Advertisement
Guest User

Untitled

a guest
Jul 21st, 2022
64
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 6.41 KB | None | 0 0
  1. Microsoft (R) Windows Debugger Version 10.0.22621.1 AMD64
  2. Copyright (c) Microsoft Corporation. All rights reserved.
  3.  
  4.  
  5. Loading Dump File [E:\Desktop\072122-78281-01.dmp]
  6. Mini Kernel Dump File: Only registers and stack trace are available
  7.  
  8. Symbol search path is: srv*
  9. Executable search path is:
  10. Windows 10 Kernel Version 19041 MP (8 procs) Free x64
  11. Product: WinNt, suite: TerminalServer SingleUserTS
  12. Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
  13. Machine Name:
  14. Kernel base = 0xfffff807`66800000 PsLoadedModuleList = 0xfffff807`6742a230
  15. Debug session time: Thu Jul 21 23:54:29.749 2022 (UTC + 3:00)
  16. System Uptime: 6 days 2:16:32.393
  17. Loading Kernel Symbols
  18. ...............................................................
  19. ................................................................
  20. ................................................................
  21. ..................
  22. Loading User Symbols
  23. Loading unloaded module list
  24. ..................................................
  25. For analysis of this file, run !analyze -v
  26. 4: kd> !analyze -v
  27. *******************************************************************************
  28. * *
  29. * Bugcheck Analysis *
  30. * *
  31. *******************************************************************************
  32.  
  33. IRQL_NOT_LESS_OR_EQUAL (a)
  34. An attempt was made to access a pageable (or completely invalid) address at an
  35. interrupt request level (IRQL) that is too high. This is usually
  36. caused by drivers using improper addresses.
  37. If a kernel debugger is available get the stack backtrace.
  38. Arguments:
  39. Arg1: ffffffffffffffd0, memory referenced
  40. Arg2: 0000000000000002, IRQL
  41. Arg3: 0000000000000001, bitfield :
  42. bit 0 : value 0 = read operation, 1 = write operation
  43. bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
  44. Arg4: fffff80766a33386, address which referenced memory
  45.  
  46. Debugging Details:
  47. ------------------
  48.  
  49.  
  50. KEY_VALUES_STRING: 1
  51.  
  52. Key : Analysis.CPU.mSec
  53. Value: 4233
  54.  
  55. Key : Analysis.DebugAnalysisManager
  56. Value: Create
  57.  
  58. Key : Analysis.Elapsed.mSec
  59. Value: 102422
  60.  
  61. Key : Analysis.Init.CPU.mSec
  62. Value: 2250
  63.  
  64. Key : Analysis.Init.Elapsed.mSec
  65. Value: 1222487
  66.  
  67. Key : Analysis.Memory.CommitPeak.Mb
  68. Value: 91
  69.  
  70. Key : WER.OS.Branch
  71. Value: vb_release
  72.  
  73. Key : WER.OS.Timestamp
  74. Value: 2019-12-06T14:06:00Z
  75.  
  76. Key : WER.OS.Version
  77. Value: 10.0.19041.1
  78.  
  79.  
  80. FILE_IN_CAB: 072122-78281-01.dmp
  81.  
  82. BUGCHECK_CODE: a
  83.  
  84. BUGCHECK_P1: ffffffffffffffd0
  85.  
  86. BUGCHECK_P2: 2
  87.  
  88. BUGCHECK_P3: 1
  89.  
  90. BUGCHECK_P4: fffff80766a33386
  91.  
  92. WRITE_ADDRESS: fffff807674fb390: Unable to get MiVisibleState
  93. Unable to get NonPagedPoolStart
  94. Unable to get NonPagedPoolEnd
  95. Unable to get PagedPoolStart
  96. Unable to get PagedPoolEnd
  97. unable to get nt!MmSpecialPagesInUse
  98. ffffffffffffffd0
  99.  
  100. BLACKBOXBSD: 1 (!blackboxbsd)
  101.  
  102.  
  103. BLACKBOXNTFS: 1 (!blackboxntfs)
  104.  
  105.  
  106. BLACKBOXPNP: 1 (!blackboxpnp)
  107.  
  108.  
  109. BLACKBOXWINLOGON: 1
  110.  
  111. CUSTOMER_CRASH_COUNT: 1
  112.  
  113. PROCESS_NAME: DiscordPTB.exe
  114.  
  115. DPC_STACK_BASE: FFFF8A8C7C867FB0
  116.  
