MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041201, The subtype of the bugcheck.
Arg2: ffff83000020ffa0
Arg3: 01000000d98331df
Arg4: ffff8f095afb9da0
Debugging Details:
------------------
KEY_VALUES_STRING: 1
    Key  : Analysis.CPU.mSec
    Value: 2077
    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-05IMVF3
    Key  : Analysis.DebugData
    Value: CreateObject
    Key  : Analysis.DebugModel
    Value: CreateObject
    Key  : Analysis.Elapsed.mSec
    Value: 10857
    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 80
    Key  : Analysis.System
    Value: CreateObject
    Key  : WER.OS.Branch
    Value: vb_release
    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z
    Key  : WER.OS.Version
    Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE:  1a
BUGCHECK_P1: 41201
BUGCHECK_P2: ffff83000020ffa0
BUGCHECK_P3: 1000000d98331df
BUGCHECK_P4: ffff8f095afb9da0
CUSTOMER_CRASH_COUNT:  1
PROCESS_NAME:  League of Legends.exe
STACK_TEXT:
ffffb606`2c16b548 fffff802`7be4c05a     : 00000000`0000001a 00000000`00041201 ffff8300`0020ffa0 01000000`d98331df : nt!KeBugCheckEx
ffffb606`2c16b550 fffff802`7bcb52e4     : 00000000`00001000 00000000`00000000 00000000`00000000 ffff8f09`5afb9da0 : nt!MiGetPageProtection+0x19604a
ffffb606`2c16b5b0 fffff802`7bca31cf     : 00000000`00000000 00000000`41f4f000 00000000`41f4e000 00000000`00000000 : nt!MiQueryAddressState+0x2f4
ffffb606`2c16b7d0 fffff802`7c06b85c     : ffff8f09`00000000 00000000`00000000 ffff8f09`00000000 00000000`00000000 : nt!MiQueryAddressSpan+0xcf
ffffb606`2c16b890 fffff802`7c06b005     : ffff4db8`ce8d6d21 ffff8341`a0c00008 00000000`77124630 00000000`3940f2e4 : nt!MmQueryVirtualMemory+0x83c
ffffb606`2c16ba40 fffff802`7bdef878     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`387ce328 : nt!NtQueryVirtualMemory+0x25
ffffb606`2c16ba90 00007ffe`b8aac224     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`387ce248 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`b8aac224
SYMBOL_NAME:  nt!MiGetPageProtection+19604a
MODULE_NAME: nt
IMAGE_VERSION:  10.0.19041.450
STACK_COMMAND:  .thread ; .cxr ; kb
IMAGE_NAME:  ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET:  19604a
FAILURE_BUCKET_ID:  0x1a_41201_nt!MiGetPageProtection
OS_VERSION:  10.0.19041.1
BUILDLAB_STR:  vb_release
OSPLATFORM_TYPE:  x64
OSNAME:  Windows 10
FAILURE_ID_HASH:  {c1fe3b27-3ba8-d99e-656f-85f3d58dc669}
Followup:     MachineOwner
---------
KERNEL_AUTO_BOOST_LOCK_ACQUISITION_WITH_RAISED_IRQL (192)
A lock tracked by AutoBoost was acquired while executing at DISPATCH_LEVEL or
above.
Arguments:
Arg1: ffff8187f7132080, The address of the thread.
Arg2: ffffac0eb429fc90, The lock address.
Arg3: 0000000000000000, The IRQL at which the lock was acquired.
