Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Microsoft (R) Windows Debugger Version 10.0.22621.1 AMD64
- Copyright (c) Microsoft Corporation. All rights reserved.
- Loading Dump File [E:\Desktop\072122-78281-01.dmp]
- Mini Kernel Dump File: Only registers and stack trace are available
- Symbol search path is: srv*
- Executable search path is:
- Windows 10 Kernel Version 19041 MP (8 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS
- Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
- Machine Name:
- Kernel base = 0xfffff807`66800000 PsLoadedModuleList = 0xfffff807`6742a230
- Debug session time: Thu Jul 21 23:54:29.749 2022 (UTC + 3:00)
- System Uptime: 6 days 2:16:32.393
- Loading Kernel Symbols
- ...............................................................
- ................................................................
- ................................................................
- ..................
- Loading User Symbols
- Loading unloaded module list
- ..................................................
- For analysis of this file, run !analyze -v
- 4: kd> !analyze -v
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- IRQL_NOT_LESS_OR_EQUAL (a)
- An attempt was made to access a pageable (or completely invalid) address at an
- interrupt request level (IRQL) that is too high. This is usually
- caused by drivers using improper addresses.
- If a kernel debugger is available get the stack backtrace.
- Arguments:
- Arg1: ffffffffffffffd0, memory referenced
- Arg2: 0000000000000002, IRQL
- Arg3: 0000000000000001, bitfield :
- bit 0 : value 0 = read operation, 1 = write operation
- bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
- Arg4: fffff80766a33386, address which referenced memory
- Debugging Details:
- ------------------
- KEY_VALUES_STRING: 1
- Key : Analysis.CPU.mSec
- Value: 4233
- Key : Analysis.DebugAnalysisManager
- Value: Create
- Key : Analysis.Elapsed.mSec
- Value: 102422
- Key : Analysis.Init.CPU.mSec
- Value: 2250
- Key : Analysis.Init.Elapsed.mSec
- Value: 1222487
- Key : Analysis.Memory.CommitPeak.Mb
- Value: 91
- Key : WER.OS.Branch
- Value: vb_release
- Key : WER.OS.Timestamp
- Value: 2019-12-06T14:06:00Z
- Key : WER.OS.Version
- Value: 10.0.19041.1
- FILE_IN_CAB: 072122-78281-01.dmp
- BUGCHECK_CODE: a
- BUGCHECK_P1: ffffffffffffffd0
- BUGCHECK_P2: 2
- BUGCHECK_P3: 1
- BUGCHECK_P4: fffff80766a33386
- WRITE_ADDRESS: fffff807674fb390: Unable to get MiVisibleState
- Unable to get NonPagedPoolStart
- Unable to get NonPagedPoolEnd
- Unable to get PagedPoolStart
- Unable to get PagedPoolEnd
- unable to get nt!MmSpecialPagesInUse
- ffffffffffffffd0
- BLACKBOXBSD: 1 (!blackboxbsd)
- BLACKBOXNTFS: 1 (!blackboxntfs)
- BLACKBOXPNP: 1 (!blackboxpnp)
- BLACKBOXWINLOGON: 1
- CUSTOMER_CRASH_COUNT: 1
- PROCESS_NAME: DiscordPTB.exe
- DPC_STACK_BASE: FFFF8A8C7C867FB0
- TRAP_FRAME: ffff8a8c7c867980 -- (.trap 0xffff8a8c7c867980)
- NOTE: The trap frame does not contain all registers.
- Some register values may be zeroed or incorrect.
- rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
- rdx=00000000746c6644 rsi=0000000000000000 rdi=0000000000000000
- rip=fffff80766a33386 rsp=ffff8a8c7c867b10 rbp=0000000000000006
- r8=0000000000000002 r9=0000000001d89d44 r10=fffff80766a33340
- r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
- r14=0000000000000000 r15=0000000000000000
- iopl=0 nv up ei pl zr na po nc
- nt!ObfDereferenceObjectWithTag+0x26:
- fffff807`66a33386 f0480fc15ed0 lock xadd qword ptr [rsi-30h],rbx ds:ffffffff`ffffffd0=????????????????
- Resetting default scope
- STACK_TEXT:
- ffff8a8c`7c867838 fffff807`66c0a569 : 00000000`0000000a ffffffff`ffffffd0 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
- ffff8a8c`7c867840 fffff807`66c06869 : 00000000`00000000 00000000`00000001 00000000`00000000 ffffcb00`1e480100 : nt!KiBugCheckDispatch+0x69
- ffff8a8c`7c867980 fffff807`66a33386 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x469
- ffff8a8c`7c867b10 fffff807`66a3334e : ffff8f8f`d4cc2bc0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObfDereferenceObjectWithTag+0x26
- ffff8a8c`7c867b50 fffff807`8222a218 : 00000000`00000001 ffffcb00`1e480180 ffff8f8f`bb9975e0 ffff8f8f`bbb9e080 : nt!HalPutDmaAdapter+0xe
- ffff8a8c`7c867b80 fffff807`8222a190 : 00000000`00000000 ffff8f8f`ce4c73b0 00000000`00000000 ffff8f8f`d806f080 : afd!AfdDerefPollInfoFileObjects+0x48
- ffff8a8c`7c867bb0 fffff807`8222adee : 00000000`00000002 ffff8f8f`d4cc2be0 ffffcb00`1e480180 ffff8a8c`7c867e60 : afd!AfdCompletePollIrp+0x74
- ffff8a8c`7c867c00 fffff807`66a22782 : ffff8f8f`d4cc2c20 ffffcb00`1e480180 ffffcb00`1e480180 ffff8f8f`00000002 : afd!AfdTimeoutPoll+0x2e
- ffff8a8c`7c867c30 fffff807`66ac9bfd : ffffcb00`1e480180 46e86305`00000000 00000000`0000002a 00000000`01328479 : nt!KiProcessExpiredTimerList+0x172
- ffff8a8c`7c867d20 fffff807`66bff5d5 : 74c08545`168949d4 ffffcb00`1e480180 ffff8f8f`ac4e9ac0 00000000`00000002 : nt!KiRetireDpcList+0x5dd
- ffff8a8c`7c867fb0 fffff807`66bff3c0 : ffff8f8f`ca574540 fffff807`66b2397a 00000000`00000000 00000000`2077fda0 : nt!KxRetireDpcList+0x5
- ffff8a8c`8462f9c0 fffff807`66bfec75 : 00000000`00000002 fffff807`66bfa621 00000000`00000002 ffff8f8f`00000001 : nt!KiDispatchInterruptContinue
- ffff8a8c`8462f9f0 fffff807`66bfa621 : 00000000`00000002 ffff8f8f`00000001 ffff8a8c`8462fa18 00000000`00000000 : nt!KiDpcInterruptBypass+0x25
- ffff8a8c`8462fa00 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatchNoLockNoEtw+0xb1
- SYMBOL_NAME: afd!AfdDerefPollInfoFileObjects+48
- MODULE_NAME: afd
- IMAGE_NAME: afd.sys
- IMAGE_VERSION: 10.0.19041.1826
- STACK_COMMAND: .cxr; .ecxr ; kb
- BUCKET_ID_FUNC_OFFSET: 48
- FAILURE_BUCKET_ID: AV_afd!AfdDerefPollInfoFileObjects
- OS_VERSION: 10.0.19041.1
- BUILDLAB_STR: vb_release
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- FAILURE_ID_HASH: {9a846440-a090-65b4-c1d4-bc8c6183377b}
- Followup: MachineOwner
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement