MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000061941, The subtype of the bugcheck.
Arg2: 000000000f319000
Arg3: 000000000000000f
Arg4: ffffc500d8be9b00
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
DUMP_TYPE: 2
BUGCHECK_P1: 61941
BUGCHECK_P2: f319000
BUGCHECK_P3: f
BUGCHECK_P4: ffffc500d8be9b00
BUGCHECK_STR: 0x1a_61941
CPU_COUNT: c
CPU_MHZ: e09
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 71
CPU_STEPPING: 0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: iw4sp.exe
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-BKJR0DQ
ANALYSIS_SESSION_TIME: 03-16-2020 15:22:55.0594
ANALYSIS_VERSION: 10.0.18362.1 amd64fre
LAST_CONTROL_TRANSFER: from fffff8026a84288c to fffff8026a7c2380
STACK_TEXT:
ffffc500`d8be9958 fffff802`6a84288c : 00000000`0000001a 00000000`00061941 00000000`0f319000 00000000`0000000f : nt!KeBugCheckEx
ffffc500`d8be9960 fffff802`6a7d0420 : ffffc782`c5f82080 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x179a1c
ffffc500`d8be9b00 00000000`6e39f9d7 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x360
00000000`0fe9e9e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x6e39f9d7
THREAD_SHA1_HASH_MOD_FUNC: 1feb98d5c6601cfab1575099bc1303f202ec7478
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: c9a91cab4b8051e79b1ade67978b4ada6bb03b00
THREAD_SHA1_HASH_MOD: 2a7ca9d3ab5386d53fea7498e1d81b9c4a4c036b
SYMBOL_NAME: ANALYSIS_INCONCLUSIVE
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: Unknown_Module
IMAGE_NAME: Unknown_Image
DEBUG_FLR_IMAGE_TIMESTAMP: 0
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: 0x1a_61941_ANALYSIS_INCONCLUSIVE!unknown_function
BUCKET_ID: 0x1a_61941_ANALYSIS_INCONCLUSIVE!unknown_function
PRIMARY_PROBLEM_CLASS: 0x1a_61941_ANALYSIS_INCONCLUSIVE!unknown_function
TARGET_TIME: 2020-03-13T11:18:47.000Z
OSBUILD: 18362
OSSERVICEPACK: 720
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: unknown_date
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 3efe
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x1a_61941_analysis_inconclusive!unknown_function
FAILURE_ID_HASH: {5deef4f7-7ffd-da2a-fbcb-ad563ba13c90}
Followup: MachineOwner
---------
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: ffff9f80003918f8
Arg3: 0081000000000000
Arg4: 0000000000000000
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
SYSTEM_MANUFACTURER: Gigabyte Technology Co., Ltd.
SYSTEM_PRODUCT_NAME: B450M S2H
SYSTEM_SKU: Default string
SYSTEM_VERSION: Default string
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: F41
BIOS_DATE: 07/22/2019
BASEBOARD_MANUFACTURER: Gigabyte Technology Co., Ltd.
BASEBOARD_PRODUCT: B450M S2H
BASEBOARD_VERSION: x.x
DUMP_TYPE: 2
BUGCHECK_P1: 41792
BUGCHECK_P2: ffff9f80003918f8
BUGCHECK_P3: 81000000000000
BUGCHECK_P4: 0
BUGCHECK_STR: 0x1a_41792
CPU_COUNT: c
CPU_MHZ: e09
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 71
CPU_STEPPING: 0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: steamwebhelper.exe
CURRENT_IRQL: 2
ANALYSIS_SESSION_HOST: DESKTOP-BKJR0DQ
ANALYSIS_SESSION_TIME: 03-16-2020 15:23:00.0575
ANALYSIS_VERSION: 10.0.18362.1 amd64fre
LAST_CONTROL_TRANSFER: from fffff807550502b8 to fffff80754fc2380
STACK_TEXT:
fffffb02`6068ada8 fffff807`550502b8 : 00000000`0000001a 00000000`00041792 ffff9f80`003918f8 00810000`00000000 : nt!KeBugCheckEx
fffffb02`6068adb0 fffff807`54ee3d17 : 00000000`00000000 ffff9f80`003918f8 00000000`00000000 00000000`00000000 : nt!MiDeleteVa+0x16a7a8
fffffb02`6068aec0 fffff807`54ee41d1 : fffffb02`6068b310 ffff9fcf`c0001c88 00000000`00000000 0a000001`e477c867 : nt!MiWalkPageTablesRecursively+0x1e7
fffffb02`6068af80 fffff807`54ee41d1 : fffffb02`6068b310 ffff9fcf`e7e00008 00000000`00000000 0a000000`63c56867 : nt!MiWalkPageTablesRecursively+0x6a1
fffffb02`6068b040 fffff807`54ee41d1 : fffffb02`6068b310 ffff9fcf`e7f3f000 ffff9fcf`00000000 0a000001`a6546867 : nt!MiWalkPageTablesRecursively+0x6a1
fffffb02`6068b100 fffff807`54ee395c : fffffb02`6068b310 ffff9fcf`e7f3f9f8 fffffb02`00000000 fffffb02`6068b289 : nt!MiWalkPageTablesRecursively+0x6a1
fffffb02`6068b1c0 fffff807`54ee1dc8 : fffffb02`6068b310 00000000`00000002 00000000`00000001 00000000`00000000 : nt!MiWalkPageTables+0x36c
fffffb02`6068b2c0 fffff807`54eeff20 : ffffffff`ffffffff ffff8087`bf7743f8 fffffb02`00000001 00000000`00000000 : nt!MiDeletePagablePteRange+0x268
fffffb02`6068b660 fffff807`5547972d : ffff8087`bf573440 ffff8087`bf573440 ffff8087`bfe030c0 ffff8087`bf7743f0 : nt!MiDeleteVad+0x860
fffffb02`6068b820 fffff807`55488460 : ffff8087`bfe030c0 ffff8087`c0d86c90 ffff8087`bf573440 00000000`00000000 : nt!MiUnmapVad+0x49
fffffb02`6068b850 fffff807`554879cf : ffff8087`c1841f00 ffff8087`c1841f00 ffff8087`bf774080 fffff807`5526a3c0 : nt!MiCleanVad+0x30
fffffb02`6068b880 fffff807`553de469 : ffffffff`00000000 ffffffff`ffffffff fffffb02`6068bb01 ffff8087`bf774080 : nt!MmCleanProcessAddressSpace+0x137
fffffb02`6068b900 fffff807`554d1403 : ffff8087`bf774080 ffffd306`30e5b060 fffffb02`6068bb80 00000000`00000000 : nt!PspRundownSingleProcess+0x139
fffffb02`6068b980 fffff807`5546fcbb : 00000000`00000000 fffffb02`6068bb01 00000000`00e00000 ffff8087`bf573440 : nt!PspExitThread+0x60b
fffffb02`6068ba90 fffff807`54fd3c18 : 00000000`00003598 ffff8087`bf573440 ffff8087`bf774080 00000000`00000000 : nt!NtTerminateProcess+0xeb
fffffb02`6068bb00 00000000`77511cbc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`00d0e9f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77511cbc
THREAD_SHA1_HASH_MOD_FUNC: 28819333630b094e437e8f4b5f5cbb772be47b43
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: ea15c9a53e31626021a26a3b063e5f55c48a30c9
THREAD_SHA1_HASH_MOD: 9eef8c7ca0ce66f8b8b34848179f303828cff762
FOLLOWUP_IP:
nt!MiDeleteVa+16a7a8
fffff807`550502b8 cc int 3
FAULT_INSTR_CODE: d66ae8cc
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!MiDeleteVa+16a7a8
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 0
IMAGE_VERSION: 10.0.18362.720
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: memory_corruption
BUCKET_ID_FUNC_OFFSET: 16a7a8
FAILURE_BUCKET_ID: 0x1a_41792_nt!MiDeleteVa
BUCKET_ID: 0x1a_41792_nt!MiDeleteVa
PRIMARY_PROBLEM_CLASS: 0x1a_41792_nt!MiDeleteVa
TARGET_TIME: 2020-03-13T20:51:25.000Z
OSBUILD: 18362
OSSERVICEPACK: 720
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: unknown_date
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 2d8a
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x1a_41792_nt!mideleteva
FAILURE_ID_HASH: {ad6dfca3-101b-35a8-d6e1-12de9ecbc1f5}
Followup: MachineOwner
---------
KERNEL_LOCK_ENTRY_LEAKED_ON_THREAD_TERMINATION (153)
A thread was terminated before it had freed all its AutoBoost lock entries.
This is typically caused when a thread never released a lock it previously
acquired (e.g. by relying on another thread to release it), or if the thread
did not supply a consistent set of flags to lock package APIs.
Arguments:
Arg1: ffff9287b68a0080, The address of the thread
Arg2: ffff9287b68a0520, The address of the entry that was not freed
Arg3: 0000000000000001, Lock pointer was not NULL
Arg4: 8002000000000000, The address of the lock associated with the entry
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
SYSTEM_MANUFACTURER: Gigabyte Technology Co., Ltd.
SYSTEM_PRODUCT_NAME: B450M S2H
SYSTEM_SKU: Default string
SYSTEM_VERSION: Default string
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: F50
BIOS_DATE: 11/27/2019
BASEBOARD_MANUFACTURER: Gigabyte Technology Co., Ltd.
BASEBOARD_PRODUCT: B450M S2H
BASEBOARD_VERSION: x.x
DUMP_TYPE: 2
BUGCHECK_P1: ffff9287b68a0080
BUGCHECK_P2: ffff9287b68a0520
BUGCHECK_P3: 1
BUGCHECK_P4: 8002000000000000
CPU_COUNT: c
CPU_MHZ: e09
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 71
CPU_STEPPING: 0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: 0x153
PROCESS_NAME: Battle.net.exe
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-BKJR0DQ
ANALYSIS_SESSION_TIME: 03-16-2020 15:23:04.0416
ANALYSIS_VERSION: 10.0.18362.1 amd64fre
LAST_CONTROL_TRANSFER: from fffff8000a470b11 to fffff8000a3c2380
STACK_TEXT:
ffff9007`a77333b8 fffff800`0a470b11 : 00000000`00000153 ffff9287`b68a0080 ffff9287`b68a0520 00000000`00000001 : nt!KeBugCheckEx
ffff9007`a77333c0 fffff800`0a8d315e : 00000000`0000005a fffff800`0a8c38c7 ffff9287`b4f7e050 ffff9287`b5ef5a30 : nt!KeCleanupThreadState+0x137af5
ffff9007`a7733400 fffff800`0a8c36d0 : 00000000`00000000 ffff9287`b68a0050 ffff9007`a77335f9 00000000`00000000 : nt!PspThreadDelete+0x1e
ffff9007`a7733470 fffff800`0a313279 : 00000000`00000000 00000000`00000000 ffff9007`a77335f9 ffff9287`b68a0080 : nt!ObpRemoveObjectRoutine+0x80
ffff9007`a77334d0 fffff800`0a8b5a47 : 00000000`00000000 ffff9287`b68a0050 ffff9287`00000000 00000000`00005953 : nt!ObfDereferenceObjectWithTag+0xc9
ffff9007`a7733510 fffff800`0a7f8955 : ffff9287`b51d04e8 fffff800`0a30f44f ffff9287`b51d04b0 ffff9287`b896a080 : nt!ObCloseHandleTableEntry+0x2c7
ffff9007`a7733650 fffff800`0a86abed : ffff9287`b51d04b0 ffff9287`b896a080 ffffffff`ffffff01 ffff9287`b6415380 : nt!ExSweepHandleTable+0xd5
ffff9007`a7733700 fffff800`0a7de461 : ffffffff`ffffffff ffff9287`b6415080 ffff9007`a7733750 ffff9287`00000000 : nt!ObKillProcess+0x35
ffff9007`a7733730 fffff800`0a8d1403 : ffff9287`b6415080 ffffa608`275e2060 ffff9007`a7733959 00000000`00000000 : nt!PspRundownSingleProcess+0x131
ffff9007`a77337b0 fffff800`0a8cece3 : 00000000`c0000005 ffff8001`d1e79101 00000000`00928000 00000000`00000000 : nt!PspExitThread+0x60b
ffff9007`a77338c0 fffff800`0a316e21 : ffff9287`b896a080 ffff8001`00000000 00000000`00000000 00000000`00000000 : nt!KiSchedulerApcTerminate+0x33
ffff9007`a7733900 fffff800`0a3c6900 : ffff9287`b8960001 ffff9007`a77339c0 00000000`00000000 fffff800`00000000 : nt!KiDeliverApc+0x481
ffff9007`a77339c0 fffff800`0a3d3cbf : ffff9287`b896a080 00000000`00000000 ffff9007`a7733b18 ffffffff`ec549980 : nt!KiInitiateUserApc+0x70
ffff9007`a7733b00 00000000`775c1cbc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
00000000`05bdedb8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x775c1cbc
THREAD_SHA1_HASH_MOD_FUNC: 302a8dbe881442bd48596becf2940e0d2f158004
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 5aeced90d7003f643e128c01d492537959a253ae
THREAD_SHA1_HASH_MOD: 7f608ac2fbce9034a3386b1d51652e4911d30234
FOLLOWUP_IP:
nt!KeCleanupThreadState+137af5
fffff800`0a470b11 cc int 3
FAULT_INSTR_CODE: e9c18bcc
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!KeCleanupThreadState+137af5
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 0
IMAGE_VERSION: 10.0.18362.720
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 137af5
FAILURE_BUCKET_ID: 0x153_nt!KeCleanupThreadState
BUCKET_ID: 0x153_nt!KeCleanupThreadState
PRIMARY_PROBLEM_CLASS: 0x153_nt!KeCleanupThreadState
TARGET_TIME: 2020-03-14T20:46:22.000Z
OSBUILD: 18362
OSSERVICEPACK: 720
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: unknown_date
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 2ba4
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x153_nt!kecleanupthreadstate
FAILURE_ID_HASH: {ec5d6639-ab1b-cfbe-e9ca-947d6a503a92}
Followup: MachineOwner
---------
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000061941, The subtype of the bugcheck.
Arg2: ffffc34780c0fb39
Arg3: 0000000000000009
Arg4: fffffc8e25528530
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
SYSTEM_MANUFACTURER: Gigabyte Technology Co., Ltd.
SYSTEM_PRODUCT_NAME: B450M S2H
SYSTEM_SKU: Default string
SYSTEM_VERSION: Default string
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: F50
BIOS_DATE: 11/27/2019
BASEBOARD_MANUFACTURER: Gigabyte Technology Co., Ltd.
