IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80359f517f2, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 10.0.18362.592 (WinBuild.160101.0800)
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
DUMP_TYPE: 2
BUGCHECK_P1: 0
BUGCHECK_P2: ff
BUGCHECK_P3: 0
BUGCHECK_P4: fffff80359f517f2
READ_ADDRESS: fffff8035a1733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
0000000000000000
CURRENT_IRQL: 0
FAULTING_IP:
nt!KiGeneralProtectionFaultShadow+72
fffff803`59f517f2 ae scas byte ptr [rdi]
CPU_COUNT: 8
CPU_MHZ: af0
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 1e
CPU_STEPPING: 5
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
BUGCHECK_STR: AV
PROCESS_NAME: witcher3.exe
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 01-27-2020 20:39:33.0803
ANALYSIS_VERSION: 10.0.18362.1 x86fre
TRAP_FRAME: ffffdf0de21d4800 -- (.trap 0xffffdf0de21d4800)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000ffffa400 rbx=0000000000000000 rcx=0000000000000003
rdx=fffff88000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80359f517f2 rsp=ffffdf0de21d4990 rbp=ffffbc027ece80c0
r8=fffff8035a06a400 r9=0000000000069346 r10=0000000000002d79
r11=fffffffff398255e r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di pl zr na po nc
nt!KiGeneralProtectionFaultShadow+0x72:
fffff803`59f517f2 ae scas byte ptr [rdi] ds:00000000`00000000=??
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80359dd32e9 to fffff80359dc14e0
STACK_TEXT:
ffffdf0d`e21d46b8 fffff803`59dd32e9 : 00000000`0000000a 00000000`00000000 00000000`000000ff 00000000`00000000 : nt!KeBugCheckEx
ffffdf0d`e21d46c0 fffff803`59dcf62b : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffdf0d`e21d4800 fffff803`59f517f2 : 00000000`00000000 fffff803`59ed2d50 00000000`00000010 00000000`00010286 : nt!KiPageFault+0x46b
ffffdf0d`e21d4990 fffff803`59ed2d50 : 00000000`00000000 00000116`e7f95ff0 00000000`00000000 00000000`00000000 : nt!KiGeneralProtectionFaultShadow+0x72
ffffdf0d`e21d49c0 fffff803`59e0d771 : 00000000`0000000c ffffbc02`7c8b0080 ffffdf0d`e21d4a90 fffff803`59c49038 : nt!MiDelayFaultingThread+0x4
ffffdf0d`e21d49f0 fffff803`59c72cee : 00000000`00000000 ffff8c01`ea820180 ffffbc02`7c8b01f0 ffffbc02`7c8b0080 : nt!MiUserFault+0x19a591
ffffdf0d`e21d4aa0 fffff803`59dcf520 : ffffbc02`7a68f080 0000005f`f0bff9d8 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x14e
ffffdf0d`e21d4c40 00007ffd`0a0a22cc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x360
0000005f`f0bff990 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`0a0a22cc
CHKIMG_EXTENSION: !chkimg -lo 50 -db !nt
8 errors : !nt (fffff80359f517c1-fffff80359f517f9)
fffff80359f517c0 48 *48 c6 00 42 00 00 ff 76 *e1 ff 76 f0 ff 76 e8 HH..B...v..v..v.
fffff80359f517d0 ff *1a e0 ff 76 d8 ff 76 d0 *42 48 8b 34 25 10 00 ....v..v.BH.4%..
fffff80359f517e0 00 *81 65 48 83 24 25 10 00 *76 00 00 e9 8f d6 e7 ..eH.$%..v......
fffff80359f517f0 ff *98 ae e8 e9 87 d6 e7 ff *0b 66 0f 1f 44 00 00 ..........f..D..
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: STRIDE
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_STRIDE
BUCKET_ID: MEMORY_CORRUPTION_STRIDE
PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_STRIDE
TARGET_TIME: 2020-01-27T15:23:06.000Z
OSBUILD: 18362
OSSERVICEPACK: 592
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1972-08-22 03:24:00
BUILDDATESTAMP_STR: 160101.0800
BUILDLAB_STR: WinBuild
BUILDOSVER_STR: 10.0.18362.592
ANALYSIS_SESSION_ELAPSED_TIME: 2741
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:memory_corruption_stride
FAILURE_ID_HASH: {574dbc1b-92cb-fb09-cb7a-cacc1bb2c511}
Followup: memory_corruption
---------
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: fffff802802953d8, memory referenced.
Arg2: 0000000000000010, value 0 = read operation, 1 = write operation.
Arg3: fffff802802953d8, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 10.0.18362.592 (WinBuild.160101.0800)
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
DUMP_TYPE: 2
BUGCHECK_P1: fffff802802953d8
BUGCHECK_P2: 10
BUGCHECK_P3: fffff802802953d8
BUGCHECK_P4: 2
READ_ADDRESS: fffff802381733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff802802953d8
FAULTING_IP:
+0
fffff802`802953d8 ?? ???
MM_INTERNAL_CODE: 2
CPU_COUNT: 8
CPU_MHZ: af0
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 1e
CPU_STEPPING: 5
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: SearchUI.exe
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 01-27-2020 20:39:37.0826
ANALYSIS_VERSION: 10.0.18362.1 x86fre
TRAP_FRAME: ffffed055f068710 -- (.trap 0xffffed055f068710)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000004 rbx=0000000000000000 rcx=ffffed055f068b78
rdx=ffffed055f068bd0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff802802953d8 rsp=ffffed055f0688a8 rbp=ffffed055f068cc0
r8=ffffa50974dfe950 r9=0000000000000004 r10=ffffdd013a900000
r11=ffffed055f068ab0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
fffff802`802953d8 ?? ???
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80237de35d6 to fffff80237dc14e0
FAILED_INSTRUCTION_ADDRESS:
+0
fffff802`802953d8 ?? ???
STACK_TEXT:
ffffed05`5f068468 fffff802`37de35d6 : 00000000`00000050 fffff802`802953d8 00000000`00000010 ffffed05`5f068710 : nt!KeBugCheckEx
ffffed05`5f068470 fffff802`37c72eef : ffff9305`d702c900 00000000`00000010 00000000`00000000 fffff802`802953d8 : nt!MiSystemFault+0x1d6866
ffffed05`5f068570 fffff802`37dcf520 : 00000000`00000000 ffffffff`00000010 00000000`00000004 00000000`c0000022 : nt!MmAccessFault+0x34f
ffffed05`5f068710 fffff802`802953d8 : fffff802`382953d8 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x360
ffffed05`5f0688a8 fffff802`382953d8 : 00000000`00000000 00000000`00000000 00000000`00000000 ffffa509`776de770 : 0xfffff802`802953d8
ffffed05`5f0688b0 fffff802`382952d6 : 00000000`00000000 ffffed05`5f068cc0 000000be`47f4de28 00000000`00000000 : nt!ExQueryLicenseValueInternal+0x48
ffffed05`5f068b30 fffff802`37dd2d18 : 00000000`004000b0 000000be`47f4de28 000000be`47f4de20 00000000`00000004 : nt!NtQueryLicenseValue+0x216
ffffed05`5f068bd0 00007fff`b5adea54 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000be`47f4dde8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`b5adea54
THREAD_SHA1_HASH_MOD_FUNC: ae055bd09864b5b4ecbb120588a52564f88fc50a
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: a0a9d412c5a07244cfaec2eca9c775dbd18f5742
THREAD_SHA1_HASH_MOD: 30a3e915496deaace47137d5b90c3ecc03746bf6
FOLLOWUP_IP:
nt!MiSystemFault+1d6866
fffff802`37de35d6 cc int 3
FAULT_INSTR_CODE: 4d8d48cc
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!MiSystemFault+1d6866
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4f6eba0
IMAGE_VERSION: 10.0.18362.592
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: memory_corruption
BUCKET_ID_FUNC_OFFSET: 1d6866
FAILURE_BUCKET_ID: AV_INVALID_BAD_IP_nt!MiSystemFault
BUCKET_ID: AV_INVALID_BAD_IP_nt!MiSystemFault
PRIMARY_PROBLEM_CLASS: AV_INVALID_BAD_IP_nt!MiSystemFault
TARGET_TIME: 2020-01-27T13:41:18.000Z
OSBUILD: 18362
OSSERVICEPACK: 592
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1972-08-22 03:24:00
BUILDDATESTAMP_STR: 160101.0800
BUILDLAB_STR: WinBuild
BUILDOSVER_STR: 10.0.18362.592
ANALYSIS_SESSION_ELAPSED_TIME: be8
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_invalid_bad_ip_nt!misystemfault
FAILURE_ID_HASH: {48ad9531-e3f8-1044-fc5f-d917677674c7}
Followup: MachineOwner
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80360c8cbad, Address of the instruction which caused the bugcheck
Arg3: fffff30709804ea0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 10.0.18362.592 (WinBuild.160101.0800)
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
DUMP_TYPE: 2
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff80360c8cbad
BUGCHECK_P3: fffff30709804ea0
BUGCHECK_P4: 0
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
nt!MiIsProcessCfgEnabled+9
fffff803`60c8cbad 488b88b8d00000 mov rcx,qword ptr [rax+0D0B8h]
CONTEXT: fffff30709804ea0 -- (.cxr 0xfffff30709804ea0)
rax=000301000000ffff rbx=0000000000000002 rcx=c565ddd388260000
rdx=0000000000000000 rsi=ffffc085c4aebf90 rdi=fffff30709805b20
rip=fffff80360c8cbad rsp=fffff30709805898 rbp=fffff307098059a0
r8=0000000000000100 r9=0000000000000000 r10=ffffc085ab5ea210
r11=fffff30709805870 r12=fffff30709805ab8 r13=0000000000000003
r14=0000000016e02000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246
nt!MiIsProcessCfgEnabled+0x9:
fffff803`60c8cbad 488b88b8d00000 mov rcx,qword ptr [rax+0D0B8h] ds:002b:00030100`0001d0b7=????????????????
Resetting default scope
BUGCHECK_STR: 0x3B_c0000005
CPU_COUNT: 8
CPU_MHZ: af0
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 1e
CPU_STEPPING: 5
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
PROCESS_NAME: LeagueClientUx
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 01-27-2020 20:39:41.0561
ANALYSIS_VERSION: 10.0.18362.1 x86fre
LAST_CONTROL_TRANSFER: from fffff80361257e1c to fffff80360c8cbad
STACK_TEXT:
fffff307`09805898 fffff803`61257e1c : 00000000`00000002 ffffc085`c4aebf90 fffff307`098059a0 00000000`00000001 : nt!MiIsProcessCfgEnabled+0x9
fffff307`098058a0 fffff803`61250c66 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiAllocateVirtualMemory+0x40c
fffff307`09805a30 fffff803`60dd2d18 : ffffffff`ffffffff ffffc085`c6d55080 00000000`00000000 00000000`00ecde38 : nt!NtAllocateVirtualMemory+0x196
fffff307`09805bd0 00007ff9`6e4dc3c4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`00ecde18 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`6e4dc3c4
CHKIMG_EXTENSION: !chkimg -lo 50 -db !nt
7 errors : !nt (fffff80360c8cb81-fffff80360c8cbb9)
fffff80360c8cb80 48 *69 cf e8 a8 d3 fa ff 48 *d0 5c 24 38 48 83 c4 Hi......H.\$8H..
fffff80360c8cb90 20 *42 c3 48 8b cb e8 d5 bf *1a 00 eb db cc 4c 87 B.H..........L.
fffff80360c8cba0 00 dd c3 90 65 48 8b 04 25 *9e 01 00 00 48 8b 88 ....eH..%....H..
fffff80360c8cbb0 b8 *d0 00 00 33 c0 48 8b 91 *ec 05 00 00 48 39 82 ....3.H......H9.
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: STRIDE
STACK_COMMAND: .cxr 0xfffff30709804ea0 ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_STRIDE
BUCKET_ID: MEMORY_CORRUPTION_STRIDE
PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_STRIDE
TARGET_TIME: 2020-01-27T13:33:54.000Z
OSBUILD: 18362
OSSERVICEPACK: 592
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1972-08-22 03:24:00
BUILDDATESTAMP_STR: 160101.0800
BUILDLAB_STR: WinBuild
BUILDOSVER_STR: 10.0.18362.592
ANALYSIS_SESSION_ELAPSED_TIME: 27b3
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:memory_corruption_stride
FAILURE_ID_HASH: {574dbc1b-92cb-fb09-cb7a-cacc1bb2c511}
Followup: memory_corruption
---------
UNEXPECTED_KERNEL_MODE_TRAP_M (1000007f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault). The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
use .trap on that value
Else
.trap on the appropriate frame will show where the trap was taken
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: ffff970137784090
Arg3: ffffa78b33a7f010
Arg4: fffff80327351871
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 10.0.18362.592 (WinBuild.160101.0800)
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
DUMP_TYPE: 2
BUGCHECK_P1: 8
BUGCHECK_P2: ffff970137784090
BUGCHECK_P3: ffffa78b33a7f010
BUGCHECK_P4: fffff80327351871
BUGCHECK_STR: 0x7f_8
CPU_COUNT: 8
CPU_MHZ: af0
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 1e
CPU_STEPPING: 5
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
PROCESS_NAME: League of Lege
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 01-27-2020 20:39:47.0373
ANALYSIS_VERSION: 10.0.18362.1 x86fre
LAST_CONTROL_TRANSFER: from fffff80327351871 to fffff80327351871
CHKIMG_EXTENSION: !chkimg -lo 50 -db !nt
24 errors : !nt (fffff80327351841-fffff80327351979)
fffff80327351840 48 *fd c6 00 42 00 00 ff 76 *1c ff 76 f0 ff 76 e8 H...B...v..v..v.
fffff80327351850 ff *bf e0 ff 76 d8 ff 76 d0 *f1 48 8b 34 25 10 00 ....v..v..H.4%..
fffff80327351860 00 *1b 65 48 83 24 25 10 00 *5f 00 00 e9 4f d9 e7 ..eH.$%.._...O..
fffff80327351870 ff *81 ae e8 e9 47 d9 e7 ff *09 66 0f 1f 44 00 00 .....G....f..D..
...
fffff803273518c0 48 *36 c6 00 42 00 00 ff 76 *49 ff 76 f0 ff 76 e8 H6..B...vI.v..v.
fffff803273518d0 ff *a0 e0 ff 76 d8 65 48 8b *64 25 10 00 00 00 65 ....v.eH.d%....e
fffff803273518e0 48 *bf 24 25 10 00 00 00 00 *4c 12 df e7 ff 0f ae H.$%.....L......
fffff803273518f0 e8 *90 0a df e7 ff c3 66 0f *cf 84 00 00 00 00 00 .......f........
...
fffff80327351940 48 *3c c6 00 42 00 00 ff 76 *88 ff 76 f0 ff 76 e8 H<..B...v..v..v.
fffff80327351950 ff *0d e0 ff 76 d8 ff 76 d0 *b5 48 8b 34 25 10 00 ....v..v..H.4%..
fffff80327351960 00 *6a 65 48 83 24 25 10 00 *8b 00 00 e9 4f e2 e7 .jeH.$%......O..
fffff80327351970 ff *43 ae e8 e9 47 e2 e7 ff *0d 66 0f 1f 44 00 00 .C...G....f..D..
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: STRIDE
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_STRIDE
BUCKET_ID: MEMORY_CORRUPTION_STRIDE
PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_STRIDE
TARGET_TIME: 2020-01-27T13:16:33.000Z
OSBUILD: 18362
OSSERVICEPACK: 592
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1972-08-22 03:24:00
BUILDDATESTAMP_STR: 160101.0800
BUILDLAB_STR: WinBuild
BUILDOSVER_STR: 10.0.18362.592
ANALYSIS_SESSION_ELAPSED_TIME: 27cb
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:memory_corruption_stride
FAILURE_ID_HASH: {574dbc1b-92cb-fb09-cb7a-cacc1bb2c511}
Followup: memory_corruption
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffff8743a177e870, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80070a73fcf, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 10.0.18362.592 (WinBuild.160101.0800)
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
DUMP_TYPE: 2
BUGCHECK_P1: ffff8743a177e870
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff80070a73fcf
READ_ADDRESS: fffff80070f733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
ffff8743a177e870
CURRENT_IRQL: 2
FAULTING_IP:
nt!MiLockPageTableInternal+5f
fffff800`70a73fcf 488b0f mov rcx,qword ptr [rdi]
CPU_COUNT: 8
CPU_MHZ: af0
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 1e
CPU_STEPPING: 5
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
BUGCHECK_STR: AV
PROCESS_NAME: Paradox Launch
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 01-27-2020 20:39:51.0587
ANALYSIS_VERSION: 10.0.18362.1 x86fre
TRAP_FRAME: ffff8807a0f337f0 -- (.trap 0xffff8807a0f337f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff8743a1d0e000 rbx=0000000000000000 rcx=ffffb80bd819c940
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80070a73fcf rsp=ffff8807a0f33980 rbp=0000000000000000
r8=ffff8743a1d0e000 r9=ffffb80bd819c940 r10=ffff8743a1d0efff
r11=ffff874380000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!MiLockPageTableInternal+0x5f:
fffff800`70a73fcf 488b0f mov rcx,qword ptr [rdi] ds:00000000`00000000=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80070bd32e9 to fffff80070bc14e0
STACK_TEXT:
ffff8807`a0f336a8 fffff800`70bd32e9 : 00000000`0000000a ffff8743`a177e870 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffff8807`a0f336b0 fffff800`70bcf62b : 00000000`00000001 ffffb80b`d7cca080 00000000`00000080 1a000000`a588c867 : nt!KiBugCheckDispatch+0x69
ffff8807`a0f337f0 fffff800`70a73fcf : ffff8807`a0f33b60 fffffff6`00000100 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x46b
ffff8807`a0f33980 fffff800`70a73894 : ffffb80b`d819c940 ffff8700`00000000 00000800`00000002 ffff8743`9ffdba28 : nt!MiLockPageTableInternal+0x5f
ffff8807`a0f339f0 fffff800`70a72cee : 00000000`00000111 00000000`00000001 00000000`c0000016 fffff800`70bc86ef : nt!MiUserFault+0x6b4
ffff8807`a0f33aa0 fffff800`70bcf520 : 00000000`00000000 ffff8807`00000001 0000024f`8b7a7fa0 ffff8807`a0f33cc0 : nt!MmAccessFault+0x14e
ffff8807`a0f33c40 00007ff6`e8bb3d2b : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x360
000000f3`94efce60 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff6`e8bb3d2b
CHKIMG_EXTENSION: !chkimg -lo 50 -db !nt
13 errors : !nt (fffff80070a73841-fffff80070a73979)
fffff80070a73840 00 *57 8b d0 44 89 ac 24 b8 *d5 00 00 48 89 54 24 .W..D..$....H.T$
fffff80070a73850 40 *8f 85 d2 0f 85 36 fc ff *6a e9 c4 a0 19 00 49 @.....6..j.....I
fffff80070a73860 8b *f6 48 3b d0 0f 87 95 fb *09 ff 45 33 ed 41 f6 ..H;.......E3.A.
fffff80070a73870 46 *0d 01 75 1f 48 b9 70 e8 77 a1 43 87 ff ff 48 F..u.H.p.w.C...H
...
fffff80070a73940 45 *26 ed 0f 88 69 fc ff ff *bd bd 70 e8 d0 a1 43 E&...i.....p...C
fffff80070a73950 87 fc ff e9 d0 fa ff ff 48 *f9 f8 e7 d0 a1 43 87 ........H.....C.
fffff80070a73960 ff b7 48 8b c0 4c 3b c8 0f *1a 54 ff ff ff f7 05 ..H..L;...T.....
fffff80070a73970 08 *2a 50 00 00 00 c0 00 0f *63 44 ff ff ff 65 48 .*P......cD...eH
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: STRIDE
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_STRIDE
BUCKET_ID: MEMORY_CORRUPTION_STRIDE
PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_STRIDE
TARGET_TIME: 2020-01-26T19:02:11.000Z
OSBUILD: 18362
OSSERVICEPACK: 592
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1972-08-22 03:24:00
BUILDDATESTAMP_STR: 160101.0800
BUILDLAB_STR: WinBuild
BUILDOSVER_STR: 10.0.18362.592
ANALYSIS_SESSION_ELAPSED_TIME: 2811
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:memory_corruption_stride
FAILURE_ID_HASH: {574dbc1b-92cb-fb09-cb7a-cacc1bb2c511}
Followup: memory_corruption
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80409c3dd09, Address of the instruction which caused the bugcheck
Arg3: fffff8040fa7c930, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 10.0.18362.592 (WinBuild.160101.0800)
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
DUMP_TYPE: 2
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff80409c3dd09
BUGCHECK_P3: fffff8040fa7c930
BUGCHECK_P4: 0
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
nt!KiInsertTimerTable+279
fffff804`09c3dd09 483b68f8 cmp rbp,qword ptr [rax-8]
CONTEXT: fffff8040fa7c930 -- (.cxr 0xfffff8040fa7c930)
rax=f3ffe206ac28c1a0 rbx=0000000000000000 rcx=ffffe206a8716a40
rdx=0000000000007546 rsi=ffffe206aa5541c0 rdi=fffff80407a06800
rip=fffff80409c3dd09 rsp=ffffa286c19b09e0 rbp=0000000379c0e546
r8=fffff80407a06810 r9=fffff80407a05800 r10=fffff80407a02180
r11=fffff80409c00000 r12=0000000000000070 r13=0000000000000070
r14=ffffe206a88f16e0 r15=fffff80407a06808
iopl=0 nv up ei pl nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010206
nt!KiInsertTimerTable+0x279:
fffff804`09c3dd09 483b68f8 cmp rbp,qword ptr [rax-8] ds:002b:f3ffe206`ac28c198=????????????????
