Loading Dump File [C:\Users\maksu\Downloads\010921-7843-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Machine Name:
Kernel base = 0xfffff801`54200000 PsLoadedModuleList = 0xfffff801`54e2a2b0
Debug session time: Sat Jan 9 12:53:09.087 2021 (UTC + 3:00)
System Uptime: 0 days 1:52:45.759
Loading Kernel Symbols
..
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
.............................................................
................................................................
................................................................
................
Loading User Symbols
Loading unloaded module list
...........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff801`545f5780 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffffd8f`0c328dc0=000000000000003b
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c000001d, Exception code that caused the bugcheck
Arg2: ffff81cb128f0f86, Address of the instruction which caused the bugcheck
Arg3: fffffd8f0c3296c0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5436
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G2EFLS9
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 7259
Key : Analysis.Memory.CommitPeak.Mb
Value: 94
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
BUGCHECK_CODE: 3b
BUGCHECK_P1: c000001d
BUGCHECK_P2: ffff81cb128f0f86
BUGCHECK_P3: fffffd8f0c3296c0
BUGCHECK_P4: 0
CONTEXT: fffffd8f0c3296c0 -- (.cxr 0xfffffd8f0c3296c0)
rax=0000000000000000 rbx=000000d6000000c8 rcx=fffffd8f0c32a280
rdx=0000000000000800 rsi=ffff8192406067e8 rdi=fffffd8f0c32a280
rip=ffff81cb128f0f86 rsp=fffffd8f0c32a0c0 rbp=fffffd8f0c32a1f0
r8=0000000000000001 r9=7fff819240690eb8 r10=fffff80154461420
r11=fffffd8f0c32a0e0 r12=ffff978d869d2108 r13=ffff81cb12aa40d0
r14=ffff81cb12adc0c0 r15=ffff819240690000
iopl=0 nv up ei ng nz na po cy
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050287
win32kbase!CMouseProcessor::MouseInputDataEx::TestProcessingOption+0x22:
ffff81cb`128f0f86 07 ???
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: csrss.exe
STACK_TEXT:
fffffd8f`0c32a0c0 ffff81cb`12a58903 : 000000d6`000000c8 000000d6`000000c8 ffff8192`406067e8 00000000`00000140 : win32kbase!CMouseProcessor::MouseInputDataEx::TestProcessingOption+0x22
fffffd8f`0c32a0f0 ffff81cb`12a49baa : ffff8192`406067d0 ffff81cb`12a49c95 ffff978d`869d2108 ffff8192`406062d0 : win32kbase!CMouseProcessor::ProcessInput+0x4c7
fffffd8f`0c32a330 ffff81cb`12a49f13 : ffff8192`406062d0 0000000f`c0d6717b ffff8192`406067d0 ffff978d`869d2108 : win32kbase!CMouseSensor::FlushMouseReports+0x42
fffffd8f`0c32a370 ffff81cb`12a49e44 : ffff8192`44cf7690 00000000`00000018 ffff8192`40606200 ffff8192`406062d0 : win32kbase!CMouseSensor::ProcessInputWithRateLimitingIfEnabled+0xb3
fffffd8f`0c32a3c0 ffff81cb`12a3c04a : ffff81cb`12aa0700 fffffd8f`0c32a500 ffff8192`406062d0 00000000`00000000 : win32kbase!CMouseSensor::ProcessInput+0x54
fffffd8f`0c32a400 ffff81cb`128f4c1d : 00000000`00000040 ffff81cb`12aa0700 00000000`00000001 ffff978d`86c6d170 : win32kbase!CBaseInput::OnReadNotification+0x52a
fffffd8f`0c32a540 ffff81cb`128f4d52 : ffff978d`86ce6080 ffff8192`4069c6a0 00000000`00000006 ffff4e07`8e8ed612 : win32kbase!CBaseInput::OnDispatcherObjectSignaled+0x31d
fffffd8f`0c32a680 ffff81cb`128e86de : ffff81cb`12ae82a0 ffff8192`4069c6a0 ffff81cb`12ae1970 00000000`00000000 : win32kbase!CBaseInput::_OnDispatcherObjectSignaled+0x12
fffffd8f`0c32a6b0 ffff81cb`128e8430 : 00000000`00000006 ffff81cb`12ae82a0 00000000`00000006 ffff8192`4069c6a0 : win32kbase!LegacyInputDispatcher::Dispatch+0x52
fffffd8f`0c32a6e0 ffff81cb`11ec07a8 : ffff8192`4061b050 ffff8192`4061b050 00000000`00000004 00000000`00000001 : win32kbase!LegacyInputDispatcher::WaitAndDispatch+0x100
fffffd8f`0c32a810 ffff81cb`11ec0374 : 00000000`00000004 00000000`00000004 00000000`0000000d ffff81cb`12ae9a70 : win32kfull!xxxDesktopThreadWaiter+0x130
fffffd8f`0c32a890 ffff81cb`129560c3 : ffff978d`86ce6080 ffff978d`86ce6080 00000000`00000000 00000000`00000005 : win32kfull!xxxDesktopThread+0x544
fffffd8f`0c32a970 ffff81cb`11e58d80 : ffff978d`86ce6080 00000000`00000000 00000000`00000005 00000000`00000005 : win32kbase!xxxCreateSystemThreads+0xc3
fffffd8f`0c32aaa0 ffff81cb`11ca474d : ffff978d`86ce6080 ffff978d`86ce6080 00000000`00000000 00000000`00000000 : win32kfull!NtUserCallNoParam+0x70
fffffd8f`0c32aad0 fffff801`546071b8 : ffff978d`00000005 00000000`00000005 0000021a`08404150 00000000`000004c0 : win32k!NtUserCallNoParam+0x15
fffffd8f`0c32ab00 00007fff`b99310e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000d9`39c7fd48 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`b99310e4
CHKIMG_EXTENSION: !chkimg -lo 50 -d !win32kbase
ffff81cb128f0f86 - win32kbase!CMouseProcessor::MouseInputDataEx::TestProcessingOption+22
[ 0f:07 ]
1 error : !win32kbase (ffff81cb128f0f86)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
MEMORY_CORRUPTOR: ONE_BIT
STACK_COMMAND: .cxr 0xfffffd8f0c3296c0 ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}
Followup: memory_corruption
---------