UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault). The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
use .trap on that value
Else
.trap on the appropriate frame will show where the trap was taken
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: ffff9b00eb24b0b0
Arg3: 00000000377a5ba0
Arg4: fffff80668a9c258
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4296
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on RED-PC
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 89737
Key : Analysis.Memory.CommitPeak.Mb
Value: 74
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: 19h1_release
Key : WER.OS.Timestamp
Value: 2019-03-18T12:02:00Z
Key : WER.OS.Version
Value: 10.0.18362.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 7f
BUGCHECK_P1: 8
BUGCHECK_P2: ffff9b00eb24b0b0
BUGCHECK_P3: 377a5ba0
BUGCHECK_P4: fffff80668a9c258
TRAP_FRAME: ffff9b00eb24b0b0 -- (.trap 0xffff9b00eb24b0b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000001021004
rdx=ffffe10b377a5c60 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80668a9c258 rsp=00000000377a5ba0 rbp=ffffe10b377a5bd1
r8=0000000000000007 r9=0000000000000901 r10=ffffd10f2e66a000
r11=ffffe10b377a5a20 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nvlddmkm+0x32c258:
fffff806`68a9c258 415f pop r15
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: dwm.exe
BAD_STACK_POINTER: 00000000377a5ba0
STACK_TEXT:
ffff9b00`eb24af68 fffff806`4a1d47e9 : 00000000`0000007f 00000000`00000008 ffff9b00`eb24b0b0 00000000`377a5ba0 : nt!KeBugCheckEx
ffff9b00`eb24af70 fffff806`4a1cf643 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffff9b00`eb24b0b0 fffff806`68a9c258 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0x2c3
00000000`377a5ba0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nvlddmkm+0x32c258
SYMBOL_NAME: nvlddmkm+32c258
MODULE_NAME: nvlddmkm
IMAGE_NAME: nvlddmkm.sys
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 32c258
FAILURE_BUCKET_ID: 0x7f_8_STACKPTR_ERROR_nvlddmkm!unknown_function
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {a6a9f385-3944-d532-1786-ddbcad5847ca}
Followup: MachineOwner
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: ffff8050f8e96005, Address of the instruction which caused the bugcheck
Arg3: ffffd481f8066d10, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2015
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on RED-PC
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 6202
Key : Analysis.Memory.CommitPeak.Mb
Value: 82
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: 19h1_release
Key : WER.OS.Timestamp
Value: 2019-03-18T12:02:00Z
Key : WER.OS.Version
Value: 10.0.18362.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: ffff8050f8e96005
BUGCHECK_P3: ffffd481f8066d10
BUGCHECK_P4: 0
CONTEXT: ffffd481f8066d10 -- (.cxr 0xffffd481f8066d10)
rax=ffff803a50510240 rbx=ffff802944446330 rcx=0000000221ee0048
rdx=0000000000000000 rsi=0000000000000318 rdi=0000000000000000
rip=ffff8050f8e96005 rsp=ffffd481f8067700 rbp=ffffd481f8067a80
r8=ffffd481f8067500 r9=0000000000000000 r10=ffffab0a620c1e60
r11=ffffd481f80674c0 r12=0000000000000001 r13=0000000000000001
r14=ffff803a50510240 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246
win32kfull!xxxRealInternalGetMessage+0x1d85:
ffff8050`f8e96005 663b7e1a cmp di,word ptr [rsi+1Ah] ds:002b:00000000`00000332=????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: Discord.exe
STACK_TEXT:
ffffd481`f8067700 ffff8050`f8e94207 : ffffd481`f8067920 00000000`00000000 00000000`00000000 00000000`0f8ce5c0 : win32kfull!xxxRealInternalGetMessage+0x1d85
ffffd481`f80678e0 fffff804`2a5d4215 : 00000000`0f8ce5c0 ffffab0a`69756080 ffffd481`f80679a8 00000000`0a54c000 : win32kfull!NtUserPeekMessage+0x157
ffffd481`f8067990 00007fff`d21cfd34 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
00000000`0f8ce588 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`d21cfd34
SYMBOL_NAME: win32kfull!xxxRealInternalGetMessage+1d85
MODULE_NAME: win32kfull
IMAGE_NAME: win32kfull.sys
IMAGE_VERSION: 10.0.18362.1049
STACK_COMMAND: .cxr 0xffffd481f8066d10 ; kb
BUCKET_ID_FUNC_OFFSET: 1d85
FAILURE_BUCKET_ID: 0x3B_c0000005_win32kfull!xxxRealInternalGetMessage
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {39ebc5cc-b3eb-e530-cf38-b3c453009f0b}
Followup: MachineOwner
---------
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff802729ca887, The address that the exception occurred at
Arg3: ffffbe83ecbd3b88, Parameter 0 of the exception
Arg4: ffffe6008a667930, Parameter 1 of the exception
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2202
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on RED-PC
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 17028
Key : Analysis.Memory.CommitPeak.Mb
Value: 80
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: 19h1_release
Key : WER.OS.Timestamp
Value: 2019-03-18T12:02:00Z
Key : WER.OS.Version
Value: 10.0.18362.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff802729ca887
BUGCHECK_P3: ffffbe83ecbd3b88
BUGCHECK_P4: ffffe6008a667930
WRITE_ADDRESS: fffff80272d713b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80272c283b8: Unable to get Flags value from nt!KdVersionBlock
fffff80272c283b8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffe6008a667930
EXCEPTION_PARAMETER1: ffffbe83ecbd3b88
EXCEPTION_PARAMETER2: ffffe6008a667930
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
BAD_STACK_POINTER: ffffe6008a667088
STACK_TEXT:
ffffe600`8a667088 fffff802`72aa5d97 : 00000000`0000001e ffffffff`c0000005 fffff802`729ca887 ffffbe83`ecbd3b88 : nt!KeBugCheckEx
ffffe600`8a667090 fffff802`729da576 : fffff802`729ca887 fffff802`7290c1fb ffffbe83`ecbd3dc0 ffffe600`8a667930 : nt!KiFatalFilter+0x1f
ffffe600`8a6670d0 fffff802`7299d989 : fffff802`00000002 ffffbe83`ecbd4fd0 ffffbe83`ecbcf000 ffffbe83`ecbd6000 : nt!KeExpandKernelStackAndCalloutInternal$filt$0+0x16
ffffe600`8a667110 fffff802`729cb78f : ffffbe83`ecbd4fd0 ffffe600`8a6676f0 00000000`00000000 00000000`0010001f : nt!_C_specific_handler+0xa9
ffffe600`8a667180 fffff802`72889555 : 00000000`00000000 00000000`00000000 ffffe600`8a6676f0 00007fff`ffff0000 : nt!RtlpExecuteHandlerForException+0xf
ffffe600`8a6671b0 fffff802`7288d66e : ffffbe83`ecbd3b88 ffffe600`8a667e30 ffffbe83`ecbd3b88 ffff8f84`80608200 : nt!RtlDispatchException+0x4a5
ffffe600`8a667900 fffff802`729c3812 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x16e
ffffe600`8a667fb0 fffff802`729c37e0 : fffff802`729d4916 00000000`00000001 00000000`00000001 ffff8f84`8eb19cc0 : nt!KxExceptionDispatchOnExceptionStack+0x12
ffffbe83`ecbd3a48 fffff802`729d4916 : 00000000`00000001 00000000`00000001 ffff8f84`8eb19cc0 00000000`00000009 : nt!KiExceptionDispatchOnExceptionStackContinue
ffffbe83`ecbd3a50 fffff802`729d06a0 : 00000000`000000f0 00000000`00000001 00000000`abef0002 00000011`8edd4a00 : nt!KiExceptionDispatch+0x116
ffffbe83`ecbd3c30 fffff802`729ca887 : 00000000`00000000 fffff802`75970b9d 00000000`00000004 00000000`00000002 : nt!KiGeneralProtectionFault+0x320
ffffbe83`ecbd3dc0 fffff802`75970b9d : 00000000`00000004 00000000`00000002 00000000`00000004 ffffbe83`ecbd3f80 : nt!ExpInterlockedPopEntrySListFault
ffffbe83`ecbd3dd0 fffff802`75972cf2 : 00000000`0000011a ffff8f84`8c5434e0 ffff8f84`00000915 ffff8f84`00000000 : tcpip!WfpProcessInTransportStackIndication+0x12d
ffffbe83`ecbd4270 fffff802`759a5911 : ffff8f84`8dcb3e00 ffffbe83`ecbd44d0 ffffbe83`ecbd4488 ffff8f84`8988e4c0 : tcpip!InetInspectReceiveDatagram+0x2c2
ffffbe83`ecbd43d0 fffff802`759a4d3e : ffff8f84`894af040 ffff8f84`8dcb3e71 ffffbe83`ecbd4910 00000000`00000000 : tcpip!UdpDeliverDatagrams+0x181
ffffbe83`ecbd4810 fffff802`759a49c0 : ffff8f84`894af040 00000000`00000000 ffff8f84`807cf008 ffffbe83`ecbd4f69 : tcpip!UdpReceiveDatagrams+0x36e
ffffbe83`ecbd4c00 fffff802`7594a46a : 00000000`00000000 00000000`00000000 ffff8f84`85eecc60 00000000`00000000 : tcpip!UdpNlClientReceiveDatagrams+0x10
ffffbe83`ecbd4c30 fffff802`75961a3a : ffff8f84`80be7420 ffff8f84`85ecc850 fffff802`75951211 ffffbe83`ecbd5001 : tcpip!IpFlcReceivePreValidatedPackets+0xc4a
ffffbe83`ecbd4ea0 fffff802`7284f698 : ffffbe83`ecbd5180 00000000`00000002 ffff8f84`805cd040 ffffbe83`ecbd5108 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0x16a
ffffbe83`ecbd4fd0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0x78
SYMBOL_NAME: tcpip!WfpProcessInTransportStackIndication+12d
MODULE_NAME: tcpip
IMAGE_NAME: tcpip.sys
IMAGE_VERSION: 10.0.18362.1049
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 12d
FAILURE_BUCKET_ID: 0x1E_c0000005_STACKPTR_ERROR_tcpip!WfpProcessInTransportStackIndication
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {935035f8-2c56-8f82-0a1d-4678ab5c5684}
Followup: MachineOwner
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff803578ad967, Address of the instruction which caused the bugcheck
Arg3: ffff938b7a5d65a0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3624
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on RED-PC
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 36060
Key : Analysis.Memory.CommitPeak.Mb
Value: 87
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: 19h1_release
Key : WER.OS.Timestamp
Value: 2019-03-18T12:02:00Z
Key : WER.OS.Version
Value: 10.0.18362.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff803578ad967
BUGCHECK_P3: ffff938b7a5d65a0
BUGCHECK_P4: 0
CONTEXT: ffff938b7a5d65a0 -- (.cxr 0xffff938b7a5d65a0)
rax=0000000000000000 rbx=ffffbf0333026be0 rcx=ffffe40c0b7a8590
rdx=0000000056706e50 rsi=ffffe40c05ccede0 rdi=ffffbf0333026be0
rip=fffff803578ad967 rsp=ffff938b7a5d6f98 rbp=ffff938b7a5d7201
r8=ffff938b7a5d7100 r9=7ffff80357c5f0a0 r10=7ffffffffffffffc
r11=ffff938b7a5d70e8 r12=ffff800000000000 r13=0000000000000000
r14=0000000000000002 r15=0000000000000004
iopl=0 nv up ei ng nz ac pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050292
nt!ExFreeHeapPool+0x17:
fffff803`578ad967 0f29b424c0000000 movaps xmmword ptr [rsp+0C0h],xmm6 ss:0018:ffff938b`7a5d7058=ffffe40c0b7a89680000000000000000
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: Razer Synapse Service.exe
STACK_TEXT:
ffff938b`7a5d6f98 fffff803`57b6e0a9 : 00000000`00000000 ffffe40c`0a266040 00000000`00000002 ffffbf03`33026be0 : nt!ExFreeHeapPool+0x17
ffff938b`7a5d70b8 fffff803`57f32bcf : ffff938b`7a5d7201 ffffe40c`00000000 ffffe40c`05ccede0 fffff803`00000000 : nt!ExFreePool+0x9
ffff938b`7a5d70e8 fffff803`5797456f : fffff803`57c61220 ffffe40c`05ccede0 fffff803`57c61220 fffff803`57c61220 : nt!PnpDereferenceNotify+0x87
ffff938b`7a5d7118 fffff803`57f457cb : ffffe40c`03e09530 ffff938b`7a5d7248 ffffe40c`05ccede0 ffff9a81`81786180 : nt!PnpUnregisterPlugPlayNotification+0x7b
ffff938b`7a5d7168 fffff803`5a59abca : 00000000`00000004 00000000`00000002 00000000`00000000 ffffbf03`33026be0 : nt!IoUnregisterPlugPlayNotificationEx+0xb
ffff938b`7a5d7198 fffff803`5a599675 : ffffe40c`03e09530 00000000`00000000 ffffe40c`05ccede0 ffffe40c`03e09530 : Wdf01000!FxIoTargetRemote::UnregisterForPnpNotification+0x1e [minkernel\wdf\framework\shared\targets\general\km\fxiotargetremotekm.cpp @ 195]
ffff938b`7a5d71c8 fffff803`5a595ba8 : 00001bf3`fc1f6a00 ffffe40c`060d6200 00000000`00000000 ffffe40c`05ccede0 : Wdf01000!FxIoTargetRemote::Close+0x311 [minkernel\wdf\framework\shared\targets\general\fxiotargetremote.cpp @ 648]
ffff938b`7a5d7288 fffff803`72a21e41 : ffffe40c`03e09530 00001bf3`fc1f6ac8 ffffe40c`064952c0 ffffe40c`0a266360 : Wdf01000!imp_WdfIoTargetClose+0x78 [minkernel\wdf\framework\shared\targets\general\fxiotargetapi.cpp @ 635]
ffff938b`7a5d72c8 ffffe40c`03e09530 : 00001bf3`fc1f6ac8 ffffe40c`064952c0 ffffe40c`0a266360 fffff803`578a1a5d : RzDev_0C00+0x1e41
ffff938b`7a5d72d0 00001bf3`fc1f6ac8 : ffffe40c`064952c0 ffffe40c`0a266360 fffff803`578a1a5d 00000000`00000000 : 0xffffe40c`03e09530
ffff938b`7a5d72d8 ffffe40c`064952c0 : ffffe40c`0a266360 fffff803`578a1a5d 00000000`00000000 fffff803`6ea433ea : 0x00001bf3`fc1f6ac8
ffff938b`7a5d72e0 ffffe40c`0a266360 : fffff803`578a1a5d 00000000`00000000 fffff803`6ea433ea 00000000`00000000 : 0xffffe40c`064952c0
ffff938b`7a5d72e8 fffff803`578a1a5d : 00000000`00000000 fffff803`6ea433ea 00000000`00000000 ffffe40b`fa8d10c0 : 0xffffe40c`0a266360
ffff938b`7a5d72f0 ffff938b`7a5d7430 : 00000000`00000001 ffffe40c`00000000 fffff803`00000000 00000000`00000001 : nt!ExAcquirePushLockExclusiveEx+0xed
ffff938b`7a5d7330 00000000`00000001 : ffffe40c`00000000 fffff803`00000000 00000000`00000001 ffff9a81`81786100 : 0xffff938b`7a5d7430
ffff938b`7a5d7338 ffffe40c`00000000 : fffff803`00000000 00000000`00000001 ffff9a81`81786100 fffff803`579c9b00 : 0x1
ffff938b`7a5d7340 fffff803`00000000 : 00000000`00000001 ffff9a81`81786100 fffff803`579c9b00 00000000`00000000 : 0xffffe40c`00000000
ffff938b`7a5d7348 00000000`00000001 : ffff9a81`81786100 fffff803`579c9b00 00000000`00000000 00000000`00000000 : 0xfffff803`00000000
ffff938b`7a5d7350 ffff9a81`81786100 : fffff803`579c9b00 00000000`00000000 00000000`00000000 00000000`faf82980 : 0x1
ffff938b`7a5d7358 fffff803`579c9b00 : 00000000`00000000 00000000`00000000 00000000`faf82980 ffffe40c`068cf080 : 0xffff9a81`81786100
ffff938b`7a5d7360 00001bf4`0507d788 : ffff938b`7a5d7400 fffff803`6ea41890 00000000`c0000001 ffffe40c`88883140 : nt!SwapContext+0x140
ffff938b`7a5d73a0 ffff938b`7a5d7400 : fffff803`6ea41890 00000000`c0000001 ffffe40c`88883140 00000000`00000000 : 0x00001bf4`0507d788
ffff938b`7a5d73a8 fffff803`6ea41890 : 00000000`c0000001 ffffe40c`88883140 00000000`00000000 00000000`00000000 : 0xffff938b`7a5d7400
ffff938b`7a5d73b0 00000000`c0000001 : ffffe40c`88883140 00000000`00000000 00000000`00000000 00000000`00000000 : RzCommon+0x1890
ffff938b`7a5d73b8 ffffe40c`88883140 : 00000000`00000000 00000000`00000000 00000000`00000000 ffff938b`7a5d7430 : 0xc0000001
ffff938b`7a5d73c0 00000000`00000000 : 00000000`00000000 00000000`00000000 ffff938b`7a5d7430 00001bf4`0507d788 : 0xffffe40c`88883140
SYMBOL_NAME: nt!ExFreePool+9
IMAGE_NAME: Pool_Corruption
IMAGE_VERSION: 10.0.18362.1049
MODULE_NAME: Pool_Corruption
STACK_COMMAND: .cxr 0xffff938b7a5d65a0 ; kb
BUCKET_ID_FUNC_OFFSET: 9
FAILURE_BUCKET_ID: 0x3B_c0000005_nt!ExFreePool
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {c9913766-80de-cdf5-a1a8-15c856d3f064}
Followup: Pool_corruption
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80461c67a22, Address of the instruction which caused the bugcheck
Arg3: ffffdd01fa1b3930, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2624
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on RED-PC
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 15680
Key : Analysis.Memory.CommitPeak.Mb
Value: 80
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: 19h1_release
Key : WER.OS.Timestamp
Value: 2019-03-18T12:02:00Z
Key : WER.OS.Version
Value: 10.0.18362.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff80461c67a22
BUGCHECK_P3: ffffdd01fa1b3930
BUGCHECK_P4: 0
CONTEXT: ffffdd01fa1b3930 -- (.cxr 0xffffdd01fa1b3930)
rax=0000000000000000 rbx=ffff96800bdd5360 rcx=ffdfb701aa08d620
rdx=0a000003f4712921 rsi=8000000000000000 rdi=ffdfb701aa08d620
rip=fffff80461c67a22 rsp=fffff60ae8bb6fa0 rbp=0000000000140000
r8=0000000020000006 r9=fffffa64854bdc20 r10=000000000033954d
r11=fffff60ae8bb6fa0 r12=0000000000000005 r13=7fffffffffffffff
r14=fffffa64854bdc20 r15=000000000000000f
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246
nt!MiReadyStandbyPageForActive+0xc2:
fffff804`61c67a22 488917 mov qword ptr [rdi],rdx ds:002b:ffdfb701`aa08d620=????????????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: EpicGamesLauncher.exe
BAD_STACK_POINTER: ffffdd01fa1b2ff8
STACK_TEXT:
fffff60a`e8bb6fa0 fffff804`61c678e6 : ffff9680`0bdd5360 00000000`0000000c 00000000`0000000c ffffb701`aa08d620 : nt!MiReadyStandbyPageForActive+0xc2
fffff60a`e8bb6fd0 fffff804`61c656d5 : 00000000`00000001 ffff9680`085cb2b0 fffffa64`854bdc00 00000000`00000000 : nt!MiUnlinkStandbyBatch+0x186
fffff60a`e8bb7010 fffff804`61c63abf : 00000000`0000fac0 00000000`8fac0000 00000000`00040000 ffffa20a`cb7b5400 : nt!MmCheckCachedPageStates+0x1145
fffff60a`e8bb7210 fffff804`621e29d9 : 00000000`8fac0000 00000000`00000000 00000000`00000001 fffff60a`e8bb7320 : nt!CcFetchDataForRead+0x8f
fffff60a`e8bb7270 fffff804`61c63865 : ffffa20a`cb7b80d8 00000000`8fac0000 00000000`00040000 ffffa20a`cc386001 : nt!CcMapAndCopyFromCache+0xd9
fffff60a`e8bb7310 fffff804`661f2009 : 00000000`00000000 00000000`00000000 00000000`00400000 ffffa20a`cb6969c8 : nt!CcCopyReadEx+0x135
fffff60a`e8bb73b0 fffff804`662071da : 00000001`0111051f ffffa20a`ca202370 fffff60a`e8bb7610 ffffa20a`cf83b010 : Ntfs!NtfsCachedRead+0x179
fffff60a`e8bb7420 fffff804`6620641c : fffff60a`e8bb7620 ffffa20a`cf83b010 fffff60a`e8bb7620 ffffa20a`cb6969c8 : Ntfs!NtfsCommonRead+0xbaa
fffff60a`e8bb75e0 fffff804`61c99db9 : ffffa20a`cc21f9a0 ffffa20a`cf83b010 ffffa20a`cf83b758 00000000`00000000 : Ntfs!NtfsFsdRead+0x20c
fffff60a`e8bb76a0 fffff804`64b155de : 00000000`00000000 fffff60a`e8bb7780 ffffa20a`cf83b010 fffff60a`e8bb7790 : nt!IofCallDriver+0x59
fffff60a`e8bb76e0 fffff804`64b13f16 : fffff60a`e8bb7780 00000000`00000000 00000000`00000001 fffff60a`e8bb7820 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x15e
fffff60a`e8bb7760 fffff804`61c99db9 : ffffa20a`cf83b010 00000000`000007d8 fffff60a`00000000 fffff60a`e8bb7900 : FLTMGR!FltpDispatch+0xb6
fffff60a`e8bb77c0 fffff804`62206085 : 00000000`00000000 ffffa20a`ca202370 ffffa20a`ca2023c0 ffffa20a`ca202370 : nt!IofCallDriver+0x59
fffff60a`e8bb7800 fffff804`6220225f : ffffa20a`00000000 00000000`00000000 00000000`00000000 fffff60a`e8bb7a80 : nt!IopSynchronousServiceTail+0x1a5
fffff60a`e8bb78a0 fffff804`61dd4215 : 00000041`5194f2f0 00000000`00000000 00000000`00000000 000001b5`56197b90 : nt!NtReadFile+0x59f
fffff60a`e8bb7990 00007ff8`c29fc134 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
00000041`5194e898 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`c29fc134
SYMBOL_NAME: nt!MiReadyStandbyPageForActive+c2
MODULE_NAME: nt
IMAGE_VERSION: 10.0.18362.1049
STACK_COMMAND: .cxr 0xffffdd01fa1b3930 ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: c2
FAILURE_BUCKET_ID: 0x3B_c0000005_STACKPTR_ERROR_nt!MiReadyStandbyPageForActive
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {800e382a-6b78-26e4-1cbd-382bbdcbefe3}
Followup: MachineOwner
---------