Was just watching YouTube.. Then screen bugged out and computer restarted.
CPU: Intel Core i9-10850k
Cooler: NZXT Kraken Z73
Motherboard: ASUS ROG MAXIMUS XII HERO
RAM: G.SKILL Trident Z Royal Series 32GB (4 x 8GB)
GPU: MSI Ventus OC RTX 3090
SSD: 2x - Samsung 970 Evo Plus 1tb
PSU: CORSAIR RMx Series RM1000X 1000W
Windows 10 Pro 64 bit
Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\122520-6984-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (20 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff805
Debug session time: Fri Dec 25 05:36:55.957 2020 (UTC - 5:00)
System Uptime: 5 days 16:23:45.099
Loading Kernel Symbols
...............................................................
................................................................
................................................................
................
Loading User Symbols
Loading unloaded module list
..................................................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff805
14: kd> !analyze -v
***
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8053fbf7440, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2499
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-2ICD2A2
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 10880
Key : Analysis.Memory.CommitPeak.Mb
Value: 86
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff8053fbf7440
BUGCHECK_P3: 0
BUGCHECK_P4: ffffffffffffffff
READ_ADDRESS: fffff805402fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8054020f330: Unable to get Flags value from nt!KdVersionBlock
fffff8054020f330: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffffffffffffff
EXCEPTION_PARAMETER2: ffffffffffffffff
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: audiodg.exe
STACK_TEXT:
fffffa83
fffffa83
fffffa83
fffffa83
fffffa83
fffffa83
000000dd
SYMBOL_NAME: nt!NtWaitForMultipleObjects+140
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.685
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 140
FAILURE_BUCKET_ID: 0x1E_c0000005_R_nt!NtWaitForMultipleObjects
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {527de698-4961-0045-3a8e-96215bf96b96}
Followup: MachineOwner
---------
CPU: Intel Core i9-10850k
Cooler: NZXT Kraken Z73
Motherboard: ASUS ROG MAXIMUS XII HERO
RAM: G.SKILL Trident Z Royal Series 32GB (4 x 8GB)
GPU: MSI Ventus OC RTX 3090
SSD: 2x - Samsung 970 Evo Plus 1tb
PSU: CORSAIR RMx Series RM1000X 1000W
Windows 10 Pro 64 bit
Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\122520-6984-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (20 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff805
3f600000 PsLoadedModuleList = 0xfffff805
4022a2b0Debug session time: Fri Dec 25 05:36:55.957 2020 (UTC - 5:00)
System Uptime: 5 days 16:23:45.099
Loading Kernel Symbols
...............................................................
................................................................
................................................................
................
Loading User Symbols
Loading unloaded module list
..................................................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff805
3f9f5780 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffffa83
16e2ef50=000000000000001e14: kd> !analyze -v
***
- *
- Bugcheck Analysis *
- *
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8053fbf7440, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2499
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-2ICD2A2
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 10880
Key : Analysis.Memory.CommitPeak.Mb
Value: 86
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff8053fbf7440
BUGCHECK_P3: 0
BUGCHECK_P4: ffffffffffffffff
READ_ADDRESS: fffff805402fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8054020f330: Unable to get Flags value from nt!KdVersionBlock
fffff8054020f330: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffffffffffffff
EXCEPTION_PARAMETER2: ffffffffffffffff
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: audiodg.exe
STACK_TEXT:
fffffa83
16e2ef48 fffff805
3fa9128d : 000000000000001e ffffffff
c0000005 fffff8053fbf7440 00000000
00000000 : nt!KeBugCheckExfffffa83
16e2ef50 fffff805
3fa078ac : 0000000000000000 00000000
00000000 0000000000000000 00000000
00000000 : nt!KiDispatchException+0x16688dfffffa83
16e2f610 fffff805
3fa035e0 : 0000000000000000 00000000
00000000 0000000000000000 00000000
00000000 : nt!KiExceptionDispatch+0x12cfffffa83
16e2f7f0 fffff805
3fbf7440 : fffff8053fa071b5 00000000
00000000 fffffa8316e2fa80 ffffd70c
05d74240 : nt!KiGeneralProtectionFault+0x320fffffa83
16e2f988 fffff805
3fa071b5 : 0000000000000000 fffffa83
16e2fa80 ffffd70c05d74240 ffffd70c
08ace470 : nt!NtWaitForMultipleObjects+0x140fffffa83
16e2f990 00007ffb
67fccb04 : 0000000000000000 00000000
00000000 0000000000000000 00000000
00000000 : nt!KiSystemServiceCopyEnd+0x25000000dd
e25ff3d8 00000000
00000000 : 0000000000000000 00000000
00000000 0000000000000000 00000000
00000000 : 0x00007ffb`67fccb04SYMBOL_NAME: nt!NtWaitForMultipleObjects+140
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.685
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 140
FAILURE_BUCKET_ID: 0x1E_c0000005_R_nt!NtWaitForMultipleObjects
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {527de698-4961-0045-3a8e-96215bf96b96}
Followup: MachineOwner
---------