UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault). The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
use .trap on that value
Else
.trap on the appropriate frame will show where the trap was taken
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: ffffab81dfacd1b0
Arg3: 000000000000c824
Arg4: fffff8017764edc9
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
SYSTEM_MANUFACTURER: Gigabyte Technology Co., Ltd.
SYSTEM_PRODUCT_NAME: Default string
SYSTEM_SKU: Default string
SYSTEM_VERSION: Default string
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: F23
BIOS_DATE: 06/07/2017
BASEBOARD_MANUFACTURER: Gigabyte Technology Co., Ltd.
BASEBOARD_PRODUCT: X99-UD4-CF
BASEBOARD_VERSION: Default string
DUMP_TYPE: 2
BUGCHECK_P1: 8
BUGCHECK_P2: ffffab81dfacd1b0
BUGCHECK_P3: c824
BUGCHECK_P4: fffff8017764edc9
BUGCHECK_STR: 0x7f_8
TRAP_FRAME: ffffab81dfacd1b0 -- (.trap 0xffffab81dfacd1b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000028 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8017764edc9 rsp=000000000000c824 rbp=ffffc28b8b2d86f0
r8=00000000ffffffff r9=7fff9502fb0585f8 r10=7ffffffffffffffc
r11=ffffc28b8b2d80e0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!CcMapAndCopyInToCache+0x789:
fffff801`7764edc9 0085c00f8825 add byte ptr [rbp+25880FC0h],al ss:0018:ffffc28b`b0b596b0=??
Resetting default scope
CPU_COUNT: c
CPU_MHZ: ce4
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 3f
CPU_STEPPING: 2
CPU_MICROCODE: 6,3f,2,0 (F,M,S,R) SIG: 40'00000000 (cache) 40'00000000 (init)
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
PROCESS_NAME: esrv_svc.exe
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 01-22-2020 23:15:51.0299
ANALYSIS_VERSION: 10.0.18362.1 x86fre
BAD_STACK_POINTER: 000000000000c824
MISALIGNED_IP:
nt!CcMapAndCopyInToCache+789
fffff801`7764edc9 0085c00f8825 add byte ptr [rbp+25880FC0h],al
LAST_CONTROL_TRANSFER: from fffff801777d32e9 to fffff801777c14e0
STACK_TEXT:
ffffab81`dfacd068 fffff801`777d32e9 : 00000000`0000007f 00000000`00000008 ffffab81`dfacd1b0 00000000`0000c824 : nt!KeBugCheckEx
ffffab81`dfacd070 fffff801`777ce145 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffab81`dfacd1b0 fffff801`7764edc9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0x2c5
00000000`0000c824 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!CcMapAndCopyInToCache+0x789
CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
fffff8017764eb04 - nt!CcMapAndCopyInToCache+4c4
[ 19:bc ]
1 error : !nt (fffff8017764eb04)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: ONE_BYTE
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BYTE
BUCKET_ID: MEMORY_CORRUPTION_ONE_BYTE
PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_ONE_BYTE
TARGET_TIME: 2020-01-17T21:32:58.000Z
OSBUILD: 18362
OSSERVICEPACK: 592
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1972-08-22 03:24:00
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 2623
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:memory_corruption_one_byte
FAILURE_ID_HASH: {ad110d6a-3b33-2c0a-c931-570eae1ba92d}
Followup: memory_corruption
---------
ATTEMPTED_EXECUTE_OF_NOEXECUTE_MEMORY (fc)
An attempt was made to execute non-executable memory. The guilty driver
is on the stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: fffff8060bc8fd74, Virtual address for the attempted execute.
Arg2: 890000083c170963, PTE contents.
Arg3: ffff8486ba5d8630, (reserved)
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
SYSTEM_MANUFACTURER: Gigabyte Technology Co., Ltd.
SYSTEM_PRODUCT_NAME: Default string
SYSTEM_SKU: Default string
SYSTEM_VERSION: Default string
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: F23
BIOS_DATE: 06/07/2017
BASEBOARD_MANUFACTURER: Gigabyte Technology Co., Ltd.
BASEBOARD_PRODUCT: X99-UD4-CF
BASEBOARD_VERSION: Default string
DUMP_TYPE: 2
BUGCHECK_P1: fffff8060bc8fd74
BUGCHECK_P2: 890000083c170963
BUGCHECK_P3: ffff8486ba5d8630
BUGCHECK_P4: 2
CPU_COUNT: c
CPU_MHZ: ce4
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 3f
CPU_STEPPING: 2
CPU_MICROCODE: 6,3f,2,0 (F,M,S,R) SIG: 40'00000000 (cache) 40'00000000 (init)
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: 0xFC
PROCESS_NAME: cheatengine-x86_64.exe
CURRENT_IRQL: 2
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 01-22-2020 23:15:55.0186
ANALYSIS_VERSION: 10.0.18362.1 x86fre
TRAP_FRAME: ffff8486ba5d8630 -- (.trap 0xffff8486ba5d8630)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000089 rbx=0000000000000000 rcx=00000000000000c8
rdx=fffffaa083eddc88 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8060bc8fd74 rsp=ffff8486ba5d87c8 rbp=fffffaa083739fe8
r8=0000000000000001 r9=fffffaa083eddc88 r10=fffffaa083e91c88
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
clipsp+0x8fd74:
fffff806`0bc8fd74 4d006100 add byte ptr [r9],r12b ds:fffffaa0`83eddc88=88
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80607254aac to fffff806071c14e0
STACK_TEXT:
ffff8486`ba5d8348 fffff806`07254aac : 00000000`000000fc fffff806`0bc8fd74 89000008`3c170963 ffff8486`ba5d8630 : nt!KeBugCheckEx
ffff8486`ba5d8350 fffff806`0700d498 : fffff806`0bc8fd74 fffffdfe`ff7fb000 00000000`00000000 ffff8486`ba5d8630 : nt!MiCheckSystemNxFault+0x1298a0
ffff8486`ba5d8390 fffff806`07072eef : ffff8486`ba5d8f10 00000000`00000011 00000000`00000000 fffff806`0bc8fd74 : nt!MiSystemFault+0x728
ffff8486`ba5d8490 fffff806`071cf520 : 00000000`0099b4d1 00000000`00000000 00000000`00000000 fffffae0`724b4b27 : nt!MmAccessFault+0x34f
ffff8486`ba5d8630 fffff806`0bc8fd74 : 00000000`0000002e fffffaa0`82e4bcf0 fffff806`07042eb8 ffff8486`ba5d8859 : nt!KiPageFault+0x360
ffff8486`ba5d87c8 00000000`0000002e : fffffaa0`82e4bcf0 fffff806`07042eb8 ffff8486`ba5d8859 00000000`0000002f : clipsp+0x8fd74
ffff8486`ba5d87d0 fffffaa0`82e4bcf0 : fffff806`07042eb8 ffff8486`ba5d8859 00000000`0000002f fffffaa0`82e4bcf0 : 0x2e
ffff8486`ba5d87d8 fffff806`07042eb8 : ffff8486`ba5d8859 00000000`0000002f fffffaa0`82e4bcf0 fffffaa0`80200280 : 0xfffffaa0`82e4bcf0
ffff8486`ba5d87e0 fffff806`07042d79 : fffffaa0`80200280 fffffaa0`00000000 fffffaa0`00000000 00000000`00000000 : nt!RtlpHpVsChunkSplit+0x48
ffff8486`ba5d88b0 fffff806`0703330e : ffffcf89`0000002f fffff806`000002d0 00000000`000002d0 fffffaa0`80200000 : nt!RtlpHpVsContextAllocateInternal+0x3c9
ffff8486`ba5d8920 fffff806`0736f06d : fffffaa0`00000021 00000000`00000000 00000000`00000000 00000000`000002b4 : nt!ExAllocateHeapPool+0xc0e
ffff8486`ba5d8a60 fffffae0`724ed01f : fffffaa0`80602080 ffff8486`ba5d8cd0 00000000`6f746547 ffff8486`00000000 : nt!ExAllocatePoolWithTag+0x5d
ffff8486`ba5d8ab0 fffffae0`727d69a5 : fffffaa0`6f746547 fffffae0`724647de ffff8486`00000021 fffffae0`72464912 : win32kfull!Win32AllocPoolImpl+0x2f
ffff8486`ba5d8b80 fffffae0`724d4328 : 00000000`fffffffe 00000000`00000101 ffff8486`ba5d8ef0 fffffaa0`80914000 : win32kbase!AllocThreadBufferWithTag+0x55
ffff8486`ba5d8bb0 fffffae0`72451f75 : fffffaa0`000000a0 fffffaa0`83706010 ffff8486`00d1b499 fffffaa0`83706648 : win32kfull!EngTextOut+0x498
ffff8486`ba5d90b0 fffffae0`7245004b : 00000000`0023f300 00000000`00000000 ffff8486`ba5d9978 00000000`00000000 : win32kfull!GreExtTextOutWLocked+0x1d25
ffff8486`ba5d9860 fffffae0`7244eb1a : 00000000`00000007 ffffcf89`6e4b1980 ffff8486`00fffff7 fffffaa0`00d1b499 : win32kfull!GreBatchTextOut+0x21b
ffff8486`ba5d9900 fffffae0`7244e804 : 00000000`00000007 ffffcf89`6e4b1980 00000000`00000000 00000000`80000008 : win32kfull!NtGdiFlushUserBatchInternal+0x30a
ffff8486`ba5d9b80 fffffae0`727d62db : 00000000`00000000 ffffffff`af010ca4 ffff8486`ba5d9ec0 fffffae0`72445cda : win32kfull!NtGdiFlushUserBatch+0x24
ffff8486`ba5d9bc0 fffffae0`72e0103b : ffffcf89`6e4b1980 fffffae0`724f760f 00000000`021fe090 00000000`00000000 : win32kbase!W32CalloutDispatch+0x8b
ffff8486`ba5d9de0 fffff806`075cd6f1 : 00000000`00000000 00000000`00000007 00007ffa`f4250000 00000000`00000000 : win32k!W32CalloutDispatchThunk+0xb
ffff8486`ba5d9e10 fffff806`071d2c18 : 00000000`000025ec ffff8486`ba5d9ec0 00000000`00000020 fffffae0`72e026ba : nt!PsInvokeWin32Callout+0x51
ffff8486`ba5d9e40 00007ffa`f33517e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceGdiTebAccess+0x31
00000000`021fe9d8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`f33517e4
THREAD_SHA1_HASH_MOD_FUNC: fadc065f09adffb9a261490d57ccb90636264956
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 6a2026d14acb4b386c9393a44d10c4fb7146db66
THREAD_SHA1_HASH_MOD: 897a46c78874969b6e1c2aec4d284e5a78f73d4d
FOLLOWUP_IP:
clipsp+8fd74
fffff806`0bc8fd74 4d006100 add byte ptr [r9],r12b
FAULT_INSTR_CODE: 61004d
SYMBOL_STACK_INDEX: 5
SYMBOL_NAME: clipsp+8fd74
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: clipsp
IMAGE_NAME: clipsp.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 5d8991ba
IMAGE_VERSION: 10.0.18362.387
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 8fd74
FAILURE_BUCKET_ID: 0xFC_clipsp!unknown_function
BUCKET_ID: 0xFC_clipsp!unknown_function
PRIMARY_PROBLEM_CLASS: 0xFC_clipsp!unknown_function
TARGET_TIME: 2020-01-17T20:57:48.000Z
OSBUILD: 18362
OSSERVICEPACK: 592
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1972-08-22 03:24:00
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 1cee
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0xfc_clipsp!unknown_function
FAILURE_ID_HASH: {c5d09b32-a3d0-f7d8-4bdd-dfdada19943f}
Followup: MachineOwner
---------
UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault). The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
use .trap on that value
Else
.trap on the appropriate frame will show where the trap was taken
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: ffffbc80e8a0b190
Arg3: fffffd86e83dc67f
Arg4: ffff9181205c6bb0
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
SYSTEM_MANUFACTURER: Gigabyte Technology Co., Ltd.
SYSTEM_PRODUCT_NAME: Default string
SYSTEM_SKU: Default string
SYSTEM_VERSION: Default string
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: F23
BIOS_DATE: 06/07/2017
BASEBOARD_MANUFACTURER: Gigabyte Technology Co., Ltd.
BASEBOARD_PRODUCT: X99-UD4-CF
BASEBOARD_VERSION: Default string
DUMP_TYPE: 2
BUGCHECK_P1: 8
BUGCHECK_P2: ffffbc80e8a0b190
BUGCHECK_P3: fffffd86e83dc67f
BUGCHECK_P4: ffff9181205c6bb0
BUGCHECK_STR: 0x7f_8
TRAP_FRAME: ffffbc80e8a0b190 -- (.trap 0xffffbc80e8a0b190)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000008 rbx=0000000000000000 rcx=ffffa58cd888ac70
rdx=0000000000008000 rsi=0000000000000000 rdi=0000000000000000
rip=ffff9181205c6bb0 rsp=fffffd86e83dc67f rbp=fffffd86e83db340
r8=0000000000008000 r9=0000000000000001 r10=0000000000000001
r11=fffffd86e83db860 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac po cy
ffff9181`205c6bb0 ff ???
Resetting default scope
CPU_COUNT: c
CPU_MHZ: ce4
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 3f
CPU_STEPPING: 2
CPU_MICROCODE: 6,3f,2,0 (F,M,S,R) SIG: 40'00000000 (cache) 40'00000000 (init)
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: HD-Player.exe
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 01-22-2020 23:15:46.0931
ANALYSIS_VERSION: 10.0.18362.1 x86fre
BAD_STACK_POINTER: fffffd86e83dc67f
UNALIGNED_STACK_POINTER: fffffd86e83dc67f
LAST_CONTROL_TRANSFER: from fffff80624fd32e9 to fffff80624fc14e0
STACK_TEXT:
ffffbc80`e8a0b048 fffff806`24fd32e9 : 00000000`0000007f 00000000`00000008 ffffbc80`e8a0b190 fffffd86`e83dc67f : nt!KeBugCheckEx
ffffbc80`e8a0b050 fffff806`24fce145 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffbc80`e8a0b190 ffff9181`205c6bb0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0x2c5
fffffd86`e83dc67f 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xffff9181`205c6bb0
THREAD_SHA1_HASH_MOD_FUNC: 51182814aa74dd715a6e07997b1a1ce85754d2a6
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 2f147299869881e79ac539a1994c25f25ff419a1
THREAD_SHA1_HASH_MOD: 2a7ca9d3ab5386d53fea7498e1d81b9c4a4c036b
FOLLOWUP_IP:
nt!KiDoubleFaultAbort+2c5
fffff806`24fce145 90 nop
FAULT_INSTR_CODE: 6666c390
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!KiDoubleFaultAbort+2c5
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4f6eba0
IMAGE_VERSION: 10.0.18362.592
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 2c5
FAILURE_BUCKET_ID: 0x7f_8_STACKPTR_ERROR_nt!KiDoubleFaultAbort
BUCKET_ID: 0x7f_8_STACKPTR_ERROR_nt!KiDoubleFaultAbort
PRIMARY_PROBLEM_CLASS: 0x7f_8_STACKPTR_ERROR_nt!KiDoubleFaultAbort
TARGET_TIME: 2020-01-17T21:41:48.000Z
OSBUILD: 18362
OSSERVICEPACK: 592
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1972-08-22 03:24:00
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 8be7
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x7f_8_stackptr_error_nt!kidoublefaultabort
FAILURE_ID_HASH: {c5b9990d-856b-1bb5-7662-4621e5941c84}
Followup: MachineOwner
---------