S
shiftey77
Guest
here is the bugcheck analysis/ this happened while i was gaming
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80780208c89, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 000000176580af7a, Parameter 1 of the exception
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1468
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on SHIFTMEISTER
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 9936
Key : Analysis.Memory.CommitPeak.Mb
Value: 77
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
BUGCHECK_CODE: 1e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff80780208c89
BUGCHECK_P3: 0
BUGCHECK_P4: 176580af7a
READ_ADDRESS: fffff80780afb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80780a0f330: Unable to get Flags value from nt!KdVersionBlock
fffff80780a0f330: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
000000176580af7a
EXCEPTION_PARAMETER2: 000000176580af7a
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: ffff800000000000 -- (.trap 0xffff800000000000)
Unable to read trap frame at ffff8000`00000000
STACK_TEXT:
ffffcc8c`9224e418 fffff807`802f4cfe : 00000000`0000001e ffffffff`c0000005 fffff807`80208c89 00000000`00000000 : nt!KeBugCheckEx
ffffcc8c`9224e420 fffff807`801fe93f : fffff807`802f4cdc 00000000`00000000 00000000`00000000 00000000`00000000 : nt!HvlpVtlCallExceptionHandler+0x22
ffffcc8c`9224e460 fffff807`8012bf97 : ffffcc8c`9224e9d0 00000000`00000000 ffffcc8c`9224fb60 fffff807`801f95a4 : nt!RtlpExecuteHandlerForException+0xf
ffffcc8c`9224e490 fffff807`8012ab86 : ffffcc8c`9224f3a8 ffffcc8c`9224f0e0 ffffcc8c`9224f3a8 00000000`00000003 : nt!RtlDispatchException+0x297
ffffcc8c`9224ebb0 fffff807`80207bac : 00000000`00001000 ffffcc8c`9224f450 ffff8000`00000000 00000000`00000000 : nt!KiDispatchException+0x186
ffffcc8c`9224f270 fffff807`80203d43 : 00000000`00000000 fffff807`801fbf5b 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0x12c
ffffcc8c`9224f450 fffff807`80208c89 : fffff807`80071b93 ffffa788`41e92368 00000000`00000000 00000017`64716da8 : nt!KiPageFault+0x443
ffffcc8c`9224f5e8 fffff807`80071b93 : ffffa788`41e92368 00000000`00000000 00000017`64716da8 00000000`00000000 : nt!memset+0x9
ffffcc8c`9224f5f0 fffff807`80070154 : 00000000`00000000 00001fa0`00000200 00000000`00000003 00000000`00000002 : nt!PpmIdleExecuteTransition+0x18c3
ffffcc8c`9224f9f0 fffff807`801f95a4 : ffffffff`00000000 ffffcf80`f404b440 ffffa788`4cf53080 00000000`000006f6 : nt!PoIdle+0x374
ffffcc8c`9224fb60 00000000`00000000 : ffffcc8c`92250000 ffffcc8c`92249000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x54
SYMBOL_NAME: nt!HvlpVtlCallExceptionHandler+22
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.804
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 22
FAILURE_BUCKET_ID: 0x1E_c0000005_R_nt!HvlpVtlCallExceptionHandler
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {54c01c2d-844b-456b-978f-b9c94e11c051}
Followup: MachineOwner
---------
Continue reading...
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80780208c89, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 000000176580af7a, Parameter 1 of the exception
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1468
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on SHIFTMEISTER
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 9936
Key : Analysis.Memory.CommitPeak.Mb
Value: 77
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
BUGCHECK_CODE: 1e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff80780208c89
BUGCHECK_P3: 0
BUGCHECK_P4: 176580af7a
READ_ADDRESS: fffff80780afb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80780a0f330: Unable to get Flags value from nt!KdVersionBlock
fffff80780a0f330: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
000000176580af7a
EXCEPTION_PARAMETER2: 000000176580af7a
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: ffff800000000000 -- (.trap 0xffff800000000000)
Unable to read trap frame at ffff8000`00000000
STACK_TEXT:
ffffcc8c`9224e418 fffff807`802f4cfe : 00000000`0000001e ffffffff`c0000005 fffff807`80208c89 00000000`00000000 : nt!KeBugCheckEx
ffffcc8c`9224e420 fffff807`801fe93f : fffff807`802f4cdc 00000000`00000000 00000000`00000000 00000000`00000000 : nt!HvlpVtlCallExceptionHandler+0x22
ffffcc8c`9224e460 fffff807`8012bf97 : ffffcc8c`9224e9d0 00000000`00000000 ffffcc8c`9224fb60 fffff807`801f95a4 : nt!RtlpExecuteHandlerForException+0xf
ffffcc8c`9224e490 fffff807`8012ab86 : ffffcc8c`9224f3a8 ffffcc8c`9224f0e0 ffffcc8c`9224f3a8 00000000`00000003 : nt!RtlDispatchException+0x297
ffffcc8c`9224ebb0 fffff807`80207bac : 00000000`00001000 ffffcc8c`9224f450 ffff8000`00000000 00000000`00000000 : nt!KiDispatchException+0x186
ffffcc8c`9224f270 fffff807`80203d43 : 00000000`00000000 fffff807`801fbf5b 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0x12c
ffffcc8c`9224f450 fffff807`80208c89 : fffff807`80071b93 ffffa788`41e92368 00000000`00000000 00000017`64716da8 : nt!KiPageFault+0x443
ffffcc8c`9224f5e8 fffff807`80071b93 : ffffa788`41e92368 00000000`00000000 00000017`64716da8 00000000`00000000 : nt!memset+0x9
ffffcc8c`9224f5f0 fffff807`80070154 : 00000000`00000000 00001fa0`00000200 00000000`00000003 00000000`00000002 : nt!PpmIdleExecuteTransition+0x18c3
ffffcc8c`9224f9f0 fffff807`801f95a4 : ffffffff`00000000 ffffcf80`f404b440 ffffa788`4cf53080 00000000`000006f6 : nt!PoIdle+0x374
ffffcc8c`9224fb60 00000000`00000000 : ffffcc8c`92250000 ffffcc8c`92249000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x54
SYMBOL_NAME: nt!HvlpVtlCallExceptionHandler+22
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.804
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 22
FAILURE_BUCKET_ID: 0x1E_c0000005_R_nt!HvlpVtlCallExceptionHandler
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {54c01c2d-844b-456b-978f-b9c94e11c051}
Followup: MachineOwner
---------
Continue reading...