*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
ATTEMPTED_EXECUTE_OF_NOEXECUTE_MEMORY (fc)
An attempt was made to execute non-executable memory. The guilty driver
is on the stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name is printed on
the BugCheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: 00007ff940b2d7d4, Virtual address for the attempted execute.
Arg2: 01000004011af025, PTE contents.
Arg3: ffff87089d30e9b0, (reserved)
Arg4: 0000000080000005, (reserved)
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1686
Key : Analysis.Elapsed.mSec
Value: 4908
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 187
Key : Analysis.Init.Elapsed.mSec
Value: 1117
Key : Analysis.Memory.CommitPeak.Mb
Value: 145
Key : Bugcheck.Code.LegacyAPI
Value: 0xfc
Key : Failure.Bucket
Value: 0xFC_nt!MiCheckSystemNxFault
Key : Failure.Hash
Value: {a6ae5288-6b71-974a-9b09-23f14d998164}
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: fc
BUGCHECK_P1: 7ff940b2d7d4
BUGCHECK_P2: 1000004011af025
BUGCHECK_P3: ffff87089d30e9b0
BUGCHECK_P4: 80000005
FILE_IN_CAB: 070923-9921-01.dmp
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: LogonUI.exe
TRAP_FRAME: ffff87089d30e9b0 -- (.trap 0xffff87089d30e9b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00007ff940c02000 rbx=0000000000000000 rcx=0000000000000130
rdx=00007ff940c02000 rsi=0000000000000000 rdi=0000000000000000
rip=00007ff940b2d7d4 rsp=ffff87089d30eb48 rbp=ffff87089d30f120
r8=00007ff940c02000 r9=ffff800000000000 r10=fffff8013584f888
r11=00007ff940b2d7d4 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
00007ff9`40b2d7d4 ?? ???
Resetting default scope
STACK_TEXT:
ffff8708`9d30e6c8 fffff801`35077337 : 00000000`000000fc 00007ff9`40b2d7d4 01000004`011af025 ffff8708`9d30e9b0 : nt!KeBugCheckEx
ffff8708`9d30e6d0 fffff801`34e6ae0a : ffffd20c`00000001 ffff8708`9d30e730 00000000`00000001 fffff801`34e2667b : nt!MiCheckSystemNxFault+0x15082b
ffff8708`9d30e710 fffff801`34e6f232 : 00000000`00000000 01000004`011af025 fffff33f`fca05968 ffffa50d`d9dc90c0 : nt!MiValidFault+0x39a
ffff8708`9d30e780 fffff801`34e6e51a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiUserFault+0x7a2
ffff8708`9d30e810 fffff801`3500bad8 : 00000000`00000000 00000000`00000000 00000000`00000000 ffff8708`9d30e940 : nt!MmAccessFault+0x16a
ffff8708`9d30e9b0 00007ff9`40b2d7d4 : fffff801`34e282fb fffff801`34c00000 ffff8708`9d30f208 ffff8708`9d30fa00 : nt!KiPageFault+0x358
ffff8708`9d30eb48 fffff801`34e282fb : fffff801`34c00000 ffff8708`9d30f208 ffff8708`9d30fa00 00007fff`00000000 : 0x00007ff9`40b2d7d4
ffff8708`9d30eb50 fffff801`34e2773e : 00000000`00000000 ffff8708`9d30f208 0000002c`5737b658 fffff801`34ce3c4c : nt!RtlpLookupFunctionEntryForStackWalks+0x1fb
ffff8708`9d30ebd0 fffff801`34e28fbc : 00000000`00000005 00000000`00000011 fffff801`00000001 00000000`00000001 : nt!RtlpWalkFrameChain+0x34e
ffff8708`9d30f2e0 fffff801`38a9f2c9 : 00000000`00000000 00000000`00000004 ffffd20c`af0e09f8 ffff8708`9d309000 : nt!RtlWalkFrameChain+0x11c
ffff8708`9d30f330 fffff801`38a9ed3e : ffffd20c`b439c170 00000000`00000001 ffffa50d`e1868568 fffff801`00000001 : Ntfs!NtfsTrackOplockOwnerState+0x169
ffff8708`9d30f3a0 fffff801`38a9e33f : ffffa50d`e1868568 00000000`00000000 ffffa50d`00000103 ffffa50d`00000000 : Ntfs!NtfsOplockRequest+0x2fe
ffff8708`9d30f450 fffff801`38a9decd : ffffa50d`e1868568 00000000`00000001 00000000`00000000 00000000`00000000 : Ntfs!NtfsUserFsRequest+0x14f
ffff8708`9d30f4d0 fffff801`34e11385 : ffffa50d`e09a9c30 ffff8708`9d30f6c0 ffffa50d`dc6a5800 fffff801`328f5021 : Ntfs!NtfsFsdFileSystemControl+0x17d
ffff8708`9d30f5f0 fffff801`328f710f : 00000000`00000004 00000000`00000000 00000000`00000000 ffff8708`9d30f9c8 : nt!IofCallDriver+0x55
ffff8708`9d30f630 fffff801`3292ae74 : ffff8708`9d30f6c0 ffffa50d`c7cc1d50 00000000`000000d8 ffffa50d`c74871c0 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x28f
ffff8708`9d30f6a0 fffff801`34e11385 : 00000000`0000000a 00000000`00000002 ffffa50d`df444630 00000000`0000000c : FLTMGR!FltpFsControl+0x104
ffff8708`9d30f700 fffff801`35210dec : 00000000`00000002 00000000`00000000 ffffa50d`df444630 ffffa50d`d9dc90c0 : nt!IofCallDriver+0x55
ffff8708`9d30f740 fffff801`35210a41 : ffffa50d`dc6a5c30 ffff8708`9d30fa80 00000000`00040005 ffffa50d`dc6a5c30 : nt!IopSynchronousServiceTail+0x34c
ffff8708`9d30f7e0 fffff801`352ba5e6 : ffffdab9`d58fdf43 00000000`00000c8c 00000000`00000000 000001f6`652b3fa8 : nt!IopXxxControlFile+0xc71
ffff8708`9d30f920 fffff801`3500f7f5 : ffffa50d`00000000 00000000`00000000 ffff8708`9d30f9c8 00000000`00000000 : nt!NtFsControlFile+0x56
ffff8708`9d30f990 00007ff9`40b2d7d4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
0000002c`5737b658 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`40b2d7d4
SYMBOL_NAME: nt!MiCheckSystemNxFault+15082b
MODULE_NAME: nt
IMAGE_VERSION: 10.0.19041.3086
STACK_COMMAND: .cxr; .ecxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 15082b
FAILURE_BUCKET_ID: 0xFC_nt!MiCheckSystemNxFault
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {a6ae5288-6b71-974a-9b09-23f14d998164}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
CRITICAL_PROCESS_DIED (ef)
A critical system process died
Arguments:
Arg1: ffffe408bb8b30c0, Process object or thread object
Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
Arg3: 0000000000000000, The process object that initiated the termination.
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2484
Key : Analysis.Elapsed.mSec
Value: 10544
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 156
Key : Analysis.Init.Elapsed.mSec
Value: 974
Key : Analysis.Memory.CommitPeak.Mb
Value: 142
Key : Bugcheck.Code.LegacyAPI
Value: 0xef
Key : CriticalProcessDied.ExceptionCode
Value: b2abb080
Key : CriticalProcessDied.Process
Value: svchost.exe
Key : Failure.Bucket
Value: 0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_b2abb080_nt!PspCatchCriticalBreak
Key : Failure.Hash
Value: {674cb08e-0847-ae4e-a959-cb1301be03b0}
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: ef
BUGCHECK_P1: ffffe408bb8b30c0
BUGCHECK_P2: 0
BUGCHECK_P3: 0
BUGCHECK_P4: 0
FILE_IN_CAB: 070823-10437-01.dmp
PROCESS_NAME: svchost.exe
CRITICAL_PROCESS: svchost.exe
ERROR_CODE: (NTSTATUS) 0xb2abb080 - <Unable to get error code text>
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
STACK_TEXT:
fffffb0e`e6827838 fffff803`8290db42 : 00000000`000000ef ffffe408`bb8b30c0 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
fffffb0e`e6827840 fffff803`8280d06d : 00000000`00000000 fffff803`82313d19 00000000`00000002 fffff803`822eb36b : nt!PspCatchCriticalBreak+0x10e
fffffb0e`e68278e0 fffff803`82699710 : ffffe408`00000000 00000000`00000000 ffffe408`bb8b30c0 ffffe408`bb8b34f8 : nt!PspTerminateAllThreads+0x172d61
fffffb0e`e6827950 fffff803`8269950c : ffffe408`bb8b30c0 00000000`00000000 00000000`00000000 fffff803`82685ada : nt!PspTerminateProcess+0xe0
fffffb0e`e6827990 fffff803`8240f7f5 : ffffe408`bb8b30c0 ffffe408`b2abb080 fffffb0e`e6827a80 ffffe408`bb8b30c0 : nt!NtTerminateProcess+0x9c
fffffb0e`e6827a00 00007ffc`b28ed634 : 00007ffc`b28a2712 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
00000003`f1dff828 00007ffc`b28a2712 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`b28ed634
00000003`f1dff830 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`b28a2712
SYMBOL_NAME: nt!PspCatchCriticalBreak+10e
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.3086
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 10e
FAILURE_BUCKET_ID: 0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_b2abb080_nt!PspCatchCriticalBreak
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {674cb08e-0847-ae4e-a959-cb1301be03b0}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: ffffc93ffd4e6430
Arg3: 0000000000100000
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1312
Key : Analysis.Elapsed.mSec
Value: 3238
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 218
Key : Analysis.Init.Elapsed.mSec
Value: 2093
Key : Analysis.Memory.CommitPeak.Mb
Value: 145
Key : Bugcheck.Code.LegacyAPI
Value: 0x1a
Key : Failure.Bucket
Value: MEMORY_CORRUPTION_ONE_BIT
Key : Failure.Hash
Value: {e3faf315-c3d0-81db-819a-6c43d23c63a7}
Key : MemoryManagement.PFN
Value: 100
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 1a
BUGCHECK_P1: 41792
BUGCHECK_P2: ffffc93ffd4e6430
BUGCHECK_P3: 100000
BUGCHECK_P4: 0
FILE_IN_CAB: 070723-9859-01.dmp
MEMORY_CORRUPTOR: ONE_BIT
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: opera.exe
STACK_TEXT:
