Advertisement
Guest User

dmp3

a guest
Jan 12th, 2022
244
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 5.60 KB | None | 0 0
  1.  
  2. Microsoft (R) Windows Debugger Version 10.0.22000.194 X86
  3. Copyright (c) Microsoft Corporation. All rights reserved.
  4.  
  5.  
  6. Loading Dump File [C:\Windows\Minidump\011122-4593-01.dmp]
  7. Mini Kernel Dump File: Only registers and stack trace are available
  8.  
  9. Symbol search path is: srv*
  10. Executable search path is:
  11. Windows 10 Kernel Version 19041 MP (12 procs) Free x64
  12. Product: WinNt, suite: TerminalServer SingleUserTS Personal
  13. Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
  14. Machine Name:
  15. Kernel base = 0xfffff805`07400000 PsLoadedModuleList = 0xfffff805`0802a1b0
  16. Debug session time: Tue Jan 11 20:24:20.511 2022 (UTC - 5:00)
  17. System Uptime: 0 days 0:22:46.130
  18. Loading Kernel Symbols
  19. ...............................................................
  20. ................................................................
  21. ..............................................................
  22. Loading User Symbols
  23. Loading unloaded module list
  24. .......
  25. For analysis of this file, run !analyze -v
  26. 4: kd> !analyze -v
  27. *******************************************************************************
  28. * *
  29. * Bugcheck Analysis *
  30. * *
  31. *******************************************************************************
  32.  
  33. IRQL_NOT_LESS_OR_EQUAL (a)
  34. An attempt was made to access a pageable (or completely invalid) address at an
  35. interrupt request level (IRQL) that is too high. This is usually
  36. caused by drivers using improper addresses.
  37. If a kernel debugger is available get the stack backtrace.
  38. Arguments:
  39. Arg1: 0000000000006638, memory referenced
  40. Arg2: 0000000000000002, IRQL
  41. Arg3: 0000000000000001, bitfield :
  42. bit 0 : value 0 = read operation, 1 = write operation
  43. bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
  44. Arg4: fffff805076b1a89, address which referenced memory
  45.  
  46. Debugging Details:
  47. ------------------
  48.  
  49.  
  50. KEY_VALUES_STRING: 1
  51.  
  52. Key : Analysis.CPU.mSec
  53. Value: 3311
  54.  
  55. Key : Analysis.DebugAnalysisManager
  56. Value: Create
  57.  
  58. Key : Analysis.Elapsed.mSec
  59. Value: 5912
  60.  
  61. Key : Analysis.Init.CPU.mSec
  62. Value: 1093
  63.  
  64. Key : Analysis.Init.Elapsed.mSec
  65. Value: 9554
  66.  
  67. Key : Analysis.Memory.CommitPeak.Mb
  68. Value: 84
  69.  
  70. Key : WER.OS.Branch
  71. Value: vb_release
  72.  
  73. Key : WER.OS.Timestamp
  74. Value: 2019-12-06T14:06:00Z
  75.  
  76. Key : WER.OS.Version
  77. Value: 10.0.19041.1
  78.  
  79.  
  80. BUGCHECK_CODE: a
  81.  
  82. BUGCHECK_P1: 6638
  83.  
  84. BUGCHECK_P2: 2
  85.  
  86. BUGCHECK_P3: 1
  87.  
  88. BUGCHECK_P4: fffff805076b1a89
  89.  
  90. WRITE_ADDRESS: fffff805080fb390: Unable to get MiVisibleState
  91. Unable to get NonPagedPoolStart
  92. Unable to get NonPagedPoolEnd
  93. Unable to get PagedPoolStart
  94. Unable to get PagedPoolEnd
  95. unable to get nt!MmSpecialPagesInUse
  96. 0000000000006638
  97.  
  98. BLACKBOXBSD: 1 (!blackboxbsd)
  99.  
  100.  
  101. BLACKBOXNTFS: 1 (!blackboxntfs)
  102.  
  103.  
