Advertisement
Guest User

Untitled

a guest
Aug 31st, 2022
85
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 5.58 KB | None | 0 0
  1. Microsoft (R) Windows Debugger Version 10.0.25136.1001 AMD64
  2. Copyright (c) Microsoft Corporation. All rights reserved.
  3.  
  4.  
  5. Loading Dump File [C:\Users\Peyton\Desktop\dmps\081922-8187-01.dmp]
  6. Mini Kernel Dump File: Only registers and stack trace are available
  7.  
  8.  
  9. ************* Path validation summary **************
  10. Response Time (ms) Location
  11. Deferred srv*
  12. Symbol search path is: srv*
  13. Executable search path is:
  14. Windows 10 Kernel Version 19041 MP (20 procs) Free x64
  15. Product: WinNt, suite: TerminalServer SingleUserTS
  16. Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
  17. Machine Name:
  18. Kernel base = 0xfffff806`0ec00000 PsLoadedModuleList = 0xfffff806`0f82a250
  19. Debug session time: Fri Aug 19 20:30:49.123 2022 (UTC - 4:00)
  20. System Uptime: 0 days 0:09:43.724
  21. Loading Kernel Symbols
  22. ...............................................................
  23. ................................................................
  24. ................................................................
  25. .............................
  26. Loading User Symbols
  27. Loading unloaded module list
  28. ...........
  29. For analysis of this file, run !analyze -v
  30. nt!KeBugCheckEx:
  31. fffff806`0eff88c0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffeb0c`8756ef70=000000000000001a
  32. 16: kd> !analyze -v
  33. *******************************************************************************
  34. * *
  35. * Bugcheck Analysis *
  36. * *
  37. *******************************************************************************
  38.  
  39. MEMORY_MANAGEMENT (1a)
  40. # Any other values for parameter 1 must be individually examined.
  41. Arguments:
  42. Arg1: 0000000000041790, A page table page has been corrupted. On a 64 bit OS, parameter 2
  43. contains the address of the PFN for the corrupted page table page.
  44. On a 32 bit OS, parameter 2 contains a pointer to the number of used
  45. PTEs, and parameter 3 contains the number of used PTEs.
  46. Arg2: ffffa68009f3e040
  47. Arg3: 0000000000000001
  48. Arg4: 0000000000000002
  49.  
  50. Debugging Details:
  51. ------------------
  52.  
  53.  
  54. KEY_VALUES_STRING: 1
  55.  
  56. Key : Analysis.CPU.mSec
  57. Value: 1811
  58.  
  59. Key : Analysis.DebugAnalysisManager
  60. Value: Create
  61.  
  62. Key : Analysis.Elapsed.mSec
  63. Value: 13444
  64.  
  65. Key : Analysis.Init.CPU.mSec
  66. Value: 218
  67.  
  68. Key : Analysis.Init.Elapsed.mSec
  69. Value: 1987
  70.  
  71. Key : Analysis.Memory.CommitPeak.Mb
  72. Value: 93
  73.  
  74. Key : Bugcheck.Code.DumpHeader
  75. Value: 0x1a
  76.  
  77. Key : Bugcheck.Code.Register
  78. Value: 0x1a
  79.  
  80. Key : WER.OS.Branch
  81. Value: vb_release
  82.  
  83. Key : WER.OS.Timestamp
  84. Value: 2019-12-06T14:06:00Z
  85.  
  86. Key : WER.OS.Version
  87. Value: 10.0.19041.1
  88.  
  89.  
  90. FILE_IN_CAB: 081922-8187-01.dmp
  91.  
  92. BUGCHECK_CODE: 1a
  93.  
  94. BUGCHECK_P1: 41790
  95.  
  96. BUGCHECK_P2: ffffa68009f3e040
  97.  
  98. BUGCHECK_P3: 1
  99.  
  100. BUGCHECK_P4: 2
  101.  
  102. BLACKBOXBSD: 1 (!blackboxbsd)
  103.  
  104.  
  105. BLACKBOXNTFS: 1 (!blackboxntfs)
  106.  
  107.  
