Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Microsoft (R) Windows Debugger Version 10.0.25136.1001 AMD64
- Copyright (c) Microsoft Corporation. All rights reserved.
- Loading Dump File [C:\Users\Peyton\Desktop\dmps\081922-8187-01.dmp]
- Mini Kernel Dump File: Only registers and stack trace are available
- ************* Path validation summary **************
- Response Time (ms) Location
- Deferred srv*
- Symbol search path is: srv*
- Executable search path is:
- Windows 10 Kernel Version 19041 MP (20 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS
- Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
- Machine Name:
- Kernel base = 0xfffff806`0ec00000 PsLoadedModuleList = 0xfffff806`0f82a250
- Debug session time: Fri Aug 19 20:30:49.123 2022 (UTC - 4:00)
- System Uptime: 0 days 0:09:43.724
- Loading Kernel Symbols
- ...............................................................
- ................................................................
- ................................................................
- .............................
- Loading User Symbols
- Loading unloaded module list
- ...........
- For analysis of this file, run !analyze -v
- nt!KeBugCheckEx:
- fffff806`0eff88c0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffeb0c`8756ef70=000000000000001a
- 16: kd> !analyze -v
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- MEMORY_MANAGEMENT (1a)
- # Any other values for parameter 1 must be individually examined.
- Arguments:
- Arg1: 0000000000041790, A page table page has been corrupted. On a 64 bit OS, parameter 2
- contains the address of the PFN for the corrupted page table page.
- On a 32 bit OS, parameter 2 contains a pointer to the number of used
- PTEs, and parameter 3 contains the number of used PTEs.
- Arg2: ffffa68009f3e040
- Arg3: 0000000000000001
- Arg4: 0000000000000002
- Debugging Details:
- ------------------
- KEY_VALUES_STRING: 1
- Key : Analysis.CPU.mSec
- Value: 1811
- Key : Analysis.DebugAnalysisManager
- Value: Create
- Key : Analysis.Elapsed.mSec
- Value: 13444
- Key : Analysis.Init.CPU.mSec
- Value: 218
- Key : Analysis.Init.Elapsed.mSec
- Value: 1987
- Key : Analysis.Memory.CommitPeak.Mb
- Value: 93
- Key : Bugcheck.Code.DumpHeader
- Value: 0x1a
- Key : Bugcheck.Code.Register
- Value: 0x1a
- Key : WER.OS.Branch
- Value: vb_release
- Key : WER.OS.Timestamp
- Value: 2019-12-06T14:06:00Z
- Key : WER.OS.Version
- Value: 10.0.19041.1
- FILE_IN_CAB: 081922-8187-01.dmp
- BUGCHECK_CODE: 1a
- BUGCHECK_P1: 41790
- BUGCHECK_P2: ffffa68009f3e040
- BUGCHECK_P3: 1
- BUGCHECK_P4: 2
- BLACKBOXBSD: 1 (!blackboxbsd)
- BLACKBOXNTFS: 1 (!blackboxntfs)
- BLACKBOXPNP: 1 (!blackboxpnp)
- BLACKBOXWINLOGON: 1
- CUSTOMER_CRASH_COUNT: 1
- PROCESS_NAME: firefox.exe
- STACK_TEXT:
- ffffeb0c`8756ef68 fffff806`0ee3c00a : 00000000`0000001a 00000000`00041790 ffffa680`09f3e040 00000000`00000001 : nt!KeBugCheckEx
- ffffeb0c`8756ef70 fffff806`0ee3c79e : ffffeb0c`8756f548 ffffeb0c`8756f300 00000000`00000000 ffffeb0c`8756f250 : nt!MiDeletePteRun+0x17da
- ffffeb0c`8756f180 fffff806`0ee3d37b : ffffeb0c`8756f2b0 00000000`00000000 ffffaf00`200c1f78 00000000`00000000 : nt!MiDeleteVaTail+0x6e
- ffffeb0c`8756f1b0 fffff806`0ee476c0 : 00000000`00000001 ffffeb0c`00000000 ffff9188`8c7f1550 ffff9188`8d883080 : nt!MiDeletePagablePteRange+0x4ab
- ffffeb0c`8756f4c0 fffff806`0f27ce77 : ffff9188`8d883080 00000000`00000000 ffff9188`00000000 ffff9188`00000000 : nt!MiDeleteVad+0x360
- ffffeb0c`8756f5d0 fffff806`0f27c903 : ffff9188`890976e0 ffff9188`890976e0 ffff9188`8909bdd0 ffff9188`8c7f1080 : nt!MiCleanVad+0x43
- ffffeb0c`8756f600 fffff806`0f2b6da0 : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffff9188`8c7f1080 : nt!MmCleanProcessAddressSpace+0x137
- ffffeb0c`8756f680 fffff806`0f2760f6 : ffff9188`8c7f1080 ffffdb04`64072830 ffffeb0c`8756f8d0 00000000`00000000 : nt!PspRundownSingleProcess+0x20c
- ffffeb0c`8756f710 fffff806`0f2777f8 : 00000000`c0000005 ffff9188`8c7f1001 00000000`00000001 00000040`185dc000 : nt!PspExitThread+0x5f6
- ffffeb0c`8756f810 fffff806`0eeb4d77 : 00000000`00000000 fffff806`0eeb2937 00000000`00000000 00000000`00000000 : nt!KiSchedulerApcTerminate+0x38
- ffffeb0c`8756f850 fffff806`0effce90 : 00000000`00000000 ffffeb0c`8756f900 ffffde86`21c3e89a 00000000`00000000 : nt!KiDeliverApc+0x487
- ffffeb0c`8756f900 fffff806`0f00a35f : ffff9188`8d883080 00000000`00000000 00000000`00000000 ffff9188`00000000 : nt!KiInitiateUserApc+0x70
- ffffeb0c`8756fa40 00007ff8`43ff0934 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
- 00000040`1825f268 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`43ff0934
- SYMBOL_NAME: nt!MiDeletePteRun+17da
- MODULE_NAME: nt
- IMAGE_VERSION: 10.0.19041.1889
- STACK_COMMAND: .cxr; .ecxr ; kb
- IMAGE_NAME: ntkrnlmp.exe
- BUCKET_ID_FUNC_OFFSET: 17da
- FAILURE_BUCKET_ID: 0x1a_41790_nt!MiDeletePteRun
- OS_VERSION: 10.0.19041.1
- BUILDLAB_STR: vb_release
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- FAILURE_ID_HASH: {27ce5d5a-97b1-faf0-183f-c86809269d56}
- Followup: MachineOwner
- ---------
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement