C
carlosdaos
Hi My pc keeps restarting.
I have
CPU: AMD Ryzen 7 3800XT
Motherboard: ASUS TUF GAMING X570-PLUS (Wi-Fi)
Memory: G.SKILL Trident Z Neo Series 16GB(2 x 8GB) DDR4 3600Mhz CL16 Dual Channel Memory Kit 1.35V
GPU: EVGA RTX 3070
The Bug check analysis says
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80745a74425, The address that the exception occurred at
Arg3: fffffd0656096bc8, Parameter 0 of the exception
Arg4: ffff9b00097a2920, Parameter 1 of the exception
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3578
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-IKK0JSQ
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 6780
Key : Analysis.Memory.CommitPeak.Mb
Value: 87
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff80745a74425
BUGCHECK_P3: fffffd0656096bc8
BUGCHECK_P4: ffff9b00097a2920
WRITE_ADDRESS: fffff80733cfb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80733c0f330: Unable to get Flags value from nt!KdVersionBlock
fffff80733c0f330: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffff9b00097a2920
EXCEPTION_PARAMETER1: fffffd0656096bc8
EXCEPTION_PARAMETER2: ffff9b00097a2920
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: AVGSvc.exe
TRAP_FRAME: 8f0b1729834b132d -- (.trap 0x8f0b1729834b132d)
Unable to read trap frame at 8f0b1729`834b132d
BAD_STACK_POINTER: ffff9b00097a20a8
STACK_TEXT:
ffff9b00`097a20a8 fffff807`3350ed9f : 00000000`0000001e ffffffff`c0000005 fffff807`45a74425 fffffd06`56096bc8 : nt!KeBugCheckEx
ffff9b00`097a20b0 fffff807`33411c86 : ffff9b00`097a2920 fffff807`33303845 fffffd06`56096e00 fffff807`45a74425 : nt!KiFatalFilter+0x1f
ffff9b00`097a20f0 fffff807`333cc052 : fffff807`00000002 fffff807`330d8e34 fffffd06`56093000 fffffd06`56099000 : nt!KeExpandKernelStackAndCalloutInternal$filt$0+0x16
ffff9b00`097a2130 fffff807`333fe942 : fffff807`330d8e34 ffff9b00`097a2710 fffff807`333cbfb0 00000000`00000000 : nt!_C_specific_handler+0xa2
ffff9b00`097a21a0 fffff807`3332bf97 : ffff9b00`097a2710 00000000`00000000 fffffd06`560978b0 fffff807`33354488 : nt!RtlpExecuteHandlerForException+0x12
ffff9b00`097a21d0 fffff807`3332ab86 : fffffd06`56096bc8 ffff9b00`097a2e20 fffffd06`56096bc8 ffffb102`4da721b0 : nt!RtlDispatchException+0x297
ffff9b00`097a28f0 fffff807`333f6912 : 30343937`3f743b47 0800e9a6`4764a9a1 8f0b1729`834b132d b43b858b`b87b85a5 : nt!KiDispatchException+0x186
ffff9b00`097a2fb0 fffff807`333f68e0 : fffff807`33407ba5 ffffb101`46d86680 fffffd06`56096b90 fffffd06`56096bf8 : nt!KxExceptionDispatchOnExceptionStack+0x12
fffffd06`56096a88 fffff807`33407ba5 : ffffb101`46d86680 fffffd06`56096b90 fffffd06`56096bf8 fffffd06`56096e98 : nt!KiExceptionDispatchOnExceptionStackContinue
fffffd06`56096a90 fffff807`33403d43 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0x125
fffffd06`56096c70 fffff807`45a74425 : 00000000`00000011 ffffb102`4da721b0 fffffd06`56097170 00000000`00000000 : nt!KiPageFault+0x443
fffffd06`56096e00 fffff807`37368cee : 00000000`00000000 fffffd06`56096f09 badbadfa`badbadfa fffffd06`56097208 : Ndu!NduOutboundTransportClassify+0x2b5
fffffd06`56096ea0 fffff807`374a0684 : fffffd06`560970c0 ffffb102`47028680 00000000`00000000 00000000`0000004f : NETIO!KfdClassify2+0x19e
fffffd06`56096f70 fffff807`374948bd : fffffd06`00000000 80000001`66190963 00000000`00000002 00000000`00000001 : tcpip!WfpProcessOutTransportStackIndication+0x90c
fffffd06`560972a0 fffff807`3749393b : ffffb102`3fb40988 fffffd06`56097670 ffffb102`3fb408a8 00000000`00000004 : tcpip!IppInspectLocalDatagramsOut+0x87d
fffffd06`56097570 fffff807`375bdff9 : ffffb102`47427000 ffffb102`47427004 fffff807`37659230 ffffb102`4b906c20 : tcpip!IppSendDatagramsCommon+0x41b
fffffd06`560976f0 fffff807`3776873f : ffffb102`47427080 fffffd06`56097a60 ffffb102`3a4f7000 fffff807`3335460e : tcpip!IppInspectInjectTlSend+0x179
fffffd06`56097820 fffff807`33354488 : fffffd06`56097a60 ffffb102`3a4f70c0 00000000`00000003 00000000`00000000 : fwpkclnt!FwppInjectionStackCallout+0x9f
fffffd06`560978b0 fffff807`333543fd : fffff807`377686a0 fffffd06`56097a60 ffffb102`394f5910 fffff807`3758f263 : nt!KeExpandKernelStackAndCalloutInternal+0x78
fffffd06`56097920 fffff807`3776a2b4 : 00000000`00000000 ffffb102`4b906c20 00000000`00000002 fffff807`0000000f : nt!KeExpandKernelStackAndCalloutEx+0x1d
fffffd06`56097960 fffff807`37768658 : 00000000`00000004 fffffd06`56097aa0 fffffd06`56097aa0 ffffb102`47028680 : fwpkclnt!NetioExpandKernelStackAndCallout+0x58
fffffd06`560979a0 fffff807`37769f23 : ffffb102`00000000 ffffb102`46006700 00000000`00000000 ffffb102`4326dee8 : fwpkclnt!FwppInjectTransportSendAsync+0x588
fffffd06`56097ba0 fffff807`4552aca2 : ffffb102`48b1d3e0 ffffb102`47f7d700 00000000`00000000 ffffb102`48b1d3e0 : fwpkclnt!FwpsInjectTransportSendAsync0+0x63
fffffd06`56097c10 ffffb102`48b1d3e0 : ffffb102`47f7d700 00000000`00000000 ffffb102`48b1d3e0 fffffd06`56097cc0 : avgStm+0xaca2
fffffd06`56097c18 ffffb102`47f7d700 : 00000000`00000000 ffffb102`48b1d3e0 fffffd06`56097cc0 ffffb102`47930002 : 0xffffb102`48b1d3e0
fffffd06`56097c20 00000000`00000000 : ffffb102`48b1d3e0 fffffd06`56097cc0 ffffb102`47930002 fffff807`00000001 : 0xffffb102`47f7d700
SYMBOL_NAME: Ndu!NduOutboundTransportClassify+2b5
MODULE_NAME: Ndu
IMAGE_NAME: Ndu.sys
IMAGE_VERSION: 10.0.19041.1030
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 2b5
FAILURE_BUCKET_ID: 0x1E_c0000005_STACKPTR_ERROR_Ndu!NduOutboundTransportClassify
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {63910737-ea4e-e75d-e79f-6296ef230e3e}
Followup: MachineOwner
Continue reading...
I have
CPU: AMD Ryzen 7 3800XT
Motherboard: ASUS TUF GAMING X570-PLUS (Wi-Fi)
Memory: G.SKILL Trident Z Neo Series 16GB(2 x 8GB) DDR4 3600Mhz CL16 Dual Channel Memory Kit 1.35V
GPU: EVGA RTX 3070
The Bug check analysis says
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80745a74425, The address that the exception occurred at
Arg3: fffffd0656096bc8, Parameter 0 of the exception
Arg4: ffff9b00097a2920, Parameter 1 of the exception
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3578
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-IKK0JSQ
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 6780
Key : Analysis.Memory.CommitPeak.Mb
Value: 87
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff80745a74425
BUGCHECK_P3: fffffd0656096bc8
BUGCHECK_P4: ffff9b00097a2920
WRITE_ADDRESS: fffff80733cfb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80733c0f330: Unable to get Flags value from nt!KdVersionBlock
fffff80733c0f330: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffff9b00097a2920
EXCEPTION_PARAMETER1: fffffd0656096bc8
EXCEPTION_PARAMETER2: ffff9b00097a2920
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: AVGSvc.exe
TRAP_FRAME: 8f0b1729834b132d -- (.trap 0x8f0b1729834b132d)
Unable to read trap frame at 8f0b1729`834b132d
BAD_STACK_POINTER: ffff9b00097a20a8
STACK_TEXT:
ffff9b00`097a20a8 fffff807`3350ed9f : 00000000`0000001e ffffffff`c0000005 fffff807`45a74425 fffffd06`56096bc8 : nt!KeBugCheckEx
ffff9b00`097a20b0 fffff807`33411c86 : ffff9b00`097a2920 fffff807`33303845 fffffd06`56096e00 fffff807`45a74425 : nt!KiFatalFilter+0x1f
ffff9b00`097a20f0 fffff807`333cc052 : fffff807`00000002 fffff807`330d8e34 fffffd06`56093000 fffffd06`56099000 : nt!KeExpandKernelStackAndCalloutInternal$filt$0+0x16
ffff9b00`097a2130 fffff807`333fe942 : fffff807`330d8e34 ffff9b00`097a2710 fffff807`333cbfb0 00000000`00000000 : nt!_C_specific_handler+0xa2
ffff9b00`097a21a0 fffff807`3332bf97 : ffff9b00`097a2710 00000000`00000000 fffffd06`560978b0 fffff807`33354488 : nt!RtlpExecuteHandlerForException+0x12
ffff9b00`097a21d0 fffff807`3332ab86 : fffffd06`56096bc8 ffff9b00`097a2e20 fffffd06`56096bc8 ffffb102`4da721b0 : nt!RtlDispatchException+0x297
ffff9b00`097a28f0 fffff807`333f6912 : 30343937`3f743b47 0800e9a6`4764a9a1 8f0b1729`834b132d b43b858b`b87b85a5 : nt!KiDispatchException+0x186
ffff9b00`097a2fb0 fffff807`333f68e0 : fffff807`33407ba5 ffffb101`46d86680 fffffd06`56096b90 fffffd06`56096bf8 : nt!KxExceptionDispatchOnExceptionStack+0x12
fffffd06`56096a88 fffff807`33407ba5 : ffffb101`46d86680 fffffd06`56096b90 fffffd06`56096bf8 fffffd06`56096e98 : nt!KiExceptionDispatchOnExceptionStackContinue
fffffd06`56096a90 fffff807`33403d43 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0x125
fffffd06`56096c70 fffff807`45a74425 : 00000000`00000011 ffffb102`4da721b0 fffffd06`56097170 00000000`00000000 : nt!KiPageFault+0x443
fffffd06`56096e00 fffff807`37368cee : 00000000`00000000 fffffd06`56096f09 badbadfa`badbadfa fffffd06`56097208 : Ndu!NduOutboundTransportClassify+0x2b5
fffffd06`56096ea0 fffff807`374a0684 : fffffd06`560970c0 ffffb102`47028680 00000000`00000000 00000000`0000004f : NETIO!KfdClassify2+0x19e
fffffd06`56096f70 fffff807`374948bd : fffffd06`00000000 80000001`66190963 00000000`00000002 00000000`00000001 : tcpip!WfpProcessOutTransportStackIndication+0x90c
fffffd06`560972a0 fffff807`3749393b : ffffb102`3fb40988 fffffd06`56097670 ffffb102`3fb408a8 00000000`00000004 : tcpip!IppInspectLocalDatagramsOut+0x87d
fffffd06`56097570 fffff807`375bdff9 : ffffb102`47427000 ffffb102`47427004 fffff807`37659230 ffffb102`4b906c20 : tcpip!IppSendDatagramsCommon+0x41b
fffffd06`560976f0 fffff807`3776873f : ffffb102`47427080 fffffd06`56097a60 ffffb102`3a4f7000 fffff807`3335460e : tcpip!IppInspectInjectTlSend+0x179
fffffd06`56097820 fffff807`33354488 : fffffd06`56097a60 ffffb102`3a4f70c0 00000000`00000003 00000000`00000000 : fwpkclnt!FwppInjectionStackCallout+0x9f
fffffd06`560978b0 fffff807`333543fd : fffff807`377686a0 fffffd06`56097a60 ffffb102`394f5910 fffff807`3758f263 : nt!KeExpandKernelStackAndCalloutInternal+0x78
fffffd06`56097920 fffff807`3776a2b4 : 00000000`00000000 ffffb102`4b906c20 00000000`00000002 fffff807`0000000f : nt!KeExpandKernelStackAndCalloutEx+0x1d
fffffd06`56097960 fffff807`37768658 : 00000000`00000004 fffffd06`56097aa0 fffffd06`56097aa0 ffffb102`47028680 : fwpkclnt!NetioExpandKernelStackAndCallout+0x58
fffffd06`560979a0 fffff807`37769f23 : ffffb102`00000000 ffffb102`46006700 00000000`00000000 ffffb102`4326dee8 : fwpkclnt!FwppInjectTransportSendAsync+0x588
fffffd06`56097ba0 fffff807`4552aca2 : ffffb102`48b1d3e0 ffffb102`47f7d700 00000000`00000000 ffffb102`48b1d3e0 : fwpkclnt!FwpsInjectTransportSendAsync0+0x63
fffffd06`56097c10 ffffb102`48b1d3e0 : ffffb102`47f7d700 00000000`00000000 ffffb102`48b1d3e0 fffffd06`56097cc0 : avgStm+0xaca2
fffffd06`56097c18 ffffb102`47f7d700 : 00000000`00000000 ffffb102`48b1d3e0 fffffd06`56097cc0 ffffb102`47930002 : 0xffffb102`48b1d3e0
fffffd06`56097c20 00000000`00000000 : ffffb102`48b1d3e0 fffffd06`56097cc0 ffffb102`47930002 fffff807`00000001 : 0xffffb102`47f7d700
SYMBOL_NAME: Ndu!NduOutboundTransportClassify+2b5
MODULE_NAME: Ndu
IMAGE_NAME: Ndu.sys
IMAGE_VERSION: 10.0.19041.1030
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 2b5
FAILURE_BUCKET_ID: 0x1E_c0000005_STACKPTR_ERROR_Ndu!NduOutboundTransportClassify
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {63910737-ea4e-e75d-e79f-6296ef230e3e}
Followup: MachineOwner
Continue reading...