INTERRUPT_EXCEPTION_NOT_HANDLED (3d)
Arguments:
Arg1: ffff8c00be6e1cd8
Arg2: ffff8c00be6e1520
Arg3: 0000000000000000
Arg4: 0000000000000000
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 3
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-HH6FM2D
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 29
Key : Analysis.Memory.CommitPeak.Mb
Value: 67
Key : Analysis.System
Value: CreateObject
BUGCHECK_CODE: 3d
BUGCHECK_P1: ffff8c00be6e1cd8
BUGCHECK_P2: ffff8c00be6e1520
BUGCHECK_P3: 0
BUGCHECK_P4: 0
CONTEXT: ffff8c00be6e1cd8 -- (.cxr 0xffff8c00be6e1cd8)
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=0000000000000002 rsp=0000000000000000 rbp=fffff8006f3ceda2
r8=0000000000000000 r9=ffff8c00be6e1ed0 r10=ffff82db0567e52e
r11=00001f80016e1eb8 r12=0000000000000002 r13=ffff8c00be6e1f50
r14=ffffa00a5f0c8000 r15=0002000000000001
iopl=0 nv up di pl nz na pe nc
cs=0000 ss=0000 ds=0000 es=0000 fs=0000 gs=0000 efl=00000000
00000000`00000002 ?? ???
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
STACK_TEXT:
ffff8c00`be6e0d28 fffff800`6f4aa0a5 : 00000000`0000003d ffff8c00`be6e1cd8 ffff8c00`be6e1520 00000000`00000000 : nt!KeBugCheckEx
ffff8c00`be6e0d30 fffff800`6f3c9ed2 : fffff800`6f710000 fffff800`6f200000 0005e554`00ab5000 00000000`0010001f : nt!KiInterruptHandler+0x21
ffff8c00`be6e0d70 fffff800`6f2c3555 : 00000000`00000000 00000000`00000000 ffff8c00`be6e12e0 00007fff`ffff0000 : nt!RtlpExecuteHandlerForException+0x12
ffff8c00`be6e0da0 fffff800`6f2c7aee : ffff8c00`be6e1cd8 ffff8c00`be6e1a20 ffff8c00`be6e1cd8 ffff8c00`be6e1fb0 : nt!RtlDispatchException+0x4a5
ffff8c00`be6e14f0 fffff800`6f3d301d : 00000000`00000000 00000000`00000005 00000000`00000001 00000000`00000000 : nt!KiDispatchException+0x16e
ffff8c00`be6e1ba0 fffff800`6f3ceda2 : 00000000`00000000 00000000`00000000 00000000`00000000 ffff8c00`be6e1ed0 : nt!KiExceptionDispatch+0x11d
ffff8c00`be6e1d80 fffff800`6f269e8e : 00000000`00000000 ffff8c00`be6c2180 ffffa395`c17afe12 fffff800`6f1601e1 : nt!KiGeneralProtectionFault+0x322
ffff8c00`be6e1f10 fffff800`6f3c28db : ffff8c00`be6c2180 ffff8408`09037c90 ffff8c00`becd8c80 ffff8c00`becd8c80 : nt!PerfInfoLogInterrupt+0xde
ffff8c00`be6e1f90 fffff800`6f3c2b87 : 00000000`00000000 ffff8c00`be6c2180 ffff8408`09037d40 00000000`00000001 : nt!KiInterruptSubDispatch+0x13b
ffff8408`09037c10 fffff800`6f3c4bae : ffffffff`00000000 ffff8c00`be6c2180 ffffa00a`66048280 00000000`0000067f : nt!KiInterruptDispatch+0x37
ffff8408`09037da0 00000000`00000000 : ffff8408`09038000 ffff8408`09032000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x4e
SYMBOL_NAME: nt!KiInterruptHandler+21
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.18362.356
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 21
FAILURE_BUCKET_ID: 0x3D_nt!KiInterruptHandler
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {6f7644fa-fbe4-f01a-a2c3-1310421efccb}
Followup: MachineOwner
---------
ATTEMPTED_WRITE_TO_READONLY_MEMORY (be)
An attempt was made to write to readonly memory. The guilty driver is on the
stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: fffffa0270a759b8, Virtual address for the attempted write.
Arg2: 8a00000003f00021, PTE contents.
Arg3: fffff80270a75740, (reserved)
Arg4: 000000000000000a, (reserved)
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 3
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-HH6FM2D
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 73
Key : Analysis.Memory.CommitPeak.Mb
Value: 68
Key : Analysis.System
Value: CreateObject
BUGCHECK_CODE: be
BUGCHECK_P1: fffffa0270a759b8
BUGCHECK_P2: 8a00000003f00021
BUGCHECK_P3: fffff80270a75740
BUGCHECK_P4: a
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: fffff80270a75740 -- (.trap 0xfffff80270a75740)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff80270a75928 rbx=0000000000000000 rcx=fffffa0270a759c0
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8026b7d4262 rsp=fffff80270a758d8 rbp=fffff80270a759e0
r8=0000000000000008 r9=0000000000000000 r10=000000059ee96325
r11=fffff80270a75b68 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!memset+0xe2:
fffff802`6b7d4262 420f114401f0 movups xmmword ptr [rcx+r8-10h],xmm0 ds:fffffa02`70a759b8=????????????????????????????????
Resetting default scope
STACK_TEXT:
fffff802`70a75558 fffff802`6b84ebbd : 00000000`000000be fffffa02`70a759b8 8a000000`03f00021 fffff802`70a75740 : nt!KeBugCheckEx
fffff802`70a75560 fffff802`6b6731fa : 8a000000`03f00021 00000000`00000003 fffff802`70a756a0 00000000`00000000 : nt!MiRaisedIrqlFault+0x12e7ad
fffff802`70a755a0 fffff802`6b7cf120 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x48a
fffff802`70a75740 fffff802`6b7d4262 : fffff802`6b61e763 00000000`00010352 fffff802`00000020 00000000`00000000 : nt!KiPageFault+0x360
fffff802`70a758d8 fffff802`6b61e763 : 00000000`00010352 fffff802`00000020 00000000`00000000 00000000`00000000 : nt!memset+0xe2
fffff802`70a758e0 fffff802`6b61f4ab : fffff780`00000320 fffff802`68fa2100 00000000`00000001 00000000`00000000 : nt!KiForwardTick+0x63
fffff802`70a75b70 fffff802`6b55e4b7 : fffff802`68fa2180 fffff802`70a67c10 fffff802`70a67c90 00000000`00000000 : nt!KeClockInterruptNotify+0x85b
fffff802`70a75f30 fffff802`6b6029e5 : 00000005`9f006435 fffff802`6b5cc0e0 fffff802`6b5cc190 fffff802`70a67c90 : hal!HalpTimerClockInterrupt+0xf7
fffff802`70a75f60 fffff802`6b7c2b3a : fffff802`70a67c90 fffff802`6b5cc0e0 00000000`00000a5e fffff802`6b5cc0e0 : nt!KiCallInterruptServiceRoutine+0xa5
fffff802`70a75fb0 fffff802`6b7c30a7 : 00000000`00000001 fffff802`68fa2180 fffff802`70a67d40 00000000`00000001 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
fffff802`70a67c10 fffff802`6b7c4bae : 00000000`00000000 fffff802`68fa2180 ffffbe89`7ed5b080 00000000`00000a5e : nt!KiInterruptDispatchNoLockNoEtw+0x37
fffff802`70a67da0 00000000`00000000 : fffff802`70a68000 fffff802`70a62000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x4e
SYMBOL_NAME: nt!MiRaisedIrqlFault+12e7ad
MODULE_NAME: nt
IMAGE_VERSION: 10.0.18362.356
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: memory_corruption
BUCKET_ID_FUNC_OFFSET: 12e7ad
FAILURE_BUCKET_ID: 0xBE_nt!MiRaisedIrqlFault
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {1c5b4d11-09e0-def3-d2d0-70a11d69b92d}
Followup: MachineOwner
---------
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000002, Stack cookie instrumentation code detected a stack-based
buffer overrun.
Arg2: ffffb20f755405f0, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffb20f75540548, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
***** Debugger could not find nt in module list, module list might be corrupt, error 0x80070057.
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 0
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-HH6FM2D
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 0
Key : Analysis.Memory.CommitPeak.Mb
Value: 43
Key : Analysis.System
Value: CreateObject
BUGCHECK_CODE: 139
BUGCHECK_P1: 2
BUGCHECK_P2: ffffb20f755405f0
BUGCHECK_P3: ffffb20f75540548
BUGCHECK_P4: 0
TRAP_FRAME: ffffb20f755405f0 -- (.trap 0xffffb20f755405f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff8d05c8000000 rbx=0000000000000000 rcx=0000000000000002
rdx=ffffb20f75540d00 rsi=0000000000000000 rdi=0000000000000000
rip=ffff8d05c815a455 rsp=ffffb20f75540788 rbp=ffffb20f75540d60
r8=ffff2c76b7343c98 r9=00009e79c2602578 r10=ffffb20f755419e0
r11=00000000000000d0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe cy
ffff8d05`c815a455 ?? ???
