603be 00000000`00000028 fffff801`2cd9d2b4 ffffd301`68bf0520 : 0xffffd301`689e4328
fffffe05`de60e628 fffff801`2cb603be : 00000000`00000028 fffff801`2cd9d2b4 ffffd301`68bf0520 00000000`00000009 : 0xffffd301`6325b000
fffffe05`de60e630 00000000`00000028 : fffff801`2cd9d2b4 ffffd301`68bf0520 00000000`00000009 ffffd301`6325b000 : nvlddmkm+0xb03be
fffffe05`de60e638 fffff801`2cd9d2b4 : ffffd301`68bf0520 00000000`00000009 ffffd301`6325b000 ffffd301`6325b000 : 0x28
fffffe05`de60e640 ffffd301`68bf0520 : 00000000`00000009 ffffd301`6325b000 ffffd301`6325b000 00000000`00000000 : nvlddmkm+0x2ed2b4
fffffe05`de60e648 00000000`00000009 : ffffd301`6325b000 ffffd301`6325b000 00000000`00000000 fffff801`2ccefd81 : 0xffffd301`68bf0520
fffffe05`de60e650 ffffd301`6325b000 : ffffd301`6325b000 00000000`00000000 fffff801`2ccefd81 ffffd301`632b1000 : 0x9
fffffe05`de60e658 ffffd301`6325b000 : 00000000`00000000 fffff801`2ccefd81 ffffd301`632b1000 ffffd301`6325b000 : 0xffffd301`6325b000
fffffe05`de60e660 00000000`00000000 : fffff801`2ccefd81 ffffd301`632b1000 ffffd301`6325b000 ffffd301`6325b000 : 0xffffd301`6325b000
SYMBOL_NAME: nvlddmkm+97b92
MODULE_NAME: nvlddmkm
IMAGE_NAME: nvlddmkm.sys
STACK_COMMAND: .cxr 0xfffffe05de60dbb0 ; kb
BUCKET_ID_FUNC_OFFSET: 97b92
FAILURE_BUCKET_ID: 0x3B_c0000005_nvlddmkm!unknown_function
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {63c41bff-3ea4-15a0-a72c-26a548d17abe}
Followup: MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000048, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80638aa66c2, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3327
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 11008
Key : Analysis.Init.CPU.mSec
Value: 577
Key : Analysis.Init.Elapsed.mSec
Value: 11257
Key : Analysis.Memory.CommitPeak.Mb
Value: 74
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: a
BUGCHECK_P1: 48
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff80638aa66c2
READ_ADDRESS: fffff806394fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
0000000000000048
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: steamwebhelper.exe
TRAP_FRAME: fffffc8dd1c97780 -- (.trap 0xfffffc8dd1c97780)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffff958ea636bd68
rdx=00000000000000a0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80638aa66c2 rsp=fffffc8dd1c97910 rbp=fffffc8dd1c97a10
r8=0000000000000000 r9=0000000000000002 r10=ffff958ea636bcb0
r11=ffff8500071813a0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po cy
nt!MiCompleteProtoPteFault+0x402:
fffff806`38aa66c2 488b4048 mov rax,qword ptr [rax+48h] ds:00000000`00000048=????????????????
Resetting default scope
STACK_TEXT:
fffffc8d`d1c97638 fffff806`38c09169 : 00000000`0000000a 00000000`00000048 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffffc8d`d1c97640 fffff806`38c05469 : 00000000`00000000 ffff958e`a8bad800 00000000`00000000 1a000001`e5fdb867 : nt!KiBugCheckDispatch+0x69
fffffc8d`d1c97780 fffff806`38aa66c2 : ffff958e`a8bad700 ffff8d3f`fc5c4e18 ffff8500`06f03690 0a000002`50123025 : nt!KiPageFault+0x469
fffffc8d`d1c97910 fffff806`38aa84b6 : fffffc8d`d1c97bc0 0a000002`5dfe6121 00000000`00000000 00000007`00000000 : nt!MiCompleteProtoPteFault+0x402
fffffc8d`d1c97a60 fffff806`38aa1345 : fffffc8d`d1c97bc0 00000000`00000000 fffffc8d`d1c97ba0 fffffc8d`d1c97d60 : nt!MiResolveProtoPteFault+0xbb6
fffffc8d`d1c97b60 fffff806`38a9f289 : 00000000`00000100 00000000`00000100 00000000`c0000016 ffffa581`3fce2048 : nt!MiDispatchFault+0x3d5
fffffc8d`d1c97ca0 fffff806`38c0535e : 00000000`40000a00 00000000`00000000 fffffc8d`d1c97ec0 00000000`00000000 : nt!MmAccessFault+0x189
fffffc8d`d1c97e40 00007ff8`b8977430 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
000000a6`4e11e4a8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`b8977430
SYMBOL_NAME: nt!MiCompleteProtoPteFault+402
MODULE_NAME: nt
IMAGE_VERSION: 10.0.19041.1237
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 402
FAILURE_BUCKET_ID: AV_nt!MiCompleteProtoPteFault
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {5689a27c-2595-a41c-3bcf-ff09719714e4}
Followup: MachineOwner
---------
Machine ID Information [From Smbios 3.0, DMIVersion 0, Size=4139]
BiosMajorRelease = 5
BiosMinorRelease = 12
BiosVendor = American Megatrends Inc.
BiosVersion = 1.L0
BiosReleaseDate = 06/28/2018
SystemManufacturer = MSI
SystemProductName = MS-7976
SystemFamily = Default string
SystemVersion = 1.0
SystemSKU = Default string
BaseBoardManufacturer = MSI
BaseBoardProduct = Z170A GAMING M7 (MS-7976)
BaseBoardVersion = 1.0