Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\hazar\AppData\Local\Temp\7zOC7A42988\020121-10406-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff804`5cc00000 PsLoadedModuleList = 0xfffff804`5d82a2f0
Debug session time: Mon Feb 1 15:25:18.172 2021 (UTC + 3:00)
System Uptime: 0 days 1:59:32.819
Loading Kernel Symbols
...............................................................
................................................................
.............................................................
Loading User Symbols
Loading unloaded module list
......
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff804`5cff5780 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffff58b`34b793e0=000000000000000a
6: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffffffffffffff8, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8045ce66e9a, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3921
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-0H5DIQU
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 17745
Key : Analysis.Memory.CommitPeak.Mb
Value: 83
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: a
BUGCHECK_P1: fffffffffffffff8
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8045ce66e9a
READ_ADDRESS: fffff8045d8fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8045d80f330: Unable to get Flags value from nt!KdVersionBlock
fffff8045d80f330: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
fffffffffffffff8
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: EpicWebHelper.exe
TRAP_FRAME: fffff58b34b79520 -- (.trap 0xfffff58b34b79520)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000009c65 rbx=0000000000000000 rcx=0000000000009896
rdx=ffff8486282621a0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8045ce66e9a rsp=fffff58b34b796b0 rbp=00000010b364b9c6
r8=00000010b3641d61 r9=fffff80458ce47f0 r10=fffff80458ce0ac0
r11=fffff58b34b79700 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac po cy
nt!KiInsertTimerTable+0x21a:
fffff804`5ce66e9a 483b6ef8 cmp rbp,qword ptr [rsi-8] ds:ffffffff`fffffff8=????????????????
Resetting default scope
STACK_TEXT:
fffff58b`34b793d8 fffff804`5d007769 : 00000000`0000000a ffffffff`fffffff8 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff58b`34b793e0 fffff804`5d003a69 : ffff8486`27259080 fffff58b`34b79500 00000000`00000000 fffff804`5cffc506 : nt!KiBugCheckDispatch+0x69
fffff58b`34b79520 fffff804`5ce66e9a : ffff8486`20242000 00000000`00000001 00000000`00000000 00000000`000007ea : nt!KiPageFault+0x469
fffff58b`34b796b0 fffff804`5ce64fed : ffff8486`247d4080 ffff8486`20242000 fffff58b`00000000 00000000`00000000 : nt!KiInsertTimerTable+0x21a
fffff58b`34b79730 fffff804`5ce64623 : ffff8486`000000d9 00000000`00000000 00000000`00000000 ffff8486`247d41c0 : nt!KiCommitThreadWait+0x3bd
fffff58b`34b797d0 fffff804`69b31b97 : ffff8486`20374398 fffff58b`00000006 ffff8486`20242000 00000000`00000000 : nt!KeWaitForSingleObject+0x233
fffff58b`34b798c0 fffff804`69b31627 : 00007ff9`fc349042 00000000`00000020 00000000`000000bc fffff58b`34b79b80 : dxgkrnl!DxgkWaitForVerticalBlankEventInternal+0x547
fffff58b`34b79a90 fffff804`5d0071b8 : ffff8486`247d4080 ffff8486`2534b080 00000000`00000000 ffff8486`00000000 : dxgkrnl!DxgkWaitForVerticalBlankEvent+0xc7
fffff58b`34b79b00 00007ffa`42635cc4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000021`ea6ef708 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`42635cc4
SYMBOL_NAME: dxgkrnl!DxgkWaitForVerticalBlankEventInternal+547
MODULE_NAME: dxgkrnl
IMAGE_NAME: dxgkrnl.sys
IMAGE_VERSION: 10.0.19041.746
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 547
FAILURE_BUCKET_ID: AV_dxgkrnl!DxgkWaitForVerticalBlankEventInternal
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {ca2fc083-b3aa-0cf0-e76f-5e7f09037055}
Followup: MachineOwner
---------
6: kd> lmvm dxgkrnl
Browse full module list
start end module name
fffff804`69a00000 fffff804`69da3000 dxgkrnl # (pdb symbols) C:\ProgramData\Dbg\sym\dxgkrnl.pdb\36668E7AF9553FF10B4ED8E50E156C841\dxgkrnl.pdb
Loaded symbol image file: dxgkrnl.sys
Mapped memory image file: C:\ProgramData\Dbg\sym\dxgkrnl.sys\670B3B6A3a3000\dxgkrnl.sys
Image path: \SystemRoot\System32\drivers\dxgkrnl.sys
Image name: dxgkrnl.sys
Browse all global symbols functions data
Image was built with /Brepro flag.
Timestamp: 670B3B6A (This is a reproducible build file hash, not a timestamp)
CheckSum: 003A21BD
ImageSize: 003A3000
File version: 10.0.19041.746
Product version: 10.0.19041.746
File flags: 0 (Mask 3F)
File OS: 40004 NT Win32
File type: 3.7 Driver
File date: 00000000.00000000
Translations: 0409.04b0
Information from resource tables:
CompanyName: Microsoft Corporation
ProductName: Microsoft® Windows® Operating System
InternalName: dxgkrnl.sys
OriginalFilename: dxgkrnl.sys
ProductVersion: 10.0.19041.746
FileVersion: 10.0.19041.746 (WinBuild.160101.0800)
FileDescription: DirectX Graphics Kernel
LegalCopyright: © Microsoft Corporation. All rights reserved.