8: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: 00007fffffff0000, memory referenced.
Arg2: 0000000000000000, X64: bit 0 set if the fault was due to a not-present PTE.
bit 1 is set if the fault was due to a write, clear if a read.
bit 3 is set if the processor decided the fault was due to a corrupted PTE.
bit 4 is set if the fault was due to attempted execute of a no-execute PTE.
- ARM64: bit 1 is set if the fault was due to a write, clear if a read.
bit 3 is set if the fault was due to attempted execute of a no-execute PTE.
Arg3: fffff8073184f8dc, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 000000000000000b, (reserved)
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : AV.Type
Value: Read
Key : Analysis.CPU.mSec
Value: 3421
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 9249
Key : Analysis.IO.Other.Mb
Value: 1
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 1
Key : Analysis.Init.CPU.mSec
Value: 452
Key : Analysis.Init.Elapsed.mSec
Value: 1887
Key : Analysis.Memory.CommitPeak.Mb
Value: 98
Key : Bugcheck.Code.DumpHeader
Value: 0x50
Key : Bugcheck.Code.Register
Value: 0x50
Key : WER.OS.Branch
Value: ni_release
Key : WER.OS.Timestamp
Value: 2022-05-06T12:50:00Z
Key : WER.OS.Version
Value: 10.0.22621.1
FILE_IN_CAB: 061123-16531-01.dmp
BUGCHECK_CODE: 50
BUGCHECK_P1: 7fffffff0000
BUGCHECK_P2: 0
BUGCHECK_P3: fffff8073184f8dc
BUGCHECK_P4: b
READ_ADDRESS: fffff8073231c468: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
00007fffffff0000
MM_INTERNAL_CODE: b
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: steamwebhelper.exe
TRAP_FRAME: ffffe180f8ea1f10 -- (.trap 0xffffe180f8ea1f10)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00007fffffff0000 rbx=0000000000000000 rcx=00007fffffff0000
rdx=ffffe180f8ea2258 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8073184f8dc rsp=ffffe180f8ea20a0 rbp=ffffe180f8ea26c0
r8=0000000000000000 r9=0000000000000000 r10=ffffe180f8ea21c0
r11=ffffe04072800000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
nt!RtlpxVirtualUnwind+0x48c:
fffff807`3184f8dc 0fb600 movzx eax,byte ptr [rax] ds:00007fff`ffff0000=??
Resetting default scope
STACK_TEXT:
ffffe180`f8ea1d98 fffff807`31adbe3d : 00000000`00000050 00007fff`ffff0000 00000000`00000000 ffffe180`f8ea1f10 : nt!KeBugCheckEx
ffffe180`f8ea1da0 fffff807`3183794f : 00300031`00300041 00000000`00000000 ffffe180`f8ea1ea9 00000000`00000000 : nt!MiRaisedIrqlFault+0x1a0eed
ffffe180`f8ea1df0 fffff807`31a3cd29 : 00000000`00000000 fffff807`316bc398 ffffe180`f8ea21c0 ffffac83`a786f2f8 : nt!MmAccessFault+0x3af
ffffe180`f8ea1f10 fffff807`3184f8dc : fffff807`31600000 fffff807`31838506 ffffac83`a7d64840 fffff807`3165b688 : nt!KiPageFault+0x369
ffffe180`f8ea20a0 fffff807`3184d925 : ffffac83`a7d64840 ffffac83`a7d64608 00000000`00000000 00000000`00000000 : nt!RtlpxVirtualUnwind+0x48c
ffffe180`f8ea2160 fffff807`318cf15e : ffffffff`ffffffff ffffac83`a7d646b0 ffffac83`a7d646b0 ffffe180`f8ea2900 : nt!RtlDispatchException+0x215
ffffe180`f8ea28d0 fffff807`31a2d2b2 : 00000000`00000002 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x1ae
ffffe180`f8ea2fb0 fffff807`31a2d280 : fffff807`31a418f5 ffff9c8a`d70e7800 fffff325`4c049b58 ffffd180`09267600 : nt!KxExceptionDispatchOnExceptionStack+0x12
ffffac83`a7d644c8 fffff807`31a418f5 : ffff9c8a`d70e7800 fffff325`4c049b58 ffffd180`09267600 00000000`00000000 : nt!KiExceptionDispatchOnExceptionStackContinue
