Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Microsoft (R) Windows Debugger Version 10.0.21306.1007 AMD64
- Copyright (c) Microsoft Corporation. All rights reserved.
- Loading Dump File [C:\Users\User\Desktop\041121-71421-01.dmp]
- Mini Kernel Dump File: Only registers and stack trace are available
- ************* Path validation summary **************
- Response Time (ms) Location
- Deferred srv*
- Symbol search path is: srv*
- Executable search path is:
- Windows 10 Kernel Version 19041 MP (12 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS
- Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
- Machine Name:
- Kernel base = 0xfffff804`3b800000 PsLoadedModuleList = 0xfffff804`3c42a390
- Debug session time: Sun Apr 11 09:15:47.287 2021 (UTC + 10:00)
- System Uptime: 1 days 3:51:42.914
- Loading Kernel Symbols
- ...............................................................
- ................................................................
- ................................................................
- .......
- Loading User Symbols
- Loading unloaded module list
- ........................
- For analysis of this file, run !analyze -v
- nt!KeBugCheckEx:
- fffff804`3bbf5a80 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffffc06`14bd3f70=0000000000000050
- 1: kd> !analyze -v
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- PAGE_FAULT_IN_NONPAGED_AREA (50)
- Invalid system memory was referenced. This cannot be protected by try-except.
- Typically the address is just plain bad or it is pointing at freed memory.
- Arguments:
- Arg1: fffff8040001003f, memory referenced.
- Arg2: 0000000000000010, value 0 = read operation, 1 = write operation.
- Arg3: fffff8040001003f, If non-zero, the instruction address which referenced the bad memory
- address.
- Arg4: 0000000000000002, (reserved)
- Debugging Details:
- ------------------
- Could not read faulting driver name
- *** WARNING: Unable to verify checksum for win32k.sys
- KEY_VALUES_STRING: 1
- Key : Analysis.CPU.mSec
- Value: 4609
- Key : Analysis.DebugAnalysisManager
- Value: Create
- Key : Analysis.Elapsed.mSec
- Value: 13248
- Key : Analysis.Init.CPU.mSec
- Value: 342
- Key : Analysis.Init.Elapsed.mSec
- Value: 1811
- Key : Analysis.Memory.CommitPeak.Mb
- Value: 85
- Key : WER.OS.Branch
- Value: vb_release
- Key : WER.OS.Timestamp
- Value: 2019-12-06T14:06:00Z
- Key : WER.OS.Version
- Value: 10.0.19041.1
- BUGCHECK_CODE: 50
- BUGCHECK_P1: fffff8040001003f
- BUGCHECK_P2: 10
- BUGCHECK_P3: fffff8040001003f
- BUGCHECK_P4: 2
- READ_ADDRESS: fffff8043c4fb390: Unable to get MiVisibleState
- Unable to get NonPagedPoolStart
- Unable to get NonPagedPoolEnd
- Unable to get PagedPoolStart
- Unable to get PagedPoolEnd
- unable to get nt!MmSpecialPagesInUse
- fffff8040001003f
- MM_INTERNAL_CODE: 2
- BLACKBOXBSD: 1 (!blackboxbsd)
- BLACKBOXNTFS: 1 (!blackboxntfs)
- BLACKBOXPNP: 1 (!blackboxpnp)
- BLACKBOXWINLOGON: 1
- CUSTOMER_CRASH_COUNT: 1
- PROCESS_NAME: System
- TRAP_FRAME: fffffc0614bd4210 -- (.trap 0xfffffc0614bd4210)
- NOTE: The trap frame does not contain all registers.
- Some register values may be zeroed or incorrect.
- rax=0000000000000000 rbx=0000000000000000 rcx=ffff9006dd33f080
- rdx=ffff9006dd0ad480 rsi=0000000000000000 rdi=0000000000000000
- rip=fffff8040001003f rsp=fffffc0614bd43a0 rbp=ffff9006dd42e030
- r8=ffff9006e133c010 r9=000000000000003e r10=fffff8043bb59910
- r11=ffff9006dd33f080 r12=0000000000000000 r13=0000000000000000
- r14=0000000000000000 r15=0000000000000000
- iopl=0 nv up ei ng nz na po nc
- fffff804`0001003f ?? ???
- Resetting default scope
- FAILED_INSTRUCTION_ADDRESS:
- +0
- fffff804`0001003f ?? ???
- STACK_TEXT:
- fffffc06`14bd3f68 fffff804`3bc1ebbb : 00000000`00000050 fffff804`0001003f 00000000`00000010 fffffc06`14bd4210 : nt!KeBugCheckEx
- fffffc06`14bd3f70 fffff804`3ba0c960 : ffff9006`e460def0 00000000`00000010 fffffc06`14bd4290 00000000`00000000 : nt!MiSystemFault+0x1f43ab
- fffffc06`14bd4070 fffff804`3bc03c5e : ffff9006`e12b2010 ffff9006`dd4080a0 00000000`00000001 fffff804`00000000 : nt!MmAccessFault+0x400
- fffffc06`14bd4210 fffff804`0001003f : fffffc06`14bd5000 fffff804`3bd193ce fffffc06`14bcf000 ffff9006`ed627a00 : nt!KiPageFault+0x35e
- fffffc06`14bd43a0 fffffc06`14bd5000 : fffff804`3bd193ce fffffc06`14bcf000 ffff9006`ed627a00 fffff804`41175a20 : 0xfffff804`0001003f
- fffffc06`14bd43a8 fffff804`3bd193ce : fffffc06`14bcf000 ffff9006`ed627a00 fffff804`41175a20 00000000`00000000 : 0xfffffc06`14bd5000
- fffffc06`14bd43b0 ffff9006`dd42e030 : ffff9006`e460def0 ffff9006`ed6279e0 ffff9006`dd0f4020 fffff804`41175a20 : nt!KiConvertDynamicHeteroPolicy+0x1e
- fffffc06`14bd43e0 ffff9006`e460def0 : ffff9006`ed6279e0 ffff9006`dd0f4020 fffff804`41175a20 fffffc06`14bd4510 : 0xffff9006`dd42e030
- fffffc06`14bd43e8 ffff9006`ed6279e0 : ffff9006`dd0f4020 fffff804`41175a20 fffffc06`14bd4510 fffff804`3bb5428b : 0xffff9006`e460def0
- fffffc06`14bd43f0 ffff9006`dd0f4020 : fffff804`41175a20 fffffc06`14bd4510 fffff804`3bb5428b fffff804`3b028a20 : 0xffff9006`ed6279e0
- fffffc06`14bd43f8 fffff804`41175a20 : fffffc06`14bd4510 fffff804`3bb5428b fffff804`3b028a20 00000000`00000000 : 0xffff9006`dd0f4020
- fffffc06`14bd4400 fffffc06`14bd4510 : fffff804`3bb5428b fffff804`3b028a20 00000000`00000000 fffff804`41175a20 : Ntfs!NtfsFastIoDispatch
- fffffc06`14bd4408 fffff804`3bb5428b : fffff804`3b028a20 00000000`00000000 fffff804`41175a20 fffff804`3b022680 : 0xfffffc06`14bd4510
- fffffc06`14bd4410 fffff804`3bb51574 : ffff9006`ea4b8f10 00000000`00006000 00000000`00006000 00000000`00006000 : nt!FsRtlReleaseFileForModWrite+0xef
- fffffc06`14bd46f0 fffff804`3bbb2a1b : fffff804`3c450bc0 00000000`00000001 ffff9006`e9609320 00000000`00000000 : nt!MiGatherMappedPages+0x2e8
- fffffc06`14bd47b0 fffff804`3bb17e25 : ffff9006`dd33f080 ffff9006`dd33f080 00000000`00000080 000f8067`bcbbbdff : nt!MiMappedPageWriter+0x18b
- fffffc06`14bd4c10 fffff804`3bbfd0d8 : ffffce00`cc958180 ffff9006`dd33f080 fffff804`3bb17dd0 00000000`00000000 : nt!PspSystemThreadStartup+0x55
- fffffc06`14bd4c60 00000000`00000000 : fffffc06`14bd5000 fffffc06`14bcf000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
- SYMBOL_NAME: nt!MiSystemFault+1f43ab
- MODULE_NAME: nt
- IMAGE_VERSION: 10.0.19041.804
- STACK_COMMAND: .thread ; .cxr ; kb
- IMAGE_NAME: ntkrnlmp.exe
- BUCKET_ID_FUNC_OFFSET: 1f43ab
- FAILURE_BUCKET_ID: AV_INVALID_BAD_IP_nt!MiSystemFault
- OS_VERSION: 10.0.19041.1
- BUILDLAB_STR: vb_release
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- FAILURE_ID_HASH: {48ad9531-e3f8-1044-fc5f-d917677674c7}
- Followup: MachineOwner
- ---------
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement