*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8007e282072, Address of the instruction which caused the bugcheck
Arg3: ffffe1015473b930, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
DUMP_TYPE: 2
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff8007e282072
BUGCHECK_P3: ffffe1015473b930
BUGCHECK_P4: 0
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
nt!MiReadyStandbyPageForActive+c2
fffff800`7e282072 488917 mov qword ptr [rdi],rdx
CONTEXT: ffffe1015473b930 -- (.cxr 0xffffe1015473b930)
rax=0000000000000000 rbx=fffff380079acfd0 rcx=ffdfcd04837f48c8
rdx=0a00000288eff921 rsi=8000000000000000 rdi=ffdfcd04837f48c8
rip=fffff8007e282072 rsp=ffff8a80c27aa130 rbp=0000000000156000
r8=0000000020000006 r9=ffffb7d241d76ac8 r10=00000000001585ba
r11=ffff8a80c27aa130 r12=0000000000000005 r13=7fffffffffffffff
r14=ffffb7d241d76ac8 r15=000000000000000f
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246
nt!MiReadyStandbyPageForActive+0xc2:
fffff800`7e282072 488917 mov qword ptr [rdi],rdx ds:002b:ffdfcd04`837f48c8=????????????????
Resetting default scope
BUGCHECK_STR: 0x3B_c0000005
CPU_COUNT: c
CPU_MHZ: ed1
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 71
CPU_STEPPING: 0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: MetroExodus.exe
CURRENT_IRQL: 2
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 12-09-2019 20:37:07.0820
ANALYSIS_VERSION: 10.0.18362.1 x86fre
BAD_STACK_POINTER: ffffe1015473aff8
LAST_CONTROL_TRANSFER: from fffff8007e281f36 to fffff8007e282072
STACK_TEXT:
ffff8a80`c27aa130 fffff800`7e281f36 : fffff380`079acfd0 00000000`00000007 00000000`00000007 ffffcd04`837f48c8 : nt!MiReadyStandbyPageForActive+0xc2
ffff8a80`c27aa160 fffff800`7e27fd25 : 00000000`00000001 fffff380`079ace30 ffffb7d2`41d76a80 00000000`00000000 : nt!MiUnlinkStandbyBatch+0x186
ffff8a80`c27aa1a0 fffff800`7e27e10f : 00000000`00008500 00000000`48500000 00000000`00040000 ffff9005`9974def0 : nt!MmCheckCachedPageStates+0x1145
ffff8a80`c27aa3a0 fffff800`7e81ef89 : 00000000`48500000 00000000`00000000 00000000`00000001 ffff8a80`c27aa4b0 : nt!CcFetchDataForRead+0x8f
ffff8a80`c27aa400 fffff800`7e27deb5 : ffff9005`9da89018 00000000`48500000 00000000`00040000 00000000`00000001 : nt!CcMapAndCopyFromCache+0xd9
ffff8a80`c27aa4a0 fffff800`815fa68d : ffff8a80`c27aa5f0 00000000`00000000 ffffcd04`00238c83 00000000`00238c83 : nt!CcCopyReadEx+0x135
ffff8a80`c27aa540 fffff800`80ae5f77 : 00000000`00000000 00000000`000002b0 ffff9005`9ae59170 00000000`00000000 : Ntfs!NtfsCopyReadA+0x2ed
ffff8a80`c27aa830 fffff800`80ae2fa3 : ffff8a80`c27aa920 00000000`00000000 00000000`00000000 ffff9005`97254c40 : FLTMGR!FltpPerformFastIoCall+0x197
ffff8a80`c27aa890 fffff800`80b1c7c5 : ffff8a80`c27aa9f8 ffff8a80`c27aab80 ffff9005`97b05080 ffff9005`9ae59170 : FLTMGR!FltpPassThroughFastIo+0xd3
ffff8a80`c27aa8f0 fffff800`7e7e55bf : ffff9005`9ae59170 00000000`00000000 00000000`00000000 ffff9005`00000000 : FLTMGR!FltpFastIoRead+0x165
ffff8a80`c27aa9a0 fffff800`7e3d2d18 : 00000000`00000458 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtReadFile+0x39f
ffff8a80`c27aaa90 00007ffa`5fe9c184 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`048afbe8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`5fe9c184
THREAD_SHA1_HASH_MOD_FUNC: d51f37a1181073b7e2df991870aece1ea0d01ee6
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 304b0d04ce983fc0ebf77624c11ffd08b80bd63f
THREAD_SHA1_HASH_MOD: 266f1182796f49a917898388e6637859f51c3deb
FOLLOWUP_IP:
nt!MiReadyStandbyPageForActive+c2
fffff800`7e282072 488917 mov qword ptr [rdi],rdx
FAULT_INSTR_CODE: 48178948
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!MiReadyStandbyPageForActive+c2
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4efcf7a9
IMAGE_VERSION: 10.0.18362.476
STACK_COMMAND: .cxr 0xffffe1015473b930 ; kb
IMAGE_NAME: memory_corruption
BUCKET_ID_FUNC_OFFSET: c2
FAILURE_BUCKET_ID: 0x3B_c0000005_STACKPTR_ERROR_nt!MiReadyStandbyPageForActive
BUCKET_ID: 0x3B_c0000005_STACKPTR_ERROR_nt!MiReadyStandbyPageForActive
PRIMARY_PROBLEM_CLASS: 0x3B_c0000005_STACKPTR_ERROR_nt!MiReadyStandbyPageForActive
TARGET_TIME: 2019-12-09T17:10:03.000Z
OSBUILD: 18362
OSSERVICEPACK: 476
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 784
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2011-12-30 02:28:41
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 329e
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x3b_c0000005_stackptr_error_nt!mireadystandbypageforactive
FAILURE_ID_HASH: {800e382a-6b78-26e4-1cbd-382bbdcbefe3}
Followup: MachineOwner
---------