*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
DISPATCH_LEVEL or above.
Arg2: 0000000000001e00, The watchdog period (in ticks).
Arg3: fffff80550cfb320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
additional information regarding the cumulative timeout
Arg4: 0000000000000000
Debugging Details:
------------------
*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: TickPeriods ***
*** ***
*************************************************************************
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2390
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 4531
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 31
Key : Analysis.Init.Elapsed.mSec
Value: 20129
Key : Analysis.Memory.CommitPeak.Mb
Value: 144
Key : Bugcheck.Code.DumpHeader
Value: 0x133
Key : Bugcheck.Code.Register
Value: 0x133
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 051523-10125-01.dmp
BUGCHECK_CODE: 133
BUGCHECK_P1: 1
BUGCHECK_P2: 1e00
BUGCHECK_P3: fffff80550cfb320
BUGCHECK_P4: 0
DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED
TRAP_FRAME: ffffd60fcb1b0f90 -- (.trap 0xffffd60fcb1b0f90)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000005cd054aa rbx=0000000000000000 rcx=ffffd60fcb1b11f8
rdx=ffffd90beb376c10 rsi=0000000000000000 rdi=0000000000000000
rip=fffff805502de397 rsp=ffffd60fcb1b1120 rbp=fffff8054d112180
r8=0000000000000000 r9=000000608e68d404 r10=fffff8054d112180
r11=ffffd60fcb1b11e8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!KeYieldProcessorEx+0x17:
fffff805`502de397 4883c420 add rsp,20h
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: nvsphelper64.exe
STACK_TEXT:
fffff805`55085e18 fffff805`50443814 : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff805`50cfb320 : nt!KeBugCheckEx
fffff805`55085e20 fffff805`502813c3 : 000087f7`57288f79 fffff805`4d112180 00000000`00000000 fffff805`4d112180 : nt!KeAccumulateTicks+0x1bfbf4
fffff805`55085e80 fffff805`50280eaa : fffff805`50cf3940 ffffd60f`cb1b1010 00000000`00000000 00000000`00000000 : nt!KeClockInterruptNotify+0x453
fffff805`55085f30 fffff805`5033e965 : fffff805`50cf3940 fffff805`50322fb7 00000000`00000000 00000000`00000000 : nt!HalpTimerClockIpiRoutine+0x1a
fffff805`55085f60 fffff805`503fdc3a : ffffd60f`cb1b1010 fffff805`50cf3940 ffffd90b`eb376c00 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5
fffff805`55085fb0 fffff805`503fe407 : ffffd60f`cb1b11f8 fffff805`4d112180 fffff805`50cf3940 ffffd90b`e326c080 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
ffffd60f`cb1b0f90 fffff805`502de397 : ffffffff`ffffffd2 fffff805`5021c282 00000000`00000010 00000000`00040282 : nt!KiInterruptDispatchNoLockNoEtw+0x37
ffffd60f`cb1b1120 fffff805`5021c27e : 00000000`00000100 00000000`00000000 ffffd60f`cb1b1251 fffff805`50212331 : nt!KeYieldProcessorEx+0x17
ffffd60f`cb1b1150 fffff805`502dd0fe : ffffd90b`00000000 00000000`5cd054aa 00000000`00000000 00000000`00000000 : nt!KiCommitThreadWait+0x4de
ffffd60f`cb1b11f0 fffff805`50688750 : 00000000`000000f0 ffffd60f`cb1b1340 ffffd90b`e353d800 000f8067`00000000 : nt!KeWaitForMultipleObjects+0x2be
ffffd60f`cb1b1300 fffff805`50688429 : fffff805`50365240 fffff805`50266b4f ffffd60f`cb1b1848 fffff805`00000000 : nt!ObWaitForMultipleObjects+0x2f0
ffffd60f`cb1b1800 fffff805`5040f4f8 : ffffd60f`cb1b1b18 00000000`00000000 ffffd90b`e326c080 ffffd90b`e3f66bd0 : nt!NtWaitForMultipleObjects+0x119
ffffd60f`cb1b1a90 00007ff9`6de8dbb4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000066`a66ff408 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`6de8dbb4
SYMBOL_NAME: nt!KeAccumulateTicks+1bfbf4
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.2965
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 1bfbf4
FAILURE_BUCKET_ID: 0x133_ISR_nt!KeAccumulateTicks
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {65350307-c3b9-f4b5-8829-4d27e9ff9b06}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000f64, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8034308b5b2, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 374
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 8341
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 93
Key : Analysis.Init.Elapsed.mSec
Value: 29237
Key : Analysis.Memory.CommitPeak.Mb
Value: 134
Key : Bugcheck.Code.DumpHeader
Value: 0xa
Key : Bugcheck.Code.Register
Value: 0xa
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 051423-10328-01.dmp
BUGCHECK_CODE: a
BUGCHECK_P1: f64
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8034308b5b2
READ_ADDRESS: fffff80343afb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
0000000000000f64
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: fffff803468776d0 -- (.trap 0xfffff803468776d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000011cd424ec9fb rbx=0000000000000000 rcx=ffffc50d26beb00f
rdx=000011cd00000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8034308b5b2 rsp=fffff80346877860 rbp=fffff80346877960
r8=0000000000000008 r9=0000000000001a4c r10=0000000000000000
r11=fffff803430800a0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!KiExecuteAllDpcs+0x342:
fffff803`4308b5b2 4d2b7720 sub r14,qword ptr [r15+20h] ds:00000000`00000020=????????????????
Resetting default scope
STACK_TEXT:
fffff803`46877588 fffff803`4320fd29 : 00000000`0000000a 00000000`00000f64 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff803`46877590 fffff803`4320b8e3 : 0000005f`fda9d3e2 fffff803`43198b3a 00000064`a17c6a64 fffff803`3e92c210 : nt!KiBugCheckDispatch+0x69
fffff803`468776d0 fffff803`4308b5b2 : fffff803`3e927240 ffffc50d`26a0f000 00000000`00000004 fffff803`00000002 : nt!KiPageFault+0x463
fffff803`46877860 fffff803`4308a864 : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x342
fffff803`468779d0 fffff803`4320059e : 00000000`00000000 fffff803`3e924180 fffff803`43b27a00 ffffc50d`34d115c0 : nt!KiRetireDpcList+0x1f4
fffff803`46877c60 00000000`00000000 : fffff803`46878000 fffff803`46872000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
SYMBOL_NAME: nt!KiExecuteAllDpcs+342
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.2965
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 342
FAILURE_BUCKET_ID: AV_nt!KiExecuteAllDpcs
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {b88a28a0-fcde-99e9-6174-619833d00ab9}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff80151c42046, Address of the instruction which caused the BugCheck
Arg3: fffff80154a8c920, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 343
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 4396
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 61
Key : Analysis.Init.Elapsed.mSec
Value: 5178
Key : Analysis.Memory.CommitPeak.Mb
Value: 134
Key : Bugcheck.Code.DumpHeader
Value: 0x3b
Key : Bugcheck.Code.Register
Value: 0x3b
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 051323-10156-01.dmp
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff80151c42046
BUGCHECK_P3: fffff80154a8c920
BUGCHECK_P4: 0
CONTEXT: fffff80154a8c920 -- (.cxr 0xfffff80154a8c920)
rax=ffffc4028bdd2668 rbx=ffffc4028bed3080 rcx=c4028bdd2630c545
rdx=0000000000000000 rsi=0000000000000000 rdi=ffffc4028bdd2660
rip=fffff80151c42046 rsp=ffffab820efcb940 rbp=ffffab820efcba01
r8=0000000000000000 r9=0000000c6e4b2438 r10=0000000000000002
r11=fffff780000003b0 r12=0000000000000000 r13=c4028bdd2630c545
r14=0000000000000000 r15=ffffc4028bed31c0
iopl=0 nv up ei ng nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050282
nt!KeAbPreWait+0x6:
fffff801`51c42046 0fb64120 movzx eax,byte ptr [rcx+20h] ds:002b:c4028bdd`2630c565=??
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: OverwolfBrowser.exe
STACK_TEXT:
ffffab82`0efcb940 fffff801`51e23aa7 : ffffd680`00000092 fffff801`52011b31 000f8067`b4bbbd01 ffffc402`8bed31c0 : nt!KeAbPreWait+0x6
ffffab82`0efcb970 fffff801`52011641 : ffffc402`8bdd2660 00000000`00000006 00000000`00000001 00000000`00000000 : nt!KeWaitForSingleObject+0x208547
ffffab82`0efcba60 fffff801`5201159a : ffffc402`8bed3080 00000012`5d43fad8 00000000`00000000 000001f3`d1c8a000 : nt!ObWaitForSingleObject+0x91
ffffab82`0efcbac0 fffff801`51e0f4f8 : 000001f3`cfa7b380 00000000`0000000e ffffab82`0efcbb18 ffffffff`fffe7960 : nt!NtWaitForSingleObject+0x6a
ffffab82`0efcbb00 00007ffc`953ad0e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000012`5d43faa8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`953ad0e4
SYMBOL_NAME: nt!KeAbPreWait+6
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.2965
STACK_COMMAND: .cxr 0xfffff80154a8c920 ; kb
BUCKET_ID_FUNC_OFFSET: 6
FAILURE_BUCKET_ID: AV_nt!KeAbPreWait
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {65496c65-f012-a1f5-2c21-5d59c06ec487}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffd2859ddb1740, Address of the trap frame for the exception that caused the BugCheck
Arg3: ffffd2859ddb1698, Address of the exception record for the exception that caused the BugCheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 686
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 2875
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 93
Key : Analysis.Init.Elapsed.mSec
Value: 6655
Key : Analysis.Memory.CommitPeak.Mb
Value: 134
Key : Bugcheck.Code.DumpHeader
Value: 0x139
Key : Bugcheck.Code.Register
Value: 0x139
Key : FailFast.Name
Value: CORRUPT_LIST_ENTRY
Key : FailFast.Type
Value: 3
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 051423-10203-01.dmp
BUGCHECK_CODE: 139
BUGCHECK_P1: 3
BUGCHECK_P2: ffffd2859ddb1740
BUGCHECK_P3: ffffd2859ddb1698
BUGCHECK_P4: 0
TRAP_FRAME: ffffd2859ddb1740 -- (.trap 0xffffd2859ddb1740)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8051bdb3d80 rbx=0000000000000000 rcx=0000000000000003
rdx=ffff800a5488d158 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8051fa1c363 rsp=ffffd2859ddb18d0 rbp=fffff8051bdac180
r8=0000000000000000 r9=0000000417072467 r10=0000000000000002
r11=ffffd2859ddb1968 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po cy
nt!KiCommitThreadWait+0x5c3:
fffff805`1fa1c363 cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: ffffd2859ddb1698 -- (.exr 0xffffd2859ddb1698)
ExceptionAddress: fffff8051fa1c363 (nt!KiCommitThreadWait+0x00000000000005c3)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: vgtray.exe
ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000003
EXCEPTION_STR: 0xc0000409
STACK_TEXT:
ffffd285`9ddb1418 fffff805`1fc0fd29 : 00000000`00000139 00000000`00000003 ffffd285`9ddb1740 ffffd285`9ddb1698 : nt!KeBugCheckEx
ffffd285`9ddb1420 fffff805`1fc10290 : ffffdd01`00000000 00000000`00000000 00000000`00000002 ffffdd01`83097180 : nt!KiBugCheckDispatch+0x69
ffffd285`9ddb1560 fffff805`1fc0e25d : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffffd285`9ddb1740 fffff805`1fa1c363 : ffff800a`00000003 00000000`00000002 ffffd285`9ddb19e0 fffff805`00000000 : nt!KiRaiseSecurityCheckFailure+0x31d
ffffd285`9ddb18d0 fffff805`1fa1b793 : ffffdd01`00000000 fffff805`00000000 000f8067`b4bbbd00 ffff800a`537b81c0 : nt!KiCommitThreadWait+0x5c3
ffffd285`9ddb1970 fffff805`1fe11641 : ffff800a`53799ee0 00000000`00000006 00000000`00000001 00000000`00000001 : nt!KeWaitForSingleObject+0x233
ffffd285`9ddb1a60 fffff805`1fe1159a : ffff800a`537b8080 00000043`99effbc8 00000000`00000000 00000000`00000000 : nt!ObWaitForSingleObject+0x91
ffffd285`9ddb1ac0 fffff805`1fc0f4f8 : 00000000`00000001 ffff800a`5289a080 ffffd285`9ddb1b18 ffffffff`fff85ee0 : nt!NtWaitForSingleObject+0x6a
ffffd285`9ddb1b00 00007ffd`dbb8d0e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000043`99effb98 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`dbb8d0e4
SYMBOL_NAME: nt!KiCommitThreadWait+5c3
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.2965
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 5c3
FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiCommitThreadWait
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {369b7001-cfef-011b-6243-985c04f34d42}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common BugCheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8028a174206, The address that the exception occurred at
Arg3: 0000000000000001, Parameter 0 of the exception
Arg4: 00000000000005fc, Parameter 1 of the exception
Debugging Details:
------------------
*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: ExceptionRecord ***
*** ***
*************************************************************************
*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: ContextRecord ***
*** ***
*************************************************************************
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1171
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 21276
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 46
Key : Analysis.Init.Elapsed.mSec
Value: 2054
Key : Analysis.Memory.CommitPeak.Mb
Value: 138
Key : Bugcheck.Code.DumpHeader
Value: 0x1e
Key : Bugcheck.Code.Register
Value: 0x1e
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 051423-10796-01.dmp
BUGCHECK_CODE: 1e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff8028a174206
BUGCHECK_P3: 1
BUGCHECK_P4: 5fc
EXCEPTION_PARAMETER1: 0000000000000001
EXCEPTION_PARAMETER2: 00000000000005fc
WRITE_ADDRESS: fffff8026c0fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
00000000000005fc
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: ffff800000000000 -- (.trap 0xffff800000000000)
Unable to read trap frame at ffff8000`00000000
STACK_TEXT:
ffffeb0e`b32c9fe8 fffff802`6b860cd3 : 00000000`0000001e ffffffff`c0000005 fffff802`8a174206 00000000`00000001 : nt!KeBugCheckEx
ffffeb0e`b32c9ff0 fffff802`6b80fe6c : 00000000`00001000 ffffeb0e`b32ca890 ffff8000`00000000 00000000`00000000 : nt!KiDispatchException+0x1795c3
ffffeb0e`b32ca6b0 fffff802`6b80b8bd : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0x12c
ffffeb0e`b32ca890 fffff802`8a174206 : fffff802`69c86180 00000000`00000000 fffff802`69c86180 ffff978f`ea48b040 : nt!KiPageFault+0x43d
ffffeb0e`b32caa28 ffff978f`00000000 : fffff802`00000005 00000000`00000000 00000000`00000000 ffff978f`00000000 : dxgmms2!VidMmRangeCurationThread+0x6
ffffeb0e`b32caa58 fffff802`00000005 : 00000000`00000000 00000000`00000000 ffff978f`00000000 fffff802`6b647514 : 0xffff978f`00000000
ffffeb0e`b32caa60 00000000`00000000 : 00000000`00000000 ffff978f`00000000 fffff802`6b647514 ffffeb0e`b32caae8 : 0xfffff802`00000005
SYMBOL_NAME: dxgmms2!VidMmRangeCurationThread+6
MODULE_NAME: dxgmms2
IMAGE_NAME: dxgmms2.sys
IMAGE_VERSION: 10.0.19041.2965
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 6
FAILURE_BUCKET_ID: AV_W_dxgmms2!VidMmRangeCurationThread
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {a07e7696-1f16-3f2d-4f41-57a6cb8136e7}
Followup: MachineOwner
---------