  108. BLACKBOXPNP: 1 (!blackboxpnp)
  109.  
  110.  
  111. BLACKBOXWINLOGON: 1
  112.  
  113. CUSTOMER_CRASH_COUNT: 1
  114.  
  115. PROCESS_NAME: firefox.exe
  116.  
  117. STACK_TEXT:
  118. ffffeb0c`8756ef68 fffff806`0ee3c00a : 00000000`0000001a 00000000`00041790 ffffa680`09f3e040 00000000`00000001 : nt!KeBugCheckEx
  119. ffffeb0c`8756ef70 fffff806`0ee3c79e : ffffeb0c`8756f548 ffffeb0c`8756f300 00000000`00000000 ffffeb0c`8756f250 : nt!MiDeletePteRun+0x17da
  120. ffffeb0c`8756f180 fffff806`0ee3d37b : ffffeb0c`8756f2b0 00000000`00000000 ffffaf00`200c1f78 00000000`00000000 : nt!MiDeleteVaTail+0x6e
  121. ffffeb0c`8756f1b0 fffff806`0ee476c0 : 00000000`00000001 ffffeb0c`00000000 ffff9188`8c7f1550 ffff9188`8d883080 : nt!MiDeletePagablePteRange+0x4ab
  122. ffffeb0c`8756f4c0 fffff806`0f27ce77 : ffff9188`8d883080 00000000`00000000 ffff9188`00000000 ffff9188`00000000 : nt!MiDeleteVad+0x360
  123. ffffeb0c`8756f5d0 fffff806`0f27c903 : ffff9188`890976e0 ffff9188`890976e0 ffff9188`8909bdd0 ffff9188`8c7f1080 : nt!MiCleanVad+0x43
  124. ffffeb0c`8756f600 fffff806`0f2b6da0 : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffff9188`8c7f1080 : nt!MmCleanProcessAddressSpace+0x137
  125. ffffeb0c`8756f680 fffff806`0f2760f6 : ffff9188`8c7f1080 ffffdb04`64072830 ffffeb0c`8756f8d0 00000000`00000000 : nt!PspRundownSingleProcess+0x20c
  126. ffffeb0c`8756f710 fffff806`0f2777f8 : 00000000`c0000005 ffff9188`8c7f1001 00000000`00000001 00000040`185dc000 : nt!PspExitThread+0x5f6
  127. ffffeb0c`8756f810 fffff806`0eeb4d77 : 00000000`00000000 fffff806`0eeb2937 00000000`00000000 00000000`00000000 : nt!KiSchedulerApcTerminate+0x38
  128. ffffeb0c`8756f850 fffff806`0effce90 : 00000000`00000000 ffffeb0c`8756f900 ffffde86`21c3e89a 00000000`00000000 : nt!KiDeliverApc+0x487
  129. ffffeb0c`8756f900 fffff806`0f00a35f : ffff9188`8d883080 00000000`00000000 00000000`00000000 ffff9188`00000000 : nt!KiInitiateUserApc+0x70
  130. ffffeb0c`8756fa40 00007ff8`43ff0934 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
  131. 00000040`1825f268 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`43ff0934
  132.  
  133.  
  134. SYMBOL_NAME: nt!MiDeletePteRun+17da
  135.  
  136. MODULE_NAME: nt
  137.  
  138. IMAGE_VERSION: 10.0.19041.1889
  139.  
  140. STACK_COMMAND: .cxr; .ecxr ; kb
  141.  
  142. IMAGE_NAME: ntkrnlmp.exe
  143.  
  144. BUCKET_ID_FUNC_OFFSET: 17da
  145.  
  146. FAILURE_BUCKET_ID: 0x1a_41790_nt!MiDeletePteRun
  147.  
  148. OS_VERSION: 10.0.19041.1
  149.  
  150. BUILDLAB_STR: vb_release
  151.  
  152. OSPLATFORM_TYPE: x64
  153.  
  154. OSNAME: Windows 10
  155.  
  156. FAILURE_ID_HASH: {27ce5d5a-97b1-faf0-183f-c86809269d56}
  157.  
  158. Followup: MachineOwner
  159. ---------
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement