*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffd000b0f864f0, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffd000b0f86448, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 9600.17415.amd64fre.winblue_r4.141028-1500
SYSTEM_MANUFACTURER: Gigabyte Technology Co., Ltd.
SYSTEM_PRODUCT_NAME: PA65-UD3-B3
BIOS_VENDOR: Award Software International, Inc.
BIOS_VERSION: F12
BIOS_DATE: 03/27/2012
BASEBOARD_MANUFACTURER: Gigabyte Technology Co., Ltd.
BASEBOARD_PRODUCT: PA65-UD3-B3
DUMP_TYPE: 2
BUGCHECK_P1: 3
BUGCHECK_P2: ffffd000b0f864f0
BUGCHECK_P3: ffffd000b0f86448
BUGCHECK_P4: 0
TRAP_FRAME: ffffd000b0f864f0 -- (.trap 0xffffd000b0f864f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffe0005cf1a070 rbx=0000000000000000 rcx=0000000000000003
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800a03d46af rsp=ffffd000b0f86680 rbp=ffffc0001ccbe620
r8=0000000000000000 r9=fffff8009fe80000 r10=ffffd000b0737500
r11=ffffc0001ccbe600 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po cy
nt! ?? ::NNGAKEGL::`string'+0x264ff:
fffff800`a03d46af cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: ffffd000b0f86448 -- (.exr 0xffffd000b0f86448)
ExceptionAddress: fffff800a03d46af (nt! ?? ::NNGAKEGL::`string'+0x00000000000264ff)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
CPU_COUNT: 4
CPU_MHZ: c15
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 2a
CPU_STEPPING: 7
CPU_MICROCODE: 6,2a,7,0 (F,M,S,R) SIG: 28'00000000 (cache) 28'00000000 (init)
CUSTOMER_CRASH_COUNT: 1
BUGCHECK_STR: 0x139
PROCESS_NAME: WerFault.exe
CURRENT_IRQL: 0
DEFAULT_BUCKET_ID: FAIL_FAST_CORRUPT_LIST_ENTRY
ERROR_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>
EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000003
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 11-14-2019 17:39:35.0127
ANALYSIS_VERSION: 10.0.18362.1 x86fre
LAST_CONTROL_TRANSFER: from fffff8009ffdc4e9 to fffff8009ffd09a0
STACK_TEXT:
ffffd000`b0f861c8 fffff800`9ffdc4e9 : 00000000`00000139 00000000`00000003 ffffd000`b0f864f0 ffffd000`b0f86448 : nt!KeBugCheckEx
ffffd000`b0f861d0 fffff800`9ffdc810 : 00000000`00000000 fffff800`9feef57a ffffd000`b0735180 ffffd000`b0735180 : nt!KiBugCheckDispatch+0x69
ffffd000`b0f86310 fffff800`9ffdba34 : ffffe000`5ef53210 ffffe000`5c144970 ffffc000`1ccbe600 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffffd000`b0f864f0 fffff800`a03d46af : ffffc000`1ccbe620 ffffffff`ffffffff 00000000`00000000 ffffe000`5cef3570 : nt!KiRaiseSecurityCheckFailure+0xf4
ffffd000`b0f86680 fffff800`a028650c : ffffe000`5cef3570 ffffc000`1ccbe630 ffffc000`1ccbe630 ffffe000`5cef3570 : nt! ?? ::NNGAKEGL::`string'+0x264ff
ffffd000`b0f866b0 fffff800`a0248dd0 : 00000000`00000000 ffffe000`5cef3570 ffffe000`5c144970 ffffe000`5cef3540 : nt!AlpcpDeletePort+0x148
ffffd000`b0f866f0 fffff800`9fed9c5f : 00000000`00000000 00000000`000001a8 ffffe000`5cef3570 ffffe000`5cef3570 : nt!ObpRemoveObjectRoutine+0x64
ffffd000`b0f86750 fffff800`a02c1d3b : 00000000`00000000 00000000`ffff8020 00000000`00000000 fffff800`00000001 : nt!ObfDereferenceObjectWithTag+0x8f
ffffd000`b0f86790 fffff800`a02c25ca : ffffd000`ac7c0100 fffff800`a0264600 00000000`00000001 00000000`00000000 : nt!ObCloseHandleTableEntry+0x33f
ffffd000`b0f86860 fffff800`a0235071 : 00000000`00040001 ffffd000`b0f869c0 ffffe000`5c65d900 ffffe000`5f4c0880 : nt!ExSweepHandleTable+0xba
ffffd000`b0f868c0 fffff800`a0234d80 : 00000000`00040000 00000000`00000000 00000000`00000000 fffff800`a023a1c2 : nt!ObKillProcess+0x31
ffffd000`b0f868f0 fffff800`a025688f : ffffe000`5c65d900 ffffc000`1a87a650 ffffd000`b0f869c0 00000000`00000000 : nt!PspRundownSingleProcess+0xa4
ffffd000`b0f86980 fffff800`a02dc081 : 00000000`800704c7 00000000`00000000 ffffe000`5c65d900 ffffe000`5f4c0880 : nt!PspExitThread+0x573
ffffd000`b0f86a90 fffff800`9ffdc1b3 : ffffe000`5c65d900 ffffe000`5f4c0880 ffffd000`b0f86b80 00000000`00000000 : nt!NtTerminateProcess+0xfd
ffffd000`b0f86b00 00000000`77582352 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0264ea28 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77582352
THREAD_SHA1_HASH_MOD_FUNC: 704c7b2758abf6c3e9ff8cac6d67b9dd24a512b9
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 26f42a6f970c02c16e75e9cace85663c1215688f
THREAD_SHA1_HASH_MOD: 38bc5fec3f0409c265cf5c87da6f8f8859d0711c
FOLLOWUP_IP:
nt!KiFastFailDispatch+d0
fffff800`9ffdc810 c644242000 mov byte ptr [rsp+20h],0
FAULT_INSTR_CODE: 202444c6
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!KiFastFailDispatch+d0
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 54503718
IMAGE_VERSION: 6.3.9600.17415
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: d0
FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch
BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch
PRIMARY_PROBLEM_CLASS: 0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch
TARGET_TIME: 2019-11-12T20:40:36.000Z
OSBUILD: 9600
OSSERVICEPACK: 17415
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 8.1
OSEDITION: Windows 8.1 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2014-10-29 03:38:48
BUILDDATESTAMP_STR: 141028-1500
BUILDLAB_STR: winblue_r4
BUILDOSVER_STR: 6.3.9600.17415.amd64fre.winblue_r4.141028-1500
ANALYSIS_SESSION_ELAPSED_TIME: 795
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x139_3_corrupt_list_entry_nt!kifastfaildispatch
FAILURE_ID_HASH: {3aede96a-54dd-40d6-d4cb-2a161a843851}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_DATA_INPAGE_ERROR (7a)
The requested page of kernel data could not be read in. Typically caused by
a bad block in the paging file or disk controller error. Also see
KERNEL_STACK_INPAGE_ERROR.
If the error status is 0xC000000E, 0xC000009C, 0xC000009D or 0xC0000185,
it means the disk subsystem has experienced a failure.
If the error status is 0xC000009A, then it means the request failed because
a filesystem failed to make forward progress.
Arguments:
Arg1: fffff6fc00f8c2e8, lock type that was held (value 1,2,3, or PTE address)
Arg2: ffffffffc000003f, error status (normally i/o status code)
Arg3: 0000000086e0a860, current process (virtual address for lock type 3, or PTE)
Arg4: fffff801f185d000, virtual address that could not be in-paged (or PTE contents if arg1 is a PTE address)
Debugging Details:
------------------
GetPointerFromAddress: unable to read from fffff802451f20e8
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 9600.17415.amd64fre.winblue_r4.141028-1500
SYSTEM_MANUFACTURER: Gigabyte Technology Co., Ltd.
SYSTEM_PRODUCT_NAME: PA65-UD3-B3
BIOS_VENDOR: Award Software International, Inc.
BIOS_VERSION: F12
BIOS_DATE: 03/27/2012
BASEBOARD_MANUFACTURER: Gigabyte Technology Co., Ltd.
BASEBOARD_PRODUCT: PA65-UD3-B3
DUMP_TYPE: 2
BUGCHECK_P1: fffff6fc00f8c2e8
BUGCHECK_P2: ffffffffc000003f
BUGCHECK_P3: 86e0a860
BUGCHECK_P4: fffff801f185d000
ERROR_CODE: (NTSTATUS) 0xc000003f - <Unable to get error code text>
ADDITIONAL_DEBUG_TEXT: Memory Manager detected corruption of a pagefile page while performing an in-page operation.The data read from storage does not match the original data written.This indicates the data was corrupted by the storage stack, or device hardware.
BUGCHECK_STR: 0x7a_c000003f
CPU_COUNT: 4
CPU_MHZ: c15
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 2a
CPU_STEPPING: 7
CPU_MICROCODE: 6,2a,7,0 (F,M,S,R) SIG: 28'00000000 (cache) 28'00000000 (init)
BLACKBOXDISK: 1
DISKSEC_ORG_ID: ST35
DISKSEC_MODEL: ST3500413AS
DISKSEC_MANUFACTURING_ID: 6VMS3EA
DISKSEC_ISSUE_DESC_STR:
DISKSEC_TOTAL_SIZE: 188
DISKSEC_REASON: 1
DISKSEC_PUBLIC_TOTAL_SECTION_SIZE: 54
DISKSEC_PUBLIC_OFFSET: 12c
DISKSEC_PUBLIC_DATA_SIZE: 0
DISKSEC_PRIVATE_TOTAL_SECTION_SIZE: 8
DISKSEC_PRIVATE_OFFSET: 180
DISKSEC_PRIVATE_DATA_SIZE: 0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
PROCESS_NAME: svchost.exe
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 11-14-2019 17:39:30.0611
ANALYSIS_VERSION: 10.0.18362.1 x86fre
LAST_CONTROL_TRANSFER: from fffff8024501cb09 to fffff80244fdf9a0
STACK_TEXT:
ffffd000`25393178 fffff802`4501cb09 : 00000000`0000007a fffff6fc`00f8c2e8 ffffffff`c000003f 00000000`86e0a860 : nt!KeBugCheckEx
ffffd000`25393180 fffff802`44f2ceb6 : ffffd000`253933d0 00000000`00000000 fffff802`451eaec0 ffffe001`00000000 : nt! ?? ::FNODOBFM::`string'+0x2cc59
ffffd000`25393270 fffff802`45084e1a : 00000000`00000000 ffffe001`4ebff820 ffffd000`25393200 ffffd000`00000000 : nt!MiPfCompleteInPageSupport+0x3a
ffffd000`253932b0 fffff802`44f2ce67 : ffffd000`25393368 00000000`00000000 00000000`00000001 00000000`00000000 : nt!MiPfCompleteCoalescedIo+0x112
ffffd000`25393300 fffff802`44ed5f97 : 00000000`00000000 ffffd000`253933c1 00000000`00000010 ffffe001`4edf4700 : nt!MiPfCompletePrefetchIos+0xbb
ffffd000`25393330 fffff802`452f0413 : 00000000`00000010 ffffe001`4edf4700 ffffd000`000000b0 00000000`00000000 : nt!MiPrefetchVirtualMemory+0x377
ffffd000`25393420 fffff802`452efe66 : 00000000`0000110a 00000000`0000110a 00000000`0000110a 00000000`00000000 : nt!MmPrefetchVirtualMemory+0xe3
ffffd000`25393510 fffff802`452f35f6 : ffffd000`25393620 00000000`00000000 ffffd000`00000009 00000000`00000001 : nt!PfpPrefetchPrivatePages+0x1f2
ffffd000`253935d0 fffff802`452f3ce6 : ffffc000`1dac2000 ffffc000`1dac2000 ffffd000`253937f0 00000000`00000000 : nt!PfpPrefetchRequestPerform+0x22a
ffffd000`25393740 fffff802`452e8a44 : ffffe001`00000001 00000000`00000001 ffffc000`1dac2000 ffffe001`4da9a9f0 : nt!PfpPrefetchRequest+0x11e
ffffd000`253937c0 fffff802`452e7f14 : ffffe001`2e63fcd0 00000000`00000000 00000000`00000000 e0014da9`aa40f101 : nt!PfSetSuperfetchInformation+0x13c
ffffd000`253938a0 fffff802`44feb1b3 : ffffe001`4ba46280 00000044`2d3e90d0 00000000`00000001 00000000`00000000 : nt!NtSetSystemInformation+0x1dc
ffffd000`25393b00 00007ffa`4d4524ba : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000045`2e63fc68 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`4d4524ba
CHKIMG_EXTENSION: !chkimg -lo 50 -d !rdbss
fffff801f185d071 - rdbss!RxProcessException+a9
[ 8f:8e ]
1 error : !rdbss (fffff801f185d071)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: ONE_BIT
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_ONE_BIT
TARGET_TIME: 2019-11-11T22:10:49.000Z
OSBUILD: 9600
OSSERVICEPACK: 17415
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 8.1
OSEDITION: Windows 8.1 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2014-10-29 03:38:48
BUILDDATESTAMP_STR: 141028-1500
BUILDLAB_STR: winblue_r4
BUILDOSVER_STR: 6.3.9600.17415.amd64fre.winblue_r4.141028-1500
ANALYSIS_SESSION_ELAPSED_TIME: 4759
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:memory_corruption_one_bit
FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}
Followup: memory_corruption
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
NTFS_FILE_SYSTEM (24)
If you see NtfsExceptionFilter on the stack then the 2nd and 3rd
parameters are the exception record and context record. Do a .cxr
on the 3rd parameter and then kb to obtain a more informative stack
trace.
Arguments:
Arg1: 000000b500190645
Arg2: ffffd0002fee7fa8
Arg3: ffffd0002fee77b0
Arg4: fffff803d68774d5
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : AV.Fault
Value: Read
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 9600.17415.amd64fre.winblue_r4.141028-1500
SYSTEM_MANUFACTURER: Gigabyte Technology Co., Ltd.
SYSTEM_PRODUCT_NAME: PA65-UD3-B3
BIOS_VENDOR: Award Software International, Inc.
BIOS_VERSION: F12
BIOS_DATE: 03/27/2012
BASEBOARD_MANUFACTURER: Gigabyte Technology Co., Ltd.
BASEBOARD_PRODUCT: PA65-UD3-B3
DUMP_TYPE: 2
BUGCHECK_P1: b500190645
BUGCHECK_P2: ffffd0002fee7fa8
BUGCHECK_P3: ffffd0002fee77b0
BUGCHECK_P4: fffff803d68774d5
EXCEPTION_RECORD: ffffd0002fee7fa8 -- (.exr 0xffffd0002fee7fa8)
ExceptionAddress: fffff803d68774d5 (nt!ExpApplyPriorityBoost+0x00000000000001d1)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 000000000158074b
Attempt to read from address 000000000158074b
CONTEXT: ffffd0002fee77b0 -- (.cxr 0xffffd0002fee77b0)
rax=0000000000060004 rbx=0000000000000002 rcx=0000000000000000
rdx=000000000000000e rsi=0000000000000000 rdi=ffffe001b6b8aa10
rip=fffff803d68774d5 rsp=ffffd0002fee81e0 rbp=0000000000000000
r8=0000000000000004 r9=ffffd0002fee8200 r10=0000000000000801
r11=7ffffffffffffffc r12=0000000000000002 r13=000000000000ff01
r14=0000000001580743 r15=0000000000000000
iopl=0 nv up di pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010002
nt!ExpApplyPriorityBoost+0x1d1:
fffff803`d68774d5 458b7e08 mov r15d,dword ptr [r14+8] ds:002b:00000000`0158074b=????????
