KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 000000000000001e, Type of memory safety violation
Arg2: ffff9482d6e13a90, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffff9482d6e139e8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 6265
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 14470
Key : Analysis.Memory.CommitPeak.Mb
Value: 82
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 139
BUGCHECK_P1: 1e
BUGCHECK_P2: ffff9482d6e13a90
BUGCHECK_P3: ffff9482d6e139e8
BUGCHECK_P4: 0
IMAGE_NAME: ntkrnlmp.exe
MODULE_NAME: ntkrnlmp
FAULTING_MODULE: fffff80035800000 nt
TRAP_FRAME: ffff9482d6e13a90 -- (.trap 0xffff9482d6e13a90)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000003 rbx=0000000000000000 rcx=000000000000001e
rdx=fffff800364fdc80 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80035c6b58d rsp=ffff9482d6e13c20 rbp=ffff8000f8500180
r8=0000000000000000 r9=ffff9482d6e13fb0 r10=0000000000000000
r11=0000000000000053 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!KeQueryValuesThread+0x1957dd:
fffff800`35c6b58d cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: ffff9482d6e139e8 -- (.exr 0xffff9482d6e139e8)
ExceptionAddress: fffff80035c6b58d (nt!KeQueryValuesThread+0x00000000001957dd)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 000000000000001e
Subcode: 0x1e FAST_FAIL_INVALID_NEXT_THREAD
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: svchost.exe
ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 000000000000001e
EXCEPTION_STR: 0xc0000409
STACK_TEXT:
ffff9482`d6e13768 fffff800`35c06569 : 00000000`00000139 00000000`0000001e ffff9482`d6e13a90 ffff9482`d6e139e8 : nt!KeBugCheckEx
ffff9482`d6e13770 fffff800`35c06990 : 00000000`00000000 00000000`00000002 ffffbb8f`72209701 ffff9482`d6e13d68 : nt!KiBugCheckDispatch+0x69
ffff9482`d6e138b0 fffff800`35c04d23 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000070 : nt!KiFastFailDispatch+0xd0
ffff9482`d6e13a90 fffff800`35c6b58d : ffffcc83`5b013e80 007000b0`000000b0 00000000`00000000 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x323
ffff9482`d6e13c20 fffff800`35edb3e1 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeQueryValuesThread+0x1957dd
ffff9482`d6e13ca0 fffff800`35edb072 : ffffcc83`65de6660 ffffcc83`65de68e0 ffffcc83`65153080 00000000`00000001 : nt!PsQueryStatisticsProcess+0x111
ffff9482`d6e13d20 fffff800`35eeeca1 : 00000000`00000001 ffffcc83`65de6080 00000000`ffffffff 00000000`00000000 : nt!ExpCopyProcessInfo+0x42
ffff9482`d6e13da0 fffff800`35ef21e3 : 00000000`00000000 00000000`0003ac4e 00000000`00000000 00000000`00000000 : nt!ExpGetProcessInformation+0x9f1
ffff9482`d6e14400 fffff800`35ef18c7 : 00000000`00000000 00000000`00000008 00000000`0003ac4e 00000000`0003ac4e : nt!ExpQuerySystemInformation+0x7d3
ffff9482`d6e14ac0 fffff800`35c05fb8 : ffffcc83`65150000 00007ffa`ee2c3fa4 ffff9482`d6e14b80 ffffcc83`638c9de0 : nt!NtQuerySystemInformation+0x37
ffff9482`d6e14b00 00007ffa`ee64c454 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000ff`b99fef58 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`ee64c454
IMAGE_VERSION: 10.0.19041.572
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: 0x139_1e_INVALID_NEXT_THREAD_IMAGE_ntkrnlmp.exe
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {64929928-a824-2134-285e-71128496d311}
Followup: MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffb58c830fe7a8, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80749d60bc5, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4437
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 15023
Key : Analysis.Memory.CommitPeak.Mb
Value: 82
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: a
BUGCHECK_P1: ffffb58c830fe7a8
BUGCHECK_P2: ff
BUGCHECK_P3: 0
BUGCHECK_P4: fffff80749d60bc5
READ_ADDRESS: fffff8074a4fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8074a40f340: Unable to get Flags value from nt!KdVersionBlock
fffff8074a40f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffb58c830fe7a8
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: fffff8074e66b550 -- (.trap 0xfffff8074e66b550)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000cff3826c1 rbx=0000000000000000 rcx=0000000000000aa6
rdx=0000000cff383167 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80749d60bc5 rsp=fffff8074e66b6e0 rbp=0000000000000001
r8=0000000000000000 r9=00000000ffffffff r10=0000fffff80749b6
r11=ffff7c7b17200000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di pl nz ac po nc
nt!PpmIdleUpdateConcurrency+0x55:
fffff807`49d60bc5 4a014ccb20 add qword ptr [rbx+r9*8+20h],rcx ds:00000008`00000018=????????????????
Resetting default scope
STACK_TEXT:
fffff807`4e66b408 fffff807`49c06569 : 00000000`0000000a ffffb58c`830fe7a8 00000000`000000ff 00000000`00000000 : nt!KeBugCheckEx
fffff807`4e66b410 fffff807`49c02869 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff807`4e66b550 fffff807`49d60bc5 : 00000000`00000200 fffff807`5a8e18e3 00000000`00000000 ffffb584`836d3010 : nt!KiPageFault+0x469
fffff807`4e66b6e0 fffff807`49c872ba : 00001244`df814740 00000000`00000000 ffffb584`836d3010 00000000`00000000 : nt!PpmIdleUpdateConcurrency+0x55
fffff807`4e66b720 fffff807`49b28884 : 00000000`00000000 00001f80`00000000 00000000`00000000 00000000`00000002 : nt!PpmIdleExecuteTransition+0x15e8ba
fffff807`4e66baf0 fffff807`49bf80c4 : 00000000`00000000 fffff807`4a527600 ffffb584`87a1b080 00000000`00000da4 : nt!PoIdle+0x374
fffff807`4e66bc60 00000000`00000000 : fffff807`4e66c000 fffff807`4e666000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x54
SYMBOL_NAME: nt!PpmIdleUpdateConcurrency+55
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.572
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 55
FAILURE_BUCKET_ID: AV_nt!PpmIdleUpdateConcurrency
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {1e521b51-d14a-dc59-37c3-c21c0b8ec9a6}
Followup: MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffdfd3b7ef2088, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 00000000000000b8, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80575f2860c, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4812
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 11733
Key : Analysis.Memory.CommitPeak.Mb
Value: 83
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: a
BUGCHECK_P1: ffffdfd3b7ef2088
BUGCHECK_P2: ff
BUGCHECK_P3: b8
BUGCHECK_P4: fffff80575f2860c
READ_ADDRESS: fffff805768fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8057680f340: Unable to get Flags value from nt!KdVersionBlock
fffff8057680f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffdfd3b7ef2088
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: ffff890526e29960 -- (.trap 0xffff890526e29960)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000f952f1de rbx=0000000000000000 rcx=0000000000000000
rdx=fffff8057681eda0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80575f2860c rsp=ffff890526e29af0 rbp=ffff890526e29bf0
r8=0000000000009acc r9=ffffdfd3b7ef2060 r10=ffffdc05cbee5010
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di ng nz na po nc
nt!PoIdle+0xfc:
fffff805`75f2860c 4d014128 add qword ptr [r9+28h],r8 ds:ffffdfd3`b7ef2088=????????????????
Resetting default scope
STACK_TEXT:
ffff8905`26e29818 fffff805`76006569 : 00000000`0000000a ffffdfd3`b7ef2088 00000000`000000ff 00000000`000000b8 : nt!KeBugCheckEx
ffff8905`26e29820 fffff805`76002869 : ffffdc05`cbee5010 ffffffff`ffffffff ffffffff`a12a4e25 ffffdc05`cbee51f8 : nt!KiBugCheckDispatch+0x69
ffff8905`26e29960 fffff805`75f2860c : 00000000`00000000 00001f80`00e5003b 00000000`00000000 00000000`00000002 : nt!KiPageFault+0x469
ffff8905`26e29af0 fffff805`75ff80c4 : ffffffff`00000000 ffffca01`03b8b240 ffffdc05`d020c080 00000000`000007e0 : nt!PoIdle+0xfc
ffff8905`26e29c60 00000000`00000000 : ffff8905`26e2a000 ffff8905`26e24000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x54
SYMBOL_NAME: nt!PoIdle+fc
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.572
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: fc
FAILURE_BUCKET_ID: AV_nt!PoIdle
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {0f00f4f4-fc66-441c-10bf-8ccc2952f11b}
Followup: MachineOwner
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8024b41a876, Address of the instruction which caused the bugcheck
Arg3: ffffa101b33d9920, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4015
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 7749
Key : Analysis.Memory.CommitPeak.Mb
Value: 75
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff8024b41a876
BUGCHECK_P3: ffffa101b33d9920
BUGCHECK_P4: 0
CONTEXT: ffffa101b33d9920 -- (.cxr 0xffffa101b33d9920)
rax=ffffcf01344ea068 rbx=ffffcf01330c7080 rcx=cf01344ea03073c7
rdx=0000000000000000 rsi=0000000000000000 rdi=ffffcf01344ea060
rip=fffff8024b41a876 rsp=ffff8c0c9fce4940 rbp=ffff8c0c9fce4a01
r8=0000000000000000 r9=00000003a92e45a9 r10=0000000000000002
r11=fffff780000003b0 r12=0000000000000000 r13=cf01344ea03073c7
r14=0000000000000000 r15=ffffcf01330c71c0
iopl=0 nv up ei ng nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050282
nt!KeAbPreWait+0x6:
fffff802`4b41a876 0fb64120 movzx eax,byte ptr [rcx+20h] ds:002b:cf01344e`a03073e7=??
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: EpicGamesLauncher.exe
BAD_STACK_POINTER: ffffa101b33d9018
STACK_TEXT:
ffff8c0c`9fce4940 fffff802`4b66e51b : 00000000`000000f3 fffff802`4b8efe11 00000000`00000001 ffffcf01`330c71c0 : nt!KeAbPreWait+0x6
ffff8c0c`9fce4970 fffff802`4b8f1531 : ffffcf01`344ea060 00000000`00000006 00000000`00000001 00000000`00000000 : nt!KeWaitForSingleObject+0x18f9db
ffff8c0c`9fce4a60 fffff802`4b8f15da : ffffcf01`330c7080 00000014`ea6ff648 00000000`00000000 fffff802`4b605e18 : nt!ObWaitForSingleObject+0x91
ffff8c0c`9fce4ac0 fffff802`4b605fb8 : 00000000`00000000 00000000`00000000 ffff8c0c`9fce4b18 ffffffff`fffe7960 : nt!NtWaitForSingleObject+0x6a
ffff8c0c`9fce4b00 00007ffd`aebcbe14 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000014`ea6ff618 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`aebcbe14
SYMBOL_NAME: nt!KeAbPreWait+6
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.572
STACK_COMMAND: .cxr 0xffffa101b33d9920 ; kb
BUCKET_ID_FUNC_OFFSET: 6
FAILURE_BUCKET_ID: 0x3B_c0000005_STACKPTR_ERROR_nt!KeAbPreWait
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {ddcb9656-083d-2ea8-831a-b13145df4ef7}
Followup: MachineOwner
---------
DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000000, A single DPC or ISR exceeded its time allotment. The offending
component can usually be identified with a stack trace.
Arg2: 0000000000000501, The DPC time count (in ticks).
Arg3: 0000000000000500, The DPC time allotment (in ticks).
Arg4: fffff8025eafb320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
additional information regarding this single DPC timeout
Debugging Details:
------------------
*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: TickPeriods ***
*** ***
*************************************************************************
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5858
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 9253
Key : Analysis.Memory.CommitPeak.Mb
Value: 82
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 133
BUGCHECK_P1: 0
BUGCHECK_P2: 501
BUGCHECK_P3: 500
BUGCHECK_P4: fffff8025eafb320
DPC_TIMEOUT_TYPE: SINGLE_DPC_TIMEOUT_EXCEEDED
TRAP_FRAME: fffff80260c6b570 -- (.trap 0xfffff80260c6b570)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000060081 rbx=0000000000000000 rcx=fffff8025ea23b48
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8025e0be212 rsp=fffff80260c6b700 rbp=fffff80258e0b180
r8=0000000000000000 r9=ffffa80f728ff390 r10=0000fffff8025e09
r11=ffffa8fa4b400000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!KiAcquireKobjectLockSafe+0x32:
fffff802`5e0be212 8b03 mov eax,dword ptr [rbx] ds:00000000`00000000=????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
STACK_TEXT:
fffff802`60c79c88 fffff802`5e287a14 : 00000000`00000133 00000000`00000000 00000000`00000501 00000000`00000500 : nt!KeBugCheckEx
fffff802`60c79c90 fffff802`5e12b7cd : 000018d0`3c6451dc fffff802`58e0b180 00000000`00000246 00000000`00076668 : nt!KeAccumulateTicks+0x15dd24
fffff802`60c79cf0 fffff802`5e12bd71 : 00000513`ff00007b 00000000`00046927 fffff802`58e0b180 00000000`00000001 : nt!KiUpdateRunTime+0x5d
fffff802`60c79d40 fffff802`5e126823 : fffff802`58e0b180 00000000`00000000 fffff802`5ea31990 00000000`00000000 : nt!KiUpdateTime+0x4a1
fffff802`60c79e80 fffff802`5e12e382 : fffff802`60c6b570 fffff802`60c6b5f0 fffff802`60c6b500 00000000`00000002 : nt!KeClockInterruptNotify+0x2e3
fffff802`60c79f30 fffff802`5e02ecd5 : 00000011`a4c1fb7d fffff802`5eaf39e0 fffff802`5eaf3a90 ffff45f0`24f6edc5 : nt!HalpTimerClockInterrupt+0xe2
fffff802`60c79f60 fffff802`5e1f604a : fffff802`60c6b5f0 fffff802`5eaf39e0 00000000`00000002 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5
fffff802`60c79fb0 fffff802`5e1f65b7 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
fffff802`60c6b570 fffff802`5e0be212 : 00000000`00140001 00000000`000000ff 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatchNoLockNoEtw+0x37
fffff802`60c6b700 fffff802`5e0c4b4f : fffff802`5ea23b48 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiAcquireKobjectLockSafe+0x32
fffff802`60c6b730 fffff802`5e12e82b : fffff802`00000000 fffff802`60c6b960 00000000`00000001 fffff802`58e0e240 : nt!KeSetEvent+0x6f
fffff802`60c6b7c0 fffff802`5e12e7c6 : fffff802`60c6bb40 fffff802`58e0b180 000018bf`7cf0d08c ffffa80f`6fcf9000 : nt!PpmReleaseLock+0x1b
fffff802`60c6b7f0 fffff802`5e0e549e : fffff802`58e0e240 ffffa80f`72004000 fffff802`60c6bb30 ffffa80f`00000002 : nt!PpmCheckRun+0x66
fffff802`60c6b860 fffff802`5e0e4784 : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00046643 : nt!KiExecuteAllDpcs+0x30e
fffff802`60c6b9d0 fffff802`5e1f810e : 00000000`00000000 fffff802`58e0b180 fffff802`5eb27600 ffffa80f`72c85040 : nt!KiRetireDpcList+0x1f4
fffff802`60c6bc60 00000000`00000000 : fffff802`60c6c000 fffff802`60c66000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
SYMBOL_NAME: nt!KeAccumulateTicks+15dd24
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.572
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 15dd24
FAILURE_BUCKET_ID: 0x133_DPC_nt!KeAccumulateTicks
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {88dc98ce-f842-4daa-98d0-858621db6b0f}
Followup: MachineOwner
---------