BASEBOARD_PRODUCT: B450M S2H
BASEBOARD_VERSION: x.x
DUMP_TYPE: 2
BUGCHECK_P1: 61941
BUGCHECK_P2: ffffc34780c0fb39
BUGCHECK_P3: 9
BUGCHECK_P4: fffffc8e25528530
BUGCHECK_STR: 0x1a_61941
CPU_COUNT: c
CPU_MHZ: e09
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 71
CPU_STEPPING: 0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: csrss.exe
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-BKJR0DQ
ANALYSIS_SESSION_TIME: 03-16-2020 15:23:08.0508
ANALYSIS_VERSION: 10.0.18362.1 amd64fre
TRAP_FRAME: fffffc8e25528530 -- (.trap 0xfffffc8e25528530)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffc34780c0fb20 rbx=0000000000000000 rcx=ffffc3478410a4c0
rdx=000000000000000d rsi=0000000000000000 rdi=0000000000000000
rip=ffffc31402c2d364 rsp=fffffc8e255286c0 rbp=000000000000000d
r8=0000000000000000 r9=0000000000000000 r10=ffffc31403d4c310
r11=fffffc8e25528720 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
win32kfull!TimersProc+0x174:
ffffc314`02c2d364 f6401901 test byte ptr [rax+19h],1 ds:ffffc347`80c0fb39=00
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80644c4288c to fffff80644bc2380
STACK_TEXT:
fffffc8e`25528388 fffff806`44c4288c : 00000000`0000001a 00000000`00061941 ffffc347`80c0fb39 00000000`00000009 : nt!KeBugCheckEx
fffffc8e`25528390 fffff806`44bd0420 : ffffc600`00010224 00000000`00000000 00000000`adbe1100 00000000`00000000 : nt!MmAccessFault+0x179a1c
fffffc8e`25528530 ffffc314`02c2d364 : ffffc347`874b96a0 ffffc314`02f21308 00000000`00000000 ffff920c`aee9d088 : nt!KiPageFault+0x360
fffffc8e`255286c0 ffffc314`02c2d03b : 00000000`00000003 fffffc8e`25528840 ffffc314`02f21308 00000000`00000004 : win32kfull!TimersProc+0x174
fffffc8e`25528740 ffffc314`03d756a3 : ffff920c`a7ca9240 ffff920c`a7ca9240 00000000`00000000 00000000`00000005 : win32kfull!RawInputThread+0xd9b
fffffc8e`255289c0 ffffc314`02c4f4ef : ffff920c`a7ca9240 00000000`00000000 00000000`00000005 00000000`00000000 : win32kbase!xxxCreateSystemThreads+0xa3
fffffc8e`25528ad0 fffff806`44bd3c18 : ffff920c`a7ca9240 00000000`00000005 000002f8`46804200 00000000`000003dc : win32kfull!NtUserCallNoParam+0x6f
fffffc8e`25528b00 00007ffc`31191144 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000f9`f94bf9d8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`31191144
THREAD_SHA1_HASH_MOD_FUNC: 86107f5dc9731f7479b22a96151ec32184de52f0
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 6b065e5ec9ff0e2483214cd6056b492b2d2b9b82
THREAD_SHA1_HASH_MOD: 3a3fd6f5d671e23dd8de64436fd8c22ac717caff
FOLLOWUP_IP:
win32kfull!TimersProc+174
ffffc314`02c2d364 f6401901 test byte ptr [rax+19h],1
FAULT_INSTR_CODE: 11940f6
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: win32kfull!TimersProc+174
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: win32kfull
IMAGE_NAME: win32kfull.sys
DEBUG_FLR_IMAGE_TIMESTAMP: d8fde2a
IMAGE_VERSION: 10.0.18362.719
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 174
FAILURE_BUCKET_ID: 0x1a_61941_win32kfull!TimersProc
BUCKET_ID: 0x1a_61941_win32kfull!TimersProc
PRIMARY_PROBLEM_CLASS: 0x1a_61941_win32kfull!TimersProc
TARGET_TIME: 2020-03-14T11:50:02.000Z
OSBUILD: 18362
OSSERVICEPACK: 720
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: unknown_date
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 1fea
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x1a_61941_win32kfull!timersproc
FAILURE_ID_HASH: {1b316b3d-9e3b-4f89-86fc-7ffa82b2215b}
Followup: MachineOwner
---------
BAD_POOL_CALLER (c2)
The current thread is making a bad pool request. Typically this is at a bad IRQL level or double freeing the same allocation, etc.
Arguments:
Arg1: 0000000000000046, Attempt to free an invalid pool address
Arg2: 0002000000000000, Starting address
Arg3: 0000000000000000, 0
Arg4: 0000000000000000, 0
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
SYSTEM_MANUFACTURER: Gigabyte Technology Co., Ltd.
SYSTEM_PRODUCT_NAME: B450M S2H
SYSTEM_SKU: Default string
SYSTEM_VERSION: Default string
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: F50
BIOS_DATE: 11/27/2019
BASEBOARD_MANUFACTURER: Gigabyte Technology Co., Ltd.
BASEBOARD_PRODUCT: B450M S2H
BASEBOARD_VERSION: x.x
DUMP_TYPE: 2
BUGCHECK_P1: 46
BUGCHECK_P2: 2000000000000
BUGCHECK_P3: 0
BUGCHECK_P4: 0
FAULTING_IP:
win32kfull!Win32FreePoolImpl+52
ffff83e4`bb648e82 488b5c2440 mov rbx,qword ptr [rsp+40h]
BUGCHECK_STR: 0xc2_46
CPU_COUNT: c
CPU_MHZ: e09
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 71
CPU_STEPPING: 0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: explorer.exe
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-BKJR0DQ
ANALYSIS_SESSION_TIME: 03-16-2020 15:23:12.0049
ANALYSIS_VERSION: 10.0.18362.1 amd64fre
LAST_CONTROL_TRANSFER: from fffff8014691b0c3 to fffff801467c2380
STACK_TEXT:
ffffd403`9744bb08 fffff801`4691b0c3 : 00000000`000000c2 00000000`00000046 00020000`00000000 00000000`00000000 : nt!KeBugCheckEx
ffffd403`9744bb10 fffff801`4691b138 : 00000000`00000016 ffffd403`9744bec9 00020000`00000000 fffff801`46a6e118 : nt!RtlpHeapHandleError+0x2b
ffffd403`9744bb50 fffff801`4691ad61 : ffffd403`9744bc20 fffff801`46a6e118 00000000`00000000 00000028`00000100 : nt!RtlpHpHeapHandleError+0x58
ffffd403`9744bb80 fffff801`466a7ceb : ffffd403`9744bc20 00000000`00000000 00000000`00000000 fffff801`46c824ae : nt!RtlpLogHeapFailure+0x45
ffffd403`9744bbb0 fffff801`46634964 : ffffd403`9744bce0 ffffd403`9744bd80 ffffd403`9744bcc0 fffff801`466c1735 : nt!RtlpHpVaMgrCtxQuery+0x4b
ffffd403`9744bbf0 fffff801`4671ec59 : ffff83a9`00602080 00020000`00000000 a2e64ead`a2e64ead ffff83a9`01201000 : nt!RtlpHpQueryVA+0x54
ffffd403`9744bc50 fffff801`4696f019 : 00000000`00000000 ffffd403`9744bdf0 00000000`00000000 ffffd403`9744bdf0 : nt!ExFreeHeapPool+0x809
ffffd403`9744bd70 ffff83e4`bb648e82 : ffff83a9`040b2760 00000000`00000000 00000000`00000000 ffffd403`9744bdf0 : nt!ExFreePool+0x9
ffffd403`9744bda0 ffff83e4`bb01dd4c : 00000000`00000000 00020000`00000000 00020000`00000000 00000000`00000000 : win32kfull!Win32FreePoolImpl+0x52
ffffd403`9744bdd0 ffff83e4`bb6f4e41 : 00000000`00000001 ffffd403`9744bec9 00000000`ffff3fff ffff83a9`0083a2a0 : win32kbase!Win32FreePool+0x2c
ffffd403`9744be00 ffff83e4`bb6f0e72 : ffff83a9`0062a8a0 00000000`00000000 00000000`00000000 ffff83a9`0083a2a0 : win32kfull!xxxFreeWindow+0x133d
ffffd403`9744bf30 ffff83e4`bb09b99a : ffff83a9`0061b690 ffff83a9`0083a2a0 ffff83e4`bb1d2eac ffff83a9`00c02ec0 : win32kfull!xxxDestroyWindow+0x922
ffffd403`9744c030 ffff83e4`bb036a10 : 00000000`00000176 00000000`00000000 00000000`00000000 ffffd403`9744bfa0 : win32kbase!xxxDestroyWindowIfSupported+0x2a
ffffd403`9744c060 ffff83e4`bb037760 : 00000000`00000000 00000000`00000176 ffff83a9`040b2760 00000000`00000000 : win32kbase!HMDestroyUnlockedObjectWorker+0x68
ffffd403`9744c090 ffff83e4`bb03c93d : ffffc281`ff8af000 00000000`00000000 ffff83a9`040b2760 00000000`00000000 : win32kbase!DestroyThreadsObjects+0x120
ffffd403`9744c0d0 ffff83e4`bb03a396 : ffff83a9`040b2760 ffffc281`ff8af080 ffff83a9`040b2760 ffff83e4`bb218640 : win32kbase!xxxDestroyThreadInfo+0xd35
ffffd403`9744c2a0 ffff83e4`bb69d91b : 00000000`00000001 00000000`00000001 00000000`00000000 ffff9efe`39e00000 : win32kbase!UserThreadCallout+0x466
ffffd403`9744c490 ffff83e4`bb022c5d : 00000000`00000001 ffffd403`9744c5c0 fffff801`46a38948 ffff8e87`0c632b60 : win32kfull!W32pThreadCallout+0x7b
ffffd403`9744c4c0 ffff83e4`bae01040 : fffff801`46a38948 ffffc281`ff7d7700 ffffc281`f4e92c60 ffffc281`f3528f10 : win32kbase!W32CalloutDispatch+0x35d
ffffd403`9744c6e0 fffff801`46c7c4a1 : 00000000`00000000 ffffd403`9744c770 00060030`00010002 00000000`00000000 : win32k!W32CalloutDispatchThunk+0x10
ffffd403`9744c710 fffff801`46cd12db : ffffc281`f4e92c60 ffffd403`9744c8e9 00000000`00000000 00000000`00000000 : nt!ExCallCallBack+0x3d
ffffd403`9744c740 fffff801`46ccece3 : 00000000`40010004 00000000`00000000 00000000`00000000 00000000`00000000 : nt!PspExitThread+0x4e3
ffffd403`9744c850 fffff801`46716e21 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSchedulerApcTerminate+0x33
ffffd403`9744c890 fffff801`467c6900 : 00000000`00000001 ffffd403`9744c950 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x481
