IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 00000088821ff710, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80175eeb17c, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5765
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on BORA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 8379
Key : Analysis.Memory.CommitPeak.Mb
Value: 76
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: a
BUGCHECK_P1: 88821ff710
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff80175eeb17c
WRITE_ADDRESS: fffff801768fa388: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8017680f2a8: Unable to get Flags value from nt!KdVersionBlock
fffff8017680f2a8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
00000088821ff710
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: csrss.exe
TRAP_FRAME: ffffad0ec158e440 -- (.trap 0xffffad0ec158e440)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000088821ff710 rbx=0000000000000000 rcx=000000000000000f
rdx=0000000000008000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80175eeb17c rsp=ffffad0ec158e5d0 rbp=0000000000000000
r8=00000000011d8bc5 r9=00000000039bf7c0 r10=0000000000000000
r11=0000000000000003 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!KiDirectSwitchThread+0x6cc:
fffff801`75eeb17c 8808 mov byte ptr [rax],cl ds:00000088`821ff710=??
Resetting default scope
STACK_TEXT:
ffffad0e`c158e2f8 fffff801`75fef929 : 00000000`0000000a 00000088`821ff710 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffffad0e`c158e300 fffff801`75febc29 : ffffb484`4ee80620 00000000`00000001 00000000`00003931 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffad0e`c158e440 fffff801`75eeb17c : 00000000`00000000 fffff801`75fef1e0 00000000`00000000 fffff801`75e272af : nt!KiPageFault+0x469
ffffad0e`c158e5d0 fffff801`75e3e89d : 00000000`00000001 00000000`00000001 00000000`00000000 ffff9984`00000000 : nt!KiDirectSwitchThread+0x6cc
ffffad0e`c158e690 fffff801`75eece60 : ffff9984`ae13d548 ffff9984`00000000 ffff9984`ae13d548 00000000`00000000 : nt!KiExitDispatcher+0x1dd
ffffad0e`c158e700 fffff801`75e2f413 : ffffffff`ffffffff ffff9984`00000001 00000000`00000001 00000000`00000001 : nt!KeReleaseSemaphoreEx+0x120
ffffad0e`c158e780 fffff801`762ecce3 : ffff9984`b0a9f080 ffff9984`b0a9f508 ffff9984`00000010 ffffffff`ffffffff : nt!AlpcpSignalAndWait+0x243
ffffad0e`c158e820 fffff801`762033bd : ffffffff`00000000 00000000`00000000 ffff9984`ae0299a0 ffff9984`ae0299a0 : nt!AlpcpCompleteDeferSignalRequestAndWait+0x57
ffffad0e`c158e860 fffff801`76202419 : ffff9984`b0a9f080 00000000`00001401 00000000`00000000 ffffad0e`c158e948 : nt!AlpcpReceiveMessagePort+0x3ad
ffffad0e`c158e8f0 fffff801`76201f5e : ffffad0e`c158ea30 ffff9984`ae0299a0 0000006a`ebfbf4d8 00000000`00000000 : nt!AlpcpReceiveMessage+0x339
ffffad0e`c158e9d0 fffff801`75fef378 : ffff9984`b0a9f080 ffffad0e`c158eb80 0000006a`ebfbf468 ffffad0e`c158eaa8 : nt!NtAlpcSendWaitReceivePort+0xfe
ffffad0e`c158ea90 00007ffb`b18cbf04 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000006a`ebfbf448 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`b18cbf04
SYMBOL_NAME: nt!KiDirectSwitchThread+6cc
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.264
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 6cc
FAILURE_BUCKET_ID: AV_nt!KiDirectSwitchThread
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {f852e30f-dbe6-5ff1-d3f6-a35884600010}
Followup: MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000005681, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8040caafe9e, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 7202
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on BORA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 8452
Key : Analysis.Memory.CommitPeak.Mb
Value: 81
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: a
BUGCHECK_P1: 5681
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8040caafe9e
READ_ADDRESS: fffff8040d4fa388: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8040d40f2a8: Unable to get Flags value from nt!KdVersionBlock
fffff8040d40f2a8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000005681
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: explorer.exe
TRAP_FRAME: ffffa709ab994db0 -- (.trap 0xffffa709ab994db0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffa67d72e00001 rbx=0000000000000000 rcx=fffff8040d44c800
rdx=000000000122b130 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8040caafe9e rsp=ffffa709ab994f40 rbp=ffffad8006d02720
r8=000000000000023a r9=e2ea3a20002453b0 r10=0000000000000001
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!MiInsertPageInList+0xfe:
fffff804`0caafe9e 458b4608 mov r8d,dword ptr [r14+8] ds:00000000`00000008=????????
Resetting default scope
STACK_TEXT:
ffffa709`ab994c68 fffff804`0cbef929 : 00000000`0000000a 00000000`00005681 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffa709`ab994c70 fffff804`0cbebc29 : ffffad80`06d04310 fffff804`0cb30124 ffffad80`06d02000 fffff804`0caaacbd : nt!KiBugCheckDispatch+0x69
ffffa709`ab994db0 fffff804`0caafe9e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x469
ffffa709`ab994f40 fffff804`0caafc45 : 00000000`00000000 80000002`453b0863 00000000`00245626 04101dea`5dbc0026 : nt!MiInsertPageInList+0xfe
ffffa709`ab994fe0 fffff804`0ca8e8c7 : 00000002`456268c0 00000000`00000000 00000000`00000006 ffffa709`ab995230 : nt!MiPfnShareCountIsZero+0x345
ffffa709`ab995040 fffff804`0cab7d3f : 00000000`00000000 00000000`00000000 00000000`53440000 00000000`00000000 : nt!MiMakePageAvoidRead+0xba7
ffffa709`ab9951e0 fffff804`0cab847c : ffffd082`7f675000 00000000`16984040 ffffa709`00000000 00000000`00001000 : nt!MmCopyToCachedPage+0x28f
ffffa709`ab9952b0 fffff804`0cad20ea : ffff8203`bb232a20 00000000`16984040 ffffa709`ab9954a8 00000000`00080000 : nt!CcMapAndCopyInToCache+0x41c
ffffa709`ab995450 fffff804`11c99abb : ffffa709`ab9955c0 00000000`00100000 00000000`53500000 00000000`00100000 : nt!CcCopyWriteEx+0xea
ffffa709`ab9954d0 fffff804`0bae73fb : 00000000`00000000 ffffa709`ab9958e8 ffffa709`ab9958a8 00000000`1690f040 : Ntfs!NtfsCopyWriteA+0x44b
ffffa709`ab995800 fffff804`0bae44d7 : ffffa709`ab995910 ffffa709`ab9958a8 ffff8203`bc9d4b20 ffff8203`bc9d4a20 : FLTMGR!FltpPerformFastIoCall+0x16b
ffffa709`ab995860 fffff804`0bb1b215 : ffffa709`ab996000 ffffa709`ab990000 ffff8203`bdac1798 ffff8203`b863ad60 : FLTMGR!FltpPassThroughFastIo+0x107
ffffa709`ab9958e0 fffff804`0ce2b42d : ffff8203`bdac34b0 00000000`0726cc70 00000000`0726cc70 00000000`00000000 : FLTMGR!FltpFastIoWrite+0x165
ffffa709`ab995990 fffff804`0cbef378 : 00000000`00000000 00000000`00002814 00000000`00000000 00000000`0e3aade0 : nt!NtWriteFile+0x43d
ffffa709`ab995a90 00007ffa`ab6cae94 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`0726cbf8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`ab6cae94
SYMBOL_NAME: nt!MiInsertPageInList+fe
MODULE_NAME: nt
IMAGE_VERSION: 10.0.19041.264
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: fe
FAILURE_BUCKET_ID: AV_nt!MiInsertPageInList
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {a90f9f23-588e-d5a6-a0a3-950e9fb27bf8}
Followup: MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 00000000000000b8, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80104f02c0b, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 6281
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on BORA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 7503
Key : Analysis.Memory.CommitPeak.Mb
Value: 76
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: a
BUGCHECK_P1: b8
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff80104f02c0b
READ_ADDRESS: fffff801058fa388: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8010580f2a8: Unable to get Flags value from nt!KdVersionBlock
fffff8010580f2a8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
00000000000000b8
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: SecHealthUI.exe
TRAP_FRAME: ffff9a0cd9adfb00 -- (.trap 0xffff9a0cd9adfb00)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000ffffffff rbx=0000000000000000 rcx=000000003f800000
rdx=0000000000000fbc rsi=0000000000000000 rdi=0000000000000000
rip=00007ffbfdf7d23e rsp=0000006d9bcfe590 rbp=0000000000000000
r8=0000006d9bcfe5c0 r9=0000000000001000 r10=00000fff7fbed8f4
r11=4010000000000018 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
0033:00007ffb`fdf7d23e ?? ???
Resetting default scope
STACK_TEXT:
ffff9a0c`d9adde28 fffff801`04fef929 : 00000000`0000000a 00000000`000000b8 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffff9a0c`d9adde30 fffff801`04febc29 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffff9a0c`d9addf70 fffff801`04f02c0b : 00000000`00000002 ffffd683`5d44d0c0 00000000`00000000 ffff8f00`00000000 : nt!KiPageFault+0x469
ffff9a0c`d9ade100 fffff801`04e1374e : ffffd683`5d44d740 ffffd683`00000000 ffff9a0c`d9ade290 ffff8f47`80000000 : nt!MiUnlockPageTableInternal+0xb
ffff9a0c`d9ade140 fffff801`04e12a4a : 00000000`00000000 ffff9e11`00000002 00000000`00000000 00000000`00000000 : nt!MiUserFault+0x78e
ffff9a0c`d9ade1d0 fffff801`04febb1e : 00000000`00000000 ffffd683`5a981df0 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x16a
ffff9a0c`d9ade370 fffff801`04e7ae64 : 00000000`00000000 ffff9a0c`d9ade640 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
ffff9a0c`d9ade500 fffff801`04e7b76f : ffff9a0c`d9adee08 ffff9a0c`d9ade500 ffff9e40`c629100f ffff9e11`88ccc800 : nt!KiOpDecode+0x10c
ffff9a0c`d9ade560 fffff801`04e7b1e1 : ffff9a0c`d9adee08 ffff9a0c`d9adeb40 ffff9a0c`d9ade640 00000000`0010005f : nt!KiPreprocessFault+0xbf
ffff9a0c`d9ade610 fffff801`04fefa6c : ffff9a0c`d9adef30 00000000`00001000 ffff9a0c`d9adeeb0 ffff8000`00000000 : nt!KiDispatchException+0x141
ffff9a0c`d9adecd0 fffff801`04febc03 : ffff9a0c`d9adf040 00000260`d6f130a8 ffffffff`ffffffff fffff801`04e689c6 : nt!KiExceptionDispatch+0x12c
ffff9a0c`d9adeeb0 fffff801`04e7b710 : 00000000`00000001 ffff9a0c`d9adf3c0 ffffd683`5f118538 fffff801`04e2a730 : nt!KiPageFault+0x443
ffff9a0c`d9adf040 fffff801`04e7b1e1 : ffff9a0c`d9adfa58 ffff9a0c`d9adf790 00000000`0010005f 00000260`de411a4c : nt!KiPreprocessFault+0x60
ffff9a0c`d9adf0f0 fffff801`04fefa6c : ffff9a0c`d9adfb80 00000000`00001000 ffff9a0c`d9adfb00 ffff8000`00000000 : nt!KiDispatchException+0x141
ffff9a0c`d9adf920 fffff801`04febc03 : ffffd683`5e1b7080 ffffd683`5f1c8ce0 00000000`00000000 ffff9a0c`d9adfb80 : nt!KiExceptionDispatch+0x12c
ffff9a0c`d9adfb00 00007ffb`fdf7d23e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x443
0000006d`9bcfe590 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`fdf7d23e
SYMBOL_NAME: nt!MiUnlockPageTableInternal+b
IMAGE_VERSION: 10.0.19041.264
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: Unknown_Image
MODULE_NAME: Unknown_Module
FAILURE_BUCKET_ID: RAISED_IRQL_USER_FAULT_AV
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {1ae3b702-9567-a461-faae-d89b06459582}
Followup: MachineOwner
---------
DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
DISPATCH_LEVEL or above. The offending component can usually be
identified with a stack trace.
Arg2: 0000000000001e00, The watchdog period.
Arg3: fffff806494fa318, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
additional information regarding the cumulative timeout
Arg4: 0000000000000000
Debugging Details:
------------------
*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: TickPeriods ***
*** ***
*************************************************************************
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 6906
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on BORA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 8463
Key : Analysis.Memory.CommitPeak.Mb
Value: 76
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 133
BUGCHECK_P1: 1
BUGCHECK_P2: 1e00
BUGCHECK_P3: fffff806494fa318
BUGCHECK_P4: 0
DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED
TRAP_FRAME: ffffda8847b804f0 -- (.trap 0xffffda8847b804f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000005d2e1634 rbx=0000000000000000 rcx=ffffda8847b806f8
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80648a33397 rsp=ffffda8847b80680 rbp=ffffca800c75c180
r8=ffffa204433f0730 r9=ffffa204436491c0 r10=7ffffffffffffffc
r11=ffffda8847b80848 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!KeYieldProcessorEx+0x17:
fffff806`48a33397 4883c420 add rsp,20h
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: services.exe
STACK_TEXT:
ffffca80`0c7aee18 fffff806`48c59472 : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff806`494fa318 : nt!KeBugCheckEx
ffffca80`0c7aee20 fffff806`48aca2ed : 00000109`1e52faf8 00000000`00000000 ffffda88`47b80500 ffffca80`0c75c180 : nt!KeAccumulateTicks+0x18bff2
ffffca80`0c7aee80 fffff806`48aca16a : ffffa204`3b4c60e0 ffffda88`47b80570 ffffca80`00004d47 ffffca80`00000000 : nt!KeClockInterruptNotify+0xbd
ffffca80`0c7aef30 fffff806`48a08705 : ffffa204`3b4c60e0 fffff806`48b43b07 00000000`00000000 00000000`00000000 : nt!HalpTimerClockIpiRoutine+0x1a
ffffca80`0c7aef60 fffff806`48bdf4ca : ffffda88`47b80570 ffffa204`3b4c60e0 00000000`00000000 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5
ffffca80`0c7aefb0 fffff806`48bdfa37 : ffffda88`47b806f8 ffffa204`43649080 00000000`00000082 fffff806`48bdfac4 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
ffffda88`47b804f0 fffff806`48a33397 : 00000000`00000010 00000000`00040286 ffffda88`47b806a8 00000000`00000018 : nt!KiInterruptDispatchNoLockNoEtw+0x37
ffffda88`47b80680 fffff806`48a35bf8 : ffffa204`44def7f0 fffff806`48a25bbb ffffa204`44def080 00000000`00000000 : nt!KeYieldProcessorEx+0x17
ffffda88`47b806b0 fffff806`48a3354f : ffffca80`0c75c180 00000000`5d2e1634 ffffa204`4364a180 ffffa204`43649080 : nt!KiSignalThread+0x1a8
ffffda88`47b806f0 fffff806`48a358ec : 00000000`00000000 ffffda88`00000000 ffffa204`43524a80 ffffa204`44def080 : nt!KiWakeQueueWaiter+0xbf
ffffda88`47b80740 fffff806`48a2f2e5 : ffffda88`47b80930 00000000`00000000 ffffa204`435fb5a0 00000000`00000000 : nt!IoSetIoCompletionEx2+0x10c
ffffda88`47b807b0 fffff806`48e04326 : 00000000`00000000 ffffa204`44def508 4ae3e630`00000011 00000201`88ac95c8 : nt!AlpcpSignalAndWait+0x115
ffffda88`47b80850 fffff806`48e03f8b : ffffda88`47b80930 00000201`88ac95c8 00000201`88cc8370 00000000`7e000000 : nt!AlpcpReceiveSynchronousReply+0x56
ffffda88`47b808b0 fffff806`48e02036 : ffffa204`43f51a80 00000000`00020000 00000201`88cc8370 00000201`88ac95c8 : nt!AlpcpProcessSynchronousRequest+0x37b
ffffda88`47b809d0 fffff806`48bef378 : ffffa204`44def080 ffffda88`47b80b80 00000070`cf07e0f8 ffffda88`47b80aa8 : nt!NtAlpcSendWaitReceivePort+0x1d6
ffffda88`47b80a90 00007ffb`de78bf04 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000070`cf07e0d8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`de78bf04
SYMBOL_NAME: nt!KeAccumulateTicks+18bff2
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.264
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 18bff2
FAILURE_BUCKET_ID: 0x133_ISR_nt!KeAccumulateTicks
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {65350307-c3b9-f4b5-8829-4d27e9ff9b06}
Followup: MachineOwner
---------
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffff80000003, The exception code that was not handled
Arg2: fffff8070df31633, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: fffff8070dfb90c0, Parameter 1 of the exception
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 10624
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on BORA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 12939
Key : Analysis.Memory.CommitPeak.Mb
Value: 75
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1e
BUGCHECK_P1: ffffffff80000003
BUGCHECK_P2: fffff8070df31633
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8070dfb90c0
EXCEPTION_PARAMETER2: fffff8070dfb90c0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: SkypeApp.exe
STACK_TEXT:
fffff28e`35257b78 fffff807`0e02edf9 : 00000000`0000001e ffffffff`80000003 fffff807`0df31633 00000000`00000000 : nt!KeBugCheckEx
fffff28e`35257b80 fffff807`0dfefa6c : ffffffff`ffffffff fffff28e`00000032 fffff28e`35258340 00000000`00000120 : nt!KiDispatchException+0x1b3d59
fffff28e`35258240 fffff807`0dfe93d6 : 00000000`00000001 00000000`000000ff 00000000`00000000 02100050`00000000 : nt!KiExceptionDispatch+0x12c
fffff28e`35258420 fffff807`0df31634 : fffff28e`35258618 fffff28e`35258658 00000000`00000000 fffff28e`352586c0 : nt!KiBreakpointTrap+0x316
fffff28e`352585b0 fffff807`0dfb90fb : fffff807`128708c2 fffff807`1283b6b8 00000000`00000000 00000000`00000000 : nt!KeCheckStackAndTargetAddress+0x54
fffff28e`352585e0 fffff807`0dfe68e2 : fffff807`1283b6b8 fffff28e`35258bc0 fffff807`12818dab 00000000`00000000 : nt!_C_specific_handler+0x3b
fffff28e`35258650 fffff807`0de32fb7 : fffff28e`35258bc0 00000000`00000000 fffff28e`35259800 fffff807`128708c2 : nt!RtlpExecuteHandlerForException+0x12
fffff28e`35258680 fffff807`0de7b226 : fffff28e`35259598 fffff28e`352592d0 fffff28e`35259598 00000000`00000004 : nt!RtlDispatchException+0x297
fffff28e`35258da0 fffff807`0dfefa6c : fffff28e`352596c0 00000000`00001000 fffff28e`35259640 ffff8000`00000000 : nt!KiDispatchException+0x186
fffff28e`35259460 fffff807`0dfebc03 : ffffb98a`3cf726d0 00000000`00000008 fffff28e`35259780 fffff28e`35259788 : nt!KiExceptionDispatch+0x12c
fffff28e`35259640 00000000`00000000 : fffff28e`35259840 fffff28e`35259f01 00000000`00000000 00000000`00020410 : nt!KiPageFault+0x443
SYMBOL_NAME: nt!KeCheckStackAndTargetAddress+53
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.264
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 53
FAILURE_BUCKET_ID: 0x1E_80000003_nt!KeCheckStackAndTargetAddress
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {8bf4701b-5b4d-2023-a998-fc7dbbdaa46f}
Followup: MachineOwner
---------