Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Microsoft (R) Windows Debugger Version 10.0.22000.194 X86
- Copyright (c) Microsoft Corporation. All rights reserved.
- Loading Dump File [C:\Windows\Minidump\011022-4937-01.dmp]
- Mini Kernel Dump File: Only registers and stack trace are available
- Symbol search path is: srv*
- Executable search path is:
- Windows 10 Kernel Version 19041 MP (12 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS Personal
- Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
- Machine Name:
- Kernel base = 0xfffff804`56800000 PsLoadedModuleList = 0xfffff804`5742a1b0
- Debug session time: Mon Jan 10 17:51:27.889 2022 (UTC - 5:00)
- System Uptime: 0 days 0:10:59.507
- Loading Kernel Symbols
- ...............................................................
- ................................................................
- ...............................................................
- Loading User Symbols
- Loading unloaded module list
- ...........
- For analysis of this file, run !analyze -v
- 5: kd> !analyze -v
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- PAGE_FAULT_IN_NONPAGED_AREA (50)
- Invalid system memory was referenced. This cannot be protected by try-except.
- Typically the address is just plain bad or it is pointing at freed memory.
- Arguments:
- Arg1: ffffdc8e995f8010, memory referenced.
- Arg2: 0000000000000011, value 0 = read operation, 1 = write operation.
- Arg3: ffffdc8e995f8010, If non-zero, the instruction address which referenced the bad memory
- address.
- Arg4: 0000000000000002, (reserved)
- Debugging Details:
- ------------------
- Could not read faulting driver name
- KEY_VALUES_STRING: 1
- Key : Analysis.CPU.mSec
- Value: 3608
- Key : Analysis.DebugAnalysisManager
- Value: Create
- Key : Analysis.Elapsed.mSec
- Value: 4512
- Key : Analysis.Init.CPU.mSec
- Value: 1342
- Key : Analysis.Init.Elapsed.mSec
- Value: 11302
- Key : Analysis.Memory.CommitPeak.Mb
- Value: 86
- Key : WER.OS.Branch
- Value: vb_release
- Key : WER.OS.Timestamp
- Value: 2019-12-06T14:06:00Z
- Key : WER.OS.Version
- Value: 10.0.19041.1
- BUGCHECK_CODE: 50
- BUGCHECK_P1: ffffdc8e995f8010
- BUGCHECK_P2: 11
- BUGCHECK_P3: ffffdc8e995f8010
- BUGCHECK_P4: 2
- WRITE_ADDRESS: fffff804574fb390: Unable to get MiVisibleState
- Unable to get NonPagedPoolStart
- Unable to get NonPagedPoolEnd
- Unable to get PagedPoolStart
- Unable to get PagedPoolEnd
- unable to get nt!MmSpecialPagesInUse
- ffffdc8e995f8010
- MM_INTERNAL_CODE: 2
- BLACKBOXBSD: 1 (!blackboxbsd)
- BLACKBOXNTFS: 1 (!blackboxntfs)
- BLACKBOXPNP: 1 (!blackboxpnp)
- BLACKBOXWINLOGON: 1
- CUSTOMER_CRASH_COUNT: 1
- PROCESS_NAME: explorer.exe
- TRAP_FRAME: fffff1887f7648e0 -- (.trap 0xfffff1887f7648e0)
- NOTE: The trap frame does not contain all registers.
- Some register values may be zeroed or incorrect.
- rax=00000000c0ffffff rbx=0000000000000000 rcx=fffff8045744f7c8
- rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
- rip=ffffdc8e995f8010 rsp=fffff1887f764a70 rbp=fffff18800000000
- r8=0000000000100000 r9=ffff84829a48d260 r10=7ffffffffffffffc
- r11=fffff1887f764a30 r12=0000000000000000 r13=0000000000000000
- r14=0000000000000000 r15=0000000000000000
- iopl=0 nv up ei ng nz na po nc
- ffffdc8e`995f8010 55 push rbp
- Resetting default scope
- STACK_TEXT:
- fffff188`7f764638 fffff804`56c4a36f : 00000000`00000050 ffffdc8e`995f8010 00000000`00000011 fffff188`7f7648e0 : nt!KeBugCheckEx
- fffff188`7f764640 fffff804`56a9f470 : fffff188`7f764b20 00000000`00000011 fffff188`7f764960 00000000`00000000 : nt!MiSystemFault+0x18cedf
- fffff188`7f764740 fffff804`56c0525e : 00000000`00000000 00000000`00000000 00000000`00000000 ffffdc8e`995f8030 : nt!MmAccessFault+0x400
- fffff188`7f7648e0 ffffdc8e`995f8010 : ffffdc8e`995f8001 fffff188`00000000 00000000`00000000 fffff804`00000076 : nt!KiPageFault+0x35e
- fffff188`7f764a70 ffffdc8e`995f8001 : fffff188`00000000 00000000`00000000 fffff804`00000076 00000000`00000000 : 0xffffdc8e`995f8010
- fffff188`7f764a78 fffff188`00000000 : 00000000`00000000 fffff804`00000076 00000000`00000000 ffffdc8e`995f801a : 0xffffdc8e`995f8001
- fffff188`7f764a80 00000000`00000000 : fffff804`00000076 00000000`00000000 ffffdc8e`995f801a fffff188`00000000 : 0xfffff188`00000000
- SYMBOL_NAME: nt!MiSystemFault+18cedf
- MODULE_NAME: nt
- IMAGE_VERSION: 10.0.19041.1415
- STACK_COMMAND: .thread ; .cxr ; kb
- IMAGE_NAME: ntkrnlmp.exe
- BUCKET_ID_FUNC_OFFSET: 18cedf
- FAILURE_BUCKET_ID: AV_INVALID_nt!MiSystemFault
- OS_VERSION: 10.0.19041.1
- BUILDLAB_STR: vb_release
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- FAILURE_ID_HASH: {8a33c6b1-a9f1-4efe-025b-a861cc33d6e2}
- Followup: MachineOwner
- ---------
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement