SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8052f1a1ac8, Address of the instruction which caused the bugcheck
Arg3: ffff9087192dc6a0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
***** Debugger could not find nt in module list, module list might be corrupt, error 0x80070057.
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
DUMP_TYPE: 2
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff8052f1a1ac8
BUGCHECK_P3: ffff9087192dc6a0
BUGCHECK_P4: 0
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
+0
fffff805`2f1a1ac8 ?? ???
CONTEXT: ffff9087192dc6a0 -- (.cxr 0xffff9087192dc6a0)
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=0000000000000000 rsp=0000000000000000 rbp=0000000000000000
r8=0000000000000000 r9=0000000000000000 r10=0000000000000000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di pl nz na pe nc
cs=0000 ss=0000 ds=0000 es=0000 fs=0000 gs=0000 efl=00000000
00000000`00000000 ?? ???
Resetting default scope
BUGCHECK_STR: 0x3B_c0000005
CPU_COUNT: 8
CPU_MHZ: b22
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 1e
CPU_STEPPING: 5
CUSTOMER_CRASH_COUNT: 1
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 12-22-2019 10:21:41.0746
ANALYSIS_VERSION: 10.0.18362.1 x86fre
LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff805297bc810
STACK_TEXT:
ffff9087`192dbd68 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xfffff805`297bc810
SYMBOL_NAME: ANALYSIS_INCONCLUSIVE
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: Unknown_Module
IMAGE_NAME: Unknown_Image
DEBUG_FLR_IMAGE_TIMESTAMP: 0
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID: CORRUPT_MODULELIST_0x3B_c0000005
DEFAULT_BUCKET_ID: CORRUPT_MODULELIST_0x3B_c0000005
PRIMARY_PROBLEM_CLASS: CORRUPT_MODULELIST_0x3B_c0000005
FAILURE_BUCKET_ID: CORRUPT_MODULELIST_0x3B_c0000005
TARGET_TIME: 2019-12-21T12:25:01.000Z
OSBUILD: 18362
OSSERVICEPACK: 0
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: unknown_date
ANALYSIS_SESSION_ELAPSED_TIME: 1f
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:corrupt_modulelist_0x3b_c0000005
FAILURE_ID_HASH: {74bb4c27-742f-ebb4-fa0a-8074317b8a14}
Followup: MachineOwner
---------
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8017e07e1b4, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000080, Parameter 1 of the exception
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
DUMP_TYPE: 2
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff8017e07e1b4
BUGCHECK_P3: 0
BUGCHECK_P4: 80
READ_ADDRESS: fffff8017dd6e3b0: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
0000000000000080
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
nt!KiSwapToUmsThread+64
fffff801`7e07e1b4 488bb880000000 mov rdi,qword ptr [rax+80h]
EXCEPTION_PARAMETER2: 0000000000000080
BUGCHECK_STR: 0x1E_c0000005_R
CPU_COUNT: 8
CPU_MHZ: b22
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 1e
CPU_STEPPING: 5
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: steamwebhelper.exe
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 12-22-2019 10:21:43.0951
ANALYSIS_VERSION: 10.0.18362.1 x86fre
EXCEPTION_RECORD: ffffdd6eb75ba000 -- (.exr 0xffffdd6eb75ba000)
ExceptionAddress: 0000000000000000
ExceptionCode: 129cd867
ExceptionFlags: 0a000000
NumberParameters: 0
TRAP_FRAME: ffff800000000000 -- (.trap 0xffff800000000000)
Unable to read trap frame at ffff8000`00000000
LAST_CONTROL_TRANSFER: from fffff8017da22453 to fffff8017d9bc810
STACK_TEXT:
ffff850d`bd5e8f08 fffff801`7da22453 : 00000000`0000001e ffffffff`c0000005 fffff801`7e07e1b4 00000000`00000000 : nt!KeBugCheckEx
ffff850d`bd5e8f10 fffff801`7d9ce59d : ffffdd6e`b75ba000 ffff850d`bd5e97a0 ffff8000`00000000 00000000`00000080 : nt!KiDispatchException+0x169f63
ffff850d`bd5e95c0 fffff801`7d9ca77f : 00000000`00000001 00000000`00000001 00000000`00206000 00000000`00000000 : nt!KiExceptionDispatch+0x11d
ffff850d`bd5e97a0 fffff801`7e07e1b4 : ffffb88c`9df16350 00000000`00000000 00000000`00006131 00000000`00006131 : nt!KiPageFault+0x43f
ffff850d`bd5e9930 fffff801`7d9ceeac : ffff850d`bd5e9ab0 00000000`01886f10 00000000`04715a10 00000000`06130ff0 : nt!KiSwapToUmsThread+0x64
ffff850d`bd5e9a90 fffff801`7d9ca667 : 00000000`06131000 00000000`00000006 00000000`fffffff0 ffff850d`bd5e9cc0 : nt!KiUmsTrapEntry+0xec
ffff850d`bd5e9c40 00000000`6e18c7bd : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x327
00000000`0378faf0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x6e18c7bd
THREAD_SHA1_HASH_MOD_FUNC: 102071f548005ae4330985f17abf079cdd5eb872
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 9d8399788397ff767b30328d24cdde5f39d61dab
THREAD_SHA1_HASH_MOD: 30a3e915496deaace47137d5b90c3ecc03746bf6
FOLLOWUP_IP:
nt!KiSwapToUmsThread+64
fffff801`7e07e1b4 488bb880000000 mov rdi,qword ptr [rax+80h]
FAULT_INSTR_CODE: 80b88b48
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: nt!KiSwapToUmsThread+64
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: e78e2f
IMAGE_VERSION: 10.0.18362.1
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 64
FAILURE_BUCKET_ID: 0x1E_c0000005_R_nt!KiSwapToUmsThread
BUCKET_ID: 0x1E_c0000005_R_nt!KiSwapToUmsThread
PRIMARY_PROBLEM_CLASS: 0x1E_c0000005_R_nt!KiSwapToUmsThread
TARGET_TIME: 2019-12-21T19:13:12.000Z
OSBUILD: 18362
OSSERVICEPACK: 1
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1970-06-25 18:20:15
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 32aa
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x1e_c0000005_r_nt!kiswaptoumsthread
FAILURE_ID_HASH: {eb9dfcf9-5cf6-c596-f500-cebadf3ce501}
Followup: MachineOwner
---------
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000061941, The subtype of the bugcheck.
Arg2: 0000000003c100a4
Arg3: 000000000000000d
Arg4: ffffd98d38461c40
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
DUMP_TYPE: 2
BUGCHECK_P1: 61941
BUGCHECK_P2: 3c100a4
BUGCHECK_P3: d
BUGCHECK_P4: ffffd98d38461c40
BUGCHECK_STR: 0x1a_61941
CPU_COUNT: 8
CPU_MHZ: b22
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 1e
CPU_STEPPING: 5
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: csgo.exe
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 12-22-2019 10:21:45.0887
ANALYSIS_VERSION: 10.0.18362.1 x86fre
LAST_CONTROL_TRANSFER: from fffff8052b229c02 to fffff8052b1bc810
STACK_TEXT:
ffffd98d`38461a98 fffff805`2b229c02 : 00000000`0000001a 00000000`00061941 00000000`03c100a4 00000000`0000000d : nt!KeBugCheckEx
ffffd98d`38461aa0 fffff805`2b1ca69a : 00000000`5bef8ac8 ffffd98d`38461cc0 00000000`009fa000 ffffd98d`38461cc0 : nt!MmAccessFault+0x160d72
ffffd98d`38461c40 00000000`61642fa9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35a
00000000`00b7df50 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x61642fa9
THREAD_SHA1_HASH_MOD_FUNC: 1feb98d5c6601cfab1575099bc1303f202ec7478
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: b19372305f1658597a1a3b36449fecf8fa9b609e
THREAD_SHA1_HASH_MOD: 2a7ca9d3ab5386d53fea7498e1d81b9c4a4c036b
SYMBOL_NAME: ANALYSIS_INCONCLUSIVE
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: Unknown_Module
IMAGE_NAME: Unknown_Image
DEBUG_FLR_IMAGE_TIMESTAMP: 0
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: 0x1a_61941_ANALYSIS_INCONCLUSIVE!unknown_function
BUCKET_ID: 0x1a_61941_ANALYSIS_INCONCLUSIVE!unknown_function
PRIMARY_PROBLEM_CLASS: 0x1a_61941_ANALYSIS_INCONCLUSIVE!unknown_function
TARGET_TIME: 2019-12-21T20:09:17.000Z
OSBUILD: 18362
OSSERVICEPACK: 1
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1970-06-25 18:20:15
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 2401
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x1a_61941_analysis_inconclusive!unknown_function
FAILURE_ID_HASH: {5deef4f7-7ffd-da2a-fbcb-ad563ba13c90}
Followup: MachineOwner
---------
FAT_FILE_SYSTEM (23)
If you see FatExceptionFilter on the stack then the 2nd and 3rd
parameters are the exception record and context record. Do a .cxr
on the 3rd parameter and then kb to obtain a more informative stack
trace.
Arguments:
Arg1: 00000000000e0121
Arg2: ffffee8cbe8fa658
Arg3: ffffee8cbe8f9ea0
Arg4: fffff8030a29f2eb
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : AV.Dereference
Value: NullClassPtr
Key : AV.Fault
Value: Read
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
SYSTEM_MANUFACTURER: Gigabyte Technology Co., Ltd.
SYSTEM_PRODUCT_NAME: H55M-S2
BIOS_VENDOR: Award Software International, Inc.
BIOS_VERSION: F4
BIOS_DATE: 08/20/2010
BASEBOARD_MANUFACTURER: Gigabyte Technology Co., Ltd.
BASEBOARD_PRODUCT: H55M-S2
DUMP_TYPE: 2
BUGCHECK_P1: e0121
BUGCHECK_P2: ffffee8cbe8fa658
BUGCHECK_P3: ffffee8cbe8f9ea0
BUGCHECK_P4: fffff8030a29f2eb
EXCEPTION_RECORD: ffffee8cbe8fa658 -- (.exr 0xffffee8cbe8fa658)
ExceptionAddress: fffff8030a29f2eb (volmgr!VmpQueryUniqueIdInternal+0x0000000000000037)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 0000000000000040
Attempt to read from address 0000000000000040
CONTEXT: ffffee8cbe8f9ea0 -- (.cxr 0xffffee8cbe8f9ea0)
rax=0000000000000000 rbx=ffffcb03d994cb40 rcx=ffffcb03d994cb00
rdx=0000000000000000 rsi=ffffcb03d6cf8780 rdi=0000000000000000
rip=fffff8030a29f2eb rsp=ffffee8cbe8fa890 rbp=ffffee8cbe8fa949
r8=ffffee8cbe8fa942 r9=ffffcb03d994cb40 r10=00000000ffffffff
r11=ffffee8cbe8fa8a0 r12=fffff8030cf3f001 r13=ffffcb03d37891b0
r14=ffffee8cbe8fa940 r15=ffffee8cbe8fa942
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246
volmgr!VmpQueryUniqueIdInternal+0x37:
fffff803`0a29f2eb 488b5040 mov rdx,qword ptr [rax+40h] ds:002b:00000000`00000040=????????????????
Resetting default scope
CPU_COUNT: 8
CPU_MHZ: b22
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 1e
CPU_STEPPING: 5
CPU_MICROCODE: 6,1e,5,0 (F,M,S,R) SIG: A'00000000 (cache) A'00000000 (init)
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: svchost.exe
CURRENT_IRQL: 0
FOLLOWUP_IP:
volmgr!VmpQueryUniqueIdInternal+37
fffff803`0a29f2eb 488b5040 mov rdx,qword ptr [rax+40h]
FAULTING_IP:
volmgr!VmpQueryUniqueIdInternal+37
fffff803`0a29f2eb 488b5040 mov rdx,qword ptr [rax+40h]
BUGCHECK_STR: 0x23
READ_ADDRESS: fffff803090233b0: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
0000000000000040
DEFAULT_BUCKET_ID: NULL_CLASS_PTR_DEREFERENCE
ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000000000040
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 12-22-2019 10:21:47.0825
ANALYSIS_VERSION: 10.0.18362.1 x86fre
LAST_CONTROL_TRANSFER: from fffff8030a2a02ce to fffff8030a29f2eb
STACK_TEXT:
ffffee8c`be8fa890 fffff803`0a2a02ce : ffffcb03`d994cb40 ffffcb03`d6cf8780 00000000`0fb00000 ffffcb03`d3789101 : volmgr!VmpQueryUniqueIdInternal+0x37
ffffee8c`be8fa8c0 fffff803`0a2a078f : 00000000`00000000 ffffcb03`d6cf8780 00000000`00000000 000000a0`00000001 : volmgr!VmpSetPartitionInformation+0x2c0e
ffffee8c`be8fa9b0 fffff803`0a2918eb : ffffcb03`d994cb40 ffffee8c`be8faa30 00000000`00000000 ffffcb03`d1999010 : volmgr!VmpGetPartitionInfoEx+0x4627
ffffee8c`be8fa9f0 fffff803`08adcda9 : ffffcb03`d1999010 ffffcb03`d1999010 ffffffff`ffffffff ffffcb03`d1202340 : volmgr!VmDeviceControl+0x2bb
ffffee8c`be8faa60 fffff803`08bde42e : ffffcb03`d1206f80 00000000`000000a0 ffff8902`00000000 ffffee8c`be8fab80 : nt!IofCallDriver+0x59
ffffee8c`be8faaa0 fffff803`0917e911 : ffffcb03`da3aa000 00000000`00000000 00000000`00000000 ffffcb03`d1202000 : nt!IoSynchronousCallDriver+0x4e
ffffee8c`be8fab00 fffff803`0cf84c5a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IoForwardIrpSynchronously+0x41
ffffee8c`be8fab30 fffff803`0cf236e7 : ffffcb03`d1999010 ffffcb03`d949c001 ffffcb03`da65e180 fffff803`00000000 : fvevol!IoctlDiskQuery+0x7a
ffffee8c`be8fac20 fffff803`08adcda9 : 00000000`00000000 00000000`00000000 ffffcb03`d949c010 00000000`00000000 : fvevol!FveFilterDeviceControl+0x207
ffffee8c`be8fad20 fffff803`0cfe1033 : ffffee8c`be8faef8 fffff803`08b42eaf 00000000`00070048 ffffcb03`d1999010 : nt!IofCallDriver+0x59
ffffee8c`be8fad60 fffff803`08adcda9 : ffffee8c`be8faf30 fffff803`00000090 ffffcb03`d9d90600 ffffee8c`be8fae30 : volume!VolumePassThrough+0x23
ffffee8c`be8fad90 fffff803`0e921ec6 : 00000000`00000000 ffffcb03`d9d906f8 00000000`00000000 00000000`00000000 : nt!IofCallDriver+0x59
ffffee8c`be8fadd0 fffff803`0e932f8c : ffffcb03`d949c301 ffffcb03`db22f700 00000000`00000000 ffffcb03`d949c3f8 : fastfat!FatPerformDevIoCtrl+0xca
ffffee8c`be8fae60 fffff803`0e9320d4 : ffffcb03`d384c560 ffffcb03`dad79760 ffffcb03`d949c010 ffffcb03`dbf81310 : fastfat!FatVerifyVolume+0x190
ffffee8c`be8fb040 fffff803`0e932032 : ffffcb03`d949c010 ffffcb03`d949c401 ffffcb03`d949c401 ffffcb03`d9e52800 : fastfat!FatCommonFileSystemControl+0x44
ffffee8c`be8fb070 fffff803`08adcda9 : ffffcb03`d88bd9a0 ffffcb03`d949c010 ffffee8c`be8fb100 ffffcb03`d949c440 : fastfat!FatFsdFileSystemControl+0xb2
ffffee8c`be8fb0b0 fffff803`09ac55de : 00000000`00000000 00000000`00000000 ffffcb03`d949c010 ffffee8c`be8fb1a0 : nt!IofCallDriver+0x59
ffffee8c`be8fb0f0 fffff803`09afc190 : ffffee8c`be8fb190 00000000`00000006 00000000`00000201 fffff803`08b7682d : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x15e
ffffee8c`be8fb170 fffff803`08adcda9 : ffffcb03`d994c9f0 ffffee8c`be8fb270 ffffcb03`d949c010 ffffee8c`be8fb204 : FLTMGR!FltpFsControl+0x110
ffffee8c`be8fb1d0 fffff803`0930907b : ffffee8c`be8fb270 ffffcb03`d994c9f0 ffffcb03`d949c010 ffffcb03`d9e52800 : nt!IofCallDriver+0x59
ffffee8c`be8fb210 fffff803`0e93d037 : ffffcb03`db22f700 ffffcb03`da6ce450 ffffcb03`d9d90300 00000000`00000000 : nt!IoVerifyVolume+0x12b
ffffee8c`be8fb2b0 fffff803`0e92c65b : ffffcb03`dbf80b90 ffffcb03`dad79010 ffffcb03`d994c9f0 00000000`00000002 : fastfat!FatPerformVerify+0x93
ffffee8c`be8fb320 fffff803`0e91a192 : ffffcb03`dbf80b90 ffffcb03`dad79010 ffffcb03`80000016 ffffcb03`00000001 : fastfat!FatProcessException+0x3e3
ffffee8c`be8fb3a0 fffff803`08adcda9 : ffffcb03`d9d90300 ffffcb03`dad79010 ffffcb03`d384c501 ffffcb03`d7121a50 : fastfat!FatFsdCreate+0x132
ffffee8c`be8fb430 fffff803`09ac55de : ffffcb03`dad79010 ffffcb03`dad79400 ffffcb03`dad79010 ffffcb03`d9834ab0 : nt!IofCallDriver+0x59
ffffee8c`be8fb470 fffff803`09afcd27 : ffffee8c`be8fb530 00000000`00000000 00000000`00000001 00000000`00000000 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x15e
ffffee8c`be8fb4f0 fffff803`08adcda9 : ffffcb03`d9834a00 fffff803`090c7525 00000000`00000000 00000000`00000030 : FLTMGR!FltpCreate+0x307
ffffee8c`be8fb5a0 fffff803`08adbe54 : 00000000`00000000 ffffcb03`db22f700 ffffcb03`dad79488 fffff803`08adc613 : nt!IofCallDriver+0x59
ffffee8c`be8fb5e0 fffff803`090c7b6b : ffffee8c`be8fb8a0 fffff803`090c7525 ffffee8c`be8fb810 ffffcb03`d93ab010 : nt!IoCallDriverWithTracing+0x34
ffffee8c`be8fb630 fffff803`090ce9af : ffffcb03`d994c9f0 ffffcb03`d994c925 ffffcb03`dad52480 ffff8902`d6a0d701 : nt!IopParseDevice+0x62b
ffffee8c`be8fb7a0 fffff803`090cce11 : ffffcb03`dad52400 ffffee8c`be8fb9e8 00000000`00000040 ffffcb03`d18fca60 : nt!ObpLookupObjectName+0x78f
ffffee8c`be8fb960 fffff803`090e79aa : ffffcb03`00000001 00000000`00000000 00000000`00000001 00000000`00000000 : nt!ObOpenObjectByNameEx+0x201
ffffee8c`be8fbaa0 fffff803`090e7599 : 00000008`c3ffe3d0 00000000`00000000 00000008`c3ffe428 00000008`c3ffe3e8 : nt!IopCreateFile+0x3fa
ffffee8c`be8fbb40 fffff803`08c82e98 : 00000000`000017e8 00000000`00400004 00000000`00000000 00000180`a2a2c4d0 : nt!NtCreateFile+0x79
ffffee8c`be8fbbd0 00007ffe`4d35cb04 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000008`c3ffe358 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`4d35cb04
THREAD_SHA1_HASH_MOD_FUNC: c59bac712340d40778e7452ded139852d421e393
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 9672ea4e199b22e73dd7448e2eaf42a5fb40e42b
THREAD_SHA1_HASH_MOD: 6f9201a36e99e0303f196d6d14f07d17f43be59c
FAULT_INSTR_CODE: 40508b48
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: volmgr!VmpQueryUniqueIdInternal+37
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: volmgr
IMAGE_NAME: volmgr.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 211cef76
IMAGE_VERSION: 10.0.18362.476
STACK_COMMAND: .cxr 0xffffee8cbe8f9ea0 ; kb
BUCKET_ID_FUNC_OFFSET: 37
FAILURE_BUCKET_ID: 0x23_volmgr!VmpQueryUniqueIdInternal
BUCKET_ID: 0x23_volmgr!VmpQueryUniqueIdInternal
PRIMARY_PROBLEM_CLASS: 0x23_volmgr!VmpQueryUniqueIdInternal
TARGET_TIME: 2019-12-21T20:28:06.000Z
OSBUILD: 18362
OSSERVICEPACK: 1
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1970-06-25 18:20:15
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: a609
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x23_volmgr!vmpqueryuniqueidinternal
FAILURE_ID_HASH: {d0e2cbbb-f6c9-659f-dade-4145ab43ee0a}
Followup: MachineOwner
---------