SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80678845d9d, Address of the instruction which caused the bugcheck
Arg3: fffff50b3aba25c0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 10.0.18362.535 (WinBuild.160101.0800)
SYSTEM_MANUFACTURER: System manufacturer
SYSTEM_PRODUCT_NAME: System Product Name
SYSTEM_SKU: SKU
SYSTEM_VERSION: System Version
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 5220
BIOS_DATE: 09/12/2019
BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
BASEBOARD_PRODUCT: PRIME X370-PRO
BASEBOARD_VERSION: Rev X.0x
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
DUMP_TYPE: 2
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff80678845d9d
BUGCHECK_P3: fffff50b3aba25c0
BUGCHECK_P4: 0
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
nt!ExFreeHeapPool+21d
fffff806`78845d9d 488b5328 mov rdx,qword ptr [rbx+28h]
CONTEXT: fffff50b3aba25c0 -- (.cxr 0xfffff50b3aba25c0)
rax=0000000000000ed0 rbx=d5ad2e1bd0963492 rcx=ffffc60dc00034f8
rdx=0000000000000020 rsi=ffffc63684a76320 rdi=ffffc63684a76310
rip=fffff80678845d9d rsp=fffff50b3aba2fb0 rbp=0000000079737355
r8=0000000000000030 r9=ffffc60dc0001000 r10=0000000000000020
r11=00000000000000ff r12=00000000000000a9 r13=0000000000000001
r14=0000000000000030 r15=000000000000002b
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246
nt!ExFreeHeapPool+0x21d:
fffff806`78845d9d 488b5328 mov rdx,qword ptr [rbx+28h] ds:002b:d5ad2e1b`d09634ba=????????????????
Resetting default scope
BUGCHECK_STR: 0x3B_c0000005
CPU_COUNT: 10
CPU_MHZ: bb2
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 1
CPU_STEPPING: 1
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: Discord.exe
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 01-28-2020 21:53:19.0574
ANALYSIS_VERSION: 10.0.18362.1 x86fre
LAST_CONTROL_TRANSFER: from fffff80678b6f0a9 to fffff80678845d9d
STACK_TEXT:
fffff50b`3aba2fb0 fffff806`78b6f0a9 : ffffc88a`8e6ab005 ffffc619`83dd4801 00000000`00000000 01000000`00100000 : nt!ExFreeHeapPool+0x21d
fffff50b`3aba30d0 ffffc619`83af06c2 : 00000000`00000000 ffffc636`8467c010 00000000`00000000 ffffa5fd`e6a00000 : nt!ExFreePool+0x9
fffff50b`3aba3100 ffffc619`83de806c : 00000000`00000000 ffffc636`84a76320 ffffc636`84a76320 ffffc636`8467c010 : win32kfull!Win32FreePoolImpl+0x52
fffff50b`3aba3130 ffffc619`83a2aba2 : 00000000`00000002 ffffc636`8467c010 00000000`ffffffff 00000000`00000002 : win32kbase!Win32FreePool+0x2c
fffff50b`3aba3160 fffff806`789d2d18 : ffffc88a`8e6ab080 00000000`1fe0e958 00000000`ffffffff ffff8d84`00001cbf : win32kfull!NtUserMsgWaitForMultipleObjectsEx+0x4c2
fffff50b`3aba3a90 00007ff8`b4218694 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`1fe0e938 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`b4218694
THREAD_SHA1_HASH_MOD_FUNC: 8f2c9be91f516881ba934f4b4e1f6809179fc188
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 95fa05418c9f13803c32dc6c50e69b8d1d4b0874
THREAD_SHA1_HASH_MOD: 740a44c1f2944413577e37a9081003b6157fbce6
FOLLOWUP_IP:
nt!ExFreePool+9
fffff806`78b6f0a9 4883c428 add rsp,28h
FAULT_INSTR_CODE: 28c48348
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!ExFreePool+9
FOLLOWUP_NAME: Pool_corruption
IMAGE_NAME: Pool_Corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
IMAGE_VERSION: 10.0.18362.535
MODULE_NAME: Pool_Corruption
STACK_COMMAND: .cxr 0xfffff50b3aba25c0 ; kb
BUCKET_ID_FUNC_OFFSET: 9
FAILURE_BUCKET_ID: 0x3B_c0000005_nt!ExFreePool
BUCKET_ID: 0x3B_c0000005_nt!ExFreePool
PRIMARY_PROBLEM_CLASS: 0x3B_c0000005_nt!ExFreePool
TARGET_TIME: 2020-01-01T12:00:00.000Z
OSBUILD: 18362
OSSERVICEPACK: 535
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1980-01-11 18:53:20
BUILDDATESTAMP_STR: 160101.0800
BUILDLAB_STR: WinBuild
BUILDOSVER_STR: 10.0.18362.535
ANALYSIS_SESSION_ELAPSED_TIME: 170c
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x3b_c0000005_nt!exfreepool
FAILURE_ID_HASH: {c9913766-80de-cdf5-a1a8-15c856d3f064}
Followup: Pool_corruption
---------
KERNEL_MODE_HEAP_CORRUPTION (13a)
The kernel mode heap manager has detected corruption in a heap.
Arguments:
Arg1: 0000000000000012, Type of corruption detected
Arg2: ffffb98b4b010100, Address of the heap that reported the corruption
Arg3: ffffb98b5de16000, Address at which the corruption was detected
Arg4: 0000000000000000
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for nvlddmkm.sys
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 10.0.18362.535 (WinBuild.160101.0800)
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
DUMP_TYPE: 2
BUGCHECK_P1: 12
BUGCHECK_P2: ffffb98b4b010100
BUGCHECK_P3: ffffb98b5de16000
BUGCHECK_P4: 0
CORRUPTING_POOL_ADDRESS: fffff801755733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
ffffb98b5de16000
FAULTING_IP:
nt!ExFreePool+9
fffff801`7536f0a9 4883c428 add rsp,28h
BUGCHECK_STR: 0x13a_12
CPU_COUNT: 10
CPU_MHZ: bb2
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 1
CPU_STEPPING: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 2
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 01-28-2020 21:53:23.0026
ANALYSIS_VERSION: 10.0.18362.1 x86fre
LAST_CONTROL_TRANSFER: from fffff8017531ac78 to fffff801751c14e0
STACK_TEXT:
fffff801`78266f88 fffff801`7531ac78 : 00000000`0000013a 00000000`00000012 ffffb98b`4b010100 ffffb98b`5de16000 : nt!KeBugCheckEx
fffff801`78266f90 fffff801`7531acd8 : 00000000`00000012 ffffb98b`4b010280 ffffb98b`4b010100 00000000`00000000 : nt!RtlpHeapHandleError+0x40
fffff801`78266fd0 fffff801`7531a901 : ffffb98b`5de13fe0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!RtlpHpHeapHandleError+0x58
fffff801`78267000 fffff801`751faa26 : 00000000`00000000 00000000`00000000 fffff801`83f2fc10 ffffb98b`52c6f290 : nt!RtlpLogHeapFailure+0x45
fffff801`78267030 fffff801`750460ed : ffffb98b`5de14000 ffffb98b`4b010000 fffff801`782670f8 00000000`00000000 : nt!RtlpHpVsContextFree+0x1b6d36
fffff801`782670d0 fffff801`7536f0a9 : fffff801`74f61e70 fffff801`83f1d716 00000000`00000081 01000000`00100000 : nt!ExFreeHeapPool+0x56d
fffff801`782671f0 fffff801`83ef777e : fffff801`78267230 fffff801`83f03a9e 00000000`00000000 00000000`00000000 : nt!ExFreePool+0x9
fffff801`78267220 fffff801`83ef70fe : ffffb98b`53817e70 ffffb98b`00000000 ffffb98b`00000000 ffffb98b`00000000 : dxgmms2!VidSchiProcessCompletedQueuePacketInternal+0x2be
fffff801`782673d0 fffff801`83ef479b : ffffb98b`53817e02 00000000`00000001 fffff801`78267629 00000000`00000000 : dxgmms2!VidSchiProcessDpcCompletedPacket+0x6ee
fffff801`78267530 fffff801`7fa44711 : fffff801`78267629 ffffb98b`536ef000 ffffb98b`52f776e8 00000000`00000000 : dxgmms2!VidSchDdiNotifyDpc+0x22b
fffff801`782675e0 fffff801`81c17cb4 : ffffb98b`52f77030 00000000`00000000 ffffb98b`52f77030 ffffb98b`52f55000 : dxgkrnl!DxgNotifyDpcCB+0x91
