Advertisement
Guest User

Untitled

a guest
Apr 10th, 2021
215
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 7.02 KB | None | 0 0
  1. Microsoft (R) Windows Debugger Version 10.0.21306.1007 AMD64
  2. Copyright (c) Microsoft Corporation. All rights reserved.
  3.  
  4.  
  5. Loading Dump File [C:\Users\User\Desktop\041121-71421-01.dmp]
  6. Mini Kernel Dump File: Only registers and stack trace are available
  7.  
  8.  
  9. ************* Path validation summary **************
  10. Response Time (ms) Location
  11. Deferred srv*
  12. Symbol search path is: srv*
  13. Executable search path is:
  14. Windows 10 Kernel Version 19041 MP (12 procs) Free x64
  15. Product: WinNt, suite: TerminalServer SingleUserTS
  16. Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
  17. Machine Name:
  18. Kernel base = 0xfffff804`3b800000 PsLoadedModuleList = 0xfffff804`3c42a390
  19. Debug session time: Sun Apr 11 09:15:47.287 2021 (UTC + 10:00)
  20. System Uptime: 1 days 3:51:42.914
  21. Loading Kernel Symbols
  22. ...............................................................
  23. ................................................................
  24. ................................................................
  25. .......
  26. Loading User Symbols
  27. Loading unloaded module list
  28. ........................
  29. For analysis of this file, run !analyze -v
  30. nt!KeBugCheckEx:
  31. fffff804`3bbf5a80 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffffc06`14bd3f70=0000000000000050
  32. 1: kd> !analyze -v
  33. *******************************************************************************
  34. * *
  35. * Bugcheck Analysis *
  36. * *
  37. *******************************************************************************
  38.  
  39. PAGE_FAULT_IN_NONPAGED_AREA (50)
  40. Invalid system memory was referenced. This cannot be protected by try-except.
  41. Typically the address is just plain bad or it is pointing at freed memory.
  42. Arguments:
  43. Arg1: fffff8040001003f, memory referenced.
  44. Arg2: 0000000000000010, value 0 = read operation, 1 = write operation.
  45. Arg3: fffff8040001003f, If non-zero, the instruction address which referenced the bad memory
  46. address.
  47. Arg4: 0000000000000002, (reserved)
  48.  
  49. Debugging Details:
  50. ------------------
  51.  
  52.  
  53. Could not read faulting driver name
  54. *** WARNING: Unable to verify checksum for win32k.sys
  55.  
  56. KEY_VALUES_STRING: 1
  57.  
  58. Key : Analysis.CPU.mSec
  59. Value: 4609
  60.  
  61. Key : Analysis.DebugAnalysisManager
  62. Value: Create
  63.  
  64. Key : Analysis.Elapsed.mSec
  65. Value: 13248
  66.  
  67. Key : Analysis.Init.CPU.mSec
  68. Value: 342
  69.  
  70. Key : Analysis.Init.Elapsed.mSec
  71. Value: 1811
  72.  
  73. Key : Analysis.Memory.CommitPeak.Mb
  74. Value: 85
  75.  
  76. Key : WER.OS.Branch
  77. Value: vb_release
  78.  
  79. Key : WER.OS.Timestamp
  80. Value: 2019-12-06T14:06:00Z
  81.  
  82. Key : WER.OS.Version
  83. Value: 10.0.19041.1
  84.  
  85.  
  86. BUGCHECK_CODE: 50
  87.  
  88. BUGCHECK_P1: fffff8040001003f
  89.  
  90. BUGCHECK_P2: 10
  91.  
  92. BUGCHECK_P3: fffff8040001003f
  93.  
  94. BUGCHECK_P4: 2
  95.  
  96. READ_ADDRESS: fffff8043c4fb390: Unable to get MiVisibleState
  97. Unable to get NonPagedPoolStart
  98. Unable to get NonPagedPoolEnd
  99. Unable to get PagedPoolStart
  100. Unable to get PagedPoolEnd
  101. unable to get nt!MmSpecialPagesInUse
  102. fffff8040001003f
  103.  
  104. MM_INTERNAL_CODE: 2
  105.  
  106. BLACKBOXBSD: 1 (!blackboxbsd)
  107.  
  108.  
  109. BLACKBOXNTFS: 1 (!blackboxntfs)
  110.  
  111.  
  112. BLACKBOXPNP: 1 (!blackboxpnp)
  113.  
  114.  
  115. BLACKBOXWINLOGON: 1
  116.  
  117. CUSTOMER_CRASH_COUNT: 1
  118.  
  119. PROCESS_NAME: System
  120.  
  121. TRAP_FRAME: fffffc0614bd4210 -- (.trap 0xfffffc0614bd4210)
  122. NOTE: The trap frame does not contain all registers.
  123. Some register values may be zeroed or incorrect.
  124. rax=0000000000000000 rbx=0000000000000000 rcx=ffff9006dd33f080
  125. rdx=ffff9006dd0ad480 rsi=0000000000000000 rdi=0000000000000000
  126. rip=fffff8040001003f rsp=fffffc0614bd43a0 rbp=ffff9006dd42e030
  127. r8=ffff9006e133c010 r9=000000000000003e r10=fffff8043bb59910
  128. r11=ffff9006dd33f080 r12=0000000000000000 r13=0000000000000000
  129. r14=0000000000000000 r15=0000000000000000
  130. iopl=0 nv up ei ng nz na po nc
  131. fffff804`0001003f ?? ???
  132. Resetting default scope
  133.  
  134. FAILED_INSTRUCTION_ADDRESS:
  135. +0
  136. fffff804`0001003f ?? ???
  137.  
  138. STACK_TEXT:
  139. fffffc06`14bd3f68 fffff804`3bc1ebbb : 00000000`00000050 fffff804`0001003f 00000000`00000010 fffffc06`14bd4210 : nt!KeBugCheckEx
  140. fffffc06`14bd3f70 fffff804`3ba0c960 : ffff9006`e460def0 00000000`00000010 fffffc06`14bd4290 00000000`00000000 : nt!MiSystemFault+0x1f43ab
  141. fffffc06`14bd4070 fffff804`3bc03c5e : ffff9006`e12b2010 ffff9006`dd4080a0 00000000`00000001 fffff804`00000000 : nt!MmAccessFault+0x400
  142. fffffc06`14bd4210 fffff804`0001003f : fffffc06`14bd5000 fffff804`3bd193ce fffffc06`14bcf000 ffff9006`ed627a00 : nt!KiPageFault+0x35e
  143. fffffc06`14bd43a0 fffffc06`14bd5000 : fffff804`3bd193ce fffffc06`14bcf000 ffff9006`ed627a00 fffff804`41175a20 : 0xfffff804`0001003f
  144. fffffc06`14bd43a8 fffff804`3bd193ce : fffffc06`14bcf000 ffff9006`ed627a00 fffff804`41175a20 00000000`00000000 : 0xfffffc06`14bd5000
  145. fffffc06`14bd43b0 ffff9006`dd42e030 : ffff9006`e460def0 ffff9006`ed6279e0 ffff9006`dd0f4020 fffff804`41175a20 : nt!KiConvertDynamicHeteroPolicy+0x1e
  146. fffffc06`14bd43e0 ffff9006`e460def0 : ffff9006`ed6279e0 ffff9006`dd0f4020 fffff804`41175a20 fffffc06`14bd4510 : 0xffff9006`dd42e030
  147. fffffc06`14bd43e8 ffff9006`ed6279e0 : ffff9006`dd0f4020 fffff804`41175a20 fffffc06`14bd4510 fffff804`3bb5428b : 0xffff9006`e460def0
  148. fffffc06`14bd43f0 ffff9006`dd0f4020 : fffff804`41175a20 fffffc06`14bd4510 fffff804`3bb5428b fffff804`3b028a20 : 0xffff9006`ed6279e0
  149. fffffc06`14bd43f8 fffff804`41175a20 : fffffc06`14bd4510 fffff804`3bb5428b fffff804`3b028a20 00000000`00000000 : 0xffff9006`dd0f4020
  150. fffffc06`14bd4400 fffffc06`14bd4510 : fffff804`3bb5428b fffff804`3b028a20 00000000`00000000 fffff804`41175a20 : Ntfs!NtfsFastIoDispatch
  151. fffffc06`14bd4408 fffff804`3bb5428b : fffff804`3b028a20 00000000`00000000 fffff804`41175a20 fffff804`3b022680 : 0xfffffc06`14bd4510
  152. fffffc06`14bd4410 fffff804`3bb51574 : ffff9006`ea4b8f10 00000000`00006000 00000000`00006000 00000000`00006000 : nt!FsRtlReleaseFileForModWrite+0xef
  153. fffffc06`14bd46f0 fffff804`3bbb2a1b : fffff804`3c450bc0 00000000`00000001 ffff9006`e9609320 00000000`00000000 : nt!MiGatherMappedPages+0x2e8
  154. fffffc06`14bd47b0 fffff804`3bb17e25 : ffff9006`dd33f080 ffff9006`dd33f080 00000000`00000080 000f8067`bcbbbdff : nt!MiMappedPageWriter+0x18b
  155. fffffc06`14bd4c10 fffff804`3bbfd0d8 : ffffce00`cc958180 ffff9006`dd33f080 fffff804`3bb17dd0 00000000`00000000 : nt!PspSystemThreadStartup+0x55
  156. fffffc06`14bd4c60 00000000`00000000 : fffffc06`14bd5000 fffffc06`14bcf000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
  157.  
  158.  
  159. SYMBOL_NAME: nt!MiSystemFault+1f43ab
  160.  
  161. MODULE_NAME: nt
  162.  
  163. IMAGE_VERSION: 10.0.19041.804
  164.  
  165. STACK_COMMAND: .thread ; .cxr ; kb
  166.  
  167. IMAGE_NAME: ntkrnlmp.exe
  168.  
  169. BUCKET_ID_FUNC_OFFSET: 1f43ab
  170.  
  171. FAILURE_BUCKET_ID: AV_INVALID_BAD_IP_nt!MiSystemFault
  172.  
  173. OS_VERSION: 10.0.19041.1
  174.  
  175. BUILDLAB_STR: vb_release
  176.  
  177. OSPLATFORM_TYPE: x64
  178.  
  179. OSNAME: Windows 10
  180.  
  181. FAILURE_ID_HASH: {48ad9531-e3f8-1044-fc5f-d917677674c7}
  182.  
  183. Followup: MachineOwner
  184. ---------
  185.  
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement