*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8062d2f01d0, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 8375
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-J7A11VA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 42447
Key : Analysis.Memory.CommitPeak.Mb
Value: 90
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff8062d2f01d0
BUGCHECK_P3: 0
BUGCHECK_P4: 0
READ_ADDRESS: fffff8062d8fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8062d80f340: Unable to get Flags value from nt!KdVersionBlock
fffff8062d80f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000000
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: dwm.exe
TRAP_FRAME: ffff800000000000 -- (.trap 0xffff800000000000)
Unable to read trap frame at ffff8000`00000000
STACK_TEXT:
ffff808c`1369f4e8 fffff806`2d030105 : 00000000`0000001e ffffffff`c0000005 fffff806`2d2f01d0 00000000`00000000 : nt!KeBugCheckEx
ffff808c`1369f4f0 fffff806`2d0066ac : 00000000`00001000 ffff808c`1369fd90 ffff8000`00000000 00000000`00000000 : nt!KiDispatchException+0x1de8e5
ffff808c`1369fbb0 fffff806`2d002843 : ffff808c`1369fe81 fffff806`2cecaa71 ffff980f`3e010340 ffff980f`3e012e80 : nt!KiExceptionDispatch+0x12c
ffff808c`1369fd90 fffff806`2d2f01d0 : fffff806`2d2bc582 00000000`000000c0 ffff808c`1369ff70 00000000`00000000 : nt!KiPageFault+0x443
ffff808c`1369ff28 fffff806`2d2bc582 : 00000000`000000c0 ffff808c`1369ff70 00000000`00000000 fffff806`00000000 : nt!ExpLookupHandleTableEntry
ffff808c`1369ff30 fffff806`2d2bc429 : 00000000`00000000 ffff980f`459d9080 00000000`00000000 ffff808c`136a0601 : nt!ObWaitForMultipleObjects+0x122
ffff808c`136a0430 fffff806`2d005fb8 : fffff806`2cff0690 fffff806`2ce7460a ffff980f`459d9080 00000000`00000000 : nt!NtWaitForMultipleObjects+0x119
ffff808c`136a06c0 fffff806`2cff8400 : fffff806`3629e08d ffff8783`05c84990 ffff8783`00000000 ffff8783`05c84990 : nt!KiSystemServiceCopyEnd+0x28
ffff808c`136a08c8 fffff806`3629e08d : ffff8783`05c84990 ffff8783`00000000 ffff8783`05c84990 00000000`00000000 : nt!KiServiceLinkage
ffff808c`136a08d0 fffff806`3629d719 : 00000000`00000000 ffff980f`47543ee0 ffff8783`0e60a360 fffff806`362a2c53 : dxgkrnl!CTokenManager::ProcessTokens+0x1bd
ffff808c`136a0990 fffff806`362a2b8d : 00000000`00000000 ffff808c`136a0b80 ffff8783`0e60a360 fffff806`2d2e23f6 : dxgkrnl!CTokenManager::TokenThread+0x79
ffff808c`136a09e0 fffff806`2d005fb8 : ffff980f`459d9080 000001fa`95189ee8 00000000`00000020 ffff808c`136a0b80 : dxgkrnl!NtTokenManagerThread+0x1bd
ffff808c`136a0b00 00007ff8`44298304 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000096`7eeffb68 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`44298304
SYMBOL_NAME: dxgkrnl!CTokenManager::ProcessTokens+1bd
MODULE_NAME: dxgkrnl
IMAGE_NAME: dxgkrnl.sys
IMAGE_VERSION: 10.0.19041.546
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 1bd
FAILURE_BUCKET_ID: 0x1E_c0000005_R_dxgkrnl!CTokenManager::ProcessTokens
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {58736931-a2cb-f30c-610a-4966ec3d47f8}
Followup: MachineOwner
---------*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffbe06ee010340, memory referenced.
Arg2: 0000000000000011, value 0 = read operation, 1 = write operation.
Arg3: ffffbe06ee010340, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 8937
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-J7A11VA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 31353
Key : Analysis.Memory.CommitPeak.Mb
Value: 80
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 50
BUGCHECK_P1: ffffbe06ee010340
BUGCHECK_P2: 11
BUGCHECK_P3: ffffbe06ee010340
BUGCHECK_P4: 2
WRITE_ADDRESS: fffff8002d0fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8002d00f340: Unable to get Flags value from nt!KdVersionBlock
fffff8002d00f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffbe06ee010340
MM_INTERNAL_CODE: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: dwm.exe
TRAP_FRAME: ffff8f09174d7bf0 -- (.trap 0xffff8f09174d7bf0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000002 rbx=0000000000000000 rcx=ffff8f09174d7ec0
rdx=000000000000003b rsi=0000000000000000 rdi=0000000000000000
rip=ffffbe06ee010340 rsp=ffff8f09174d7d80 rbp=ffffcf00a9ccf180
r8=00000001000001bb r9=ffffcf00a9ccf180 r10=ffffbe06f6b8f340
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
ffffbe06`ee010340 0001 add byte ptr [rcx],al ds:ffff8f09`174d7ec0=00
Resetting default scope
STACK_TEXT:
ffff8f09`174d7948 fffff800`2c879b57 : 00000000`00000050 ffffbe06`ee010340 00000000`00000011 ffff8f09`174d7bf0 : nt!KeBugCheckEx
ffff8f09`174d7950 fffff800`2c6ea5e0 : ff1fe313`00000011 00000000`00000011 ffff8f09`174d7c70 00000000`00000000 : nt!MiSystemFault+0x1716c7
ffff8f09`174d7a50 fffff800`2c80275e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x400
ffff8f09`174d7bf0 ffffbe06`ee010340 : 00000000`00000004 00000000`00000001 ffff8f09`174d7ec0 fffff800`00000000 : nt!KiPageFault+0x35e
ffff8f09`174d7d80 00000000`00000004 : 00000000`00000001 ffff8f09`174d7ec0 fffff800`00000000 ffffbe06`ee010340 : 0xffffbe06`ee010340
ffff8f09`174d7d88 00000000`00000001 : ffff8f09`174d7ec0 fffff800`00000000 ffffbe06`ee010340 ffffbe06`ee012bc0 : 0x4
ffff8f09`174d7d90 ffff8f09`174d7ec0 : fffff800`00000000 ffffbe06`ee010340 ffffbe06`ee012bc0 ffffbe06`ee012e00 : 0x1
ffff8f09`174d7d98 fffff800`00000000 : ffffbe06`ee010340 ffffbe06`ee012bc0 ffffbe06`ee012e00 00000000`00000000 : 0xffff8f09`174d7ec0
ffff8f09`174d7da0 ffffbe06`ee010340 : ffffbe06`ee012bc0 ffffbe06`ee012e00 00000000`00000000 00000000`00000000 : 0xfffff800`00000000
ffff8f09`174d7da8 ffffbe06`ee012bc0 : ffffbe06`ee012e00 00000000`00000000 00000000`00000000 00000000`00000000 : 0xffffbe06`ee010340
ffff8f09`174d7db0 ffffbe06`ee012e00 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xffffbe06`ee012bc0
ffff8f09`174d7db8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xffffbe06`ee012e00
SYMBOL_NAME: nt!MiSystemFault+1716c7
MODULE_NAME: nt
IMAGE_VERSION: 10.0.19041.572
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 1716c7
FAILURE_BUCKET_ID: AV_INVALID_nt!MiSystemFault
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {8a33c6b1-a9f1-4efe-025b-a861cc33d6e2}
Followup: MachineOwner
---------*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff803738f01d0, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 7249
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-J7A11VA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 26693
Key : Analysis.Memory.CommitPeak.Mb
Value: 82
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff803738f01d0
BUGCHECK_P3: 0
BUGCHECK_P4: 0
READ_ADDRESS: fffff80373efb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80373e0f340: Unable to get Flags value from nt!KdVersionBlock
fffff80373e0f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000000
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: dwm.exe
TRAP_FRAME: ffff800000000000 -- (.trap 0xffff800000000000)
Unable to read trap frame at ffff8000`00000000
STACK_TEXT:
ffffc38f`1ce524e8 fffff803`73630105 : 00000000`0000001e ffffffff`c0000005 fffff803`738f01d0 00000000`00000000 : nt!KeBugCheckEx