Resetting default scope
EXCEPTION_RECORD: ffffb20f75540548 -- (.exr 0xffffb20f75540548)
ExceptionAddress: ffff8d05c815a455
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000002
Subcode: 0x2 FAST_FAIL_STACK_COOKIE_CHECK_FAILURE
CUSTOMER_CRASH_COUNT: 1
EXCEPTION_STR: 0xc0000409
STACK_TEXT:
ffffb20f`75540788 ffff8d05`c815cbe6 : ffff8d05`c834d7fc ffffb20f`75540d70 ffffb20f`75540860 ffff8d05`c816bc11 : 0xffff8d05`c815a455
ffffb20f`75540790 ffff8d05`c834d7fc : ffffb20f`75540d70 ffffb20f`75540860 ffff8d05`c816bc11 ffff8d05`c816bc11 : 0xffff8d05`c815cbe6
ffffb20f`75540798 ffffb20f`75540d70 : ffffb20f`75540860 ffff8d05`c816bc11 ffff8d05`c816bc11 ffff8d05`c815cb7b : 0xffff8d05`c834d7fc
ffffb20f`755407a0 ffffb20f`75540860 : ffff8d05`c816bc11 ffff8d05`c816bc11 ffff8d05`c815cb7b ffffb20f`75540d60 : 0xffffb20f`75540d70
ffffb20f`755407a8 ffff8d05`c816bc11 : ffff8d05`c816bc11 ffff8d05`c815cb7b ffffb20f`75540d60 fffff802`820c63e4 : 0xffffb20f`75540860
ffffb20f`755407b0 ffff8d05`c816bc11 : ffff8d05`c815cb7b ffffb20f`75540d60 fffff802`820c63e4 ffffb20f`75540e40 : 0xffff8d05`c816bc11
ffffb20f`755407b8 ffff8d05`c815cb7b : ffffb20f`75540d60 fffff802`820c63e4 ffffb20f`75540e40 00000000`00000000 : 0xffff8d05`c816bc11
ffffb20f`755407c0 ffffb20f`75540d60 : fffff802`820c63e4 ffffb20f`75540e40 00000000`00000000 ffff8d05`c815cb68 : 0xffff8d05`c815cb7b
ffffb20f`755407c8 fffff802`820c63e4 : ffffb20f`75540e40 00000000`00000000 ffff8d05`c815cb68 fffff802`821c9ed2 : 0xffffb20f`75540d60
ffffb20f`755407d0 ffffb20f`75540e40 : 00000000`00000000 ffff8d05`c815cb68 fffff802`821c9ed2 ffff8d05`c8333000 : 0xfffff802`820c63e4
ffffb20f`755407d8 00000000`00000000 : ffff8d05`c815cb68 fffff802`821c9ed2 ffff8d05`c8333000 ffff8d05`c8000000 : 0xffffb20f`75540e40
STACK_COMMAND: .trap 0xffffb20f755405f0 ; kb
SYMBOL_NAME: ANALYSIS_INCONCLUSIVE
MODULE_NAME: Unknown_Module
IMAGE_NAME: Unknown_Image
FAILURE_BUCKET_ID: CORRUPT_MODULELIST_0x139
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {bec1bc00-1c8a-a417-55b2-9f8b67cbb1c5}
Followup: MachineOwner
---------
INTERRUPT_EXCEPTION_NOT_HANDLED (3d)
Arguments:
Arg1: ffffce00324e0cd8
Arg2: ffffce00324e0520
Arg3: 0000000000000000
Arg4: 0000000000000000
Debugging Details:
------------------
***** Debugger could not find nt in module list, module list might be corrupt, error 0x80070057.
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 0
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-HH6FM2D
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 0
Key : Analysis.Memory.CommitPeak.Mb
Value: 43
Key : Analysis.System
Value: CreateObject
BUGCHECK_CODE: 3d
BUGCHECK_P1: ffffce00324e0cd8
BUGCHECK_P2: ffffce00324e0520
BUGCHECK_P3: 0
BUGCHECK_P4: 0
CONTEXT: ffffce00324e0cd8 -- (.cxr 0xffffce00324e0cd8)
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=0000000000000002 rsp=0000000000000000 rbp=fffff802593ceda2
r8=0000000000000000 r9=ffff9501c27454c0 r10=fffff1c53e07261b
r11=00001f80014e0eb8 r12=0000000000000002 r13=ffffce00324e0f50
r14=ffff9501bf3c9000 r15=0002000000000001
iopl=0 nv up di pl nz na pe nc
cs=0000 ss=0000 ds=0000 es=0000 fs=0000 gs=0000 efl=00000000
00000000`00000002 ?? ???
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
STACK_TEXT:
ffffce00`324dfd28 fffff802`594aa0a5 : 00000000`0000003d ffffce00`324e0cd8 ffffce00`324e0520 00000000`00000000 : 0xfffff802`593c10a0
ffffce00`324dfd30 00000000`0000003d : ffffce00`324e0cd8 ffffce00`324e0520 00000000`00000000 00000000`00000000 : 0xfffff802`594aa0a5
ffffce00`324dfd38 ffffce00`324e0cd8 : ffffce00`324e0520 00000000`00000000 00000000`00000000 00000000`00000000 : 0x3d
ffffce00`324dfd40 ffffce00`324e0520 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff802`594aa084 : 0xffffce00`324e0cd8
ffffce00`324dfd48 00000000`00000000 : 00000000`00000000 00000000`00000000 fffff802`594aa084 fffff802`593c9ed2 : 0xffffce00`324e0520
SYMBOL_NAME: ANALYSIS_INCONCLUSIVE
MODULE_NAME: Unknown_Module
IMAGE_NAME: Unknown_Image
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: CORRUPT_MODULELIST_0x3D
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {6833192f-3406-a9b4-0f13-22063211171a}
Followup: MachineOwner
---------