Çözüldü Ryzen 3 Sistem Mavi Ekran Hataları

  • Konuyu başlatan Fides
  • Başlangıç Tarihi
  • Mesaj 290
  • Görüntüleme 20.031
Bu konu çözüldü olarak işaretlenmiştir. Çözülmediğini düşünüyorsanız konuyu rapor edebilirsiniz.
Durum
Mesaj gönderimine kapalı.

Fides

Kilopat
Katılım
24 Ocak 2019
Mesajlar
329
Çözümler
1
Arkadaşlar öncelikle iyi günler. Sistemi toplayalı yaklaşık 1 ay oldu. Ryzen 3'lü sistem topladım ve cihazı aldığım günden beri sorunlar da gelmeye başladı. İlk olarak mavi ekran hataları almaya başladım. Aldığım hatalar şöyleydi:
  • PAGE FAUTL IN NONPAGED AREA
  • IRQL NOT LESS OR EQUAL
  • DRIVER IRQL NOT LESS OR EQUAL
  • SYSTEM SERVICE EXCEPTION
  • MEMORY MANAGEMENT
Garantiye yolladım, bana sorunun RAM'de olduğunu ve değiştirdiklerini söylediler. Sonra cihazı aldıktan sonra 2 gün kullandım, ardından aynı hatalar devam etmeye başladı. Bellek testi yaptım bir sorun çıkmadı. Minidump dosyalarımı aşağıda paylaştım, pek bilgim yok umarım yapabilmişimdir. Yardımcı olacak arkadaşlara şimdiden teşekkür ediyorum.

minidump

Minidump dosyaları: s.rar
 
Çözüm
Deneyimlerimi aktarayım.
Anakart uyumlu RAM modülleri şart. Uyum listesinde elinizdeki RAM'ler örneğin 3000 MHz olsa bile uyum listesinde 2400 MHz çalışması gerekebilir.
Ayrıca, RAM için önerilen voltajtan 0,1 Volt arttırmanız yararınıza olabilir.

Ayrıca, AIDA stress testinde RAM testini pek dikkate almayınız. Yeni AGESA code güncelleme sonrası testin tutarlılığını sorguluyorum. RAM'lerim 2666 MHz olmasına karşın sadece XMP desteklese bile ASUS sitesinde RAM'lerimi 2133 MHz'de çalıştıracağımı öğrensemde olay aslında yeni AGESA güncellemesi ve voltajta yatıyor. 1,2 Volt olması gereken değerlerime 1,3 Volt vererek günlük kullanımda gayet stabilite kazandım. Mavi ekranlarım bitti. AIDA 64 cache hatası verse bile sistem gayet kararlı. En yoğun render hesaplamalarında bile hata almıyorum. Bu durumda bende AIDA64 sonuçlarını sorgulamaya itiyor.
Sormayın ya aynen öyle Yine de teşekkür ediyorum tekrardan cevabınız için hızır gibisiniz.
@Murat5038 bey iyi akşamlar. Kusura bakmayın çok sık atıyorum bu dump dosyalarını fakat 2 tane daha aldım. Sanırım 1 tanesi yine ekran kartı ile. Bir bakıp söyleyebilir misiniz? Ona göre cihazı servise götüreceğim. Yeni klasör.rar
 
Peki VRAM hatası olarak mı?
Evet maxhton'da kullanıyorum. Sildikten sonra düzelmemişti bilgisayarı formatladım ardından çökme konusunda sorun yaşanmadı. Buyuzden kullanıyorum.
 
Ne o halde? VRAM sorunu veya sürücü sorunu demiştiniz. Fakat sürücü sorunu olduğunu sanmıyorum.
 
Bütün mavi ekran dosyalarınızı inceledim.
  • Donanımsal x3
  • Ekran kartı x2
  • Bellek x6
  • Realtek WLAN x 2
  • Depolama x1
  • Ekran kartı x3
Bu konu gereksiz uzamış ve bu beni rahatsız etti. Sisteminizde büyük ihtimalle bellek ile ilgili bir sorun var.
  • Belleklerinizin markası ve modeli nedir?
  • Kaç MHz'te çalışıyorlar?
Kod:
ATTEMPTED_EXECUTE_OF_NOEXECUTE_MEMORY (fc)
An attempt was made to execute non-executable memory.  The guilty driver
is on the stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: ffffe58d483dc530, Virtual address for the attempted execute.
Arg2: 8a000001c6e009e3, PTE contents.
Arg3: fffff8003a26d930, (reserved)
Arg4: 0000000000000003, (reserved)

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 5

Key : Analysis.Elapsed.Sec
Value: 65

Key : Analysis.Memory.CommitPeak.Mb
Value: 68


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 17763.1.amd64fre.rs5_release.180914-1434

SYSTEM_MANUFACTURER: Micro-Star International Co., Ltd

SYSTEM_PRODUCT_NAME: MS-7B38

SYSTEM_SKU: To be filled by O.E.M.

SYSTEM_VERSION: 1.0

BIOS_VENDOR: American Megatrends Inc.

BIOS_VERSION: 2.E0

BIOS_DATE: 01/22/2019

BASEBOARD_MANUFACTURER: Micro-Star International Co., Ltd

BASEBOARD_PRODUCT: B350M PRO-VD PLUS (MS-7B38)

BASEBOARD_VERSION: 1.0

DUMP_TYPE: 2

BUGCHECK_P1: ffffe58d483dc530

BUGCHECK_P2: 8a000001c6e009e3

BUGCHECK_P3: fffff8003a26d930

BUGCHECK_P4: 3

CPU_COUNT: 4

CPU_MHZ: dac

CPU_VENDOR: AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 11

CPU_STEPPING: 0

BLACKBOXBSD: 1 (!blackboxbsd)


CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT

BUGCHECK_STR: 0xFC

PROCESS_NAME: System

CURRENT_IRQL: 5

ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5

ANALYSIS_SESSION_TIME: 05-13-2019 21:15:31.0735

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

TRAP_FRAME:  fffff8003a26d930 -- (.trap 0xfffff8003a26d930)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000040 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=ffffe58d483dc530 rsp=fffff8003a26dac8 rbp=0000000000000001
r8=0000000000000002 r9=fffff8003a26da68 r10=0000000000000000
r11=fffff8003a26d948 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
ffffe58d`483dc530 58 pop rax
Resetting default scope

LAST_CONTROL_TRANSFER: from fffff8003806ebd8 to fffff80037fca7e0

STACK_TEXT:
fffff800`3a26d708 fffff800`3806ebd8 : 00000000`000000fc ffffe58d`483dc530 8a000001`c6e009e3 fffff800`3a26d930 : nt!KeBugCheckEx
fffff800`3a26d710 fffff800`37ffb4f7 : 00000000`00000003 00000000`00000001 00000000`00000000 fffff800`3a26d850 : nt!MiCheckSystemNxFault+0x12fa30
fffff800`3a26d750 fffff800`37edf51f : 00000000`00000000 00000000`00000011 fffff800`3a26d890 00000000`00000000 : nt!MiRaisedIrqlFault+0x1ae443
fffff800`3a26d790 fffff800`37fd8283 : 00000000`00000001 00000000`00000001 00000000`00000001 fffff800`37ef8d8c : nt!MmAccessFault+0x46f
fffff800`3a26d930 ffffe58d`483dc530 : 00000000`00000050 ffffe58d`4b290000 fffff800`44b55ada fffff800`00000001 : nt!KiPageFault+0x343
fffff800`3a26dac8 00000000`00000050 : ffffe58d`4b290000 fffff800`44b55ada fffff800`00000001 fffff800`3a26dbe0 : 0xffffe58d`483dc530
fffff800`3a26dad0 ffffe58d`4b290000 : fffff800`44b55ada fffff800`00000001 fffff800`3a26dbe0 fffff800`3a26dbe0 : 0x50
fffff800`3a26dad8 fffff800`44b55ada : fffff800`00000001 fffff800`3a26dbe0 fffff800`3a26dbe0 ffffe58d`484688e0 : 0xffffe58d`4b290000
fffff800`3a26dae0 fffff800`00000001 : fffff800`3a26dbe0 fffff800`3a26dbe0 ffffe58d`484688e0 fffff800`3a26dc60 : nvlddmkm+0x1e5ada
fffff800`3a26dae8 fffff800`3a26dbe0 : fffff800`3a26dbe0 ffffe58d`484688e0 fffff800`3a26dc60 fffff800`3a26db49 : 0xfffff800`00000001
fffff800`3a26daf0 fffff800`3a26dbe0 : ffffe58d`484688e0 fffff800`3a26dc60 fffff800`3a26db49 00000000`4e000100 : 0xfffff800`3a26dbe0
fffff800`3a26daf8 ffffe58d`484688e0 : fffff800`3a26dc60 fffff800`3a26db49 00000000`4e000100 00000000`00000000 : 0xfffff800`3a26dbe0
fffff800`3a26db00 fffff800`3a26dc60 : fffff800`3a26db49 00000000`4e000100 00000000`00000000 00000000`00000000 : 0xffffe58d`484688e0
fffff800`3a26db08 fffff800`3a26db49 : 00000000`4e000100 00000000`00000000 00000000`00000000 00000000`00000000 : 0xfffff800`3a26dc60
fffff800`3a26db10 00000000`4e000100 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xfffff800`3a26db49
fffff800`3a26db18 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x4e000100


THREAD_SHA1_HASH_MOD_FUNC: ecb9c8137d43f3ae66d419b5c154b6cb00b43b43

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: f1dd9fa934dd817bcbc34f07511ddb26a69561e1

THREAD_SHA1_HASH_MOD: f2113cf119696bbdf4b93f6a6ccb797757579413

FOLLOWUP_IP:
nvlddmkm+1e5ada
fffff800`44b55ada 85c0 test eax,eax

FAULT_INSTR_CODE: 850fc085

SYMBOL_STACK_INDEX: 8

SYMBOL_NAME: nvlddmkm+1e5ada

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 5c8fe100

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 1e5ada

FAILURE_BUCKET_ID: 0xFC_nvlddmkm!unknown_function

BUCKET_ID: 0xFC_nvlddmkm!unknown_function

PRIMARY_PROBLEM_CLASS: 0xFC_nvlddmkm!unknown_function

TARGET_TIME: 2019-05-08T14:56:21.000Z

OSBUILD: 17763

OSSERVICEPACK: 475

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 784

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: unknown_date

BUILDDATESTAMP_STR: 180914-1434

BUILDLAB_STR: rs5_release

BUILDOSVER_STR: 10.0.17763.1.amd64fre.rs5_release.180914-1434

ANALYSIS_SESSION_ELAPSED_TIME: fe47

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:0xfc_nvlddmkm!unknown_function

FAILURE_ID_HASH: {10a372a1-4da6-30bd-243f-0740eda23c96}

Followup: MachineOwner
---------


DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000010, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff8002d3e44ea, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 3

Key : Analysis.Elapsed.Sec
Value: 76

Key : Analysis.Memory.CommitPeak.Mb
Value: 68


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 17763.1.amd64fre.rs5_release.180914-1434

SYSTEM_MANUFACTURER: Micro-Star International Co., Ltd

SYSTEM_PRODUCT_NAME: MS-7B38

SYSTEM_SKU: To be filled by O.E.M.

SYSTEM_VERSION: 1.0

BIOS_VENDOR: American Megatrends Inc.

BIOS_VERSION: 2.E0

BIOS_DATE: 01/22/2019

BASEBOARD_MANUFACTURER: Micro-Star International Co., Ltd

BASEBOARD_PRODUCT: B350M PRO-VD PLUS (MS-7B38)

BASEBOARD_VERSION: 1.0

DUMP_TYPE: 2

BUGCHECK_P1: 10

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff8002d3e44ea

WRITE_ADDRESS: GetUlongFromAddress: unable to read from fffff800209794c0
fffff800209f4390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
0000000000000010

CURRENT_IRQL: 2

FAULTING_IP:
nvlddmkm+2544ea
fffff800`2d3e44ea 488938 mov qword ptr [rax],rdi

CPU_COUNT: 4

CPU_MHZ: dac

CPU_VENDOR: AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 11

CPU_STEPPING: 0

BLACKBOXBSD: 1 (!blackboxbsd)


CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT

BUGCHECK_STR: AV

PROCESS_NAME: Maxthon.exe

ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5

ANALYSIS_SESSION_TIME: 05-13-2019 21:17:19.0453

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

DPC_STACK_BASE: FFFFF80022866FB0

TRAP_FRAME:  fffff80022866880 -- (.trap 0xfffff80022866880)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000010 rbx=0000000000000000 rcx=0000000000000018
rdx=0000000000000010 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8002d3e44ea rsp=fffff80022866a10 rbp=fffff80022866b40
r8=0000000000000000 r9=0000000000000010 r10=00000000ffffffff
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nvlddmkm+0x2544ea:
fffff800`2d3e44ea 488938 mov qword ptr [rax],rdi ds:00000000`00000010=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER: from fffff80020676f69 to fffff800206657e0

STACK_TEXT:
fffff800`22866738 fffff800`20676f69 : 00000000`0000000a 00000000`00000010 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff800`22866740 fffff800`2067338e : 00000000`00000000 00000000`ffffffff ffffc607`97879001 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff800`22866880 fffff800`2d3e44ea : ffffc607`9a4ae000 ffffc607`977798e0 00000000`00000000 ffff80c8`4ae0c4f8 : nt!KiPageFault+0x44e
fffff800`22866a10 ffffc607`9a4ae000 : ffffc607`977798e0 00000000`00000000 ffff80c8`4ae0c4f8 fffff800`1f735180 : nvlddmkm+0x2544ea
fffff800`22866a18 ffffc607`977798e0 : 00000000`00000000 ffff80c8`4ae0c4f8 fffff800`1f735180 fffff800`2d374d59 : 0xffffc607`9a4ae000
fffff800`22866a20 00000000`00000000 : ffff80c8`4ae0c4f8 fffff800`1f735180 fffff800`2d374d59 ffffc607`9a4ae000 : 0xffffc607`977798e0


THREAD_SHA1_HASH_MOD_FUNC: 57bd2645b6b0775b5c75d343f2a6e2cc4fdca6ac

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: cd3cf7f8a9550b7c1a75520f053cc0e4c92280d1

THREAD_SHA1_HASH_MOD: 99270aa9efddf51499339f5ea82e28c2a8c9f7b4

FOLLOWUP_IP:
nvlddmkm+2544ea
fffff800`2d3e44ea 488938 mov qword ptr [rax],rdi

FAULT_INSTR_CODE: ba388948

SYMBOL_STACK_INDEX: 3

SYMBOL_NAME: nvlddmkm+2544ea

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 5c8fe100

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 2544ea

FAILURE_BUCKET_ID: AV_nvlddmkm!unknown_function

BUCKET_ID: AV_nvlddmkm!unknown_function

PRIMARY_PROBLEM_CLASS: AV_nvlddmkm!unknown_function

TARGET_TIME: 2019-05-10T19:04:10.000Z

OSBUILD: 17763

OSSERVICEPACK: 475

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 784

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: unknown_date

BUILDDATESTAMP_STR: 180914-1434

BUILDLAB_STR: rs5_release

BUILDOSVER_STR: 10.0.17763.1.amd64fre.rs5_release.180914-1434

ANALYSIS_SESSION_ELAPSED_TIME: 12b7a

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:av_nvlddmkm!unknown_function

FAILURE_ID_HASH: {7eea5677-f68d-2154-717e-887e07e55cd3}

Followup: MachineOwner
---------


UNEXPECTED_STORE_EXCEPTION (154)
The store component caught an unexpected exception.
Arguments:
Arg1: ffffe28abed22000, Pointer to the store context or data manager
Arg2: ffff860d829b7230, Exception information
Arg3: 0000000000000001, Reserved
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : AV.Dereference
Value: NullPtr

Key : AV.Fault
Value: Write

Key : Analysis.CPU.Sec
Value: 5

Key : Analysis.Elapsed.Sec
Value: 5

Key : Analysis.Memory.CommitPeak.Mb
Value: 68


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 17763.1.amd64fre.rs5_release.180914-1434

DUMP_TYPE: 2

BUGCHECK_P1: ffffe28abed22000

BUGCHECK_P2: ffff860d829b7230

BUGCHECK_P3: 1

BUGCHECK_P4: 0

EXCEPTION_RECORD:  ffff860d829b81d8 -- (.exr 0xffff860d829b81d8)
ExceptionAddress: fffff8012b16d793 (nt!MiGetPage+0x0000000000000113)
   ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000001
Parameter[1]: 0000000000000000
Attempt to write to address 0000000000000000

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP:
nt!MiGetPage+113
fffff801`2b16d793 8b05275b4700 mov eax,dword ptr [nt!MiFlags (fffff801`2b5e32c0)]

FOLLOWUP_IP:
rdyboost!SMKM_STORE<SMD_TRAITS>::SmStAllocatePhysicalRegion+40
fffff801`3514dcfc 0f1f440000 nop dword ptr [rax+rax]

EXCEPTION_PARAMETER1: 0000000000000001

EXCEPTION_PARAMETER2: 0000000000000000

CONTEXT:  ffff860d829b7a20 -- (.cxr 0xffff860d829b7a20)
rax=0000000000000000 rbx=fffff8012b3f6f80 rcx=ffff82800632bd40
rdx=ffff828006388d40 rsi=ffff828006388d40 rdi=000000000000000a
rip=fffff8012b16d793 rsp=ffff860d829b8410 rbp=0000000000000001
r8=ffff828006388d40 r9=0000000000000000 r10=ffff8580000059c0
r11=000000000000009c r12=0000000000000002 r13=0000000000000000
r14=0000000000000000 r15=00000000000009c0
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246
nt!MiGetPage+0x113:
fffff801`2b16d793 8b05275b4700 mov eax,dword ptr [nt!MiFlags (fffff801`2b5e32c0)] ds:002b:fffff801`2b5e32c0=????????
Resetting default scope

CPU_COUNT: 4

CPU_MHZ: dac

CPU_VENDOR: AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 11

CPU_STEPPING: 0

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: NULL_DEREFERENCE

PROCESS_NAME: System

CURRENT_IRQL: 0

BUGCHECK_STR: 0x154_c0000005

WRITE_ADDRESS: GetUlongFromAddress: unable to read from fffff8012b567540
fffff8012b5e2390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
0000000000000000

ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

EXCEPTION_CODE_STR: c0000005

ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5

ANALYSIS_SESSION_TIME: 05-13-2019 21:15:36.0904

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

LAST_CONTROL_TRANSFER: from fffff8012b0f8ed3 to fffff8012b16d793

STACK_TEXT:
ffff860d`829b8410 fffff801`2b0f8ed3 : fffff801`2b4dda00 fffff801`0000009c 00000000`00000004 00000000`00000000 : nt!MiGetPage+0x113
ffff860d`829b84e0 fffff801`2b194ae6 : fffff801`2b4dda00 00000000`00000000 00000000`0001000d fffff801`00000001 : nt!MiAllocateMdlPagesByLists+0xdb
ffff860d`829b8560 fffff801`2b19425e : fffff801`2b4dda00 ffffe28a`c29b2560 ffffffff`ffffffff 00000000`00000001 : nt!MiFindPagesForMdl+0xe2
ffff860d`829b8650 fffff801`2b1940b9 : 00000000`00000000 0fffffff`fffffff0 ffffe28a`bed22050 ffffe28a`bedfe008 : nt!MiAllocatePagesForMdl+0x166
ffff860d`829b8800 fffff801`2b193fdd : 00000000`00000000 00000000`00000000 ffffe28a`c1190000 00000000`ffffffff : nt!MmAllocatePartitionNodePagesForMdlEx+0xc9
ffff860d`829b8870 fffff801`3514dcfc : 00000000`00001fff 00000000`00000005 ffffb781`7f74f000 fffff801`3514e197 : nt!MmAllocatePagesForMdlEx+0x4d
ffff860d`829b88c0 fffff801`3514df52 : ffffe28a`bed22050 00000000`0000040d ffffe28a`bed22050 00000000`00000000 : rdyboost!SMKM_STORE<SMD_TRAITS>::SmStAllocatePhysicalRegion+0x40
ffff860d`829b8900 fffff801`3514e654 : ffffe28a`bed22050 00000000`00000000 00000000`0000040d 00000000`00000000 : rdyboost!ST_STORE<SMD_TRAITS>::StMapAndLockRegion+0x5a
ffff860d`829b8950 fffff801`3514f3d5 : 00000000`0000040d 00000000`00000000 00000000`00000000 ffffe28a`bed22050 : rdyboost!ST_STORE<SMD_TRAITS>::StDmCurrentRegionSet+0x120
ffff860d`829b89b0 fffff801`3514ece5 : 00000000`00000002 ffff860d`829b8b19 ffff860d`829b8be8 00000000`00000001 : rdyboost!ST_STORE<SMD_TRAITS>::StDmpSinglePageAdd+0x5e5
ffff860d`829b8aa0 fffff801`35150b19 : fffff801`35140000 fffff801`00000001 ffffe28a`bed23678 ffffe28a`bed22000 : rdyboost!ST_STORE<SMD_TRAITS>::StDmPageAdd+0xb5
ffff860d`829b8b10 fffff801`3514e95b : 00000000`00000000 ffffe28a`c3594f10 00000000`00000080 00000000`00000000 : rdyboost!ST_STORE<SMD_TRAITS>::StWorkItemProcess+0x109
ffff860d`829b8b60 fffff801`3514b5b1 : 00000000`00000000 00000000`00000000 ffffb781`7e977100 00000000`000000af : rdyboost!SMKM_STORE<SMD_TRAITS>::SmStWorker+0x15b
ffff860d`829b8be0 fffff801`2b0dda45 : ffffe28a`bed22000 fffff801`3514b5a0 ffff860d`82605e88 00000065`b4bbbdff : rdyboost!SMKM_STORE<SMD_TRAITS>::SmStWorkerThread+0x11
ffff860d`829b8c10 fffff801`2b25aafc : ffffb781`7e967180 ffffe28a`bed24040 fffff801`2b0dd9f0 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffff860d`829b8c60 00000000`00000000 : ffff860d`829b9000 ffff860d`829b3000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x1c


