*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8040d282072, Address of the instruction which caused the bugcheck
Arg3: ffff8000c2386930, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
DUMP_TYPE: 2
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff8040d282072
BUGCHECK_P3: ffff8000c2386930
BUGCHECK_P4: 0
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
nt!MiReadyStandbyPageForActive+c2
fffff804`0d282072 488917 mov qword ptr [rdi],rdx
CONTEXT: ffff8000c2386930 -- (.cxr 0xffff8000c2386930)
rax=0000000000000000 rbx=ffff910000fbe4d0 rcx=ffdfdb8bd1caa0c8
rdx=0a00000053f6f921 rsi=8000000000000000 rdi=ffdfdb8bd1caa0c8
rip=fffff8040d282072 rsp=ffff9c0e3b5a8130 rbp=0000000000037000
r8=0000000020000006 r9=ffffdadc4772eec8 r10=000000000006e5a8
r11=ffff9c0e3b5a8130 r12=0000000000000005 r13=7fffffffffffffff
r14=ffffdadc4772eec8 r15=000000000000000f
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246
nt!MiReadyStandbyPageForActive+0xc2:
fffff804`0d282072 488917 mov qword ptr [rdi],rdx ds:002b:ffdfdb8b`d1caa0c8=????????????????
Resetting default scope
BUGCHECK_STR: 0x3B_c0000005
CPU_COUNT: c
CPU_MHZ: ed1
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 71
CPU_STEPPING: 0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: MetroExodus.exe
CURRENT_IRQL: 2
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 12-09-2019 21:13:58.0626
ANALYSIS_VERSION: 10.0.18362.1 x86fre
BAD_STACK_POINTER: ffff8000c2385ff8
LAST_CONTROL_TRANSFER: from fffff8040d281f36 to fffff8040d282072
STACK_TEXT:
ffff9c0e`3b5a8130 fffff804`0d281f36 : ffff9100`00fbe4d0 00000000`00000007 00000000`00000007 ffffdb8b`d1caa0c8 : nt!MiReadyStandbyPageForActive+0xc2
ffff9c0e`3b5a8160 fffff804`0d27fd25 : 00000000`00000001 ffff9100`00fbe090 ffffdadc`4772ee80 00000000`00000000 : nt!MiUnlinkStandbyBatch+0x186
ffff9c0e`3b5a81a0 fffff804`0d27e10f : 00000000`00013400 00000000`13400000 00000000`00037000 ffffa40b`8947e748 : nt!MmCheckCachedPageStates+0x1145
ffff9c0e`3b5a83a0 fffff804`0d81ef89 : 00000000`13400000 00000000`00000000 00000000`00000001 ffff9c0e`3b5a84b0 : nt!CcFetchDataForRead+0x8f
ffff9c0e`3b5a8400 fffff804`0d27deb5 : ffffa40b`7a8fc138 00000000`13400000 00000000`00040000 ffffa40b`82eed101 : nt!CcMapAndCopyFromCache+0xd9
ffff9c0e`3b5a84a0 fffff804`113fa68d : ffff9c0e`3b5a85f0 00000000`00000000 ffffdb8b`000ecd9c 00000000`000ecd9c : nt!CcCopyReadEx+0x135
ffff9c0e`3b5a8540 fffff804`108e5f77 : 00000000`00000000 00000000`000002b0 ffffa40b`88e504d0 00000000`00000000 : Ntfs!NtfsCopyReadA+0x2ed
ffff9c0e`3b5a8830 fffff804`108e2fa3 : ffff9c0e`3b5a8920 00000000`00000000 00000000`00000000 ffffa40b`87b9dc40 : FLTMGR!FltpPerformFastIoCall+0x197
ffff9c0e`3b5a8890 fffff804`1091c7c5 : ffff9c0e`3b5a89f8 ffff9c0e`3b5a8b80 ffffa40b`82eed100 ffffa40b`88e504d0 : FLTMGR!FltpPassThroughFastIo+0xd3
ffff9c0e`3b5a88f0 fffff804`0d7e55bf : ffffa40b`88e504d0 00000000`00000000 00000000`00000000 ffffa40b`00000000 : FLTMGR!FltpFastIoRead+0x165
ffff9c0e`3b5a89a0 fffff804`0d3d2d18 : 00000000`00000440 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtReadFile+0x39f
ffff9c0e`3b5a8a90 00007ffa`bd7dc184 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`0482fbe8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`bd7dc184
THREAD_SHA1_HASH_MOD_FUNC: d51f37a1181073b7e2df991870aece1ea0d01ee6
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 304b0d04ce983fc0ebf77624c11ffd08b80bd63f
THREAD_SHA1_HASH_MOD: 266f1182796f49a917898388e6637859f51c3deb
FOLLOWUP_IP:
nt!MiReadyStandbyPageForActive+c2
fffff804`0d282072 488917 mov qword ptr [rdi],rdx
FAULT_INSTR_CODE: 48178948
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!MiReadyStandbyPageForActive+c2
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4efcf7a9
IMAGE_VERSION: 10.0.18362.476
STACK_COMMAND: .cxr 0xffff8000c2386930 ; kb
IMAGE_NAME: memory_corruption
BUCKET_ID_FUNC_OFFSET: c2
FAILURE_BUCKET_ID: 0x3B_c0000005_STACKPTR_ERROR_nt!MiReadyStandbyPageForActive
BUCKET_ID: 0x3B_c0000005_STACKPTR_ERROR_nt!MiReadyStandbyPageForActive
PRIMARY_PROBLEM_CLASS: 0x3B_c0000005_STACKPTR_ERROR_nt!MiReadyStandbyPageForActive
TARGET_TIME: 2019-12-09T18:08:48.000Z
OSBUILD: 18362
OSSERVICEPACK: 476
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 784
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2011-12-30 02:28:41
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 2ffa
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x3b_c0000005_stackptr_error_nt!mireadystandbypageforactive
FAILURE_ID_HASH: {800e382a-6b78-26e4-1cbd-382bbdcbefe3}
Followup: MachineOwner
---------