ffffaa8f`0b8c7028 fffff804`55ebc4aa : 00000000`0000001a 00000000`00041792 ffffc93f`fd4e6430 00000000`00100000 : nt!KeBugCheckEx
ffffaa8f`0b8c7030 fffff804`55ebacdf : ffff9681`23fce740 00000000`00000000 ffffc93f`00000002 00000000`00000000 : nt!MiDeleteVa+0x153a
ffffaa8f`0b8c7130 fffff804`55e7e830 : 00000000`00000001 ffffaa8f`00000000 ffff9681`23fce590 ffff9681`2cf29080 : nt!MiDeletePagablePteRange+0x48f
ffffaa8f`0b8c7440 fffff804`56285e79 : ffff9681`305b3820 00000000`00000000 ffff9681`00000000 ffff9681`00000000 : nt!MiDeleteVad+0x360
ffffaa8f`0b8c7550 fffff804`5628581c : ffff9681`305b3820 ffff9681`2de90010 ffff9681`2cf29080 00000000`00000000 : nt!MiUnmapVad+0x49
ffffaa8f`0b8c7580 fffff804`562246ef : ffff9681`305b1ac0 ffff9681`305b1ac0 ffff9681`305b3820 ffff9681`23fce0c0 : nt!MiCleanVad+0x30
ffffaa8f`0b8c75b0 fffff804`56231820 : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffff9681`23fce0c0 : nt!MmCleanProcessAddressSpace+0x137
ffffaa8f`0b8c7630 fffff804`562841d2 : ffff9681`23fce0c0 ffffcf85`16aa5060 ffffaa8f`0b8c7859 00000000`00000000 : nt!PspRundownSingleProcess+0x20c
ffffaa8f`0b8c76c0 fffff804`562c8878 : ffff9681`00000000 fffff804`55e1be01 ffff9681`00000000 000000b9`73cc6000 : nt!PspExitThread+0x5f6
ffffaa8f`0b8c77c0 fffff804`55ede0cd : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSchedulerApcTerminate+0x38
ffffaa8f`0b8c7800 fffff804`56001480 : 00000000`00000000 ffffaa8f`0b8c78c0 ffffaa8f`0b8c7a00 00007ffa`9dff61f0 : nt!KiDeliverApc+0x60d
ffffaa8f`0b8c78c0 fffff804`5600f89f : ffff9681`2cf29080 ffff9681`30e91b60 00000000`00000000 00000000`00000000 : nt!KiInitiateUserApc+0x70
ffffaa8f`0b8c7a00 00007ffa`9f0ad134 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
000000b9`77dff438 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`9f0ad134
MODULE_NAME: hardware
IMAGE_NAME: memory_corruption
STACK_COMMAND: .cxr; .ecxr ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
WHEA_UNCORRECTABLE_ERROR (124)
A fatal hardware error has occurred. Parameter 1 identifies the type of error
source that reported the error. Parameter 2 holds the address of the
nt!_WHEA_ERROR_RECORD structure that describes the error condition. Try !errrec Address of the nt!_WHEA_ERROR_RECORD structure to get more details.
Arguments:
Arg1: 0000000000000000, Machine Check Exception
Arg2: ffffac0fcc348028, Address of the nt!_WHEA_ERROR_RECORD structure.
Arg3: 00000000be000000, High order 32-bits of the MCi_STATUS value.
Arg4: 0000000000800400, Low order 32-bits of the MCi_STATUS value.
Debugging Details:
------------------
*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: hal!_WHEA_PROCESSOR_GENERIC_ERROR_SECTION ***
*** ***
*************************************************************************
*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: hal!_WHEA_PROCESSOR_GENERIC_ERROR_SECTION ***
*** ***
*************************************************************************
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1890
Key : Analysis.Elapsed.mSec
Value: 6885
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 202
Key : Analysis.Init.Elapsed.mSec
Value: 1487
Key : Analysis.Memory.CommitPeak.Mb
Value: 140
Key : Bugcheck.Code.LegacyAPI
Value: 0x124
Key : Failure.Bucket
Value: 0x124_0_GenuineIntel_PROCESSOR__UNKNOWN_IMAGE_GenuineIntel.sys
Key : Failure.Hash
Value: {5371cb52-c3d9-558e-47d4-d31c09567ca2}
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 124
BUGCHECK_P1: 0
BUGCHECK_P2: ffffac0fcc348028
BUGCHECK_P3: be000000
BUGCHECK_P4: 800400
FILE_IN_CAB: 062923-7234-01.dmp
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
STACK_TEXT:
ffff8001`0d3f3908 fffff806`204b77ba : 00000000`00000124 00000000`00000000 ffffac0f`cc348028 00000000`be000000 : nt!KeBugCheckEx
ffff8001`0d3f3910 fffff806`1e7815b0 : 00000000`00000000 ffffac0f`cc348028 ffffac0f`c71ef690 ffffac0f`cc348028 : nt!HalBugCheckSystem+0xca
ffff8001`0d3f3950 fffff806`205b9a9e : 00000000`00000000 ffff8001`0d3f39f9 ffffac0f`cc348028 ffffac0f`c71ef690 : PSHED!PshedBugCheckSystem+0x10
ffff8001`0d3f3980 fffff806`204b90e1 : ffffac0f`cc39e070 ffffac0f`cc39e070 ffffac0f`c71ef6e0 ffffac0f`c71ef690 : nt!WheaReportHwError+0x46e
ffff8001`0d3f3a60 fffff806`204b9453 : 00000000`00000007 ffffac0f`c71ef6e0 ffffac0f`c71ef690 00000000`00000007 : nt!HalpMcaReportError+0xb1
ffff8001`0d3f3bd0 fffff806`204b9330 : ffffac0f`c70cae88 00010000`00000001 00000000`00000000 01d5acdd`df81caf3 : nt!HalpMceHandlerCore+0xef
ffff8001`0d3f3c20 fffff806`204b9581 : 00000000`00000008 00000000`00000001 00000000`00000000 00380034`005f0074 : nt!HalpMceHandler+0xe0
ffff8001`0d3f3c60 fffff806`204b87eb : 00000000`00000000 00000000`00000000 ffff8001`0d3f3ef0 00010000`000008ae : nt!HalpMceHandlerWithRendezvous+0xc9
ffff8001`0d3f3c90 fffff806`204bb035 : ffffac0f`c70cae88 01d5acdd`df81caf3 00000000`00009000 00000000`00008a00 : nt!HalpHandleMachineCheck+0x5f
ffff8001`0d3f3cc0 fffff806`20510b59 : 00650072`00500065 0075006f`00690076 00380034`005f0073 00480030`00300030 : nt!HalHandleMcheck+0x35
ffff8001`0d3f3cf0 fffff806`2040cbba : 00010000`00014929 00000000`00580068 00010000`000008ae 01d5acdd`d72c9b62 : nt!KiHandleMcheck+0x9
ffff8001`0d3f3d20 fffff806`2040c877 : 00000000`00000000 fffff806`2040c7ac 00000000`00000002 00000000`00000000 : nt!KxMcheckAbort+0x7a
ffff8001`0d3f3e60 fffff806`507b138f : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiMcheckAbort+0x277
ffffd209`dbc8f5b8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : intelppm!MWaitIdle+0x1f
MODULE_NAME: GenuineIntel
IMAGE_NAME: GenuineIntel.sys
STACK_COMMAND: .cxr; .ecxr ; kb
FAILURE_BUCKET_ID: 0x124_0_GenuineIntel_PROCESSOR__UNKNOWN_IMAGE_GenuineIntel.sys
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {5371cb52-c3d9-558e-47d4-d31c09567ca2}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
WHEA_UNCORRECTABLE_ERROR (124)
A fatal hardware error has occurred. Parameter 1 identifies the type of error
source that reported the error. Parameter 2 holds the address of the
nt!_WHEA_ERROR_RECORD structure that describes the error condition. Try !errrec Address of the nt!_WHEA_ERROR_RECORD structure to get more details.
Arguments:
Arg1: 0000000000000000, Machine Check Exception
Arg2: ffffb987823d1028, Address of the nt!_WHEA_ERROR_RECORD structure.
Arg3: 00000000be000000, High order 32-bits of the MCi_STATUS value.
Arg4: 0000000000800400, Low order 32-bits of the MCi_STATUS value.
Debugging Details:
------------------
*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: hal!_WHEA_PROCESSOR_GENERIC_ERROR_SECTION ***
*** ***
*************************************************************************
*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: hal!_WHEA_PROCESSOR_GENERIC_ERROR_SECTION ***
*** ***
*************************************************************************
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2500
Key : Analysis.Elapsed.mSec
Value: 5025
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 171
Key : Analysis.Init.Elapsed.mSec
Value: 1482
Key : Analysis.Memory.CommitPeak.Mb
Value: 150
Key : Bugcheck.Code.LegacyAPI
Value: 0x124
Key : Failure.Bucket
Value: 0x124_0_GenuineIntel_PROCESSOR__UNKNOWN_IMAGE_GenuineIntel.sys
Key : Failure.Hash
Value: {5371cb52-c3d9-558e-47d4-d31c09567ca2}
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 124
BUGCHECK_P1: 0
BUGCHECK_P2: ffffb987823d1028
BUGCHECK_P3: be000000
BUGCHECK_P4: 800400
FILE_IN_CAB: 062923-9421-01.dmp
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
STACK_TEXT:
ffffa801`9f73f908 fffff803`23cb77ba : 00000000`00000124 00000000`00000000 ffffb987`823d1028 00000000`be000000 : nt!KeBugCheckEx
ffffa801`9f73f910 fffff803`226a15b0 : 00000000`00000000 ffffb987`823d1028 ffffb987`7deb0b30 ffffb987`823d1028 : nt!HalBugCheckSystem+0xca
ffffa801`9f73f950 fffff803`23db9a9e : 00000000`00000000 ffffa801`9f73f9f9 ffffb987`823d1028 ffffb987`7deb0b30 : PSHED!PshedBugCheckSystem+0x10
ffffa801`9f73f980 fffff803`23cb90e1 : ffffb987`7dbe3070 ffffb987`7dbe3070 ffffb987`7deb0b80 ffffb987`7deb0b30 : nt!WheaReportHwError+0x46e
ffffa801`9f73fa60 fffff803`23cb9453 : 00000000`00000001 ffffb987`7deb0b80 ffffb987`7deb0b30 00000000`00000001 : nt!HalpMcaReportError+0xb1
ffffa801`9f73fbd0 fffff803`23cb9330 : ffffb987`7daf4a38 e8004024`00000001 00000000`00000000 48482454`8b483c78 : nt!HalpMceHandlerCore+0xef
ffffa801`9f73fc20 fffff803`23cb9581 : 00000000`00000008 00000000`00000001 00000000`00000000 0975d285`48402454 : nt!HalpMceHandler+0xe0
ffffa801`9f73fc60 fffff803`23cb87eb : 00000000`00000000 00000000`00000000 ffffa801`9f73fef0 8d4c0020`24648348 : nt!HalpMceHandlerWithRendezvous+0xc9
ffffa801`9f73fc90 fffff803`23cbb035 : ffffb987`7daf4a38 8d4c0020`24648348 058d4cff`cdf0bb0d 2d158d48`ffd1e1a4 : nt!HalpHandleMachineCheck+0x5f
ffffa801`9f73fcc0 fffff803`23d10b59 : 8d48001f`12da058d 05894800`1f12630d c5058948`001f12d4 ff82d2f0`e8001f12 : nt!HalHandleMcheck+0x35
ffffa801`9f73fcf0 fffff803`23c0cbba : a286158d`48002e00 48382444`8948fffe d48fa7e8`30244c8d ccccc348`c48348ff : nt!KiHandleMcheck+0x9
ffffa801`9f73fd20 fffff803`23c0c877 : 00000000`00000000 fffff803`23c0c7ac 00000000`00000002 00000000`00000000 : nt!KxMcheckAbort+0x7a
ffffa801`9f73fe60 fffff803`5482138f : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiMcheckAbort+0x277
fffff309`5042f5b8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : intelppm!MWaitIdle+0x1f
MODULE_NAME: GenuineIntel
IMAGE_NAME: GenuineIntel.sys
STACK_COMMAND: .cxr; .ecxr ; kb
FAILURE_BUCKET_ID: 0x124_0_GenuineIntel_PROCESSOR__UNKNOWN_IMAGE_GenuineIntel.sys
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {5371cb52-c3d9-558e-47d4-d31c09567ca2}
Followup: MachineOwner
---------