Resetting default scope
CPU_COUNT: 4
CPU_MHZ: c15
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 2a
CPU_STEPPING: 7
CPU_MICROCODE: 6,2a,7,0 (F,M,S,R) SIG: 28'00000000 (cache) 28'00000000 (init)
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: MsMpEng.exe
CURRENT_IRQL: 0
FOLLOWUP_IP:
nt!ExpApplyPriorityBoost+1d1
fffff803`d68774d5 458b7e08 mov r15d,dword ptr [r14+8]
FAULTING_IP:
nt!ExpApplyPriorityBoost+1d1
fffff803`d68774d5 458b7e08 mov r15d,dword ptr [r14+8]
BUGCHECK_STR: 0x24
READ_ADDRESS: GetUlongPtrFromAddress: unable to read from fffff803d6b72298
GetUlongPtrFromAddress: unable to read from fffff803d6b72520
000000000158074b
ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 000000000158074b
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 11-14-2019 17:39:26.0785
ANALYSIS_VERSION: 10.0.18362.1 x86fre
LAST_CONTROL_TRANSFER: from fffff803d68777d2 to fffff803d68774d5
STACK_TEXT:
ffffd000`2fee81e0 fffff803`d68777d2 : 00000000`00000701 ffffe001`b6b8aa10 00000000`00000001 ffffe001`b9c3a880 : nt!ExpApplyPriorityBoost+0x1d1
ffffd000`2fee8250 fffff803`d6873bba : ffffe001`b6b8aa10 ffffe001`b6b4abb0 ffffe001`b98137b8 ffffc001`00000000 : nt!ExpWaitForResource+0xd2
ffffd000`2fee8320 fffff801`1eb3c002 : ffffe001`b9813602 ffffe001`b98136d8 ffffd000`2fee8750 00000000`00000000 : nt!ExAcquireResourceExclusiveLite+0x1da
ffffd000`2fee8390 fffff801`1ea30e1c : ffffe001`b98136d8 ffffe001`b73f7180 00000000`00000000 fffff801`1e864061 : Ntfs!NtfsFlushVolume+0x286
ffffd000`2fee84e0 fffff801`1ea44f22 : ffffe001`b98136d8 ffffe001`b926a9f0 ffffe001`b7383de0 ffffc000`f6697501 : Ntfs!NtfsVolumeDasdIo+0x1ec
ffffd000`2fee8580 fffff801`1ea4b6de : ffffe001`b98136d8 ffffe001`b926a9f0 00000000`00000201 ffffd000`2fee8701 : Ntfs!NtfsCommonRead+0x1f82
ffffd000`2fee8720 fffff801`1e802b1e : ffffe001`b8e28b90 ffffe001`b926a9f0 00000000`00000001 ffffe001`b926ad90 : Ntfs!NtfsFsdRead+0x1ee
ffffd000`2fee87d0 fffff801`1e8010c2 : ffffd000`2fee8890 ffffe001`b73fa570 ffffe001`b8f9c6d0 ffffe001`b926a9f0 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x2ce
ffffd000`2fee8870 fffff803`d6bf5788 : 00000000`00000000 ffffd000`2fee8951 ffffe001`b8f9c6d0 0000001e`00100081 : fltmgr!FltpDispatch+0xb2
ffffd000`2fee88d0 fffff803`d6bf3336 : ffffe001`b8f9c604 ffffe001`b8f9c6d0 00000000`00001478 ffffe001`b8f9c6d0 : nt!IopSynchronousServiceTail+0x170
ffffd000`2fee89a0 fffff803`d696b1b3 : ffffe001`b9c3a880 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtReadFile+0x656
ffffd000`2fee8a90 00007ff8`12fa0caa : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000057`b6a1dc58 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`12fa0caa
THREAD_SHA1_HASH_MOD_FUNC: 2d8bbd9f43d9a30b3af3099af01eb12db16d41eb
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 3cbfdc7bce892e4af04afdf29067644600087584
THREAD_SHA1_HASH_MOD: 3dbb71349fe7c8519723330f7f0a6ea7498d7325
FAULT_INSTR_CODE: 87e8b45
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!ExpApplyPriorityBoost+1d1
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 54503718
IMAGE_VERSION: 6.3.9600.17415
STACK_COMMAND: .cxr 0xffffd0002fee77b0 ; kb
BUCKET_ID_FUNC_OFFSET: 1d1
FAILURE_BUCKET_ID: 0x24_nt!ExpApplyPriorityBoost
BUCKET_ID: 0x24_nt!ExpApplyPriorityBoost
PRIMARY_PROBLEM_CLASS: 0x24_nt!ExpApplyPriorityBoost
TARGET_TIME: 2019-11-13T21:28:20.000Z
OSBUILD: 9600
OSSERVICEPACK: 17415
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 8.1
OSEDITION: Windows 8.1 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2014-10-29 03:38:48
BUILDDATESTAMP_STR: 141028-1500
BUILDLAB_STR: winblue_r4
BUILDOSVER_STR: 6.3.9600.17415.amd64fre.winblue_r4.141028-1500
ANALYSIS_SESSION_ELAPSED_TIME: 1745
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x24_nt!expapplypriorityboost
FAILURE_ID_HASH: {99788c13-fb0a-47cc-42e3-cbe4a318052c}
Followup: MachineOwner
---------