Advertisement
Guest User

Untitled

a guest
Aug 31st, 2022
62
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 5.77 KB | None | 0 0
  1. Microsoft (R) Windows Debugger Version 10.0.25136.1001 AMD64
  2. Copyright (c) Microsoft Corporation. All rights reserved.
  3.  
  4.  
  5. Loading Dump File [C:\Users\Peyton\Desktop\dmps\081922-8265-01.dmp]
  6. Mini Kernel Dump File: Only registers and stack trace are available
  7.  
  8.  
  9. ************* Path validation summary **************
  10. Response Time (ms) Location
  11. Deferred srv*
  12. Symbol search path is: srv*
  13. Executable search path is:
  14. Windows 10 Kernel Version 19041 MP (20 procs) Free x64
  15. Product: WinNt, suite: TerminalServer SingleUserTS
  16. Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
  17. Machine Name:
  18. Kernel base = 0xfffff804`5b600000 PsLoadedModuleList = 0xfffff804`5c22a250
  19. Debug session time: Fri Aug 19 14:26:07.753 2022 (UTC - 4:00)
  20. System Uptime: 0 days 12:05:48.355
  21. Loading Kernel Symbols
  22. ...............................................................
  23. ................................................................
  24. ................................................................
  25. .................................
  26. Loading User Symbols
  27. Loading unloaded module list
  28. .................................................
  29. For analysis of this file, run !analyze -v
  30. nt!KeBugCheckEx:
  31. fffff804`5b9f88c0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffff90f`cb32f350=000000000000000a
  32. 17: kd> !analyze -v
  33. *******************************************************************************
  34. * *
  35. * Bugcheck Analysis *
  36. * *
  37. *******************************************************************************
  38.  
  39. IRQL_NOT_LESS_OR_EQUAL (a)
  40. An attempt was made to access a pageable (or completely invalid) address at an
  41. interrupt request level (IRQL) that is too high. This is usually
  42. caused by drivers using improper addresses.
  43. If a kernel debugger is available get the stack backtrace.
  44. Arguments:
  45. Arg1: 00000000000002f4, memory referenced
  46. Arg2: 00000000000000ff, IRQL
  47. Arg3: 0000000000000093, bitfield :
  48. bit 0 : value 0 = read operation, 1 = write operation
  49. bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
  50. Arg4: fffff8045ba0baf8, address which referenced memory
  51.  
  52. Debugging Details:
  53. ------------------
  54.  
  55. *** WARNING: Unable to verify checksum for win32k.sys
  56.  
  57. KEY_VALUES_STRING: 1
  58.  
  59. Key : Analysis.CPU.mSec
  60. Value: 3046
  61.  
  62. Key : Analysis.DebugAnalysisManager
  63. Value: Create
  64.  
  65. Key : Analysis.Elapsed.mSec
  66. Value: 17084
  67.  
  68. Key : Analysis.Init.CPU.mSec
  69. Value: 265
  70.  
  71. Key : Analysis.Init.Elapsed.mSec
  72. Value: 61739
  73.  
  74. Key : Analysis.Memory.CommitPeak.Mb
  75. Value: 98
  76.  
  77. Key : Bugcheck.Code.DumpHeader
  78. Value: 0xa
  79.  
  80. Key : Bugcheck.Code.Register
  81. Value: 0xa
  82.  
  83. Key : WER.OS.Branch
  84. Value: vb_release
  85.  
  86. Key : WER.OS.Timestamp
  87. Value: 2019-12-06T14:06:00Z
  88.  
  89. Key : WER.OS.Version
  90. Value: 10.0.19041.1
  91.  
  92.  
  93. FILE_IN_CAB: 081922-8265-01.dmp
  94.  
  95. BUGCHECK_CODE: a
  96.  
  97. BUGCHECK_P1: 2f4
  98.  
  99. BUGCHECK_P2: ff
  100.  
  101. BUGCHECK_P3: 93
  102.  
  103. BUGCHECK_P4: fffff8045ba0baf8
  104.  
  105. WRITE_ADDRESS: fffff8045c2fb390: Unable to get MiVisibleState
  106. Unable to get NonPagedPoolStart
  107. Unable to get NonPagedPoolEnd
  108. Unable to get PagedPoolStart
  109. Unable to get PagedPoolEnd
  110. unable to get nt!MmSpecialPagesInUse
  111. 00000000000002f4
  112.  
  113. BLACKBOXBSD: 1 (!blackboxbsd)
  114.  
  115.  
  116. BLACKBOXNTFS: 1 (!blackboxntfs)
  117.  
  118.  
  119. BLACKBOXPNP: 1 (!blackboxpnp)
  120.  
  121.  
  122. BLACKBOXWINLOGON: 1
  123.  
  124. CUSTOMER_CRASH_COUNT: 1
  125.  
  126. PROCESS_NAME: System
  127.  
  128. TRAP_FRAME: fffff90fcb32f490 -- (.trap 0xfffff90fcb32f490)
  129. NOTE: The trap frame does not contain all registers.
  130. Some register values may be zeroed or incorrect.
  131. rax=00000000000002f4 rbx=0000000000000000 rcx=00000000000002f4
  132. rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
  133. rip=fffff8045ba0baf8 rsp=fffff90fcb32f628 rbp=0000000000000000
  134. r8=00000000000000a4 r9=0101010101010101 r10=fffff804884015a0
  135. r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
  136. r14=0000000000000000 r15=0000000000000000
  137. iopl=0 nv up di pl nz ac po nc
  138. nt!memset+0x78:
  139. fffff804`5ba0baf8 0f1101 movups xmmword ptr [rcx],xmm0 ds:00000000`000002f4=????????????????????????????????
  140. Resetting default scope
  141.  
  142. STACK_TEXT:
  143. fffff90f`cb32f348 fffff804`5ba0a869 : 00000000`0000000a 00000000`000002f4 00000000`000000ff 00000000`00000093 : nt!KeBugCheckEx
  144. fffff90f`cb32f350 fffff804`5ba06b69 : 7ffff804`00000002 fffff804`884087ab 00000035`00000001 fffff804`5b944feb : nt!KiBugCheckDispatch+0x69
  145. fffff90f`cb32f490 fffff804`5ba0baf8 : fffff804`5b84d783 ffffc388`c5f27318 00000000`00000000 00000065`64ee797d : nt!KiPageFault+0x469
  146. fffff90f`cb32f628 fffff804`5b84d783 : ffffc388`c5f27318 00000000`00000000 00000065`64ee797d 00000065`64ee797d : nt!memset+0x78
  147. fffff90f`cb32f630 fffff804`5b84bd24 : 00000000`00000000 00001f80`00000000 00000000`00000003 00000000`00000002 : nt!PpmIdleExecuteTransition+0x18e3
  148. fffff90f`cb32fa30 fffff804`5b9fc414 : ffffffff`00000000 ffffd880`08f0b540 ffffc388`d6bf4080 00000000`000021bb : nt!PoIdle+0x374
  149. fffff90f`cb32fba0 00000000`00000000 : fffff90f`cb330000 fffff90f`cb329000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x54
  150.  
  151.  
  152. SYMBOL_NAME: nt!KiPageFault+469
  153.  
  154. MODULE_NAME: nt
  155.  
  156. IMAGE_NAME: ntkrnlmp.exe
  157.  
  158. IMAGE_VERSION: 10.0.19041.1889
  159.  
  160. STACK_COMMAND: .cxr; .ecxr ; kb
  161.  
  162. BUCKET_ID_FUNC_OFFSET: 469
  163.  
  164. FAILURE_BUCKET_ID: AV_CODE_AV_nt!KiPageFault
  165.  
  166. OS_VERSION: 10.0.19041.1
  167.  
  168. BUILDLAB_STR: vb_release
  169.  
  170. OSPLATFORM_TYPE: x64
  171.  
  172. OSNAME: Windows 10
  173.  
  174. FAILURE_ID_HASH: {22c06795-f62b-154a-eb13-05cdd373e37e}
  175.  
  176. Followup: MachineOwner
  177. ---------
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement