Advertisement
Guest User

dmp2

a guest
Jan 12th, 2022
199
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 5.05 KB | None | 0 0
  1.  
  2. Microsoft (R) Windows Debugger Version 10.0.22000.194 X86
  3. Copyright (c) Microsoft Corporation. All rights reserved.
  4.  
  5.  
  6. Loading Dump File [C:\Windows\Minidump\011022-4937-01.dmp]
  7. Mini Kernel Dump File: Only registers and stack trace are available
  8.  
  9. Symbol search path is: srv*
  10. Executable search path is:
  11. Windows 10 Kernel Version 19041 MP (12 procs) Free x64
  12. Product: WinNt, suite: TerminalServer SingleUserTS Personal
  13. Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
  14. Machine Name:
  15. Kernel base = 0xfffff804`56800000 PsLoadedModuleList = 0xfffff804`5742a1b0
  16. Debug session time: Mon Jan 10 17:51:27.889 2022 (UTC - 5:00)
  17. System Uptime: 0 days 0:10:59.507
  18. Loading Kernel Symbols
  19. ...............................................................
  20. ................................................................
  21. ...............................................................
  22. Loading User Symbols
  23. Loading unloaded module list
  24. ...........
  25. For analysis of this file, run !analyze -v
  26. 5: kd> !analyze -v
  27. *******************************************************************************
  28. * *
  29. * Bugcheck Analysis *
  30. * *
  31. *******************************************************************************
  32.  
  33. PAGE_FAULT_IN_NONPAGED_AREA (50)
  34. Invalid system memory was referenced. This cannot be protected by try-except.
  35. Typically the address is just plain bad or it is pointing at freed memory.
  36. Arguments:
  37. Arg1: ffffdc8e995f8010, memory referenced.
  38. Arg2: 0000000000000011, value 0 = read operation, 1 = write operation.
  39. Arg3: ffffdc8e995f8010, If non-zero, the instruction address which referenced the bad memory
  40. address.
  41. Arg4: 0000000000000002, (reserved)
  42.  
  43. Debugging Details:
  44. ------------------
  45.  
  46.  
  47. Could not read faulting driver name
  48.  
  49. KEY_VALUES_STRING: 1
  50.  
  51. Key : Analysis.CPU.mSec
  52. Value: 3608
  53.  
  54. Key : Analysis.DebugAnalysisManager
  55. Value: Create
  56.  
  57. Key : Analysis.Elapsed.mSec
  58. Value: 4512
  59.  
  60. Key : Analysis.Init.CPU.mSec
  61. Value: 1342
  62.  
  63. Key : Analysis.Init.Elapsed.mSec
  64. Value: 11302
  65.  
  66. Key : Analysis.Memory.CommitPeak.Mb
  67. Value: 86
  68.  
  69. Key : WER.OS.Branch
  70. Value: vb_release
  71.  
  72. Key : WER.OS.Timestamp
  73. Value: 2019-12-06T14:06:00Z
  74.  
  75. Key : WER.OS.Version
  76. Value: 10.0.19041.1
  77.  
  78.  
  79. BUGCHECK_CODE: 50
  80.  
  81. BUGCHECK_P1: ffffdc8e995f8010
  82.  
  83. BUGCHECK_P2: 11
  84.  
  85. BUGCHECK_P3: ffffdc8e995f8010
  86.  
  87. BUGCHECK_P4: 2
  88.  
  89. WRITE_ADDRESS: fffff804574fb390: Unable to get MiVisibleState
  90. Unable to get NonPagedPoolStart
  91. Unable to get NonPagedPoolEnd
  92. Unable to get PagedPoolStart
  93. Unable to get PagedPoolEnd
  94. unable to get nt!MmSpecialPagesInUse
  95. ffffdc8e995f8010
  96.  
  97. MM_INTERNAL_CODE: 2
  98.  
  99. BLACKBOXBSD: 1 (!blackboxbsd)
  100.  
  101.  
  102. BLACKBOXNTFS: 1 (!blackboxntfs)
  103.  
  104.  
  105. BLACKBOXPNP: 1 (!blackboxpnp)
  106.  
  107.  
  108. BLACKBOXWINLOGON: 1
  109.  
  110. CUSTOMER_CRASH_COUNT: 1
  111.  
  112. PROCESS_NAME: explorer.exe
  113.  
  114. TRAP_FRAME: fffff1887f7648e0 -- (.trap 0xfffff1887f7648e0)
  115. NOTE: The trap frame does not contain all registers.
  116. Some register values may be zeroed or incorrect.
  117. rax=00000000c0ffffff rbx=0000000000000000 rcx=fffff8045744f7c8
  118. rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
  119. rip=ffffdc8e995f8010 rsp=fffff1887f764a70 rbp=fffff18800000000
  120. r8=0000000000100000 r9=ffff84829a48d260 r10=7ffffffffffffffc
  121. r11=fffff1887f764a30 r12=0000000000000000 r13=0000000000000000
  122. r14=0000000000000000 r15=0000000000000000
  123. iopl=0 nv up ei ng nz na po nc
  124. ffffdc8e`995f8010 55 push rbp
  125. Resetting default scope
  126.  
  127. STACK_TEXT:
  128. fffff188`7f764638 fffff804`56c4a36f : 00000000`00000050 ffffdc8e`995f8010 00000000`00000011 fffff188`7f7648e0 : nt!KeBugCheckEx
  129. fffff188`7f764640 fffff804`56a9f470 : fffff188`7f764b20 00000000`00000011 fffff188`7f764960 00000000`00000000 : nt!MiSystemFault+0x18cedf
  130. fffff188`7f764740 fffff804`56c0525e : 00000000`00000000 00000000`00000000 00000000`00000000 ffffdc8e`995f8030 : nt!MmAccessFault+0x400
  131. fffff188`7f7648e0 ffffdc8e`995f8010 : ffffdc8e`995f8001 fffff188`00000000 00000000`00000000 fffff804`00000076 : nt!KiPageFault+0x35e
  132. fffff188`7f764a70 ffffdc8e`995f8001 : fffff188`00000000 00000000`00000000 fffff804`00000076 00000000`00000000 : 0xffffdc8e`995f8010
  133. fffff188`7f764a78 fffff188`00000000 : 00000000`00000000 fffff804`00000076 00000000`00000000 ffffdc8e`995f801a : 0xffffdc8e`995f8001
  134. fffff188`7f764a80 00000000`00000000 : fffff804`00000076 00000000`00000000 ffffdc8e`995f801a fffff188`00000000 : 0xfffff188`00000000
  135.  
  136.  
  137. SYMBOL_NAME: nt!MiSystemFault+18cedf
  138.  
  139. MODULE_NAME: nt
  140.  
  141. IMAGE_VERSION: 10.0.19041.1415
  142.  
  143. STACK_COMMAND: .thread ; .cxr ; kb
  144.  
  145. IMAGE_NAME: ntkrnlmp.exe
  146.  
  147. BUCKET_ID_FUNC_OFFSET: 18cedf
  148.  
  149. FAILURE_BUCKET_ID: AV_INVALID_nt!MiSystemFault
  150.  
  151. OS_VERSION: 10.0.19041.1
  152.  
  153. BUILDLAB_STR: vb_release
  154.  
  155. OSPLATFORM_TYPE: x64
  156.  
  157. OSNAME: Windows 10
  158.  
  159. FAILURE_ID_HASH: {8a33c6b1-a9f1-4efe-025b-a861cc33d6e2}
  160.  
  161. Followup: MachineOwner
  162. ---------
  163.  
  164.  
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement