Hey guys, first post on here so I'll do my best to be as descriptive as possible. Built a new PC I guess what has now been about a month ago - it ran well for about a week after I built it and then I started to get spurious BSOD's. Often.
SYSTEM_SERVICE_EXCEPTION & MEMORY_MANAGEMENT are the two most frequent stop codes I get. There've been a couple others, but my PC didn't create a minidump of the crash so I don't have much data on it. A few of them have been Kernel related stop-codes, I know that much
SPECS
W11 Home
Mobo - MSi MS-7D25
cpu - 12th Gen Intel i7-12700KF
ram - 32GB ddr5 5200hmz (?) if i recall, it's decent ram
gpu - NVIDIA Geforce RTX 4060Ti 12GB
ssd - WD Blue SN580 1tb
What seems weird is it'll only really happen after I power up my PC for the evening (I mostly just game or surf twitch/youtube. usually while i game).
I'll have like 2 or 3 reboots due to BSOD's with the stop-code's listed above in bold, and then it seems to work itself out and not happen for the rest of the evening. Weird?
I'm going to post the minidump data, hopefully this is what you guys would need to assist me in diagnosing the issue.
*******NUMBER ONE FROM THIS EVENING********
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000003470, The subtype of the BugCheck.
Arg2: fffff8868f16f000
Arg3: c8c70eb9a1124baf
Arg4: 88c70eb9a9124baf
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 734
Key : Analysis.Elapsed.mSec
Value: 2738
Key : Analysis.IO.Other.Mb
Value: 2
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 9
Key : Analysis.Init.CPU.mSec
Value: 202
Key : Analysis.Init.Elapsed.mSec
Value: 4678
Key : Analysis.Memory.CommitPeak.Mb
Value: 99
Key : Bugcheck.Code.LegacyAPI
Value: 0x1a
Key : Bugcheck.Code.TargetModel
Value: 0x1a
Key : Dump.Attributes.AsUlong
Value: 1808
Key : Dump.Attributes.DiagDataWrittenToHeader
Value: 1
Key : Dump.Attributes.ErrorCode
Value: 0
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
Key : Dump.Attributes.LastLine
Value: Dump completed successfully.
Key : Dump.Attributes.ProgressPercentage
Value: 0
Key : Failure.Bucket
Value: 0x1a_3470_win32kfull!fnHkINLPMSG
Key : Failure.Hash
Value: {869b9042-39aa-8662-1d5d-0d66074374f2}
Key : Hypervisor.Enlightenments.ValueHex
Value: 1417df84
Key : Hypervisor.Flags.AnyHypervisorPresent
Value: 1
Key : Hypervisor.Flags.ApicEnlightened
Value: 0
Key : Hypervisor.Flags.ApicVirtualizationAvailable
Value: 1
Key : Hypervisor.Flags.AsyncMemoryHint
Value: 0
Key : Hypervisor.Flags.CoreSchedulerRequested
Value: 0
Key : Hypervisor.Flags.CpuManager
Value: 1
Key : Hypervisor.Flags.DeprecateAutoEoi
Value: 1
Key : Hypervisor.Flags.DynamicCpuDisabled
Value: 1
Key : Hypervisor.Flags.Epf
Value: 0
Key : Hypervisor.Flags.ExtendedProcessorMasks
Value: 1
Key : Hypervisor.Flags.HardwareMbecAvailable
Value: 1
Key : Hypervisor.Flags.MaxBankNumber
Value: 0
Key : Hypervisor.Flags.MemoryZeroingControl
Value: 0
Key : Hypervisor.Flags.NoExtendedRangeFlush
Value: 0
Key : Hypervisor.Flags.NoNonArchCoreSharing
Value: 1
Key : Hypervisor.Flags.Phase0InitDone
Value: 1
Key : Hypervisor.Flags.PowerSchedulerQos
Value: 0
Key : Hypervisor.Flags.RootScheduler
Value: 0
Key : Hypervisor.Flags.SynicAvailable
Value: 1
Key : Hypervisor.Flags.UseQpcBias
Value: 0
Key : Hypervisor.Flags.Value
Value: 21631230
Key : Hypervisor.Flags.ValueHex
Value: 14a10fe
Key : Hypervisor.Flags.VpAssistPage
Value: 1
Key : Hypervisor.Flags.VsmAvailable
Value: 1
Key : Hypervisor.RootFlags.AccessStats
Value: 1
Key : Hypervisor.RootFlags.CrashdumpEnlightened
Value: 1
Key : Hypervisor.RootFlags.CreateVirtualProcessor
Value: 1
Key : Hypervisor.RootFlags.DisableHyperthreading
Value: 0
Key : Hypervisor.RootFlags.HostTimelineSync
Value: 1
Key : Hypervisor.RootFlags.HypervisorDebuggingEnabled
Value: 0
Key : Hypervisor.RootFlags.IsHyperV
Value: 1
Key : Hypervisor.RootFlags.LivedumpEnlightened
Value: 1
Key : Hypervisor.RootFlags.MapDeviceInterrupt
Value: 1
Key : Hypervisor.RootFlags.MceEnlightened
Value: 1
Key : Hypervisor.RootFlags.Nested
Value: 0
Key : Hypervisor.RootFlags.StartLogicalProcessor
Value: 1
Key : Hypervisor.RootFlags.Value
Value: 1015
Key : Hypervisor.RootFlags.ValueHex
Value: 3f7
BUGCHECK_CODE: 1a
BUGCHECK_P1: 3470
BUGCHECK_P2: fffff8868f16f000
BUGCHECK_P3: c8c70eb9a1124baf
BUGCHECK_P4: 88c70eb9a9124baf
FILE_IN_CAB: 062024-6234-01.dmp
TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b
DUMP_FILE_ATTRIBUTES: 0x1808
Kernel Generated Triage Dump
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: explorer.exe
STACK_TEXT:
fffff886`8c9472f8 fffff801`77c7a38e : 00000000`0000001a 00000000`00003470 fffff886`8f16f000 c8c70eb9`a1124baf : nt!KeBugCheckEx
fffff886`8c947300 fffff801`77efe380 : 00000000`00000010 ffffb78d`c8be8080 fffff886`8c947aa0 fffff801`77a369b1 : nt!MmCreateKernelStack+0x232b4e
fffff886`8c9473b0 ffffef1f`cbe4fcf4 : ffffca07`0000002f fffff886`8c9474d0 00000000`00000058 fffff886`8c9474a8 : nt!KeUserModeCallback+0xb0
fffff886`8c947470 ffffef1f`cbe02701 : ffffca07`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : win32kfull!fnHkINLPMSG+0x174
fffff886`8c9475c0 ffffef1f`cbe00cda : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : win32kfull!xxxRealInternalGetMessage+0x1921
fffff886`8c9478b0 ffffef1f`cc2c773a : ffffb78d`c8be8080 00000000`072dfa88 fffff886`8c9479c8 00000000`00000000 : win32kfull!NtUserPeekMessage+0xaa
fffff886`8c947960 fffff801`77c2f805 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff801`77fb8ae0 : win32k!NtUserPeekMessage+0x2a
fffff886`8c9479b0 00007ffa`9f8914d4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
00000000`072dfa68 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`9f8914d4
SYMBOL_NAME: win32kfull!fnHkINLPMSG+174
MODULE_NAME: win32kfull
IMAGE_NAME: win32kfull.sys
IMAGE_VERSION: 10.0.22621.3733
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 174
FAILURE_BUCKET_ID: 0x1a_3470_win32kfull!fnHkINLPMSG
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {869b9042-39aa-8662-1d5d-0d66074374f2}
Followup: MachineOwner
*******NUMBER TWO FROM THIS EVENING********
4: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff8012844a0d9, Address of the instruction which caused the BugCheck
Arg3: fffff486063eedf0, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1030
Key : Analysis.Elapsed.mSec
Value: 6087
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 1
Key : Analysis.Init.CPU.mSec
Value: 186
Key : Analysis.Init.Elapsed.mSec
Value: 1915
Key : Analysis.Memory.CommitPeak.Mb
Value: 90
Key : Bugcheck.Code.LegacyAPI
Value: 0x3b
Key : Bugcheck.Code.TargetModel
Value: 0x3b
Key : Dump.Attributes.AsUlong
Value: 1808
Key : Dump.Attributes.DiagDataWrittenToHeader
Value: 1
Key : Dump.Attributes.ErrorCode
Value: 0
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
Key : Dump.Attributes.LastLine
Value: Dump completed successfully.
Key : Dump.Attributes.ProgressPercentage
Value: 0
Key : Failure.Bucket
Value: AV_nt!IopReadFile
Key : Failure.Hash
Value: {fe840f45-e7e9-03d0-82eb-188abe8d322d}
Key : Hypervisor.Enlightenments.ValueHex
Value: 1417df84
Key : Hypervisor.Flags.AnyHypervisorPresent
Value: 1
Key : Hypervisor.Flags.ApicEnlightened
Value: 0
Key : Hypervisor.Flags.ApicVirtualizationAvailable
Value: 1
Key : Hypervisor.Flags.AsyncMemoryHint
Value: 0
Key : Hypervisor.Flags.CoreSchedulerRequested
Value: 0
Key : Hypervisor.Flags.CpuManager
Value: 1
Key : Hypervisor.Flags.DeprecateAutoEoi
Value: 1
Key : Hypervisor.Flags.DynamicCpuDisabled
Value: 1
Key : Hypervisor.Flags.Epf
Value: 0
Key : Hypervisor.Flags.ExtendedProcessorMasks
Value: 1
Key : Hypervisor.Flags.HardwareMbecAvailable
Value: 1
Key : Hypervisor.Flags.MaxBankNumber
Value: 0
Key : Hypervisor.Flags.MemoryZeroingControl
Value: 0
Key : Hypervisor.Flags.NoExtendedRangeFlush
Value: 0
Key : Hypervisor.Flags.NoNonArchCoreSharing
Value: 1
Key : Hypervisor.Flags.Phase0InitDone
Value: 1
Key : Hypervisor.Flags.PowerSchedulerQos
Value: 0
Key : Hypervisor.Flags.RootScheduler
Value: 0
Key : Hypervisor.Flags.SynicAvailable
Value: 1
Key : Hypervisor.Flags.UseQpcBias
Value: 0
Key : Hypervisor.Flags.Value
Value: 21631230
Key : Hypervisor.Flags.ValueHex
Value: 14a10fe
Key : Hypervisor.Flags.VpAssistPage
Value: 1
Key : Hypervisor.Flags.VsmAvailable
Value: 1
Key : Hypervisor.RootFlags.AccessStats
Value: 1
Key : Hypervisor.RootFlags.CrashdumpEnlightened
Value: 1
Key : Hypervisor.RootFlags.CreateVirtualProcessor
Value: 1
Key : Hypervisor.RootFlags.DisableHyperthreading
Value: 0
Key : Hypervisor.RootFlags.HostTimelineSync
Value: 1
Key : Hypervisor.RootFlags.HypervisorDebuggingEnabled
Value: 0
Key : Hypervisor.RootFlags.IsHyperV
Value: 1
Key : Hypervisor.RootFlags.LivedumpEnlightened
Value: 1
Key : Hypervisor.RootFlags.MapDeviceInterrupt
Value: 1
Key : Hypervisor.RootFlags.MceEnlightened
Value: 1
Key : Hypervisor.RootFlags.Nested
Value: 0
Key : Hypervisor.RootFlags.StartLogicalProcessor
Value: 1
Key : Hypervisor.RootFlags.Value
Value: 1015
Key : Hypervisor.RootFlags.ValueHex
Value: 3f7
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff8012844a0d9
BUGCHECK_P3: fffff486063eedf0
BUGCHECK_P4: 0
FILE_IN_CAB: 062024-6593-01.dmp
TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b
DUMP_FILE_ATTRIBUTES: 0x1808
Kernel Generated Triage Dump
CONTEXT: fffff486063eedf0 -- (.cxr 0xfffff486063eedf0)
rax=d7ff9a075524adf0 rbx=0000000000000000 rcx=ffff9a078d914c50
rdx=0000000000000000 rsi=ffff9a078d914c50 rdi=ffff9a078d914ca0
rip=fffff8012844a0d9 rsp=fffff486063ef818 rbp=0000000000000000
r8=0000000000000000 r9=000000000bb30710 r10=ffff9a078d914c50
r11=0000000000000001 r12=0000000000001000 r13=0000000000000000
r14=0000000002cef800 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050286
nt!IoGetRelatedDeviceObject+0x9:
fffff801`2844a0d9 488b4008 mov rax,qword ptr [rax+8] ds:002b:d7ff9a07`5524adf8=????????????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: Agent.exe
STACK_TEXT:
fffff486`063ef818 fffff801`28971707 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff801`288c8887 : nt!IoGetRelatedDeviceObject+0x9
fffff486`063ef820 fffff801`289715e3 : ffff9a07`8d914c50 00000000`00000000 00000000`00000000 00000000`0bb30710 : nt!IopReadFile+0xe7
fffff486`063ef920 fffff801`2862f805 : ffff9a07`87185080 fffff486`063efaa0 00000000`02beebf8 00000000`00000000 : nt!NtReadFile+0xd3
fffff486`063ef9b0 00000000`77021cf3 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
00000000`02beebd8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77021cf3
SYMBOL_NAME: nt!IopReadFile+e7
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.22621.3733
STACK_COMMAND: .cxr 0xfffff486063eedf0 ; kb
BUCKET_ID_FUNC_OFFSET: e7
FAILURE_BUCKET_ID: AV_nt!IopReadFile
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {fe840f45-e7e9-03d0-82eb-188abe8d322d}
Followup: MachineOwner
---------
Any response/helpful response is appreciated...feels [language redacted] having a nice shiny new PC and I feel like I gotta walk on eggshells using the thing.
Totally fine to replace parts as necessary, but of course want to avoid if possible.
Cheers
SYSTEM_SERVICE_EXCEPTION & MEMORY_MANAGEMENT are the two most frequent stop codes I get. There've been a couple others, but my PC didn't create a minidump of the crash so I don't have much data on it. A few of them have been Kernel related stop-codes, I know that much
SPECS
W11 Home
Mobo - MSi MS-7D25
cpu - 12th Gen Intel i7-12700KF
ram - 32GB ddr5 5200hmz (?) if i recall, it's decent ram
gpu - NVIDIA Geforce RTX 4060Ti 12GB
ssd - WD Blue SN580 1tb
What seems weird is it'll only really happen after I power up my PC for the evening (I mostly just game or surf twitch/youtube. usually while i game).
I'll have like 2 or 3 reboots due to BSOD's with the stop-code's listed above in bold, and then it seems to work itself out and not happen for the rest of the evening. Weird?
I'm going to post the minidump data, hopefully this is what you guys would need to assist me in diagnosing the issue.
*******NUMBER ONE FROM THIS EVENING********
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000003470, The subtype of the BugCheck.
Arg2: fffff8868f16f000
Arg3: c8c70eb9a1124baf
Arg4: 88c70eb9a9124baf
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 734
Key : Analysis.Elapsed.mSec
Value: 2738
Key : Analysis.IO.Other.Mb
Value: 2
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 9
Key : Analysis.Init.CPU.mSec
Value: 202
Key : Analysis.Init.Elapsed.mSec
Value: 4678
Key : Analysis.Memory.CommitPeak.Mb
Value: 99
Key : Bugcheck.Code.LegacyAPI
Value: 0x1a
Key : Bugcheck.Code.TargetModel
Value: 0x1a
Key : Dump.Attributes.AsUlong
Value: 1808
Key : Dump.Attributes.DiagDataWrittenToHeader
Value: 1
Key : Dump.Attributes.ErrorCode
Value: 0
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
Key : Dump.Attributes.LastLine
Value: Dump completed successfully.
Key : Dump.Attributes.ProgressPercentage
Value: 0
Key : Failure.Bucket
Value: 0x1a_3470_win32kfull!fnHkINLPMSG
Key : Failure.Hash
Value: {869b9042-39aa-8662-1d5d-0d66074374f2}
Key : Hypervisor.Enlightenments.ValueHex
Value: 1417df84
Key : Hypervisor.Flags.AnyHypervisorPresent
Value: 1
Key : Hypervisor.Flags.ApicEnlightened
Value: 0
Key : Hypervisor.Flags.ApicVirtualizationAvailable
Value: 1
Key : Hypervisor.Flags.AsyncMemoryHint
Value: 0
Key : Hypervisor.Flags.CoreSchedulerRequested
Value: 0
Key : Hypervisor.Flags.CpuManager
Value: 1
Key : Hypervisor.Flags.DeprecateAutoEoi
Value: 1
Key : Hypervisor.Flags.DynamicCpuDisabled
Value: 1
Key : Hypervisor.Flags.Epf
Value: 0
Key : Hypervisor.Flags.ExtendedProcessorMasks
Value: 1
Key : Hypervisor.Flags.HardwareMbecAvailable
Value: 1
Key : Hypervisor.Flags.MaxBankNumber
Value: 0
Key : Hypervisor.Flags.MemoryZeroingControl
Value: 0
Key : Hypervisor.Flags.NoExtendedRangeFlush
Value: 0
Key : Hypervisor.Flags.NoNonArchCoreSharing
Value: 1
Key : Hypervisor.Flags.Phase0InitDone
Value: 1
Key : Hypervisor.Flags.PowerSchedulerQos
Value: 0
Key : Hypervisor.Flags.RootScheduler
Value: 0
Key : Hypervisor.Flags.SynicAvailable
Value: 1
Key : Hypervisor.Flags.UseQpcBias
Value: 0
Key : Hypervisor.Flags.Value
Value: 21631230
Key : Hypervisor.Flags.ValueHex
Value: 14a10fe
Key : Hypervisor.Flags.VpAssistPage
Value: 1
Key : Hypervisor.Flags.VsmAvailable
Value: 1
Key : Hypervisor.RootFlags.AccessStats
Value: 1
Key : Hypervisor.RootFlags.CrashdumpEnlightened
Value: 1
Key : Hypervisor.RootFlags.CreateVirtualProcessor
Value: 1
Key : Hypervisor.RootFlags.DisableHyperthreading
Value: 0
Key : Hypervisor.RootFlags.HostTimelineSync
Value: 1
Key : Hypervisor.RootFlags.HypervisorDebuggingEnabled
Value: 0
Key : Hypervisor.RootFlags.IsHyperV
Value: 1
Key : Hypervisor.RootFlags.LivedumpEnlightened
Value: 1
Key : Hypervisor.RootFlags.MapDeviceInterrupt
Value: 1
Key : Hypervisor.RootFlags.MceEnlightened
Value: 1
Key : Hypervisor.RootFlags.Nested
Value: 0
Key : Hypervisor.RootFlags.StartLogicalProcessor
Value: 1
Key : Hypervisor.RootFlags.Value
Value: 1015
Key : Hypervisor.RootFlags.ValueHex
Value: 3f7
BUGCHECK_CODE: 1a
BUGCHECK_P1: 3470
BUGCHECK_P2: fffff8868f16f000
BUGCHECK_P3: c8c70eb9a1124baf
BUGCHECK_P4: 88c70eb9a9124baf
FILE_IN_CAB: 062024-6234-01.dmp
TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b
DUMP_FILE_ATTRIBUTES: 0x1808
Kernel Generated Triage Dump
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: explorer.exe
STACK_TEXT:
fffff886`8c9472f8 fffff801`77c7a38e : 00000000`0000001a 00000000`00003470 fffff886`8f16f000 c8c70eb9`a1124baf : nt!KeBugCheckEx
fffff886`8c947300 fffff801`77efe380 : 00000000`00000010 ffffb78d`c8be8080 fffff886`8c947aa0 fffff801`77a369b1 : nt!MmCreateKernelStack+0x232b4e
fffff886`8c9473b0 ffffef1f`cbe4fcf4 : ffffca07`0000002f fffff886`8c9474d0 00000000`00000058 fffff886`8c9474a8 : nt!KeUserModeCallback+0xb0
fffff886`8c947470 ffffef1f`cbe02701 : ffffca07`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : win32kfull!fnHkINLPMSG+0x174
fffff886`8c9475c0 ffffef1f`cbe00cda : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : win32kfull!xxxRealInternalGetMessage+0x1921
fffff886`8c9478b0 ffffef1f`cc2c773a : ffffb78d`c8be8080 00000000`072dfa88 fffff886`8c9479c8 00000000`00000000 : win32kfull!NtUserPeekMessage+0xaa
fffff886`8c947960 fffff801`77c2f805 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff801`77fb8ae0 : win32k!NtUserPeekMessage+0x2a
fffff886`8c9479b0 00007ffa`9f8914d4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
00000000`072dfa68 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`9f8914d4
SYMBOL_NAME: win32kfull!fnHkINLPMSG+174
MODULE_NAME: win32kfull
IMAGE_NAME: win32kfull.sys
IMAGE_VERSION: 10.0.22621.3733
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 174
FAILURE_BUCKET_ID: 0x1a_3470_win32kfull!fnHkINLPMSG
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {869b9042-39aa-8662-1d5d-0d66074374f2}
Followup: MachineOwner
*******NUMBER TWO FROM THIS EVENING********
4: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff8012844a0d9, Address of the instruction which caused the BugCheck
Arg3: fffff486063eedf0, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1030
Key : Analysis.Elapsed.mSec
Value: 6087
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 1
Key : Analysis.Init.CPU.mSec
Value: 186
Key : Analysis.Init.Elapsed.mSec
Value: 1915
Key : Analysis.Memory.CommitPeak.Mb
Value: 90
Key : Bugcheck.Code.LegacyAPI
Value: 0x3b
Key : Bugcheck.Code.TargetModel
Value: 0x3b
Key : Dump.Attributes.AsUlong
Value: 1808
Key : Dump.Attributes.DiagDataWrittenToHeader
Value: 1
Key : Dump.Attributes.ErrorCode
Value: 0
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
Key : Dump.Attributes.LastLine
Value: Dump completed successfully.
Key : Dump.Attributes.ProgressPercentage
Value: 0
Key : Failure.Bucket
Value: AV_nt!IopReadFile
Key : Failure.Hash
Value: {fe840f45-e7e9-03d0-82eb-188abe8d322d}
Key : Hypervisor.Enlightenments.ValueHex
Value: 1417df84
Key : Hypervisor.Flags.AnyHypervisorPresent
Value: 1
Key : Hypervisor.Flags.ApicEnlightened
Value: 0
Key : Hypervisor.Flags.ApicVirtualizationAvailable
Value: 1
Key : Hypervisor.Flags.AsyncMemoryHint
Value: 0
Key : Hypervisor.Flags.CoreSchedulerRequested
Value: 0
Key : Hypervisor.Flags.CpuManager
Value: 1
Key : Hypervisor.Flags.DeprecateAutoEoi
Value: 1
Key : Hypervisor.Flags.DynamicCpuDisabled
Value: 1
Key : Hypervisor.Flags.Epf
Value: 0
Key : Hypervisor.Flags.ExtendedProcessorMasks
Value: 1
Key : Hypervisor.Flags.HardwareMbecAvailable
Value: 1
Key : Hypervisor.Flags.MaxBankNumber
Value: 0
Key : Hypervisor.Flags.MemoryZeroingControl
Value: 0
Key : Hypervisor.Flags.NoExtendedRangeFlush
Value: 0
Key : Hypervisor.Flags.NoNonArchCoreSharing
Value: 1
Key : Hypervisor.Flags.Phase0InitDone
Value: 1
Key : Hypervisor.Flags.PowerSchedulerQos
Value: 0
Key : Hypervisor.Flags.RootScheduler
Value: 0
Key : Hypervisor.Flags.SynicAvailable
Value: 1
Key : Hypervisor.Flags.UseQpcBias
Value: 0
Key : Hypervisor.Flags.Value
Value: 21631230
Key : Hypervisor.Flags.ValueHex
Value: 14a10fe
Key : Hypervisor.Flags.VpAssistPage
Value: 1
Key : Hypervisor.Flags.VsmAvailable
Value: 1
Key : Hypervisor.RootFlags.AccessStats
Value: 1
Key : Hypervisor.RootFlags.CrashdumpEnlightened
Value: 1
Key : Hypervisor.RootFlags.CreateVirtualProcessor
Value: 1
Key : Hypervisor.RootFlags.DisableHyperthreading
Value: 0
Key : Hypervisor.RootFlags.HostTimelineSync
Value: 1
Key : Hypervisor.RootFlags.HypervisorDebuggingEnabled
Value: 0
Key : Hypervisor.RootFlags.IsHyperV
Value: 1
Key : Hypervisor.RootFlags.LivedumpEnlightened
Value: 1
Key : Hypervisor.RootFlags.MapDeviceInterrupt
Value: 1
Key : Hypervisor.RootFlags.MceEnlightened
Value: 1
Key : Hypervisor.RootFlags.Nested
Value: 0
Key : Hypervisor.RootFlags.StartLogicalProcessor
Value: 1
Key : Hypervisor.RootFlags.Value
Value: 1015
Key : Hypervisor.RootFlags.ValueHex
Value: 3f7
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff8012844a0d9
BUGCHECK_P3: fffff486063eedf0
BUGCHECK_P4: 0
FILE_IN_CAB: 062024-6593-01.dmp
TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b
DUMP_FILE_ATTRIBUTES: 0x1808
Kernel Generated Triage Dump
CONTEXT: fffff486063eedf0 -- (.cxr 0xfffff486063eedf0)
rax=d7ff9a075524adf0 rbx=0000000000000000 rcx=ffff9a078d914c50
rdx=0000000000000000 rsi=ffff9a078d914c50 rdi=ffff9a078d914ca0
rip=fffff8012844a0d9 rsp=fffff486063ef818 rbp=0000000000000000
r8=0000000000000000 r9=000000000bb30710 r10=ffff9a078d914c50
r11=0000000000000001 r12=0000000000001000 r13=0000000000000000
r14=0000000002cef800 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050286
nt!IoGetRelatedDeviceObject+0x9:
fffff801`2844a0d9 488b4008 mov rax,qword ptr [rax+8] ds:002b:d7ff9a07`5524adf8=????????????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: Agent.exe
STACK_TEXT:
fffff486`063ef818 fffff801`28971707 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff801`288c8887 : nt!IoGetRelatedDeviceObject+0x9
fffff486`063ef820 fffff801`289715e3 : ffff9a07`8d914c50 00000000`00000000 00000000`00000000 00000000`0bb30710 : nt!IopReadFile+0xe7
fffff486`063ef920 fffff801`2862f805 : ffff9a07`87185080 fffff486`063efaa0 00000000`02beebf8 00000000`00000000 : nt!NtReadFile+0xd3
fffff486`063ef9b0 00000000`77021cf3 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
00000000`02beebd8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77021cf3
SYMBOL_NAME: nt!IopReadFile+e7
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.22621.3733
STACK_COMMAND: .cxr 0xfffff486063eedf0 ; kb
BUCKET_ID_FUNC_OFFSET: e7
FAILURE_BUCKET_ID: AV_nt!IopReadFile
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {fe840f45-e7e9-03d0-82eb-188abe8d322d}
Followup: MachineOwner
---------
Any response/helpful response is appreciated...feels [language redacted] having a nice shiny new PC and I feel like I gotta walk on eggshells using the thing.
Totally fine to replace parts as necessary, but of course want to avoid if possible.
Cheers
Last edited by a moderator: