BAD_OBJECT_HEADER (189)
The OBJECT_HEADER has been corrupted
Arguments:
Arg1: ffffde03371e4a90, Pointer to bad OBJECT_HEADER
Arg2: 0000000000000000, Pointer to the resulting OBJECT_TYPE based on the TypeIndex in the OBJECT_HEADER
Arg3: 0000000000000000, The type index is corrupt.
Arg4: 0000000000000000, Reserved.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5593
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on BORA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 5696
Key : Analysis.Memory.CommitPeak.Mb
Value: 74
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 189
BUGCHECK_P1: ffffde03371e4a90
BUGCHECK_P2: 0
BUGCHECK_P3: 0
BUGCHECK_P4: 0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: chrome.exe
STACK_TEXT:
fffff88f`c243e888 fffff802`5e63a08c : 00000000`00000189 ffffde03`371e4a90 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
fffff88f`c243e890 fffff802`5e4efbce : ffffde03`3549d080 00000000`00000001 ffffde03`2b2f7560 00000000`00000001 : nt!ObpReferenceObjectByHandleWithTag+0x14a4ac
fffff88f`c243e920 fffff802`5e0de4fa : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObReferenceObjectByHandle+0x2e
fffff88f`c243e970 fffff802`5e4b94a4 : ffffde03`33ca4080 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IopReferenceFileObject+0x3a
fffff88f`c243e9b0 fffff802`5e206bb8 : 00000000`00000000 00000000`000003c0 00000000`00000000 00000011`f23feae0 : nt!NtReadFile+0x64
fffff88f`c243ea90 00007ffd`d704be64 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000011`f23fea08 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`d704be64
SYMBOL_NAME: nt!ObpReferenceObjectByHandleWithTag+14a4ac
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.630
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 14a4ac
FAILURE_BUCKET_ID: 0x189_nt!ObpReferenceObjectByHandleWithTag
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {8bf3796f-7602-d49d-dd11-eaa45fa2179c}
Followup: MachineOwner
---------
DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000000, A single DPC or ISR exceeded its time allotment. The offending
component can usually be identified with a stack trace.
Arg2: 0000000000000501, The DPC time count (in ticks).
Arg3: 0000000000000500, The DPC time allotment (in ticks).
Arg4: fffff8060e8fb320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
additional information regarding this single DPC timeout
Debugging Details:
------------------
*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: TickPeriods ***
*** ***
*************************************************************************
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5765
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on BORA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 12319
Key : Analysis.Memory.CommitPeak.Mb
Value: 98
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 133
BUGCHECK_P1: 0
BUGCHECK_P2: 501
BUGCHECK_P3: 500
BUGCHECK_P4: fffff8060e8fb320
DPC_TIMEOUT_TYPE: SINGLE_DPC_TIMEOUT_EXCEEDED
TRAP_FRAME: fffff8061206bbf0 -- (.trap 0xfffff8061206bbf0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000003a3ab4da rbx=0000000000000000 rcx=fffff8061206bdf8
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8060debecd7 rsp=fffff8061206bd80 rbp=fffff80609d84180
r8=0000000000000100 r9=0000000000000000 r10=fffff8060dec2e00
r11=fffff80609d84180 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!KeYieldProcessorEx+0x17:
fffff806`0debecd7 4883c420 add rsp,20h
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
STACK_TEXT:
fffff806`1207ae18 fffff806`0e087372 : 00000000`00000133 00000000`00000000 00000000`00000501 00000000`00000500 : nt!KeBugCheckEx
fffff806`1207ae20 fffff806`0df26853 : 00000839`66c17980 fffff806`09d84180 00000000`00000000 fffff806`09d84180 : nt!KeAccumulateTicks+0x15e2c2
fffff806`1207ae80 fffff806`0df2633a : fffff806`0e8f38c0 fffff806`1206bc70 fffff806`18b33c00 00000000`0000b301 : nt!KeClockInterruptNotify+0x453
fffff806`1207af30 fffff806`0de2ecd5 : fffff806`0e8f38c0 fffff806`1207af40 00000000`00000010 ffff4089`906461f1 : nt!HalpTimerClockIpiRoutine+0x1a
fffff806`1207af60 fffff806`0dff6cba : fffff806`1206bc70 fffff806`0e8f38c0 00000000`00000002 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5
fffff806`1207afb0 fffff806`0dff7227 : ffffcf0b`601f2a50 ffffcf0b`61c6e4f8 ffffcf0b`614fb080 fffff806`0dff7234 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
fffff806`1206bbf0 fffff806`0debecd7 : 00000000`00000010 00000000`00000286 fffff806`1206bda8 00000000`00000018 : nt!KiInterruptDispatchNoLockNoEtw+0x37
fffff806`1206bd80 fffff806`0dec0fe8 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeYieldProcessorEx+0x17
fffff806`1206bdb0 fffff806`0de1016d : fffff806`09d84180 fffff806`3a3ab4da ffffcf0b`614fb080 fffff806`1206bea9 : nt!KiSignalThread+0x1a8
fffff806`1206bdf0 fffff806`0dec33bc : ffffcf0b`614fb080 fffff806`1206bea9 ffffcf0b`614fb080 fffff806`1e0680e7 : nt!KiSignalThreadForApc+0xb5
fffff806`1206be20 fffff806`0dec2e97 : 00000000`00000000 fffff806`1206bf06 00000000`00000000 00000000`00000000 : nt!IopfCompleteRequest+0x50c
fffff806`1206bf10 fffff806`19b65056 : 00000000`00000018 fffff806`1206bfb0 ffffcf0b`614f7270 ffffcf0b`5ef72e10 : nt!IofCompleteRequest+0x17
fffff806`1206bf40 fffff806`19b43aa7 : 00000000`00000002 ffffcf0b`5e141450 ffffcf0b`5cbb1970 fffff806`1206c024 : mouclass!MouseClassServiceCallback+0x476
fffff806`1206bfe0 fffff806`0dec2fce : 00000000`00000000 fffff806`1206c100 00000000`00000001 fffff806`00000000 : mouhid!MouHid_ReadComplete+0x757
fffff806`1206c080 fffff806`0dec2e97 : 00000000`00000008 00000000`00000006 ffffcf0b`5ef791d0 ffffcf0b`5e18e400 : nt!IopfCompleteRequest+0x11e
fffff806`1206c170 fffff806`19acaef5 : ffffcf0b`5e18e400 00000000`00000007 ffffcf0b`5e18e3f0 00000000`00000007 : nt!IofCompleteRequest+0x17
fffff806`1206c1a0 fffff806`19aca7ed : ffffcf0b`5ef791d0 ffffcf0b`5ef79102 ffffcf0b`5ef791d0 00000000`00000007 : HIDCLASS!HidpDistributeInterruptReport+0x3f5
fffff806`1206c2a0 fffff806`0dec2fce : ffffcf0b`5ecc6050 ffffcf0b`5ecc6050 fffff806`1206c301 ffffcf0b`5ecc643b : HIDCLASS!HidpInterruptReadComplete+0x37d
fffff806`1206c340 fffff806`0dec2e97 : 00000000`00000001 00000000`00000000 ffffcf0b`5ef80020 00000000`00000002 : nt!IopfCompleteRequest+0x11e
fffff806`1206c430 fffff806`109b811a : 00000000`00000000 ffffcf0b`5e0d4c90 ffffcf0b`5ecc6050 fffff806`0e08973b : nt!IofCompleteRequest+0x17
fffff806`1206c460 fffff806`109b5bbf : ffffcf0b`62f18102 ffffcf0b`5ef805e0 ffffcf0b`5ecc6050 00000000`00000000 : Wdf01000!FxRequest::CompleteInternal+0x23a [minkernel\wdf\framework\shared\core\fxrequest.cpp @ 869]
fffff806`1206c4f0 fffff806`194bb91c : 00000000`ffffff02 ffffcf0b`62f18020 ffffcf0b`5ef80400 ffffcf0b`5ef80400 : Wdf01000!imp_WdfRequestComplete+0x8f [minkernel\wdf\framework\shared\core\fxrequestapi.cpp @ 436]