THREAD_SHA1_HASH_MOD_FUNC: 4854c09d2fd81bf90d502ac5bd0d84e4d30b660f

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 72aa4153322590e7d4b6664cc6b7e566097993dd

THREAD_SHA1_HASH_MOD: 36fd94ffbb5846529fd01f4d2782c9684ec23d65

FAULT_INSTR_CODE: 441f0f

SYMBOL_STACK_INDEX: 6

SYMBOL_NAME: rdyboost!SMKM_STORE<SMD_TRAITS>::SmStAllocatePhysicalRegion+40

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: rdyboost

IMAGE_NAME:  rdyboost.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 5b832bf2

IMAGE_VERSION: 10.0.17763.194

STACK_COMMAND: .cxr 0xffff860d829b7a20 ; kb

BUCKET_ID_FUNC_OFFSET: 40

FAILURE_BUCKET_ID: 0x154_c0000005_rdyboost!SMKM_STORE_SMD_TRAITS_::SmStAllocatePhysicalRegion

BUCKET_ID: 0x154_c0000005_rdyboost!SMKM_STORE_SMD_TRAITS_::SmStAllocatePhysicalRegion

PRIMARY_PROBLEM_CLASS: 0x154_c0000005_rdyboost!SMKM_STORE_SMD_TRAITS_::SmStAllocatePhysicalRegion

TARGET_TIME: 2019-04-06T19:39:58.000Z

OSBUILD: 17763

OSSERVICEPACK: 404

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2022-05-13 12:29:43

BUILDDATESTAMP_STR: 180914-1434

BUILDLAB_STR: rs5_release

BUILDOSVER_STR: 10.0.17763.1.amd64fre.rs5_release.180914-1434

ANALYSIS_SESSION_ELAPSED_TIME: 1499

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:0x154_c0000005_rdyboost!smkm_store_smd_traits_::smstallocatephysicalregion

FAILURE_ID_HASH: {c9c7fcfd-cfdf-1cb1-9379-5441f25f6db4}

Followup: MachineOwner
---------


SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8006b82c120, Address of the instruction which caused the bugcheck
Arg3: ffffc083f4155f00, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 5

Key : Analysis.Elapsed.Sec
Value: 39

Key : Analysis.Memory.CommitPeak.Mb
Value: 68


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 17763.1.amd64fre.rs5_release.180914-1434

SYSTEM_MANUFACTURER: Micro-Star International Co., Ltd

SYSTEM_PRODUCT_NAME: MS-7B38

SYSTEM_SKU: To be filled by O.E.M.

SYSTEM_VERSION: 1.0

BIOS_VENDOR: American Megatrends Inc.

BIOS_VERSION: 2.E0

BIOS_DATE: 01/22/2019

BASEBOARD_MANUFACTURER: Micro-Star International Co., Ltd

BASEBOARD_PRODUCT: B350M PRO-VD PLUS (MS-7B38)

BASEBOARD_VERSION: 1.0

DUMP_TYPE: 2

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff8006b82c120

BUGCHECK_P3: ffffc083f4155f00

BUGCHECK_P4: 0

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP:
nt!ObpReferenceObjectByHandleWithTag+1c0
fffff800`6b82c120 8bc6 mov eax,esi

CONTEXT:  ffffc083f4155f00 -- (.cxr 0xffffc083f4155f00)
rax=00ffffad07e5f422 rbx=ffffad07e5f4b9d0 rcx=00000000001f0003
rdx=ffffad07d6efbae0 rsi=00000000001f0003 rdi=ffffe70ccc227cf0
rip=fffff8006b82c120 rsp=ffffc083f41568f0 rbp=000000000000033c
r8=ffffe70ccee45001 r9=fffff8006b20d000 r10=000000000000033c
r11=fffff8006b3d1958 r12=ffffc083f4156a38 r13=0000000000000000
r14=ad07e5f4b9d0fc7d r15=ffffad07dda66080
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202
nt!ObpReferenceObjectByHandleWithTag+0x1c0:
fffff800`6b82c120 8bc6 mov eax,esi
Resetting default scope

BUGCHECK_STR: 0x3B_c0000005

CPU_COUNT: 4

CPU_MHZ: dac

CPU_VENDOR: AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 11

CPU_STEPPING: 0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXPNP: 1 (!blackboxpnp)


CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT

PROCESS_NAME: Maxthon.exe

CURRENT_IRQL: 0

ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5

ANALYSIS_SESSION_TIME: 05-13-2019 21:15:29.0416

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

LAST_CONTROL_TRANSFER: from fffff8006b82bf4e to fffff8006b82c120

STACK_TEXT:
ffffc083`f41568f0 fffff800`6b82bf4e : ffffad07`e771b2c0 fffff800`00000002 ffffad07`d6efbae0 00000000`008fd701 : nt!ObpReferenceObjectByHandleWithTag+0x1c0
ffffc083`f4156980 fffff800`6b7a3698 : 00000000`0053fda0 00000000`00000000 00000000`02c54d00 00000000`02c54d00 : nt!ObReferenceObjectByHandle+0x2e
ffffc083`f41569d0 fffff800`6b3d1985 : ffffad07`dda66080 00000000`0053e738 ffffc083`f4156aa8 ffffad07`e30beed0 : nt!NtRemoveIoCompletion+0xe8
ffffc083`f4156a90 00000000`77b61cbc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
00000000`0053e718 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77b61cbc


THREAD_SHA1_HASH_MOD_FUNC: 66d3239b7f472d97519fb392ef597bf3c605b01f

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: a8b71224fc5b0852d4f160fa1aabf985db550c76

THREAD_SHA1_HASH_MOD: d084f7dfa548ce4e51810e4fd5914176ebc66791

FOLLOWUP_IP:
nt!ObpReferenceObjectByHandleWithTag+1c0
fffff800`6b82c120 8bc6 mov eax,esi

FAULT_INSTR_CODE: d0f7c68b

SYMBOL_STACK_INDEX: 0

SYMBOL_NAME: nt!ObpReferenceObjectByHandleWithTag+1c0

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP: 0

IMAGE_VERSION: 10.0.17763.475

STACK_COMMAND: .cxr 0xffffc083f4155f00 ; kb

BUCKET_ID_FUNC_OFFSET: 1c0

FAILURE_BUCKET_ID: 0x3B_c0000005_nt!ObpReferenceObjectByHandleWithTag

BUCKET_ID: 0x3B_c0000005_nt!ObpReferenceObjectByHandleWithTag

PRIMARY_PROBLEM_CLASS: 0x3B_c0000005_nt!ObpReferenceObjectByHandleWithTag

TARGET_TIME: 2019-05-10T19:12:18.000Z

OSBUILD: 17763

OSSERVICEPACK: 475

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 784

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: unknown_date

BUILDDATESTAMP_STR: 180914-1434

BUILDLAB_STR: rs5_release

BUILDOSVER_STR: 10.0.17763.1.amd64fre.rs5_release.180914-1434

ANALYSIS_SESSION_ELAPSED_TIME: 9af4

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:0x3b_c0000005_nt!obpreferenceobjectbyhandlewithtag

FAILURE_ID_HASH: {3d4819ec-af64-be43-ac98-a6e960db3861}

Followup: MachineOwner
---------


KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000096, The exception code that was not handled
Arg2: fffff8062d8965ea, The address that the exception occurred at
Arg3: ffffc388b0d87038, Parameter 0 of the exception
Arg4: ffffc388b0d86880, Parameter 1 of the exception

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for wdiwifi.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 3

Key : Analysis.Elapsed.Sec
Value: 42

Key : Analysis.Memory.CommitPeak.Mb
Value: 74


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 17763.1.amd64fre.rs5_release.180914-1434

DUMP_TYPE: 2

BUGCHECK_P1: ffffffffc0000096

BUGCHECK_P2: fffff8062d8965ea

BUGCHECK_P3: ffffc388b0d87038

BUGCHECK_P4: ffffc388b0d86880

EXCEPTION_CODE: (NTSTATUS) 0xc0000096 - <Unable to get error code text>

FAULTING_IP:
nt!KzLowerIrql+1a
fffff806`2d8965ea 440f22c0 mov cr8,rax

EXCEPTION_PARAMETER1: ffffc388b0d87038

EXCEPTION_PARAMETER2: ffffc388b0d86880

BUGCHECK_STR: 0x1E_c0000096

CPU_COUNT: 4

CPU_MHZ: dac

CPU_VENDOR: AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 11

CPU_STEPPING: 0

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT

PROCESS_NAME: System

CURRENT_IRQL: 0

ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5

ANALYSIS_SESSION_TIME: 05-13-2019 21:15:45.0467

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

LAST_CONTROL_TRANSFER: from fffff8062daa71a7 to fffff8062d9cc7e0

STACK_TEXT:
ffffc388`b0d85fd8 fffff806`2daa71a7 : 00000000`0000001e ffffffff`c0000096 fffff806`2d8965ea ffffc388`b0d87038 : nt!KeBugCheckEx
ffffc388`b0d85fe0 fffff806`2d9e5a46 : fffff806`2d8965ea fffff806`2d8480b8 ffffc388`b0d87270 ffffc388`b0d86880 : nt!KiFatalFilter+0x1f
ffffc388`b0d86020 fffff806`2d9a746f : 00000000`00000002 ffffc388`b0d87570 ffffc388`b0d82000 ffffc388`b0d88000 : nt!KeExpandKernelStackAndCalloutInternal$filt$0+0x16
ffffc388`b0d86060 fffff806`2d9d52cf : ffffc388`b0d87570 ffffc388`b0d86640 ffffc388`b0d86720 00000000`0010001f : nt!_C_specific_handler+0x9f
ffffc388`b0d860d0 fffff806`2d92e240 : ffffc388`b0d86720 00000000`00000000 ffffc388`b0d86640 fffff806`37cf66d8 : nt!RtlpExecuteHandlerForException+0xf
ffffc388`b0d86100 fffff806`2d83bac4 : ffffc388`b0d87038 ffffc388`b0d86d80 ffffc388`b0d87038 00000000`00000000 : nt!RtlDispatchException+0x430
ffffc388`b0d86850 fffff806`2d9de042 : fffff806`37c68490 ffffc388`b0d86fc0 00000000`00000000 ffff8885`ebca3010 : nt!KiDispatchException+0x144
ffffc388`b0d86f00 fffff806`2d9d9f05 : ffff8885`f6cdf050 fffff806`3740162b ffff8885`f6cdf080 00000000`00000001 : nt!KiExceptionDispatch+0xc2
ffffc388`b0d870e0 fffff806`2d8965ea : ffff8885`eb807a00 ffff8885`f25ab910 00000000`00000001 00000000`00000070 : nt!KiGeneralProtectionFault+0x305
ffffc388`b0d87270 fffff806`3701261e : ffff8885`f235f6a0 ffffc388`b0d87309 00000000`00000010 ffffc388`b0d87450 : nt!KzLowerIrql+0x1a
ffffc388`b0d872a0 fffff806`3748112e : 00000000`00000000 ffffc388`b0d87470 00000000`00000000 00000000`00000000 : NETIO!KfdClassify2+0x1fe
ffffc388`b0d87370 fffff806`37c678d8 : 00000000`00000000 ffff8885`f33f0ab0 ffffc388`b0d876f0 ffffc388`b0d87720 : wfplwfs!LwfLowerRecvNetBufferLists+0x11e
ffffc388`b0d874d0 fffff806`37c684ce : ffff8885`f1d4f040 ffffc388`b0d87720 ffffc388`b0d876f0 00000000`00000000 : ndis!ndisCallReceiveHandler+0xc8
ffffc388`b0d87520 fffff806`2d8f9ab8 : ffffc388`b0d87720 ffff8885`f2882c00 aaaa2370`de852ff7 00000000`00000000 : ndis!ndisDataPathExpandStackCallback+0x3e
ffffc388`b0d87570 fffff806`2d8f9a2d : fffff806`37c68490 ffffc388`b0d876f0 00000000`000927e2 fffff806`2ca33180 : nt!KeExpandKernelStackAndCalloutInternal+0x78
ffffc388`b0d875e0 fffff806`37c65191 : ffffa000`8d5db000 ffffc388`b0d876a0 ffffa000`00000000 00001f80`00280284 : nt!KeExpandKernelStackAndCalloutEx+0x1d
ffffc388`b0d87620 fffff806`7aa55ca2 : fffff806`2ca30002 ffff8885`f1f5b950 ffffc388`b0d87800 00000000`00000b04 : ndis!NdisMIndicateReceiveNetBufferLists+0x6c1
ffffc388`b0d877a0 fffff806`2ca30002 : ffff8885`f1f5b950 ffffc388`b0d87800 00000000`00000b04 ffffc388`00000000 : wdiwifi+0x55ca2
ffffc388`b0d877a8 ffff8885`f1f5b950 : ffffc388`b0d87800 00000000`00000b04 ffffc388`00000000 00000000`00000000 : 0xfffff806`2ca30002
ffffc388`b0d877b0 ffffc388`b0d87800 : 00000000`00000b04 ffffc388`00000000 00000000`00000000 00000000`00000000 : 0xffff8885`f1f5b950
ffffc388`b0d877b8 00000000`00000b04 : ffffc388`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xffffc388`b0d87800
ffffc388`b0d877c0 ffffc388`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xb04
ffffc388`b0d877c8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xffffc388`00000000


THREAD_SHA1_HASH_MOD_FUNC: 0b9ee993777b96043b753a90c0428e106e5bdfb3

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: c5918bdb483610b9397c3e5c21ccdab0b475f843

THREAD_SHA1_HASH_MOD: 8d8cdc4872be5e9fea32ad4c8103f73c9e043698

FOLLOWUP_IP:
NETIO!KfdClassify2+1fe
fffff806`3701261e 0f1f440000 nop dword ptr [rax+rax]

FAULT_INSTR_CODE: 441f0f

SYMBOL_STACK_INDEX: a

SYMBOL_NAME: NETIO!KfdClassify2+1fe

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: NETIO

IMAGE_NAME:  NETIO.SYS

DEBUG_FLR_IMAGE_TIMESTAMP: 0

IMAGE_VERSION: 10.0.17755.1

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 1fe

FAILURE_BUCKET_ID: 0x1E_c0000096_NETIO!KfdClassify2

BUCKET_ID: 0x1E_c0000096_NETIO!KfdClassify2

PRIMARY_PROBLEM_CLASS: 0x1E_c0000096_NETIO!KfdClassify2

TARGET_TIME: 2019-05-10T14:02:53.000Z

OSBUILD: 17763

OSSERVICEPACK: 475

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 784

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: unknown_date

BUILDDATESTAMP_STR: 180914-1434

BUILDLAB_STR: rs5_release

BUILDOSVER_STR: 10.0.17763.1.amd64fre.rs5_release.180914-1434

ANALYSIS_SESSION_ELAPSED_TIME: a6a6

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:0x1e_c0000096_netio!kfdclassify2

FAILURE_ID_HASH: {b038d5c7-1857-da40-b982-1cb6878a2e61}

Followup: MachineOwner
---------


KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80f0aa88df3, The address that the exception occurred at
Arg3: fffff8030e05e9f8, Parameter 0 of the exception
Arg4: fffff8030e05e240, Parameter 1 of the exception

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 2

Key : Analysis.Elapsed.Sec
Value: 33

Key : Analysis.Memory.CommitPeak.Mb
Value: 71


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 17763.1.amd64fre.rs5_release.180914-1434

DUMP_TYPE: 2

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff80f0aa88df3

BUGCHECK_P3: fffff8030e05e9f8

BUGCHECK_P4: fffff8030e05e240

WRITE_ADDRESS: GetUlongFromAddress: unable to read from fffff8030bf72540
fffff8030bfed390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8030e05e240

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP:
rdyboost!SMKM_STORE_MGR<SMD_TRAITS>::SmReadPickStore+523
fffff80f`0aa88df3 b8ffffffff mov eax,0FFFFFFFFh

EXCEPTION_PARAMETER1: fffff8030e05e9f8

EXCEPTION_PARAMETER2: fffff8030e05e240

BUGCHECK_STR: 0x1E_c0000005

CPU_COUNT: 4

CPU_MHZ: dac

CPU_VENDOR: AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 11

CPU_STEPPING: 0

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT

PROCESS_NAME: System

CURRENT_IRQL: 2

ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5

ANALYSIS_SESSION_TIME: 05-13-2019 21:13:25.0726

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

TRAP_FRAME:  fffff8030e05e8e0 -- (.trap 0xfffff8030e05e8e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8030bb2e7f7 rsp=ffff9d0ceab22800 rbp=0000000000000000
r8=0000000000000000 r9=0000000000000000 r10=0000000000000000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di pl nz na pe nc
nt!KeSetEvent+0xb7:
fffff803`0bb2e7f7 4c8b6c2458 mov r13,qword ptr [rsp+58h] ss:ffff9d0c`eab22858=ffff9d0ced190000
Resetting default scope