Resetting default scope
BUGCHECK_STR: 0x3B_c0000005
CPU_COUNT: 8
CPU_MHZ: af0
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 1e
CPU_STEPPING: 5
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: NVIDIA Share.e
CURRENT_IRQL: 2
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 01-27-2020 20:39:55.0134
ANALYSIS_VERSION: 10.0.18362.1 x86fre
BAD_STACK_POINTER: fffff8040fa7bff8
LAST_CONTROL_TRANSFER: from fffff80409c3b6f7 to fffff80409c3dd09
STACK_TEXT:
ffffa286`c19b09e0 fffff804`09c3b6f7 : ffffe206`aa5540c0 ffffca81`00000000 ffffa286`00000000 00001f80`00000000 : nt!KiInsertTimerTable+0x279
ffffa286`c19b0a60 fffff804`09c3ade5 : 00000000`00000070 00000000`00000000 00000000`00000001 00000000`00000000 : nt!KiCommitThreadWait+0x1f7
ffffa286`c19b0b00 fffff804`09c887ae : ffffe206`aa253c40 fffff804`00000006 0000018f`40fdca01 00000000`00000000 : nt!KeWaitForSingleObject+0x255
ffffa286`c19b0be0 fffff804`0a21fe49 : ffffa286`c19b0fa0 00000000`00000001 ffffe206`aa5540c0 ffffca81`70eb9180 : nt!KeWaitForMultipleObjects+0x54e
ffffa286`c19b0cf0 fffffce8`2915ed12 : 00000000`00000000 ffffe206`a6b3e070 fffffcb1`c630e8a0 ffffa286`c19b1210 : nt!ObWaitForMultipleObjects+0x2a9
ffffa286`c19b11f0 fffffce8`2902aaa1 : 00000000`00000000 fffffcb1`c63bd430 00000000`00000004 00000000`00001cff : win32kfull!xxxMsgWaitForMultipleObjectsEx+0xde
ffffa286`c19b12a0 fffff804`09dd2d18 : ffffe206`aa5540c0 0000006e`74c7f468 0000006e`00000004 ffffa286`00001cff : win32kfull!NtUserMsgWaitForMultipleObjectsEx+0x3c1
ffffa286`c19b1bd0 00007ff9`c1aa9a84 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000006e`74c7f448 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`c1aa9a84
THREAD_SHA1_HASH_MOD_FUNC: 12706396919be1c2314542301d6ad5aba3b15b96
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: f62bd3d4ed8caa80abfbe776c7d5aea6c5cb539b
THREAD_SHA1_HASH_MOD: ea13232d9e5a8980e7c1be74887313f64aa43ead
FOLLOWUP_IP:
win32kfull!xxxMsgWaitForMultipleObjectsEx+de
fffffce8`2915ed12 8bd8 mov ebx,eax
FAULT_INSTR_CODE: c085d88b
SYMBOL_STACK_INDEX: 5
SYMBOL_NAME: win32kfull!xxxMsgWaitForMultipleObjectsEx+de
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: win32kfull
IMAGE_NAME: win32kfull.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 0
IMAGE_VERSION: 10.0.18362.592
STACK_COMMAND: .cxr 0xfffff8040fa7c930 ; kb
BUCKET_ID_FUNC_OFFSET: de
FAILURE_BUCKET_ID: 0x3B_c0000005_STACKPTR_ERROR_win32kfull!xxxMsgWaitForMultipleObjectsEx
BUCKET_ID: 0x3B_c0000005_STACKPTR_ERROR_win32kfull!xxxMsgWaitForMultipleObjectsEx
PRIMARY_PROBLEM_CLASS: 0x3B_c0000005_STACKPTR_ERROR_win32kfull!xxxMsgWaitForMultipleObjectsEx
TARGET_TIME: 2020-01-26T09:35:02.000Z
OSBUILD: 18362
OSSERVICEPACK: 592
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1972-08-22 03:24:00
BUILDDATESTAMP_STR: 160101.0800
BUILDLAB_STR: WinBuild
BUILDOSVER_STR: 10.0.18362.592
ANALYSIS_SESSION_ELAPSED_TIME: 17fd
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x3b_c0000005_stackptr_error_win32kfull!xxxmsgwaitformultipleobjectsex
FAILURE_ID_HASH: {3aad59b1-4911-24c8-0b82-1c3e2601495c}
Followup: MachineOwner
---------
UNEXPECTED_KERNEL_MODE_TRAP_M (1000007f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault). The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
use .trap on that value
Else
.trap on the appropriate frame will show where the trap was taken
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: fffff8041767ee50
Arg3: fffffb80acba5020
Arg4: ffff920412152a00
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 10.0.18362.592 (WinBuild.160101.0800)
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
DUMP_TYPE: 2
BUGCHECK_P1: 8
BUGCHECK_P2: fffff8041767ee50
BUGCHECK_P3: fffffb80acba5020
BUGCHECK_P4: ffff920412152a00
BUGCHECK_STR: 0x7f_8
CPU_COUNT: 8
CPU_MHZ: af0
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 1e
CPU_STEPPING: 5
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: BAD_STACK_0x7f_8
PROCESS_NAME: LeagueClientUx
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 01-27-2020 20:39:58.0952
ANALYSIS_VERSION: 10.0.18362.1 x86fre
LAST_CONTROL_TRANSFER: from 0000000000000010 to ffff920412152a00
SYMBOL_NAME: ANALYSIS_INCONCLUSIVE
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: Unknown_Module
IMAGE_NAME: Unknown_Image
DEBUG_FLR_IMAGE_TIMESTAMP: 0
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID: BAD_STACK_0x7f_8
PRIMARY_PROBLEM_CLASS: BAD_STACK_0x7f_8
FAILURE_BUCKET_ID: BAD_STACK_0x7f_8
TARGET_TIME: 2020-01-25T16:48:27.000Z
OSBUILD: 18362
OSSERVICEPACK: 592
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1972-08-22 03:24:00
BUILDDATESTAMP_STR: 160101.0800
BUILDLAB_STR: WinBuild
BUILDOSVER_STR: 10.0.18362.592
ANALYSIS_SESSION_ELAPSED_TIME: c72
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:bad_stack_0x7f_8
FAILURE_ID_HASH: {da7bca4e-721b-0db1-7738-7d1e91f48cac}
Followup: MachineOwner
---------
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000004, The thread's stack pointer was outside the legal stack
extents for the thread.
Arg2: ffffdd807abb7ff0, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffdd807abb7f48, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 10.0.18362.592 (WinBuild.160101.0800)
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
DUMP_TYPE: 2
BUGCHECK_P1: 4
BUGCHECK_P2: ffffdd807abb7ff0
BUGCHECK_P3: ffffdd807abb7f48
BUGCHECK_P4: 0
TRAP_FRAME: ffffdd807abb7ff0 -- (.trap 0xffffdd807abb7ff0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffd986f16c5000 rbx=0000000000000000 rcx=0000000000000004
rdx=ffffd986f16cb000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80311a4f1df rsp=ffffdd807abb8180 rbp=ffffdd807abb86f0
r8=ffffd986f16cb000 r9=ffffdd807abb8710 r10=ffff91828b1f6080
r11=0000006e6eafbb98 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!RtlpGetStackLimitsEx+0x12ea53:
fffff803`11a4f1df cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: ffffdd807abb7f48 -- (.exr 0xffffdd807abb7f48)
ExceptionAddress: fffff80311a4f1df (nt!RtlpGetStackLimitsEx+0x000000000012ea53)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000004
Subcode: 0x4 FAST_FAIL_INCORRECT_STACK
CPU_COUNT: 8
CPU_MHZ: af0
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 1e
CPU_STEPPING: 5
CUSTOMER_CRASH_COUNT: 1
BUGCHECK_STR: 0x139
PROCESS_NAME: MsMpEng.exe
CURRENT_IRQL: 2
DEFAULT_BUCKET_ID: FAIL_FAST_INCORRECT_STACK
WATSON_BKT_EVENT: BEX
ERROR_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>
EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000004
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 01-27-2020 20:40:02.0904
ANALYSIS_VERSION: 10.0.18362.1 x86fre
BAD_STACK_POINTER: ffffdd807abb7cc8
LAST_CONTROL_TRANSFER: from fffff803119d32e9 to fffff803119c14e0
STACK_TEXT:
ffffdd80`7abb7cc8 fffff803`119d32e9 : 00000000`00000139 00000000`00000004 ffffdd80`7abb7ff0 ffffdd80`7abb7f48 : nt!KeBugCheckEx
ffffdd80`7abb7cd0 fffff803`119d3710 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffdd80`7abb7e10 fffff803`119d1aa5 : fffff803`11927368 fffff803`11c0ec94 ffffdd80`7abb87d0 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffffdd80`7abb7ff0 fffff803`11a4f1df : 00000000`00000000 00000000`00000360 0005e548`00ab6000 00000000`0010001f : nt!KiRaiseSecurityCheckFailure+0x325
ffffdd80`7abb8180 fffff803`11a2e860 : 00000000`00000000 00000000`00000000 ffffdd80`7abb86f0 00007fff`00000003 : nt!RtlpGetStackLimitsEx+0x12ea53
ffffdd80`7abb81b0 fffff803`118c753e : ffffd986`f16ca228 ffffdd80`7abb8e30 ffffd986`f16ca228 00000000`00000000 : nt!RtlDispatchException+0x16bd60
ffffdd80`7abb8900 fffff803`119c2362 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x16e
ffffdd80`7abb8fb0 fffff803`119c2330 : fffff803`119d3416 00000000`c0000434 00000000`00000000 00000000`c0000016 : nt!KxExceptionDispatchOnExceptionStack+0x12
ffffd986`f16ca0e8 fffff803`119d3416 : 00000000`c0000434 00000000`00000000 00000000`c0000016 ffffa70f`18240000 : nt!KiExceptionDispatchOnExceptionStackContinue
ffffd986`f16ca0f0 fffff803`119cf1a2 : ffffbb88`0c228410 ffff9182`8b1f6080 ffff9182`8f919d50 fffff803`15113c9d : nt!KiExceptionDispatch+0x116
ffffd986`f16ca2d0 fffff803`119c9407 : 00000000`00000000 fffff803`11878321 1a000000`97802867 0000018b`ca192000 : nt!KiGeneralProtectionFault+0x322
ffffd986`f16ca460 fffff803`11878321 : 1a000000`97802867 0000018b`ca192000 1a000000`97802867 00000000`00000000 : nt!ExpInterlockedPopEntrySListFault
ffffd986`f16ca470 fffff803`11877c71 : fffff803`11c6a400 ffff9182`00000008 00000000`00000008 00000000`00000000 : nt!MiGetPage+0xf1
ffffd986`f16ca550 fffff803`1187599a : ffffd986`f16ca8c0 00000000`00000000 00000000`00000001 00000000`15913511 : nt!MiGetPageChain+0x181
ffffd986`f16ca740 fffff803`11875478 : 00000000`00000000 0000018b`00000000 00000000`00000004 00000000`00000001 : nt!MiResolvePrivateZeroFault+0x14a
ffffd986`f16ca860 fffff803`11874d42 : ffffb85c`0062f280 00000000`00000000 00000000`00000000 00000000`00000002 : nt!MiResolveDemandZeroFault+0x218
ffffd986`f16ca950 fffff803`11872d09 : 00000000`00000111 00000000`00000004 00000000`c0000016 0000018b`ca183000 : nt!MiDispatchFault+0x982
ffffd986`f16caaa0 fffff803`119cf520 : 0000018b`a9118810 ffffd986`f16cacc0 00000000`000e0000 ffffd986`f16cacc0 : nt!MmAccessFault+0x169
ffffd986`f16cac40 00007ffc`f0180d3e : 00007ffc`f00cfe9d 00000000`0000001c 00000000`00000000 00000000`0000002c : nt!KiPageFault+0x360
0000006e`6eafbb98 00007ffc`f00cfe9d : 00000000`0000001c 00000000`00000000 00000000`0000002c 0000018b`c2a0c350 : 0x00007ffc`f0180d3e
0000006e`6eafbba0 00000000`0000001c : 00000000`00000000 00000000`0000002c 0000018b`c2a0c350 0000018b`b9e6f010 : 0x00007ffc`f00cfe9d
0000006e`6eafbba8 00000000`00000000 : 00000000`0000002c 0000018b`c2a0c350 0000018b`b9e6f010 00000000`00000655 : 0x1c
THREAD_SHA1_HASH_MOD_FUNC: 7d221bf33ce405db2fad0126bfcdd720956ac548
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 327fe14d2d14b4bb99ceb0c5acd50fbf1a7ff5ba
THREAD_SHA1_HASH_MOD: a9ca63faa9e43cc61ef524ad38163e6a9ae5c358
FOLLOWUP_IP:
nt!KiFastFailDispatch+d0
fffff803`119d3710 c644242000 mov byte ptr [rsp+20h],0
FAULT_INSTR_CODE: 202444c6
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!KiFastFailDispatch+d0
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4f6eba0
IMAGE_VERSION: 10.0.18362.592
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: d0
FAILURE_BUCKET_ID: 0x139_MISSING_GSFRAME_STACKPTR_ERROR_nt!KiFastFailDispatch
BUCKET_ID: 0x139_MISSING_GSFRAME_STACKPTR_ERROR_nt!KiFastFailDispatch
PRIMARY_PROBLEM_CLASS: 0x139_MISSING_GSFRAME_STACKPTR_ERROR_nt!KiFastFailDispatch
TARGET_TIME: 2020-01-25T23:36:44.000Z
OSBUILD: 18362
OSSERVICEPACK: 592
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1972-08-22 03:24:00
BUILDDATESTAMP_STR: 160101.0800
BUILDLAB_STR: WinBuild
BUILDOSVER_STR: 10.0.18362.592
ANALYSIS_SESSION_ELAPSED_TIME: b41
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x139_missing_gsframe_stackptr_error_nt!kifastfaildispatch
FAILURE_ID_HASH: {7b0febb5-6007-4f2b-3d38-57fef278d8d5}
Followup: MachineOwner
---------
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff806663d6648, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for nvlddmkm.sys
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 10.0.18362.592 (WinBuild.160101.0800)
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
DUMP_TYPE: 2
BUGCHECK_P1: 0
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff806663d6648
READ_ADDRESS: fffff806623733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
0000000000000000
CURRENT_IRQL: 2
FAULTING_IP:
dxgmms2!VidSchiCheckPlaneIndependentFlipCondition+0
fffff806`663d6648 4c8b2a mov r13,qword ptr [rdx]
CPU_COUNT: 8
CPU_MHZ: af0
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 1e
CPU_STEPPING: 5
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
BUGCHECK_STR: AV
PROCESS_NAME: System
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 01-27-2020 20:40:07.0371
ANALYSIS_VERSION: 10.0.18362.1 x86fre
TRAP_FRAME: fffff80664c67070 -- (.trap 0xfffff80664c67070)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffdd8b24a4d000 rbx=0000000000000000 rcx=ffffdd8b24a1f000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff806663d6648 rsp=fffff80664c67208 rbp=ffffdd8b2a2d53a0
r8=0000000000000000 r9=ffffdd8b2ab9b050 r10=00000000000041b0
r11=00000000000041b0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
dxgmms2!VidSchiCheckPlaneIndependentFlipCondition:
fffff806`663d6648 4c8b2a mov r13,qword ptr [rdx] ds:00000000`00000000=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80661fd32e9 to fffff80661fc14e0
STACK_TEXT:
fffff806`64c66f28 fffff806`61fd32e9 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff806`64c66f30 fffff806`61fcf62b : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff806`64c67070 fffff806`663d6648 : fffff806`663d2f8b fffff806`64c67280 00000000`00000008 ffffe929`211b062c : nt!KiPageFault+0x46b
fffff806`64c67208 fffff806`663d2f8b : fffff806`64c67280 00000000`00000008 ffffe929`211b062c 00000000`00000000 : dxgmms2!VidSchiCheckPlaneIndependentFlipCondition
fffff806`64c67210 fffff806`663d2be0 : fffff806`64c673b0 00000000`00000000 00000000`00000000 ffffdd8b`24abc000 : dxgmms2!VidSchiProcessPresentHistoryToken+0x20b
fffff806`64c672d0 fffff806`663c7cad : 00000000`00000000 fffff806`00000000 fffff806`64c67460 00000000`00000001 : dxgmms2!VidSchiSubmitPresentHistoryToken+0xb0
fffff806`64c67360 fffff806`663c70fe : ffffdd8b`24abf202 ffffdd8b`00000001 ffffdd8b`00000000 ffffdd8b`00000000 : dxgmms2!VidSchiProcessCompletedQueuePacketInternal+0x7ed
fffff806`64c67510 fffff806`663c479b : ffffdd8b`24abf202 00000000`00000001 fffff806`64c67769 00000000`00000000 : dxgmms2!VidSchiProcessDpcCompletedPacket+0x6ee
fffff806`64c67670 fffff806`654f4711 : fffff806`64c67769 ffffdd8b`24a1f000 ffffdd8b`2294a6e8 00000000`00000000 : dxgmms2!VidSchDdiNotifyDpc+0x22b
fffff806`64c67720 fffff806`68787cb4 : ffffdd8b`2294a030 00000000`00000000 ffffdd8b`2294a030 ffffdd8b`22a81000 : dxgkrnl!DxgNotifyDpcCB+0x91
fffff806`64c677d0 ffffdd8b`2294a030 : 00000000`00000000 ffffdd8b`2294a030 ffffdd8b`22a81000 fffff806`68787c47 : nvlddmkm+0xa7cb4
fffff806`64c677d8 00000000`00000000 : ffffdd8b`2294a030 ffffdd8b`22a81000 fffff806`68787c47 ffffdd8b`22a81000 : 0xffffdd8b`2294a030
CHKIMG_EXTENSION: !chkimg -lo 50 -db !dxgmms2
15 errors : !dxgmms2 (fffff806663d6642-fffff806663d66fa)
fffff806663d6640 cc cc *7a cc cc cc cc cc 4c 8b *2a 83 fa ff 74 4b ..z.....L.*...tK
fffff806663d6650 41 8b *fe 4c 69 c0 d8 00 00 00 *34 d2 4c 8b 8c d1 A..Li.....4.L...
fffff806663d6660 10 0a *31 00 33 d2 4b 63 84 01 *23 00 00 00 83 f8 ..1.3.Kc..#.....
fffff806663d6670 ff 7e *fb 48 69 c8 88 00 00 00 *a4 03 8a 90 0a 00 .~.Hi...........
...
fffff806663d66c0 cc cc eb cc 48 8b c4 48 89 58 *32 48 89 68 10 48 ....H..H.X2H.h.H
fffff806663d66d0 89 70 *06 48 89 78 20 41 56 48 *00 ec 40 41 8b c1 .p.H.x AVH..@A..
fffff806663d66e0 48 8b *66 45 8b d0 4c 8b f1 4c *85 c0 d8 00 00 00 H.fE..L..L......
fffff806663d66f0 4a 8b *ab d2 10 0a 00 00 4a 63 *fc 00 ac 00 00 00 J.......Jc......
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: STRIDE
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_STRIDE
BUCKET_ID: MEMORY_CORRUPTION_STRIDE
PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_STRIDE
TARGET_TIME: 2020-01-25T11:58:16.000Z
OSBUILD: 18362
OSSERVICEPACK: 592
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1972-08-22 03:24:00
BUILDDATESTAMP_STR: 160101.0800
BUILDLAB_STR: WinBuild
BUILDOSVER_STR: 10.0.18362.592
ANALYSIS_SESSION_ELAPSED_TIME: 278a
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:memory_corruption_stride
FAILURE_ID_HASH: {574dbc1b-92cb-fb09-cb7a-cacc1bb2c511}
Followup: memory_corruption
---------
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff806663d6648, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for nvlddmkm.sys
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 10.0.18362.592 (WinBuild.160101.0800)
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
DUMP_TYPE: 2
BUGCHECK_P1: 0
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff806663d6648
READ_ADDRESS: fffff806623733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
0000000000000000
CURRENT_IRQL: 2
FAULTING_IP:
dxgmms2!VidSchiCheckPlaneIndependentFlipCondition+0
fffff806`663d6648 4c8b2a mov r13,qword ptr [rdx]
CPU_COUNT: 8
CPU_MHZ: af0
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 1e
CPU_STEPPING: 5
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
BUGCHECK_STR: AV
PROCESS_NAME: System
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 01-27-2020 20:40:07.0371
ANALYSIS_VERSION: 10.0.18362.1 x86fre
TRAP_FRAME: fffff80664c67070 -- (.trap 0xfffff80664c67070)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffdd8b24a4d000 rbx=0000000000000000 rcx=ffffdd8b24a1f000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff806663d6648 rsp=fffff80664c67208 rbp=ffffdd8b2a2d53a0
r8=0000000000000000 r9=ffffdd8b2ab9b050 r10=00000000000041b0
r11=00000000000041b0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
dxgmms2!VidSchiCheckPlaneIndependentFlipCondition:
fffff806`663d6648 4c8b2a mov r13,qword ptr [rdx] ds:00000000`00000000=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80661fd32e9 to fffff80661fc14e0
STACK_TEXT:
fffff806`64c66f28 fffff806`61fd32e9 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff806`64c66f30 fffff806`61fcf62b : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff806`64c67070 fffff806`663d6648 : fffff806`663d2f8b fffff806`64c67280 00000000`00000008 ffffe929`211b062c : nt!KiPageFault+0x46b
fffff806`64c67208 fffff806`663d2f8b : fffff806`64c67280 00000000`00000008 ffffe929`211b062c 00000000`00000000 : dxgmms2!VidSchiCheckPlaneIndependentFlipCondition
fffff806`64c67210 fffff806`663d2be0 : fffff806`64c673b0 00000000`00000000 00000000`00000000 ffffdd8b`24abc000 : dxgmms2!VidSchiProcessPresentHistoryToken+0x20b
fffff806`64c672d0 fffff806`663c7cad : 00000000`00000000 fffff806`00000000 fffff806`64c67460 00000000`00000001 : dxgmms2!VidSchiSubmitPresentHistoryToken+0xb0
fffff806`64c67360 fffff806`663c70fe : ffffdd8b`24abf202 ffffdd8b`00000001 ffffdd8b`00000000 ffffdd8b`00000000 : dxgmms2!VidSchiProcessCompletedQueuePacketInternal+0x7ed
fffff806`64c67510 fffff806`663c479b : ffffdd8b`24abf202 00000000`00000001 fffff806`64c67769 00000000`00000000 : dxgmms2!VidSchiProcessDpcCompletedPacket+0x6ee
fffff806`64c67670 fffff806`654f4711 : fffff806`64c67769 ffffdd8b`24a1f000 ffffdd8b`2294a6e8 00000000`00000000 : dxgmms2!VidSchDdiNotifyDpc+0x22b
fffff806`64c67720 fffff806`68787cb4 : ffffdd8b`2294a030 00000000`00000000 ffffdd8b`2294a030 ffffdd8b`22a81000 : dxgkrnl!DxgNotifyDpcCB+0x91
fffff806`64c677d0 ffffdd8b`2294a030 : 00000000`00000000 ffffdd8b`2294a030 ffffdd8b`22a81000 fffff806`68787c47 : nvlddmkm+0xa7cb4
fffff806`64c677d8 00000000`00000000 : ffffdd8b`2294a030 ffffdd8b`22a81000 fffff806`68787c47 ffffdd8b`22a81000 : 0xffffdd8b`2294a030
CHKIMG_EXTENSION: !chkimg -lo 50 -db !dxgmms2
15 errors : !dxgmms2 (fffff806663d6642-fffff806663d66fa)
fffff806663d6640 cc cc *7a cc cc cc cc cc 4c 8b *2a 83 fa ff 74 4b ..z.....L.*...tK
fffff806663d6650 41 8b *fe 4c 69 c0 d8 00 00 00 *34 d2 4c 8b 8c d1 A..Li.....4.L...
fffff806663d6660 10 0a *31 00 33 d2 4b 63 84 01 *23 00 00 00 83 f8 ..1.3.Kc..#.....
fffff806663d6670 ff 7e *fb 48 69 c8 88 00 00 00 *a4 03 8a 90 0a 00 .~.Hi...........
...
fffff806663d66c0 cc cc eb cc 48 8b c4 48 89 58 *32 48 89 68 10 48 ....H..H.X2H.h.H
fffff806663d66d0 89 70 *06 48 89 78 20 41 56 48 *00 ec 40 41 8b c1 .p.H.x AVH..@A..
fffff806663d66e0 48 8b *66 45 8b d0 4c 8b f1 4c *85 c0 d8 00 00 00 H.fE..L..L......
fffff806663d66f0 4a 8b *ab d2 10 0a 00 00 4a 63 *fc 00 ac 00 00 00 J.......Jc......
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: STRIDE
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_STRIDE
BUCKET_ID: MEMORY_CORRUPTION_STRIDE
PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_STRIDE
TARGET_TIME: 2020-01-25T11:58:16.000Z
OSBUILD: 18362
OSSERVICEPACK: 592
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1972-08-22 03:24:00
BUILDDATESTAMP_STR: 160101.0800
BUILDLAB_STR: WinBuild
BUILDOSVER_STR: 10.0.18362.592
ANALYSIS_SESSION_ELAPSED_TIME: 278a
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:memory_corruption_stride
FAILURE_ID_HASH: {574dbc1b-92cb-fb09-cb7a-cacc1bb2c511}
Followup: memory_corruption
---------
UNEXPECTED_KERNEL_MODE_TRAP_M (1000007f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault). The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
use .trap on that value
Else
.trap on the appropriate frame will show where the trap was taken
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: ffffbd01b56d0090
Arg3: fffffe8323934eb0
Arg4: fffff802231cf1d0
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 10.0.18362.592 (WinBuild.160101.0800)
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
DUMP_TYPE: 2
BUGCHECK_P1: 8
BUGCHECK_P2: ffffbd01b56d0090
BUGCHECK_P3: fffffe8323934eb0
BUGCHECK_P4: fffff802231cf1d0
BUGCHECK_STR: 0x7f_8
STACK_OVERFLOW: Stack Limit: fffffe8323935000. Use (kF) and (!stackusage) to investigate stack usage.
STACKUSAGE_FUNCTION: The function at address 0xfffff8022307302a was blamed for the stack overflow. It is using 11232 bytes of stack total in 27 instances (likely recursion).
FOLLOWUP_IP:
nt!MmAccessFault+48a
fffff802`2307302a e987feffff jmp nt!MmAccessFault+0x316 (fffff802`23072eb6)
CPU_COUNT: 8
CPU_MHZ: af0
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 1e
CPU_STEPPING: 5
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: Steam.exe
CURRENT_IRQL: 2
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 01-27-2020 20:40:12.0094
ANALYSIS_VERSION: 10.0.18362.1 x86fre
STACK_TEXT:
fffffe83`23934eb0 fffff802`231205b3 : ffffffff`8b485043 fffff802`2307302a 00730073`00650072 00000073`0072006f : nt!KiPageFault+0x10
fffffe83`23935040 fffff802`2307302a : 00730073`00650072 00000073`0072006f 76697244`0000000f 00000000`00000000 : nt!MiRaisedIrqlFault+0x13
fffffe83`23935050 fffff802`231cf520 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x48a
fffffe83`239351f0 fffff802`231205b3 : ffffffff`8b485043 fffff802`2307302a ff000000`ff000000 7c000000`00ffffff : nt!KiPageFault+0x360
fffffe83`23935380 fffff802`2307302a : ff000000`ff000000 7c000000`00ffffff 00007fff`001f03e0 00000000`00000000 : nt!MiRaisedIrqlFault+0x13
fffffe83`23935390 fffff802`231cf520 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x48a
fffffe83`23935530 fffff802`231205b3 : ffffffff`8b485043 fffff802`2307302a 00000000`00000000 00000000`00000002 : nt!KiPageFault+0x360
fffffe83`239356c0 fffff802`2307302a : 00000000`00000000 00000000`00000002 00000000`00000000 00000000`00000000 : nt!MiRaisedIrqlFault+0x13
fffffe83`239356d0 fffff802`231cf520 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x48a
fffffe83`23935870 fffff802`231205b3 : ffffffff`8b485043 fffff802`2307302a 00000000`00000000 00000000`00000002 : nt!KiPageFault+0x360
fffffe83`23935a00 fffff802`2307302a : 00000000`00000000 00000000`00000002 00000000`00000000 00000000`00000000 : nt!MiRaisedIrqlFault+0x13
fffffe83`23935a10 fffff802`231cf520 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x48a
fffffe83`23935bb0 fffff802`231205b3 : ffffffff`8b485043 fffff802`2307302a 00000000`00000000 00000000`00000002 : nt!KiPageFault+0x360
fffffe83`23935d40 fffff802`2307302a : 00000000`00000000 00000000`00000002 00000000`00000000 00000000`00000000 : nt!MiRaisedIrqlFault+0x13
fffffe83`23935d50 fffff802`231cf520 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x48a
fffffe83`23935ef0 fffff802`231205b3 : ffffffff`8b485043 fffff802`2307302a 00000000`00000000 00000000`00000002 : nt!KiPageFault+0x360
fffffe83`23936080 fffff802`2307302a : 00000000`00000000 00000000`00000002 00000000`00000000 00000000`00000000 : nt!MiRaisedIrqlFault+0x13
fffffe83`23936090 fffff802`231cf520 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x48a
fffffe83`23936230 fffff802`231205b3 : ffffffff`8b485043 fffff802`2307302a 00000000`00000000 00000000`00000002 : nt!KiPageFault+0x360
fffffe83`239363c0 fffff802`2307302a : 00000000`00000000 00000000`00000002 00000000`00000000 00000000`00000000 : nt!MiRaisedIrqlFault+0x13
fffffe83`239363d0 fffff802`231cf520 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x48a
fffffe83`23936570 fffff802`231205b3 : ffffffff`8b485043 fffff802`2307302a 00000000`00000000 00000000`00000002 : nt!KiPageFault+0x360
fffffe83`23936700 fffff802`2307302a : 00000000`00000000 00000000`00000002 00000000`00000000 00000000`00000000 : nt!MiRaisedIrqlFault+0x13
fffffe83`23936710 fffff802`231cf520 : 0232008f`02320080 02360021`02360007 023200a4`0236003e 023200be`023200a8 : nt!MmAccessFault+0x48a
fffffe83`239368b0 fffff802`231205b3 : ffffffff`8b485043 fffff802`2307302a 02d83f9c`02d83ed6 02d84109`02d83fb7 : nt!KiPageFault+0x360
fffffe83`23936a40 fffff802`2307302a : 02d83f9c`02d83ed6 02d84109`02d83fb7 02d84128`02d84111 00000000`00000000 : nt!MiRaisedIrqlFault+0x13
fffffe83`23936a50 fffff802`231cf520 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x48a
fffffe83`23936bf0 fffff802`231205b3 : ffffffff`8b485043 fffff802`2307302a 00000000`00000000 00000000`00000002 : nt!KiPageFault+0x360
fffffe83`23936d80 fffff802`2307302a : 00000000`00000000 00000000`00000002 00000000`00000000 00000000`00000000 : nt!MiRaisedIrqlFault+0x13
fffffe83`23936d90 fffff802`231cf520 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x48a
fffffe83`23936f30 fffff802`231205b3 : ffffffff`8b485043 fffff802`2307302a 00000000`000a11b0 00000000`0000a4da : nt!KiPageFault+0x360
fffffe83`239370c0 fffff802`2307302a : 00000000`000a11b0 00000000`0000a4da 00000000`00009350 00000000`00000000 : nt!MiRaisedIrqlFault+0x13
fffffe83`239370d0 fffff802`231cf520 : 00000000`00000000 00000000`00000000 01d5d125`e2e58ec0 00000000`00007263 : nt!MmAccessFault+0x48a
fffffe83`23937270 fffff802`231205b3 : ffffffff`8b485043 fffff802`2307302a 01d5d125`ff4ab96c 00000000`00007e4e : nt!KiPageFault+0x360
fffffe83`23937400 fffff802`2307302a : 01d5d125`ff4ab96c 00000000`00007e4e 00007ff9`01e0ceb0 00000000`00000000 : nt!MiRaisedIrqlFault+0x13
fffffe83`23937410 fffff802`231cf520 : 00007ff9`01e0ceb0 00000000`00000054 00000000`00000958 00000001`00000002 : nt!MmAccessFault+0x48a
fffffe83`239375b0 fffff802`231205b3 : ffffffff`8b485043 fffff802`2307302a 00000000`00001e4c 00000008`0000000b : nt!KiPageFault+0x360
fffffe83`23937740 fffff802`2307302a : 00000000`00001e4c 00000008`0000000b 00000005`00000039 00000000`00000000 : nt!MiRaisedIrqlFault+0x13
fffffe83`23937750 fffff802`231cf520 : 00000065`00780065 00000004`000003d8 00000000`00132000 00000007`00000000 : nt!MmAccessFault+0x48a
fffffe83`239378f0 fffff802`231205b3 : ffffffff`8b485043 fffff802`2307302a 00000000`00000006 00000000`00000002 : nt!KiPageFault+0x360
fffffe83`23937a80 fffff802`2307302a : 00000000`00000006 00000000`00000002 00000000`00000000 00000000`00000000 : nt!MiRaisedIrqlFault+0x13
fffffe83`23937a90 fffff802`231cf520 : 00000000`00000000 00000000`007b4743 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x48a
fffffe83`23937c30 fffff802`231205b3 : ffffffff`8b485043 fffff802`2307302a 00000000`00000000 00000000`0269810e : nt!KiPageFault+0x360
fffffe83`23937dc0 fffff802`2307302a : 00000000`00000000 00000000`0269810e 01d5d125`dd03e0a6 00000000`00000000 : nt!MiRaisedIrqlFault+0x13
fffffe83`23937dd0 fffff802`231cf520 : 00000000`00000000 00000000`00000002 00000000`00000030 00000000`00000001 : nt!MmAccessFault+0x48a
fffffe83`23937f70 fffff802`231205b3 : ffffffff`8b485043 fffff802`2307302a ffff990f`611fa250 fffffe83`239382e2 : nt!KiPageFault+0x360
fffffe83`23938100 fffff802`2307302a : ffff990f`611fa250 fffffe83`239382e2 ffff990f`5b0f9490 00000000`00000000 : nt!MiRaisedIrqlFault+0x13
fffffe83`23938110 fffff802`231cf520 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x48a
fffffe83`239382b0 fffff802`231205b3 : ffffffff`8b485043 fffff802`2307302a 00000000`7fff32ff 00000000`0000a102 : nt!KiPageFault+0x360
fffffe83`23938440 fffff802`2307302a : 00000000`7fff32ff 00000000`0000a102 00000000`00005a60 00000000`00000000 : nt!MiRaisedIrqlFault+0x13
