Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\LENOVO\Desktop\drive-download-20201123T195533Z-001\112220-11671-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 18362 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 18362.1.amd64fre.19h1_release.190318-1202
Machine Name:
Kernel base = 0xfffff802`81800000 PsLoadedModuleList = 0xfffff802`81c461b0
Debug session time: Sun Nov 22 05:27:47.009 2020 (UTC + 3:00)
System Uptime: 1 days 8:38:30.649
Loading Kernel Symbols
...............................................................
................................................................
...........................................................
Loading User Symbols
Loading unloaded module list
...............................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff802`819c2ce0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffff810d`0d48b640=000000000000000a
8: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 0000000000000075, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff802818297b1, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 6640
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-45K2SRP
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 38238
Key : Analysis.Memory.CommitPeak.Mb
Value: 75
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: 19h1_release
Key : WER.OS.Timestamp
Value: 2019-03-18T12:02:00Z
Key : WER.OS.Version
Value: 10.0.18362.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: a
BUGCHECK_P1: 0
BUGCHECK_P2: ff
BUGCHECK_P3: 75
BUGCHECK_P4: fffff802818297b1
WRITE_ADDRESS: fffff80281d713b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80281c283b8: Unable to get Flags value from nt!KdVersionBlock
fffff80281c283b8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000000
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: ffff810d0d48b780 -- (.trap 0xffff810d0d48b780)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000011199ce26c6 rbx=0000000000000000 rcx=0000000000000001
rdx=0000000000000017 rsi=0000000000000000 rdi=0000000000000000
rip=fffff802818297b1 rsp=ffff810d0d48b910 rbp=ffff810d0d48ba10
r8=8000000000000000 r9=ffff810d0d48bb60 r10=0000011199f251d5
r11=ffff927b81a00000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di pl zr na po nc
nt!PpmIdlePrepare+0x161:
fffff802`818297b1 488903 mov qword ptr [rbx],rax ds:00000000`00000000=????????????????
Resetting default scope
STACK_TEXT:
ffff810d`0d48b638 fffff802`819d4b29 : 00000000`0000000a 00000000`00000000 00000000`000000ff 00000000`00000075 : nt!KeBugCheckEx
ffff810d`0d48b640 fffff802`819d0e69 : 00000000`00000000 00000000`00000000 ffffb886`971e6780 fffff802`81aefc0b : nt!KiBugCheckDispatch+0x69
ffff810d`0d48b780 fffff802`818297b1 : 00000000`0df3e712 00000000`00989680 ffffb886`9b2df010 00000111`99f251bd : nt!KiPageFault+0x469
ffff810d`0d48b910 fffff802`818286a6 : 00000000`00000000 652c21e1`3cf80000 00000000`00000001 00000000`00000000 : nt!PpmIdlePrepare+0x161
ffff810d`0d48bb00 fffff802`819c67d4 : ffffffff`00000000 ffffa281`66e80180 ffffb886`9fc3b080 00000000`00000798 : nt!PoIdle+0x1e6
ffff810d`0d48bc60 00000000`00000000 : ffff810d`0d48c000 ffff810d`0d486000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x44
SYMBOL_NAME: nt!PpmIdlePrepare+161
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.18362.1139
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 161
FAILURE_BUCKET_ID: AV_nt!PpmIdlePrepare
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {dd7d0096-4602-c4e5-a984-978d6ab3aa71}
Followup: MachineOwner
---------