BAD_STACK_POINTER: ffff9d0ceab22800

LAST_CONTROL_TRANSFER: from fffff8030bd390a7 to fffff8030bc5e730

STACK_TEXT:
fffff803`0e05d998 fffff803`0bd390a7 : 00000000`0000001e ffffffff`c0000005 fffff80f`0aa88df3 fffff803`0e05e9f8 : nt!KeBugCheckEx
fffff803`0e05d9a0 fffff803`0bc77946 : fffff80f`0aa88df3 fffff803`0bada0b8 fffff803`0e05ec30 fffff803`0e05e240 : nt!KiFatalFilter+0x1f
fffff803`0e05d9e0 fffff803`0bc3946f : ffff9d0c`00000002 fffff803`0e05f070 fffff803`0e05a000 fffff803`0e060000 : nt!KeExpandKernelStackAndCalloutInternal$filt$0+0x16
fffff803`0e05da20 fffff803`0bc6721f : fffff803`0e05f070 fffff803`0e05e000 fffff803`0e05e0e0 00000000`0010001f : nt!_C_specific_handler+0x9f
fffff803`0e05da90 fffff803`0bbc0240 : fffff803`0e05e0e0 00000000`00000000 fffff803`0e05e000 fffff80f`0aaae150 : nt!RtlpExecuteHandlerForException+0xf
fffff803`0e05dac0 fffff803`0bacdac4 : fffff803`0e05e9f8 fffff803`0e05e740 fffff803`0e05e9f8 00000000`0000010e : nt!RtlDispatchException+0x430
fffff803`0e05e210 fffff803`0bc6ff42 : 00000000`00000000 fffff803`0e05e9a0 fffff803`0e05e8e0 00000000`611b107d : nt!KiDispatchException+0x144
fffff803`0e05e8c0 fffff803`0bc6be05 : ffff9d0c`ee8fe030 ffff9d0c`e9802340 00000000`000000e0 00000000`00000210 : nt!KiExceptionDispatch+0xc2
fffff803`0e05eaa0 fffff80f`0aa88df3 : fffff80f`0aab3650 fffff803`0e05ee70 ffff9d0c`e9802340 ffff9d0c`e9803a00 : nt!KiGeneralProtectionFault+0x305
fffff803`0e05ec30 fffff80f`0aa88797 : ffff81ce`8677c318 ffff81c0`e7433be0 ffff81c0`e073a198 ffff81c0`e07039d0 : rdyboost!SMKM_STORE_MGR<SMD_TRAITS>::SmReadPickStore+0x523
fffff803`0e05eda0 fffff80f`0aa881f3 : ffff9d0c`ea9dc8a0 8a000001`0b2009e3 00000000`00000000 ffff81ce`8677c390 : rdyboost!SMKM_STORE_MGR<SMD_TRAITS>::SmPageRead+0x77
fffff803`0e05ee10 fffff80f`0aa810b9 : 00000000`00000103 00000000`00000000 ffff9d0c`ea9bfa20 00000000`00000000 : rdyboost!SmdRBDispatchReadWrite+0x393
fffff803`0e05ef00 fffff803`0bb239e9 : ffff9d0c`ea9dc8a0 ffff9d0c`ea83b780 ffff8404`2aba19a0 00000000`0000f000 : rdyboost!SmdDispatchReadWrite+0xa9
fffff803`0e05ef30 fffff80f`0aa89421 : ffff8404`00000000 ffff9d0c`ea83b780 ffff8404`2aba19a0 ffff9d0c`ea9dc8a0 : nt!IofCallDriver+0x59
fffff803`0e05ef70 fffff80f`0aa854ee : 00000000`00000020 00000000`0000f000 fffff80f`0aab3710 00000000`00000002 : rdyboost!SmdPopulationCtxIssueIo+0xdd
fffff803`0e05efb0 fffff80f`0aa85369 : fffff803`0e05f150 fffff803`0e05f219 ffff8404`2aba19a0 00000002`4acb5000 : rdyboost!SmdPopulationIssueIo+0x13e
fffff803`0e05f020 fffff803`0bb8bab8 : 00000000`0024acb5 fffff803`0c00a400 fffff803`0e05f219 fffff80f`0aa8a65a : rdyboost!SmdPopulationCtxCompletionStackCallout+0x79
fffff803`0e05f070 fffff803`0bb8ba2d : fffff80f`0aa852f0 fffff803`0e05f150 ffff8404`2aba19a0 ffff8404`2aba19a0 : nt!KeExpandKernelStackAndCalloutInternal+0x78
fffff803`0e05f0e0 fffff80f`0aa95e87 : ffff9d0c`ea9bfa20 fffff80f`0aa81bfd ffff9d0c`ea9bfa20 fffff80f`0ab05000 : nt!KeExpandKernelStackAndCalloutEx+0x1d
fffff803`0e05f120 fffff803`0bb2cefd : ffff9d0c`ea9dcb6b 00000000`00000000 ffff9d0c`ea9dca4b 00000000`0b32a112 : rdyboost!SmdPopulationCtxCompletion+0x67
fffff803`0e05f170 fffff803`0bb2cd17 : ffff9d0c`ea9dc8a0 00000000`00000001 ffff9d0c`ea9dc8a0 ffff9d0c`ea9dc9b8 : nt!IopfCompleteRequest+0x1cd
fffff803`0e05f280 fffff803`0d274750 : 00000000`00000000 ffff9d0c`ea6f2290 fffff803`0e05f3b0 ffff9d0c`ea6f2290 : nt!IofCompleteRequest+0x17
fffff803`0e05f2b0 fffff803`0bb2cefd : 00000000`00000000 fffff803`0e05f7b0 00000000`0000000e 00000000`00000000 : CLASSPNP!TransferPktComplete+0x6d0
fffff803`0e05f4c0 fffff803`0bb2cd17 : ffff9d0c`eef4dc80 00000000`00000001 ffffb280`57f0dfa0 00000000`00008000 : nt!IopfCompleteRequest+0x1cd
fffff803`0e05f5d0 fffff80f`0a8d963d : ffffb280`57f0b148 fffff803`0ba1fc16 00000000`00000000 ffff9d0c`ea7cd870 : nt!IofCompleteRequest+0x17
fffff803`0e05f600 fffff80f`0a8d8ec3 : ffffb280`57f0b020 00000000`00989680 fffff803`0e05f7d0 ffff9d0c`ea8521b0 : storport!RaidCompleteRequestEx+0x8d
fffff803`0e05f6d0 fffff80f`0a8ef63f : 00000000`00000002 fffff780`00000320 ffffb280`57d346f0 00000000`00000000 : storport!RaidUnitCompleteRequest+0x613
fffff803`0e05f870 fffff803`0bb24577 : fffff803`0aa0cf80 fffff803`0e05fa10 00000000`0002625a fffff803`0aa0a180 : storport!RaidpAdapterRedirectDpcRoutine+0x8f
fffff803`0e05f910 fffff803`0bb23bbe : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExecuteAllDpcs+0x2e7
fffff803`0e05fa50 fffff803`0bc6214a : 00000000`00000000 fffff803`0aa0a180 00000000`001a6550 fffff803`0c00a400 : nt!KiRetireDpcList+0x1ae
fffff803`0e05fc60 00000000`00000000 : fffff803`0e060000 fffff803`0e05a000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x5a


THREAD_SHA1_HASH_MOD_FUNC: e63c20e11252cd579fead9db6d6d46c3175957c8

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: c8c311caa24086de64532a153d462522bc7821ed

THREAD_SHA1_HASH_MOD: 9af2bbd77633a37027eee9af0ba02b895532496c

FOLLOWUP_IP:
rdyboost!SMKM_STORE_MGR<SMD_TRAITS>::SmReadPickStore+523
fffff80f`0aa88df3 b8ffffffff mov eax,0FFFFFFFFh

FAULT_INSTR_CODE: ffffffb8

SYMBOL_STACK_INDEX: 9

SYMBOL_NAME: rdyboost!SMKM_STORE_MGR<SMD_TRAITS>::SmReadPickStore+523

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: rdyboost

IMAGE_NAME:  rdyboost.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 5b832bf2

IMAGE_VERSION: 10.0.17763.194

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 523

FAILURE_BUCKET_ID: 0x1E_c0000005_STACKPTR_ERROR_rdyboost!SMKM_STORE_MGR_SMD_TRAITS_::SmReadPickStore

BUCKET_ID: 0x1E_c0000005_STACKPTR_ERROR_rdyboost!SMKM_STORE_MGR_SMD_TRAITS_::SmReadPickStore

PRIMARY_PROBLEM_CLASS: 0x1E_c0000005_STACKPTR_ERROR_rdyboost!SMKM_STORE_MGR_SMD_TRAITS_::SmReadPickStore

TARGET_TIME: 2019-04-11T16:58:28.000Z

OSBUILD: 17763

OSSERVICEPACK: 437

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2005-12-02 10:58:59

BUILDDATESTAMP_STR: 180914-1434

BUILDLAB_STR: rs5_release

BUILDOSVER_STR: 10.0.17763.1.amd64fre.rs5_release.180914-1434

ANALYSIS_SESSION_ELAPSED_TIME: 847f

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:0x1e_c0000005_stackptr_error_rdyboost!smkm_store_mgr_smd_traits_::smreadpickstore

FAILURE_ID_HASH: {e69bff67-1810-73a5-1d9d-1b1ebbf8a1c7}

Followup: MachineOwner
---------


DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000008, memory referenced
Arg2: 000000000000000e, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff80187feb84f, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 2

Key : Analysis.Elapsed.Sec
Value: 74

Key : Analysis.Memory.CommitPeak.Mb
Value: 68


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 17763.1.amd64fre.rs5_release.180914-1434

SYSTEM_MANUFACTURER: Micro-Star International Co., Ltd

SYSTEM_PRODUCT_NAME: MS-7B38

SYSTEM_SKU: To be filled by O.E.M.

SYSTEM_VERSION: 1.0

BIOS_VENDOR: American Megatrends Inc.

BIOS_VERSION: 2.E0

BIOS_DATE: 01/22/2019

BASEBOARD_MANUFACTURER: Micro-Star International Co., Ltd

BASEBOARD_PRODUCT: B350M PRO-VD PLUS (MS-7B38)

BASEBOARD_VERSION: 1.0

DUMP_TYPE: 2

BUGCHECK_P1: 8

BUGCHECK_P2: e

BUGCHECK_P3: 0

BUGCHECK_P4: fffff80187feb84f

READ_ADDRESS: GetUlongFromAddress: unable to read from fffff8017a8cc540
fffff8017a947390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
0000000000000008

CURRENT_IRQL: e

FAULTING_IP:
nvlddmkm+20b84f
fffff801`87feb84f 4885ff test rdi,rdi

CPU_COUNT: 4

CPU_MHZ: dac

CPU_VENDOR: AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 11

CPU_STEPPING: 0

BLACKBOXBSD: 1 (!blackboxbsd)


CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT

BUGCHECK_STR: AV

PROCESS_NAME: System

ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5

ANALYSIS_SESSION_TIME: 05-13-2019 21:13:28.0323

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

TRAP_FRAME:  fffff8017cab0620 -- (.trap 0xfffff8017cab0620)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000002 rbx=0000000000000000 rcx=ffffc18e8ce16950
rdx=000000000000000e rsi=0000000000000000 rdi=0000000000000000
rip=fffff80187feb84f rsp=fffff8017cab07b0 rbp=00000000006100bc
r8=0000000000000001 r9=0000000000000000 r10=fffff8017cab0b50
r11=fffff8017cab0860 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nvlddmkm+0x20b84f:
fffff801`87feb84f 4885ff test rdi,rdi
Resetting default scope

LAST_CONTROL_TRANSFER: from fffff8017a5c9e69 to fffff8017a5b8730

STACK_TEXT:
fffff801`7cab04d8 fffff801`7a5c9e69 : 00000000`0000000a 00000000`00000008 00000000`0000000e 00000000`00000000 : nt!KeBugCheckEx
fffff801`7cab04e0 fffff801`7a5c628e : 00000000`00000000 fffff801`7a4ef415 fffff801`87ec7e4e ffffc18e`8d2b4000 : nt!KiBugCheckDispatch+0x69
fffff801`7cab0620 fffff801`87feb84f : ffffc18e`8ce44000 fffff801`87fea758 00000000`00000000 ffffc18e`8ce44000 : nt!KiPageFault+0x44e
fffff801`7cab07b0 ffffc18e`8ce44000 : fffff801`87fea758 00000000`00000000 ffffc18e`8ce44000 00000000`00000000 : nvlddmkm+0x20b84f
fffff801`7cab07b8 fffff801`87fea758 : 00000000`00000000 ffffc18e`8ce44000 00000000`00000000 fffff801`88066cc0 : 0xffffc18e`8ce44000
fffff801`7cab07c0 00000000`00000000 : ffffc18e`8ce44000 00000000`00000000 fffff801`88066cc0 ffffc18e`8ce44000 : nvlddmkm+0x20a758


THREAD_SHA1_HASH_MOD_FUNC: 43d66b695656ff6029e0896a0f38861e7138cae6

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 19ad70e9bb0225f45c1b9706fc4b8dee29bfc72e

THREAD_SHA1_HASH_MOD: c5849c14d56648baae932b75ab8e18776e6ef2ce

FOLLOWUP_IP:
nvlddmkm+20b84f
fffff801`87feb84f 4885ff test rdi,rdi

FAULT_INSTR_CODE: 74ff8548

SYMBOL_STACK_INDEX: 3

SYMBOL_NAME: nvlddmkm+20b84f

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 5cac844b

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 20b84f

FAILURE_BUCKET_ID: AV_nvlddmkm!unknown_function

BUCKET_ID: AV_nvlddmkm!unknown_function

PRIMARY_PROBLEM_CLASS: AV_nvlddmkm!unknown_function

TARGET_TIME: 2019-04-18T14:51:16.000Z

OSBUILD: 17763

OSSERVICEPACK: 437

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2005-12-02 10:58:59

BUILDDATESTAMP_STR: 180914-1434

BUILDLAB_STR: rs5_release

BUILDOSVER_STR: 10.0.17763.1.amd64fre.rs5_release.180914-1434

ANALYSIS_SESSION_ELAPSED_TIME: 12298

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:av_nvlddmkm!unknown_function

FAILURE_ID_HASH: {7eea5677-f68d-2154-717e-887e07e55cd3}

Followup: MachineOwner
---------


SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c000001d, Exception code that caused the bugcheck
Arg2: fffff8035b4e299e, Address of the instruction which caused the bugcheck
Arg3: ffff9e80b057f820, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 5

Key : Analysis.Elapsed.Sec
Value: 17

Key : Analysis.Memory.CommitPeak.Mb
Value: 66


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 17763.1.amd64fre.rs5_release.180914-1434

SYSTEM_MANUFACTURER: Micro-Star International Co., Ltd

SYSTEM_PRODUCT_NAME: MS-7B38

SYSTEM_SKU: To be filled by O.E.M.

SYSTEM_VERSION: 1.0

BIOS_VENDOR: American Megatrends Inc.

BIOS_VERSION: 2.E0

BIOS_DATE: 01/22/2019

BASEBOARD_MANUFACTURER: Micro-Star International Co., Ltd

BASEBOARD_PRODUCT: B350M PRO-VD PLUS (MS-7B38)

BASEBOARD_VERSION: 1.0

DUMP_TYPE: 2

BUGCHECK_P1: c000001d

BUGCHECK_P2: fffff8035b4e299e

BUGCHECK_P3: ffff9e80b057f820

BUGCHECK_P4: 0

EXCEPTION_CODE: (NTSTATUS) 0xc000001d - <Unable to get error code text>

FAULTING_IP:
nt!KeQueryValuesThread+14e
fffff803`5b4e299e 2c03 sub al,3

CONTEXT:  ffff9e80b057f820 -- (.cxr 0xffff9e80b057f820)
rax=0000000000000004 rbx=0000000000000000 rcx=0000000000000002
rdx=fffff8035b9f1d80 rsi=0000000000000050 rdi=0000000000000000
rip=fffff8035b4e299e rsp=ffff9e80b0580210 rbp=ffffc10a2c392080
r8=0000000000000000 r9=7fffc10a28dbe818 r10=7ffffffffffffffc
r11=ffff9e80b0580270 r12=ffff9e80b0580398 r13=0000000000000000
r14=0000000000000000 r15=0000000000000005
iopl=0 nv up ei pl nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010206
nt!KeQueryValuesThread+0x14e:
fffff803`5b4e299e 2c03 sub al,3
Resetting default scope

BUGCHECK_STR: 0x3B_c000001d

CPU_COUNT: 4

CPU_MHZ: dac

CPU_VENDOR: AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 11

CPU_STEPPING: 0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXPNP: 1 (!blackboxpnp)


CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT

PROCESS_NAME: Display Driver Uninstaller.exe

CURRENT_IRQL: 2

ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5

ANALYSIS_SESSION_TIME: 05-13-2019 21:13:31.0275

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

LAST_CONTROL_TRANSFER: from fffff8035bb49a59 to fffff8035b4e299e

STACK_TEXT:
ffff9e80`b0580210 fffff803`5bb49a59 : ffffc10a`00000000 ffffc10a`28dbe540 ffffc10a`28dbe540 ffffc10a`28dbe540 : nt!KeQueryValuesThread+0x14e
ffff9e80`b0580290 fffff803`5bb4c71a : 00000001`ffffffff fffffff6`00039d40 00000000`00000005 00000000`00000000 : nt!ExpGetProcessInformation+0xb39
ffff9e80`b05808b0 fffff803`5bb4be7b : 000001b6`e8bb5a40 fffff803`5b417ae6 ffff9e80`b0580b18 00000000`00000000 : nt!ExpQuerySystemInformation+0x77a
ffff9e80`b0580ac0 fffff803`5b671785 : ffffc10a`342a5640 00000000`00000000 fffff803`00000000 ffffc10a`3379e0e0 : nt!NtQuerySystemInformation+0x2b
ffff9e80`b0580b00 00007ffd`4b05fd34 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
0000002c`22bfe828 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`4b05fd34


THREAD_SHA1_HASH_MOD_FUNC: 6dd8f47319a8a7214d37db0e5365568153cf6eda

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 0d224bc1d81e2384f42c8a9afb4f741fab609b2a

THREAD_SHA1_HASH_MOD: f08ac56120cad14894587db086f77ce277bfae84

FOLLOWUP_IP:
nt!KeQueryValuesThread+14e
fffff803`5b4e299e 2c03 sub al,3

FAULT_INSTR_CODE: 33c032c

SYMBOL_STACK_INDEX: 0

SYMBOL_NAME: nt!KeQueryValuesThread+14e

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP: 0

IMAGE_VERSION: 10.0.17763.379

STACK_COMMAND: .cxr 0xffff9e80b057f820 ; kb

BUCKET_ID_FUNC_OFFSET: 14e

FAILURE_BUCKET_ID: 0x3B_c000001d_nt!KeQueryValuesThread

BUCKET_ID: 0x3B_c000001d_nt!KeQueryValuesThread

PRIMARY_PROBLEM_CLASS: 0x3B_c000001d_nt!KeQueryValuesThread

TARGET_TIME: 2019-04-03T14:20:04.000Z

OSBUILD: 17763

OSSERVICEPACK: 379

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: unknown_date

BUILDDATESTAMP_STR: 180914-1434

BUILDLAB_STR: rs5_release

BUILDOSVER_STR: 10.0.17763.1.amd64fre.rs5_release.180914-1434

ANALYSIS_SESSION_ELAPSED_TIME: 42bd

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:0x3b_c000001d_nt!kequeryvaluesthread

FAILURE_ID_HASH: {046b89e4-e11e-c797-2078-4d8e65aefddb}

Followup: MachineOwner
---------


UNEXPECTED_STORE_EXCEPTION (154)
The store component caught an unexpected exception.
Arguments:
Arg1: ffff81045f72c000, Pointer to the store context or data manager
Arg2: fffff8853a5a2640, Exception information
Arg3: 0000000000000001, Reserved
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : AV.Dereference
Value: NullClassPtr

Key : AV.Fault
Value: Read

Key : Analysis.CPU.Sec
Value: 5

Key : Analysis.Elapsed.Sec
Value: 10

Key : Analysis.Memory.CommitPeak.Mb
Value: 67


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 17763.1.amd64fre.rs5_release.180914-1434

DUMP_TYPE: 2

BUGCHECK_P1: ffff81045f72c000

BUGCHECK_P2: fffff8853a5a2640

BUGCHECK_P3: 1

BUGCHECK_P4: 0

EXCEPTION_RECORD:  fffff8853a5a35e8 -- (.exr 0xfffff8853a5a35e8)
ExceptionAddress: fffff80359336717 (rdyboost!memcpy+0x00000000000001d7)
   ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 00000000000003fc
Attempt to read from address 00000000000003fc

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP:
rdyboost!memcpy+1d7
fffff803`59336717 660f1f840000000000 nop word ptr [rax+rax]

FOLLOWUP_IP:
rdyboost!memcpy+1d7
fffff803`59336717 660f1f840000000000 nop word ptr [rax+rax]

EXCEPTION_PARAMETER1: 0000000000000000

EXCEPTION_PARAMETER2: 00000000000003fc

CONTEXT:  fffff8853a5a2e30 -- (.cxr 0xfffff8853a5a2e30)
rax=00006f54000014e9 rbx=ffff810462e8f220 rcx=ffff810462e8f228
rdx=fffffffffffffffc rsi=ffff81045f72c0e8 rdi=ffff810462e8f000
rip=fffff80359336717 rsp=fffff8853a5a3828 rbp=00000000000003fc
r8=0000000000000004 r9=0000000000000000 r10=00000000000007b0
r11=ffff810462e8f224 r12=ffff81045f72c0d0 r13=ffff81045f72c050
r14=ffff81045f72c0d0 r15=fffff8853a5a38c8
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202
rdyboost!memcpy+0x1d7:
fffff803`59336717 660f1f840000000000 nop word ptr [rax+rax]
Resetting default scope

CPU_COUNT: 4

CPU_MHZ: dac

CPU_VENDOR: AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 11

CPU_STEPPING: 0

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System

CURRENT_IRQL: 0

BUGCHECK_STR: 0x154_c0000005

READ_ADDRESS: GetUlongFromAddress: unable to read from fffff8034fb72540
fffff8034fbed390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
00000000000003fc

DEFAULT_BUCKET_ID: NULL_CLASS_PTR_DEREFERENCE

ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

EXCEPTION_CODE_STR: c0000005

ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5

ANALYSIS_SESSION_TIME: 05-13-2019 21:13:23.0363

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

LAST_CONTROL_TRANSFER: from fffff80359330477 to fffff80359336717

STACK_TEXT:
fffff885`3a5a3828 fffff803`59330477 : ffff8104`62f705a0 ffff3304`1e0ec82a ffff8104`62f784c8 ffff8104`5f72c068 : rdyboost!memcpy+0x1d7
fffff885`3a5a3830 fffff803`5932fc99 : fffff885`3a5a38b0 00000000`00000003 ffff8104`5f72c0d0 00000000`00000008 : rdyboost!B_TREE<unsigned long,ST_STORE<SMD_TRAITS>::_ST_HASH_ENTRY,4096,NP_CONTEXT,ST_STORE<SMD_TRAITS>::ST_HASH_ENTRY_COMPARATOR>::BTreeInsertEx+0xa7
fffff885`3a5a3870 fffff803`5932f1f9 : 00000000`00000000 ffff8104`5f72d678 ffff8104`5f72c050 00000000`00000000 : rdyboost!ST_STORE<SMD_TRAITS>::StDmpSinglePageInsert+0x819
fffff885`3a5a39b0 fffff803`5932ece5 : 00000000`00000002 fffff885`3a5a3b19 fffff885`3a5a3be8 00000000`00000001 : rdyboost!ST_STORE<SMD_TRAITS>::StDmpSinglePageAdd+0x409
fffff885`3a5a3aa0 fffff803`59330b19 : fffff803`59320000 fffff803`00000001 ffff8104`5f72d678 ffff8104`5f72c000 : rdyboost!ST_STORE<SMD_TRAITS>::StDmPageAdd+0xb5
fffff885`3a5a3b10 fffff803`5932e95b : 00000000`00000000 ffff8104`628792d0 00000000`00000080 00000000`00000000 : rdyboost!ST_STORE<SMD_TRAITS>::StWorkItemProcess+0x109
fffff885`3a5a3b60 fffff803`5932b5b1 : 00000000`00000000 00000000`00000000 ffff9501`42509100 00000000`000000af : rdyboost!SMKM_STORE<SMD_TRAITS>::SmStWorker+0x15b
fffff885`3a5a3be0 fffff803`4f6e8a45 : ffff8104`5f72c000 fffff803`5932b5a0 fffff885`3a205e88 00000065`b4bbbdff : rdyboost!SMKM_STORE<SMD_TRAITS>::SmStWorkerThread+0x11
fffff885`3a5a3c10 fffff803`4f865b8c : ffff9501`424f9180 ffff8104`5f783080 fffff803`4f6e89f0 00000000`00000000 : nt!PspSystemThreadStartup+0x55
fffff885`3a5a3c60 00000000`00000000 : fffff885`3a5a4000 fffff885`3a59e000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x1c


THREAD_SHA1_HASH_MOD_FUNC: 9aaaefe5513f84f4baf7e7df8722a43e1234c451

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 6461d90be529798498dabe3c38fd072d9f496589

THREAD_SHA1_HASH_MOD: 9d8913c95774442095c7708befcf3b8c7a1b5e18

FAULT_INSTR_CODE: 841f0f66

SYMBOL_STACK_INDEX: 0

SYMBOL_NAME: rdyboost!memcpy+1d7

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: rdyboost

IMAGE_NAME:  rdyboost.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 5b832bf2

IMAGE_VERSION: 10.0.17763.194

STACK_COMMAND: .cxr 0xfffff8853a5a2e30 ; kb

BUCKET_ID_FUNC_OFFSET: 1d7

FAILURE_BUCKET_ID: 0x154_c0000005_rdyboost!memcpy

BUCKET_ID: 0x154_c0000005_rdyboost!memcpy

PRIMARY_PROBLEM_CLASS: 0x154_c0000005_rdyboost!memcpy

TARGET_TIME: 2019-04-23T08:26:41.000Z

OSBUILD: 17763

OSSERVICEPACK: 437

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2005-12-02 10:58:59

BUILDDATESTAMP_STR: 180914-1434

BUILDLAB_STR: rs5_release

BUILDOSVER_STR: 10.0.17763.1.amd64fre.rs5_release.180914-1434

ANALYSIS_SESSION_ELAPSED_TIME: 28fd

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:0x154_c0000005_rdyboost!memcpy

FAILURE_ID_HASH: {66fa6f97-be60-303c-afcc-20244d1340bc}

Followup: MachineOwner
---------


UNEXPECTED_STORE_EXCEPTION (154)
The store component caught an unexpected exception.
Arguments:
Arg1: ffff9809ba737000, Pointer to the store context or data manager
Arg2: ffffb90d403a9650, Exception information
Arg3: 0000000000000001, Reserved
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 5

Key : Analysis.Elapsed.Sec
Value: 14

Key : Analysis.Memory.CommitPeak.Mb
Value: 67


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 17763.1.amd64fre.rs5_release.180914-1434

DUMP_TYPE: 2

BUGCHECK_P1: ffff9809ba737000

BUGCHECK_P2: ffffb90d403a9650

BUGCHECK_P3: 1

BUGCHECK_P4: 0

EXCEPTION_RECORD:  ffffb90d403aa5f8 -- (.exr 0xffffb90d403aa5f8)
ExceptionAddress: fffff80fd7213cb9 (rdyboost!ST_STORE<SMD_TRAITS>::StDmCombineBufferAddEntry+0x00000000000004d9)
   ExceptionCode: 80000003 (Break instruction exception)
ExceptionFlags: 00000000
NumberParameters: 1
Parameter[0]: 0000000000000000

EXCEPTION_CODE: (HRESULT) 0x80000003 (2147483651) - Bir veya daha fazla ba ms z de i ken ge ersiz

FAULTING_IP:
rdyboost!ST_STORE<SMD_TRAITS>::StDmCombineBufferAddEntry+4d9
fffff80f`d7213cb9 ffc7 inc edi

FOLLOWUP_IP:
rdyboost!ST_STORE<SMD_TRAITS>::StDmCombineBufferAddEntry+4d9
fffff80f`d7213cb9 ffc7 inc edi

EXCEPTION_PARAMETER1: 0000000000000000

EXCEPTION_PARAMETER2: ffff9809babbe378

BUGCHECK_STR: 0x154_80000003

CONTEXT:  ffffb90d403a9e40 -- (.cxr 0xffffb90d403a9e40)
rax=0000000000000018 rbx=ffff9809baca3170 rcx=ffff9809ba7b4160
rdx=000000000000001f rsi=ffff9809baca3000 rdi=0000000000000001
rip=fffff80fd7213cb9 rsp=ffffb90d403aa830 rbp=ffffb90d403aa860
r8=000000000000001e r9=ffff9809ba985c98 r10=ffff9809babbe378
r11=0000000000000001 r12=ffff9809ba7f5008 r13=ffff9809ba737050
r14=0000000000000000 r15=ffff9809ba7f6000
iopl=0 nv up ei ng nz na pe cy
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00000283
rdyboost!ST_STORE<SMD_TRAITS>::StDmCombineBufferAddEntry+0x4d9:
fffff80f`d7213cb9 ffc7 inc edi
Resetting default scope

CPU_COUNT: 4

CPU_MHZ: dac

CPU_VENDOR: AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 11

CPU_STEPPING: 0

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT

PROCESS_NAME: System

CURRENT_IRQL: 0

ERROR_CODE: (NTSTATUS) 0x80000003 - <Unable to get error code text>

EXCEPTION_CODE_STR: 80000003

ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5

ANALYSIS_SESSION_TIME: 05-13-2019 21:13:18.0492

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

LAST_CONTROL_TRANSFER: from fffff80fd7213716 to fffff80fd7213cb9

STACK_TEXT:
ffffb90d`403aa830 fffff80f`d7213716 : ffff9809`babbe378 ffff9809`ba737050 00000000`00000000 ffff0cc4`10af8a2a : rdyboost!ST_STORE<SMD_TRAITS>::StDmCombineBufferAddEntry+0x4d9
ffffb90d`403aa950 fffff80f`d720f369 : ffff9809`ba7f5000 00000000`00000000 00000000`00000000 00000000`00000000 : rdyboost!ST_STORE<SMD_TRAITS>::StDmCombineRegion+0x176
ffffb90d`403aa9b0 fffff80f`d720ece5 : 00000000`00000002 ffffb90d`403aab19 ffffb90d`403aabe8 00000000`00000001 : rdyboost!ST_STORE<SMD_TRAITS>::StDmpSinglePageAdd+0x579
ffffb90d`403aaaa0 fffff80f`d7210b19 : fffff80f`d7200000 fffff80f`00000001 ffff9809`ba738678 ffff9809`ba737000 : rdyboost!ST_STORE<SMD_TRAITS>::StDmPageAdd+0xb5
ffffb90d`403aab10 fffff80f`d720e95b : 00000000`00000000 ffff9809`bab110d0 00000000`00000080 00000000`00000000 : rdyboost!ST_STORE<SMD_TRAITS>::StWorkItemProcess+0x109
ffffb90d`403aab60 fffff80f`d720b5b1 : 00000000`00000000 00000000`00000000 ffffd180`42110100 00000000`00000069 : rdyboost!SMKM_STORE<SMD_TRAITS>::SmStWorker+0x15b
ffffb90d`403aabe0 fffff802`0b047a45 : ffff9809`ba737000 fffff80f`d720b5a0 ffffb90d`40005e88 00000065`b4bbbdff : rdyboost!SMKM_STORE<SMD_TRAITS>::SmStWorkerThread+0x11
ffffb90d`403aac10 fffff802`0b1c4b8c : ffffd180`42100180 ffff9809`ba736080 fffff802`0b0479f0 246c8b48`30245c8b : nt!PspSystemThreadStartup+0x55
ffffb90d`403aac60 00000000`00000000 : ffffb90d`403ab000 ffffb90d`403a5000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x1c


THREAD_SHA1_HASH_MOD_FUNC: 66b4a856bc61d5f8eb1c085e453b45bfc842db93

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 4b7683a8cfad4c7163a9d4849ed9c07636c5c8b8

THREAD_SHA1_HASH_MOD: d6e4149156b03939aec8566a54ca49015d8b4767

FAULT_INSTR_CODE: d233c7ff

SYMBOL_STACK_INDEX: 0

SYMBOL_NAME: rdyboost!ST_STORE<SMD_TRAITS>::StDmCombineBufferAddEntry+4d9

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: rdyboost

IMAGE_NAME:  rdyboost.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 5b832bf2

IMAGE_VERSION: 10.0.17763.194

STACK_COMMAND: .cxr 0xffffb90d403a9e40 ; kb

BUCKET_ID_FUNC_OFFSET: 4d9

FAILURE_BUCKET_ID: 0x154_80000003_rdyboost!ST_STORE_SMD_TRAITS_::StDmCombineBufferAddEntry

BUCKET_ID: 0x154_80000003_rdyboost!ST_STORE_SMD_TRAITS_::StDmCombineBufferAddEntry

PRIMARY_PROBLEM_CLASS: 0x154_80000003_rdyboost!ST_STORE_SMD_TRAITS_::StDmCombineBufferAddEntry

TARGET_TIME: 2019-04-21T13:12:08.000Z

OSBUILD: 17763

OSSERVICEPACK: 437

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2005-12-02 10:58:59

BUILDDATESTAMP_STR: 180914-1434

BUILDLAB_STR: rs5_release

BUILDOSVER_STR: 10.0.17763.1.amd64fre.rs5_release.180914-1434

ANALYSIS_SESSION_ELAPSED_TIME: 3a1d

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:0x154_80000003_rdyboost!st_store_smd_traits_::stdmcombinebufferaddentry

FAILURE_ID_HASH: {e84beca9-9068-49cd-ccdf-554f1a87ac53}

Followup: MachineOwner
---------


SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc000001d, The exception code that was not handled
Arg2: fffff802626f552b, The address that the exception occurred at
Arg3: ffffc1020f8f2028, Exception Record Address
Arg4: ffffc1020f8f1870, Context Record Address

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 5

Key : Analysis.Elapsed.Sec
Value: 21

Key : Analysis.Memory.CommitPeak.Mb
Value: 69


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 17134.1.amd64fre.rs4_release.180410-1804

SYSTEM_MANUFACTURER: Micro-Star International Co., Ltd

SYSTEM_PRODUCT_NAME: MS-7B38

SYSTEM_SKU: To be filled by O.E.M.

SYSTEM_VERSION: 1.0

BIOS_VENDOR: American Megatrends Inc.

BIOS_VERSION: 2.D0

BIOS_DATE: 12/21/2018

BASEBOARD_MANUFACTURER: Micro-Star International Co., Ltd

BASEBOARD_PRODUCT: B350M PRO-VD PLUS (MS-7B38)

BASEBOARD_VERSION: 1.0

DUMP_TYPE: 2

BUGCHECK_P1: ffffffffc000001d

BUGCHECK_P2: fffff802626f552b

BUGCHECK_P3: ffffc1020f8f2028

BUGCHECK_P4: ffffc1020f8f1870

EXCEPTION_CODE: (NTSTATUS) 0xc000001d - <Unable to get error code text>

FAULTING_IP:
FLTMGR!FltpPassThrough+2bb
fffff802`626f552b 488b542468 mov rdx,qword ptr [rsp+68h]

EXCEPTION_RECORD:  ffffc1020f8f2028 -- (.exr 0xffffc1020f8f2028)
ExceptionAddress: fffff802626f552b (FLTMGR!FltpPassThrough+0x00000000000002bb)
   ExceptionCode: c000001d (Illegal instruction)
ExceptionFlags: 00000000
NumberParameters: 0

CONTEXT:  ffffc1020f8f1870 -- (.cxr 0xffffc1020f8f1870)
rax=ffffda0ed770f7e0 rbx=ffffc1020f8f22e0 rcx=0000000000000000
rdx=ffffda0ed75fe500 rsi=0000000000000002 rdi=ffffda0ee198cd60
rip=fffff802626f552b rsp=ffffc1020f8f2260 rbp=ffffda0ed75fe500
r8=ffffc1020f8f22e0 r9=0000000000000002 r10=7ffffffffffffffc
r11=0000000000000000 r12=ffffda0ed5af4040 r13=0000000000000001
r14=ffffda0ee16f83f8 r15=ffffda0ed76bc920
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246
FLTMGR!FltpPassThrough+0x2bb:
fffff802`626f552b 488b542468 mov rdx,qword ptr [rsp+68h] ss:0018:ffffc102`0f8f22c8=ffffda0ee14b2f98
Resetting default scope

CPU_COUNT: 4

CPU_MHZ: dac

CPU_VENDOR: AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 11

CPU_STEPPING: 0

BLACKBOXBSD: 1 (!blackboxbsd)


CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT

BUGCHECK_STR: AV

PROCESS_NAME: ShellExperienceHost.exe

CURRENT_IRQL: 0

ERROR_CODE: (NTSTATUS) 0xc000001d - <Unable to get error code text>

EXCEPTION_CODE_STR: c000001d

ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5

ANALYSIS_SESSION_TIME: 05-13-2019 21:00:13.0598

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

LAST_CONTROL_TRANSFER: from fffff802626f51ae to fffff802626f552b

FAILED_INSTRUCTION_ADDRESS:
FLTMGR!FltpPassThrough+2bb
fffff802`626f552b 488b542468 mov rdx,qword ptr [rsp+68h]

STACK_TEXT:
ffffc102`0f8f2260 fffff802`626f51ae : ffffda0e`d76bc920 ffffda0e`e14b2f98 00000000`00000001 ffffda0e`d5af4040 : FLTMGR!FltpPassThrough+0x2bb
ffffc102`0f8f22c0 fffff802`956a4e69 : ffffda0e`e198cd60 fffff802`9564c6fc 00000000`00000000 00000000`00000000 : FLTMGR!FltpDispatch+0x9e
ffffc102`0f8f2320 fffff802`95ad3574 : ffffda0e`e198cd60 ffffda0e`d76a0bb0 ffffda0e`e198cd01 ffffda0e`e16f8010 : nt!IofCallDriver+0x59
ffffc102`0f8f2360 fffff802`95b0ac00 : 00000000`00000001 00000000`00000000 ffffda0e`d5b981b0 00000000`00000001 : nt!IopDeleteFile+0x124
ffffc102`0f8f23e0 fffff802`956a1086 : 00000000`00000000 00000000`00000000 00000000`00000001 ffffda0e`e198cd60 : nt!ObpRemoveObjectRoutine+0x80
ffffc102`0f8f2440 fffff802`95b005d9 : 00000000`ffff8003 ffffda0e`d5b981b0 ffffc40f`00000002 00000000`00007ffd : nt!ObfDereferenceObjectWithTag+0xc6
ffffc102`0f8f2480 fffff802`95b07f1d : ffffda0e`e16f8010 00000000`20206f49 ffffda0e`d76bc920 00000000`00000000 : nt!ObCloseHandleTableEntry+0x259
ffffc102`0f8f25c0 fffff802`957c6743 : ffffda0e`d770f7e0 ffffda0e`e16f8010 ffffda0e`d5b82040 ffffc102`0f8f26a0 : nt!NtClose+0xcd
ffffc102`0f8f2620 fffff802`957b9aa0 : fffff802`62724aba 00000000`00000000 00000006`00000004 ffffda0e`e196c700 : nt!KiSystemServiceCopyEnd+0x13
ffffc102`0f8f27b8 fffff802`62724aba : 00000000`00000000 00000006`00000004 ffffda0e`e196c700 00000000`00000000 : nt!KiServiceLinkage
ffffc102`0f8f27c0 fffff802`6309dd65 : ffffc102`0f8f2850 ffffc40f`0ad0ccc0 00100001`00000000 00000000`00000000 : FLTMGR!FltClose+0xa
ffffc102`0f8f27f0 fffff802`95b2359b : ffffc102`0f8f28d9 ffffda0e`e196c7d0 ffffc40f`0f248000 ffffda0e`e196c7d0 : fileinfo!FIPfInterfaceClose+0x45
ffffc102`0f8f2830 fffff802`95b22066 : 00000000`c0000011 00000000`00000000 00000000`00000000 00000000`00000000 : nt!PfpOpenHandleClose+0x6f
ffffc102`0f8f2880 fffff802`95b21eaf : 00000000`00000001 ffffc102`0f8f2a90 ffffc40f`0f277d50 00000000`00000000 : nt!PfpPrefetchEntireDirectory+0x146
ffffc102`0f8f2930 fffff802`95b1a693 : ffffc40f`00000000 00000000`00000003 00000000`00000000 ffffffff`80003030 : nt!PfSnPrefetchMetadata+0x25f
ffffc102`0f8f2a20 fffff802`95b1a48a : 00000000`00000001 00000000`00000002 ffffda0e`00000001 00000000`000000e6 : nt!PfSnAsyncPrefetchStep+0x23
ffffc102`0f8f2a60 fffff802`956c1b05 : 00000000`00000400 ffffda0e`d5b82040 ffffda0e`d5abf830 ffffda0e`e18fc880 : nt!PfSnAsyncPrefetchWorker+0x1ba
ffffc102`0f8f2b80 fffff802`9573c2d7 : ffffda0e`d5b82040 00000000`00000080 ffffda0e`d5af4040 ffffda0e`d5b82040 : nt!ExpWorkerThread+0xf5
ffffc102`0f8f2c10 fffff802`957bd516 : ffffad80`c7fc0180 ffffda0e`d5b82040 fffff802`9573c290 00000000`00000000 : nt!PspSystemThreadStartup+0x47
ffffc102`0f8f2c60 00000000`00000000 : ffffc102`0f8f3000 ffffc102`0f8ed000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16


THREAD_SHA1_HASH_MOD_FUNC: ba5c85077760b161a4e58ec0d4f50dcfd9fac657

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 1a7208a344661de95bf943db459139e4a50be4d6

THREAD_SHA1_HASH_MOD: e0b6ddfa786df9e15c012749a1810b955d878979

FOLLOWUP_IP:
fileinfo!FIPfInterfaceClose+45
fffff802`6309dd65 85ff test edi,edi

FAULT_INSTR_CODE: 3274ff85

SYMBOL_STACK_INDEX: b

SYMBOL_NAME: fileinfo!FIPfInterfaceClose+45

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: fileinfo

IMAGE_NAME:  fileinfo.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 0

IMAGE_VERSION: 10.0.17134.471

STACK_COMMAND: .cxr 0xffffc1020f8f1870 ; kb

BUCKET_ID_FUNC_OFFSET: 45

FAILURE_BUCKET_ID: AV_BAD_IP_fileinfo!FIPfInterfaceClose

BUCKET_ID: AV_BAD_IP_fileinfo!FIPfInterfaceClose

PRIMARY_PROBLEM_CLASS: AV_BAD_IP_fileinfo!FIPfInterfaceClose

TARGET_TIME: 2019-01-25T20:59:49.000Z

OSBUILD: 17134

OSSERVICEPACK: 523

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2019-01-01 09:44:13

BUILDDATESTAMP_STR: 180410-1804

BUILDLAB_STR: rs4_release

BUILDOSVER_STR: 10.0.17134.1.amd64fre.rs4_release.180410-1804

ANALYSIS_SESSION_ELAPSED_TIME: 521c

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:av_bad_ip_fileinfo!fipfinterfaceclose

FAILURE_ID_HASH: {4ff85cce-6378-901e-34ac-6731f4dde056}

Followup: MachineOwner
---------


SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c000001d, Exception code that caused the bugcheck
Arg2: fffff8015e6f714d, Address of the instruction which caused the bugcheck
Arg3: ffffab8819e4bd20, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 5

Key : Analysis.Elapsed.Sec
Value: 18

Key : Analysis.Memory.CommitPeak.Mb
Value: 67


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 17134.1.amd64fre.rs4_release.180410-1804

DUMP_TYPE: 2

BUGCHECK_P1: c000001d

BUGCHECK_P2: fffff8015e6f714d

BUGCHECK_P3: ffffab8819e4bd20

BUGCHECK_P4: 0

EXCEPTION_CODE: (NTSTATUS) 0xc000001d - <Unable to get error code text>

FAULTING_IP:
nt!ExDeferredFreePool+11d
fffff801`5e6f714d 410fb708 movzx ecx,word ptr [r8]

CONTEXT:  ffffab8819e4bd20 -- (.cxr 0xffffab8819e4bd20)
rax=0000000000000c05 rbx=0000000000000000 rcx=ffffb10dca210f60
rdx=ffffb10dca210fc0 rsi=0000000000000000 rdi=fffff8015e7f08c0
rip=fffff8015e6f714d rsp=ffffab8819e4c710 rbp=000000000000000c
r8=ffffb10dca210f10 r9=0000000000000005 r10=0000000000000c05
r11=0000000000000000 r12=fffff8015e7f08c8 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202
nt!ExDeferredFreePool+0x11d:
fffff801`5e6f714d 410fb708 movzx ecx,word ptr [r8] ds:002b:ffffb10d`ca210f10=0005
Resetting default scope

BUGCHECK_STR: 0x3B_c000001d

CPU_COUNT: 4

CPU_MHZ: dac

CPU_VENDOR: AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 11

CPU_STEPPING: 0

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT

PROCESS_NAME: Spotify.exe

CURRENT_IRQL: 2

ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5

ANALYSIS_SESSION_TIME: 05-13-2019 21:00:17.0241

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

LAST_CONTROL_TRANSFER: from fffff8015e6f8867 to fffff8015e6f714d

STACK_TEXT:
ffffab88`19e4c710 fffff801`5e6f8867 : ffffb10d`00000000 ffffb10d`d31dcf10 ffffb10d`ddf8b9d0 43cc6932`d7000000 : nt!ExDeferredFreePool+0x11d
ffffab88`19e4c7a0 fffff801`5e8ca706 : ffffb10d`d31dcf20 00000000`0a1ef378 ffffab88`00000205 ffffab88`20706349 : nt!ExFreePoolWithTag+0x807
ffffab88`19e4c880 fffff801`5e44663c : 00000000`00000000 fffff801`5d586101 ffffb10d`d19d1900 00000000`00000000 : nt!IopFreeMiniCompletionPacket+0xa6
ffffab88`19e4c8b0 fffff801`5e8ca372 : 00000000`00000000 00000000`00000001 00000000`00000002 00000000`00000000 : nt!IoRemoveIoCompletion+0x11c
ffffab88`19e4c9d0 fffff801`5e5c7743 : ffffb10d`cfd0d080 00000000`0a1ef348 ffffab88`19e4caa8 ffffb10d`d19d18c0 : nt!NtRemoveIoCompletion+0x122
ffffab88`19e4ca90 00000000`77491e4c : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0a1ef328 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77491e4c


THREAD_SHA1_HASH_MOD_FUNC: a49b4dc536155b45a0f6ca8f3579696f0a1ee001

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 317094b7476d16ff3a917f4eda51b1c98741c750

THREAD_SHA1_HASH_MOD: ee8fcf1fb60cb6e3e2f60ddbed2ec02b5748a693

FOLLOWUP_IP:
nt!ExDeferredFreePool+11d
fffff801`5e6f714d 410fb708 movzx ecx,word ptr [r8]

FAULT_INSTR_CODE: 8b70f41

SYMBOL_STACK_INDEX: 0

SYMBOL_NAME: nt!ExDeferredFreePool+11d

FOLLOWUP_NAME: Pool_corruption

IMAGE_NAME: Pool_Corruption

DEBUG_FLR_IMAGE_TIMESTAMP: 0

IMAGE_VERSION: 10.0.17134.523

MODULE_NAME: Pool_Corruption

STACK_COMMAND:  .cxr 0xffffab8819e4bd20 ; kb

BUCKET_ID_FUNC_OFFSET: 11d

FAILURE_BUCKET_ID: 0x3B_c000001d_nt!ExDeferredFreePool

BUCKET_ID: 0x3B_c000001d_nt!ExDeferredFreePool

PRIMARY_PROBLEM_CLASS: 0x3B_c000001d_nt!ExDeferredFreePool

TARGET_TIME: 2019-01-26T10:40:43.000Z

OSBUILD: 17134

OSSERVICEPACK: 523

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2019-01-01 09:44:13

BUILDDATESTAMP_STR: 180410-1804

BUILDLAB_STR: rs4_release

BUILDOSVER_STR: 10.0.17134.1.amd64fre.rs4_release.180410-1804

ANALYSIS_SESSION_ELAPSED_TIME: 46f4

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:0x3b_c000001d_nt!exdeferredfreepool

FAILURE_ID_HASH: {5da87df6-391d-0bd6-23e6-3b0b9c0dfc93}

Followup: Pool_corruption
---------

0: kd> lmvm Pool_Corruption
start end module name

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff8039e6a8000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8039c460c18, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 5

Key : Analysis.Elapsed.Sec
Value: 19

Key : Analysis.Memory.CommitPeak.Mb
Value: 73


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 17134.1.amd64fre.rs4_release.180410-1804

SYSTEM_MANUFACTURER: Micro-Star International Co., Ltd

SYSTEM_PRODUCT_NAME: MS-7B38

SYSTEM_SKU: To be filled by O.E.M.

SYSTEM_VERSION: 1.0

BIOS_VENDOR: American Megatrends Inc.

BIOS_VERSION: 2.D0

BIOS_DATE: 12/21/2018

BASEBOARD_MANUFACTURER: Micro-Star International Co., Ltd

BASEBOARD_PRODUCT: B350M PRO-VD PLUS (MS-7B38)

BASEBOARD_VERSION: 1.0

DUMP_TYPE: 2

BUGCHECK_P1: fffff8039e6a8000

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8039c460c18

READ_ADDRESS: fffff8039c6f2388: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8039e6a8000

CURRENT_IRQL: 2

FAULTING_IP:
nt!memcpy+158
fffff803`9c460c18 f30f6f4411e0 movdqu xmm0,xmmword ptr [rcx+rdx-20h]

CPU_COUNT: 4

CPU_MHZ: dac

CPU_VENDOR: AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 11

CPU_STEPPING: 0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXPNP: 1 (!blackboxpnp)


CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT

BUGCHECK_STR: AV

PROCESS_NAME: csgo.exe

ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5

ANALYSIS_SESSION_TIME: 05-13-2019 21:00:20.0605

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

DPC_STACK_BASE: FFFFF8039E6A7FB0

TRAP_FRAME:  fffff8039e6a5d50 -- (.trap 0xfffff8039e6a5d50)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000002 rbx=0000000000000000 rcx=ffffbe01ef6c78b0
rdx=00003a01aefe076c rsi=0000000000000000 rdi=0000000000000000
rip=fffff8039c460c18 rsp=fffff8039e6a5ee8 rbp=fffff8039e6a5f40
r8=ffffffffffffe7f8 r9=07ffffffffffffff r10=0000000000000000
r11=ffffbe01ef6c5ee4 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
nt!memcpy+0x158:
fffff803`9c460c18 f30f6f4411e0 movdqu xmm0,xmmword ptr [rcx+rdx-20h] ds:fffff803`9e6a7ffc=????????????????????????????????
Resetting default scope

LAST_CONTROL_TRANSFER: from fffff8039c45fc69 to fffff8039c44f0a0

STACK_TEXT:
fffff803`9e6a5c08 fffff803`9c45fc69 : 00000000`0000000a fffff803`9e6a8000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff803`9e6a5c10 fffff803`9c45c8e5 : ffffbe01`e23a97f0 00000000`00000000 00000000`00000000 ffffbe01`edaa1a70 : nt!KiBugCheckDispatch+0x69
fffff803`9e6a5d50 fffff803`9c460c18 : fffff803`9c2e012c 00000000`00000000 00000000`00000000 fffff803`9e6a6440 : nt!KiPageFault+0x425
fffff803`9e6a5ee8 fffff803`9c2e012c : 00000000`00000000 00000000`00000000 fffff803`9e6a6440 fffff803`9e6a6040 : nt!memcpy+0x158
fffff803`9e6a5ef0 fffff803`9c2dfa96 : ffffbe01`e23a97f0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!EtwpEventWriteFull+0x5cc
fffff803`9e6a6250 fffff803`9c2df8fc : fffff803`9e6a0081 00000000`00000000 fffff803`9e6a6380 00000000`00000000 : nt!EtwWriteEx+0x186
fffff803`9e6a6360 fffff80b`08f63e92 : ffffdd8a`6302bd5e 00000000`00000000 00000000`00000000 00000000`00000000 : nt!EtwWrite+0x2c
fffff803`9e6a63b0 fffff80b`08f69bda : 00000000`0000000c fffff803`9c2df8fc ffffbe01`e4daa802 00000000`00000000 : dxgmms2!McGenEventWriteKM+0x7a
fffff803`9e6a6400 fffff80b`08f67c41 : ffffbe01`eeae46e0 00000000`00000000 ffffbe01`eeae46e0 ffffbe01`eeade000 : dxgmms2!McTemplateK0pqqxpxqqqddddddddddddqqtq+0x24a
fffff803`9e6a65f0 fffff80b`08f6755d : fffff803`9e6a69d0 fffff803`9e6a6830 ffffbe01`ef44cc00 ffffbe01`ef44cc00 : dxgmms2!VidSchiLogMmIoFlipMultiPlaneOverlay3+0x33d
fffff803`9e6a6730 fffff80b`08f5ef15 : ffffbe01`eeae4000 fffff803`00000000 ffffbe01`00000000 ffffbe01`00000037 : dxgmms2!VidSchiExecuteMmIoFlipMultiPlaneOverlay3+0x159
fffff803`9e6a6880 fffff80b`08f4d85f : ffffbe01`ef5ec018 ffffbe01`00000000 fffff803`00000000 00000000`0000003c : dxgmms2!VidSchiExecuteMmIoFlip+0x11675
fffff803`9e6a7280 fffff80b`08f54290 : 00000000`00146000 fffff803`00000000 ffffbe01`ede1b650 ffffbe01`eeae4000 : dxgmms2!VidSchUnwaitFlipQueue+0x25f
fffff803`9e6a72f0 fffff80b`08f536e4 : ffffbe01`00000000 ffff9a08`00000000 00000000`0000003c ffffbe01`00000000 : dxgmms2!VidSchiSubmitIndependentFlip+0x540
fffff803`9e6a73d0 fffff80b`08f534bd : 00000000`00000000 00000003`00000000 ffffbe01`edcd46f0 ffffbe01`e943cd70 : dxgmms2!VidSchiProcessPresentHistoryToken+0x204
fffff803`9e6a7480 fffff80b`08f49f44 : ffffbe01`ef5cf000 00000000`00000001 ffffbe01`eec92c00 ffffbe01`0000000a : dxgmms2!VidSchiSubmitPresentHistoryToken+0x21d
fffff803`9e6a74e0 fffff80b`08f49069 : ffffbe01`ef5d1602 fffff803`00000001 00000000`00000000 ffffbe01`00000000 : dxgmms2!VidSchiProcessCompletedQueuePacketInternal+0x8b4
fffff803`9e6a7700 fffff80b`08f4f4a2 : ffffbe01`ef5d1602 ffffbe01`eea2e001 ffffbe01`eefab030 ffffbe01`00000000 : dxgmms2!VidSchiProcessDpcCompletedPacket+0x689
fffff803`9e6a78a0 fffff80b`07f31b82 : fffff803`9e6a7999 ffffbe01`eeae4000 ffffbe01`eefab660 00000000`00000000 : dxgmms2!VidSchDdiNotifyDpc+0x202
fffff803`9e6a7950 fffff803`a8d7a9c4 : ffffbe01`eefab030 00000000`00000000 ffffbe01`eefab030 ffffbe01`ef273000 : dxgkrnl!DxgNotifyDpcCB+0x72
fffff803`9e6a7a00 ffffbe01`eefab030 : 00000000`00000000 ffffbe01`eefab030 ffffbe01`ef273000 fffff803`a8d7a957 : nvlddmkm+0x12a9c4
fffff803`9e6a7a08 00000000`00000000 : ffffbe01`eefab030 ffffbe01`ef273000 fffff803`a8d7a957 ffffbe01`ef273000 : 0xffffbe01`eefab030


THREAD_SHA1_HASH_MOD_FUNC: 135d34845f6acf30a706bd3f3711482668073944

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: cd88ac0df77c184e22e120d3f117675f8ff45b56

THREAD_SHA1_HASH_MOD: 6eac223833fff8c64c38ed21cbfdfb57ae04841e

FOLLOWUP_IP:
dxgmms2!McGenEventWriteKM+7a
fffff80b`08f63e92 4883c440 add rsp,40h

FAULT_INSTR_CODE: 40c48348

SYMBOL_STACK_INDEX: 7

SYMBOL_NAME: dxgmms2!McGenEventWriteKM+7a

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: dxgmms2

IMAGE_NAME:  dxgmms2.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 602e95ff

IMAGE_VERSION: 10.0.17134.706

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 7a

FAILURE_BUCKET_ID: AV_dxgmms2!McGenEventWriteKM

BUCKET_ID: AV_dxgmms2!McGenEventWriteKM

PRIMARY_PROBLEM_CLASS: AV_dxgmms2!McGenEventWriteKM

TARGET_TIME: 2019-01-25T12:55:47.000Z

OSBUILD: 17134

OSSERVICEPACK: 523

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2019-01-01 09:44:13

BUILDDATESTAMP_STR: 180410-1804

BUILDLAB_STR: rs4_release

BUILDOSVER_STR: 10.0.17134.1.amd64fre.rs4_release.180410-1804

ANALYSIS_SESSION_ELAPSED_TIME: 4b8e

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:av_dxgmms2!mcgeneventwritekm

FAILURE_ID_HASH: {39613711-e134-014b-7ca6-8ab441279db5}

Followup: MachineOwner
---------


DRIVER_CORRUPTED_EXPOOL (c5)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is
caused by drivers that have corrupted the system pool. Run the driver
verifier against any new (or suspect) drivers, and if that doesn't turn up
the culprit, then use gflags to enable special pool.
Arguments:
Arg1: 0000000000000007, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff80386791175, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 2

Key : Analysis.Elapsed.Sec
Value: 2

Key : Analysis.Memory.CommitPeak.Mb
Value: 67


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 17134.1.amd64fre.rs4_release.180410-1804

DUMP_TYPE: 2

BUGCHECK_P1: 7

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff80386791175

BUGCHECK_STR: 0xC5_2

CURRENT_IRQL: 2

FAULTING_IP:
nt!ExDeferredFreePool+145
fffff803`86791175 41c6400300 mov byte ptr [r8+3],0

CPU_COUNT: 4

CPU_MHZ: dac

CPU_VENDOR: AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 11

CPU_STEPPING: 0

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT

PROCESS_NAME: chrome.exe

ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5

ANALYSIS_SESSION_TIME: 05-13-2019 21:06:17.0247

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

IRP_ADDRESS: ffffe50f60936838

TRAP_FRAME:  ffffb50f739e24c0 -- (.trap 0xffffb50f739e24c0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000050 rbx=0000000000000000 rcx=ffffe50f5e6c86c0
rdx=ffffe50f5fbcda60 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80386791175 rsp=ffffb50f739e2650 rbp=0000000000000007
r8=ffffe50f5e6c8710 r9=0000000000000005 r10=0000000000000c05
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!ExDeferredFreePool+0x145:
fffff803`86791175 41c6400300 mov byte ptr [r8+3],0 ds:ffffe50f`5e6c8713=0c
Resetting default scope

LAST_CONTROL_TRANSFER: from fffff80386644529 to fffff80386631650

STACK_TEXT:
ffffb50f`739e2378 fffff803`86644529 : 00000000`0000000a 00000000`00000007 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffb50f`739e2380 fffff803`866408c3 : 00000000`00000000 ffffe50f`5fbe0101 00000000`00000000 ffffe50f`551121b8 : nt!KiBugCheckDispatch+0x69
ffffb50f`739e24c0 fffff803`86791175 : ffffe50f`5c084080 ffff9000`dd7db180 ffff9000`dd7e9100 00000000`00000001 : nt!KiPageFault+0x4c3
ffffb50f`739e2650 fffff803`86792867 : fffff803`00000000 ffffe50f`5cc0d6d0 ffffe50f`55902010 ffffbd05`e6ba2bf0 : nt!ExDeferredFreePool+0x145
ffffb50f`739e26e0 fffff803`864ed27b : ffffe50f`609368a0 ffffe50f`5c0841c0 00000000`00000214 ffffe50f`5246704e : nt!ExFreePoolWithTag+0x807
ffffb50f`739e27c0 fffff803`864d09dc : ffffe50f`609368b0 fffff803`8657fe01 ffffe50f`5526b000 ffffe50f`00000000 : nt!IopCompleteRequest+0x8b
ffffb50f`739e28b0 fffff803`869649f2 : ffffb50f`739e2a28 00000000`00000001 000001ad`1ed85640 000001ad`1ed85640 : nt!IoRemoveIoCompletion+0x26c
ffffb50f`739e29d0 fffff803`86643f13 : ffffe50f`5c084080 00000052`9c1ff7f8 ffffb50f`739e2aa8 000001ad`21a08698 : nt!NtRemoveIoCompletion+0x122
ffffb50f`739e2a90 00007ff9`99efa0b4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000052`9c1ff7d8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`99efa0b4


THREAD_SHA1_HASH_MOD_FUNC: 2f5c18e183163d59498853a582bc52f7cbc61d17

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 14c9a7fa27e2b7712440155414c582fda4c86ca4

THREAD_SHA1_HASH_MOD: 9f457f347057f10e1df248e166a3e95e6570ecfe

FOLLOWUP_IP:
nt!ExDeferredFreePool+145
fffff803`86791175 41c6400300 mov byte ptr [r8+3],0

FAULT_INSTR_CODE: 340c641

SYMBOL_STACK_INDEX: 3

SYMBOL_NAME: nt!ExDeferredFreePool+145

FOLLOWUP_NAME: Pool_corruption

IMAGE_NAME: Pool_Corruption

DEBUG_FLR_IMAGE_TIMESTAMP: 0

IMAGE_VERSION: 10.0.17134.1

MODULE_NAME: Pool_Corruption

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 145

FAILURE_BUCKET_ID: 0xC5_2_nt!ExDeferredFreePool

BUCKET_ID: 0xC5_2_nt!ExDeferredFreePool

PRIMARY_PROBLEM_CLASS: 0xC5_2_nt!ExDeferredFreePool

TARGET_TIME: 2019-02-05T12:46:54.000Z

OSBUILD: 17134

OSSERVICEPACK: 1

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2018-04-11 07:04:54

BUILDDATESTAMP_STR: 180410-1804

BUILDLAB_STR: rs4_release

BUILDOSVER_STR: 10.0.17134.1.amd64fre.rs4_release.180410-1804

ANALYSIS_SESSION_ELAPSED_TIME: a71

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:0xc5_2_nt!exdeferredfreepool

FAILURE_ID_HASH: {0e971f5b-bd0d-a80e-a2c0-cd331176cf49}

Followup: Pool_corruption
---------


KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff801de1e5746, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 00000000fffd7163, Parameter 1 of the exception

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 8

Key : Analysis.Elapsed.Sec
Value: 13

Key : Analysis.Memory.CommitPeak.Mb
Value: 71


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 17134.1.amd64fre.rs4_release.180410-1804

DUMP_TYPE: 2

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff801de1e5746

BUGCHECK_P3: 0

BUGCHECK_P4: fffd7163

READ_ADDRESS: fffff80279701388: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
00000000fffd7163

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP:
Ntfs!ReadIndexBuffer+736
fffff801`de1e5746 488b08 mov rcx,qword ptr [rax]

EXCEPTION_PARAMETER2: 00000000fffd7163

BUGCHECK_STR: 0x1E_c0000005_R

CPU_COUNT: 4

CPU_MHZ: dac

CPU_VENDOR: AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 11

CPU_STEPPING: 0

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT

PROCESS_NAME: svchost.exe

CURRENT_IRQL: 0

ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5

ANALYSIS_SESSION_TIME: 05-13-2019 21:06:20.0367

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

LAST_CONTROL_TRANSFER: from fffff802792b4b5d to fffff8027943b650

STACK_TEXT:
ffff8004`e6f3c0a8 fffff802`792b4b5d : 00000000`0000001e ffffffff`c0000005 fffff801`de1e5746 00000000`00000000 : nt!KeBugCheckEx
ffff8004`e6f3c0b0 fffff802`7944e602 : ffffe782`96ad6278 ffffe782`96ad6398 ffff8004`e6f3c838 00000000`00000000 : nt!KiDispatchException+0x58d
ffff8004`e6f3c760 fffff802`7944a89d : 00000000`00000000 00000000`000000bc ffffe783`09692050 00000000`000000c8 : nt!KiExceptionDispatch+0xc2
ffff8004`e6f3c940 fffff801`de1e5746 : ffffd700`7e2042d0 00000000`00812000 00000000`00813000 ffffa30a`0002e000 : nt!KiPageFault+0x49d
ffff8004`e6f3cad0 fffff801`de1e49e8 : ffffd700`7f9e5018 ffffa30a`82825810 ffffd700`00000000 ffffa30a`00000004 : Ntfs!ReadIndexBuffer+0x736
ffff8004`e6f3cbb0 fffff801`de1e14b3 : ffffd700`7f9e5018 ffffe782`9b3f7e28 00000000`00000000 00000000`00000000 : Ntfs!FindFirstIndexEntry+0x168
ffff8004`e6f3cc70 fffff801`de1fff6c : ffffd700`7f9e5018 00000000`00000218 ffffd700`7f9e5018 ffff8004`e70bc160 : Ntfs!NtfsFindIndexEntry+0x63
ffff8004`e6f3ccf0 fffff801`de1fd06d : ffffd700`7f9e5018 ffffd700`81e792c0 ffff8004`e70bc160 ffffd700`7946b001 : Ntfs!NtfsCommonCreate+0x16fc
ffff8004`e6f3cf50 fffff802`7943f147 : ffff8004`e70bc110 fffa30a9`b6691600 00000000`0000003f 0000025d`fc471908 : Ntfs!NtfsCommonCreateCallout+0x1d
ffff8004`e6f3cf80 fffff802`7943f10d : 00000000`00006000 ffffd700`7946b080 00000000`00000004 fffff802`792b3cba : nt!KxSwitchKernelStackCallout+0x27
ffff8004`e70bbee0 fffff802`792b3cba : fffff802`00000012 00000000`00000012 ffff8004`00000000 00000000`00000000 : nt!KiSwitchKernelStackContinue
ffff8004`e70bbf00 fffff802`792b3afe : fffff801`de1fd050 00000000`00006000 00000000`00000000 ffff8d00`0272e5c0 : nt!KiExpandKernelStackAndCalloutOnStackSegment+0x12a
ffff8004`e70bbf80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExpandKernelStackAndCalloutSwitchStack+0x9e


THREAD_SHA1_HASH_MOD_FUNC: 276499348ba9a5c7cf24032d6bdafa37b4c28c75

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: c5bf88aa6b0d321329b18ef3c903f12eb9974b68

THREAD_SHA1_HASH_MOD: 98d7f81b6f4b6af3d1ee7e510adbfe5d2786829f

FOLLOWUP_IP:
Ntfs!ReadIndexBuffer+736
fffff801`de1e5746 488b08 mov rcx,qword ptr [rax]

FAULT_INSTR_CODE: f088b48

SYMBOL_STACK_INDEX: 4

SYMBOL_NAME: Ntfs!ReadIndexBuffer+736

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: Ntfs

IMAGE_NAME:  Ntfs.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 0

IMAGE_VERSION: 10.0.17134.12

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 736

FAILURE_BUCKET_ID: 0x1E_c0000005_R_Ntfs!ReadIndexBuffer

BUCKET_ID: 0x1E_c0000005_R_Ntfs!ReadIndexBuffer

PRIMARY_PROBLEM_CLASS: 0x1E_c0000005_R_Ntfs!ReadIndexBuffer

TARGET_TIME: 2019-02-05T11:53:37.000Z

OSBUILD: 17134

OSSERVICEPACK: 1

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2018-04-11 07:04:54

BUILDDATESTAMP_STR: 180410-1804

BUILDLAB_STR: rs4_release

BUILDOSVER_STR: 10.0.17134.1.amd64fre.rs4_release.180410-1804

ANALYSIS_SESSION_ELAPSED_TIME: 3396

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:0x1e_c0000005_r_ntfs!readindexbuffer

FAILURE_ID_HASH: {ea3afead-9685-f153-594a-9269685e3a53}

Followup: MachineOwner
---------


SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c000001d, Exception code that caused the bugcheck
Arg2: fffff808817266c2, Address of the instruction which caused the bugcheck
Arg3: ffff93099e6e3c90, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 8

Key : Analysis.Elapsed.Sec
Value: 21

Key : Analysis.Memory.CommitPeak.Mb
Value: 68


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 17134.1.amd64fre.rs4_release.180410-1804

DUMP_TYPE: 2

BUGCHECK_P1: c000001d

BUGCHECK_P2: fffff808817266c2

BUGCHECK_P3: ffff93099e6e3c90

BUGCHECK_P4: 0

EXCEPTION_CODE: (NTSTATUS) 0xc000001d - <Unable to get error code text>

FAULTING_IP:
FLTMGR!FltpPerformPreCallbacks+2a2
fffff808`817266c2 4883781800 cmp qword ptr [rax+18h],0

CONTEXT:  ffff93099e6e3c90 -- (.cxr 0xffff93099e6e3c90)
rax=ffffd588cdb7a010 rbx=ffffd588cf8d5678 rcx=0000000000000012
rdx=0000000000000000 rsi=ffffd588cf8d5470 rdi=ffffd588cdfe3da0
rip=fffff808817266c2 rsp=ffff93099e6e4680 rbp=ffff93099e6e4739
r8=ffffd588cf8d5558 r9=0000000000000000 r10=ffffd588cdcf07e0
r11=ffffd588cff12680 r12=0000000010000004 r13=ffffd588cdfe3b40
r14=ffffd588cc431be0 r15=ffffd588cf8d54f0
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246
FLTMGR!FltpPerformPreCallbacks+0x2a2:
fffff808`817266c2 4883781800 cmp qword ptr [rax+18h],0 ds:002b:ffffd588`cdb7a028=ffffd588cdb7a580
Resetting default scope

BUGCHECK_STR: 0x3B_c000001d

CPU_COUNT: 4

CPU_MHZ: dac

CPU_VENDOR: AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 11

CPU_STEPPING: 0

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT

PROCESS_NAME: lsass.exe

CURRENT_IRQL: 0

ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5

ANALYSIS_SESSION_TIME: 05-13-2019 21:06:23.0255

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

LAST_CONTROL_TRANSFER: from fffff8088172629c to fffff808817266c2

STACK_TEXT:
ffff9309`9e6e4680 fffff808`8172629c : ffff9309`9e6e4850 ffffd588`cfe9f000 ffffd588`ce5fe012 00000000`00000000 : FLTMGR!FltpPerformPreCallbacks+0x2a2
ffff9309`9e6e47a0 fffff808`817253b4 : ffffd588`ce5fe010 00000000`00000012 ffffd588`ce5fe010 ffff9309`9e6e4860 : FLTMGR!FltpPassThroughInternal+0x8c
ffff9309`9e6e47d0 fffff808`817251ae : ffffffff`fffe7960 00000000`00000000 ffffd588`cdc68df0 ffffd588`cfe9f080 : FLTMGR!FltpPassThrough+0x144
ffff9309`9e6e4830 fffff801`7da4adb9 : ffffd588`cc431be0 fffff801`7da48885 ffffd588`cc431be0 00000000`00000003 : FLTMGR!FltpDispatch+0x9e
ffff9309`9e6e4890 fffff801`7deed83e : ffffd588`cc431be0 00000000`00000000 00000000`00000000 fffff801`7da4adb9 : nt!IofCallDriver+0x59
ffff9309`9e6e48d0 fffff801`7ded7012 : ffffd588`cc431bb0 00000000`00000001 ffffbe0e`00000000 00000000`00007ffd : nt!IopCloseFile+0x15e
ffff9309`9e6e4960 fffff801`7dede99d : 00000087`464fcdc8 00000087`464fceb0 00000087`464fdb88 000001c4`af8a90a0 : nt!ObCloseHandleTableEntry+0x212
ffff9309`9e6e4aa0 fffff801`7dbabf13 : ffffd588`cff12680 00000087`464fd580 ffffd588`cff12680 ffff9309`9e6e4b80 : nt!NtClose+0xcd
ffff9309`9e6e4b00 00007ffa`fc9ba174 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000087`464fdb98 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`fc9ba174


THREAD_SHA1_HASH_MOD_FUNC: 184aac3491b79645fedaceac815b8f4445ad214d

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 3084fad265a3b2c3d6518ac266c84bead61c7be4

THREAD_SHA1_HASH_MOD: f066cc0951696e52f39f0939c6129f24d66b1281

FOLLOWUP_IP:
FLTMGR!FltpPerformPreCallbacks+2a2
fffff808`817266c2 4883781800 cmp qword ptr [rax+18h],0

FAULT_INSTR_CODE: 18788348

SYMBOL_STACK_INDEX: 0

SYMBOL_NAME: FLTMGR!FltpPerformPreCallbacks+2a2

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: FLTMGR

IMAGE_NAME:  FLTMGR.SYS

DEBUG_FLR_IMAGE_TIMESTAMP: 0

IMAGE_VERSION: 10.0.17134.12

STACK_COMMAND: .cxr 0xffff93099e6e3c90 ; kb

BUCKET_ID_FUNC_OFFSET: 2a2

FAILURE_BUCKET_ID: 0x3B_c000001d_FLTMGR!FltpPerformPreCallbacks

BUCKET_ID: 0x3B_c000001d_FLTMGR!FltpPerformPreCallbacks

PRIMARY_PROBLEM_CLASS: 0x3B_c000001d_FLTMGR!FltpPerformPreCallbacks

TARGET_TIME: 2019-02-04T22:18:21.000Z

OSBUILD: 17134

OSSERVICEPACK: 1

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2018-04-11 07:04:54

BUILDDATESTAMP_STR: 180410-1804

BUILDLAB_STR: rs4_release

BUILDOSVER_STR: 10.0.17134.1.amd64fre.rs4_release.180410-1804

ANALYSIS_SESSION_ELAPSED_TIME: 542c

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:0x3b_c000001d_fltmgr!fltpperformprecallbacks

FAILURE_ID_HASH: {08568c9f-cf3d-6b13-0b09-4286dde42cc5}

Followup: MachineOwner
---------


IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 000000000000025b, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8012e2f4f85, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 2

Key : Analysis.Elapsed.Sec
Value: 5

Key : Analysis.Memory.CommitPeak.Mb
Value: 67


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 17134.1.amd64fre.rs4_release.180410-1804

DUMP_TYPE: 2

BUGCHECK_P1: 25b

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8012e2f4f85

READ_ADDRESS: fffff8012e6fb388: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
000000000000025b

CURRENT_IRQL: 2

FAULTING_IP:
nt!KiChooseTargetProcessor+4f5
fffff801`2e2f4f85 8d157590faff lea edx,[nt!IoStartNextPacket <PERF> (nt+0x0) (fffff801`2e29e000)]

CPU_COUNT: 4

CPU_MHZ: dac

CPU_VENDOR: AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 11

CPU_STEPPING: 0

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT

BUGCHECK_STR: AV

PROCESS_NAME: chrome.exe

ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5

ANALYSIS_SESSION_TIME: 05-13-2019 21:06:25.0826

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

IRP_ADDRESS: ffffcd86ffffff89

DEVICE_OBJECT: ffffcd8700000000

TRAP_FRAME:  fffff18ab6b00340 -- (.trap 0xfffff18ab6b00340)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000010 rbx=0000000000000000 rcx=0000000000000016
rdx=000000000000000a rsi=0000000000000000 rdi=0000000000000000
rip=fffff8012e2f4f85 rsp=fffff18ab6b004d0 rbp=fffff18ab6b005a1
r8=0000000000000004 r9=00000000ffffffff r10=0000000000000000
r11=fffff18ab6b00560 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!KiChooseTargetProcessor+0x4f5:
fffff801`2e2f4f85 8d157590faff lea edx,[nt!IoStartNextPacket <PERF> (nt+0x0) (fffff801`2e29e000)]
Resetting default scope

MISALIGNED_IP:
nt!KiChooseTargetProcessor+4f5
fffff801`2e2f4f85 8d157590faff lea edx,[nt!IoStartNextPacket <PERF> (nt+0x0) (fffff801`2e29e000)]

LAST_CONTROL_TRANSFER: from fffff8012e448529 to fffff8012e435650

STACK_TEXT:
fffff18a`b6b001f8 fffff801`2e448529 : 00000000`0000000a 00000000`0000025b 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff18a`b6b00200 fffff801`2e4448c3 : fffff18a`b6b00510 fffff801`2e43d5af ffffcd87`f299f520 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff18a`b6b00340 fffff801`2e2f4f85 : 00000000`00000000 fffff18a`b6b003c8 00000000`0000002f 00000000`00000000 : nt!KiPageFault+0x4c3
fffff18a`b6b004d0 fffff801`2e2f3e50 : 00000000`00000010 00000000`00000246 00000000`00062a00 fffff801`2e2f2b39 : nt!KiChooseTargetProcessor+0x4f5
fffff18a`b6b00600 fffff801`2e2f3af3 : fffff801`2d4ae180 00000000`00000000 ffffbc03`00000000 fffff80f`00000000 : nt!KiDeferredReadyThread+0x240
fffff18a`b6b006c0 fffff801`2e2f38ff : ffffcd87`ea326870 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiReadyThread+0x33
fffff18a`b6b006f0 fffff801`2e3582a9 : ffffcd87`e9b44480 ffffcd87`e9b44488 ffffcd87`e9b44480 000001f2`5a436988 : nt!KiExitDispatcher+0xff
fffff18a`b6b00760 fffff801`2e2f192e : ffffcd87`f22a6010 ffffcd87`f2a1aef0 ffffcd87`00000000 00000000`00000000 : nt!KeInsertQueueEx+0xe9
fffff18a`b6b007d0 fffff801`2e76f2fe : ffffcd87`00000001 00000000`00000000 ffffcd87`f22a6000 00000000`00000000 : nt!IopCompleteRequest+0x73e
fffff18a`b6b008c0 fffff801`2e79e05e : ffffcd87`00000000 00000000`00000000 00000000`00000000 fffff18a`b6b00b80 : nt!IopSynchronousServiceTail+0x2fe
fffff18a`b6b00970 fffff801`2e447f13 : 00000000`00000000 00000000`00000000 00000000`00000000 000001f2`3f9e47e8 : nt!NtWriteFile+0x8ce
fffff18a`b6b00a90 00007ffe`b5b5a094 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000056`701fe598 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`b5b5a094


THREAD_SHA1_HASH_MOD_FUNC: 540a8c759278802ec9d1952e9722d5834980a89a

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: ff845f8fb2a8918ec7ff95a7019577d9bba648e3

THREAD_SHA1_HASH_MOD: dc844b1b94baa204d070855e43bbbd27eee98b94

FOLLOWUP_IP:
nt!KiChooseTargetProcessor+4f5
fffff801`2e2f4f85 8d157590faff lea edx,[nt!IoStartNextPacket <PERF> (nt+0x0) (fffff801`2e29e000)]

FAULT_INSTR_CODE: 9075158d

SYMBOL_STACK_INDEX: 3

SYMBOL_NAME: nt!KiChooseTargetProcessor+4f5

FOLLOWUP_NAME: MachineOwner

IMAGE_NAME: hardware

DEBUG_FLR_IMAGE_TIMESTAMP: 0

IMAGE_VERSION: 10.0.17134.1

STACK_COMMAND: .thread ; .cxr ; kb

MODULE_NAME: hardware

FAILURE_BUCKET_ID:  IP_MISALIGNED

BUCKET_ID: IP_MISALIGNED

PRIMARY_PROBLEM_CLASS: IP_MISALIGNED

TARGET_TIME: 2019-02-05T00:26:23.000Z

OSBUILD: 17134

OSSERVICEPACK: 1

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2018-04-11 07:04:54

BUILDDATESTAMP_STR: 180410-1804

BUILDLAB_STR: rs4_release

BUILDOSVER_STR: 10.0.17134.1.amd64fre.rs4_release.180410-1804

ANALYSIS_SESSION_ELAPSED_TIME: 14e7

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:ip_misaligned

FAILURE_ID_HASH: {201b0e5d-db2a-63d2-77be-8ce8ff234750}

Followup: MachineOwner
---------



DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffff930c6f65fcdf, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8049f28e06d, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 5

Key : Analysis.Elapsed.Sec
Value: 10

Key : Analysis.Memory.CommitPeak.Mb
Value: 88


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 17134.1.amd64fre.rs4_release.180410-1804

DUMP_TYPE: 2

BUGCHECK_P1: ffff930c6f65fcdf

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8049f28e06d

READ_ADDRESS: fffff80131669388: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
ffff930c6f65fcdf

CURRENT_IRQL: 2

FAULTING_IP:
rtwlanu!MgntFilterReceivedPacket+6ad
fffff804`9f28e06d 488b80d8fc6500 mov rax,qword ptr [rax+65FCD8h]

CPU_COUNT: 4

CPU_MHZ: dac

CPU_VENDOR: AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 11

CPU_STEPPING: 0

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT

BUGCHECK_STR: AV

PROCESS_NAME: System

ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5

ANALYSIS_SESSION_TIME: 05-13-2019 21:06:28.0516

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

TRAP_FRAME:  fffff8013365ba20 -- (.trap 0xfffff8013365ba20)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff930c6f000007 rbx=0000000000000000 rcx=ffff930c2b000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8049f28e06d rsp=fffff8013365bbb0 rbp=fffff8013365bc39
r8=ffff930c2c268c70 r9=fffff8013365bc08 r10=0000000000000004
r11=0000000000000200 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
rtwlanu!MgntFilterReceivedPacket+0x6ad:
fffff804`9f28e06d 488b80d8fc6500 mov rax,qword ptr [rax+65FCD8h] ds:ffff930c`6f65fcdf=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER: from fffff801313b6529 to fffff801313a3650

STACK_TEXT:
fffff801`3365b8d8 fffff801`313b6529 : 00000000`0000000a ffff930c`6f65fcdf 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff801`3365b8e0 fffff801`313b28c3 : 127e1f05`440f4800 fffff804`9f2bc1a3 00000000`00000206 fffff801`31261fa8 : nt!KiBugCheckDispatch+0x69
fffff801`3365ba20 fffff804`9f28e06d : ffff930c`2b000000 fffff801`3365bc39 ffff930c`2c268c70 00000000`00000000 : nt!KiPageFault+0x4c3
fffff801`3365bbb0 fffff804`9f2beb4f : ffff930c`2b000001 fffff801`3365bd00 00000000`00000000 00000000`00000001 : rtwlanu!MgntFilterReceivedPacket+0x6ad
fffff801`3365bca0 fffff804`9f2be7c4 : ffff930c`2c268c38 fffff804`9f3949d4 ffff930c`2b044a20 fffff804`9d1677c3 : rtwlanu!ProcessReceivedPacketForEachPortSpecific+0x37f
fffff801`3365bf90 fffff804`9f39482c : fffff801`3365c020 ffff930c`2b000000 00000000`00000000 ffff930c`2c268c38 : rtwlanu!ProcessReceivedPacket+0x58
fffff801`3365bfc0 fffff804`9f394cc9 : ffff930c`2b044a20 ffff930c`2afdcd03 ffff930c`2c269252 00000000`00000000 : rtwlanu!ProcessSegregatedPackets_8188E+0xb4
fffff801`3365bff0 fffff804`9f394755 : ffff930c`2b000000 00000000`00000002 ffff930c`2afdcdf8 00000000`0000061c : rtwlanu!SegregateUsbAggPackets_8188E+0x101
fffff801`3365c050 fffff804`9f3941cd : ffff930c`2b000000 fffff801`3365c100 ffff930c`2ab44480 ffff930c`2ab3f9b0 : rtwlanu!ParsingRxAggregation_8188E+0x41
fffff801`3365c080 fffff804`9f242a41 : ffff930c`2b000000 00000000`00000000 ffff930c`2ab44480 ffff930c`2ab3f9b0 : rtwlanu!HalUsbInMpduComplete8188EUsb+0x95
fffff801`3365c0d0 fffff804`9d1356e5 : ffff930c`2ae99530 ffff930c`297903b0 00000000`00000000 ffff930c`2ae99770 : rtwlanu!WdfUsb_FindAdapter+0x431
fffff801`3365c160 fffff804`9d13508e : ffff930c`3381df60 00006cf3`d5166ac8 ffff930c`2ae99530 ffff930c`2ae1e720 : Wdf01000!FxRequestBase::CompleteSubmitted+0x205 [minkernel\wdf\framework\shared\core\fxrequestbase.cpp @ 530]
fffff801`3365c220 fffff801`31332896 : ffff930c`2ab48050 ffff930c`28895402 ffff930c`00000d4e ffff930c`2ab358a0 : Wdf01000!FxIoTarget::_RequestCompletionRoutine+0xde [minkernel\wdf\framework\shared\targets\general\fxiotarget.cpp @ 2448]
fffff801`3365c290 fffff801`312603af : ffff930c`2ab358a0 fffff801`3365c379 00000000`00000000 ffff930c`2ab35cd3 : nt!IopUnloadSafeCompletion+0x56
fffff801`3365c2c0 fffff801`31260277 : ffff930c`2ab236f0 00000000`00000200 fffff804`9d1dde40 00000000`0000000a : nt!IopfCompleteRequest+0x11f
fffff801`3365c3e0 fffff804`9d139627 : ffff930c`2906d4f0 ffff930c`2ab358a0 00000000`00000002 ffff930c`2ae50020 : nt!IofCompleteRequest+0x17
fffff801`3365c410 fffff804`9d1372fb : fffff801`00000001 fffff804`00000000 00000000`ffffff02 ffff930c`00000002 : Wdf01000!FxRequest::CompleteInternal+0x247 [minkernel\wdf\framework\shared\core\fxrequest.cpp @ 869]
fffff801`3365c4d0 fffff804`a062f336 : 00000000`ffffff02 ffff930c`2906d4f0 ffff930c`2ae50400 ffff930c`2ae50400 : Wdf01000!imp_WdfRequestComplete+0x8b [minkernel\wdf\framework\shared\core\fxrequestapi.cpp @ 436]
fffff801`3365c530 fffff804`a062d469 : ffff930c`2906d690 00000000`00000001 ffff930c`2906d720 fffff801`3365c818 : USBXHCI!Bulk_Transfer_CompleteCancelable+0x182
fffff801`3365c590 fffff804`a062bde0 : fffff801`3069cf00 fffff801`00000000 ffff930c`33720000 fffff801`31270492 : USBXHCI!Bulk_ProcessTransferEventWithED1+0x40d
fffff801`3365c650 fffff804`a06212c3 : ffffd42e`4eddaaa3 fffff801`3365c6b8 00000000`00000000 00000000`00023c49 : USBXHCI!Bulk_EP_TransferEventHandler+0x10
fffff801`3365c680 fffff804`a0614608 : 00000000`00000000 00000000`00000004 ffff930c`2abaf2f0 fffff801`3365c781 : USBXHCI!TR_TransferEventHandler+0x17
fffff801`3365c6b0 fffff804`a06337ae : fffff801`3365c818 fffff801`3365c7e8 00000000`00000000 fffff801`3365c7f0 : USBXHCI!Endpoint_TransferEventHandler+0x148
fffff801`3365c740 fffff804`a061744d : ffff930c`2abaf220 fffff801`3365c839 ffff930c`2abaf2f0 00000001`d264e5c0 : USBXHCI!UsbDevice_TransferEventHandler+0x92
fffff801`3365c7a0 fffff804`a0617e6c : fffff801`3365c8f0 ffff930c`282b1110 ffff930c`00000000 ffff930c`2abaf020 : USBXHCI!Interrupter_DeferredWorkProcessor+0x4c5
fffff801`3365c8a0 fffff804`9d131fad : 00000000`00000f44 fffff804`9f1c3eb6 ffff930c`2abcb4b8 ffff930c`2a9bd9e0 : USBXHCI!Interrupter_WdfEvtInterruptDpc+0xc
fffff801`3365c8d0 fffff801`3126acc7 : fffff801`3365ca00 00000000`00000000 00000000`00040001 00000000`00000000 : Wdf01000!FxInterrupt::_InterruptDpcThunk+0x9d [minkernel\wdf\framework\shared\irphandlers\pnp\km\interruptobjectkm.cpp @ 410]
fffff801`3365c910 fffff801`3126a31b : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExecuteAllDpcs+0x2e7
fffff801`3365ca50 fffff801`313a738a : 00000000`00000000 fffff801`30697180 00000000`001a6560 fffff801`31686400 : nt!KiRetireDpcList+0x1db
fffff801`3365cc60 00000000`00000000 : fffff801`3365d000 fffff801`33657000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x5a


THREAD_SHA1_HASH_MOD_FUNC: a2dbfb884a248e52ee7cb0b8b95a9e7d9ca4868b

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 0dea8d1bd385dc5732ae6d59c3a788cdb151ead7

THREAD_SHA1_HASH_MOD: f3ae91e8abe511ef76531d64560ace41ef25a63b

FOLLOWUP_IP:
rtwlanu!MgntFilterReceivedPacket+6ad
fffff804`9f28e06d 488b80d8fc6500 mov rax,qword ptr [rax+65FCD8h]

FAULT_INSTR_CODE: d8808b48

SYMBOL_STACK_INDEX: 3

SYMBOL_NAME: rtwlanu!MgntFilterReceivedPacket+6ad

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: rtwlanu

IMAGE_NAME:  rtwlanu.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 582b38fa

IMAGE_VERSION: 1030.11.503.2016

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 6ad

FAILURE_BUCKET_ID: AV_rtwlanu!MgntFilterReceivedPacket

BUCKET_ID: AV_rtwlanu!MgntFilterReceivedPacket

PRIMARY_PROBLEM_CLASS: AV_rtwlanu!MgntFilterReceivedPacket

TARGET_TIME: 2019-02-04T21:58:53.000Z

OSBUILD: 17134

OSSERVICEPACK: 1

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2018-04-11 07:04:54

BUILDDATESTAMP_STR: 180410-1804

BUILDLAB_STR: rs4_release

BUILDOSVER_STR: 10.0.17134.1.amd64fre.rs4_release.180410-1804

ANALYSIS_SESSION_ELAPSED_TIME: 2984

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:av_rtwlanu!mgntfilterreceivedpacket

FAILURE_ID_HASH: {93de8b4e-0b55-861d-dc91-282628991e0b}

Followup: MachineOwner
---------


MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000004477, A driver tried to write to an unallocated address in the
user space of the system process. Parameter 2 contains the
address of the attempted write.
Arg2: 000000000040000b
Arg3: 0000000000000000
Arg4: 0000000000000000

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 8

Key : Analysis.Elapsed.Sec
Value: 19

Key : Analysis.Memory.CommitPeak.Mb
Value: 68


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 17134.1.amd64fre.rs4_release.180410-1804

DUMP_TYPE: 2

BUGCHECK_P1: 4477

BUGCHECK_P2: 40000b

BUGCHECK_P3: 0

BUGCHECK_P4: 0

BUGCHECK_STR: 0x1a_4477

CPU_COUNT: 4

CPU_MHZ: dac

CPU_VENDOR: AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 11

CPU_STEPPING: 0

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT

PROCESS_NAME: System

CURRENT_IRQL: 2

ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5

ANALYSIS_SESSION_TIME: 05-13-2019 21:00:23.0148

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

TRAP_FRAME:  ffffe38f7305a860 -- (.trap 0xffffe38f7305a860)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000400000 rbx=0000000000000000 rcx=000000000000000b
rdx=000000000000000b rsi=0000000000000000 rdi=0000000000000000
rip=fffff8026f7828ca rsp=ffffe38f7305a9f0 rbp=ffffd10ef1bfa000
r8=0000000000000001 r9=000000002da58000 r10=0000000000000004
r11=0000000000000cf6 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac po cy
nt!RtlDecompressBufferXpressHuff+0x18a:
fffff802`6f7828ca 82 ???
Resetting default scope

MISALIGNED_IP:
nt!RtlDecompressBufferXpressHuff+18a
fffff802`6f7828ca 82 ???

LAST_CONTROL_TRANSFER: from fffff8026f87537a to fffff8026f8540a0

STACK_TEXT:
ffffe38f`7305a458 fffff802`6f87537a : 00000000`0000001a 00000000`00004477 00000000`0040000b 00000000`00000000 : nt!KeBugCheckEx
ffffe38f`7305a460 fffff802`6f6c98a8 : 00000000`00000000 fffff80e`652da465 ffff8104`01178700 fffff802`6f85b175 : nt!MiCheckFatalAccessViolation+0x1adcea
ffffe38f`7305a4a0 fffff802`6f704a9e : 00000000`00000000 00000000`00000018 00000000`00000000 00000000`0040000b : nt!MiInPagePageTable+0x178
ffffe38f`7305a5c0 fffff802`6f70414f : ffffe38f`7305a720 fffff802`6e85d180 ffff8104`00000000 fffff802`00000002 : nt!MiUserFault+0x51e
ffffe38f`7305a6f0 fffff802`6f8617da : 00000001`ffffffff ffff9601`e2d73c00 ffff9601`e2d75c00 ffffd10e`f0dcf929 : nt!MmAccessFault+0x11f
ffffe38f`7305a860 fffff802`6f7828ca : ffffd10e`f1bfa000 ffff9601`e2d75c00 ffffd10e`f0dce42c ffff9601`e2d73c00 : nt!KiPageFault+0x31a
ffffe38f`7305a9f0 fffff802`6f782720 : ffff9601`e2d73c00 00000000`00002000 ffff8104`0dbdd7e0 ffff9601`e18e8180 : nt!RtlDecompressBufferXpressHuff+0x18a
ffffe38f`7305aa40 fffff80e`65c97518 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00001000 : nt!RtlDecompressBufferEx+0x60
ffffe38f`7305aa90 fffff802`6f75fb05 : 00000000`00000000 fffff802`00002000 ffff8104`00002000 00000000`00000000 : Wof!FileProvDecompressChunks+0x278
ffffe38f`7305ab80 fffff802`6f7da2d7 : ffff8104`01178700 00000000`00000080 ffff8104`010ff440 ffff8104`01178700 : nt!ExpWorkerThread+0xf5
ffffe38f`7305ac10 fffff802`6f85b516 : ffff9601`e17c0180 ffff8104`01178700 fffff802`6f7da290 00000000`00000000 : nt!PspSystemThreadStartup+0x47
ffffe38f`7305ac60 00000000`00000000 : ffffe38f`7305b000 ffffe38f`73055000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16


THREAD_SHA1_HASH_MOD_FUNC: fa80d6b4f1fe13dc65bcc83ea9686db9af2e0c60

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 55bec0d858e72683c05ce1797b87bdb78ebdd0e4

THREAD_SHA1_HASH_MOD: fc48ff48dde5d5bcb13e9c136d35dc8d67719df7

FOLLOWUP_IP:
Wof!FileProvDecompressChunks+278
fffff80e`65c97518 4c8b5c2460 mov r11,qword ptr [rsp+60h]

FAULT_INSTR_CODE: 245c8b4c

SYMBOL_STACK_INDEX: 8

SYMBOL_NAME: Wof!FileProvDecompressChunks+278

FOLLOWUP_NAME: MachineOwner

DEBUG_FLR_IMAGE_TIMESTAMP: 0

IMAGE_VERSION: 10.0.17134.12

STACK_COMMAND: .thread ; .cxr ; kb

MODULE_NAME: hardware

IMAGE_NAME:  hardware

FAILURE_BUCKET_ID: IP_MISALIGNED

BUCKET_ID: IP_MISALIGNED

PRIMARY_PROBLEM_CLASS: IP_MISALIGNED

TARGET_TIME: 2019-01-25T21:02:56.000Z

OSBUILD: 17134

OSSERVICEPACK: 523

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2019-01-01 09:44:13

BUILDDATESTAMP_STR: 180410-1804

BUILDLAB_STR: rs4_release

BUILDOSVER_STR: 10.0.17134.1.amd64fre.rs4_release.180410-1804

ANALYSIS_SESSION_ELAPSED_TIME: 4be5

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:ip_misaligned

FAILURE_ID_HASH: {201b0e5d-db2a-63d2-77be-8ce8ff234750}

Followup: MachineOwner
---------


DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000003, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff80824250532, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 2

Key : Analysis.Elapsed.Sec
Value: 37

Key : Analysis.Memory.CommitPeak.Mb
Value: 68


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 17134.1.amd64fre.rs4_release.180410-1804

DUMP_TYPE: 2

BUGCHECK_P1: 3

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff80824250532

WRITE_ADDRESS: fffff803d1eef388: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
0000000000000003

CURRENT_IRQL: 2

FAULTING_IP:
rtwlanu+1b0532
fffff808`24250532 83e901 sub ecx,1

CPU_COUNT: 4

CPU_MHZ: dac

CPU_VENDOR: AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 11

CPU_STEPPING: 0

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT

BUGCHECK_STR: AV

PROCESS_NAME: System

ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5

ANALYSIS_SESSION_TIME: 05-13-2019 21:00:28.0180

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

TRAP_FRAME:  ffffec0383306de0 -- (.trap 0xffffec0383306de0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000003 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffb4857d400000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80824250532 rsp=ffffec0383306f70 rbp=0000000000000001
r8=ffffb4857de00000 r9=0000000000000032 r10=0000000000000000
r11=ffffb4857d400000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
rtwlanu+0x1b0532:
fffff808`24250532 83e901 sub ecx,1
Resetting default scope

LAST_CONTROL_TRANSFER: from fffff803d1c5cc69 to fffff803d1c4c0a0

STACK_TEXT:
ffffec03`83306c98 fffff803`d1c5cc69 : 00000000`0000000a 00000000`00000003 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffffec03`83306ca0 fffff803`d1c598e5 : 00000000`00000001 fffff808`223f4866 ffffb485`7dd7c201 00000000`00000001 : nt!KiBugCheckDispatch+0x69
ffffec03`83306de0 fffff808`24250532 : 00000000`00000014 fffff808`24143b9e ffffb485`7f12ad70 ffffb485`7ede4030 : nt!KiPageFault+0x425
ffffec03`83306f70 00000000`00000014 : fffff808`24143b9e ffffb485`7f12ad70 ffffb485`7ede4030 ffffb485`00000002 : rtwlanu+0x1b0532
ffffec03`83306f78 fffff808`24143b9e : ffffb485`7f12ad70 ffffb485`7ede4030 ffffb485`00000002 ffffb485`7d400000 : 0x14
ffffec03`83306f80 ffffb485`7f12ad70 : ffffb485`7ede4030 ffffb485`00000002 ffffb485`7d400000 ffffb485`7d400000 : rtwlanu+0xa3b9e
ffffec03`83306f88 ffffb485`7ede4030 : ffffb485`00000002 ffffb485`7d400000 ffffb485`7d400000 fffff808`240e2e1c : 0xffffb485`7f12ad70
ffffec03`83306f90 ffffb485`00000002 : ffffb485`7d400000 ffffb485`7d400000 fffff808`240e2e1c fffff808`242502f0 : 0xffffb485`7ede4030
ffffec03`83306f98 ffffb485`7d400000 : ffffb485`7d400000 fffff808`240e2e1c fffff808`242502f0 00000000`00000001 : 0xffffb485`00000002
ffffec03`83306fa0 ffffb485`7d400000 : fffff808`240e2e1c fffff808`242502f0 00000000`00000001 00000000`00000800 : 0xffffb485`7d400000
ffffec03`83306fa8 fffff808`240e2e1c : fffff808`242502f0 00000000`00000001 00000000`00000800 fffff808`2418639c : 0xffffb485`7d400000
ffffec03`83306fb0 fffff808`242502f0 : 00000000`00000001 00000000`00000800 fffff808`2418639c ffffb485`7f12ba5d : rtwlanu+0x42e1c
ffffec03`83306fb8 00000000`00000001 : 00000000`00000800 fffff808`2418639c ffffb485`7f12ba5d fffff808`240cfdeb : rtwlanu+0x1b02f0
ffffec03`83306fc0 00000000`00000800 : fffff808`2418639c ffffb485`7f12ba5d fffff808`240cfdeb 00000000`00000001 : 0x1
ffffec03`83306fc8 fffff808`2418639c : ffffb485`7f12ba5d fffff808`240cfdeb 00000000`00000001 ffffb485`7edf6034 : 0x800
ffffec03`83306fd0 ffffb485`7f12ba5d : fffff808`240cfdeb 00000000`00000001 ffffb485`7edf6034 ffffb485`7f12ad70 : rtwlanu+0xe639c
ffffec03`83306fd8 fffff808`240cfdeb : 00000000`00000001 ffffb485`7edf6034 ffffb485`7f12ad70 ffffb485`7d400000 : 0xffffb485`7f12ba5d
ffffec03`83306fe0 00000000`00000001 : ffffb485`7edf6034 ffffb485`7f12ad70 ffffb485`7d400000 00000000`00000001 : rtwlanu+0x2fdeb
ffffec03`83306fe8 ffffb485`7edf6034 : ffffb485`7f12ad70 ffffb485`7d400000 00000000`00000001 fffff808`24197754 : 0x1
ffffec03`83306ff0 ffffb485`7f12ad70 : ffffb485`7d400000 00000000`00000001 fffff808`24197754 fffff808`24250600 : 0xffffb485`7edf6034
ffffec03`83306ff8 ffffb485`7d400000 : 00000000`00000001 fffff808`24197754 fffff808`24250600 00000000`00000000 : 0xffffb485`7f12ad70
ffffec03`83307000 00000000`00000001 : fffff808`24197754 fffff808`24250600 00000000`00000000 ffffb485`7d400000 : 0xffffb485`7d400000
ffffec03`83307008 fffff808`24197754 : fffff808`24250600 00000000`00000000 ffffb485`7d400000 fffff808`24144a6e : 0x1
ffffec03`83307010 fffff808`24250600 : 00000000`00000000 ffffb485`7d400000 fffff808`24144a6e ffffb485`7d400000 : rtwlanu+0xf7754
ffffec03`83307018 00000000`00000000 : ffffb485`7d400000 fffff808`24144a6e ffffb485`7d400000 fffff808`24491000 : rtwlanu+0x1b0600


THREAD_SHA1_HASH_MOD_FUNC: 6b7456057c4127267125394646875f0394616b57

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 809d4b799ffb994bc7bfa29654394af69703766c

THREAD_SHA1_HASH_MOD: 14d6d4350a36c99e3bd4919cf9c6e27df44ea89f

FOLLOWUP_IP:
rtwlanu+1b0532
fffff808`24250532 83e901 sub ecx,1

FAULT_INSTR_CODE: 7401e983

SYMBOL_STACK_INDEX: 3

SYMBOL_NAME: rtwlanu+1b0532

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: rtwlanu

IMAGE_NAME:  rtwlanu.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 5aeaa243

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 1b0532

FAILURE_BUCKET_ID: AV_rtwlanu!unknown_function

BUCKET_ID: AV_rtwlanu!unknown_function

PRIMARY_PROBLEM_CLASS: AV_rtwlanu!unknown_function

TARGET_TIME: 2019-01-25T17:13:59.000Z

OSBUILD: 17134

OSSERVICEPACK: 523

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2019-01-01 09:44:13

BUILDDATESTAMP_STR: 180410-1804

BUILDLAB_STR: rs4_release

BUILDOSVER_STR: 10.0.17134.1.amd64fre.rs4_release.180410-1804

ANALYSIS_SESSION_ELAPSED_TIME: 9356

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:av_rtwlanu!unknown_function

FAILURE_ID_HASH: {ba94ae44-1665-76da-0bc4-d0359d32d7d0}

Followup: MachineOwner
---------


KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8035312c774, The address that the exception occurred at
Arg3: 0000000000000001, Parameter 0 of the exception
Arg4: 00000000000000a0, Parameter 1 of the exception

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 6

Key : Analysis.Elapsed.Sec
Value: 6

Key : Analysis.Memory.CommitPeak.Mb
Value: 67


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 17134.1.amd64fre.rs4_release.180410-1804

DUMP_TYPE: 2

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff8035312c774

BUGCHECK_P3: 1

BUGCHECK_P4: a0

WRITE_ADDRESS: fffff803534e5388: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
00000000000000a0

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP:
nt!ExAcquirePushLockSharedEx+104
fffff803`5312c774 f0480fb10e lock cmpxchg qword ptr [rsi],rcx

EXCEPTION_PARAMETER1: 0000000000000001

EXCEPTION_PARAMETER2: 00000000000000a0

BUGCHECK_STR: 0x1E_c0000005_W

CPU_COUNT: 4

CPU_MHZ: dac

CPU_VENDOR: AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 11

CPU_STEPPING: 0

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT

PROCESS_NAME: SrTasks.exe

CURRENT_IRQL: 0

ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5

ANALYSIS_SESSION_TIME: 05-13-2019 21:00:30.0724

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

TRAP_FRAME:  fffffa83dea08eb0 -- (.trap 0xfffffa83dea08eb0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000011
rdx=ffffd98869eed220 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8035312c774 rsp=fffffa83dea09040 rbp=0000000000000008
r8=0000000000000008 r9=0000000000000008 r10=ffffd98869eed2c8
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!ExAcquirePushLockSharedEx+0x104:
fffff803`5312c774 f0480fb10e lock cmpxchg qword ptr [rsi],rcx ds:00000000`00000000=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER: from fffff803531589ad to fffff803532420a0

STACK_TEXT:
fffffa83`dea08618 fffff803`531589ad : 00000000`0000001e ffffffff`c0000005 fffff803`5312c774 00000000`00000001 : nt!KeBugCheckEx
fffffa83`dea08620 fffff803`53252d42 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x58d
fffffa83`dea08cd0 fffff803`5324f8bf : fffffa83`dea092f0 00000000`00000000 fffffa83`dea092f0 00000000`00000008 : nt!KiExceptionDispatch+0xc2
fffffa83`dea08eb0 fffff803`5312c774 : ffff868a`d33c0700 ffff868a`d386b8a8 ffff868a`d3159a20 fffff80e`603ad867 : nt!KiPageFault+0x3ff
fffffa83`dea09040 fffff803`53146017 : fffffa83`dea09208 ffff868a`d60c1180 fffffa83`dea092f0 00000000`00000000 : nt!ExAcquirePushLockSharedEx+0x104
fffffa83`dea09080 fffff803`00000000 : fffffa83`dea09208 fffffa83`dea091b8 fffffa83`dea09101 fffffa83`00000000 : nt!CcGetVirtualAddress+0x207
fffffa83`dea09120 fffffa83`dea09208 : fffffa83`dea091b8 fffffa83`dea09101 fffffa83`00000000 ffffc504`00000000 : 0xfffff803`00000000
fffffa83`dea09128 fffffa83`dea091b8 : fffffa83`dea09101 fffffa83`00000000 ffffc504`00000000 00000000`00000000 : 0xfffffa83`dea09208
fffffa83`dea09130 fffffa83`dea09101 : fffffa83`00000000 ffffc504`00000000 00000000`00000000 00000000`00000000 : 0xfffffa83`dea091b8
fffffa83`dea09138 fffffa83`00000000 : ffffc504`00000000 00000000`00000000 00000000`00000000 ffff868a`d3ce4b20 : 0xfffffa83`dea09101
fffffa83`dea09140 ffffc504`00000000 : 00000000`00000000 00000000`00000000 ffff868a`d3ce4b20 ffffc504`1bb63010 : 0xfffffa83`00000000
fffffa83`dea09148 00000000`00000000 : 00000000`00000000 ffff868a`d3ce4b20 ffffc504`1bb63010 00000000`00000000 : 0xffffc504`00000000


THREAD_SHA1_HASH_MOD_FUNC: e454e9bd61574e15171b573ba94713ce551fcecf

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: b0c46427ade285f14b18c77bf9aabeef80b540cc

THREAD_SHA1_HASH_MOD: ee8fcf1fb60cb6e3e2f60ddbed2ec02b5748a693

FOLLOWUP_IP:
nt!ExAcquirePushLockSharedEx+104
fffff803`5312c774 f0480fb10e lock cmpxchg qword ptr [rsi],rcx

FAULT_INSTR_CODE: b10f48f0

SYMBOL_STACK_INDEX: 4

SYMBOL_NAME: nt!ExAcquirePushLockSharedEx+104

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP: 5c2b0c3d

IMAGE_VERSION: 10.0.17134.523

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 104

FAILURE_BUCKET_ID: 0x1E_c0000005_W_nt!ExAcquirePushLockSharedEx

BUCKET_ID: 0x1E_c0000005_W_nt!ExAcquirePushLockSharedEx

PRIMARY_PROBLEM_CLASS: 0x1E_c0000005_W_nt!ExAcquirePushLockSharedEx

TARGET_TIME: 2019-01-25T17:27:55.000Z

OSBUILD: 17134

OSSERVICEPACK: 523

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2019-01-01 09:44:13

BUILDDATESTAMP_STR: 180410-1804

BUILDLAB_STR: rs4_release

BUILDOSVER_STR: 10.0.17134.1.amd64fre.rs4_release.180410-1804

ANALYSIS_SESSION_ELAPSED_TIME: 1839

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:0x1e_c0000005_w_nt!exacquirepushlocksharedex

FAILURE_ID_HASH: {60d78a62-aa85-6f08-a556-5aa5fb6a1e48}

Followup: MachineOwner
---------


SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c000001d, Exception code that caused the bugcheck
Arg2: fffff8042a653902, Address of the instruction which caused the bugcheck
Arg3: fffff1880d274d70, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 6

Key : Analysis.Elapsed.Sec
Value: 56

Key : Analysis.Memory.CommitPeak.Mb
Value: 74


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 17763.1.amd64fre.rs5_release.180914-1434

DUMP_TYPE: 2

BUGCHECK_P1: c000001d

BUGCHECK_P2: fffff8042a653902

BUGCHECK_P3: fffff1880d274d70

BUGCHECK_P4: 0

EXCEPTION_CODE: (NTSTATUS) 0xc000001d - <Unable to get error code text>

FAULTING_IP:
nt!SwapContext+4a2
fffff804`2a653902 c4 ???

CONTEXT:  fffff1880d274d70 -- (.cxr 0xfffff1880d274d70)
rax=0000000000000005 rbx=fffff80429384180 rcx=fffff1880d276cc0
rdx=0000000000000000 rsi=bffba000007ff875 rdi=fffff8042a9f8400
rip=fffff8042a653902 rsp=fffff1880d275760 rbp=00000065b4bbbdff
r8=ffffc504fb28d080 r9=0000000000000030 r10=000000010000005b
r11=0000000000000000 r12=0000000000000023 r13=ffffc504f6a241c0
r14=ffffc504fb28d080 r15=fffff8042ca97000
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246
nt!SwapContext+0x4a2:
fffff804`2a653902 c4 ???
Resetting default scope

BUGCHECK_STR: 0x3B_c000001d

CPU_COUNT: 4

CPU_MHZ: dac

CPU_VENDOR: AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 11

CPU_STEPPING: 0

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT

PROCESS_NAME: NVIDIA Share.exe

CURRENT_IRQL: 2

ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5

ANALYSIS_SESSION_TIME: 05-13-2019 21:00:34.0147

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

MISALIGNED_IP:
nt!SwapContext+4a2
fffff804`2a653902 c4 ???

LAST_CONTROL_TRANSFER: from fffff8042a653186 to fffff8042a653902

STACK_TEXT:
fffff188`0d275760 fffff804`2a653186 : 00000000`00000000 fffff804`2a4a6d84 ffff8881`0b7c0180 fffff804`29384180 : nt!SwapContext+0x4a2
fffff188`0d2757a0 fffff804`2a5b26c7 : ffffc504`ff030080 00000000`00000000 fffff804`2a9f8400 fffff804`00000003 : nt!KiSwapContext+0x76
fffff188`0d2758e0 fffff804`2a5b21f8 : ffffc504`ff030080 00001f80`00000000 ffffc504`ff030180 5adb2731`f21c0000 : nt!KiSwapThread+0x297
fffff188`0d2759a0 fffff804`2a5b0fc0 : fffff188`0d275e01 fffff804`00000000 00000000`00000002 fffff188`0d275ab1 : nt!KiCommitThreadWait+0x508
fffff188`0d275a40 fffff804`2a5af9c4 : ffffc504`f170bd40 00000000`00000006 c0011020`00300000 00000000`00000400 : nt!KeWaitForSingleObject+0x520
fffff188`0d275b10 fffff804`2aa5a44a : fffff188`00000001 fffff188`0d275c90 ffffc504`ff12b270 00000000`00000006 : nt!KeWaitForMultipleObjects+0x44
fffff188`0d275be0 ffff9b15`a8a71588 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObWaitForMultipleObjects+0x2aa
fffff188`0d2760e0 ffff9b15`a8948dad : 00000000`00000000 ffff9b2c`06c69470 00000000`00000010 fffff804`00001cff : win32kfull!xxxMsgWaitForMultipleObjectsEx+0xd4
fffff188`0d276190 fffff804`2a65d785 : ffffc504`ff030080 00000000`00000000 fffff188`00000010 00000000`00001cff : win32kfull!NtUserMsgWaitForMultipleObjectsEx+0x3cd
fffff188`0d276a90 00007ff8`74659904 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
00000096`24bffb28 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`74659904


THREAD_SHA1_HASH_MOD_FUNC: 52d19520538eaadab94f4084a1b859b62d68355b

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: c16ca38b2dd2465bdc47b4edc5536812db023693

THREAD_SHA1_HASH_MOD: eeea7cb1647e39bf6aa9aeeba4112a95c5d927a8

FOLLOWUP_IP:
win32kfull!xxxMsgWaitForMultipleObjectsEx+d4
ffff9b15`a8a71588 0f1f440000 nop dword ptr [rax+rax]

FAULT_INSTR_CODE: 441f0f

SYMBOL_STACK_INDEX: 7

SYMBOL_NAME: win32kfull!xxxMsgWaitForMultipleObjectsEx+d4

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: hardware

IMAGE_NAME:  hardware

DEBUG_FLR_IMAGE_TIMESTAMP: 0

IMAGE_VERSION: 10.0.17763.348

STACK_COMMAND: .cxr 0xfffff1880d274d70 ; kb

FAILURE_BUCKET_ID: IP_MISALIGNED

BUCKET_ID: IP_MISALIGNED

PRIMARY_PROBLEM_CLASS: IP_MISALIGNED

TARGET_TIME: 2019-03-28T20:05:22.000Z

OSBUILD: 17763

OSSERVICEPACK: 379

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: unknown_date

BUILDDATESTAMP_STR: 180914-1434

BUILDLAB_STR: rs5_release

BUILDOSVER_STR: 10.0.17763.1.amd64fre.rs5_release.180914-1434

ANALYSIS_SESSION_ELAPSED_TIME: de75

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:ip_misaligned

FAILURE_ID_HASH: {201b0e5d-db2a-63d2-77be-8ce8ff234750}

Followup: MachineOwner
---------

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000002, Stack cookie instrumentation code detected a stack-based
buffer overrun.
Arg2: ffffd000202e46c0, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffd000202e4618, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for Ntfs.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 2

Key : Analysis.Elapsed.Sec
Value: 18

Key : Analysis.Memory.CommitPeak.Mb
Value: 62


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 9600.17415.amd64fre.winblue_r4.141028-1500

DUMP_TYPE: 2

BUGCHECK_P1: 2

BUGCHECK_P2: ffffd000202e46c0

BUGCHECK_P3: ffffd000202e4618

BUGCHECK_P4: 0

TRAP_FRAME:  ffffd000202e46c0 -- (.trap 0xffffd000202e46c0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff801cdce1d00 rbx=0000000000000000 rcx=0000000000000002
rdx=ffffc00100000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff801cdc9a535 rsp=ffffd000202e4858 rbp=ffffd000202e49c0
r8=fffff801cdcbf368 r9=00001001202e59f9 r10=ffffd000202e59f8
r11=0000000000000068 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac po cy
Ntfs+0x2f535:
fffff801`cdc9a535 ?? ???
Resetting default scope

EXCEPTION_RECORD:  ffffd000202e4618 -- (.exr 0xffffd000202e4618)
ExceptionAddress: fffff801cdc9a535 (Ntfs+0x000000000002f535)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000002
Subcode: 0x2 FAST_FAIL_STACK_COOKIE_CHECK_FAILURE

CPU_COUNT: 4

CPU_MHZ: dac

CPU_VENDOR: AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 11

CPU_STEPPING: 0

CUSTOMER_CRASH_COUNT: 1

BUGCHECK_STR: 0x139

PROCESS_NAME: SearchFilterHo

CURRENT_IRQL: 0

DEFAULT_BUCKET_ID: FAIL_FAST_STACK_COOKIE_CHECK_FAILURE

WATSON_BKT_EVENT: BEX

ERROR_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>

EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>

EXCEPTION_CODE_STR: c0000409

EXCEPTION_PARAMETER1: 0000000000000002

ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5

ANALYSIS_SESSION_TIME: 05-13-2019 21:01:01.0175

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

LAST_CONTROL_TRANSFER: from fffff8003e3604e9 to fffff8003e3549a0

STACK_TEXT:
ffffd000`202e4398 fffff800`3e3604e9 : 00000000`00000139 00000000`00000002 ffffd000`202e46c0 ffffd000`202e4618 : nt!KeBugCheckEx
ffffd000`202e43a0 fffff800`3e360810 : 00000000`00000000 00000000`00000001 000003be`3477ec30 000003be`347970a0 : nt!KiBugCheckDispatch+0x69
ffffd000`202e44e0 fffff800`3e35fa34 : 000003be`33b16e18 000003be`33b97340 00000000`00000000 00000000`00000001 : nt!KiFastFailDispatch+0xd0
ffffd000`202e46c0 fffff801`cdc9a535 : fffff801`cdc9684f ffffd000`202e59f8 fffff800`3e2de3df ffffd000`202e4e60 : nt!KiRaiseSecurityCheckFailure+0xf4
ffffd000`202e4858 fffff801`cdc9684f : ffffd000`202e59f8 fffff800`3e2de3df ffffd000`202e4e60 00000000`00000000 : Ntfs+0x2f535
ffffd000`202e4860 ffffd000`202e59f8 : fffff800`3e2de3df ffffd000`202e4e60 00000000`00000000 fffff801`cdc8bc44 : Ntfs+0x2b84f
ffffd000`202e4868 fffff800`3e2de3df : ffffd000`202e4e60 00000000`00000000 fffff801`cdc8bc44 fffff800`3e35beed : 0xffffd000`202e59f8
ffffd000`202e4870 fffff800`3e2de125 : 00000000`00000001 fffff801`cdc6b000 ffffd000`202e5700 00000000`00000000 : nt!RtlLookupFunctionEntry+0x1d7
ffffd000`202e48c0 fffff800`3e2e24de : ffffd000`202e57b8 ffffd000`202e54c0 ffffd000`202e57b8 ffffe001`607fe490 : nt!RtlDispatchException+0x1a5
ffffd000`202e4f90 fffff800`3e3605c2 : ffffe001`60c12080 ffffd000`202e5700 00000000`00000000 fffff800`3e25be27 : nt!KiDispatchException+0x646
ffffd000`202e5680 fffff800`3e35ed14 : 00000000`00000000 ffffd000`202e5bc0 00000000`00000000 00000000`00000001 : nt!KiExceptionDispatch+0xc2
ffffd000`202e5860 fffff801`cdc8bc44 : 00000000`0fd83b48 ffffe001`607fe7a0 00000000`00000000 00000000`00000002 : nt!KiPageFault+0x214
ffffd000`202e59f8 00000000`0fd83b48 : ffffe001`607fe7a0 00000000`00000000 00000000`00000002 ffffd000`202e5bc0 : Ntfs+0x20c44
ffffd000`202e5a00 ffffe001`607fe7a0 : 00000000`00000000 00000000`00000002 ffffd000`202e5bc0 00000000`00000004 : 0xfd83b48
ffffd000`202e5a08 00000000`00000000 : 00000000`00000002 ffffd000`202e5bc0 00000000`00000004 00000000`00000001 : 0xffffe001`607fe7a0


THREAD_SHA1_HASH_MOD_FUNC: dc45ebb2f15c9c8266aba562d0bfb6e904e8a435

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 53ec00673a236a75de49aa44599dd0ac7e9ffc0e

THREAD_SHA1_HASH_MOD: 883aab6074eb127ce0b42ebe9570b6a3528ac709

FOLLOWUP_IP:
nt!KiFastFailDispatch+d0
fffff800`3e360810 c644242000 mov byte ptr [rsp+20h],0

FAULT_INSTR_CODE: 202444c6

SYMBOL_STACK_INDEX: 2

SYMBOL_NAME: nt!KiFastFailDispatch+d0

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP: 54503718

IMAGE_VERSION: 6.3.9600.17415

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: d0

FAILURE_BUCKET_ID: 0x139_MISSING_GSFRAME_nt!KiFastFailDispatch

BUCKET_ID: 0x139_MISSING_GSFRAME_nt!KiFastFailDispatch

PRIMARY_PROBLEM_CLASS: 0x139_MISSING_GSFRAME_nt!KiFastFailDispatch

TARGET_TIME: 2019-02-20T16:32:05.000Z

OSBUILD: 9600

OSSERVICEPACK: 17415

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 8.1

OSEDITION: Windows 8.1 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2014-10-29 03:38:48

BUILDDATESTAMP_STR: 141028-1500

BUILDLAB_STR: winblue_r4

BUILDOSVER_STR: 6.3.9600.17415.amd64fre.winblue_r4.141028-1500

ANALYSIS_SESSION_ELAPSED_TIME: 48d2

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:0x139_missing_gsframe_nt!kifastfaildispatch

FAILURE_ID_HASH: {1971a9b0-b7ec-89bf-0a51-10ac52818da5}

Followup: MachineOwner
---------


SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff800e516b5f0, Address of the instruction which caused the bugcheck
Arg3: ffffd00021ad81a0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 2

Key : Analysis.Elapsed.Sec
Value: 8

Key : Analysis.Memory.CommitPeak.Mb
Value: 62


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 9600.17415.amd64fre.winblue_r4.141028-1500

DUMP_TYPE: 2

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff800e516b5f0

BUGCHECK_P3: ffffd00021ad81a0

BUGCHECK_P4: 0

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP:
nvlddmkm+1685f0
fffff800`e516b5f0 488901 mov qword ptr [rcx],rax

CONTEXT:  ffffd00021ad81a0 -- (.cxr 0xffffd00021ad81a0)
rax=fffff800e5afbe2c rbx=0000000000000000 rcx=0000000000000060
rdx=8000000000000010 rsi=ffffe000434af010 rdi=0000000100000000
rip=fffff800e516b5f0 rsp=ffffd00021ad8bd8 rbp=0000000000000010
r8=0000000000000000 r9=0000000000000008 r10=0000000000000000
r11=ffffd00021ad8bb0 r12=ffffe0003d71e000 r13=0000000000000000
r14=ffffd00021ad8e20 r15=ffffe000434ab010
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246
nvlddmkm+0x1685f0:
fffff800`e516b5f0 488901 mov qword ptr [rcx],rax ds:002b:00000000`00000060=????????????????
Resetting default scope

BUGCHECK_STR: 0x3B_c0000005

CPU_COUNT: 4

CPU_MHZ: dac

CPU_VENDOR: AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 11

CPU_STEPPING: 0

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT

PROCESS_NAME: dwm.exe

CURRENT_IRQL: 0

ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5

ANALYSIS_SESSION_TIME: 05-13-2019 21:00:40.0488

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

LAST_CONTROL_TRANSFER: from fffff800e5afbe2c to fffff800e516b5f0

STACK_TEXT:
ffffd000`21ad8bd8 fffff800`e5afbe2c : 00000000`00000000 ffffd000`21ad8c60 00000000`00000000 ffffe000`434af010 : nvlddmkm+0x1685f0
ffffd000`21ad8be0 00000000`00000000 : ffffd000`21ad8c60 00000000`00000000 ffffe000`434af010 fffff800`e5afbb43 : nvlddmkm+0xaf8e2c


THREAD_SHA1_HASH_MOD_FUNC: 937b3f6b9f108baa77f33abf3804c5271eba72b0

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 12c181ebece9ce4f2dabf9ca436dceaa25b03fd6

THREAD_SHA1_HASH_MOD: 937b3f6b9f108baa77f33abf3804c5271eba72b0

FOLLOWUP_IP:
nvlddmkm+1685f0
fffff800`e516b5f0 488901 mov qword ptr [rcx],rax

FAULT_INSTR_CODE: c3018948

SYMBOL_STACK_INDEX: 0

SYMBOL_NAME: nvlddmkm+1685f0

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 5c5b317b

STACK_COMMAND: .cxr 0xffffd00021ad81a0 ; kb

BUCKET_ID_FUNC_OFFSET: 1685f0

FAILURE_BUCKET_ID: 0x3B_c0000005_nvlddmkm!unknown_function

BUCKET_ID: 0x3B_c0000005_nvlddmkm!unknown_function

PRIMARY_PROBLEM_CLASS: 0x3B_c0000005_nvlddmkm!unknown_function

TARGET_TIME: 2019-02-13T17:55:07.000Z

OSBUILD: 9600

OSSERVICEPACK: 17415

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 8.1

OSEDITION: Windows 8.1 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2014-10-29 03:38:48

BUILDDATESTAMP_STR: 141028-1500

BUILDLAB_STR: winblue_r4

BUILDOSVER_STR: 6.3.9600.17415.amd64fre.winblue_r4.141028-1500

ANALYSIS_SESSION_ELAPSED_TIME: 2029

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:0x3b_c0000005_nvlddmkm!unknown_function

FAILURE_ID_HASH: {63c41bff-3ea4-15a0-a72c-26a548d17abe}

Followup: MachineOwner
---------


UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault). The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
use .trap on that value
Else
.trap on the appropriate frame will show where the trap was taken
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: fffff8019cfbce70
Arg3: 000000003c8c3b90
Arg4: fffff8019b6a208a

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 2

Key : Analysis.Elapsed.Sec
Value: 5

Key : Analysis.Memory.CommitPeak.Mb
Value: 62


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 9600.17415.amd64fre.winblue_r4.141028-1500

DUMP_TYPE: 2

BUGCHECK_P1: 8

BUGCHECK_P2: fffff8019cfbce70

BUGCHECK_P3: 3c8c3b90

BUGCHECK_P4: fffff8019b6a208a

BUGCHECK_STR: 0x7f_8

TRAP_FRAME:  fffff8019cfbce70 -- (.trap 0xfffff8019cfbce70)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000002406e880 rbx=0000000000000000 rcx=ffffe0013c8c3af7
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8019b6a208a rsp=000000003c8c3b90 rbp=ffffd0002406eb80
r8=0000000000001080 r9=ffffd0002406ea70 r10=0000000000000074
r11=0000003ae60cef78 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
nt!IoRemoveIoCompletion+0xca:
fffff801`9b6a208a 0000 add byte ptr [rax],al ds:00000000`2406e880=??
Resetting default scope

CPU_COUNT: 4

CPU_MHZ: dac

CPU_VENDOR: AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 11

CPU_STEPPING: 0

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT

PROCESS_NAME: chrome.exe

CURRENT_IRQL: 0

ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5

ANALYSIS_SESSION_TIME: 05-13-2019 21:00:43.0496

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

BAD_STACK_POINTER: 000000003c8c3b90

MISALIGNED_IP:
nt!IoRemoveIoCompletion+ca
fffff801`9b6a208a 0000 add byte ptr [rax],al

LAST_CONTROL_TRANSFER: from fffff8019b7ce4e9 to fffff8019b7c29a0

STACK_TEXT:
fffff801`9cfbcd28 fffff801`9b7ce4e9 : 00000000`0000007f 00000000`00000008 fffff801`9cfbce70 00000000`3c8c3b90 : nt!KeBugCheckEx
fffff801`9cfbcd30 fffff801`9b7cc5f4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff801`9cfbce70 fffff801`9b6a208a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0xb4
00000000`3c8c3b90 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IoRemoveIoCompletion+0xca


THREAD_SHA1_HASH_MOD_FUNC: 24b2add218ca5a387d543c79c37f6b0eb430302e

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: dfa9615f1ae05f06d3aa95e98be1c001d8278946

THREAD_SHA1_HASH_MOD: d084f7dfa548ce4e51810e4fd5914176ebc66791

FOLLOWUP_IP:
nt!KiDoubleFaultAbort+b4
fffff801`9b7cc5f4 90 nop

FAULT_INSTR_CODE: 6666c390

SYMBOL_STACK_INDEX: 2

SYMBOL_NAME: nt!KiDoubleFaultAbort+b4

FOLLOWUP_NAME: MachineOwner

IMAGE_NAME: hardware

DEBUG_FLR_IMAGE_TIMESTAMP: 0

IMAGE_VERSION: 6.3.9600.17415

STACK_COMMAND: .thread ; .cxr ; kb

MODULE_NAME: hardware

FAILURE_BUCKET_ID:  IP_MISALIGNED

BUCKET_ID: IP_MISALIGNED

PRIMARY_PROBLEM_CLASS: IP_MISALIGNED

TARGET_TIME: 2019-02-14T01:08:58.000Z

OSBUILD: 9600

OSSERVICEPACK: 17415

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 8.1

OSEDITION: Windows 8.1 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2014-10-29 03:38:48

BUILDDATESTAMP_STR: 141028-1500

BUILDLAB_STR: winblue_r4

BUILDOSVER_STR: 6.3.9600.17415.amd64fre.winblue_r4.141028-1500

ANALYSIS_SESSION_ELAPSED_TIME: 1618

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:ip_misaligned

FAILURE_ID_HASH: {201b0e5d-db2a-63d2-77be-8ce8ff234750}

Followup: MachineOwner
---------
 
2400 MHZ'te çalışıyor, 1 tane var Kingston DDR4.
 
Durum
Mesaj gönderimine kapalı.
Bu siteyi kullanmak için çerezler gereklidir. Siteyi kullanmaya devam etmek için çerezleri kabul etmelisiniz. Daha Fazlasını Öğren.…