  104. BLACKBOXPNP: 1 (!blackboxpnp)
  105.  
  106.  
  107. BLACKBOXWINLOGON: 1
  108.  
  109. CUSTOMER_CRASH_COUNT: 1
  110.  
  111. PROCESS_NAME: Gunfire Reborn.exe
  112.  
  113. TRAP_FRAME: ffff8a0ba007d430 -- (.trap 0xffff8a0ba007d430)
  114. NOTE: The trap frame does not contain all registers.
  115. Some register values may be zeroed or incorrect.
  116. rax=0000000000006638 rbx=0000000000000000 rcx=ffff8a0ba007d910
  117. rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
  118. rip=fffff805076b1a89 rsp=ffff8a0ba007d5c0 rbp=ffff8a0ba007d6c0
  119. r8=ffffe93ffdba6638 r9=ffffe93ffdba6638 r10=0000000000000000
  120. r11=ffffe974ba5d2000 r12=0000000000000000 r13=0000000000000000
  121. r14=0000000000000000 r15=0000000000000000
  122. iopl=0 nv up ei pl zr na po nc
  123. nt!MiQueryAddressState+0x8f9:
  124. fffff805`076b1a89 0900 or dword ptr [rax],eax ds:00000000`00006638=????????
  125. Resetting default scope
  126.  
  127. MISALIGNED_IP:
  128. nt!MiQueryAddressState+8f9
  129. fffff805`076b1a89 0900 or dword ptr [rax],eax
  130.  
  131. STACK_TEXT:
  132. ffff8a0b`a007d2e8 fffff805`07809069 : 00000000`0000000a 00000000`00006638 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
  133. ffff8a0b`a007d2f0 fffff805`07805369 : 00000000`00000000 00000000`00000030 00000000`00000000 ffffb501`a7fe0180 : nt!KiBugCheckDispatch+0x69
  134. ffff8a0b`a007d430 fffff805`076b1a89 : 0000a007`d5c00000 00000000`00000000 ffff8a0b`a007d618 ffff8a0b`a007d614 : nt!KiPageFault+0x469
  135. ffff8a0b`a007d5c0 fffff805`0764b865 : 00000000`00000000 00007ffb`74cc6000 00007ffb`74cc6000 0000002a`91cceef0 : nt!MiQueryAddressState+0x8f9
  136. ffff8a0b`a007d7d0 fffff805`07a0020c : 00000000`00000000 00000000`00000000 ffff8d08`00000005 00000000`00000000 : nt!MiQueryAddressSpan+0x175
  137. ffff8a0b`a007d890 fffff805`079ff9b5 : ffff8d08`c9d6b080 ffffb501`a8240180 00000000`00000000 00000000`00000000 : nt!MmQueryVirtualMemory+0x83c
  138. ffff8a0b`a007da40 fffff805`07808ab8 : 00007ffb`5e783e89 0000002a`91ccedc0 ffff8d08`ba506260 ffffb501`a8240180 : nt!NtQueryVirtualMemory+0x25
  139. ffff8a0b`a007da90 00007ffb`bcacd1d4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
  140. 0000002a`91cced78 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`bcacd1d4
  141.  
  142.  
  143. SYMBOL_NAME: nt!MiQueryAddressState+8f9
  144.  
  145. IMAGE_VERSION: 10.0.19041.1415
  146.  
  147. STACK_COMMAND: .thread ; .cxr ; kb
  148.  
  149. IMAGE_NAME: hardware
  150.  
  151. MODULE_NAME: hardware
  152.  
  153. FAILURE_BUCKET_ID: IP_MISALIGNED
  154.  
  155. OS_VERSION: 10.0.19041.1
  156.  
  157. BUILDLAB_STR: vb_release
  158.  
  159. OSPLATFORM_TYPE: x64
  160.  
  161. OSNAME: Windows 10
  162.  
  163. FAILURE_ID_HASH: {201b0e5d-db2a-63d2-77be-8ce8ff234750}
  164.  
  165. Followup: MachineOwner
  166. ---------
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement