*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80030815173, Address of the instruction which caused the bugcheck
Arg3: ffffae8e5c9e18a0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 9343
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-70T822T
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 19700
Key : Analysis.Memory.CommitPeak.Mb
Value: 80
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff80030815173
BUGCHECK_P3: ffffae8e5c9e18a0
BUGCHECK_P4: 0
CONTEXT: ffffae8e5c9e18a0 -- (.cxr 0xffffae8e5c9e18a0)
rax=00000000ffffffff rbx=0000008000000000 rcx=0000008000000000
rdx=0000000000000008 rsi=ffff8b850256e330 rdi=00000000000000e3
rip=fffff80030815173 rsp=ffffae8e5c9e22a0 rbp=ffff8b84e2afb0c0
r8=0000000000000001 r9=0000000000000000 r10=0000fffff800308b
r11=ffffcc7b47600000 r12=0000000000000000 r13=00000000000000a8
r14=ffff8b850256e330 r15=0000008000000000
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050286
nt!PspDereferenceQuotaBlock+0x1b:
fffff800`30815173 f00fc18100020000 lock xadd dword ptr [rcx+200h],eax ds:002b:00000080`00000200=????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: chrome.exe
STACK_TEXT:
ffffae8e`5c9e22a0 fffff800`307fb19f : ffff8b85`0256e350 ffff8b85`0256e330 00000000`000000e3 fffff800`3044caf2 : nt!PspDereferenceQuotaBlock+0x1b
ffffae8e`5c9e22d0 fffff800`307faef8 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObpFreeObject+0x24f
ffffae8e`5c9e2330 fffff800`30461277 : 00000000`00000000 00000000`00000000 ffffae8e`5c9e2600 ffff8b85`0256e380 : nt!ObpRemoveObjectRoutine+0x88
ffffae8e`5c9e2390 fffff800`3046119e : ffff8b84`fd732a70 00000000`00000000 00000000`00000000 01000000`00100000 : nt!ObfDereferenceObjectWithTag+0xc7
ffffae8e`5c9e23d0 fffff800`30800c76 : ffffae8e`5c9e2600 ffff8b84`fbe1a2c0 ffff8b84`fd732a40 00000000`00000000 : nt!HalPutDmaAdapter+0xe
ffffae8e`5c9e2400 fffff800`307faef0 : ffffae8e`5c9e2609 00000000`00000000 ffff8b84`e2afcf00 ffff8b84`fbe1a2c0 : nt!IopDeleteFile+0x226
ffffae8e`5c9e2480 fffff800`30461277 : 00000000`00000000 00000000`00000000 ffffae8e`5c9e2609 ffff8b84`fd732a70 : nt!ObpRemoveObjectRoutine+0x80
ffffae8e`5c9e24e0 fffff800`3082887e : ffff8b84`e2afcf00 00000000`00000000 00000000`00000000 ffff8b84`e2afcf00 : nt!ObfDereferenceObjectWithTag+0xc7
ffffae8e`5c9e2520 fffff800`307d5f55 : ffff8b84`f2b4e098 fffff800`30461569 ffff8b84`f2b4e060 00000000`00000000 : nt!ObCloseHandleTableEntry+0x29e
ffffae8e`5c9e2660 fffff800`307d823d : ffff8b84`f2b4e060 ffff8b84`fb2c0080 ffffffff`ffffff01 ffff8b84`ff1e34d8 : nt!ExSweepHandleTable+0xd5
ffffae8e`5c9e2710 fffff800`3085d6dc : ffffffff`ffffffff ffff8b84`ff1e3080 ffffae8e`5c9e2760 fffff800`308655dc : nt!ObKillProcess+0x35
ffffae8e`5c9e2740 fffff800`30906596 : ffff8b84`ff1e3080 ffffb30c`a8e1e5f0 ffffae8e`5c9e2990 00000000`00000000 : nt!PspRundownSingleProcess+0x204
ffffae8e`5c9e27d0 fffff800`308d22e8 : 00000201`00000000 00000000`00000001 ffffae8e`5c9e29e0 000000d3`f57d4000 : nt!PspExitThread+0x5f6
ffffae8e`5c9e28d0 fffff800`30467fb7 : 00000000`40910088 00000000`00000000 00000000`00000000 fffff800`3040ecc6 : nt!KiSchedulerApcTerminate+0x38
ffffae8e`5c9e2910 fffff800`305f9d20 : 000000d3`f77ff8b8 ffffae8e`5c9e29c0 ffffae8e`5c9e2b80 000002c5`00000000 : nt!KiDeliverApc+0x487
ffffae8e`5c9e29c0 fffff800`3060725f : ffff8b84`fb2c0080 ffff8b85`02fc3660 ffffae8e`5c9e2b18 ffffffff`ec549980 : nt!KiInitiateUserApc+0x70
ffffae8e`5c9e2b00 00007ff8`ae8cc034 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
000000d3`f77ff888 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`ae8cc034
SYMBOL_NAME: nt!PspDereferenceQuotaBlock+1b
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.685
STACK_COMMAND: .cxr 0xffffae8e5c9e18a0 ; kb
BUCKET_ID_FUNC_OFFSET: 1b
FAILURE_BUCKET_ID: 0x3B_c0000005_nt!PspDereferenceQuotaBlock
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {7a45ee28-7cce-d9df-0178-12f4a9caa1f3}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffff93cc0ce64240, memory referenced.
Arg2: 0000000000000010, value 0 = read operation, 1 = write operation.
Arg3: ffff93cc0ce64240, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 11405
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-70T822T
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 24043
Key : Analysis.Memory.CommitPeak.Mb
Value: 93
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 50
BUGCHECK_P1: ffff93cc0ce64240
BUGCHECK_P2: 10
BUGCHECK_P3: ffff93cc0ce64240
BUGCHECK_P4: 2
READ_ADDRESS: fffff8047e4fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8047e40f330: Unable to get Flags value from nt!KdVersionBlock
fffff8047e40f330: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffff93cc0ce64240
MM_INTERNAL_CODE: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: csrss.exe
TRAP_FRAME: ffffe10e61d1ded0 -- (.trap 0xffffe10e61d1ded0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffd0854a2a4080 rbx=0000000000000000 rcx=ffff939180649af0
rdx=ffffe10e61d1e240 rsi=0000000000000000 rdi=0000000000000000
rip=ffff93cc0ce64240 rsp=ffffe10e61d1e068 rbp=ffffe10e61d1e0b0
r8=ffffe10e61d1e050 r9=000000000000002f r10=fffff8047da609e0
r11=ffff86f977600000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
ffff93cc`0ce64240 ?? ???
Resetting default scope
FAILED_INSTRUCTION_ADDRESS:
+0
ffff93cc`0ce64240 ?? ???
STACK_TEXT:
ffffe10e`61d1dc28 fffff804`7dc1e8bb : 00000000`00000050 ffff93cc`0ce64240 00000000`00000010 ffffe10e`61d1ded0 : nt!KeBugCheckEx
ffffe10e`61d1dc30 fffff804`7da0c960 : 00000000`00000000 00000000`00000010 ffffe10e`61d1df50 00000000`00000000 : nt!MiSystemFault+0x1f40ab
ffffe10e`61d1dd30 fffff804`7dc0395e : ffffe10e`61d1dee8 ffff86f9`77600000 fffff804`7dbf1e30 ffff93cc`0c1e04e6 : nt!MmAccessFault+0x400
ffffe10e`61d1ded0 ffff93cc`0ce64240 : ffff93cc`0be60982 ffffe10e`61d1e280 00000000`00989680 ffffe10e`61d1e1a0 : nt!KiPageFault+0x35e
ffffe10e`61d1e068 ffff93cc`0be60982 : ffffe10e`61d1e280 00000000`00989680 ffffe10e`61d1e1a0 000002a0`000006ec : 0xffff93cc`0ce64240
ffffe10e`61d1e070 ffff93cc`0bfc8985 : 000002a0`000006ec 000002a0`000006ec ffff9391`806067e8 00000000`00000000 : win32kbase!CMouseProcessor::ProcessMouseInputData+0xba
ffffe10e`61d1e0f0 ffff93cc`0bfb9baa : ffff9391`806067d0 ffff93cc`0bfb9c95 ffffd085`45ac90c8 ffff9391`806062d0 : win32kbase!CMouseProcessor::ProcessInput+0x549
ffffe10e`61d1e330 ffff93cc`0bfb9f13 : ffff9391`806062d0 00000077`5111f3ff ffff9391`806067d0 ffffd085`45ac90c8 : win32kbase!CMouseSensor::FlushMouseReports+0x42
ffffe10e`61d1e370 ffff93cc`0bfb9e44 : ffff9391`84677050 00000000`00000018 ffff9391`80606200 ffff9391`806062d0 : win32kbase!CMouseSensor::ProcessInputWithRateLimitingIfEnabled+0xb3
ffffe10e`61d1e3c0 ffff93cc`0bfac04a : ffff93cc`0c010700 ffffe10e`61d1e500 ffff9391`806062d0 00000000`00000000 : win32kbase!CMouseSensor::ProcessInput+0x54
ffffe10e`61d1e400 ffff93cc`0be64c1d : 00000000`00000040 ffff93cc`0c010700 00000000`00000001 ffff9391`806479c0 : win32kbase!CBaseInput::OnReadNotification+0x52a
ffffe10e`61d1e540 ffff93cc`0be64d52 : ffffd085`4a2a4080 ffff9391`806479c0 00000000`00000006 ffff1496`a37a88a0 : win32kbase!CBaseInput::OnDispatcherObjectSignaled+0x31d
ffffe10e`61d1e680 ffff93cc`0be586de : ffff93cc`0c0582a0 ffff9391`806479c0 ffff93cc`0c051970 00000000`00000000 : win32kbase!CBaseInput::_OnDispatcherObjectSignaled+0x12
ffffe10e`61d1e6b0 ffff93cc`0be58430 : 00000000`00000006 ffff93cc`0c0582a0 00000000`00000006 ffff9391`806479c0 : win32kbase!LegacyInputDispatcher::Dispatch+0x52
ffffe10e`61d1e6e0 ffff93cc`0c1a07a8 : ffff9391`80620960 ffff9391`80620960 00000000`00000004 00000000`00000001 : win32kbase!LegacyInputDispatcher::WaitAndDispatch+0x100
ffffe10e`61d1e810 ffff93cc`0c1a0374 : 00000000`00000004 00000000`00000004 00000000`0000000d ffff93cc`0c059a70 : win32kfull!xxxDesktopThreadWaiter+0x130
ffffe10e`61d1e890 ffff93cc`0bec60c3 : ffffd085`4a2a4080 ffffd085`4a2a4080 00000000`00000000 00000000`00000005 : win32kfull!xxxDesktopThread+0x544
ffffe10e`61d1e970 ffff93cc`0c138d80 : ffffd085`4a2a4080 00000000`00000000 00000000`00000005 00000000`00000005 : win32kbase!xxxCreateSystemThreads+0xc3
ffffe10e`61d1eaa0 ffff93cc`0c6a474d : ffffd085`4a2a4080 ffffd085`4a2a4080 00000000`00000000 00000000`00000000 : win32kfull!NtUserCallNoParam+0x70
ffffe10e`61d1ead0 fffff804`7dc071b8 : ffffd085`00000005 00000000`00000005 00000255`94c04140 00000000`00001d14 : win32k!NtUserCallNoParam+0x15
ffffe10e`61d1eb00 00007ffe`1deb10e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000c0`5b5ff858 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`1deb10e4
SYMBOL_NAME: win32kbase!CMouseProcessor::ProcessMouseInputData+ba
MODULE_NAME: win32kbase
IMAGE_NAME: win32kbase.sys
IMAGE_VERSION: 10.0.19041.662
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: ba
FAILURE_BUCKET_ID: AV_INVALID_BAD_IP_win32kbase!CMouseProcessor::ProcessMouseInputData
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {40e69f4a-c754-e8fe-9604-8471585f3f8c}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffb97dae752138, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8015960cfcb, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 9718
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-70T822T
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 15737
Key : Analysis.Memory.CommitPeak.Mb
Value: 80
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: a
BUGCHECK_P1: ffffb97dae752138
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8015960cfcb
READ_ADDRESS: fffff8015a0fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8015a00f330: Unable to get Flags value from nt!KdVersionBlock
fffff8015a00f330: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffb97dae752138
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: dwm.exe
TRAP_FRAME: ffff8c869b1c6740 -- (.trap 0xffff8c869b1c6740)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffb97dae752080 rbx=0000000000000000 rcx=0000017c2a5f0000
rdx=ffff00000000ffff rsi=0000000000000000 rdi=0000000000000000
rip=fffff8015960cfcb rsp=ffff8c869b1c68d0 rbp=ffffb90dae40f7c0
r8=0000000000121582 r9=000000000000462d r10=fffff8015a050b40
r11=ffffb90dae40f080 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
nt!MiUserFault+0x38b:
fffff801`5960cfcb 488b98b8000000 mov rbx,qword ptr [rax+0B8h] ds:ffffb97d`ae752138=????????????????
Resetting default scope
STACK_TEXT:
ffff8c86`9b1c65f8 fffff801`59807769 : 00000000`0000000a ffffb97d`ae752138 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffff8c86`9b1c6600 fffff801`59803a69 : ffffa58e`b0a00301 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffff8c86`9b1c6740 fffff801`5960cfcb : 00000000`00000000 ffffb90d`ae40f080 ffffb90d`ae40f080 00000000`00000001 : nt!KiPageFault+0x469
ffff8c86`9b1c68d0 fffff801`5960c6ca : 00000000`00000000 ffffb90d`00000000 ffff8450`c5f50000 00000000`00000000 : nt!MiUserFault+0x38b
ffff8c86`9b1c6960 fffff801`5980395e : ffffb90d`ae552080 00000000`000003e8 00000000`00000000 00000000`00000250 : nt!MmAccessFault+0x16a
ffff8c86`9b1c6b00 00007ffd`6f1d93ba : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
00000003`a56ff580 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`6f1d93ba
SYMBOL_NAME: nt!MiUserFault+38b
MODULE_NAME: nt
IMAGE_VERSION: 10.0.19041.685
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 38b
FAILURE_BUCKET_ID: AV_nt!MiUserFault
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {ebaa4318-8301-ca38-45f3-29102df77128}
Followup: MachineOwner
---------