I’ve been noticing that my system has been wanting to randomly crashing when I mainly leave it unattended.
Operating System
Windows 10 Pro 64-bit
CPU
AMD Ryzen 5 3500X 55 °C
Matisse 7nm Technology
RAM
16.0GB Dual-Channel DDR4 @ 1197MHz (17-17-17-36)
Motherboard
ASRock B550 Phantom Gaming 4 (AM4) 45 °C
Graphics
VE248 (1920x1080@59Hz)
VE248 (1920x1080@59Hz)
VE248 (1920x1080@59Hz)
8176MB ATI AMD Radeon RX 5700 XT (Unknown)
Storage
2794GB Hitachi HGST HUS724030ALA640 (SATA ) 45 °C
489GB Crucial_CT525MX300SSD1 (SATA (SSD)) 42 °C
476GB SPCC M.2 PCIe SSD (Unknown (SSD))
Optical Drives
TSSTcorp DVD+-RW TS-H653F
ATAPI DVD A DH16A6S
Audio
Creative X-Fi Audio Processor (WDM)
I opened up the dump file, in the WinDgb tool and here is the information after running the !analyze -v
************* Preparing the environment for Debugger Extensions Gallery repositories **************
ExtensionRepository : Implicit
UseExperimentalFeatureForNugetShare : false
AllowNugetExeUpdate : false
AllowNugetMSCredentialProviderInstall : false
AllowParallelInitializationOfLocalRepositories : true– Configuring repositories
----> Repository : LocalInstalled, Enabled: true
----> Repository : UserExtensions, Enabled: truePreparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds
************* Waiting for Debugger Extensions Gallery to Initialize **************
Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.031 seconds
----> Repository : UserExtensions, Enabled: true, Packages count: 0
----> Repository : LocalInstalled, Enabled: true, Packages count: 36Microsoft (R) Windows Debugger Version 10.0.25877.1004 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.Loading Dump File [C:\Windows\Minidump\072923-9671-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are availableSymbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Kernel base = 0xfffff8000ae00000 PsLoadedModuleList = 0xfffff800
0ba2a3f0
Debug session time: Sat Jul 29 17:31:20.835 2023 (UTC - 4:00)
System Uptime: 0 days 18:31:49.925
Loading Kernel Symbols
…
…
…
…
Loading User Symbols
PEB is paged out (Peb.Ldr = 000000a934a4c018). Type ".hh dbgerr001" for details Loading unloaded module list ................ For analysis of this file, run !analyze -v nt!KeBugCheckEx: fffff800
0b1fc7b0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffff609`078f0000=000000000000003b
0: kd> !analyze -v
*
Bugcheck Analysis *
*
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff8001b8f8ed2, Address of the instruction which caused the BugCheck
Arg3: fffff609078f0900, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.Debugging Details:
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec Value: 3374 Key : Analysis.Elapsed.mSec Value: 8486 Key : Analysis.IO.Other.Mb Value: 8 Key : Analysis.IO.Read.Mb Value: 0 Key : Analysis.IO.Write.Mb Value: 27 Key : Analysis.Init.CPU.mSec Value: 593 Key : Analysis.Init.Elapsed.mSec Value: 59079 Key : Analysis.Memory.CommitPeak.Mb Value: 101 Key : Bugcheck.Code.LegacyAPI Value: 0x3b Key : Failure.Bucket Value: AV_ks!KsPinDataIntersectionEx Key : Failure.Hash Value: {86396548-df49-38d1-38ce-788747041bea} Key : WER.OS.Branch Value: vb_release Key : WER.OS.Version Value: 10.0.19041.1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff8001b8f8ed2
BUGCHECK_P3: fffff609078f0900
BUGCHECK_P4: 0
FILE_IN_CAB: 072923-9671-01.dmp
CONTEXT: fffff609078f0900 – (.cxr 0xfffff609078f0900)
rax=0000000000000060 rbx=ffffe388755c2ae8 rcx=0000000000000000
rdx=0000000000000080 rsi=0000000000000058 rdi=ffffe38862835b10
rip=fffff8001b8f8ed2 rsp=fffff609078f1300 rbp=0000000000000002
r8=0000000000000000 r9=0010000073647561 r10=fffff8001b8f84d0
r11=fffff609078f1398 r12=0000000000000000 r13=0000000000000001
r14=0000000000000058 r15=ffffe388759818a0
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050202
ks!KsPinDataIntersectionEx+0x1d2:
fffff8001b8f8ed2 488b5110 mov rdx,qword ptr [rcx+10h] ds:002b:00000000
00000010=???
Resetting default scopeBLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: svchost.exe
STACK_TEXT:
fffff609078f1300 fffff800
1b8f8501 : 0000000100000000 ffffe388
755c2ac0 0000000000000000 00000000
c0000001 : ks!KsPinDataIntersectionEx+0x1d2
fffff609078f13a0 fffff800
1d5660ed : ffffe38800000000 00000000
000000ff 0000000000000000 00000000
7070534b : ks!KsPinDataIntersection+0x31
fffff609078f13f0 fffff800
1d564e09 : 0000000000000000 ffffe388
759818a0 fffff609078f15a0 00000000
00000000 : portcls!PcPinPropertyHandler+0x16d
fffff609078f1470 fffff800
1b8fa5c9 : fffff609078f1505 00000000
00000080 000000007070534b 00000000
00000000 : portcls!PropertyHandler_Pin+0x9
fffff609078f14a0 fffff800
1b8f9e5b : ffffe38800000000 fffff609
00000004 ffffe388759818a0 00000000
00000000 : ks!KspPropertyHandler+0x3c9
fffff609078f1500 fffff800
1d565b3a : ffffe388755c2520 ffffe388
00000001 ffffe388759818a0 00000000
00000000 : ks!KsPropertyHandler+0x1b
fffff609078f1550 fffff800
1d565773 : ffffe38865190bc0 ffffe388
759818a0 ffffe38875981800 00000000
00000000 : portcls!CPortFilterWaveRT::DeviceIoControl+0x9a
fffff609078f15c0 fffff800
1b8fd513 : 0000000000000001 ffffe388
651b7a20 ffffe388759818a0 fffff609
078f17c0 : portcls!DispatchDeviceIoControl+0xb3
fffff609078f1630 fffff800
1d56527c : 0000000000000000 00000000
00000001 ffffe38865121390 ffffe388
65190a70 : ks!KsDispatchIrp+0x43
fffff609078f1660 fffff800
302f149e : fffff609078f17c0 00000000
00000100 fffff800302f9380 ffffe388
75ce8390 : portcls!PcDispatchIrp+0x6c
fffff609078f16d0 fffff609
078f17c0 : 0000000000000100 fffff800
302f9380 ffffe38875ce8390 ffffe388
625e0240 : AtihdWT6+0x3149e
fffff609078f16d8 00000000
00000100 : fffff800302f9380 ffffe388
75ce8390 ffffe388625e0240 fffff800
1d5d12c3 : 0xfffff609078f17c0 fffff609
078f16e0 fffff800302f9380 : ffffe388
75ce8390 ffffe388625e0240 fffff800
1d5d12c3 0000000000000000 : 0x100 fffff609
078f16e8 ffffe38875ce8390 : ffffe388
625e0240 fffff8001d5d12c3 00000000
00000000 0000000000000001 : AtihdWT6+0x39380 fffff609
078f16f0 ffffe388625e0240 : fffff800
1d5d12c3 0000000000000000 00000000
00000001 ffffe38865121390 : 0xffffe388
75ce8390
fffff609078f16f8 fffff800
1d5d12c3 : 0000000000000000 00000000
00000001 ffffe38865121390 00000000
00000000 : 0xffffe388625e0240 fffff609
078f1700 fffff8000b011215 : ffffe388
759818a0 ffffe388759818a0 fffff609
078f17c0 ffffe38875981b20 : ksthunk!CKernelFilterDevice::FileObjectToFilterFile+0x77 fffff609
078f1730 fffff8001d5d16bf : ffffe388
759818a0 fffff609078f17c0 ffffe388
75981b20 ffffe388625e0230 : nt!IofCallDriver+0x55 fffff609
078f1770 fffff8001d5d1023 : 00000000
00000002 0000000000000000 ffffe388
00000000 ffffe388759818a0 : ksthunk!CKernelFilterDevice::DispatchIrp+0x23b fffff609
078f17d0 fffff8000b011215 : ffffcf82
00000000 0000000000000000 fffff609
078f1b80 0000000000000080 : ksthunk!CKernelFilterDevice::DispatchIrpBridge+0x13 fffff609
078f1800 fffff8000b4125bc : 00000000
00000001 ffffe38875981b20 ffffe388
7745adb0 0000000000000000 : nt!IofCallDriver+0x55 fffff609
078f1840 fffff8000b412211 : ffffe388
00000000 fffff609078f1b80 00000000
00010000 ffffe38875981b20 : nt!IopSynchronousServiceTail+0x34c fffff609
078f18e0 fffff8000b411586 : ffffe388
6acbf0c0 0000000000000000 00000000
00000000 0000000000000000 : nt!IopXxxControlFile+0xc71 fffff609
078f1a20 fffff8000b20fff8 : fffff609
078f1b18 0000000000000000 ffffe388
738ee040 0000024500000000 : nt!NtDeviceIoControlFile+0x56 fffff609
078f1a90 00007ff9189ed0c4 : 00000000
00000000 0000000000000000 00000000
00000000 0000000000000000 : nt!KiSystemServiceCopyEnd+0x28 000000a9
34cfea78 0000000000000000 : 00000000
00000000 0000000000000000 00000000
00000000 0000000000000000 : 0x00007ff9
189ed0c4SYMBOL_NAME: ks!KsPinDataIntersectionEx+1d2
MODULE_NAME: ks
IMAGE_NAME: ks.sys
IMAGE_VERSION: 10.0.19041.3205
STACK_COMMAND: .cxr 0xfffff609078f0900 ; kb
BUCKET_ID_FUNC_OFFSET: 1d2
FAILURE_BUCKET_ID: AV_ks!KsPinDataIntersectionEx
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {86396548-df49-38d1-38ce-788747041bea}
Followup: MachineOwner