fffff801`78267690 ffffb98b`52f77030 : 00000000`00000000 ffffb98b`52f77030 ffffb98b`52f55000 fffff801`81c17c47 : nvlddmkm+0xa7cb4
fffff801`78267698 00000000`00000000 : ffffb98b`52f77030 ffffb98b`52f55000 fffff801`81c17c47 ffffb98b`52f55000 : 0xffffb98b`52f77030
THREAD_SHA1_HASH_MOD_FUNC: 57a748b76e85c86c9516e8b5ba4295dbc76c4391
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 438fa957cd00259f022ef234fadec3d9573e5f42
THREAD_SHA1_HASH_MOD: 67df1a950c2b3dc4b5c6ec38e0e1ad109a0309b1
FOLLOWUP_IP:
nt!ExFreePool+9
fffff801`7536f0a9 4883c428 add rsp,28h
FAULT_INSTR_CODE: 28c48348
SYMBOL_STACK_INDEX: 6
SYMBOL_NAME: nt!ExFreePool+9
FOLLOWUP_NAME: Pool_corruption
IMAGE_NAME: Pool_Corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
IMAGE_VERSION: 10.0.18362.535
MODULE_NAME: Pool_Corruption
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 9
FAILURE_BUCKET_ID: 0x13a_12_nt!ExFreePool
BUCKET_ID: 0x13a_12_nt!ExFreePool
PRIMARY_PROBLEM_CLASS: 0x13a_12_nt!ExFreePool
TARGET_TIME: 2020-01-16T13:51:22.000Z
OSBUILD: 18362
OSSERVICEPACK: 535
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1980-01-11 18:53:20
BUILDDATESTAMP_STR: 160101.0800
BUILDLAB_STR: WinBuild
BUILDOSVER_STR: 10.0.18362.535
ANALYSIS_SESSION_ELAPSED_TIME: ec3
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x13a_12_nt!exfreepool
FAILURE_ID_HASH: {0e8bc89c-9b1f-e697-ed6c-83210db041e2}
Followup: Pool_corruption
---------
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc000001d, The exception code that was not handled
Arg2: fffff8024de0904b, The address that the exception occurred at
Arg3: ffffcb8fef9d1580, Parameter 0 of the exception
Arg4: fffff8024203eed0, Parameter 1 of the exception
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 10.0.18362.592 (WinBuild.160101.0800)
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
DUMP_TYPE: 2
BUGCHECK_P1: ffffffffc000001d
BUGCHECK_P2: fffff8024de0904b
BUGCHECK_P3: ffffcb8fef9d1580
BUGCHECK_P4: fffff8024203eed0
EXCEPTION_CODE: (NTSTATUS) 0xc000001d - <Unable to get error code text>
FAULTING_IP:
pacer!PcpSchedulerBatchAndSendOrDropNblChain+1b
fffff802`4de0904b 41 ???
EXCEPTION_PARAMETER1: ffffcb8fef9d1580
EXCEPTION_PARAMETER2: fffff8024203eed0
BUGCHECK_STR: 0x1E_c000001d
CPU_COUNT: 10
CPU_MHZ: bb2
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 1
CPU_STEPPING: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
PROCESS_NAME: Discord.exe
CURRENT_IRQL: 2
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 01-28-2020 21:53:26.0831
ANALYSIS_VERSION: 10.0.18362.1 x86fre
BAD_STACK_POINTER: ffff8d81ce1f58f8
LAST_CONTROL_TRANSFER: from fffff8024222fda7 to fffff802421c14e0
FAILED_INSTRUCTION_ADDRESS:
pacer!PcpSchedulerBatchAndSendOrDropNblChain+1b
fffff802`4de0904b 41 ???
STACK_TEXT:
ffff8d81`ce1f58f8 fffff802`4222fda7 : 00000000`0000001e ffffffff`c000001d fffff802`4de0904b ffffcb8f`ef9d1580 : nt!KeBugCheckEx
ffff8d81`ce1f5900 fffff802`421c2362 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x1689d7
ffff8d81`ce1f5fb0 fffff802`421c2330 : fffff802`421d3416 ffffcb8f`d743e8a0 00000000`00000010 ffffcb8f`d7440780 : nt!KxExceptionDispatchOnExceptionStack+0x12
ffffb409`4fd0ec78 fffff802`421d3416 : ffffcb8f`d743e8a0 00000000`00000010 ffffcb8f`d7440780 ffffb409`4fd0f1a8 : nt!KiExceptionDispatchOnExceptionStackContinue
ffffb409`4fd0ec80 fffff802`421cd9ab : 0000001d`21a45885 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0x116
ffffb409`4fd0ee60 fffff802`4de0904b : fffff802`4de09529 ffffcb8f`e3f1d6e0 ffffb409`4fd0f089 ffffcb8f`db3f4190 : nt!KiInvalidOpcodeFault+0x32b
ffffb409`4fd0eff8 ffffcb8f`00000000 : ffffb409`000000f9 00000000`00000000 00000000`00000002 ffffcb8f`ea5479d0 : pacer!PcpSchedulerBatchAndSendOrDropNblChain+0x1b
ffffb409`4fd0f028 ffffb409`000000f9 : 00000000`00000000 00000000`00000002 ffffcb8f`ea5479d0 00000000`00000000 : 0xffffcb8f`00000000
ffffb409`4fd0f030 00000000`00000000 : 00000000`00000002 ffffcb8f`ea5479d0 00000000`00000000 0000001e`0f5d7d6a : 0xffffb409`000000f9
CHKIMG_EXTENSION: !chkimg -lo 50 -d !pacer
fffff8024de09040 - pacer!PcpSchedulerBatchAndSendOrDropNblChain+10
[ 89:81 ]
1 error : !pacer (fffff8024de09040)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: ONE_BIT
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_ONE_BIT
TARGET_TIME: 2020-01-21T20:05:31.000Z
OSBUILD: 18362
OSSERVICEPACK: 592
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1972-08-22 03:24:00
BUILDDATESTAMP_STR: 160101.0800
BUILDLAB_STR: WinBuild
BUILDOSVER_STR: 10.0.18362.592
ANALYSIS_SESSION_ELAPSED_TIME: 2406
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:memory_corruption_one_bit
FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}
Followup: memory_corruption
---------
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffff91e70083971e, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: ffff9109ee480dd9, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 10.0.18362.592 (WinBuild.160101.0800)
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
DUMP_TYPE: 2
BUGCHECK_P1: ffff91e70083971e
BUGCHECK_P2: 0
BUGCHECK_P3: ffff9109ee480dd9
BUGCHECK_P4: 2
READ_ADDRESS: fffff8074f5733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
ffff91e70083971e
FAULTING_IP:
win32kfull!IsWindowHolographicForHitTest+19
ffff9109`ee480dd9 488b4368 mov rax,qword ptr [rbx+68h]
MM_INTERNAL_CODE: 2
CPU_COUNT: 10
CPU_MHZ: bb2
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 1
CPU_STEPPING: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
BUGCHECK_STR: AV
PROCESS_NAME: Pacify-Win64-S
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 01-28-2020 21:53:30.0515
ANALYSIS_VERSION: 10.0.18362.1 x86fre
TRAP_FRAME: ffffa88880b3f6a0 -- (.trap 0xffffa88880b3f6a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffff914200839690
rdx=000000000000c035 rsi=0000000000000000 rdi=0000000000000000
rip=ffff9109ee480dd9 rsp=ffffa88880b3f830 rbp=ffffa88880b3f909
r8=0000000000000001 r9=0000000000000001 r10=ffff9109ee824140
r11=00000000000001a7 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
win32kfull!IsWindowHolographicForHitTest+0x19:
ffff9109`ee480dd9 488b4368 mov rax,qword ptr [rbx+68h] ds:00000000`00000068=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8074f1e35d6 to fffff8074f1c14e0
STACK_TEXT:
ffffa888`80b3f3f8 fffff807`4f1e35d6 : 00000000`00000050 ffff91e7`0083971e 00000000`00000000 ffffa888`80b3f6a0 : nt!KeBugCheckEx
ffffa888`80b3f400 fffff807`4f072eef : 00000000`00000000 00000000`00000000 00000000`00000000 ffff91e7`0083971e : nt!MiSystemFault+0x1d6866
ffffa888`80b3f500 fffff807`4f1cf520 : ffffc080`441d4000 ffffd70c`a4880040 00000000`00000000 00000000`000000d2 : nt!MmAccessFault+0x34f
ffffa888`80b3f6a0 ffff9109`ee480dd9 : ffff9142`00e02c00 ffffa888`80b3fab0 ffff9109`ee82d570 ffff9109`ee4991ee : nt!KiPageFault+0x360
ffffa888`80b3f830 ffff9109`ee4808dd : 00000000`00000000 00000000`00000000 00000000`00000000 ffffc080`441c0100 : win32kfull!IsWindowHolographicForHitTest+0x19
ffffa888`80b3f890 ffff9109`ee4807d7 : ffffa888`80b3f9e0 ffffa888`80b3f9e8 00000000`00000060 ffff9142`00839690 : win32kfull!xxxDCEWindowHitTest2Internal+0xad
ffffa888`80b3f970 ffff9109`ee509963 : 000001a7`000000a6 000001a7`000000a6 00000000`00000000 00000000`00000000 : win32kfull!xxxDCEWindowHitTestIndirect+0x207
ffffa888`80b3f9e0 ffff9109`ee5098d7 : 000001a7`000000a6 00000160`d45629b0 00000000`00000000 000001a7`000000a6 : win32kfull!xxxDCEWindowHitTest+0x47
ffffa888`80b3fa50 ffff9109`ee5097b4 : 000001a7`000000a6 00000160`d45629b0 00000000`00000020 00000000`00000020 : win32kfull!xxxWindowFromPoint+0xfb
ffffa888`80b3fad0 fffff807`4f1d2d18 : ffffd70c`b1df6080 00000160`d45629b0 00000000`00000000 ffffd70c`aec13ae0 : win32kfull!NtUserWindowFromPhysicalPoint+0x24
ffffa888`80b3fb00 00007ffc`a5101324 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000031`7f2cf4b8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`a5101324
CHKIMG_EXTENSION: !chkimg -lo 50 -d !win32kfull
ffff9109ee480dc7 - win32kfull!IsWindowHolographicForHitTest+7
[ 8b:0b ]
1 error : !win32kfull (ffff9109ee480dc7)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: ONE_BIT
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_ONE_BIT
TARGET_TIME: 2020-01-28T13:17:52.000Z
OSBUILD: 18362
OSSERVICEPACK: 592
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1972-08-22 03:24:00
BUILDDATESTAMP_STR: 160101.0800
BUILDLAB_STR: WinBuild
BUILDOSVER_STR: 10.0.18362.592
ANALYSIS_SESSION_ELAPSED_TIME: 2540
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:memory_corruption_one_bit
FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}
Followup: memory_corruption
---------
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000002, Stack cookie instrumentation code detected a stack-based
buffer overrun.
Arg2: ffff900d29f48470, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffff900d29f483c8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 10.0.18362.535 (WinBuild.160101.0800)
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
DUMP_TYPE: 2
BUGCHECK_P1: 2
BUGCHECK_P2: ffff900d29f48470
BUGCHECK_P3: ffff900d29f483c8
BUGCHECK_P4: 0
TRAP_FRAME: ffff900d29f48470 -- (.trap 0xffff900d29f48470)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000001 rbx=0000000000000000 rcx=0000000000000002
rdx=000000000000000b rsi=0000000000000000 rdi=0000000000000000
rip=ffff8044dba6cd35 rsp=ffff900d29f48608 rbp=ffff900d29f48718
r8=0000000000000000 r9=0000000000000000 r10=ffffad8104d39180
r11=ffffd486ec5a9200 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac po cy
win32kbase!_report_gsfailure+0x5:
ffff8044`dba6cd35 cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: ffff900d29f483c8 -- (.exr 0xffff900d29f483c8)
ExceptionAddress: ffff8044dba6cd35 (win32kbase!_report_gsfailure+0x0000000000000005)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000002
Subcode: 0x2 FAST_FAIL_STACK_COOKIE_CHECK_FAILURE
CPU_COUNT: 10
CPU_MHZ: bb2
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 1
CPU_STEPPING: 1
CUSTOMER_CRASH_COUNT: 1
BUGCHECK_STR: 0x139
PROCESS_NAME: csrss.exe
CURRENT_IRQL: 0
DEFAULT_BUCKET_ID: FAIL_FAST_STACK_COOKIE_CHECK_FAILURE
WATSON_BKT_EVENT: BEX
ERROR_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>
EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000002
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 01-28-2020 21:53:34.0166
ANALYSIS_VERSION: 10.0.18362.1 x86fre
LAST_CONTROL_TRANSFER: from fffff802185d32e9 to fffff802185c14e0
STACK_TEXT:
ffff900d`29f48148 fffff802`185d32e9 : 00000000`00000139 00000000`00000002 ffff900d`29f48470 ffff900d`29f483c8 : nt!KeBugCheckEx
ffff900d`29f48150 fffff802`185d3710 : 00000000`00000000 00000000`0000ffff ffffd486`f127c090 ffffad81`05513180 : nt!KiBugCheckDispatch+0x69
ffff900d`29f48290 fffff802`185d1aa5 : 00000000`00000000 ffff9d78`00000000 00000000`00000001 ffff8044`db9d8be7 : nt!KiFastFailDispatch+0xd0
ffff900d`29f48470 ffff8044`dba6cd35 : ffff8044`dba09cd6 ffffffff`fffe7960 00000000`00000000 00000000`00000001 : nt!KiRaiseSecurityCheckFailure+0x325
ffff900d`29f48608 ffff8044`dba09cd6 : ffffffff`fffe7960 00000000`00000000 00000000`00000001 00000000`00000002 : win32kbase!_report_gsfailure+0x5
ffff900d`29f48610 ffff8044`db60c77e : 00000000`00000001 00000000`00000001 ffff8044`db921308 00000000`00000004 : win32kbase!LegacyInputDispatcher::WaitAndDispatch+0xd6
ffff900d`29f48740 ffff8044`dba4e883 : ffffd486`eba9b0c0 ffffd486`eba9b0c0 00000000`00000000 00000000`00000005 : win32kfull!RawInputThread+0x95e
ffff900d`29f489c0 ffff8044`db62afef : ffffd486`eba9b0c0 00000000`00000000 00000000`00000005 00000000`00000000 : win32kbase!xxxCreateSystemThreads+0xa3
ffff900d`29f48ad0 fffff802`185d2d18 : ffffd486`eba9b0c0 00000000`00000005 0000017f`84e043f0 00000000`00000438 : win32kfull!NtUserCallNoParam+0x6f
ffff900d`29f48b00 00007ffc`afbb1144 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000001b`fbdffc78 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`afbb1144
THREAD_SHA1_HASH_MOD_FUNC: 8846e88a50dbcff0796ed0225021e4f14f233ddd
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 43ae892547a2feaf4802930fdb18ab63a029393e
THREAD_SHA1_HASH_MOD: 8c3e00e3f749e53147a6392df0a63353834bc109
FOLLOWUP_IP:
win32kbase!_report_gsfailure+5
ffff8044`dba6cd35 cd29 int 29h
FAULT_INSTR_CODE: cccc29cd
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: win32kbase!_report_gsfailure+5
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: win32kbase
IMAGE_NAME: win32kbase.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 0
IMAGE_VERSION: 10.0.18362.535
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 5
FAILURE_BUCKET_ID: 0x139_MISSING_GSFRAME_win32kbase!_report_gsfailure
BUCKET_ID: 0x139_MISSING_GSFRAME_win32kbase!_report_gsfailure
PRIMARY_PROBLEM_CLASS: 0x139_MISSING_GSFRAME_win32kbase!_report_gsfailure
TARGET_TIME: 2019-12-20T20:59:10.000Z
OSBUILD: 18362
OSSERVICEPACK: 535
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1980-01-11 18:53:20
BUILDDATESTAMP_STR: 160101.0800
BUILDLAB_STR: WinBuild
BUILDOSVER_STR: 10.0.18362.535
ANALYSIS_SESSION_ELAPSED_TIME: b4e
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x139_missing_gsframe_win32kbase!_report_gsfailure
FAILURE_ID_HASH: {f22c2e43-4b0d-a5dc-7d6c-399075f6e217}
Followup: MachineOwner
---------