fffffe83`23938450 fffff802`231cf520 : ffff346f`ea68c4f9 fffff802`2ca39ec7 00000000`0000065e ffffe587`8c1d9030 : nt!MmAccessFault+0x48a
fffffe83`239385f0 fffff802`231205b3 : ffffffff`8b485043 fffff802`2307302a 00000000`00000000 fffff802`23076ec3 : nt!KiPageFault+0x360
fffffe83`23938780 fffff802`2307302a : 00000000`00000000 fffff802`23076ec3 00000000`00000000 00000000`00000000 : nt!MiRaisedIrqlFault+0x13
fffffe83`23938790 fffff802`231cf520 : 00000000`00000000 00000000`00000000 00000000`00009300 00000000`00008100 : nt!MmAccessFault+0x48a
fffffe83`23938930 fffff802`231205b3 : ffffffff`8b485043 fffff802`2307302a 00000000`2268c400 ffffe587`7a1208ea : nt!KiPageFault+0x360
fffffe83`23938ac0 fffff802`2307302a : 00000000`2268c400 ffffe587`7a1208ea 00000000`00000300 00000000`00000000 : nt!MiRaisedIrqlFault+0x13
fffffe83`23938ad0 fffff802`231cf520 : ffffcf01`b194a430 ffffcf01`b1940298 ffffcf01`b1942a00 ffffcf01`b1942a68 : nt!MmAccessFault+0x48a
fffffe83`23938c70 fffff802`231205b3 : ffffffff`8b485043 fffff802`2307302a ffff990f`5fcb0400 fffff802`23039ddf : nt!KiPageFault+0x360
fffffe83`23938e00 fffff802`2307302a : ffff990f`5fcb0400 fffff802`23039ddf ffff990f`5fcb0080 00000000`00000000 : nt!MiRaisedIrqlFault+0x13
fffffe83`23938e10 fffff802`231cf520 : fffff802`23000000 fffff802`23033966 ffffffff`ffffc7ff fffffe83`2393fec0 : nt!MmAccessFault+0x48a
fffffe83`23938fb0 fffff802`231205b3 : ffffffff`8b485043 fffff802`2307302a fffffe83`23933af0 ffff990f`00006702 : nt!KiPageFault+0x360
fffffe83`23939140 fffff802`2307302a : fffffe83`23933af0 ffff990f`00006702 fffff802`284ad930 00000000`00000000 : nt!MiRaisedIrqlFault+0x13
fffffe83`23939150 fffff802`231cf520 : 00000000`00002b00 00000000`0000a600 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x48a
fffffe83`239392f0 fffff802`231205b3 : ffffffff`8b485043 fffff802`2307302a 00000000`00000103 00000000`00000002 : nt!KiPageFault+0x360
fffffe83`23939480 fffff802`2307302a : 00000000`00000103 00000000`00000002 00000000`00000000 00000000`00000000 : nt!MiRaisedIrqlFault+0x13
fffffe83`23939490 fffff802`231cf520 : 00000000`00000063 00000000`00000000 00000000`00003900 ffff990f`627efe50 : nt!MmAccessFault+0x48a
fffffe83`23939630 fffff802`231205b3 : ffffffff`8b485043 fffff802`2307302a ffffbd01`b5b52180 ffff990f`627e7eb2 : nt!KiPageFault+0x360
fffffe83`239397c0 fffff802`2307302a : ffffbd01`b5b52180 ffff990f`627e7eb2 ffff990f`5bff6bb0 00000000`00000000 : nt!MiRaisedIrqlFault+0x13
fffffe83`239397d0 fffff802`231cf520 : ffffe587`82045470 00000000`00002100 00000000`00000000 fffff802`230476a7 : nt!MmAccessFault+0x48a
fffffe83`23939970 fffff802`231205b3 : ffffffff`8b485043 fffff802`2307302a fffffe83`23939c80 ffff990f`627e23b2 : nt!KiPageFault+0x360
fffffe83`23939b00 fffff802`2307302a : fffffe83`23939c80 ffff990f`627e23b2 00000000`00000000 00000000`00000000 : nt!MiRaisedIrqlFault+0x13
fffffe83`23939b10 fffff802`231cf520 : 00000000`00000000 00000000`00000000 00000000`0000f900 00000000`00008200 : nt!MmAccessFault+0x48a
fffffe83`23939cb0 fffff802`231205b3 : ffffffff`8b485043 fffff802`2307302a fffffe83`23939148 00000000`00004102 : nt!KiPageFault+0x360
fffffe83`23939e40 fffff802`2307302a : fffffe83`23939148 00000000`00004102 00000000`00003a00 00000000`00000000 : nt!MiRaisedIrqlFault+0x13
fffffe83`23939e50 fffff802`231cf520 : fffffe83`23936723 ffffe587`8b14f9f0 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x48a
fffffe83`23939ff0 fffff802`231205b3 : ffffffff`8b485041 fffff802`2307302a ffff990f`5d38f180 ffff990f`45670042 : nt!KiPageFault+0x360
fffffe83`2393a180 fffff802`2307302a : ffff990f`5d38f180 ffff990f`45670042 ffffbd01`b5779180 00000000`00000000 : nt!MiRaisedIrqlFault+0x13
fffffe83`2393a190 fffff802`231cf520 : ffff990f`62f0d300 00000000`00000000 00000000`00000000 fffff802`2303c7e2 : nt!MmAccessFault+0x48a
fffffe83`2393a330 fffff802`231205b3 : 00000000`0007a16a fffff802`2307302a ffffbd01`00000001 fffff802`231c8600 : nt!KiPageFault+0x360
fffffe83`2393a4c0 fffff802`2307302a : ffffbd01`00000001 fffff802`231c8600 fffffe83`2393aae8 00000000`00000000 : nt!MiRaisedIrqlFault+0x13
fffffe83`2393a4d0 fffff802`231cf520 : 00000000`00000000 fffff802`231c8266 00000000`00000000 fffff802`231c8266 : nt!MmAccessFault+0x48a
fffffe83`2393a670 fffff802`231f88b9 : 00000000`00000000 ffffbd01`b56c5180 ffff990f`5fcb0180 ffff990f`62f0d318 : nt!KiPageFault+0x360
fffffe83`2393a808 fffff802`23066deb : ffff990f`61c07ee0 ffff990f`62f0d318 fffffe83`2393a9a0 fffffe83`2393a8e0 : nt!KiEndThreadAccountingPeriod+0x1bb079
fffffe83`2393a838 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeQueryTotalCycleTimeThread+0xab
THREAD_SHA1_HASH_MOD_FUNC: 0351e299cdc631c9ef2cbc4fce20f7b554e46582
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: bd625363018a01597fdf2ae6e7691cd70057362f
THREAD_SHA1_HASH_MOD: 3296cc15dd6f9cc02a0ad70bd11da7cff9870c28
FAULT_INSTR_CODE: fffe87e9
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!MmAccessFault+48a
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4f6eba0
IMAGE_VERSION: 10.0.18362.592
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: memory_corruption
BUCKET_ID_FUNC_OFFSET: 48a
FAILURE_BUCKET_ID: 0x7f_8_STACK_USAGE_RECURSION_nt!MmAccessFault
BUCKET_ID: 0x7f_8_STACK_USAGE_RECURSION_nt!MmAccessFault
PRIMARY_PROBLEM_CLASS: 0x7f_8_STACK_USAGE_RECURSION_nt!MmAccessFault
TARGET_TIME: 2020-01-22T13:28:44.000Z
OSBUILD: 18362
OSSERVICEPACK: 592
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1972-08-22 03:24:00
BUILDDATESTAMP_STR: 160101.0800
BUILDLAB_STR: WinBuild
BUILDOSVER_STR: 10.0.18362.592
ANALYSIS_SESSION_ELAPSED_TIME: aff
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x7f_8_stack_usage_recursion_nt!mmaccessfault
FAILURE_ID_HASH: {ae883bd8-30fa-b8f3-6602-f152e27c292f}
Followup: MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffffff8148550a, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff804707cd680, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 10.0.18362.592 (WinBuild.160101.0800)
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
DUMP_TYPE: 2
BUGCHECK_P1: ffffffff8148550a
BUGCHECK_P2: ff
BUGCHECK_P3: 0
BUGCHECK_P4: fffff804707cd680
READ_ADDRESS: fffff80470b733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
ffffffff8148550a
CURRENT_IRQL: 2
FAULTING_IP:
nt!KiInvalidOpcodeFault+0
fffff804`707cd680 4883b508554881ec xor qword ptr [rbp-7EB7AAF8h],0FFFFFFFFFFFFFFECh
CPU_COUNT: 8
CPU_MHZ: af0
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 1e
CPU_STEPPING: 5
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
BUGCHECK_STR: AV
PROCESS_NAME: explorer.exe
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 01-27-2020 20:40:17.0058
ANALYSIS_VERSION: 10.0.18362.1 x86fre
TRAP_FRAME: ffffa08a83e0f6f0 -- (.trap 0xffffa08a83e0f6f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffb3dc55ec2dbe rbx=0000000000000000 rcx=ffffa08a83e0f910
rdx=ffffb98000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8047060cd9e rsp=ffffa08a83e0f888 rbp=0000000000000000
r8=0000007ffffffff8 r9=0000000000000000 r10=fffff80470638650
r11=ffffa08a83e0fb10 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!MiSystemFault+0x2e:
fffff804`7060cd9e 48894527 mov qword ptr [rbp+27h],rax ss:0018:00000000`00000027=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff804707d32e9 to fffff804707c14e0
STACK_TEXT:
ffffa08a`83e0f0a8 fffff804`707d32e9 : 00000000`0000000a ffffffff`8148550a 00000000`000000ff 00000000`00000000 : nt!KeBugCheckEx
ffffa08a`83e0f0b0 fffff804`707cf62b : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffa08a`83e0f1f0 fffff804`707cd680 : fffff804`70674048 00000000`00000010 00000000`00010202 ffffa08a`83e0f3b0 : nt!KiPageFault+0x46b
ffffa08a`83e0f388 fffff804`70674048 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInvalidOpcodeFault
ffffa08a`83e0f3b0 fffff804`70673cc4 : 0000007f`fffffff8 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiLockPageTableInternal+0xd8
ffffa08a`83e0f420 fffff804`7067340b : ffffcc0f`fd522580 ffffb980`00000000 00000000`00000002 ffffb9dc`c0000000 : nt!MiFastLockLeafPageTable+0x164
ffffa08a`83e0f4a0 fffff804`70672cee : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiUserFault+0x22b
ffffa08a`83e0f550 fffff804`707cf520 : 00000000`00000000 00000000`00000000 ffff8000`00000000 00000000`00000000 : nt!MmAccessFault+0x14e
ffffa08a`83e0f6f0 fffff804`7060cd9e : 00000000`00000000 ffffcc0f`fd6f03a0 fffff804`70639c1d ffffcc0f`fd6f0080 : nt!KiPageFault+0x360
ffffa08a`83e0f888 00000000`00000000 : 00000000`00000000 00000000`00000000 ffffa08a`83e0fb00 ffffb3dc`55ec2d66 : nt!MiSystemFault+0x2e
CHKIMG_EXTENSION: !chkimg -lo 50 -db !nt
16 errors : !nt (fffff804707cd682-fffff804707cd73a)
fffff804707cd680 48 83 *b5 08 55 48 81 ec 58 01 *84 00 48 8d ac 24 H...UH..X...H..$
fffff804707cd690 80 00 *cf 00 c6 45 ab 01 48 89 *29 b0 48 89 4d b8 .....E..H.).H.M.
