SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8037628c9ce, The address that the exception occurred at
Arg3: ffff84834e8b5518, Exception Record Address
Arg4: ffff8c81f1ab2930, Context Record Address
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : AV.Fault
Value: Read
Key : Analysis.CPU.Sec
Value: 2
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 3
Key : Analysis.Memory.CommitPeak.Mb
Value: 67
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
BUGCHECK_CODE: 7e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff8037628c9ce
BUGCHECK_P3: ffff84834e8b5518
BUGCHECK_P4: ffff8c81f1ab2930
EXCEPTION_RECORD: ffff84834e8b5518 -- (.exr 0xffff84834e8b5518)
ExceptionAddress: fffff8037628c9ce (nt!KxWaitForLockOwnerShip+0x000000000000000e)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
CONTEXT: ffff8c81f1ab2930 -- (.cxr 0xffff8c81f1ab2930)
rax=0000000000000000 rbx=ffff84834e8b5860 rcx=ffff84834e8b5860
rdx=0008000000000000 rsi=00000000001b0486 rdi=ffffcb05ba857db8
rip=fffff8037628c9ce rsp=ffff84834e8b5750 rbp=ffff84834e8b5889
r8=0000000000000089 r9=0000000000000000 r10=7ffffffffffffffc
r11=0000000000000000 r12=ffffcb05b62da010 r13=ffffc70001a4aaa0
r14=fffff8037666a400 r15=00000000ffffffff
iopl=0 nv up ei ng nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010282
nt!KxWaitForLockOwnerShip+0xe:
fffff803`7628c9ce 48890a mov qword ptr [rdx],rcx ds:002b:00080000`00000000=????????????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
READ_ADDRESS: fffff803767733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8037662a3c8: Unable to get Flags value from nt!KdVersionBlock
fffff8037662a3c8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffffffffffffff
ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek u olamaz %s.
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
EXCEPTION_STR: 0xc0000005
BAD_STACK_POINTER: ffff8c81f1ab20c8
STACK_TEXT:
ffff8483`4e8b5750 fffff803`7631777d : ffffcb05`ba45a8a0 ffffcb05`ba45a8b0 00000000`00000001 00000000`003f9b00 : nt!KxWaitForLockOwnerShip+0xe
ffff8483`4e8b5780 fffff803`76349f4e : ffffcb05`ba857cd0 ffffcb05`b5cc0028 00000000`001b0486 00000000`001b0485 : nt!KeAcquireInStackQueuedSpinLock+0x7d
ffff8483`4e8b57b0 fffff803`7634aa08 : ffffcb05`b62da010 ffff8483`00000001 00000000`001b0486 00000000`00000000 : nt!MiStoreWriteModifiedPages+0x376
ffff8483`4e8b58f0 fffff803`7639169a : ffffcb05`b62da010 00000000`00000100 fffff803`000d09db ffffcb05`00000100 : nt!MiGatherPagefilePages+0x44c
ffff8483`4e8b59f0 fffff803`7626bcd5 : ffffcb05`b64cc080 ffffcb05`b64cc080 00000000`00000080 fffff803`76391440 : nt!MiModifiedPageWriter+0x25a
ffff8483`4e8b5c10 fffff803`763c9998 : ffff8c81`f1c80180 ffffcb05`b64cc080 fffff803`7626bc80 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffff8483`4e8b5c60 00000000`00000000 : ffff8483`4e8b6000 ffff8483`4e8b0000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: nt!KxWaitForLockOwnerShip+e
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.18362.778
STACK_COMMAND: .cxr 0xffff8c81f1ab2930 ; kb
BUCKET_ID_FUNC_OFFSET: e
FAILURE_BUCKET_ID: AV_STACKPTR_ERROR_nt!KxWaitForLockOwnerShip
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {56c5e1ad-426c-3e07-1dfd-b329bf712cb6}
Followup: MachineOwner
---------
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000004, The thread's stack pointer was outside the legal stack
extents for the thread.
Arg2: ffff9a8068cb1ff0, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffff9a8068cb1f48, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 2
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 3
Key : Analysis.Memory.CommitPeak.Mb
Value: 67
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
BUGCHECK_CODE: 139
BUGCHECK_P1: 4
BUGCHECK_P2: ffff9a8068cb1ff0
BUGCHECK_P3: ffff9a8068cb1f48
BUGCHECK_P4: 0
TRAP_FRAME: ffff9a8068cb1ff0 -- (.trap 0xffff9a8068cb1ff0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffb0e66c55000 rbx=0000000000000000 rcx=0000000000000004
rdx=fffffb0e66c5b000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff804170002f1 rsp=ffff9a8068cb2180 rbp=ffff9a8068cb26f0
r8=fffffb0e66c5b000 r9=ffff9a8068cb2710 r10=ffff870cb52ed080
r11=000000a69d0fdd68 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!RtlpGetStackLimitsEx+0x19e355:
fffff804`170002f1 cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: ffff9a8068cb1f48 -- (.exr 0xffff9a8068cb1f48)
ExceptionAddress: fffff804170002f1 (nt!RtlpGetStackLimitsEx+0x000000000019e355)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000004
Subcode: 0x4 FAST_FAIL_INCORRECT_STACK
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: steamwebhelper.exe
WATSON_BKT_EVENT: BEX
ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000004
EXCEPTION_STR: 0xc0000409
BAD_STACK_POINTER: ffff9a8068cb1cc8
STACK_TEXT:
ffff9a80`68cb1cc8 fffff804`16fd41e9 : 00000000`00000139 00000000`00000004 ffff9a80`68cb1ff0 ffff9a80`68cb1f48 : nt!KeBugCheckEx
ffff9a80`68cb1cd0 fffff804`16fd4610 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffff9a80`68cb1e10 fffff804`16fd29a3 : fffff804`16e69038 fffff804`1720e88c ffff9a80`68cb27d0 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffff9a80`68cb1ff0 fffff804`170002f1 : 00000000`00000000 00000000`0000035e 0005e380`00ab7000 00000000`0010001f : nt!KiRaiseSecurityCheckFailure+0x323
ffff9a80`68cb2180 fffff804`1705982a : 00000000`00000000 00000000`00000000 ffff9a80`68cb26f0 00007fff`00000003 : nt!RtlpGetStackLimitsEx+0x19e355
ffff9a80`68cb21b0 fffff804`16efe85e : fffffb0e`66c5a068 ffff9a80`68cb2e30 fffffb0e`66c5a068 00000000`00000001 : nt!RtlDispatchException+0x15fa0a
ffff9a80`68cb2900 fffff804`16fc3202 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x16e
ffff9a80`68cb2fb0 fffff804`16fc31d0 : fffff804`16fd4316 00000000`00000028 00000000`00000000 fffffb0e`66c59fe1 : nt!KxExceptionDispatchOnExceptionStack+0x12
fffffb0e`66c59f28 fffff804`16fd4316 : 00000000`00000028 00000000`00000000 fffffb0e`66c59fe1 fffff804`16ecd1f7 : nt!KiExceptionDispatchOnExceptionStackContinue
fffffb0e`66c59f30 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0x116
SYMBOL_NAME: nt!KiFastFailDispatch+d0
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.18362.778
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: d0
FAILURE_BUCKET_ID: 0x139_MISSING_GSFRAME_STACKPTR_ERROR_nt!KiFastFailDispatch
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {7b0febb5-6007-4f2b-3d38-57fef278d8d5}
Followup: MachineOwner
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8006a68c9ce, Address of the instruction which caused the bugcheck
Arg3: ffffc98006cb2930, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32kfull.sys
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 2
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 19
Key : Analysis.Memory.CommitPeak.Mb
Value: 74
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff8006a68c9ce
BUGCHECK_P3: ffffc98006cb2930
BUGCHECK_P4: 0
CONTEXT: ffffc98006cb2930 -- (.cxr 0xffffc98006cb2930)
rax=0000000000000000 rbx=fffffa0f83d1dde0 rcx=fffffa0f83d1dde0
rdx=0008000000000000 rsi=ffff888dc0625010 rdi=ffffae88607a4690
rip=fffff8006a68c9ce rsp=fffffa0f83d1dd50 rbp=fffffa0f83d1de70
r8=000000000000021c r9=0000000000000000 r10=fffff8006a711000
r11=ffffb97cd3e00000 r12=0000000000000000 r13=0000000000000000
r14=0000000000a16ce3 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010282
nt!KxWaitForLockOwnerShip+0xe:
fffff800`6a68c9ce 48890a mov qword ptr [rdx],rcx ds:002b:00080000`00000000=????????????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: csrss.exe
BAD_STACK_POINTER: ffffc98006cb1ff8
STACK_TEXT:
fffffa0f`83d1dd50 fffff800`6a71777d : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxWaitForLockOwnerShip+0xe
fffffa0f`83d1dd80 fffff800`6a71105c : ffffae88`607a4630 ffff888d`c0911000 00000000`fffffde4 ffff88b8`2fa6f7d7 : nt!KeAcquireInStackQueuedSpinLock+0x7d
fffffa0f`83d1ddb0 ffff88b8`2f7e6415 : ffff888d`c0911000 fffffa0f`83d1de70 ffff888d`c0911000 ffffb97c`d3e00000 : nt!ExReleaseResourceAndLeaveCriticalRegion+0x5c
fffffa0f`83d1de10 ffff88b8`2f45b022 : 00000000`00000000 fffffa0f`83d1de70 ffff888d`c0625010 ffff888d`c0911000 : win32kbase!GreReleaseSemaphoreInternal+0x15
fffffa0f`83d1de40 00000000`00000000 : fffffa0f`83d1de70 ffff888d`c0625010 ffff888d`c0911000 ffff888d`c0911000 : win32kfull+0x5b022
SYMBOL_NAME: win32kbase!GreReleaseSemaphoreInternal+15
MODULE_NAME: win32kbase
IMAGE_NAME: win32kbase.sys
IMAGE_VERSION: 10.0.18362.778
STACK_COMMAND: .cxr 0xffffc98006cb2930 ; kb
BUCKET_ID_FUNC_OFFSET: 15
FAILURE_BUCKET_ID: 0x3B_c0000005_STACKPTR_ERROR_win32kbase!GreReleaseSemaphoreInternal
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {be9879cf-2916-f071-51a9-d6fff044b73c}
Followup: MachineOwner
---------
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80532c8c9ce, The address that the exception occurred at
Arg3: ffffc388510bc518, Exception Record Address
Arg4: ffffd901c98ab930, Context Record Address
Debugging Details:
------------------
***** Debugger could not find nt in module list, module list might be corrupt, error 0x80070057.
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 0
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 0
Key : Analysis.Memory.CommitPeak.Mb
Value: 42
Key : Analysis.System
Value: CreateObject
Key : WER.CorruptModuleList
Value: 1
ADDITIONAL_XML: 1
BUGCHECK_CODE: 7e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff80532c8c9ce
BUGCHECK_P3: ffffc388510bc518
BUGCHECK_P4: ffffd901c98ab930
EXCEPTION_RECORD: ffffc388510bc518 -- (.exr 0xffffc388510bc518)
Cannot read Exception record @ ffffc388510bc518
CONTEXT: ffffd901c98ab930 -- (.cxr 0xffffd901c98ab930)
rax=0000000000000000 rbx=ffffc388510bc860 rcx=ffffc388510bc860
rdx=0008000000000000 rsi=000000000039e235 rdi=ffffb30fc94cdee8
rip=fffff80532c8c9ce rsp=ffffc388510bc750 rbp=ffffc388510bc889
r8=000000000000001d r9=0000000000000000 r10=7ffffffffffffffc
r11=0000000000000000 r12=ffffb30fcf2c5010 r13=ffffef8001872720
r14=fffff8053306a400 r15=00000000ffffffff
iopl=0 nv up ei ng nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010282
fffff805`32c8c9ce ?? ???
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
STACK_TEXT:
ffffd901`c98ab0c8 fffff805`32ddb416 : 00000000`0000007e ffffffff`c0000005 fffff805`32c8c9ce ffffc388`510bc518 : 0xfffff805`32dc2390
ffffd901`c98ab0d0 00000000`0000007e : ffffffff`c0000005 fffff805`32c8c9ce ffffc388`510bc518 ffffd901`c98ab930 : 0xfffff805`32ddb416
ffffd901`c98ab0d8 ffffffff`c0000005 : fffff805`32c8c9ce ffffc388`510bc518 ffffd901`c98ab930 00000000`00000000 : 0x7e
ffffd901`c98ab0e0 fffff805`32c8c9ce : ffffc388`510bc518 ffffd901`c98ab930 00000000`00000000 00000000`0006bcd5 : 0xffffffff`c0000005
ffffd901`c98ab0e8 ffffc388`510bc518 : ffffd901`c98ab930 00000000`00000000 00000000`0006bcd5 fffff805`32d9d37c : 0xfffff805`32c8c9ce
ffffd901`c98ab0f0 ffffd901`c98ab930 : 00000000`00000000 00000000`0006bcd5 fffff805`32d9d37c fffff805`00000003 : 0xffffc388`510bc518
ffffd901`c98ab0f8 00000000`00000000 : 00000000`0006bcd5 fffff805`32d9d37c fffff805`00000003 ffffc388`510bcc10 : 0xffffd901`c98ab930
SYMBOL_NAME: ANALYSIS_INCONCLUSIVE
MODULE_NAME: Unknown_Module
IMAGE_NAME: Unknown_Image
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: CORRUPT_MODULELIST_AV
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {fc259191-ef0c-6215-476f-d32e5dcaf1b7}
Followup: MachineOwner
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8050f28c9ce, Address of the instruction which caused the bugcheck
Arg3: ffffe200a1cb2930, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 3
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 4
Key : Analysis.Memory.CommitPeak.Mb
Value: 67
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff8050f28c9ce
BUGCHECK_P3: ffffe200a1cb2930
BUGCHECK_P4: 0
CONTEXT: ffffe200a1cb2930 -- (.cxr 0xffffe200a1cb2930)
rax=0000000000000000 rbx=fffffd09d7539ff0 rcx=fffffd09d7539ff0
rdx=0008000000000000 rsi=0000000000000000 rdi=fffff8050f78d3e0
rip=fffff8050f28c9ce rsp=fffffd09d7539f90 rbp=ffff9f86d278a3c0
r8=00000000ffffffff r9=7fffaf869ea6e240 r10=7ffffffffffffffc
r11=000000000000001b r12=0000000000000003 r13=fffffd09d753a1c0
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010286
nt!KxWaitForLockOwnerShip+0xe:
fffff805`0f28c9ce 48890a mov qword ptr [rdx],rcx ds:002b:00080000`00000000=????????????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: svchost.exe
BAD_STACK_POINTER: ffffe200a1cb1ff8
STACK_TEXT:
fffffd09`d7539f90 fffff805`0f30f459 : 00000000`00000000 fffff805`0f8c076e 00000000`00000000 ffffaf86`00000000 : nt!KxWaitForLockOwnerShip+0xe
fffffd09`d7539fc0 fffff805`0f8b6019 : fffffd09`d753a150 fffffd09`d753a940 00000000`00000001 fffffd09`d753a940 : nt!ExReleaseResourceLite+0x119
fffffd09`d753a020 fffff805`0f8bd066 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000001 : nt!CmpUnlockRegistry+0x19
fffffd09`d753a050 fffff805`0f8b8934 : fffffd09`0000001c fffffd09`d753a3a0 fffffd09`d753a368 00000000`00000000 : nt!CmpDoParseKey+0x2196
fffffd09`d753a2f0 fffff805`0f8b681f : ffff9f86`d3ea7010 ffffaf86`9ea35b01 ffff9f86`00000000 00000000`00000001 : nt!CmpParseKey+0x274
fffffd09`d753a510 fffff805`0f8b4c81 : ffff9f86`d3ea7000 fffffd09`d753a758 00000000`00000040 ffff9f86`c6ac5da0 : nt!ObpLookupObjectName+0x78f
fffffd09`d753a6d0 fffff805`0f8be19c : ffff9f86`00000001 00000000`00000000 00000000`00000000 ffff9f86`c6ac5da0 : nt!ObOpenObjectByNameEx+0x201
fffffd09`d753a810 fffff805`0f8be01d : 00000030`941fe588 fffffd09`d753ab80 00000000`00000001 00000000`00000000 : nt!ObOpenObjectByName+0x5c
fffffd09`d753a860 fffff805`0f802002 : 00000000`00000004 000001f8`eda1c740 00000000`000000a0 00000000`00000008 : nt!CmOpenKey+0x29d
fffffd09`d753aac0 fffff805`0f3d3c18 : 00000000`00000000 fffffd09`d753ab80 fffffd09`d753ab80 ffff9f86`d5703060 : nt!NtOpenKey+0x12
fffffd09`d753ab00 00007ffe`4e8dc2b4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000030`941fe528 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`4e8dc2b4
SYMBOL_NAME: nt!KxWaitForLockOwnerShip+e
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.18362.778
STACK_COMMAND: .cxr 0xffffe200a1cb2930 ; kb
BUCKET_ID_FUNC_OFFSET: e
FAILURE_BUCKET_ID: 0x3B_c0000005_STACKPTR_ERROR_nt!KxWaitForLockOwnerShip
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {d727c4af-27c7-04e4-888d-ab8b74fdce06}
Followup: MachineOwner
---------