PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: fffff8040001003e, memory referenced.
Arg2: 0000000000000010, value 0 = read operation, 1 = write operation.
Arg3: fffff8040001003e, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
SYSTEM_MANUFACTURER: Gigabyte Technology Co., Ltd.
SYSTEM_PRODUCT_NAME: B450M S2H
SYSTEM_SKU: Default string
SYSTEM_VERSION: Default string
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: F50
BIOS_DATE: 11/27/2019
BASEBOARD_MANUFACTURER: Gigabyte Technology Co., Ltd.
BASEBOARD_PRODUCT: B450M S2H
BASEBOARD_VERSION: x.x
DUMP_TYPE: 2
BUGCHECK_P1: fffff8040001003e
BUGCHECK_P2: 10
BUGCHECK_P3: fffff8040001003e
BUGCHECK_P4: 2
READ_ADDRESS: fffff8041a3733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8040001003e
FAULTING_IP:
+0
fffff804`0001003e ?? ???
MM_INTERNAL_CODE: 2
CPU_COUNT: c
CPU_MHZ: e09
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 71
CPU_STEPPING: 0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: System
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 12-31-2019 19:26:34.0161
ANALYSIS_VERSION: 10.0.18362.1 x86fre
TRAP_FRAME: ffff9886ca53a210 -- (.trap 0xffff9886ca53a210)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffff860edfc48080
rdx=ffff860edebfe160 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8040001003e rsp=ffff9886ca53a3a0 rbp=ffff860edfc49030
r8=ffff9886ca53a208 r9=000000000000003e r10=fffff80419e663e0
r11=ffff860edfc48080 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
fffff804`0001003e ?? ???
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80419fe35d6 to fffff80419fc14e0
FAILED_INSTRUCTION_ADDRESS:
+0
fffff804`0001003e ?? ???
STACK_TEXT:
ffff9886`ca539f68 fffff804`19fe35d6 : 00000000`00000050 fffff804`0001003e 00000000`00000010 ffff9886`ca53a210 : nt!KeBugCheckEx
ffff9886`ca539f70 fffff804`19e72eef : 00000000`00000000 00000000`00000010 00000000`00000000 fffff804`0001003e : nt!MiSystemFault+0x1d6866
ffff9886`ca53a070 fffff804`19fcf520 : ffff860e`00000000 00000000`00000000 00000000`00000001 00000000`00000000 : nt!MmAccessFault+0x34f
ffff9886`ca53a210 fffff804`0001003e : ffff860e`e4bd89a0 ffff860e`df96bca0 ffff9886`ca53a450 00000000`00000000 : nt!KiPageFault+0x360
ffff9886`ca53a3a0 ffff860e`e4bd89a0 : ffff860e`df96bca0 ffff9886`ca53a450 00000000`00000000 00000000`00000000 : 0xfffff804`0001003e
ffff9886`ca53a3a8 ffff860e`df96bca0 : ffff9886`ca53a450 00000000`00000000 00000000`00000000 fffff804`19e89e95 : 0xffff860e`e4bd89a0
ffff9886`ca53a3b0 ffff9886`ca53a450 : 00000000`00000000 00000000`00000000 fffff804`19e89e95 ffff9886`ca53a450 : 0xffff860e`df96bca0
ffff9886`ca53a3b8 00000000`00000000 : 00000000`00000000 fffff804`19e89e95 ffff9886`ca53a450 ffff860e`dfc49030 : 0xffff9886`ca53a450
THREAD_SHA1_HASH_MOD_FUNC: 35852f70c1fb96d682b5bd0e931cc10c7b9fe1fe
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: c0efb11bdbdabbfe638cd9930c42dad821618e02
THREAD_SHA1_HASH_MOD: d084f7dfa548ce4e51810e4fd5914176ebc66791
FOLLOWUP_IP:
nt!MiSystemFault+1d6866
fffff804`19fe35d6 cc int 3
FAULT_INSTR_CODE: 4d8d48cc
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!MiSystemFault+1d6866
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 12dcb470
IMAGE_VERSION: 10.0.18362.535
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: memory_corruption
BUCKET_ID_FUNC_OFFSET: 1d6866
FAILURE_BUCKET_ID: AV_INVALID_BAD_IP_nt!MiSystemFault
BUCKET_ID: AV_INVALID_BAD_IP_nt!MiSystemFault
PRIMARY_PROBLEM_CLASS: AV_INVALID_BAD_IP_nt!MiSystemFault
TARGET_TIME: 2019-12-30T20:00:37.000Z
OSBUILD: 18362
OSSERVICEPACK: 535
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 784
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1980-01-11 18:53:20
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 6750
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_invalid_bad_ip_nt!misystemfault
FAILURE_ID_HASH: {48ad9531-e3f8-1044-fc5f-d917677674c7}
Followup: MachineOwner
---------
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffa789ddd41840, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffa789ddd41798, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
SYSTEM_MANUFACTURER: Gigabyte Technology Co., Ltd.
SYSTEM_PRODUCT_NAME: B450M S2H
SYSTEM_SKU: Default string
SYSTEM_VERSION: Default string
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: F50
BIOS_DATE: 11/27/2019
BASEBOARD_MANUFACTURER: Gigabyte Technology Co., Ltd.
BASEBOARD_PRODUCT: B450M S2H
BASEBOARD_VERSION: x.x
DUMP_TYPE: 2
BUGCHECK_P1: 3
BUGCHECK_P2: ffffa789ddd41840
BUGCHECK_P3: ffffa789ddd41798
BUGCHECK_P4: 0
TRAP_FRAME: ffffa789ddd41840 -- (.trap 0xffffa789ddd41840)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffbf810de7ea80 rbx=0000000000000000 rcx=0000000000000003
rdx=ffff878386e8a158 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8007d23ba28 rsp=ffffa789ddd419d0 rbp=ffffbf810de79180
r8=0000000000000000 r9=000000022f50863c r10=0000000000000000
r11=ffffaf7cc7400000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po cy
nt!KiCommitThreadWait+0x528:
fffff800`7d23ba28 cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: ffffa789ddd41798 -- (.exr 0xffffa789ddd41798)
ExceptionAddress: fffff8007d23ba28 (nt!KiCommitThreadWait+0x0000000000000528)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
CPU_COUNT: c
CPU_MHZ: e09
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 71
CPU_STEPPING: 0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
BUGCHECK_STR: 0x139
PROCESS_NAME: RobloxPlayerBeta.exe
CURRENT_IRQL: 2
DEFAULT_BUCKET_ID: FAIL_FAST_CORRUPT_LIST_ENTRY
ERROR_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>
EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000003
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 12-31-2019 19:26:42.0387
ANALYSIS_VERSION: 10.0.18362.1 x86fre
LAST_CONTROL_TRANSFER: from fffff8007d3d32e9 to fffff8007d3c14e0
STACK_TEXT:
ffffa789`ddd41518 fffff800`7d3d32e9 : 00000000`00000139 00000000`00000003 ffffa789`ddd41840 ffffa789`ddd41798 : nt!KeBugCheckEx
ffffa789`ddd41520 fffff800`7d3d3710 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffa789`ddd41660 fffff800`7d3d1aa5 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffffa789`ddd41840 fffff800`7d23ba28 : ffff8783`86e8b080 ffffbf81`00000000 ffff8783`00000000 ffff8783`00000000 : nt!KiRaiseSecurityCheckFailure+0x325
ffffa789`ddd419d0 fffff800`7d3040e4 : 00000000`00000001 00000000`00000000 ffffa789`00000025 00000000`00000000 : nt!KiCommitThreadWait+0x528
ffffa789`ddd41a70 fffff800`7d8b0825 : ffffa789`ddd41b80 00000000`0977fab4 00000000`77763620 00000000`00000000 : nt!KeWaitForAlertByThreadId+0xd4
ffffa789`ddd41ad0 fffff800`7d3d2d18 : ffff8783`86e8b080 00000000`00000000 00000000`00000000 ffffffff`fffd8f00 : nt!NtWaitForAlertByThreadId+0x65
ffffa789`ddd41b00 00000000`77761cbc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`0967f218 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77761cbc
THREAD_SHA1_HASH_MOD_FUNC: 14426b7ada71c4972d6a006ea2472f886aab58a5
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 485142955ed66a9a6b1805ae908e3c5d2a70b069
THREAD_SHA1_HASH_MOD: cb5f414824c2521bcc505eaa03e92fa10922dad8
FOLLOWUP_IP:
nt!KiCommitThreadWait+528
fffff800`7d23ba28 cd29 int 29h
FAULT_INSTR_CODE: 894829cd
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: nt!KiCommitThreadWait+528
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 12dcb470
IMAGE_VERSION: 10.0.18362.535
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 528
FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiCommitThreadWait
BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiCommitThreadWait
PRIMARY_PROBLEM_CLASS: 0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiCommitThreadWait
TARGET_TIME: 2019-12-31T12:50:25.000Z
OSBUILD: 18362
OSSERVICEPACK: 535
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 784
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1980-01-11 18:53:20
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 16e0
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x139_3_corrupt_list_entry_ktimer_list_corruption_nt!kicommitthreadwait
FAILURE_ID_HASH: {369b7001-cfef-011b-6243-985c04f34d42}
Followup: MachineOwner
---------
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000000, A stack-based buffer has been overrun.
Arg2: 0000000000000000, Address of the trap frame for the exception that caused the bugcheck
Arg3: 0000000000000000, Address of the exception record for the exception that caused the bugcheck
Arg4: 000000000001003f, Reserved
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
SYSTEM_MANUFACTURER: Gigabyte Technology Co., Ltd.
SYSTEM_PRODUCT_NAME: B450M S2H
SYSTEM_SKU: Default string
SYSTEM_VERSION: Default string
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: F50
BIOS_DATE: 11/27/2019
BASEBOARD_MANUFACTURER: Gigabyte Technology Co., Ltd.
BASEBOARD_PRODUCT: B450M S2H
BASEBOARD_VERSION: x.x
DUMP_TYPE: 2
BUGCHECK_P1: 0
BUGCHECK_P2: 0
BUGCHECK_P3: 0
BUGCHECK_P4: 1003f
TRAP_FRAME: 0000000000000000 -- (.trap 0x0)
EXCEPTION_RECORD: 0000000000000000 -- (.exr 0x0)
Cannot read Exception record @ 0000000000000000
CPU_COUNT: c
CPU_MHZ: e09
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 71
CPU_STEPPING: 0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: 0x139
PROCESS_NAME: System
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 12-31-2019 19:26:38.0498
ANALYSIS_VERSION: 10.0.18362.1 x86fre
LAST_CONTROL_TRANSFER: from fffff807229c9f5b to fffff807229c14e0
STACK_TEXT:
fffffc01`1099c118 fffff807`229c9f5b : 00000000`00000139 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
fffffc01`1099c120 fffff807`250f5235 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff807`22839878 : nt!guard_icall_bugcheck+0x1b
fffffc01`1099c150 fffff807`250f14c2 : ffff9c0b`d35765e8 ffff9c0b`d3576460 ffff9c0b`d55cdc90 00000000`00000000 : FLTMGR!FltpPerfTraceOperationCallback+0x179
fffffc01`1099c1c0 fffff807`250e45a0 : fffffc01`1099c3a0 00000000`00004000 ffff9c0b`d63f4004 00000000`00020000 : FLTMGR!FltpPerformPreCallbacks+0xcd62
fffffc01`1099c2d0 fffff807`250e4112 : 00000000`00000000 fffffc01`1099c3a0 ffff9c0b`d63f4010 fffffc01`1099c3b0 : FLTMGR!FltpPassThroughInternal+0x90
fffffc01`1099c300 fffff807`250e3efe : fffffc01`1099c3a0 0a000001`20f409ff 0a000001`00000000 ffff9c0b`00000000 : FLTMGR!FltpPassThrough+0x162
fffffc01`1099c380 fffff807`22831f79 : ffff9c0b`d63f4010 fffff807`22831fb7 00000000`0000000d ffff9c0b`00000004 : FLTMGR!FltpDispatch+0x9e
fffffc01`1099c3e0 fffff807`22854493 : fffffc01`1099c4f0 ffff9c0b`d63f4010 ffff9c0b`d7ec2e80 ffff9c0b`cdf65d60 : nt!IofCallDriver+0x59
fffffc01`1099c420 fffff807`228fa730 : fffffc01`1099c4f0 fffffc01`1099c560 00000000`00000010 00000000`00000000 : nt!IoSynchronousPageWriteEx+0x137
fffffc01`1099c460 fffff807`228fa570 : 00000000`00000000 00000000`00000000 00000000`04200000 ffffd507`0f740000 : nt!MiZeroPageWrite+0x18c
fffffc01`1099c600 fffff807`228fa4d8 : 00000000`00200000 fffff807`25b21600 ffff9c0b`d7ec2e80 00000000`fffffe00 : nt!MmZeroPageWrite+0x48
fffffc01`1099c630 fffff807`228f9ddd : 00000000`00200000 00000000`01e00000 00000000`05a40000 0000001c`00000004 : nt!CcZeroDataOnDisk+0x38
fffffc01`1099c660 fffff807`25c43505 : ffffae80`edd8bb00 00000000`04200000 fffffc01`1099c788 00000000`00000001 : nt!CcZeroData+0x20d
fffffc01`1099c720 fffff807`25b0dca0 : ffff9c0b`d575a6d8 ffffae80`edd8bb40 ffff9c0b`d7ec2e80 00000000`00000700 : Ntfs!NtfsZeroData+0x13d
fffffc01`1099c800 fffff807`25b2199b : ffff9c0b`d575a6d8 fffff807`25b21600 00000000`00000000 ffff9c0b`d575a6d8 : Ntfs!NtfsCommonWrite+0x15c0
fffffc01`1099ca30 fffff807`228bd095 : ffff9c0b`cb690cc0 ffff9c0b`d2293040 ffff9c0b`cb690cc0 ffff9c0b`d575a768 : Ntfs!NtfsFspDispatch+0x39b
fffffc01`1099cb70 fffff807`2292a7a5 : ffff9c0b`d2293040 00000000`00000080 ffff9c0b`cb67b180 00000067`b4bbbdff : nt!ExpWorkerThread+0x105
fffffc01`1099cc10 fffff807`229c8b2a : ffffbe81`48f20180 ffff9c0b`d2293040 fffff807`2292a750 00000000`00000000 : nt!PspSystemThreadStartup+0x55
fffffc01`1099cc60 00000000`00000000 : fffffc01`1099d000 fffffc01`10997000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x2a
THREAD_SHA1_HASH_MOD_FUNC: f828e04b73a96012193978f497610b64b807883b
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: ef3acde718127db115b8bf657ef4ef14d3d60067
THREAD_SHA1_HASH_MOD: 6f7db1a4ec42380c703ddd74b8c05f452d17543d
FOLLOWUP_IP:
nt!guard_icall_bugcheck+1b
fffff807`229c9f5b 90 nop
FAULT_INSTR_CODE: ccccc390
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!guard_icall_bugcheck+1b
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 12dcb470
IMAGE_VERSION: 10.0.18362.535
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 1b
FAILURE_BUCKET_ID: 0x139_0_LEGACY_GS_VIOLATION_nt!guard_icall_bugcheck
BUCKET_ID: 0x139_0_LEGACY_GS_VIOLATION_nt!guard_icall_bugcheck
PRIMARY_PROBLEM_CLASS: 0x139_0_LEGACY_GS_VIOLATION_nt!guard_icall_bugcheck
TARGET_TIME: 2019-12-30T20:07:13.000Z
OSBUILD: 18362
OSSERVICEPACK: 535
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 784
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1980-01-11 18:53:20
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 83ba
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x139_0_legacy_gs_violation_nt!guard_icall_bugcheck
FAILURE_ID_HASH: {9bee41a7-2ef9-07ca-7e59-7d5a0c6e2d05}
Followup: MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 0000000000000095, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8043aa22838, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
SYSTEM_MANUFACTURER: Gigabyte Technology Co., Ltd.
SYSTEM_PRODUCT_NAME: B450M S2H
SYSTEM_SKU: Default string
SYSTEM_VERSION: Default string
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: F50
BIOS_DATE: 11/27/2019
BASEBOARD_MANUFACTURER: Gigabyte Technology Co., Ltd.
BASEBOARD_PRODUCT: B450M S2H
BASEBOARD_VERSION: x.x
DUMP_TYPE: 2
BUGCHECK_P1: 0
BUGCHECK_P2: ff
BUGCHECK_P3: 95
BUGCHECK_P4: fffff8043aa22838
WRITE_ADDRESS: fffff8043af733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
0000000000000000
CURRENT_IRQL: 0
FAULTING_IP:
nt!PpmIdlePrepare+448
fffff804`3aa22838 488901 mov qword ptr [rcx],rax
CPU_COUNT: c
CPU_MHZ: e09
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 71
CPU_STEPPING: 0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: System
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 12-31-2019 19:26:46.0931
ANALYSIS_VERSION: 10.0.18362.1 x86fre
TRAP_FRAME: ffff91034deb5780 -- (.trap 0xffff91034deb5780)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8043aa22838 rsp=ffff91034deb5910 rbp=ffff91034deb5a10
r8=00000000ffffffff r9=ffff9d00ee312100 r10=ffffe08ec097c000
r11=0000000000000001 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di pl zr na po nc
nt!PpmIdlePrepare+0x448:
fffff804`3aa22838 488901 mov qword ptr [rcx],rax ds:00000000`00000000=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8043abd32e9 to fffff8043abc14e0
STACK_TEXT:
ffff9103`4deb5638 fffff804`3abd32e9 : 00000000`0000000a 00000000`00000000 00000000`000000ff 00000000`00000095 : nt!KeBugCheckEx
ffff9103`4deb5640 fffff804`3abcf62b : 00000000`00000000 00000000`00000000 00000000`00000886 fffff804`3acf024b : nt!KiBugCheckDispatch+0x69
ffff9103`4deb5780 fffff804`3aa22838 : ffffffff`ffffffff ffff9103`4deb5a10 ffff9d00`ee312180 ffff9d00`ee312180 : nt!KiPageFault+0x46b
ffff9103`4deb5910 fffff804`3aa21446 : 00000000`00000003 00000000`00000002 ffffe08e`c0910100 00000000`00000008 : nt!PpmIdlePrepare+0x448
ffff9103`4deb5b00 fffff804`3abc4fe8 : ffffffff`00000000 ffff9d00`ee312180 ffffe08e`b8ba5080 00000000`0000033c : nt!PoIdle+0x1e6
ffff9103`4deb5c60 00000000`00000000 : ffff9103`4deb6000 ffff9103`4deb0000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x48
THREAD_SHA1_HASH_MOD_FUNC: bac30f8031bbad40506eeaabc9b982d6623c8637
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 1d218439fbd5de278f21e1c7bd3c7281d77df1b6
THREAD_SHA1_HASH_MOD: ee8fcf1fb60cb6e3e2f60ddbed2ec02b5748a693
FOLLOWUP_IP:
nt!PpmIdlePrepare+448
fffff804`3aa22838 488901 mov qword ptr [rcx],rax
FAULT_INSTR_CODE: 8b018948
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!PpmIdlePrepare+448
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 12dcb470
IMAGE_VERSION: 10.0.18362.535
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 448
FAILURE_BUCKET_ID: AV_nt!PpmIdlePrepare
BUCKET_ID: AV_nt!PpmIdlePrepare
PRIMARY_PROBLEM_CLASS: AV_nt!PpmIdlePrepare
TARGET_TIME: 2019-12-31T13:41:44.000Z
OSBUILD: 18362
OSSERVICEPACK: 535
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 784
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1980-01-11 18:53:20
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 4b1c
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_nt!ppmidleprepare
FAILURE_ID_HASH: {dd7d0096-4602-c4e5-a984-978d6ab3aa71}
Followup: MachineOwner
---------