Microsoft (R) Windows Debugger Version 10.0.18362.1 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Local\MEMORY (2).DMP] Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available. ************* Path validation summary ************** Response Time (ms) Location Deferred SRV*C:\Windows\symbol_cache*http://msdl.microsoft.com/download/symbols Symbol search path is: SRV*C:\Windows\symbol_cache*http://msdl.microsoft.com/download/symbols Executable search path is: Windows 10 Kernel Version 18362 MP (4 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Built by: 18362.1.amd64fre.19h1_release.190318-1202 Machine Name: Kernel base = 0xfffff807`08000000 PsLoadedModuleList = 0xfffff807`08448190 Debug session time: Wed Mar 11 22:47:00.733 2020 (UTC + 0:00) System Uptime: 1 days 13:19:16.721 Loading Kernel Symbols ............................................................... ................................................................ ................................................................ .. Loading User Symbols PEB is paged out (Peb.Ldr = 0000009d`d4ba2018). Type ".hh dbgerr001" for details Loading unloaded module list ....... For analysis of this file, run !analyze -v 1: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If kernel debugger is available get stack backtrace. Arguments: Arg1: ffff950aa1144000, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000000, value 0 = read operation, 1 = write operation Arg4: fffff806fbe613e8, address which referenced memory Debugging Details: ------------------ KEY_VALUES_STRING: 1 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 401 BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202 SYSTEM_MANUFACTURER: Viglen SYSTEM_PRODUCT_NAME: Genie VIG860S SYSTEM_SKU: 2759214 SYSTEM_VERSION: System Version BIOS_VENDOR: American Megatrends Inc. BIOS_VERSION: 1403 BIOS_DATE: 12/17/2018 BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC. BASEBOARD_PRODUCT: PRIME Q270M-C BASEBOARD_VERSION: Rev X.0x DUMP_TYPE: 1 BUGCHECK_P1: ffff950aa1144000 BUGCHECK_P2: 2 BUGCHECK_P3: 0 BUGCHECK_P4: fffff806fbe613e8 READ_ADDRESS: ffff950aa1144000 Nonpaged pool CURRENT_IRQL: 2 FAULTING_IP: skkey+13e8 fffff806`fbe613e8 66833f26 cmp word ptr [rdi],26h CPU_COUNT: 4 CPU_MHZ: d50 CPU_VENDOR: GenuineIntel CPU_FAMILY: 6 CPU_MODEL: 9e CPU_STEPPING: 9 CPU_MICROCODE: 6,9e,9,0 (F,M,S,R) SIG: 8E'00000000 (cache) 8E'00000000 (init) BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT BUGCHECK_STR: AV PROCESS_NAME: svchost.exe ANALYSIS_SESSION_HOST: UOS-216327 ANALYSIS_SESSION_TIME: 03-13-2020 14:16:59.0847 ANALYSIS_VERSION: 10.0.18362.1 amd64fre TRAP_FRAME: ffffa584df01f3b0 -- (.trap 0xffffa584df01f3b0) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=ffffc03a40d8b535 rbx=0000000000000000 rcx=ffff950aa1142368 rdx=0000000000001000 rsi=0000000000000000 rdi=0000000000000000 rip=fffff806fbe613e8 rsp=ffffa584df01f540 rbp=ffffa584df01f580 r8=0000000000000001 r9=ffffa584df01f650 r10=0000000000000001 r11=ffff950a8eb30a42 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na pe cy skkey+0x13e8: fffff806`fbe613e8 66833f26 cmp word ptr [rdi],26h ds:00000000`00000000=???? Resetting default scope LAST_CONTROL_TRANSFER: from fffff807081d33e9 to fffff807081c1510 STACK_TEXT: ffffa584`df01f268 fffff807`081d33e9 : 00000000`0000000a ffff950a`a1144000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx ffffa584`df01f270 fffff807`081cf72b : 00000000`00000001 ffff950a`9cab5890 ffffa584`df01f5b9 ffff950a`a51de080 : nt!KiBugCheckDispatch+0x69 ffffa584`df01f3b0 fffff806`fbe613e8 : 00000000`098c09b0 ffffa584`df01f5d0 00000000`096c098c ffff950a`8eb30000 : nt!KiPageFault+0x46b ffffa584`df01f540 fffff806`fbe61361 : ffff950a`a11422f0 ffff950a`a05e130c ffff950a`a05e1300 00000000`00000000 : skkey+0x13e8 ffffa584`df01f5b0 fffff807`004425df : 00000000`00000001 ffff950a`a05e130c ffff950a`a0cf29d0 ffffa584`df01f6b9 : skkey+0x1361 ffffa584`df01f5e0 fffff807`0044a60c : 00000000`00000000 00000000`00000000 ffffa584`df01f6b9 00000000`00000000 : terminpt!PtSendCurrentKeyboardInput+0xcb ffffa584`df01f650 fffff807`08031f79 : ffff950a`a51de700 fffff807`081f5c70 ffff950a`a51de7d0 ffff950a`9dd48e30 : terminpt!TiDeviceControl+0x48c ffffa584`df01f720 fffff807`085e9785 : 00000000`0000000e ffff950a`9dd48e30 00000000`00000001 ffff950a`9cab5890 : nt!IofCallDriver+0x59 ffffa584`df01f760 fffff807`085e9590 : 00000000`00000000 ffffa584`df01fa80 ffff950a`9dd48e30 ffffa584`df01fa80 : nt!IopSynchronousServiceTail+0x1a5 ffffa584`df01f800 fffff807`085e8966 : 950aa0d6`1c30fffd 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0xc10 ffffa584`df01f920 fffff807`081d2e15 : 00000000`00000001 00000000`00000000 ffffa584`00000002 ffffa584`df01f900 : nt!NtDeviceIoControlFile+0x56 ffffa584`df01f990 00007fff`9451c1a4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25 0000009d`d527d868 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`9451c1a4 THREAD_SHA1_HASH_MOD_FUNC: dbe61b6a1cbdbafa32966a2608f1be996dfbcdf2 THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 4fe8573476721c0eb79e4ce2c5e44d1df3fd18cc THREAD_SHA1_HASH_MOD: 468bd109f2996984f7383c45dd961d1886cfeb4f FOLLOWUP_IP: skkey+13e8 fffff806`fbe613e8 66833f26 cmp word ptr [rdi],26h FAULT_INSTR_CODE: 263f8366 SYMBOL_STACK_INDEX: 3 SYMBOL_NAME: skkey+13e8 FOLLOWUP_NAME: MachineOwner MODULE_NAME: skkey IMAGE_NAME: skkey.sys DEBUG_FLR_IMAGE_TIMESTAMP: 57728219 STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: 13e8 FAILURE_BUCKET_ID: AV_skkey!unknown_function BUCKET_ID: AV_skkey!unknown_function PRIMARY_PROBLEM_CLASS: AV_skkey!unknown_function TARGET_TIME: 2020-03-11T22:47:00.000Z OSBUILD: 18362 OSSERVICEPACK: 0 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 10 OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 2005-04-23 02:40:32 BUILDDATESTAMP_STR: 190318-1202 BUILDLAB_STR: 19h1_release BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202 ANALYSIS_SESSION_ELAPSED_TIME: 55a6 ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:av_skkey!unknown_function FAILURE_ID_HASH: {b4726176-2c8b-0b69-32e5-fa4df21048a7} Followup: MachineOwner ---------