SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8005ede1d6e, Address of the instruction which caused the bugcheck
Arg3: ffff8a85a3ac9130, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 19041.1.amd64fre.vb_release.191206-1406
SYSTEM_MANUFACTURER: System manufacturer
SYSTEM_PRODUCT_NAME: System Product Name
SYSTEM_SKU: SKU
SYSTEM_VERSION: System Version
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 1903
BIOS_DATE: 08/19/2013
BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
BASEBOARD_PRODUCT: MAXIMUS V EXTREME
BASEBOARD_VERSION: Rev 1.xx
DUMP_TYPE: 2
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff8005ede1d6e
BUGCHECK_P3: ffff8a85a3ac9130
BUGCHECK_P4: 0
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
Ntfs!NtfsCompareLcbTableEntriesCaseInsensitive+8e
fffff800`5ede1d6e 41ffc2 inc r10d
CONTEXT: ffff8a85a3ac9130 -- (.cxr 0xffff8a85a3ac9130)
rax=ffffdb0758867000 rbx=0000000000000005 rcx=0000000000000005
rdx=000000000000000a rsi=ffffdb075c1c3bd0 rdi=0000000000000000
rip=fffff8005ede1d6e rsp=ffff8a85a3ac9b30 rbp=0000000000000008
r8=000000000000004d r9=000000000000004d r10=0000000000000005
r11=0000000000000009 r12=0000000000000012 r13=ffffdb0758a71528
r14=ffff8a85a3ac9c80 r15=0000000000000012
iopl=0 nv up ei ng nz ac po cy
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010297
Ntfs!NtfsCompareLcbTableEntriesCaseInsensitive+0x8e:
fffff800`5ede1d6e 41ffc2 inc r10d
Resetting default scope
BUGCHECK_STR: 0x3B_c0000005
CPU_COUNT: 4
CPU_MHZ: d48
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 3a
CPU_STEPPING: 9
CPU_MICROCODE: 6,3a,9,0 (F,M,S,R) SIG: 21'00000000 (cache) 21'00000000 (init)
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: ModernWarfare.exe
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-ME9UFOB
ANALYSIS_SESSION_TIME: 04-12-2020 15:03:02.0875
ANALYSIS_VERSION: 10.0.18362.1 amd64fre
LAST_CONTROL_TRANSFER: from fffff8005edebf35 to fffff8005ede1d6e
STACK_TEXT:
ffff8a85`a3ac9b30 fffff800`5edebf35 : ffffdb07`5c1c3bd0 ffff8a85`a3ac9c80 ffffdb07`58a71408 ffffdb07`58a71528 : Ntfs!NtfsCompareLcbTableEntriesCaseInsensitive+0x8e
ffff8a85`a3ac9b60 fffff800`5eecbd9e : ffffdb07`58a71170 ffffdb07`58a71170 00000000`00000000 ffff8a85`a3aca1d0 : Ntfs!FsLibLookupFirstMatchingElementGenericTableAvl+0x45
ffff8a85`a3ac9b90 fffff800`5eedef78 : ffff8a85`a3aca1d0 ffffb281`4e4a64f0 00000000`00000000 00000000`00000101 : Ntfs!NtfsFindPrefix+0x48e
ffff8a85`a3ac9cf0 fffff800`5eedfda0 : ffffb281`53e165e8 ffffb281`56039460 ffffb281`56039460 ffff8a85`a3ac9f90 : Ntfs!NtfsFindStartingNode+0x4d8
ffff8a85`a3ac9de0 fffff800`5eedc2db : ffffb281`56039460 ffff8a85`a3aca1d0 ffffb281`56039460 00000000`00000000 : Ntfs!NtfsCommonCreate+0x580
ffff8a85`a3aca0c0 fffff800`59a87d3a : ffffb281`4e4a5030 ffffb281`56039460 ffffb281`4e2f1500 ffffb281`4e49a010 : Ntfs!NtfsFsdCreate+0x1db
ffff8a85`a3aca340 fffff800`59a87ce7 : ffffb281`53678010 ffffb281`55005700 ffffb281`56039460 ffffb281`55005758 : nt!IopfCallDriver+0x46
ffff8a85`a3aca380 fffff800`58c86ccf : ffffb281`55005700 ffff8a85`a3aca460 ffff8a85`a3aca469 fffff800`58c85b37 : nt!IofCallDriver+0x17
ffff8a85`a3aca3b0 fffff800`58cbbbc4 : ffff8a85`a3aca460 ffffb281`55005758 ffffb281`4e498c70 fffff800`59a938ca : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x28f
ffff8a85`a3aca420 fffff800`59a87d3a : 00000000`00000000 ffffb281`4e498c70 00000000`00000000 00000000`00000000 : FLTMGR!FltpCreate+0x324
ffff8a85`a3aca4d0 fffff800`59a87ce7 : 00000000`00000000 00000000`00000001 00000000`00000000 fffff800`59a6aebc : nt!IopfCallDriver+0x46
ffff8a85`a3aca510 fffff800`59a87ca0 : 00000000`00000000 fffff800`5a13305b ffffb281`56039480 fffff800`59a88ab7 : nt!IofCallDriver+0x17
ffff8a85`a3aca540 fffff800`59de5a9e : ffffb281`4e498c70 ffff8a85`a3aca7f0 ffffb281`55005700 ffffdb07`00000040 : nt!IoCallDriverWithTracing+0x2c
ffff8a85`a3aca590 fffff800`59ddafee : ffffb281`4e471460 ffff8a85`00120089 ffffb281`561e5460 ffffdb07`58275801 : nt!IopParseDevice+0x69e
ffff8a85`a3aca6f0 fffff800`59ddc12d : ffffb281`561e5400 ffff8a85`a3aca8c0 ffffdb07`00000040 ffffb281`561e5460 : nt!ObpLookupObjectName+0x3ee
ffff8a85`a3aca840 fffff800`59dc9344 : 00000000`00000000 ffffb281`542e9010 00000000`00000001 00000000`00000000 : nt!ObOpenObjectByNameEx+0x17d
ffff8a85`a3aca950 fffff800`59dc67a8 : 0000007a`378fefa8 00000000`80100080 0000007a`378fefe8 0000007a`378fefb0 : nt!IopCreateFile+0x408
ffff8a85`a3acaa00 fffff800`59baf178 : 00000000`00000000 fffff800`59a82e5f 00000000`00000000 00000000`00000000 : nt!NtCreateFile+0x78
ffff8a85`a3acaa90 00007ffb`3a5ab874 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000007a`378fef28 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`3a5ab874
THREAD_SHA1_HASH_MOD_FUNC: 56f30f20d78fac751b7933fa76a5f633d44516ca
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 7878ef4cf915b2c8a1a3853fe47b5577a19743f4
THREAD_SHA1_HASH_MOD: 8ab90958a0079b7410c70e22eef1fbef649f6f14
FOLLOWUP_IP:
Ntfs!NtfsCompareLcbTableEntriesCaseInsensitive+8e
fffff800`5ede1d6e 41ffc2 inc r10d
FAULT_INSTR_CODE: 44c2ff41
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: Ntfs!NtfsCompareLcbTableEntriesCaseInsensitive+8e
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: Ntfs
IMAGE_NAME: Ntfs.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 5ae1bb21
IMAGE_VERSION: 10.0.19041.1025
STACK_COMMAND: .cxr 0xffff8a85a3ac9130 ; kb
BUCKET_ID_FUNC_OFFSET: 8e
FAILURE_BUCKET_ID: 0x3B_c0000005_Ntfs!NtfsCompareLcbTableEntriesCaseInsensitive
BUCKET_ID: 0x3B_c0000005_Ntfs!NtfsCompareLcbTableEntriesCaseInsensitive
PRIMARY_PROBLEM_CLASS: 0x3B_c0000005_Ntfs!NtfsCompareLcbTableEntriesCaseInsensitive
TARGET_TIME: 2020-04-10T13:29:21.000Z
OSBUILD: 19041
OSSERVICEPACK: 153
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1996-06-25 00:28:37
BUILDDATESTAMP_STR: 191206-1406
BUILDLAB_STR: vb_release
BUILDOSVER_STR: 10.0.19041.1.amd64fre.vb_release.191206-1406
ANALYSIS_SESSION_ELAPSED_TIME: 302a
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x3b_c0000005_ntfs!ntfscomparelcbtableentriescaseinsensitive
FAILURE_ID_HASH: {643b1572-10af-990e-3668-d5620c6d9754}
Followup: MachineOwner
---------
UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault). The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
use .trap on that value
Else
.trap on the appropriate frame will show where the trap was taken
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: ffffe201c4fa0e50
Arg3: fffff9840c0f5fa0
Arg4: fffff8041365efb2
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 19041.1.amd64fre.vb_release.191206-1406
SYSTEM_MANUFACTURER: System manufacturer
SYSTEM_PRODUCT_NAME: System Product Name
SYSTEM_SKU: SKU
SYSTEM_VERSION: System Version
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 1903
BIOS_DATE: 08/19/2013
BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
BASEBOARD_PRODUCT: MAXIMUS V EXTREME
BASEBOARD_VERSION: Rev 1.xx
DUMP_TYPE: 2
BUGCHECK_P1: 8
BUGCHECK_P2: ffffe201c4fa0e50
BUGCHECK_P3: fffff9840c0f5fa0
BUGCHECK_P4: fffff8041365efb2
BUGCHECK_STR: 0x7f_8
TRAP_FRAME: ffffe201c4fa0e50 -- (.trap 0xffffe201c4fa0e50)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffff9840c0f60e0
rdx=fffff9840c0f60f8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8041365efb2 rsp=fffff9840c0f5fa0 rbp=fffff9840c0f6039
r8=ffff8f8000000000 r9=0000000000000000 r10=fffff9840c0f5000
r11=fffff9840c0f5000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!MiSystemFault+0x36:
fffff804`1365efb2 48897d9f mov qword ptr [rbp-61h],rdi ss:0018:fffff984`0c0f5fd8=????????????????
Resetting default scope
CPU_COUNT: 4
CPU_MHZ: d48
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 3a
CPU_STEPPING: 9
CPU_MICROCODE: 6,3a,9,0 (F,M,S,R) SIG: 21'00000000 (cache) 21'00000000 (init)
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: ModernWarfare.exe
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-ME9UFOB
ANALYSIS_SESSION_TIME: 04-12-2020 15:03:00.0821
ANALYSIS_VERSION: 10.0.18362.1 amd64fre
EXCEPTION_RECORD: ffffa286fae9a7c0 -- (.exr 0xffffa286fae9a7c0)
ExceptionAddress: 0000000000000000
ExceptionCode: 00000000
ExceptionFlags: 00000000
NumberParameters: 0
BAD_STACK_POINTER: 48e07501ea834802
UNALIGNED_STACK_POINTER: 48e07501ea834802
LAST_CONTROL_TRANSFER: from fffff8041364845a to fffff804137a6326
STACK_OVERFLOW: Stack Limit: fffff9840c0f6000. Use (kF) and (!stackusage) to investigate stack usage.
STACKUSAGE_FUNCTION: The function at address 0xfffff804136ccdd6 was blamed for the stack overflow. It is using 8640 bytes of stack total in 5 instances (likely recursion).
FOLLOWUP_IP:
nt!KiDispatchException+186
fffff804`136ccdd6 84c0 test al,al
STACK_TEXT:
fffff984`0c0f5fa0 fffff804`13666508 : fffff984`0c0f5000 00000000`c0000016 fffff984`0c0f61b0 00000000`00000000 : nt!MiSystemFault+0x36
fffff984`0c0f60a0 fffff804`137ab91e : 00084000`0000de00 00000000`00000000 00000000`00000000 00006174`6164722e : nt!MmAccessFault+0x218
fffff984`0c0f61b0 fffff804`137a6326 : 00000000`00000000 fffff984`0c0f6580 fffff804`1364845a 00000000`00000000 : nt!KiPageFault+0x35e
fffff984`0c0f6348 fffff804`1364845a : 00000000`00000000 fffff984`0c0f65c0 00000000`00000000 00000000`000004d0 : nt!_chkstk+0x36
fffff984`0c0f6360 fffff804`136ccdd6 : fffff984`0c0f6d88 fffff984`0c0f6ac0 fffff984`0c0f6d88 fffff984`0c0f7170 : nt!RtlDispatchException+0x10a
fffff984`0c0f6590 fffff804`137af86c : ffffa286`fae9a7c0 00000000`00000000 fffff984`0c0f6d98 ffffa286`fae9a700 : nt!KiDispatchException+0x186
fffff984`0c0f6c50 fffff804`137aba03 : 83485318`2444894c da8b4cc0`334530ec 00000000`00000005 48ff438d`49800700 : nt!KiExceptionDispatch+0x12c
fffff984`0c0f6e30 fffff804`136686b4 : 00000000`00000293 fffff804`136840e8 480b74c0`854d8007 4dca2b4c`0874d285 : nt!KiPageFault+0x443
fffff984`0c0f6fc0 fffff804`13668192 : fffff804`13400000 fffff804`00000000 00000000`00000470 fffff804`13400000 : nt!RtlpUnwindPrologue+0x220
fffff984`0c0f7020 fffff804`13648e7f : fffff984`00000001 fffff804`13400000 00000000`00000000 fffff804`134d0f6c : nt!RtlpxVirtualUnwind+0x102
fffff984`0c0f70b0 fffff804`13648504 : 00000000`00000000 fffff984`0c0f7670 fffff984`0c0fbb00 0000036a`0000036a : nt!RtlVirtualUnwind+0x5f
fffff984`0c0f7130 fffff804`136ccdd6 : fffff984`0c0f8058 fffff984`0c0f7d90 fffff984`0c0f8058 fffff984`0c0f8440 : nt!RtlDispatchException+0x1b4
fffff984`0c0f7860 fffff804`137af86c : ffffa286`fae9a7c0 00000000`00000000 fffff984`0c0f8068 ffffa286`fae9a700 : nt!KiDispatchException+0x186
fffff984`0c0f7f20 fffff804`137aba03 : 00000000`00000000 00000000`01841d58 00000000`00000005 00000001`00000003 : nt!KiExceptionDispatch+0x12c
fffff984`0c0f8100 fffff804`136686b4 : 00000000`00000293 fffff804`136840e8 00000080`0900310d 08000000`00000000 : nt!KiPageFault+0x443
fffff984`0c0f8290 fffff804`13668192 : fffff804`13400000 fffff804`00000000 00000000`00000470 fffff804`13400000 : nt!RtlpUnwindPrologue+0x220
fffff984`0c0f82f0 fffff804`13648e7f : fffff984`00000001 fffff804`13400000 00000000`00000000 fffff804`134d0f6c : nt!RtlpxVirtualUnwind+0x102
fffff984`0c0f8380 fffff804`13648504 : 00000000`00000000 fffff984`0c0f8940 fffff984`0c0fbb00 00000001`00000003 : nt!RtlVirtualUnwind+0x5f
fffff984`0c0f8400 fffff804`136ccdd6 : fffff984`0c0f9328 fffff984`0c0f9060 fffff984`0c0f9328 fffff984`0c0f9710 : nt!RtlDispatchException+0x1b4
fffff984`0c0f8b30 fffff804`137af86c : ffffa286`fae9a7c0 00000000`00000000 fffff984`0c0f9338 ffffa286`fae9a700 : nt!KiDispatchException+0x186
fffff984`0c0f91f0 fffff804`137aba03 : 00000000`00000000 00000000`00000000 00000000`00000005 00000000`00000000 : nt!KiExceptionDispatch+0x12c
fffff984`0c0f93d0 fffff804`136686b4 : 00000000`00000293 fffff804`136840e8 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x443
fffff984`0c0f9560 fffff804`13668192 : fffff804`13400000 fffff804`00000000 00000000`00000470 fffff804`13400000 : nt!RtlpUnwindPrologue+0x220
fffff984`0c0f95c0 fffff804`13648e7f : fffff984`00000001 fffff804`13400000 00000000`00000000 fffff804`134d0f6c : nt!RtlpxVirtualUnwind+0x102
fffff984`0c0f9650 fffff804`13648504 : 00000000`00000000 fffff984`0c0f9c10 fffff984`0c0fbb00 00000000`00000000 : nt!RtlVirtualUnwind+0x5f
fffff984`0c0f96d0 fffff804`136ccdd6 : fffff984`0c0fa5f8 fffff984`0c0fa330 fffff984`0c0fa5f8 fffff984`0c0fa9e0 : nt!RtlDispatchException+0x1b4
fffff984`0c0f9e00 fffff804`137af86c : ffffa286`fae9a7c0 00000000`00000000 fffff984`0c0fa608 ffffa286`fae9a700 : nt!KiDispatchException+0x186
fffff984`0c0fa4c0 fffff804`137aba03 : 00000000`00000000 fffff984`0c0fb868 00000000`00000005 000004d0`fffffb30 : nt!KiExceptionDispatch+0x12c
fffff984`0c0fa6a0 fffff804`136686b4 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff984`0c0fbc90 : nt!KiPageFault+0x443
fffff984`0c0fa830 fffff804`13668192 : fffff804`13400000 fffff804`00000000 00000000`00000470 fffff804`13400000 : nt!RtlpUnwindPrologue+0x220
fffff984`0c0fa890 fffff804`13648e7f : fffff984`00000001 fffff804`13400000 00000000`00000000 fffff804`134d0f6c : nt!RtlpxVirtualUnwind+0x102
fffff984`0c0fa920 fffff804`13648504 : 00000000`00000000 fffff984`0c0faee0 fffff984`0c0fb100 0053002b`002b0010 : nt!RtlVirtualUnwind+0x5f
fffff984`0c0fa9a0 fffff804`136ccdd6 : fffff984`0c0fb8c8 fffff984`0c0fb600 fffff984`0c0fb8c8 00000000`00000000 : nt!RtlDispatchException+0x1b4
fffff984`0c0fb0d0 fffff804`137af86c : ffffa286`fae9a7c0 00000000`00000000 fffff984`0c0fb8d8 ffffa286`fae9a700 : nt!KiDispatchException+0x186
fffff984`0c0fb790 fffff804`137aba03 : fffff984`0c0fba20 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0x12c
fffff984`0c0fb970 fffff804`137af180 : 00000000`00000150 00000000`00000000 fffff984`00000001 ffffa286`00000000 : nt!KiPageFault+0x443
fffff984`0c0fbb00 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit
STACK_COMMAND: .trap 0xffffe201c4fa0e50 ; kb
THREAD_SHA1_HASH_MOD_FUNC: e4249b7406e4fe7179ef8659fdac710acb30c52c
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 720ab0b6cede2e529f47d6fbae42ec25f353027f
THREAD_SHA1_HASH_MOD: 3e55b5f163abb71b6220e74083bd1ace911916fd
FAULT_INSTR_CODE: 840fc084
SYMBOL_STACK_INDEX: 5
SYMBOL_NAME: nt!KiDispatchException+186
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 31cf0885
IMAGE_VERSION: 10.0.19041.153
BUCKET_ID_FUNC_OFFSET: 186
FAILURE_BUCKET_ID: 0x7f_8_STACK_USAGE_RECURSION_nt!KiDispatchException
BUCKET_ID: 0x7f_8_STACK_USAGE_RECURSION_nt!KiDispatchException
PRIMARY_PROBLEM_CLASS: 0x7f_8_STACK_USAGE_RECURSION_nt!KiDispatchException
TARGET_TIME: 2020-04-12T11:34:14.000Z
OSBUILD: 19041
OSSERVICEPACK: 153
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1996-06-25 00:28:37
BUILDDATESTAMP_STR: 191206-1406
BUILDLAB_STR: vb_release
BUILDOSVER_STR: 10.0.19041.1.amd64fre.vb_release.191206-1406
ANALYSIS_SESSION_ELAPSED_TIME: 7a5b
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x7f_8_stack_usage_recursion_nt!kidispatchexception
FAILURE_ID_HASH: {cbb9a1ac-821c-b542-365f-2dd5602e6100}
Followup: MachineOwner
---------
WHEA_UNCORRECTABLE_ERROR (124)
A fatal hardware error has occurred. Parameter 1 identifies the type of error
source that reported the error. Parameter 2 holds the address of the
WHEA_ERROR_RECORD structure that describes the error conditon.
Arguments:
Arg1: 0000000000000000, Machine Check Exception
Arg2: ffffaf0274f8d028, Address of the WHEA_ERROR_RECORD structure.
Arg3: 00000000b2000000, High order 32-bits of the MCi_STATUS value.
Arg4: 0000000000010005, Low order 32-bits of the MCi_STATUS value.
Debugging Details:
------------------
*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: hal!_WHEA_PROCESSOR_GENERIC_ERROR_SECTION ***
*** ***
*************************************************************************
*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: hal!_WHEA_PROCESSOR_GENERIC_ERROR_SECTION ***
*** ***
*************************************************************************
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 10.0.19041.153 (WinBuild.160101.0800)
SYSTEM_MANUFACTURER: System manufacturer
SYSTEM_PRODUCT_NAME: System Product Name
SYSTEM_SKU: SKU
SYSTEM_VERSION: System Version
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 1903
BIOS_DATE: 08/19/2013
BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
BASEBOARD_PRODUCT: MAXIMUS V EXTREME
BASEBOARD_VERSION: Rev 1.xx
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
DUMP_TYPE: 2
BUGCHECK_P1: 0
BUGCHECK_P2: ffffaf0274f8d028
BUGCHECK_P3: b2000000
BUGCHECK_P4: 10005
BUGCHECK_STR: 0x124_GenuineIntel
CPU_COUNT: 4
CPU_MHZ: d48
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 3a
CPU_STEPPING: 9
CPU_MICROCODE: 6,3a,9,0 (F,M,S,R) SIG: 21'00000000 (cache) 21'00000000 (init)
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 2
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: ModernWarfare.
CURRENT_IRQL: f
ANALYSIS_SESSION_HOST: DESKTOP-ME9UFOB
ANALYSIS_SESSION_TIME: 04-12-2020 15:03:07.0183
ANALYSIS_VERSION: 10.0.18362.1 amd64fre
STACK_TEXT:
ffffe681`327a78e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
THREAD_SHA1_HASH_MOD_FUNC: 81a83ae0317433a47fcc36991983df3b6e638b71
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 6e16edd8c7dd677734fdbcd2397a2e35e9fae964
THREAD_SHA1_HASH_MOD: 76cd06466d098060a9eb26e5fd2a25cb1f3fe0a3
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: GenuineIntel
IMAGE_NAME: GenuineIntel
DEBUG_FLR_IMAGE_TIMESTAMP: 0
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: 0x124_GenuineIntel_PROCESSOR__UNKNOWN
BUCKET_ID: 0x124_GenuineIntel_PROCESSOR__UNKNOWN
PRIMARY_PROBLEM_CLASS: 0x124_GenuineIntel_PROCESSOR__UNKNOWN
TARGET_TIME: 2020-04-12T11:45:57.000Z
OSBUILD: 19041
OSSERVICEPACK: 153
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1996-06-25 00:28:37
BUILDDATESTAMP_STR: 160101.0800
BUILDLAB_STR: WinBuild
BUILDOSVER_STR: 10.0.19041.153
ANALYSIS_SESSION_ELAPSED_TIME: 667
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x124_genuineintel_processor__unknown
FAILURE_ID_HASH: {86f02343-3a24-6d22-b341-ad6c04114faf}
Followup: MachineOwner
---------