ffffd403`9744c950 fffff801`467d3cbf : ffffc281`ff8af080 00000000`0556fc58 00000000`ffffffff ffff8e87`00001cff : nt!KiInitiateUserApc+0x70
ffffd403`9744ca90 00007ffa`d4b29a84 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
00000000`0556fc38 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`d4b29a84
THREAD_SHA1_HASH_MOD_FUNC: 1957e7a04f3ba53d63f9a0b898b7201055c8db62
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 1f5e20c6e7c294ad68be801ef6c1c827c479cdba
THREAD_SHA1_HASH_MOD: 51f2a6522ff30439bd06347c26d588b06dac4ed2
FOLLOWUP_IP:
win32kfull!Win32FreePoolImpl+52
ffff83e4`bb648e82 488b5c2440 mov rbx,qword ptr [rsp+40h]
FAULT_INSTR_CODE: 245c8b48
SYMBOL_STACK_INDEX: 8
SYMBOL_NAME: win32kfull!Win32FreePoolImpl+52
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: win32kfull
IMAGE_NAME: win32kfull.sys
DEBUG_FLR_IMAGE_TIMESTAMP: d8fde2a
IMAGE_VERSION: 10.0.18362.719
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 52
FAILURE_BUCKET_ID: 0xc2_46_win32kfull!Win32FreePoolImpl
BUCKET_ID: 0xc2_46_win32kfull!Win32FreePoolImpl
PRIMARY_PROBLEM_CLASS: 0xc2_46_win32kfull!Win32FreePoolImpl
TARGET_TIME: 2020-03-14T20:52:27.000Z
OSBUILD: 18362
OSSERVICEPACK: 720
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: unknown_date
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 51cb
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0xc2_46_win32kfull!win32freepoolimpl
FAILURE_ID_HASH: {c7277be0-aae1-5026-878c-6ebf8984f15b}
Followup: MachineOwner
---------
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000061941, The subtype of the bugcheck.
Arg2: 00007fff0e57b400
Arg3: 000000000000001d
Arg4: ffffde821b5feb00
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
DUMP_TYPE: 2
BUGCHECK_P1: 61941
BUGCHECK_P2: 7fff0e57b400
BUGCHECK_P3: 1d
BUGCHECK_P4: ffffde821b5feb00
BUGCHECK_STR: 0x1a_61941
CPU_COUNT: c
CPU_MHZ: e09
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 71
CPU_STEPPING: 0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: dwm.exe
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-BKJR0DQ
ANALYSIS_SESSION_TIME: 03-16-2020 15:23:23.0039
ANALYSIS_VERSION: 10.0.18362.1 amd64fre
LAST_CONTROL_TRANSFER: from fffff8076c04288c to fffff8076bfc2380
STACK_TEXT:
ffffde82`1b5fe958 fffff807`6c04288c : 00000000`0000001a 00000000`00061941 00007fff`0e57b400 00000000`0000001d : nt!KeBugCheckEx
ffffde82`1b5fe960 fffff807`6bfd0420 : ffffa089`cbd130c0 ffffde82`1b5feb80 ffffde82`1b5feb80 000001f8`72df13f0 : nt!MmAccessFault+0x179a1c
ffffde82`1b5feb00 00007fff`0e57b400 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x360
0000009d`b3b1f418 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`0e57b400
THREAD_SHA1_HASH_MOD_FUNC: 1feb98d5c6601cfab1575099bc1303f202ec7478
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: c9a91cab4b8051e79b1ade67978b4ada6bb03b00
THREAD_SHA1_HASH_MOD: 2a7ca9d3ab5386d53fea7498e1d81b9c4a4c036b
SYMBOL_NAME: ANALYSIS_INCONCLUSIVE
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: Unknown_Module
IMAGE_NAME: Unknown_Image
DEBUG_FLR_IMAGE_TIMESTAMP: 0
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: 0x1a_61941_ANALYSIS_INCONCLUSIVE!unknown_function
BUCKET_ID: 0x1a_61941_ANALYSIS_INCONCLUSIVE!unknown_function
PRIMARY_PROBLEM_CLASS: 0x1a_61941_ANALYSIS_INCONCLUSIVE!unknown_function
TARGET_TIME: 2020-03-16T10:37:35.000Z
OSBUILD: 18362
OSSERVICEPACK: 720
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: unknown_date
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 27d0
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x1a_61941_analysis_inconclusive!unknown_function
FAILURE_ID_HASH: {5deef4f7-7ffd-da2a-fbcb-ad563ba13c90}
Followup: MachineOwner
---------
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffff80537b57040, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff80536a8b340, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
SYSTEM_MANUFACTURER: Gigabyte Technology Co., Ltd.
SYSTEM_PRODUCT_NAME: B450M S2H
SYSTEM_SKU: Default string
SYSTEM_VERSION: Default string
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: F50
BIOS_DATE: 11/27/2019
BASEBOARD_MANUFACTURER: Gigabyte Technology Co., Ltd.
BASEBOARD_PRODUCT: B450M S2H
BASEBOARD_VERSION: x.x
DUMP_TYPE: 2
BUGCHECK_P1: fffff80537b57040
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff80536a8b340
READ_ADDRESS: fffff80523f733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80537b57040
CURRENT_IRQL: 2
FAULTING_IP:
wdiwifi!CRxMgr::RxProcessAndIndicateNblChain+364
fffff805`36a8b340 4c390df9bc0c01 cmp qword ptr [fffff805`37b57040],r9
CPU_COUNT: c
CPU_MHZ: e09
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 71
CPU_STEPPING: 0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
BUGCHECK_STR: AV
PROCESS_NAME: System
ANALYSIS_SESSION_HOST: DESKTOP-BKJR0DQ
ANALYSIS_SESSION_TIME: 03-16-2020 15:23:19.0040
ANALYSIS_VERSION: 10.0.18362.1 amd64fre
TRAP_FRAME: ffff850171dd2730 -- (.trap 0xffff850171dd2730)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000004 rbx=0000000000000000 rcx=0000000000000004
rdx=0000000000000020 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80536a8b340 rsp=ffff850171dd28c0 rbp=ffff850171dd2979
r8=0000000000000000 r9=fffff80536b57040 r10=0000000000000001
r11=ffff92784ba00000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
wdiwifi!CRxMgr::RxProcessAndIndicateNblChain+0x364:
fffff805`36a8b340 4c390df9bc0c01 cmp qword ptr [fffff805`37b57040],r9 ds:fffff805`37b57040=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80523bd41e9 to fffff80523bc2380
STACK_TEXT:
ffff8501`71dd25e8 fffff805`23bd41e9 : 00000000`0000000a fffff805`37b57040 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffff8501`71dd25f0 fffff805`23bd052b : ffffc60f`9a4091a0 00000000`00000000 ffffc60f`9ea75c10 ffffc60f`9e9dc010 : nt!KiBugCheckDispatch+0x69
ffff8501`71dd2730 fffff805`36a8b340 : ffffc60f`9a3f1b70 ffffc60f`99df2750 ffffc60f`a6df46d2 ffffc60f`a6df46d4 : nt!KiPageFault+0x46b
ffff8501`71dd28c0 fffff805`36a8bf10 : ffffc60f`9a3f1b70 00000000`00000003 ffffc60f`9a3f1b70 ffff8501`71dd2a80 : wdiwifi!CRxMgr::RxProcessAndIndicateNblChain+0x364
ffff8501`71dd29e0 fffff805`36a87d82 : ffffc60f`a6ccc740 ffff8501`71dd2ba0 ffffc60f`9a40d000 fffff805`3660a3ff : wdiwifi!CRxMgr::RxInOrderDataInd+0x358
ffff8501`71dd2a80 fffff805`362bb4f9 : fffff805`36a87cf0 fffff805`36663000 00000000`00000005 00000000`00040286 : wdiwifi!AdapterRxInorderDataInd+0x92
ffff8501`71dd2ad0 fffff805`362ba49d : ffffc60f`9a40d000 00000000`0000001f ffffc60f`9c860005 fffff805`3660617c : rtwlanu!wdi_NotifyPeerData+0x3a5
ffff8501`71dd2b40 fffff805`3634763d : ffffc60f`00000000 ffffc60f`9c000000 ffffc60f`9c86cf20 ffffc60f`9c86def4 : rtwlanu!WDI_NotifyDataInQueue+0x9d
ffff8501`71dd2ba0 fffff805`36605b5e : ffffc60f`9a40e7e8 fffff805`36347570 ffffc60f`997f9b98 ffffc60f`997f9b60 : rtwlanu!RxNotifyThreadCallback+0xcd
ffff8501`71dd2be0 fffff805`23a6bce5 : ffffc60f`9ce13080 00000000`00000080 fffff805`36605ad0 ffffc60f`9c86ce70 : rtwlanu!Ndis6ThreadCallback+0x8e
ffff8501`71dd2c10 fffff805`23bc99ca : ffffa280`f9fd5180 ffffc60f`9ce13080 fffff805`23a6bc90 ae78ae70`ae68ae60 : nt!PspSystemThreadStartup+0x55
ffff8501`71dd2c60 00000000`00000000 : ffff8501`71dd3000 ffff8501`71dcd000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x2a
CHKIMG_EXTENSION: !chkimg -lo 50 -db !wdiwifi
11 errors : !wdiwifi (fffff80536a8b346-fffff80536a8bf86)
fffff80536a8b340 4c 39 0d f9 bc 0c *01 74 3c 48 8b 0d f8 bc 0c 00 L9.....t<H......
...
fffff80536a8b390 8b 15 92 3f 0d 00 e8 c5 59 01 ed 33 db 45 *8d ff ...?....Y..3.E..
...
fffff80536a8b3b0 0f 8e 35 02 00 00 83 f8 02 0f 85 86 00 00 *02 48 ..5............H
...
fffff80536a8b700 43 4c 39 35 38 b9 *08 00 74 2b 48 8b 0d 37 b9 0c CL958...t+H..7..
fffff80536a8b710 00 41 b9 30 00 00 *08 89 44 24 28 45 8b c7 48 8d .A.0....D$(E..H.
...
fffff80536a8b7d0 5c b4 01 00 85 c0 74 0e 45 33 c0 48 8b d3 *49 8b \.....t.E3.H..I.
...
fffff80536a8b940 ec 30 41 0f b7 f8 *41 8b f2 48 8b d9 33 ed 4c 8d .0A...A..H..3.L.
...
fffff80536a8bb00 00 00 45 8b c7 4c 89 64 24 20 b2 04 48 8b *4d 40 ..E..L.d$ ..H.M@
...
fffff80536a8bd00 3c b3 0c 00 4c 8d *0d 95 3f 0c 00 74 1f 48 8b 0d <...L...?..t.H..
...
fffff80536a8bf60 73 07 66 44 39 71 *58 74 1a 48 8b 49 40 41 b9 4d [email protected]
...
fffff80536a8bf80 ad ff ff 48 8d 4b *c4 e8 98 00 00 00 84 c0 74 47 ...H.K........tG
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: STRIDE
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_STRIDE
BUCKET_ID: MEMORY_CORRUPTION_STRIDE
PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_STRIDE
TARGET_TIME: 2020-03-15T15:25:51.000Z
OSBUILD: 18362
OSSERVICEPACK: 720
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: unknown_date
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 18ccd
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:memory_corruption_stride
FAILURE_ID_HASH: {574dbc1b-92cb-fb09-cb7a-cacc1bb2c511}
Followup: memory_corruption
---------
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffff80476787da8, memory referenced
Arg2: 000000000000000e, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff8046a9c4510, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for nvlddmkm.sys
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
DUMP_TYPE: 2
BUGCHECK_P1: fffff80476787da8
BUGCHECK_P2: e
BUGCHECK_P3: 1
BUGCHECK_P4: fffff8046a9c4510
WRITE_ADDRESS: fffff80459d733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80476787da8
CURRENT_IRQL: e
FAULTING_IP:
nvlddmkm+124510
fffff804`6a9c4510 41899cc820030000 mov dword ptr [r8+rcx*8+320h],ebx
CPU_COUNT: c
CPU_MHZ: e09
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 71
CPU_STEPPING: 0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: ModernWarfare.exe
ANALYSIS_SESSION_HOST: DESKTOP-BKJR0DQ
ANALYSIS_SESSION_TIME: 03-16-2020 15:23:15.0742
ANALYSIS_VERSION: 10.0.18362.1 amd64fre
TRAP_FRAME: fffff8045f6758a0 -- (.trap 0xfffff8045f6758a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000797307 rbx=0000000000000000 rcx=00000000016c5915
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8046a9c4510 rsp=fffff8045f675a30 rbp=0000000000000000
r8=fffff8046b15b1e0 r9=0000000000000000 r10=fffff8046ac2fde4
r11=fffff8045f6758f0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac pe nc
nvlddmkm+0x124510:
fffff804`6a9c4510 41899cc820030000 mov dword ptr [r8+rcx*8+320h],ebx ds:fffff804`76787da8=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff804599d41e9 to fffff804599c2380
STACK_TEXT:
fffff804`5f675758 fffff804`599d41e9 : 00000000`0000000a fffff804`76787da8 00000000`0000000e 00000000`00000001 : nt!KeBugCheckEx
fffff804`5f675760 fffff804`599d052b : ffffb30c`a080e000 fffff804`6a9d7bcb 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff804`5f6758a0 fffff804`6a9c4510 : 00000000`00000001 00000000`00000000 00000000`00000000 fffff804`6a9a4506 : nt!KiPageFault+0x46b
fffff804`5f675a30 00000000`00000001 : 00000000`00000000 00000000`00000000 fffff804`6a9a4506 ffffb30c`9a4ab030 : nvlddmkm+0x124510
fffff804`5f675a38 00000000`00000000 : 00000000`00000000 fffff804`6a9a4506 ffffb30c`9a4ab030 fffff804`5f675b29 : 0x1
THREAD_SHA1_HASH_MOD_FUNC: 57bd2645b6b0775b5c75d343f2a6e2cc4fdca6ac
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: ab646ef82e879da2d6ca1d4fda1b9745e2935f61
THREAD_SHA1_HASH_MOD: 99270aa9efddf51499339f5ea82e28c2a8c9f7b4
FOLLOWUP_IP:
nvlddmkm+124510
fffff804`6a9c4510 41899cc820030000 mov dword ptr [r8+rcx*8+320h],ebx
FAULT_INSTR_CODE: c89c8941
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nvlddmkm+124510
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nvlddmkm
IMAGE_NAME: nvlddmkm.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 5e5ff509
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 124510
FAILURE_BUCKET_ID: AV_nvlddmkm!unknown_function
BUCKET_ID: AV_nvlddmkm!unknown_function
PRIMARY_PROBLEM_CLASS: AV_nvlddmkm!unknown_function
TARGET_TIME: 2020-03-14T22:32:19.000Z
OSBUILD: 18362
OSSERVICEPACK: 720
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: unknown_date
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 1aa45
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_nvlddmkm!unknown_function
FAILURE_ID_HASH: {7eea5677-f68d-2154-717e-887e07e55cd3}
Followup: MachineOwner
---------