  117. TRAP_FRAME: ffff8a8c7c867980 -- (.trap 0xffff8a8c7c867980)
  118. NOTE: The trap frame does not contain all registers.
  119. Some register values may be zeroed or incorrect.
  120. rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
  121. rdx=00000000746c6644 rsi=0000000000000000 rdi=0000000000000000
  122. rip=fffff80766a33386 rsp=ffff8a8c7c867b10 rbp=0000000000000006
  123. r8=0000000000000002 r9=0000000001d89d44 r10=fffff80766a33340
  124. r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
  125. r14=0000000000000000 r15=0000000000000000
  126. iopl=0 nv up ei pl zr na po nc
  127. nt!ObfDereferenceObjectWithTag+0x26:
  128. fffff807`66a33386 f0480fc15ed0 lock xadd qword ptr [rsi-30h],rbx ds:ffffffff`ffffffd0=????????????????
  129. Resetting default scope
  130.  
  131. STACK_TEXT:
  132. ffff8a8c`7c867838 fffff807`66c0a569 : 00000000`0000000a ffffffff`ffffffd0 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
  133. ffff8a8c`7c867840 fffff807`66c06869 : 00000000`00000000 00000000`00000001 00000000`00000000 ffffcb00`1e480100 : nt!KiBugCheckDispatch+0x69
  134. ffff8a8c`7c867980 fffff807`66a33386 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x469
  135. ffff8a8c`7c867b10 fffff807`66a3334e : ffff8f8f`d4cc2bc0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObfDereferenceObjectWithTag+0x26
  136. ffff8a8c`7c867b50 fffff807`8222a218 : 00000000`00000001 ffffcb00`1e480180 ffff8f8f`bb9975e0 ffff8f8f`bbb9e080 : nt!HalPutDmaAdapter+0xe
  137. ffff8a8c`7c867b80 fffff807`8222a190 : 00000000`00000000 ffff8f8f`ce4c73b0 00000000`00000000 ffff8f8f`d806f080 : afd!AfdDerefPollInfoFileObjects+0x48
  138. ffff8a8c`7c867bb0 fffff807`8222adee : 00000000`00000002 ffff8f8f`d4cc2be0 ffffcb00`1e480180 ffff8a8c`7c867e60 : afd!AfdCompletePollIrp+0x74
  139. ffff8a8c`7c867c00 fffff807`66a22782 : ffff8f8f`d4cc2c20 ffffcb00`1e480180 ffffcb00`1e480180 ffff8f8f`00000002 : afd!AfdTimeoutPoll+0x2e
  140. ffff8a8c`7c867c30 fffff807`66ac9bfd : ffffcb00`1e480180 46e86305`00000000 00000000`0000002a 00000000`01328479 : nt!KiProcessExpiredTimerList+0x172
  141. ffff8a8c`7c867d20 fffff807`66bff5d5 : 74c08545`168949d4 ffffcb00`1e480180 ffff8f8f`ac4e9ac0 00000000`00000002 : nt!KiRetireDpcList+0x5dd
  142. ffff8a8c`7c867fb0 fffff807`66bff3c0 : ffff8f8f`ca574540 fffff807`66b2397a 00000000`00000000 00000000`2077fda0 : nt!KxRetireDpcList+0x5
  143. ffff8a8c`8462f9c0 fffff807`66bfec75 : 00000000`00000002 fffff807`66bfa621 00000000`00000002 ffff8f8f`00000001 : nt!KiDispatchInterruptContinue
  144. ffff8a8c`8462f9f0 fffff807`66bfa621 : 00000000`00000002 ffff8f8f`00000001 ffff8a8c`8462fa18 00000000`00000000 : nt!KiDpcInterruptBypass+0x25
  145. ffff8a8c`8462fa00 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatchNoLockNoEtw+0xb1
  146.  
  147.  
  148. SYMBOL_NAME: afd!AfdDerefPollInfoFileObjects+48
  149.  
  150. MODULE_NAME: afd
  151.  
  152. IMAGE_NAME: afd.sys
  153.  
  154. IMAGE_VERSION: 10.0.19041.1826
  155.  
  156. STACK_COMMAND: .cxr; .ecxr ; kb
  157.  
  158. BUCKET_ID_FUNC_OFFSET: 48
  159.  
  160. FAILURE_BUCKET_ID: AV_afd!AfdDerefPollInfoFileObjects
  161.  
  162. OS_VERSION: 10.0.19041.1
  163.  
  164. BUILDLAB_STR: vb_release
  165.  
  166. OSPLATFORM_TYPE: x64
  167.  
  168. OSNAME: Windows 10
  169.  
  170. FAILURE_ID_HASH: {9a846440-a090-65b4-c1d4-bc8c6183377b}
  171.  
  172. Followup: MachineOwner
  173.  
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement