******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the BugCheck Arg2: fffff8012bc76ff3, Address of the instruction which caused the BugCheck Arg3: ffff8d05d924e560, Address of the context record for the exception that caused the BugCheck Arg4: 0000000000000000, zero. Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 2249 Key : Analysis.DebugAnalysisManager Value: Create Key : Analysis.Elapsed.mSec Value: 8252 Key : Analysis.Init.CPU.mSec Value: 421 Key : Analysis.Init.Elapsed.mSec Value: 36093 Key : Analysis.Memory.CommitPeak.Mb Value: 83 Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 BUGCHECK_CODE: 3b BUGCHECK_P1: c0000005 BUGCHECK_P2: fffff8012bc76ff3 BUGCHECK_P3: ffff8d05d924e560 BUGCHECK_P4: 0 CONTEXT: ffff8d05d924e560 -- (.cxr 0xffff8d05d924e560) rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000001 rdx=0000000000000005 rsi=0000000000000005 rdi=ffff9787777e9d98 rip=fffff8012bc76ff3 rsp=ffff8d05d924ef68 rbp=0000000000000000 r8=ffff9787777e7af8 r9=ffff9787777e1000 r10=0000000000000002 r11=ffffffffffffffff r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000005 iopl=0 nv up ei ng nz ac po cy cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050297 nvlddmkm+0x796ff3: fffff801`2bc76ff3 395024 cmp dword ptr [rax+24h],edx ds:002b:00000000`00000024=???????? Resetting default scope BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 PROCESS_NAME: dwm.exe STACK_TEXT: ffff8d05`d924ef68 fffff801`2bc7960a : 00000000`00000000 ffff9787`777e9d98 ffff9787`00010001 00000000`00000002 : nvlddmkm+0x796ff3 ffff8d05`d924ef70 fffff801`2bf68530 : ffff8d05`d924f880 ffff9787`7dbea050 ffff9787`777e9d98 ffff9787`777e1000 : nvlddmkm+0x79960a ffff8d05`d924efc0 fffff801`2c1efe99 : ffff9787`77802000 ffff8d05`d924f0b1 ffff8d05`d924f230 ffffdd80`5cd0b640 : nvlddmkm+0xa88530 ffff8d05`d924eff0 fffff801`2c24a8df : ffff9787`77802000 00000000`00000014 00000000`00000001 ffff9787`7dbea050 : nvlddmkm+0xd0fe99 ffff8d05`d924f110 fffff801`2c24c25b : 00000000`c000000d ffff8d05`d924f250 00000000`00000001 ffff9787`77802000 : nvlddmkm+0xd6a8df ffff8d05`d924f150 fffff801`2c1d82ca : 00000000`00001301 ffff8d05`d924f429 ffff8d05`d924f678 00000000`00001301 : nvlddmkm+0xd6c25b ffff8d05`d924f3b0 fffff801`2827685a : 00000000`00000000 ffff9787`7dbea050 00000000`0000139e 00000000`4e564458 : nvlddmkm+0xcf82ca ffff8d05`d924f490 fffff801`2816a48c : ffff9787`7c959000 ffff8d05`00000000 ffff9787`7c959000 ffffa780`43335050 : dxgkrnl!DXGADAPTER::DdiEscape+0xfa ffff8d05`d924f540 fffff801`19808bb8 : ffff9787`7d708080 ffff9787`7d708080 00000000`00000000 00000000`00000000 : dxgkrnl!DxgkEscape+0x85c ffff8d05`d924fac0 00007ffd`b1504be4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28 000000fc`ad5fca98 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`b1504be4 SYMBOL_NAME: nvlddmkm+796ff3 MODULE_NAME: nvlddmkm IMAGE_NAME: nvlddmkm.sys STACK_COMMAND: .cxr 0xffff8d05d924e560 ; kb BUCKET_ID_FUNC_OFFSET: 796ff3 FAILURE_BUCKET_ID: 0x3B_c0000005_nvlddmkm!unknown_function OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {63c41bff-3ea4-15a0-a72c-26a548d17abe} Followup: MachineOwner ---------