Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\CsHay\AppData\Local\Temp\Rar$DIa15012.46681\101720-7968-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (16 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff800`4f600000 PsLoadedModuleList = 0xfffff800`5022a310
Debug session time: Sat Oct 17 16:03:11.975 2020 (UTC + 3:00)
System Uptime: 1 days 20:35:58.942
Loading Kernel Symbols
...............................................................
................................................................
................................................................
.........
Loading User Symbols
Loading unloaded module list
.....................................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff800`4f9f45a0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffff8408`5cc04e70=000000000000003b
4: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c000001d, Exception code that caused the bugcheck
Arg2: fffff8004f836542, Address of the instruction which caused the bugcheck
Arg3: ffff84085cc05770, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 6436
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-IPC9T25
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 10077
Key : Analysis.Memory.CommitPeak.Mb
Value: 91
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c000001d
BUGCHECK_P2: fffff8004f836542
BUGCHECK_P3: ffff84085cc05770
BUGCHECK_P4: 0
CONTEXT: ffff84085cc05770 -- (.cxr 0xffff84085cc05770)
rax=00ffffcd058af520 rbx=ffffcd058af520c8 rcx=0000000000000020
rdx=0000000000000003 rsi=ffffcd058af52070 rdi=ffffcd058af520c8
rip=fffff8004f836542 rsp=ffff84085cc06170 rbp=ffff84085cc06220
r8=ffffcd0574cc14e0 r9=0000000000000000 r10=fffff8004f836520
r11=ffff84085cc062b0 r12=0000000000000060 r13=ffffde5d40606310
r14=0000000000000180 r15=ffffcd058cb44c40
iopl=0 nv up ei pl nz ac pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00250212
nt!ObReferenceObjectByPointer+0x22:
fffff800`4f836542 0fb646e8 movzx eax,byte ptr [rsi-18h] ds:002b:ffffcd05`8af52058=??
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: csrss.exe
STACK_TEXT:
ffff8408`5cc06170 ffffde25`8e076393 : ffffcd05`8af520c8 ffffcd05`8af522a4 00000000`00000000 fffff800`4d1b129b : nt!ObReferenceObjectByPointer+0x22
ffff8408`5cc061b0 ffffde25`8e0760a6 : 00000000`00000000 00000000`00000000 00000000`05e80624 ffff8408`5cc062b0 : win32kbase!RawInputManagerDeviceObjectReference+0x23
ffff8408`5cc061e0 ffffde25`8e005489 : ffffcd05`8cb44c40 ffffcd05`8cb44e78 fffff800`4f89004d ffff8408`5cc062e8 : win32kbase!xxxResetDisplayDevice+0x386
ffff8408`5cc06250 ffffde25`8e016027 : 00000000`00000008 ffff8408`5cc062f8 00000000`00000008 ffff8408`5cc06300 : win32kbase!NtUserDestroyActivationObject+0xc9
ffff8408`5cc06280 ffffde25`8e0150ba : ffffcd05`8cb44c40 ffff8408`5cc06369 ffffcd05`8cb44e78 00000000`00000000 : win32kbase!RawInputManagerObjectResolveHandle+0x257
ffff8408`5cc062c0 ffffde25`8e0afa25 : ffffde5d`406062d0 ffffde5d`406062d0 ffffde5d`473f97e0 00000000`00000018 : win32kbase!RIMReadInput+0x1ba
ffff8408`5cc063b0 ffffde25`8e1ac46b : ffffde25`8e2104c0 ffff8408`5cc06500 ffffde5d`406062d0 00000000`00000000 : win32kbase!CBaseInput::Read+0x55
ffff8408`5cc06400 ffffde25`8e01956d : 00000000`00000040 ffffde25`8e2104c0 00000000`00000001 903f3526`34310000 : win32kbase!CBaseInput::FindDeviceInfo+0x9fb
ffff8408`5cc06540 ffffde25`8e019242 : ffffcd05`80cd6080 ffffde5d`40646600 00000000`00000006 ffff63a3`29a80315 : win32kbase!CBaseInput::RegisterDispatcherObject+0x48d
ffff8408`5cc06680 ffffde25`8e0101be : ffffde25`8e2582b0 ffffde5d`40646600 ffffde25`8e251970 00000000`00000000 : win32kbase!CBaseInput::RegisterDispatcherObject+0x162
ffff8408`5cc066b0 ffffde25`8e00ff10 : 00000000`00000006 ffffde25`8e2582b0 00000000`00000006 ffffde5d`40646600 : win32kbase!LegacyInputDispatcher::WaitAndDispatch+0x3ae
ffff8408`5cc066e0 ffffde25`8e810398 : ffffde5d`4061a050 ffffde5d`4061a050 00000000`00000004 00000000`00000001 : win32kbase!LegacyInputDispatcher::WaitAndDispatch+0x100
ffff8408`5cc06810 ffffde25`8e80ff64 : 00000000`00000004 00000000`00000004 00000000`0000000d ffffde25`8e259a80 : win32kfull!xxxDesktopThreadWaiter+0x130
ffff8408`5cc06890 ffffde25`8e08ae53 : ffffcd05`80cd6080 ffffcd05`80cd6080 00000000`00000000 00000000`00000005 : win32kfull!xxxDesktopThread+0x544
ffff8408`5cc06970 ffffde25`8e7a8970 : ffffcd05`80cd6080 00000000`00000000 00000000`00000005 00000000`00000005 : win32kbase!xxxCreateSystemThreads+0xc3
ffff8408`5cc06aa0 ffffde25`8e38474d : ffffcd05`80cd6080 ffffcd05`80cd6080 00000000`00000000 00000000`00000000 : win32kfull!NtUserCallNoParam+0x70
ffff8408`5cc06ad0 fffff800`4fa05fb8 : ffffcd05`00000005 00000000`00000005 00000203`7da04130 00000000`000042c8 : win32k!NtUserCallNoParam+0x15
ffff8408`5cc06b00 00007ffc`621510e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000c3`d67bf868 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`621510e4
SYMBOL_NAME: win32kbase!RawInputManagerDeviceObjectReference+23
MODULE_NAME: win32kbase
IMAGE_NAME: win32kbase.sys
IMAGE_VERSION: 10.0.19041.572
STACK_COMMAND: .cxr 0xffff84085cc05770 ; kb
BUCKET_ID_FUNC_OFFSET: 23
FAILURE_BUCKET_ID: 0x3B_c000001d_win32kbase!RawInputManagerDeviceObjectReference
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {c4a347e9-5eed-28ed-92f6-de75fffe6e67}
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\CsHay\AppData\Local\Temp\Rar$DIa15012.27498\100620-7781-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (16 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff804`74600000 PsLoadedModuleList = 0xfffff804`7522a310
Debug session time: Tue Oct 6 22:30:02.775 2020 (UTC + 3:00)
System Uptime: 4 days 5:39:25.279
Loading Kernel Symbols
...............................................................
................................................................
................................................................
.........
Loading User Symbols
Loading unloaded module list
........................................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff804`749f3ea0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffff9703`a8867550=000000000000000a
15: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffff9703288679e0, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff804748e4582, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2999
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-IPC9T25
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 13571
Key : Analysis.Memory.CommitPeak.Mb
Value: 76
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: a
BUGCHECK_P1: ffff9703288679e0
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff804748e4582
WRITE_ADDRESS: fffff804752fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8047520f2e0: Unable to get Flags value from nt!KdVersionBlock
fffff8047520f2e0: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffff9703288679e0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: LeagueClientUx.exe
TRAP_FRAME: ffff9703a8867690 -- (.trap 0xffff9703a8867690)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffff9703288679e0
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff804748e4582 rsp=ffff9703a8867820 rbp=0000000000000000
r8=0000000100000783 r9=ffffae80d310e180 r10=ffff860472d020c0
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
nt!KiSwapThread+0x542:
fffff804`748e4582 488901 mov qword ptr [rcx],rax ds:ffff9703`288679e0=????????????????
Resetting default scope
STACK_TEXT:
ffff9703`a8867548 fffff804`74a05e69 : 00000000`0000000a ffff9703`288679e0 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffff9703`a8867550 fffff804`74a02169 : ffffae80`d310e180 fffff804`749fb0b2 000f8067`b4bbbdff ffff8604`00000001 : nt!KiBugCheckDispatch+0x69
ffff9703`a8867690 fffff804`748e4582 : ffffae80`d270e180 ffff8604`ffffffff ffff8604`6c5037c0 fffff804`74ca7086 : nt!KiPageFault+0x469
ffff9703`a8867820 fffff804`748e3a6f : 00000000`00000002 fffff804`0000000c ffff9703`a88679e0 ffff9703`00000000 : nt!KiSwapThread+0x542
ffff9703`a88678d0 fffff804`748e3313 : 00000000`00000000 fffff804`00000000 00000000`00000000 ffff8604`690481c0 : nt!KiCommitThreadWait+0x14f
ffff9703`a8867970 fffff804`74cd6261 : ffff8604`6ba038e0 ffff92fa`00000006 ffff92fa`3c341601 ffff92fa`3c341501 : nt!KeWaitForSingleObject+0x233
ffff9703`a8867a60 fffff804`74cd630a : ffff8604`69048080 00000000`00000000 00000000`00000000 00000000`0000001c : nt!ObWaitForSingleObject+0x91
ffff9703`a8867ac0 fffff804`74a058b8 : 00000000`00000000 ffff8604`00000000 00000000`00000000 00000000`00000000 : nt!NtWaitForSingleObject+0x6a
ffff9703`a8867b00 00000000`77371cfc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`00bce878 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77371cfc
SYMBOL_NAME: nt!KiSwapThread+542
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.508
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 542
FAILURE_BUCKET_ID: AV_nt!KiSwapThread
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {3a5eca23-a992-0c0e-a0ce-d48add0d8eda}
Followup: MachineOwner
---------