Arg4: 0000000000000000, Reserved.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
    Key  : Analysis.CPU.mSec
    Value: 2655
    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-05IMVF3
    Key  : Analysis.DebugData
    Value: CreateObject
    Key  : Analysis.DebugModel
    Value: CreateObject
    Key  : Analysis.Elapsed.mSec
    Value: 15838
    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 79
    Key  : Analysis.System
    Value: CreateObject
    Key  : WER.OS.Branch
    Value: vb_release
    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z
    Key  : WER.OS.Version
    Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE:  192
BUGCHECK_P1: ffff8187f7132080
BUGCHECK_P2: ffffac0eb429fc90
BUGCHECK_P3: 0
BUGCHECK_P4: 0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT:  1
PROCESS_NAME:  csrss.exe
STACK_TEXT:
ffff9500`11159048 fffff806`06025c32     : 00000000`00000192 ffff8187`f7132080 ffffac0e`b429fc90 00000000`00000000 : nt!KeBugCheckEx
ffff9500`11159050 fffff806`063f9ac8     : ffffac0e`b429fc60 00000000`00000000 00000000`00000000 ffff9500`11159940 : nt!ExAcquirePushLockSharedEx+0x142
ffff9500`111590a0 fffff806`063fa298     : ffff9500`11159940 00000000`00000000 ffffac0e`b429fc60 00000000`00000000 : nt!CmpLockKcbStackShared+0x38
ffff9500`111590d0 fffff806`063f2203     : ffff8187`0000001c ffff9500`11159420 ffff9500`111593d8 ffff8187`f97cb010 : nt!CmpDoParseKey+0x7a8
ffff9500`11159370 fffff806`063f58ee     : fffff806`063f1f01 00000000`00000000 ffff8187`f97cb010 00000000`00000001 : nt!CmpParseKey+0x2c3
ffff9500`11159510 fffff806`063f134a     : ffff8187`f97cb000 ffff9500`11159778 ffff8187`00000040 ffff8187`ef2fc820 : nt!ObpLookupObjectName+0x3fe
ffff9500`111596e0 fffff806`063f112c     : 00000000`00000000 00000000`00000000 00000000`00000000 ffff8187`ef2fc820 : nt!ObOpenObjectByNameEx+0x1fa
ffff9500`11159810 fffff806`063f0c51     : 0000009c`8b94d648 ffff9500`11159b80 00000000`00000001 fffff806`0600198e : nt!ObOpenObjectByName+0x5c
ffff9500`11159860 fffff806`063f023f     : 0000009c`8b94dae0 00000000`000000d4 00000000`00020119 00000000`00000000 : nt!CmOpenKey+0x2c1
ffff9500`11159ac0 fffff806`061ef878     : 00000000`00000000 00000000`00000000 ffff8187`f7132080 0000024e`b7628a80 : nt!NtOpenKeyEx+0xf
ffff9500`11159b00 00007ffa`611ae1b4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000009c`8b94d568 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`611ae1b4
SYMBOL_NAME:  nt!ExAcquirePushLockSharedEx+142
MODULE_NAME: nt
IMAGE_NAME:  ntkrnlmp.exe
IMAGE_VERSION:  10.0.19041.450
STACK_COMMAND:  .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET:  142
FAILURE_BUCKET_ID:  0x192_nt!ExAcquirePushLockSharedEx
OS_VERSION:  10.0.19041.1
BUILDLAB_STR:  vb_release
OSPLATFORM_TYPE:  x64
OSNAME:  Windows 10
FAILURE_ID_HASH:  {292e4563-5d10-0ceb-86fc-152da5e999ce}
Followup:     MachineOwner
---------
DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
    DISPATCH_LEVEL or above. The offending component can usually be
    identified with a stack trace.
Arg2: 0000000000001e00, The watchdog period.
Arg3: fffff8075f8fa320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
    additional information regarding the cumulative timeout
Arg4: 0000000000000000
Debugging Details:
------------------
*************************************************************************
***                                                                   ***
***                                                                   ***
***    Either you specified an unqualified symbol, or your debugger   ***
***    doesn't have full symbol information.  Unqualified symbol      ***
***    resolution is turned off by default. Please either specify a   ***
***    fully qualified symbol module!symbolname, or enable resolution ***
***    of unqualified symbols by typing ".symopt- 100". Note that     ***
***    enabling unqualified symbol resolution with network symbol     ***
***    server shares in the symbol path may cause the debugger to     ***
***    appear to hang for long periods of time when an incorrect      ***
***    symbol name is typed or the network symbol server is down.     ***
***                                                                   ***
***    For some commands to work properly, your symbol path           ***
***    must point to .pdb files that have full type information.      ***
***                                                                   ***
***    Certain .pdb files (such as the public OS symbols) do not      ***
***    contain the required information.  Contact the group that      ***
***    provided you with these symbols if you need this command to    ***
***    work.                                                          ***
***                                                                   ***
***    Type referenced: TickPeriods                                   ***
***                                                                   ***
*************************************************************************
KEY_VALUES_STRING: 1
    Key  : Analysis.CPU.mSec
    Value: 2968
    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-05IMVF3
    Key  : Analysis.DebugData
    Value: CreateObject
    Key  : Analysis.DebugModel
    Value: CreateObject
    Key  : Analysis.Elapsed.mSec
    Value: 11941
    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 79
    Key  : Analysis.System
    Value: CreateObject
    Key  : WER.OS.Branch
    Value: vb_release
    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z
    Key  : WER.OS.Version
    Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE:  133
BUGCHECK_P1: 1
BUGCHECK_P2: 1e00
BUGCHECK_P3: fffff8075f8fa320
BUGCHECK_P4: 0
DPC_TIMEOUT_TYPE:  DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED
TRAP_FRAME:  fffffb81fcd79680 -- (.trap 0xfffffb81fcd79680)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000100084 rbx=0000000000000000 rcx=ffff9b817f340180
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8075ee2aef1 rsp=fffffb81fcd79810 rbp=0000000000000000
r8=ffffb30cbbf584c0  r9=0000000000000080 r10=0000000000000000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
nt!KeRemoveQueueEx+0x551:
fffff807`5ee2aef1 8b07            mov     eax,dword ptr [rdi] ds:00000000`00000000=????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT:  1
PROCESS_NAME:  LeagueClientUxRender.exe
STACK_TEXT:
ffff9b81`7f338e18 fffff807`5f05963e     : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff807`5f8fa320 : nt!KeBugCheckEx
ffff9b81`7f338e20 fffff807`5eec98bd     : 000010a1`8b6c8850 00000000`00000000 fffffb81`fcd79700 ffff9b81`7f340180 : nt!KeAccumulateTicks+0x18cbee
ffff9b81`7f338e80 fffff807`5eec973a     : ffffb30c`af8cd040 fffffb81`fcd79700 00000000`0004f081 00000000`00000000 : nt!KeClockInterruptNotify+0xbd
ffff9b81`7f338f30 fffff807`5ee08725     : ffffb30c`af8cd040 fffff807`5ef43b37 00000000`00000000 00000000`00000000 : nt!HalpTimerClockIpiRoutine+0x1a
ffff9b81`7f338f60 fffff807`5efdf9ea     : fffffb81`fcd79700 ffffb30c`af8cd040 00000000`00000000 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5
ffff9b81`7f338fb0 fffff807`5efdff57     : ffffb30c`baf70280 ffff9b81`7eee0340 ffffb30c`baf70280 00000000`00000000 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
fffffb81`fcd79680 fffff807`5ee2aef1     : ffffb30c`00000000 ffffb30c`00000000 00000000`00000000 00000000`00000001 : nt!KiInterruptDispatchNoLockNoEtw+0x37
fffffb81`fcd79810 fffff807`5ee2a638     : ffffb30c`bbf584c0 00000000`00000001 ffffb30c`bbaef830 fffff807`00000000 : nt!KeRemoveQueueEx+0x551
fffffb81`fcd798b0 fffff807`5f2dd26d     : 00000000`00000000 00000000`00000000 ffff9b81`7eed5180 fffff807`5ee3e2aa : nt!IoRemoveIoCompletion+0x98
fffffb81`fcd799e0 fffff807`5efef878     : ffffb30c`baf70280 00000000`0935ec08 fffffb81`fcd79aa8 00000000`02be1394 : nt!NtRemoveIoCompletion+0x13d
fffffb81`fcd79a90 00000000`77361cfc     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`0935ebe8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77361cfc
SYMBOL_NAME:  nt!KeAccumulateTicks+18cbee
MODULE_NAME: nt
IMAGE_NAME:  ntkrnlmp.exe
IMAGE_VERSION:  10.0.19041.450
STACK_COMMAND:  .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET:  18cbee
FAILURE_BUCKET_ID:  0x133_ISR_nt!KeAccumulateTicks
OS_VERSION:  10.0.19041.1
BUILDLAB_STR:  vb_release
OSPLATFORM_TYPE:  x64
OSNAME:  Windows 10
FAILURE_ID_HASH:  {65350307-c3b9-f4b5-8829-4d27e9ff9b06}
Followup:     MachineOwner
---------
INTERNAL_POWER_ERROR (a0)
The power policy manager experienced a fatal error.
Arguments:
Arg1: 0000000000000107, A data mismatch has occurred in the internal hibernation data
    structures.
Arg2: 000000000000000a
Arg3: ffffd20724e4b6d0, POP_HIBER_CONTEXT
Arg4: 0000000000000000, PO_MEMORY_RANGE_ARRAY
Debugging Details:
------------------
KEY_VALUES_STRING: 1
    Key  : Analysis.CPU.mSec
    Value: 2234
    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-05IMVF3
    Key  : Analysis.DebugData
    Value: CreateObject
    Key  : Analysis.DebugModel
    Value: CreateObject
    Key  : Analysis.Elapsed.mSec
    Value: 11034
    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 81
    Key  : Analysis.System
    Value: CreateObject
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
DUMP_FILE_ATTRIBUTES: 0x9
  Hiber Crash Dump
  Kernel Generated Triage Dump
BUGCHECK_CODE:  a0
BUGCHECK_P1: 107
BUGCHECK_P2: a
BUGCHECK_P3: ffffd20724e4b6d0
BUGCHECK_P4: 0
CUSTOMER_CRASH_COUNT:  1
STACK_TEXT:
fffffe8c`e068b488 fffff802`7fdaf835     : 00000000`000000a0 00000000`00000107 00000000`0000000a ffffd207`24e4b6d0 : nt!KeBugCheckEx
fffffe8c`e068b490 fffff802`7fda008e     : ffff9981`31101180 fffff802`7f76f194 00070106`00070106 00000000`00000001 : nt!PopDecompressHiberBlocks+0x11731
fffffe8c`e068b6b0 fffff802`7fd9fdf0     : 00000000`00000000 00000000`00000000 00000000`00000014 00000000`00000000 : nt!PopRestoreHiberContext+0x146
fffffe8c`e068b740 fffff802`7fd9fbb3     : fffff802`800503f0 fffffe8c`e068b960 fffffe8c`e068bb20 ffffd207`288f31b0 : nt!PopHandleNextState+0x210
fffffe8c`e068b790 fffff802`7f63a6be     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!PopInvokeStateHandlerTargetProcessor+0x53
fffffe8c`e068b860 fffff802`7f6399a4     : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x30e
fffffe8c`e068b9d0 fffff802`7f7e1aae     : ffffffff`00000000 ffff9981`31101180 ffff9981`3110c340 ffffd207`23487040 : nt!KiRetireDpcList+0x1f4
fffffe8c`e068bc60 00000000`00000000     : fffffe8c`e068c000 fffffe8c`e0686000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
SYMBOL_NAME:  nt!PopDecompressHiberBlocks+11731
MODULE_NAME: nt
IMAGE_NAME:  ntkrnlmp.exe
IMAGE_VERSION:  10.0.19041.450
STACK_COMMAND:  .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET:  11731
FAILURE_BUCKET_ID:  0xa0_107_nt!PopDecompressHiberBlocks
OSPLATFORM_TYPE:  x64
OSNAME:  Windows 10
FAILURE_ID_HASH:  {5d9c83f4-ef2e-05d6-286b-9d88881fdb2f}
Followup:     MachineOwner
---------