ffffac83`a7d644d0 fffff807`31a3ce0e : 00000000`00000000 00000000`00000000 00000000`00000000 ffff9c8a`d6fca320 : nt!KiExceptionDispatch+0x135
ffffac83`a7d646b0 fffff807`31838506 : 00000000`00000000 00000000`00000000 00000000`00000001 00000000`00000000 : nt!KiPageFault+0x44e
ffffac83`a7d64840 00000000`00000000 : 00000000`00000000 ffffac83`a7d64a00 ffff9c8a`d70e7180 fffff807`31838447 : nt!MiResolvePageTablePage+0x106
SYMBOL_NAME: nt!RtlpxVirtualUnwind+48c
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.22621.1778
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 48c
FAILURE_BUCKET_ID: AV_R_(null)_nt!RtlpxVirtualUnwind
OS_VERSION: 10.0.22621.1
BUILDLAB_STR: ni_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {955b8b2f-25e7-b167-acd3-0cfdca67a101}
Followup: MachineOwner
--------
9: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c000001d, Exception code that caused the BugCheck
Arg2: fffff8033e03b521, Address of the instruction which caused the BugCheck
Arg3: ffffd680fbd32900, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3921
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 8920
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 374
Key : Analysis.Init.Elapsed.mSec
Value: 3864
Key : Analysis.Memory.CommitPeak.Mb
Value: 99
Key : Bugcheck.Code.DumpHeader
Value: 0x3b
Key : Bugcheck.Code.Register
Value: 0x3b
Key : WER.OS.Branch
Value: ni_release
Key : WER.OS.Timestamp
Value: 2022-05-06T12:50:00Z
Key : WER.OS.Version
Value: 10.0.22621.1
FILE_IN_CAB: 061123-18468-01.dmp
BUGCHECK_CODE: 3b
BUGCHECK_P1: c000001d
BUGCHECK_P2: fffff8033e03b521
BUGCHECK_P3: ffffd680fbd32900
BUGCHECK_P4: 0
CONTEXT: ffffd680fbd32900 -- (.cxr 0xffffd680fbd32900)
rax=00000000000000ae rbx=ffffc582ef4af080 rcx=0000000000008aae
rdx=ffffc582f18a0158 rsi=ffffd680fbd11180 rdi=0000000000000002
rip=fffff8033e03b521 rsp=ffff8b80321095f0 rbp=0000000000000001
r8=0000000000000002 r9=0000000000000000 r10=0000000000000001
r11=ffffc582ef4af1c0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=ffffc582ef4af180
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246
nt!KiCommitThreadWait+0x141:
fffff803`3e03b521 c4 ???
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: Discord.exe
MISALIGNED_IP:
nt!KiCommitThreadWait+141
fffff803`3e03b521 c4 ???
STACK_TEXT:
ffff8b80`321095f0 fffff803`3e03a896 : 00000000`00000000 00000000`00000001 00000000`000000ae 00000002`2abbf769 : nt!KiCommitThreadWait+0x141
ffff8b80`321096a0 fffff803`3e5797ac : ffffc582`f33f8080 ffffc582`ef05c0e0 00000000`00000000 00000000`00000001 : nt!KeWaitForSingleObject+0x256
ffff8b80`32109a40 fffff803`3e57969e : ffffc582`ef4af080 00000000`19d55020 00000000`00000000 00000000`1a15fb04 : nt!ObWaitForSingleObject+0xcc
ffff8b80`32109aa0 fffff803`3e240ee8 : 00000000`00000000 ffffd680`fc7493c0 ffff8b80`32109af8 ffffffff`ff676980 : nt!NtWaitForSingleObject+0x3e
ffff8b80`32109ae0 00000000`77051cf3 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`1a05edf8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77051cf3
SYMBOL_NAME: nt!KiCommitThreadWait+141
IMAGE_VERSION: 10.0.22621.1778
STACK_COMMAND: .cxr 0xffffd680fbd32900 ; kb
MODULE_NAME: AuthenticAMD
IMAGE_NAME: AuthenticAMD.sys
FAILURE_BUCKET_ID: IP_MISALIGNED_AuthenticAMD.sys
OS_VERSION: 10.0.22621.1
BUILDLAB_STR: ni_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {716d112a-8330-4bbb-160c-ec98297019d2}
Followup: MachineOwner
---------