fffff804707cd6a0 48 89 *18 c0 4c 89 45 c8 4c 89 *cd d0 4c 89 55 d8 H...L.E.L...L.U.
fffff804707cd6b0 4c 89 *c8 e0 f6 85 f0 00 00 00 *e5 75 2d 0f ae e8 L..........u-...
...
fffff804707cd700 00 00 *3d 48 8b 0c 25 88 01 00 *1d 48 8b 89 20 02 ..=H..%....H.. .
fffff804707cd710 00 00 *83 8b 89 60 08 00 00 65 *46 89 0c 25 70 02 .....`...eF..%p.
fffff804707cd720 00 00 *2a 8a 0c 25 50 08 00 00 *b3 88 0c 25 51 08 ..*..%P......%Q.
fffff804707cd730 00 00 *aa 8a 0c 25 78 02 00 00 *20 88 0c 25 52 08 .....%x... ..%R.
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: STRIDE
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_STRIDE
BUCKET_ID: MEMORY_CORRUPTION_STRIDE
PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_STRIDE
TARGET_TIME: 2020-01-21T07:26:44.000Z
OSBUILD: 18362
OSSERVICEPACK: 592
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1972-08-22 03:24:00
BUILDDATESTAMP_STR: 160101.0800
BUILDLAB_STR: WinBuild
BUILDOSVER_STR: 10.0.18362.592
ANALYSIS_SESSION_ELAPSED_TIME: 2769
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:memory_corruption_stride
FAILURE_ID_HASH: {574dbc1b-92cb-fb09-cb7a-cacc1bb2c511}
Followup: memory_corruption
---------
UNEXPECTED_KERNEL_MODE_TRAP_M (1000007f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault). The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
use .trap on that value
Else
.trap on the appropriate frame will show where the trap was taken
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: ffffcb8174e2b090
Arg3: ffffc581b53c0f60
Arg4: fffff80639bcf1d0
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 10.0.18362.592 (WinBuild.160101.0800)
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
DUMP_TYPE: 2
BUGCHECK_P1: 8
BUGCHECK_P2: ffffcb8174e2b090
BUGCHECK_P3: ffffc581b53c0f60
BUGCHECK_P4: fffff80639bcf1d0
BUGCHECK_STR: 0x7f_8
STACK_OVERFLOW: Stack Limit: ffffc581b53c1000. Use (kF) and (!stackusage) to investigate stack usage.
STACKUSAGE_FUNCTION: The function at address 0xfffff80639a7302a was blamed for the stack overflow. It is using 9984 bytes of stack total in 24 instances (likely recursion).
FOLLOWUP_IP:
nt!MmAccessFault+48a
fffff806`39a7302a e987feffff jmp nt!MmAccessFault+0x316 (fffff806`39a72eb6)
CPU_COUNT: 8
CPU_MHZ: af0
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 1e
CPU_STEPPING: 5
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: Blitz.exe
CURRENT_IRQL: 2
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 01-27-2020 20:40:21.0607
ANALYSIS_VERSION: 10.0.18362.1 x86fre
STACK_TEXT:
ffffc581`b53c0f60 fffff806`39b205db : 00000000`00000000 00000000`000001d3 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x10
ffffc581`b53c10f0 fffff806`39a7302a : 00000000`002caea7 00000000`00000000 ffffc581`b53c1230 00000000`00000000 : nt!MiRaisedIrqlFault+0x3b
ffffc581`b53c1130 fffff806`39bcf520 : 00000000`07488000 00000000`000011e5 00000000`01058000 00000000`01019000 : nt!MmAccessFault+0x48a
ffffc581`b53c12d0 fffff806`39b205db : 00000000`000054cc 00007fff`10e4ceb0 00000000`00000ed0 00000000`0000166c : nt!KiPageFault+0x360
ffffc581`b53c1460 fffff806`39a7302a : 00000000`00000000 00000000`00000000 ffffc581`b53c15a0 00000000`00000000 : nt!MiRaisedIrqlFault+0x3b
ffffc581`b53c14a0 fffff806`39bcf520 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x48a
ffffc581`b53c1640 fffff806`39b205db : 00000000`00004468 00000000`00003dd0 00000000`001d5000 00000000`00268000 : nt!KiPageFault+0x360
ffffc581`b53c17d0 fffff806`39a7302a : 00000000`00000000 00000000`00000000 ffffc581`b53c1910 00000000`00000000 : nt!MiRaisedIrqlFault+0x3b
ffffc581`b53c1810 fffff806`39bcf520 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x48a
ffffc581`b53c19b0 fffff806`39b205db : 00000000`0000b49b 00000000`02560000 00000000`02206000 00000000`00047730 : nt!KiPageFault+0x360
ffffc581`b53c1b40 fffff806`39a7302a : 00000000`00e36000 00000000`00000000 ffffc581`b53c1c80 00000000`00000000 : nt!MiRaisedIrqlFault+0x3b
ffffc581`b53c1b80 fffff806`39bcf520 : 00007fff`10e4ceb0 00000000`00000ee4 00000000`000016ac 00000008`00000008 : nt!MmAccessFault+0x48a
ffffc581`b53c1d20 fffff806`39b205db : 00007fff`10e4ceb0 00000000`00000ee4 00000000`000016c8 00000008`00000008 : nt!KiPageFault+0x360
ffffc581`b53c1eb0 fffff806`39a7302a : 01d5cdd5`416ce774 00000000`00000000 ffffc581`b53c1ff0 00000000`00000000 : nt!MiRaisedIrqlFault+0x3b
ffffc581`b53c1ef0 fffff806`39bcf520 : 00000000`000013c0 00000008`00000008 00000005`000000a3 00000000`0000000f : nt!MmAccessFault+0x48a
ffffc581`b53c2090 fffff806`39b205db : 00000000`00001538 00000008`00000009 00000005`00000002 00000000`00000006 : nt!KiPageFault+0x360
ffffc581`b53c2220 fffff806`39a7302a : 00007fff`10e4ceb0 00000000`00000000 ffffc581`b53c2360 00000000`00000000 : nt!MiRaisedIrqlFault+0x3b
ffffc581`b53c2260 fffff806`39bcf520 : 00000000`00001808 00000008`00000008 00000005`00000001 00000000`00000006 : nt!MmAccessFault+0x48a
ffffc581`b53c2400 fffff806`39b205db : 00000000`00069464 00000000`0000891c 00000000`00000000 00000000`0000f805 : nt!KiPageFault+0x360
ffffc581`b53c2590 fffff806`39a7302a : 00000000`00000000 00000000`00000000 ffffc581`b53c26d0 00000000`00000000 : nt!MiRaisedIrqlFault+0x3b
ffffc581`b53c25d0 fffff806`39bcf520 : 00000000`00384000 00000000`0036e000 00000000`0000000a 00000000`000000c0 : nt!MmAccessFault+0x48a
ffffc581`b53c2770 fffff806`39b205db : 00000000`00000110 00000000`00000031 00000000`00000000 00000000`00000d40 : nt!KiPageFault+0x360
ffffc581`b53c2900 fffff806`39a7302a : 00000000`00000000 00000000`00000000 ffffc581`b53c2a40 00000000`00000000 : nt!MiRaisedIrqlFault+0x3b
ffffc581`b53c2940 fffff806`39bcf520 : 00000000`000000db 00000000`00000000 00000201`05ed7000 00000201`05b57000 : nt!MmAccessFault+0x48a
ffffc581`b53c2ae0 fffff806`39b205db : 00000000`00000000 00000000`00000000 01d5cdd5`3e2e4aff 00000000`00000a7e : nt!KiPageFault+0x360
ffffc581`b53c2c70 fffff806`39a7302a : 00000005`00000001 00000000`00000000 ffffc581`b53c2db0 00000000`00000000 : nt!MiRaisedIrqlFault+0x3b
ffffc581`b53c2cb0 fffff806`39bcf520 : 00000000`00000000 00000000`00000000 01d5cdd5`3e2e5c48 00000000`00000a7e : nt!MmAccessFault+0x48a
ffffc581`b53c2e50 fffff806`39b205db : 00000000`00000000 00000000`00000000 01d5cdd5`3f1e0b33 00000000`00000aeb : nt!KiPageFault+0x360
ffffc581`b53c2fe0 fffff806`39a7302a : 00000000`00000000 00000000`00000000 ffffc581`b53c3120 00000000`00000000 : nt!MiRaisedIrqlFault+0x3b
ffffc581`b53c3020 fffff806`39bcf520 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x48a
ffffc581`b53c31c0 fffff806`39b205db : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x360
ffffc581`b53c3350 fffff806`39a7302a : 00000000`00000000 00000000`00000000 ffffc581`b53c3490 00000000`00000000 : nt!MiRaisedIrqlFault+0x3b
ffffc581`b53c3390 fffff806`39bcf520 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x48a
ffffc581`b53c3530 fffff806`39b205db : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x360
ffffc581`b53c36c0 fffff806`39a7302a : 00000000`00000000 00000000`00000000 ffffc581`b53c3800 00000000`00000000 : nt!MiRaisedIrqlFault+0x3b
ffffc581`b53c3700 fffff806`39bcf520 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x48a
ffffc581`b53c38a0 fffff806`39b205db : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x360
ffffc581`b53c3a30 fffff806`39a7302a : 00000000`00000000 00000000`00000000 ffffc581`b53c3b70 00000000`00000000 : nt!MiRaisedIrqlFault+0x3b
ffffc581`b53c3a70 fffff806`39bcf520 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x48a
ffffc581`b53c3c10 fffff806`39b205db : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x360
ffffc581`b53c3da0 fffff806`39a7302a : 00000000`00000000 00000000`00000000 ffffc581`b53c3ee0 00000000`00000000 : nt!MiRaisedIrqlFault+0x3b
ffffc581`b53c3de0 fffff806`39bcf520 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x48a
ffffc581`b53c3f80 fffff806`39b205db : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x360
ffffc581`b53c4110 fffff806`39a7302a : 00000000`00000000 00000000`00000000 ffffc581`b53c4250 00000000`00000000 : nt!MiRaisedIrqlFault+0x3b
ffffc581`b53c4150 fffff806`39bcf520 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x48a
ffffc581`b53c42f0 fffff806`39b205db : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x360
ffffc581`b53c4480 fffff806`39a7302a : 00000000`00000000 00000000`00000000 ffffc581`b53c45c0 00000000`00000000 : nt!MiRaisedIrqlFault+0x3b
ffffc581`b53c44c0 fffff806`39bcf520 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x48a
ffffc581`b53c4660 fffff806`39b205db : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x360
ffffc581`b53c47f0 fffff806`39a7302a : 00000000`00000000 00000000`00000000 ffffc581`b53c4930 00000000`00000000 : nt!MiRaisedIrqlFault+0x3b
ffffc581`b53c4830 fffff806`39bcf520 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x48a
ffffc581`b53c49d0 fffff806`39b205db : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x360
ffffc581`b53c4b60 fffff806`39a7302a : 00000000`00000000 00000000`00000000 ffffc581`b53c4ca0 00000000`00000000 : nt!MiRaisedIrqlFault+0x3b
ffffc581`b53c4ba0 fffff806`39bcf520 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x48a
ffffc581`b53c4d40 fffff806`39b205db : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x360
ffffc581`b53c4ed0 fffff806`39a7302a : 00000000`00000000 00000000`00000000 ffffc581`b53c5010 00000000`00000000 : nt!MiRaisedIrqlFault+0x3b
ffffc581`b53c4f10 fffff806`39bcf520 : 00000000`00000004 081d7f74`7053d8a8 7053d8a8`00000000 05eba264`081d7f74 : nt!MmAccessFault+0x48a
ffffc581`b53c50b0 fffff806`39b205db : 00000000`00000201 ffffb40e`9b2ed4f0 ffffb40e`959ef1d0 00000000`00000000 : nt!KiPageFault+0x360
ffffc581`b53c5240 fffff806`39a7302a : 00000000`00000000 00000000`00000000 ffffc581`b53c5380 00000000`00000000 : nt!MiRaisedIrqlFault+0x3b
ffffc581`b53c5280 fffff806`39bcf520 : ffffc581`b53c5c50 fffff806`39ac6745 ffffc581`b53c5b30 ffffc581`b53c5bc0 : nt!MmAccessFault+0x48a
ffffc581`b53c5420 fffff806`39b205db : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x360
ffffc581`b53c55b0 fffff806`39a7302a : 00001f80`0010000f 00000000`00000000 ffffc581`b53c56f0 00000000`00000000 : nt!MiRaisedIrqlFault+0x3b
ffffc581`b53c55f0 fffff806`39bcf520 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x48a
ffffc581`b53c5790 fffff806`39b205db : ffff83cd`87992102 00000000`00000002 00000000`00000001 00000000`00000002 : nt!KiPageFault+0x360
ffffc581`b53c5920 fffff806`39a7302a : 00000000`00000000 00000000`00000000 ffffc581`b53c5a60 00000000`00000000 : nt!MiRaisedIrqlFault+0x3b
ffffc581`b53c5960 fffff806`39bcf520 : ffffc581`b53c6390 ffffc581`b53c5e00 ffff8683`201f1080 ffff8683`201f1080 : nt!MmAccessFault+0x48a
ffffc581`b53c5b00 fffff806`39b205db : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x360
ffffc581`b53c5c90 fffff806`39a7302a : 00000000`00000001 00000000`00000000 ffffc581`b53c5dd0 00000000`00000000 : nt!MiRaisedIrqlFault+0x3b
ffffc581`b53c5cd0 fffff806`39bcf520 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x48a
ffffc581`b53c5e70 fffff806`39b205db : 00008900`00000004 0000a700`00000000 ffffcb81`74e20180 fffff806`3995eb95 : nt!KiPageFault+0x360
ffffc581`b53c6000 fffff806`39a7302a : ffffc581`b53c6050 00000000`00000010 ffffc581`b53c6140 00000000`00000000 : nt!MiRaisedIrqlFault+0x3b
ffffc581`b53c6040 fffff806`39bcf520 : 00000000`00000000 ffffcb81`752b9180 ffff8683`1c6bf1f0 ffff8683`1c6bf080 : nt!MmAccessFault+0x48a
ffffc581`b53c61e0 fffff806`38dc3313 : ffff8683`202c0640 ffff8683`202c0080 00007600`00000001 0000cf00`00000008 : nt!KiPageFault+0x360
ffffc581`b53c6370 ffff8683`202c0640 : ffff8683`202c0080 00007600`00000001 0000cf00`00000008 0000cc00`00000001 : 0xfffff806`38dc3313
ffffc581`b53c6378 ffff8683`202c0080 : 00007600`00000001 0000cf00`00000008 0000cc00`00000001 00000400`00000001 : 0xffff8683`202c0640
ffffc581`b53c6380 00007600`00000001 : 0000cf00`00000008 0000cc00`00000001 00000400`00000001 0000bf00`00000000 : 0xffff8683`202c0080
ffffc581`b53c6388 0000cf00`00000008 : 0000cc00`00000001 00000400`00000001 0000bf00`00000000 ffffca06`39e68940 : 0x00007600`00000001
ffffc581`b53c6390 0000cc00`00000001 : 00000400`00000001 0000bf00`00000000 ffffca06`39e68940 00000000`00000000 : 0x0000cf00`00000008
ffffc581`b53c6398 00000400`00000001 : 0000bf00`00000000 ffffca06`39e68940 00000000`00000000 ffffc506`39a4be0f : 0x0000cc00`00000001
ffffc581`b53c63a0 0000bf00`00000000 : ffffca06`39e68940 00000000`00000000 ffffc506`39a4be0f ffffc465`c0bb7d40 : 0x00000400`00000001
ffffc581`b53c63a8 ffffca06`39e68940 : 00000000`00000000 ffffc506`39a4be0f ffffc465`c0bb7d40 ffffc581`b53c6440 : 0x0000bf00`00000000
ffffc581`b53c63b0 00000000`00000000 : ffffc506`39a4be0f ffffc465`c0bb7d40 ffffc581`b53c6440 ffff8683`00000000 : 0xffffca06`39e68940
THREAD_SHA1_HASH_MOD_FUNC: 626f5c68e118aa3120ae66c4d706ebe995db2d33
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: c3ac7318b1d789e5a2997c8fb27184f38f8b40d3
THREAD_SHA1_HASH_MOD: 3bc0232f5912a8bba20a84887ac7ea5799d8f951
FAULT_INSTR_CODE: fffe87e9
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!MmAccessFault+48a
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4f6eba0
IMAGE_VERSION: 10.0.18362.592
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: memory_corruption
BUCKET_ID_FUNC_OFFSET: 48a
FAILURE_BUCKET_ID: 0x7f_8_STACK_USAGE_RECURSION_nt!MmAccessFault
BUCKET_ID: 0x7f_8_STACK_USAGE_RECURSION_nt!MmAccessFault
PRIMARY_PROBLEM_CLASS: 0x7f_8_STACK_USAGE_RECURSION_nt!MmAccessFault
TARGET_TIME: 2020-01-18T08:20:50.000Z
OSBUILD: 18362
OSSERVICEPACK: 592
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1972-08-22 03:24:00
BUILDDATESTAMP_STR: 160101.0800
BUILDLAB_STR: WinBuild
BUILDOSVER_STR: 10.0.18362.592
ANALYSIS_SESSION_ELAPSED_TIME: b1e
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x7f_8_stack_usage_recursion_nt!mmaccessfault
FAILURE_ID_HASH: {ae883bd8-30fa-b8f3-6602-f152e27c292f}
Followup: MachineOwner
---------
UNEXPECTED_KERNEL_MODE_TRAP_M (1000007f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault). The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
use .trap on that value
Else
.trap on the appropriate frame will show where the trap was taken
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: ffffb4006d8d0090
Arg3: ffff940614437868
Arg4: fffff8063cf6e4d0
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 10.0.18362.535 (WinBuild.160101.0800)
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
DUMP_TYPE: 2
BUGCHECK_P1: 8
BUGCHECK_P2: ffffb4006d8d0090
BUGCHECK_P3: ffff940614437868
BUGCHECK_P4: fffff8063cf6e4d0
BUGCHECK_STR: 0x7f_8
CPU_COUNT: 8
CPU_MHZ: af0
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 1e
CPU_STEPPING: 5
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 01-27-2020 20:40:25.0333
ANALYSIS_VERSION: 10.0.18362.1 x86fre
LAST_CONTROL_TRANSFER: from fffff80635c2356f to fffff8063cf6e4d0
STACK_TEXT:
ffff9406`14437868 fffff806`35c2356f : 00000000`0001122a 00000000`00000000 00000000`00000000 00000000`00000000 : 0xfffff806`3cf6e4d0
ffff9406`14437870 fffff806`35c21c90 : 00000000`00000000 ffff8200`103c5000 ffff8200`103c5000 00000000`000023e4 : nt!PpmUpdatePerformanceFeedback+0x14f
ffff9406`14437920 fffff806`35c215ce : 00000000`00000003 00000000`00000002 ffff8200`103c50f0 00000000`00000008 : nt!PpmIdleExecuteTransition+0x520
ffff9406`14437c40 fffff806`35dc4fe8 : ffffffff`00000000 ffffb400`6d8c5180 ffff820f`f98dc080 00000000`00000ae5 : nt!PoIdle+0x36e
ffff9406`14437da0 00000000`00000000 : ffff9406`14438000 ffff9406`14432000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x48
THREAD_SHA1_HASH_MOD_FUNC: 3ceadd556a6ef93e5c396419ca3a2be09c68efdc
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 31ab2587b5f3f8eb12ae28b8b6053eb6c2c0b52a
THREAD_SHA1_HASH_MOD: d084f7dfa548ce4e51810e4fd5914176ebc66791
FOLLOWUP_IP:
nt!PpmUpdatePerformanceFeedback+14f
fffff806`35c2356f 4d8b5610 mov r10,qword ptr [r14+10h]
FAULT_INSTR_CODE: 10568b4d
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!PpmUpdatePerformanceFeedback+14f
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 12dcb470
IMAGE_VERSION: 10.0.18362.535
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 14f
FAILURE_BUCKET_ID: 0x7f_8_nt!PpmUpdatePerformanceFeedback
BUCKET_ID: 0x7f_8_nt!PpmUpdatePerformanceFeedback
PRIMARY_PROBLEM_CLASS: 0x7f_8_nt!PpmUpdatePerformanceFeedback
TARGET_TIME: 2020-01-17T11:46:23.000Z
OSBUILD: 18362
OSSERVICEPACK: 535
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1980-01-11 18:53:20
BUILDDATESTAMP_STR: 160101.0800
BUILDLAB_STR: WinBuild
BUILDOSVER_STR: 10.0.18362.535
ANALYSIS_SESSION_ELAPSED_TIME: 93a
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x7f_8_nt!ppmupdateperformancefeedback
FAILURE_ID_HASH: {d6734c36-5ad6-325c-92e1-53a8a3810b69}
Followup: MachineOwner
---------