fffff806`1206c550 fffff806`194bb7e1 : ffffcf0b`62f181c0 00000000`00000006 ffffcf0b`62f18250 fffff806`1206c768 : USBXHCI!Bulk_Transfer_CompleteCancelable+0xc8
fffff806`1206c5b0 fffff806`194bb5d0 : 00000000`00000004 fffff806`1206c720 00000000`00000000 ffffcf0b`5ef7f5e0 : USBXHCI!Bulk_ProcessTransferEventWithED1+0x1fd
fffff806`1206c660 fffff806`194b6570 : 00000000`00000004 fffff806`1206c738 00000000`00000008 fffff806`1206c740 : USBXHCI!Bulk_EP_TransferEventHandler+0x10
fffff806`1206c690 fffff806`194b60a5 : 00000000`00000780 000030f4`a3155700 ffffcf0b`5cc34f10 ffffcf0b`5ece2cf0 : USBXHCI!Endpoint_TransferEventHandler+0xb0
fffff806`1206c6f0 fffff806`194b5d7c : ffffcf0b`5ec5a398 fffff806`09d84180 000030f4`a652b308 fffff806`1206c810 : USBXHCI!Interrupter_DeferredWorkProcessor+0x315
fffff806`1206c7f0 fffff806`109b38f5 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : USBXHCI!Interrupter_WdfEvtInterruptDpc+0xc
fffff806`1206c820 fffff806`0dee535e : fffff806`09d87240 fffff806`1206c960 fffff806`1206cb20 fffff806`09d84180 : Wdf01000!FxInterrupt::_InterruptDpcThunk+0xa5 [minkernel\wdf\framework\shared\irphandlers\pnp\km\interruptobjectkm.cpp @ 404]
fffff806`1206c860 fffff806`0dee4644 : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x30e
fffff806`1206c9d0 fffff806`0dff8d7e : 00000000`00000000 fffff806`09d84180 fffff806`0e927600 ffffcf0b`5ef39100 : nt!KiRetireDpcList+0x1f4
fffff806`1206cc60 00000000`00000000 : fffff806`1206d000 fffff806`12067000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
SYMBOL_NAME: mouclass!MouseClassServiceCallback+476
MODULE_NAME: mouclass
IMAGE_NAME: mouclass.sys
IMAGE_VERSION: 10.0.19041.1030
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 476
FAILURE_BUCKET_ID: 0x133_DPC_mouclass!MouseClassServiceCallback
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {3fa01bd8-d2f7-df82-2794-89aa20021973}
Followup: MachineOwner
---------
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffff878e2ba6d420, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffff878e2ba6d378, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4905
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on BORA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 43172
Key : Analysis.Memory.CommitPeak.Mb
Value: 85
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 139
BUGCHECK_P1: 3
BUGCHECK_P2: ffff878e2ba6d420
BUGCHECK_P3: ffff878e2ba6d378
BUGCHECK_P4: 0
TRAP_FRAME: ffff878e2ba6d420 -- (.trap 0xffff878e2ba6d420)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8017aa248a8 rbx=0000000000000000 rcx=0000000000000003
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8017a0c506d rsp=ffff878e2ba6d5b0 rbp=ffffa70259346080
r8=0000000000000001 r9=0000000000000000 r10=0000000000000000
r11=ffffa702611460b8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po cy
nt!KiExitDispatcher+0x1ad:
fffff801`7a0c506d cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: ffff878e2ba6d378 -- (.exr 0xffff878e2ba6d378)
ExceptionAddress: fffff8017a0c506d (nt!KiExitDispatcher+0x00000000000001ad)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000003
EXCEPTION_STR: 0xc0000409
STACK_TEXT:
ffff878e`2ba6d0f8 fffff801`7a207169 : 00000000`00000139 00000000`00000003 ffff878e`2ba6d420 ffff878e`2ba6d378 : nt!KeBugCheckEx
ffff878e`2ba6d100 fffff801`7a207590 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffff878e`2ba6d240 fffff801`7a205923 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffff878e`2ba6d420 fffff801`7a0c506d : 00000000`00000000 fffff801`8acd96c0 00000048`063000e4 00000000`00000004 : nt!KiRaiseSecurityCheckFailure+0x323
ffff878e`2ba6d5b0 fffff801`7a057c50 : fffff801`7aa248c0 fffff801`00000000 fffff801`7aa248c0 00000000`00000000 : nt!KiExitDispatcher+0x1ad
ffff878e`2ba6d620 fffff801`7a09d821 : 00000000`00000048 00000000`00000000 00000000`00000000 fffff801`79e01328 : nt!KeReleaseSemaphoreEx+0x120
ffff878e`2ba6d6a0 fffff801`7a02a0e0 : 00000000`00000001 ffffa702`61146000 00000000`00000000 00000000`00000002 : nt!PopFxRequestWorker+0x31
ffff878e`2ba6d6e0 fffff801`7a029fa1 : ffffa702`61146000 00000000`00000002 00000000`00000006 ffffa702`611460b8 : nt!PopPepRequestWork+0x18
ffff878e`2ba6d710 fffff801`7a0bb48c : 00000000`00000000 00000000`00000000 ffffa702`5fbbb902 fffff801`7a0e002c : nt!PopPepProcessEvent+0xf1
ffff878e`2ba6d770 fffff801`7a0ba73a : 00000000`00000001 00000000`00000000 ffffa702`5fbbb9a0 00000000`8aab499c : nt!PopPluginComponentActive+0x7c
ffff878e`2ba6d7b0 fffff801`7a0ba57c : 00000000`00000002 00000000`00000000 00000000`00000000 ffffa702`5ff31000 : nt!PopFxActivateComponentWorker+0x5a
ffff878e`2ba6d800 fffff801`85ef6ba2 : ffffa702`5ff31000 00000000`00000000 ffffa702`61141000 00000000`00000003 : nt!PoFxActivateComponent+0x13c
ffff878e`2ba6d890 fffff801`85ef6725 : 00000000`00000002 ffffa702`5ff31000 00000000`00000000 fffff801`00000002 : dxgkrnl!DXGADAPTER::SetPowerComponentActiveCBWorker+0x45e
ffff878e`2ba6d980 fffff801`85effd53 : ffffa702`5d512030 ffffa702`5ff71000 00000000`00000000 00000000`00000000 : dxgkrnl!DXGADAPTER::SetPowerComponentActiveCBInternal+0x6d
ffff878e`2ba6d9b0 fffff801`86fbd37e : ffffa702`5ff3e000 ffffa702`5ff71000 ffffffff`ffffffff 00000000`00000000 : dxgkrnl!DxgSetPowerComponentActiveNoWaitForceAsyncCB+0x43
ffff878e`2ba6da20 fffff801`86fab81d : ffffa702`5ff3e000 00000000`00000000 ffffffff`ffffffff 00000000`00989680 : dxgmms2!VidSchiSwitchContextWithCheck+0x1096e
ffff878e`2ba6dac0 fffff801`8702ad45 : ffffa702`5f25a600 ffffa702`5ff3e000 ffffa702`5f25a620 ffffa702`61d87610 : dxgmms2!VidSchiScheduleCommandToRun+0x11d
ffff878e`2ba6db80 fffff801`8702acfa : ffffa702`5ff3e400 fffff801`8702ac30 ffffa702`5ff3e000 ffff9201`8bd89100 : dxgmms2!VidSchiRun_PriorityTable+0x35
ffff878e`2ba6dbd0 fffff801`7a0a29a5 : ffffa702`5fdc6580 fffff801`00000001 ffffa702`5ff3e000 000f8067`b4bbbdff : dxgmms2!VidSchiWorkerThread+0xca
ffff878e`2ba6dc10 fffff801`7a1fc868 : ffff9201`8bd89180 ffffa702`5fdc6580 fffff801`7a0a2950 32336469`736c4362 : nt!PspSystemThreadStartup+0x55
ffff878e`2ba6dc60 00000000`00000000 : ffff878e`2ba6e000 ffff878e`2ba68000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: dxgkrnl!DXGADAPTER::SetPowerComponentActiveCBWorker+45e
MODULE_NAME: dxgkrnl
IMAGE_NAME: dxgkrnl.sys
IMAGE_VERSION: 10.0.19041.626
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 45e
FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_dxgkrnl!DXGADAPTER::SetPowerComponentActiveCBWorker
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {5106890b-1385-57f9-9b8f-28678a37d713}
Followup: MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 00000e097100022f, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80537918ccf, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4296
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on BORA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 10634
Key : Analysis.Memory.CommitPeak.Mb
Value: 76
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: a
BUGCHECK_P1: e097100022f
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff80537918ccf
READ_ADDRESS: fffff805380fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8053800f340: Unable to get Flags value from nt!KdVersionBlock
fffff8053800f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
00000e097100022f
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: ffffbd8b804066d0 -- (.trap 0xffffbd8b804066d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000004 rbx=0000000000000000 rcx=00000e0971000117
rdx=000000000000003f rsi=0000000000000000 rdi=0000000000000000
rip=fffff80537918ccf rsp=ffffbd8b80406868 rbp=ffffbd8b804068b0
r8=000000000000000c r9=ffffbd8b804068f8 r10=0000000000000037
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!KiGenerateHeteroSets+0x7:
fffff805`37918ccf 4e8b9cc1b8000000 mov r11,qword ptr [rcx+r8*8+0B8h] ds:00000e09`7100022f=????????????????
Resetting default scope
STACK_TEXT:
ffffbd8b`80406588 fffff805`37807169 : 00000000`0000000a 00000e09`7100022f 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffbd8b`80406590 fffff805`37803469 : ffffe501`93d671c0 ffffc384`e59a7040 ffffe501`93d5c180 fffff805`377fc422 : nt!KiBugCheckDispatch+0x69
ffffbd8b`804066d0 fffff805`37918ccf : fffff805`3765902e ffffe501`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x469
ffffbd8b`80406868 fffff805`3765902e : ffffe501`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiGenerateHeteroSets+0x7
ffffbd8b`80406870 fffff805`37919b56 : ffffc384`e59a7101 ffffc384`db127080 00000000`00000000 00000000`00000000 : nt!KiCheckPreferredHeteroProcessor+0x7e
ffffbd8b`804068e0 fffff805`379199b4 : 00000000`00000004 ffffbd8b`804069a8 ffffbd8b`804069a0 ffffe501`93d5c180 : nt!KiSendHeteroRescheduleIntRequestHelper+0x156
ffffbd8b`80406970 fffff805`3786fb1c : ffffe501`ffffffff 00000000`00000000 00000000`00000000 fffff805`376be528 : nt!KiSendHeteroRescheduleIntRequest+0x74
ffffbd8b`804069a0 fffff805`376df38f : 00000000`00000002 fffff805`00000005 00000000`00000000 00000000`00000000 : nt!KiSwapThread+0x1901bc
ffffbd8b`80406a50 fffff805`377038a7 : ffffc384`00000000 00000000`00000000 ffffbd8b`00000000 00000000`00000000 : nt!KiCommitThreadWait+0x14f
ffffbd8b`80406af0 fffff805`37703450 : ffffc384`e59a7040 fffff805`37a12360 ffffc384`db088590 ffffc384`00000000 : nt!KeRemovePriQueue+0x1a7
ffffbd8b`80406b70 fffff805`376a29a5 : ffffc384`e59a7040 00000000`00000080 ffffc384`db09f040 000f8067`b4bbbdff : nt!ExpWorkerThread+0xa0
ffffbd8b`80406c10 fffff805`377fc868 : fffff805`35a7d180 ffffc384`e59a7040 fffff805`376a2950 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffbd8b`80406c60 00000000`00000000 : ffffbd8b`80407000 ffffbd8b`80401000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: nt!KiGenerateHeteroSets+7
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.630
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 7
FAILURE_BUCKET_ID: AV_nt!KiGenerateHeteroSets
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e12c4c11-0ff5-f5ca-55be-f1d53353b217}
Followup: MachineOwner
---------