Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\maksu\Downloads\123020-5843-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff807`45c00000 PsLoadedModuleList = 0xfffff807`4682a2b0
Debug session time: Wed Dec 30 21:40:31.046 2020 (UTC + 3:00)
System Uptime: 2 days 0:11:02.708
Loading Kernel Symbols
...............................................................
................................................................
................................................................
.....................
Loading User Symbols
Loading unloaded module list
..................................................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff807`45ff5780 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffb205`ebd9f320=000000000000001a
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000006001, The subtype of the bugcheck.
Arg2: ffffffffc000000e
Arg3: 0000015b5dcf0000
Arg4: ffffda8fb9ce8260
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 6187
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G2EFLS9
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 22956
Key : Analysis.Memory.CommitPeak.Mb
Value: 84
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1a
BUGCHECK_P1: 6001
BUGCHECK_P2: ffffffffc000000e
BUGCHECK_P3: 15b5dcf0000
BUGCHECK_P4: ffffda8fb9ce8260
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: MemCompression
STACK_TEXT:
ffffb205`ebd9f318 fffff807`4609aa38 : 00000000`0000001a 00000000`00006001 ffffffff`c000000e 0000015b`5dcf0000 : nt!KeBugCheckEx
ffffb205`ebd9f320 fffff807`45f0a259 : 00000000`00040000 fffff807`45e4a31a ffffda8f`bd14b8d8 00000000`00000000 : nt!MmStoreProbeAndLockPages+0x15521c
ffffb205`ebd9f430 fffff807`45f0933c : 00000000`00040000 ffffb205`ebd9f4a0 ffffb205`ebd9f4a0 ffffda8f`bd14b918 : nt!SmKmProbeAndLockAddress+0x5d
ffffb205`ebd9f460 fffff807`45f09211 : 00000000`00040000 00000000`00000004 0000015b`5dcf0000 00000000`00020000 : nt!SmKmStoreHelperCommandProcess+0xac
ffffb205`ebd9f4d0 fffff807`45f17e25 : ffffda8f`b9738080 00000000`00000080 fffff807`45f091b0 001fa4ef`bd9bbfff : nt!SmKmStoreHelperWorker+0x61
ffffb205`ebd9f550 fffff807`45ffcdd8 : ffff8500`0c05c180 ffffda8f`b9738080 fffff807`45f17dd0 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffb205`ebd9f5a0 00000000`00000000 : ffffb205`ebda0000 ffffb205`ebd99000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: nt!MmStoreProbeAndLockPages+15521c
MODULE_NAME: nt
IMAGE_VERSION: 10.0.19041.685
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 15521c
FAILURE_BUCKET_ID: 0x1a_6001_nt!MmStoreProbeAndLockPages
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {3e15d39b-3f7d-fc20-9139-c8a8ddc08425}
Followup: MachineOwner
---------