Microsoft (R) Windows Debugger Version 10.0.25200.1003 AMD64.
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Arda\Desktop\010623-7875-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available.
************* Path validation summary **************
Response Time (ms) Location.
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64.
Product: WinNt, suite: TerminalServer SingleUserTS Personal.
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff805`47a00000 PsLoadedModuleList = 0xfffff805`4862a290
Debug session time: Fri Jan 6 09:42:39.075 2023 (UTC + 3:00)
System Uptime: 2 days 13:03:35.875
Loading Kernel Symbols.
...............................................................
................................................................
............................................................
Loading User Symbols.
Loading unloaded module list.
...........................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff805`47df92a0 48894c2408 mov qword ptr [rsp+8],rcx ss:ffffef83`e516b960=000000000000001a
4: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000061941, The subtype of the BugCheck.
Arg2: 00007ff8a05c2000.
Arg3: 000000000000001d.
Arg4: ffffef83e516bb00.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4202.
Key : Analysis.DebugAnalysisManager
Value: Create.
Key : Analysis.Elapsed.mSec
Value: 13714.
Key : Analysis.IO.Other.Mb
Value: 2
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 3
Key : Analysis.Init.CPU.mSec
Value: 546.
Key : Analysis.Init.Elapsed.mSec
Value: 4230.
Key : Analysis.Memory.CommitPeak.Mb
Value: 92.
Key : Bugcheck.Code.DumpHeader
Value: 0x1a.
Key : Bugcheck.Code.Register
Value: 0x1a.
Key : WER.OS.Branch
Value: vb_release.
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 010623-7875-01.dmp
BUGCHECK_CODE: 1a.
BUGCHECK_P1: 61941.
BUGCHECK_P2: 7ff8a05c2000.
BUGCHECK_P3: 1d.
BUGCHECK_P4: ffffef83e516bb00.
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: sihost.exe
STACK_TEXT:
ffffef83`e516b958 fffff805`47e2e296 : 00000000`0000001a 00000000`00061941 00007ff8`a05c2000 00000000`0000001d : nt!KeBugCheckEx
ffffef83`e516b960 fffff805`47e08dd8 : ffff9c0c`e517a2c0 000002a6`8a9b0150 ffffef83`e516bb80 ffff9c0c`e51729b0 : nt!MmAccessFault+0x1f4c56
ffffef83`e516bb00 00007ff8`a05c1ffe : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x358
000000d1`932ec7e0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`a05c1ffe
MODULE_NAME: hardware.
IMAGE_NAME: hardware_ram.
STACK_COMMAND: .cxr; .ecxr ; kb.
FAILURE_BUCKET_ID: 0x1a_61941_PAGE_TABLE_RESERVED_BITS_SET_IMAGE_hardware_ram
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release.
OSPLATFORM_TYPE: x64.
OSNAME: Windows 10.
FAILURE_ID_HASH: {c6e5c6cf-692e-7852-5dc5-b74944540fc0}
Followup: MachineOwner.
---------