DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
DISPATCH_LEVEL or above. The offending component can usually be
identified with a stack trace.
Arg2: 0000000000001e00, The watchdog period.
Arg3: fffff80378d6e350, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
additional information regarding the cumulative timeout
Arg4: 0000000000000000
Debugging Details:
------------------
*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: TickPeriods ***
*** ***
*************************************************************************
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 9
Key : Analysis.Elapsed.Sec
Value: 19
Key : Analysis.Memory.CommitPeak.Mb
Value: 68
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
SYSTEM_MANUFACTURER: Micro-Star International Co., Ltd.
SYSTEM_PRODUCT_NAME: MS-7B84
SYSTEM_SKU: To be filled by O.E.M.
SYSTEM_VERSION: 2.0
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 4.00
BIOS_DATE: 12/20/2018
BASEBOARD_MANUFACTURER: Micro-Star International Co., Ltd.
BASEBOARD_PRODUCT: B450M PRO-M2 V2 (MS-7B84)
BASEBOARD_VERSION: 2.0
DUMP_TYPE: 2
BUGCHECK_P1: 1
BUGCHECK_P2: 1e00
BUGCHECK_P3: fffff80378d6e350
BUGCHECK_P4: 0
DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED
CPU_COUNT: c
CPU_MHZ: d48
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 8
CPU_STEPPING: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: 0x133
PROCESS_NAME: ctfmon.exe
CURRENT_IRQL: d
ANALYSIS_SESSION_HOST: DESKTOP-HH6FM2D
ANALYSIS_SESSION_TIME: 07-26-2019 14:17:33.0313
ANALYSIS_VERSION: 10.0.18914.1001 amd64fre
LAST_CONTROL_TRANSFER: from fffff803789ebdb3 to fffff803789bc900
STACK_TEXT:
ffffd100`0f598af8 fffff803`789ebdb3 : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff803`78d6e350 : nt!KeBugCheckEx
ffffd100`0f598b00 fffff803`7881f16f : 00000074`67f88624 ffffd100`0f540180 00000000`00000286 00000000`00002182 : nt!KeAccumulateTicks+0x1c94f3
ffffd100`0f598b60 fffff803`792b51e1 : 00000000`00000000 ffffe108`8caa1f00 ffff910b`1cd4f160 ffffe108`8caa1fb0 : nt!KeClockInterruptNotify+0xcf
ffffd100`0f598f30 fffff803`78802e15 : ffffe108`8caa1f00 00000000`00000000 00000000`00000000 ffff1e4c`6de8b28c : hal!HalpTimerClockIpiRoutine+0x21
ffffd100`0f598f60 fffff803`789be36a : ffff910b`1cd4f160 ffffe108`8caa1f00 00000000`00000040 ffffe108`8caa1f00 : nt!KiCallInterruptServiceRoutine+0xa5
ffffd100`0f598fb0 fffff803`789be8b7 : 00000000`1d722351 ffff910b`1cd4f160 ffffe108`8caa1f00 00000000`00000000 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
ffff910b`1cd4f0e0 fffff803`78840dd4 : ffff8105`dc4b5880 ffff8105`dc0c3e20 ffffe108`9136c180 ffffe108`94c1dc28 : nt!KiInterruptDispatchNoLockNoEtw+0x37
ffff910b`1cd4f270 fffff803`788eefbd : ffffffff`ffffffff ffffe108`956b5000 ffff910b`1cd4f3d0 00000000`00000000 : nt!ExAcquireSpinLockExclusive+0xa4
ffff910b`1cd4f2a0 fffff803`78833f4a : ffffffff`ffffffff ffff910b`1cd4f3d0 ffffe108`956b5000 00000001`00000001 : nt!RtlpHpAcquireLockExclusive+0xd
ffff910b`1cd4f2d0 fffff803`78832710 : ffffe108`8c402340 ffffe108`8c403100 ffffe108`8c4032c0 fffff803`00000190 : nt!RtlpHpLfhSlotAllocate+0xeda
ffff910b`1cd4f430 fffff803`78b6a06d : 00000000`00000000 00000000`00000000 fffff803`656c6946 ffffe108`920078b0 : nt!ExAllocateHeapPool+0x2c0
ffff910b`1cd4f570 fffff803`78debb30 : ffffe108`8cbf1640 00000000`00000000 00000000`00000010 fffff803`00000000 : nt!ExAllocatePoolWithTag+0x5d
ffff910b`1cd4f5c0 fffff803`78de7179 : ffffe108`0000004c ffffe108`8cbf1601 ffffe108`00000010 ffff910b`1cd4f688 : nt!ObpAllocateObject+0x1a0
