IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000821, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8027b6c1870, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5155
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 35218
Key : Analysis.Memory.CommitPeak.Mb
Value: 90
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: 19h1_release
Key : WER.OS.Timestamp
Value: 2019-03-18T12:02:00Z
Key : WER.OS.Version
Value: 10.0.18362.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: a
BUGCHECK_P1: 821
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8027b6c1870
READ_ADDRESS: fffff8027bb733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8027ba2a3c8: Unable to get Flags value from nt!KdVersionBlock
fffff8027ba2a3c8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000821
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: ffffab0d838776b0 -- (.trap 0xffffab0d838776b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffff8506147638a0
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8027f0327d4 rsp=ffffab0d83877840 rbp=ffffab0d838779a1
r8=ffffab0d838778d8 r9=ffffab0d838778d0 r10=0000000000000000
r11=ffff8506147638a0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
WppRecorder!WppAutoLogGetBugCheckDataForLog+0x28:
fffff802`7f0327d4 0000 add byte ptr [rax],al ds:00000000`00000000=??
Resetting default scope
MISALIGNED_IP:
WppRecorder!WppAutoLogGetBugCheckDataForLog+28
fffff802`7f0327d4 0000 add byte ptr [rax],al
STACK_TEXT:
ffffab0d`83877008 fffff802`7b7d30e9 : 00000000`0000000a 00000000`00000821 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffab0d`83877010 fffff802`7b7cf42b : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffab0d`83877150 fffff802`7b6c1870 : ffffab0d`83877420 00000000`00013980 00000000`000000bc 00000000`00000000 : nt!KiPageFault+0x46b
ffffab0d`838772e0 fffff802`7b6c138c : 00000000`00000000 fffff802`7b636a3a ffff967c`0143ec48 ffff964b`3e00a1f0 : nt!MiCheckVirtualAddress+0xf0
ffffab0d`83877310 fffff802`7b6739ac : ffff967f`ffffffff ffff9600`00000000 ffff9600`00000000 ffff964b`00000000 : nt!MiInPagePageTable+0xcc
ffffab0d`83877460 fffff802`7b672cde : 00000000`00000040 fffff802`87d88c84 00000000`00000002 00000000`00000000 : nt!MiUserFault+0x7dc
ffffab0d`83877510 fffff802`7b7cf320 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x14e
ffffab0d`838776b0 fffff802`7f0327d4 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff802`7f032578 : nt!KiPageFault+0x360
ffffab0d`83877840 fffff802`7f032578 : 00000000`00000000 fffff802`87d88e62 00000000`00000000 00000000`00000000 : WppRecorder!WppAutoLogGetBugCheckDataForLog+0x28
ffffab0d`83877860 fffff802`87da29e4 : ffff8506`1464d960 ffffab0d`838779a1 ffff8506`1e4ebad0 ffff8506`1c06d010 : WppRecorder!imp_WppRecorderLogDumpLiveData+0x18
ffffab0d`838778a0 fffff802`87d50c5b : ffff8506`1c06d010 ffffab0d`838779a1 ffff8506`1c06d010 ffff8506`1464d960 : USBXHCI!Controller_TelemetryAddControllerData+0x74
ffffab0d`83877910 fffff802`87d51080 : ffff8506`1425e360 ffffab0d`83877a40 00000000`00000000 00000000`00000000 : USBXHCI!Controller_TelemetryReport+0x1ff
ffffab0d`83877a00 fffff802`7ef33fd9 : ffff8506`1425e260 00000000`00000008 00000000`00000008 00000000`00000000 : USBXHCI!Controller_TelemetryReportWorker+0x290
ffffab0d`83877a80 fffff802`7ef33e69 : ffff9b00`0a940100 ffff8506`1425e260 ffff8506`10c80040 fffff802`7b6bd91c : Wdf01000!FxWorkItem::WorkItemHandler+0x7d [minkernel\wdf\framework\shared\core\fxworkitem.cpp @ 371]
ffffab0d`83877ac0 fffff802`7b667bff : ffff8506`1424db50 00000000`00000000 ffff8506`00000000 fffff802`87825020 : Wdf01000!FxWorkItem::WorkItemThunk+0x29 [minkernel\wdf\framework\shared\core\fxworkitem.cpp @ 439]
ffffab0d`83877b00 fffff802`7b6bd465 : ffff8506`10c7ea20 ffff8506`10c80040 fffff802`7b667b00 00000000`0000000c : nt!IopProcessWorkItem+0xff
ffffab0d`83877b70 fffff802`7b72a725 : ffff8506`10c80040 00000000`00000080 ffff8506`10c96040 00000067`b4bbbdff : nt!ExpWorkerThread+0x105
ffffab0d`83877c10 fffff802`7b7c886a : ffff9b00`0a747180 ffff8506`10c80040 fffff802`7b72a6d0 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffab0d`83877c60 00000000`00000000 : ffffab0d`83878000 ffffab0d`83872000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x2a
SYMBOL_NAME: WppRecorder!WppAutoLogGetBugCheckDataForLog+28
MODULE_NAME: hardware
IMAGE_NAME: hardware
IMAGE_VERSION: 10.0.18362.1049
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: IP_MISALIGNED_WppRecorder.sys
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {a9f7fe95-c676-0dcf-dbdf-709e0c33a748}
Followup: MachineOwner
---------
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: fffff60cabde17a0, Address of the trap frame for the exception that caused the bugcheck
Arg3: fffff60cabde16f8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4640
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 27435
Key : Analysis.Memory.CommitPeak.Mb
Value: 75
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: 19h1_release
Key : WER.OS.Timestamp
Value: 2019-03-18T12:02:00Z
Key : WER.OS.Version
Value: 10.0.18362.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 139
BUGCHECK_P1: 3
BUGCHECK_P2: fffff60cabde17a0
BUGCHECK_P3: fffff60cabde16f8
BUGCHECK_P4: 0
TRAP_FRAME: ffff800000000000 -- (.trap 0xffff800000000000)
Unable to read trap frame at ffff8000`00000000
EXCEPTION_RECORD: fffff60cabde16f8 -- (.exr 0xfffff60cabde16f8)
ExceptionAddress: fffff800163dc388 (nt!KiWakeQueueWaiter+0x00000000001d8268)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: netsh.exe
ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000003
EXCEPTION_STR: 0xc0000409
STACK_TEXT:
fffff60c`abde1478 fffff800`163d30e9 : 00000000`00000139 00000000`00000003 fffff60c`abde17a0 fffff60c`abde16f8 : nt!KeBugCheckEx
fffff60c`abde1480 fffff800`163d3510 : 00000048`06320076 00000000`00000004 ffff840d`65720180 ffff840d`65720080 : nt!KiBugCheckDispatch+0x69
fffff60c`abde15c0 fffff800`163d18a5 : ffff840d`6eb51a58 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xd0
fffff60c`abde17a0 fffff800`163dc388 : 00000000`00000000 00000000`00000001 ffffdd04`c8ac1e18 fffff800`1626528b : nt!KiRaiseSecurityCheckFailure+0x325
fffff60c`abde1930 fffff800`1624870d : 00000000`00000000 ffffdd04`c8ac1e18 ffff840d`631329e0 ffff840d`6226b420 : nt!KiWakeQueueWaiter+0x1d8268
fffff60c`abde1980 fffff800`1680e423 : ffff840d`620ff400 00000000`00000000 ffffdd04`c8cb0cf0 ffff840d`620ff408 : nt!KeSetEvent+0x25d
fffff60c`abde1a10 fffff800`1680c6d9 : ffffdd04`c8dbe170 00000000`00000000 fffff60c`00000001 00000000`00000000 : nt!ExpWnfNotifyNameSubscribers+0x153
fffff60c`abde1a80 fffff800`163d2b18 : ffff840d`6ac73080 00000000`00000001 00000000`00000000 fffff60c`abde1dd0 : nt!NtUpdateWnfStateData+0x299
fffff60c`abde1b80 fffff800`163c5060 : fffff800`16a4c3fa ffff840d`6b94e4c0 fffff60c`abde2b01 fffff60c`abde1fb0 : nt!KiSystemServiceCopyEnd+0x28
fffff60c`abde1d88 fffff800`16a4c3fa : ffff840d`6b94e4c0 fffff60c`abde2b01 fffff60c`abde1fb0 fffff800`1689688c : nt!KiServiceLinkage
fffff60c`abde1d90 fffff800`16a4bf95 : 00000000`00000000 fffff60c`abde1f10 00000000`00000000 00000000`00000000 : nt!DbgkpStartSystemErrorHandler+0x6e
fffff60c`abde1e10 fffff800`169f9587 : ffff840d`6335aa20 ffff840d`6335aa20 ffff840d`6335aa20 ffff840d`6b94e4c0 : nt!DbgkpSendErrorMessage+0xed
fffff60c`abde1f80 fffff800`1642fda3 : fffff60c`abde2a58 fffff60c`abde2a58 fffff60c`abde2130 00000000`00000000 : nt!DbgkForwardException+0x10681f
fffff60c`abde2100 fffff800`163d321d : ffff80c0`60301000 fffff60c`abde2b00 ffff8000`00000000 00000000`3ceebdf4 : nt!KiDispatchException+0x168603
fffff60c`abde2920 fffff800`163cf405 : 00000000`00ebef90 fffff60c`abde2b80 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0x11d
fffff60c`abde2b00 00007fff`3cd9ccee : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x445
00000000`00e91560 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`3cd9ccee
SYMBOL_NAME: nt!KiFastFailDispatch+d0
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.18362.418
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: d0
FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {3aede96a-54dd-40d6-d4cb-2a161a843851}
Followup: MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000200000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8030d405e0e, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4515
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 21123
Key : Analysis.Memory.CommitPeak.Mb
Value: 75
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: 19h1_release
Key : WER.OS.Timestamp
Value: 2019-03-18T12:02:00Z
Key : WER.OS.Version
Value: 10.0.18362.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: a
BUGCHECK_P1: 200000
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff8030d405e0e
WRITE_ADDRESS: fffff8030d9733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8030d82a3c8: Unable to get Flags value from nt!KdVersionBlock
fffff8030d82a3c8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000200000
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: svchost.exe
TRAP_FRAME: ffff8e8cac043700 -- (.trap 0xffff8e8cac043700)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffff8e8cac043958
rdx=0000000000200000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8030d405e0e rsp=ffff8e8cac043890 rbp=ffff8e8cac043b80
r8=ffffb3081bec8930 r9=ffffc90030ca1180 r10=ffffb3080fac9d50
r11=ffffb3081d2a48d0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!KxWaitForLockOwnerShip+0xe:
fffff803`0d405e0e 48890a mov qword ptr [rdx],rcx ds:00000000`00200000=????????????????
Resetting default scope
STACK_TEXT:
ffff8e8c`ac0435b8 fffff803`0d5d30e9 : 00000000`0000000a 00000000`00200000 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffff8e8c`ac0435c0 fffff803`0d5cf42b : 00000000`00000000 ffffb308`1dd83630 ffffb308`19998040 fffff803`0d43f4be : nt!KiBugCheckDispatch+0x69
ffff8e8c`ac043700 fffff803`0d405e0e : 00000000`00000000 00000000`00000000 ffff6850`07f72b79 fffff803`00000002 : nt!KiPageFault+0x46b
ffff8e8c`ac043890 fffff803`0d43ee7d : 00000000`00000000 ffff8e8c`ac0439c0 ffffb308`195aaca0 00000000`00000001 : nt!KxWaitForLockOwnerShip+0xe
ffff8e8c`ac0438c0 fffff803`0d43ecac : 00000000`00000000 fffff803`0d9e9200 00000000`00000000 fffff803`0d43a969 : nt!KeAcquireInStackQueuedSpinLock+0x7d
ffff8e8c`ac0438f0 fffff803`0d5d2b18 : 00000000`00000308 000000b4`84cff900 00000000`00000000 ffff8e8c`ac043a00 : nt!NtWaitForWorkViaWorkerFactory+0x27c
ffff8e8c`ac043a90 00007ffa`944dfa54 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000b4`84cffae8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`944dfa54
SYMBOL_NAME: nt!KxWaitForLockOwnerShip+e
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.18362.418
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: e
FAILURE_BUCKET_ID: AV_nt!KxWaitForLockOwnerShip
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {724b07b1-4226-85fe-f372-16d33b9a3b93}
Followup: MachineOwner
---------
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffff9204fbef4720, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffff9204fbef4678, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4234
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 32867
Key : Analysis.Memory.CommitPeak.Mb
Value: 75
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: 19h1_release
Key : WER.OS.Timestamp
Value: 2019-03-18T12:02:00Z
Key : WER.OS.Version
Value: 10.0.18362.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 139
BUGCHECK_P1: 3
BUGCHECK_P2: ffff9204fbef4720
BUGCHECK_P3: ffff9204fbef4678
BUGCHECK_P4: 0
TRAP_FRAME: ffff9204fbef4720 -- (.trap 0xffff9204fbef4720)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffab08ce0a31a0 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffab08cd15b198 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8006fbdd8db rsp=ffff9204fbef48b8 rbp=0000000000000000
r8=ffffab08cd15b118 r9=fffff8006fb75160 r10=fffff80070281860
r11=ffff9204fbef4980 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac pe cy
nt!KiInsertQueueApc+0x137af3:
fffff800`6fbdd8db cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: ffff9204fbef4678 -- (.exr 0xffff9204fbef4678)
ExceptionAddress: fffff8006fbdd8db (nt!KiInsertQueueApc+0x0000000000137af3)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: csrss.exe
ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000003
EXCEPTION_STR: 0xc0000409
STACK_TEXT:
ffff9204`fbef43f8 fffff800`6fbd30e9 : 00000000`00000139 00000000`00000003 ffff9204`fbef4720 ffff9204`fbef4678 : nt!KeBugCheckEx
ffff9204`fbef4400 fffff800`6fbd3510 : 00000000`00000000 00000000`00000000 00000000`00000002 00000000`00000003 : nt!KiBugCheckDispatch+0x69
ffff9204`fbef4540 fffff800`6fbd18a5 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffff9204`fbef4720 fffff800`6fbdd8db : fffff800`6faa548d ffffab08`d5bce540 00000000`00000000 ffffab08`d5bce7c8 : nt!KiRaiseSecurityCheckFailure+0x325
ffff9204`fbef48b8 fffff800`6faa548d : ffffab08`d5bce540 00000000`00000000 ffffab08`d5bce7c8 ffffc180`97a00180 : nt!KiInsertQueueApc+0x137af3
ffff9204`fbef48c0 fffff800`70051c30 : ffffab08`ce3207a0 ffffab08`cd15b080 ffffab08`cd15b000 ffffab08`d02e2080 : nt!KeRequestTerminationThread+0xc1
ffff9204`fbef49a0 fffff800`7005133f : 00000000`00000008 ffffab08`cd15b080 00000000`00000000 00000000`00000000 : nt!PspTerminateThreadByPointer+0x80
ffff9204`fbef49e0 fffff800`70039400 : ffffab08`d0f50080 00000000`00000000 ffffab08`ce3204c0 ffffab08`ce3204c0 : nt!PspTerminateAllThreads+0xcb
ffff9204`fbef4a50 fffff800`700391e9 : ffffffff`ffffffff ffff9204`fbef4b80 ffffab08`d0c0e4c0 00000000`00000001 : nt!PspTerminateProcess+0xe0
ffff9204`fbef4a90 fffff800`6fbd2b18 : ffffab08`000017ac ffffab08`d02e2080 ffffab08`ce3204c0 0000023c`77660bf0 : nt!NtTerminateProcess+0xa9
ffff9204`fbef4b00 00007ffb`27efc644 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000007b`c847f848 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`27efc644
SYMBOL_NAME: nt!KiFastFailDispatch+d0
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.18362.418
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: d0
FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {3aede96a-54dd-40d6-d4cb-2a161a843851}
Followup: MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000821, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff803370c1870, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4577
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 27858
Key : Analysis.Memory.CommitPeak.Mb
Value: 72
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: 19h1_release
Key : WER.OS.Timestamp
Value: 2019-03-18T12:02:00Z
Key : WER.OS.Version
Value: 10.0.18362.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: a
BUGCHECK_P1: 821
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff803370c1870
READ_ADDRESS: fffff803375733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8033742a3c8: Unable to get Flags value from nt!KdVersionBlock
fffff8033742a3c8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000821
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: Wow.exe
TRAP_FRAME: ffff990891e4c5a0 -- (.trap 0xffff990891e4c5a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000066e47eb1 rbx=0000000000000000 rcx=0000000066e47eb1
rdx=00000007ff9c6e7b rsi=0000000000000000 rdi=0000000000000000
rip=fffff803370c1870 rsp=ffff990891e4c730 rbp=ffff990891e4c860
r8=0000000000000800 r9=ffff808575d3d080 r10=ffff990891e4c798
r11=00007ff9c6e7bea1 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!MiCheckVirtualAddress+0xf0:
fffff803`370c1870 410fb64821 movzx ecx,byte ptr [r8+21h] ds:00000000`00000821=??
Resetting default scope
STACK_TEXT:
ffff9908`91e4c458 fffff803`371d30e9 : 00000000`0000000a 00000000`00000821 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffff9908`91e4c460 fffff803`371cf42b : c1000002`478c0867 ffff984c`1ffd8920 ffff8085`7694b0a0 00000000`00000004 : nt!KiBugCheckDispatch+0x69
ffff9908`91e4c5a0 fffff803`370c1870 : ffff9908`91e4c740 ffffcf8e`a03bcc98 00000001`ffffffff fffffff6`0000000d : nt!KiPageFault+0x46b
ffff9908`91e4c730 fffff803`370c138c : 00000000`00000000 00000000`00000004 fffff803`3c05c000 ffff8085`66a90040 : nt!MiCheckVirtualAddress+0xf0
ffff9908`91e4c760 fffff803`370739ac : ffff987f`ffffffff ffff9800`00000000 ffff9800`00000000 ffff984c`1ffe71b8 : nt!MiInPagePageTable+0xcc
ffff9908`91e4c8b0 fffff803`37072cde : 00000000`00000000 fffff803`3758f240 00000000`00000001 00000000`00000000 : nt!MiUserFault+0x7dc
ffff9908`91e4c960 fffff803`371cf320 : ffff8085`704ba080 ffff8085`72357080 00000000`00000206 00000000`00000000 : nt!MmAccessFault+0x14e
ffff9908`91e4cb00 00007ff9`c6e7bea1 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x360
00000001`000fd6f0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`c6e7bea1
SYMBOL_NAME: nt!MiCheckVirtualAddress+f0
MODULE_NAME: nt
IMAGE_VERSION: 10.0.18362.418
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: f0
FAILURE_BUCKET_ID: AV_nt!MiCheckVirtualAddress
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {d1671d7f-3fe0-534a-163c-71c126713b3c}
Followup: MachineOwner
---------