ffffc38f`1ce524f0 fffff803`736066ac : 00000000`00001000 ffffc38f`1ce52d90 ffff8000`00000000 00000000`00000000 : nt!KiDispatchException+0x1de8e5
ffffc38f`1ce52bb0 fffff803`73602843 : ffffc38f`1ce52e81 fffff803`734caa71 ffffdb0c`32010340 ffffdb0c`32014480 : nt!KiExceptionDispatch+0x12c
ffffc38f`1ce52d90 fffff803`738f01d0 : fffff803`738bc582 00000000`000000c0 ffffc38f`1ce52f70 00000000`00000000 : nt!KiPageFault+0x443
ffffc38f`1ce52f28 fffff803`738bc582 : 00000000`000000c0 ffffc38f`1ce52f70 00000000`00000000 fffff803`00000000 : nt!ExpLookupHandleTableEntry
ffffc38f`1ce52f30 fffff803`738bc429 : 00000000`00000006 00000000`00000001 00000000`00000000 00000000`00000005 : nt!ObWaitForMultipleObjects+0x122
ffffc38f`1ce53430 fffff803`73605fb8 : 00000000`00000000 00001f80`00000000 ffffdb0c`3b22c5c0 00000000`00000000 : nt!NtWaitForMultipleObjects+0x119
ffffc38f`1ce536c0 fffff803`735f8400 : fffff803`8141e08d ffffc883`df278b90 ffffc883`00000000 ffffc883`df278b90 : nt!KiSystemServiceCopyEnd+0x28
ffffc38f`1ce538c8 fffff803`8141e08d : ffffc883`df278b90 ffffc883`00000000 ffffc883`df278b90 00000000`00000000 : nt!KiServiceLinkage
ffffc38f`1ce538d0 fffff803`8141d719 : 00000000`00000000 ffffdb0c`3cd2f3e0 ffffc883`e64c4920 fffff803`81422c53 : dxgkrnl!CTokenManager::ProcessTokens+0x1bd
ffffc38f`1ce53990 fffff803`81422b8d : 00000000`00000000 ffffc38f`1ce53b80 ffffc883`e64c4920 fffff803`00000002 : dxgkrnl!CTokenManager::TokenThread+0x79
ffffc38f`1ce539e0 fffff803`73605fb8 : ffffdb0c`3b22c5c0 00000255`b3802298 00000000`00000020 00000000`00000000 : dxgkrnl!NtTokenManagerThread+0x1bd
ffffc38f`1ce53b00 00007fff`dd2f8304 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000072`f2f7fd98 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`dd2f8304
SYMBOL_NAME: dxgkrnl!CTokenManager::ProcessTokens+1bd
MODULE_NAME: dxgkrnl
IMAGE_NAME: dxgkrnl.sys
IMAGE_VERSION: 10.0.19041.546
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 1bd
FAILURE_BUCKET_ID: 0x1E_c0000005_R_dxgkrnl!CTokenManager::ProcessTokens
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {58736931-a2cb-f30c-610a-4966ec3d47f8}
Followup: MachineOwner
---------*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffd78ad1eed7d0, memory referenced.
Arg2: 0000000000000011, value 0 = read operation, 1 = write operation.
Arg3: ffffd78ad1eed7d0, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 8249
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-J7A11VA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 28328
Key : Analysis.Memory.CommitPeak.Mb
Value: 90
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 50
BUGCHECK_P1: ffffd78ad1eed7d0
BUGCHECK_P2: 11
BUGCHECK_P3: ffffd78ad1eed7d0
BUGCHECK_P4: 2
WRITE_ADDRESS: fffff807082fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8070820f340: Unable to get Flags value from nt!KdVersionBlock
fffff8070820f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffd78ad1eed7d0
MM_INTERNAL_CODE: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: NVIDIA Share.exe
TRAP_FRAME: ffffd78ad2139d80 -- (.trap 0xffffd78ad2139d80)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffd78ad1eed7d0 rbx=0000000000000000 rcx=ffff8a03ee05d240
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=ffffd78ad1eed7d0 rsp=ffffd78ad2139f18 rbp=ffffd78ad213a009
r8=0000000100000045 r9=ffffda01794cf180 r10=0000ffffd78ad1ee
r11=ffffc9fd34600000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
ffffd78a`d1eed7d0 40fd std
Resetting default scope
STACK_TEXT:
ffffd78a`d2139ad8 fffff807`07a79b57 : 00000000`00000050 ffffd78a`d1eed7d0 00000000`00000011 ffffd78a`d2139d80 : nt!KeBugCheckEx
ffffd78a`d2139ae0 fffff807`078ea5e0 : 00000000`001f0003 00000000`00000011 ffffd78a`d2139e00 00000000`00000000 : nt!MiSystemFault+0x1716c7
ffffd78a`d2139be0 fffff807`07a0275e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x400
ffffd78a`d2139d80 ffffd78a`d1eed7d0 : fffff807`0792fa82 00000000`00000000 00000000`00000000 ffff8a03`d6ee16c0 : nt!KiPageFault+0x35e
ffffd78a`d2139f18 fffff807`0792fa82 : 00000000`00000000 00000000`00000000 ffff8a03`d6ee16c0 fffff807`07600000 : 0xffffd78a`d1eed7d0
ffffd78a`d2139f20 ffffab89`ee44ee85 : 00000000`00000000 00000000`00000000 00000000`00000001 ffff8a03`d6ee16c0 : nt!KeQueryPerformanceCounter+0x112
ffffd78a`d2139f50 ffffab89`ef645037 : 00000000`000186a0 00000000`00000102 ffffd78a`d213a0c0 00000000`00000000 : win32kbase!EnterCrit+0x55
ffffd78a`d213a070 ffffab89`ef547a5e : 00000000`00000000 ffffabb9`85f47350 00000000`00000004 00000000`00001cff : win32kfull!xxxMsgWaitForMultipleObjectsEx+0x103
ffffd78a`d213a120 ffffab89`ee736fcf : ffffd78a`d213aaa8 00000000`00000000 00000065`00000004 ffffd78a`00001cff : win32kfull!NtUserMsgWaitForMultipleObjectsEx+0x3fe
ffffd78a`d213aa50 fffff807`07a05fb8 : 00000065`69f9fb00 00000000`00000108 00000000`00000040 00000065`69f9f300 : win32k!NtUserMsgWaitForMultipleObjectsEx+0x1f
ffffd78a`d213aa90 00007ff8`9f46a104 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000065`69f9f988 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`9f46a104
SYMBOL_NAME: win32kbase!EnterCrit+55
MODULE_NAME: win32kbase
IMAGE_NAME: win32kbase.sys
IMAGE_VERSION: 10.0.19041.572
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 55
FAILURE_BUCKET_ID: AV_INVALID_win32kbase!EnterCrit
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {2dee8c85-5155-4e28-b094-d21d7943ce11}
Followup: MachineOwner
---------*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffff928a49010340, memory referenced.
Arg2: 0000000000000011, value 0 = read operation, 1 = write operation.
Arg3: ffff928a49010340, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 7593
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-J7A11VA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 51433
Key : Analysis.Memory.CommitPeak.Mb
Value: 75
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 50
BUGCHECK_P1: ffff928a49010340
BUGCHECK_P2: 11
BUGCHECK_P3: ffff928a49010340
BUGCHECK_P4: 2
WRITE_ADDRESS: fffff80418efb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80418e0f340: Unable to get Flags value from nt!KdVersionBlock
fffff80418e0f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffff928a49010340
MM_INTERNAL_CODE: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: dwm.exe
TRAP_FRAME: ffffdd8e57eb4bf0 -- (.trap 0xffffdd8e57eb4bf0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000002 rbx=0000000000000000 rcx=ffffdd8e57eb4ec0
rdx=00000000000000e8 rsi=0000000000000000 rdi=0000000000000000
rip=ffff928a49010340 rsp=ffffdd8e57eb4d80 rbp=ffffa6802b0cf180
r8=000000010000000e r9=ffffa6802b0cf180 r10=ffff928a4fbdc0c0
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
ffff928a`49010340 0001 add byte ptr [rcx],al ds:ffffdd8e`57eb4ec0=00
Resetting default scope
STACK_TEXT:
ffffdd8e`57eb4948 fffff804`18679b57 : 00000000`00000050 ffff928a`49010340 00000000`00000011 ffffdd8e`57eb4bf0 : nt!KeBugCheckEx
ffffdd8e`57eb4950 fffff804`184ea5e0 : 00000158`cc209e20 00000000`00000011 ffffdd8e`57eb4c70 00000000`00000000 : nt!MiSystemFault+0x1716c7
ffffdd8e`57eb4a50 fffff804`1860275e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x400
ffffdd8e`57eb4bf0 ffff928a`49010340 : 00000000`00000004 00000000`00000000 ffffdd8e`57eb4ec0 fffff804`00000000 : nt!KiPageFault+0x35e
ffffdd8e`57eb4d80 00000000`00000004 : 00000000`00000000 ffffdd8e`57eb4ec0 fffff804`00000000 ffff928a`49010340 : 0xffff928a`49010340
ffffdd8e`57eb4d88 00000000`00000000 : ffffdd8e`57eb4ec0 fffff804`00000000 ffff928a`49010340 ffff928a`49014480 : 0x4
SYMBOL_NAME: nt!MiSystemFault+1716c7
MODULE_NAME: nt
IMAGE_VERSION: 10.0.19041.572
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 1716c7
FAILURE_BUCKET_ID: AV_INVALID_nt!MiSystemFault
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {8a33c6b1-a9f1-4efe-025b-a861cc33d6e2}
Followup: MachineOwner
---------