ffff910b`1cd4f640 fffff803`78de8798 : fffff803`78de7e45 ffffe108`9113fd90 ffffe108`9112a8f0 ffff910b`00000001 : nt!IopAllocRealFileObject+0x119
ffff910b`1cd4f710 fffff803`78def29f : ffffe108`9112a8f0 ffffe108`9112a845 ffffe108`91e0ba20 00000000`00000001 : nt!IopParseDevice+0x968
ffff910b`1cd4f880 fffff803`78ded701 : ffffe108`91e0ba00 ffff910b`1cd4fac8 ffffac80`00000040 ffffe108`8cbf1640 : nt!ObpLookupObjectName+0x78f
ffff910b`1cd4fa40 fffff803`78eaf234 : ffffbfbf`00000001 00000000`00000028 000001eb`197bf670 000000e7`eba7d080 : nt!ObOpenObjectByNameEx+0x201
ffff910b`1cd4fb80 fffff803`789ce118 : ffffe108`95947080 ffffe108`957e8be0 ffffe108`95947080 000000e7`eba7d080 : nt!NtQueryAttributesFile+0x1b4
ffff910b`1cd4fe40 00007ff8`8633c804 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000e7`eba7cef8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`8633c804
THREAD_SHA1_HASH_MOD_FUNC: d06cd42f757a9be451bb2961c6e9ce7ed687659e
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 1055ccc12e3de9f1ef0a1a90a1706521f5ab813d
THREAD_SHA1_HASH_MOD: 351d6799213c6635f947e528ad70424d64a900fd
FOLLOWUP_IP:
nt!KeAccumulateTicks+1c94f3
fffff803`789ebdb3 cc int 3
FAULT_INSTR_CODE: ab3944cc
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!KeAccumulateTicks+1c94f3
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 3ed0f42
IMAGE_VERSION: 10.0.18362.239
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 1c94f3
FAILURE_BUCKET_ID: 0x133_ISR_nt!KeAccumulateTicks
BUCKET_ID: 0x133_ISR_nt!KeAccumulateTicks
PRIMARY_PROBLEM_CLASS: 0x133_ISR_nt!KeAccumulateTicks
TARGET_TIME: 2019-07-21T19:25:23.000Z
OSBUILD: 18362
OSSERVICEPACK: 239
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1972-02-02 11:33:06
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 4d7a
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x133_isr_nt!keaccumulateticks
FAILURE_ID_HASH: {65350307-c3b9-f4b5-8829-4d27e9ff9b06}
Followup: MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000023, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80052ae2245, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 12
Key : Analysis.Elapsed.Sec
Value: 18
Key : Analysis.Memory.CommitPeak.Mb
Value: 65
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
DUMP_TYPE: 2
BUGCHECK_P1: 23
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff80052ae2245
READ_ADDRESS: fffff80052f6e3b0: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
0000000000000023
CURRENT_IRQL: 2
FAULTING_IP:
nt!MiStealPage+1e1
fffff800`52ae2245 440fb66622 movzx r12d,byte ptr [rsi+22h]
CPU_COUNT: c
CPU_MHZ: d48
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 8
CPU_STEPPING: 2
BLACKBOXNTFS: 1 (!blackboxntfs)
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: System
ANALYSIS_SESSION_HOST: DESKTOP-HH6FM2D
ANALYSIS_SESSION_TIME: 07-26-2019 14:17:35.0938
ANALYSIS_VERSION: 10.0.18914.1001 amd64fre
TRAP_FRAME: ffffc08ea731d880 -- (.trap 0xffffc08ea731d880)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffc08ea731df40 rbx=0000000000000000 rcx=0000000000000001
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80052ae2245 rsp=ffffc08ea731da10 rbp=ffffc08ea731db10
r8=0000000000000002 r9=0000000000000001 r10=0000000000000008
r11=ffff9dcec0000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
nt!MiStealPage+0x1e1:
fffff800`52ae2245 440fb66622 movzx r12d,byte ptr [rsi+22h] ds:00000000`00000022=??
Resetting default scope
LOCK_ADDRESS: fffff80052e5d6e0 -- (!locks fffff80052e5d6e0)
Cannot get _ERESOURCE type
Resource @ nt!PiEngineLock (0xfffff80052e5d6e0) Available
1 total locks
PNP_TRIAGE_DATA:
Lock address : 0xfffff80052e5d6e0
Thread Count : 0
Thread address: 0x0000000000000000
Thread wait : 0x0
LAST_CONTROL_TRANSFER: from fffff80052bce6e9 to fffff80052bbc900
STACK_TEXT:
ffffc08e`a731d738 fffff800`52bce6e9 : 00000000`0000000a 00000000`00000023 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffc08e`a731d740 fffff800`52bcaa2b : ffff9dce`fe0014e8 00000000`00000000 ffffaf8c`f37e4000 fffff800`52a7b8c4 : nt!KiBugCheckDispatch+0x69
ffffc08e`a731d880 fffff800`52ae2245 : ffffc08e`a731db10 ffffc600`0c5da170 ffff9dfc`0029d160 00000000`00000000 : nt!KiPageFault+0x46b
ffffc08e`a731da10 fffff800`52a896fe : ffffc600`0c5da170 ffffc600`0c5da170 00000000`00000000 ffffc08e`a731dda0 : nt!MiStealPage+0x1e1
ffffc08e`a731dcd0 fffff800`52a892b3 : ffffc08e`ffffffff fffff800`52a8ac2e 00200000`00000000 fffff800`00000001 : nt!MiTradePage+0x34e
ffffc08e`a731dd80 fffff800`52a8a31a : 00000000`00000000 00000000`0041f35d 00000000`ffffffff 00000000`0041f35d : nt!MiClaimPhysicalRun+0xbb
ffffc08e`a731de20 fffff800`53000022 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiFindContiguousPages+0x34a
ffffc08e`a731dfd0 fffff800`52a55bef : fffff800`52e63900 ffff9dfc`002b17c8 fffff800`562f9000 ffffffff`ffffffff : nt!MiAllocateDriverPage+0x7e
ffffc08e`a731e060 fffff800`530fc15d : ffff6c0a`66c5a81e 00000000`00000000 00000000`00000000 fffff800`530f74f4 : nt!MiLockCode+0x7af
ffffc08e`a731e200 fffff800`530f9b94 : ffff9dfc`002b1700 ffff9dfc`002b1c08 00000000`00000000 ffffd00d`eea6a060 : nt!MiDisablePagingOfDriver+0x71
ffffc08e`a731e250 fffff800`530f92d7 : 00000000`00000000 00000000`00000000 ffffaf8c`f8087c00 00000000`00000000 : nt!MiHandleDriverNonPagedSections+0x64
ffffc08e`a731e2c0 fffff800`53108ea6 : ffffc08e`a731e508 00000000`00000000 00000000`00000000 00000000`00000001 : nt!MmLoadSystemImageEx+0x47b
ffffc08e`a731e470 fffff800`53108988 : ffffc08e`a731e5b0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmLoadSystemImage+0x26
ffffc08e`a731e4b0 fffff800`53127797 : 00000000`00000000 00000000`00000000 00000000`00000004 ffffc08e`00000004 : nt!IopLoadDriver+0x224
ffffc08e`a731e690 fffff800`530f1a56 : 00000000`00000001 00000000`00000000 ffffaf8c`f6b938d0 ffffffff`8000015c : nt!PipCallDriverAddDeviceQueryRoutine+0x1c3
ffffc08e`a731e730 fffff800`530f145d : 00000000`00000000 ffffc08e`a731e840 00000000`6e657050 00000000`00000012 : nt!PnpCallDriverQueryServiceHelper+0xda
ffffc08e`a731e7e0 fffff800`530f0b11 : ffffaf8c`f6bb94e0 ffffc08e`a731ea18 ffffaf8c`f6bb94e0 00000000`00000000 : nt!PipCallDriverAddDevice+0x409
ffffc08e`a731e9a0 fffff800`5317cb88 : ffffaf8c`f6accf00 ffffc08e`a731eb01 ffffc08e`a731eab0 fffff800`00000000 : nt!PipProcessDevNodeTree+0x1b9
ffffc08e`a731ea60 fffff800`52b5901e : 00000001`00000003 ffffaf8c`f6accf10 ffff8d81`00000000 ffffaf8c`f6accf10 : nt!PiProcessStartSystemDevices+0x60
ffffc08e`a731eab0 fffff800`52ac4855 : ffffaf8c`f8177080 ffffaf8c`f3667ae0 fffff800`52e5bf80 ffffaf8c`f3667ae0 : nt!PnpDeviceActionWorker+0x45e
ffffc08e`a731eb70 fffff800`52b2f725 : ffffaf8c`f8177080 00000000`00000080 ffffaf8c`f36a7040 00000067`b4bbbdff : nt!ExpWorkerThread+0x105
ffffc08e`a731ec10 fffff800`52bc3e6a : ffff8d81`0df22180 ffffaf8c`f8177080 fffff800`52b2f6d0 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffc08e`a731ec60 00000000`00000000 : ffffc08e`a731f000 ffffc08e`a7319000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x2a
THREAD_SHA1_HASH_MOD_FUNC: ac2e4d0c77d8381f0a27ee4cbe7e5510a815351b
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: d4ce872e3d2f999c574b89727a9db5e999a4eef6
THREAD_SHA1_HASH_MOD: cbd6d858ece2492ed52a5625660f550734be73dc
FOLLOWUP_IP:
nt!MiStealPage+1e1
fffff800`52ae2245 440fb66622 movzx r12d,byte ptr [rsi+22h]
FAULT_INSTR_CODE: 66b60f44
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!MiStealPage+1e1
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 3ed0f42
IMAGE_VERSION: 10.0.18362.239
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: memory_corruption
BUCKET_ID_FUNC_OFFSET: 1e1
FAILURE_BUCKET_ID: AV_nt!MiStealPage
BUCKET_ID: AV_nt!MiStealPage
PRIMARY_PROBLEM_CLASS: AV_nt!MiStealPage
TARGET_TIME: 2019-07-22T09:26:15.000Z
OSBUILD: 18362
OSSERVICEPACK: 239
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1972-02-02 11:33:06
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 4737
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_nt!mistealpage
FAILURE_ID_HASH: {17576dda-297d-ae8d-ee16-7d36ac48a792}
Followup: MachineOwner
---------
FAST_ERESOURCE_PRECONDITION_VIOLATION (1c6)
The current thread is performing an invalid call to a fast resource routine.
Arguments:
Arg1: 000000000000000f, The caller passed a fast resource to a legacy routine that
supports fast resources, but the fast resource was not
initialized with EX_FAST_RESOURCE_ENABLE_LEGACY_APIS.
Arg2: ffffc188289a4cb0, Pointer to the resource.
Arg3: 0000000000000000
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 9
Key : Analysis.Elapsed.Sec
Value: 22
Key : Analysis.Memory.CommitPeak.Mb
Value: 73
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
SYSTEM_MANUFACTURER: Micro-Star International Co., Ltd.
SYSTEM_PRODUCT_NAME: MS-7B84
SYSTEM_SKU: To be filled by O.E.M.
SYSTEM_VERSION: 2.0
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 4.00
BIOS_DATE: 12/20/2018
BASEBOARD_MANUFACTURER: Micro-Star International Co., Ltd.
BASEBOARD_PRODUCT: B450M PRO-M2 V2 (MS-7B84)
BASEBOARD_VERSION: 2.0
DUMP_TYPE: 2
BUGCHECK_P1: f
BUGCHECK_P2: ffffc188289a4cb0
BUGCHECK_P3: 0
BUGCHECK_P4: 0
CPU_COUNT: c
CPU_MHZ: d48
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 8
CPU_STEPPING: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: 0x1C6
PROCESS_NAME: schtasks.exe
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-HH6FM2D
ANALYSIS_SESSION_TIME: 07-26-2019 14:17:30.0437
ANALYSIS_VERSION: 10.0.18914.1001 amd64fre
LAST_CONTROL_TRANSFER: from fffff8050fafe31f to fffff8050fbbc900
STACK_TEXT:
fffff107`3d24c188 fffff805`0fafe31f : 00000000`000001c6 00000000`0000000f ffffc188`289a4cb0 00000000`00000000 : nt!KeBugCheckEx
fffff107`3d24c190 fffff805`11bd9968 : ffffc188`2dfc3748 00000000`00000000 ffffab0a`00000000 fffff107`3d24c1f0 : nt!ExIsResourceAcquiredExclusiveLite+0x6f
fffff107`3d24c1d0 fffff805`0fa917d8 : fffff107`3d24c620 ffffab0a`5636a030 00000000`00000000 fffff107`3d24c620 : Ntfs!NtfsFilterCallbackAcquireForCreateSection+0x1e8
fffff107`3d24c570 fffff805`1001dccc : 00000000`00000000 00000000`00000000 ffffab0a`5614ed60 fffff805`11bd9780 : nt!FsFilterPerformCallbacks+0xd8
fffff107`3d24c5d0 fffff805`1001d9c1 : 00000000`00336754 00000002`00008080 ffffc188`333b6e70 00000000`00000000 : nt!FsRtlAcquireFileExclusiveCommon+0x10c
fffff107`3d24c8c0 fffff805`0fa915a9 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff107`3d24cb00 : nt!FsRtlAcquireFileExclusive+0x11
fffff107`3d24c8f0 fffff805`0ffdc3d2 : ffffab0a`591f1ab0 00000000`08000000 ffffc188`333b6e70 00000000`00000002 : nt!CcZeroEndOfLastPage+0x49
fffff107`3d24c940 fffff805`0ffdc110 : 0000005a`f7a7e990 00000000`000f0005 00000000`00000000 fffff9bf`fc5474e0 : nt!MiCreateSectionCommon+0x252
fffff107`3d24ca20 fffff805`0fbce118 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtCreateSection+0x60
fffff107`3d24ca90 00007ff8`abdbc9a4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000005a`f7a7e938 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`abdbc9a4
THREAD_SHA1_HASH_MOD_FUNC: bc05d70fdcb4cafc04b8e0400349987b5ffebe5b
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 71d585167d4976f63b12e7b97c4987bdd3f67836
THREAD_SHA1_HASH_MOD: f2b06249f80abeea5caef5dda430ced33dad5ec1
FOLLOWUP_IP:
nt!ExIsResourceAcquiredExclusiveLite+6f
fffff805`0fafe31f cc int 3
FAULT_INSTR_CODE: cccccccc
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!ExIsResourceAcquiredExclusiveLite+6f
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 3ed0f42
IMAGE_VERSION: 10.0.18362.239
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 6f
FAILURE_BUCKET_ID: 0x1C6_nt!ExIsResourceAcquiredExclusiveLite
BUCKET_ID: 0x1C6_nt!ExIsResourceAcquiredExclusiveLite
PRIMARY_PROBLEM_CLASS: 0x1C6_nt!ExIsResourceAcquiredExclusiveLite
TARGET_TIME: 2019-07-22T08:31:54.000Z
OSBUILD: 18362
OSSERVICEPACK: 239
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1972-02-02 11:33:06
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 56a6
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x1c6_nt!exisresourceacquiredexclusivelite
FAILURE_ID_HASH: {cd7154ab-ddce-4ffc-05fb-4408c0625f12}
Followup: MachineOwner
---------