Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\gahra\Downloads\090920-7156-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff803`41800000 PsLoadedModuleList = 0xfffff803`4242a2f0
Debug session time: Wed Sep 9 00:31:37.083 2020 (UTC + 2:00)
System Uptime: 0 days 0:09:17.743
Loading Kernel Symbols
...............................................................
................................................................
................................................................
...............
Loading User Symbols
Loading unloaded module list
...........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff803`41bddf40 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffea0a`afb09060=0000000000000050
5: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: fffff803419bcb34, memory referenced.
Arg2: 0000000000000011, value 0 = read operation, 1 = write operation.
Arg3: fffff803419bcb34, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 8296
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-8S1E2KF
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 54703
Key : Analysis.Memory.CommitPeak.Mb
Value: 80
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 50
BUGCHECK_P1: fffff803419bcb34
BUGCHECK_P2: 11
BUGCHECK_P3: fffff803419bcb34
BUGCHECK_P4: 2
WRITE_ADDRESS: fffff803424fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8034240f2f0: Unable to get Flags value from nt!KdVersionBlock
fffff8034240f2f0: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
fffff803419bcb34
MM_INTERNAL_CODE: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: avp.exe
TRAP_FRAME: ffffea0aafb09300 -- (.trap 0xffffea0aafb09300)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffb00a3af58000 rbx=0000000000000000 rcx=0000000000000000
rdx=ffffb00a355de080 rsi=0000000000000000 rdi=0000000000000000
rip=fffff803419bcb34 rsp=ffffea0aafb09490 rbp=ffffea0aafb09519
r8=0000000000000001 r9=fffff80341a3d700 r10=fffff80341a3c6a0
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!_guard_fids_table <PERF> (nt+0x1bcb34):
fffff803`419bcb34 0100 add dword ptr [rax],eax ds:ffffb00a`3af58000=02d00000
Resetting default scope
STACK_TEXT:
ffffea0a`afb09058 fffff803`41c35de9 : 00000000`00000050 fffff803`419bcb34 00000000`00000011 ffffea0a`afb09300 : nt!KeBugCheckEx
ffffea0a`afb09060 fffff803`41a12d00 : 00000000`00000000 00000000`00000011 ffffea0a`afb09380 00000000`00000000 : nt!MiSystemFault+0x1ae0e9
ffffea0a`afb09160 fffff803`41bec01e : ffffea0a`afb09500 ffffb00a`355de080 ffffea0a`afb09350 00000000`00000000 : nt!MmAccessFault+0x400
ffffea0a`afb09300 fffff803`419bcb34 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
ffffea0a`afb09490 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!_guard_fids_table <PERF> (nt+0x1bcb34)
SYMBOL_NAME: nt!_guard_fids_table <PERF> (nt+0x1bcb34)+0
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.450
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 0
FAILURE_BUCKET_ID: AV_INVALID_nt!_guard_fids_table__PERF__(nt+0x1bcb34)
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {ceea394d-2b75-8b0a-7e2b-a74eee885a16}
Followup: MachineOwner
---------