Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\maksu\Downloads\121820-35734-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 18362 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 18362.1.amd64fre.19h1_release.190318-1202
Machine Name:
Kernel base = 0xfffff801`11200000 PsLoadedModuleList = 0xfffff801`11648210
Debug session time: Fri Dec 18 00:47:14.898 2020 (UTC + 3:00)
System Uptime: 0 days 0:14:17.060
Loading Kernel Symbols
...............................................................
................................................................
.......................................................
Loading User Symbols
Loading unloaded module list
.........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff801`113c1220 48894c2408 mov qword ptr [rsp+8],rcx ss:fffffe08`4d3b7230=000000000000001e
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff801156f1624, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2796
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G2EFLS9
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 33063
Key : Analysis.Memory.CommitPeak.Mb
Value: 78
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: 19h1_release
Key : WER.OS.Timestamp
Value: 2019-03-18T12:02:00Z
Key : WER.OS.Version
Value: 10.0.18362.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff801156f1624
BUGCHECK_P3: 0
BUGCHECK_P4: ffffffffffffffff
READ_ADDRESS: fffff801117733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8011162a3c8: Unable to get Flags value from nt!KdVersionBlock
fffff8011162a3c8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffffffffffffff
EXCEPTION_PARAMETER2: ffffffffffffffff
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: MsMpEng.exe
TRAP_FRAME: fffffe084d3b7a78 -- (.trap 0xfffffe084d3b7a78)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8011576ebc0 rsp=0000000000000001 rbp=0000000000000002
r8=0000000000000000 r9=0000000000000000 r10=0000000000000000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=1 vip nv dn di pl nz na po nc
Ntfs+0x8ebc0:
ba96:fffff801`1576ebc0 0000 add byte ptr [rax],al ds:00000000`00000000=??
Resetting default scope
STACK_TEXT:
fffffe08`4d3b7228 fffff801`1142fd3f : 00000000`0000001e ffffffff`c0000005 fffff801`156f1624 00000000`00000000 : nt!KeBugCheckEx
fffffe08`4d3b7230 fffff801`113d321d : ffff42a6`384824c3 fffff801`1127e7f3 fffffe08`4d3b7a78 00000000`00000018 : nt!KiDispatchException+0x16859f
fffffe08`4d3b78e0 fffff801`113cefa2 : 00000000`00000000 fffff801`11248563 ffff848b`c884e028 fffffe08`4d3b7b90 : nt!KiExceptionDispatch+0x11d
fffffe08`4d3b7ac0 fffff801`156f1624 : 00000000`0000028b ffff9502`d3b1c8a3 00000000`00000000 ffff9502`d3b1c840 : nt!KiGeneralProtectionFault+0x322
fffffe08`4d3b7c50 fffff801`156f0585 : fffffe08`4d3b7ff0 ffff9502`daa39788 fffffe08`4d3b7ff8 fffffe08`4d3b7fd0 : Ntfs+0x11624
fffffe08`4d3b7ce0 fffff801`156f020e : ffff848b`c9362c08 ffff9502`d3b1c700 00000000`00000000 00000000`0000028b : Ntfs+0x10585
fffffe08`4d3b7e80 fffff801`156ef9ee : ffff848b`c9362c08 ffff9502`d3b1c700 00000000`0000028b fffffe08`4d3b7ff8 : Ntfs+0x1020e
fffffe08`4d3b7f30 fffff801`156ef0e5 : ffff848b`c9362c08 ffff848b`c8f18ad0 fffffe08`4d3b8150 ffff848b`c8f18ad0 : Ntfs+0xf9ee
fffffe08`4d3b80a0 fffff801`156edf26 : fffffe08`4d3b8150 fffffe08`4d3b8210 ffff848b`c9362c08 00000000`0028b000 : Ntfs+0xf0e5
fffffe08`4d3b8110 fffff801`156f4bc8 : fffffe08`4d3b85b0 00000000`00008000 00000000`00000001 ffff848b`c8f18ad0 : Ntfs+0xdf26
fffffe08`4d3b83c0 fffff801`156f418c : fffffe08`4d3b85c0 ffff848b`c8f18ad0 fffffe08`4d3b85c0 ffff848b`c9362c08 : Ntfs+0x14bc8
fffffe08`4d3b8580 fffff801`11231f39 : ffff848b`c79f2010 ffff848b`c8f18ad0 ffff848b`c8f18eb8 ffffffff`ffffff00 : Ntfs+0x1418c
fffffe08`4d3b8640 fffff801`14ce55d9 : 00000000`00000000 fffffe08`4d3b8720 ffff848b`c8f18ad0 fffffe08`4d3b8730 : nt!IofCallDriver+0x59
fffffe08`4d3b8680 fffff801`14ce3f16 : fffffe08`4d3b8720 fffff801`1127a498 fffffe08`4d3b8801 ffff9502`d3c06488 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x159
fffffe08`4d3b8700 fffff801`11231f39 : ffff848b`c8f18ad0 fffff801`112545fb 00000001`00000000 00000000`00000005 : FLTMGR!FltpDispatch+0xb6
fffffe08`4d3b8760 fffff801`112541e3 : 00000000`00000005 ffff848b`c8f18ad0 ffff848b`bfcae140 ffff848b`bfcae200 : nt!IofCallDriver+0x59
fffffe08`4d3b87a0 fffff801`1128e005 : ffff848b`bfcae0f0 00000000`00000000 ffff848b`bfcae150 ffff848b`bfcae110 : nt!IoPageReadEx+0x1d3
fffffe08`4d3b8810 fffff801`1128d759 : 00000000`00000003 fffffe08`4d3b88f0 fffffe08`4d3b8a58 fffff801`11274ee6 : nt!MiIssueHardFaultIo+0xc1
fffffe08`4d3b8860 fffff801`11272f9b : 00000000`c0033333 00000000`00000001 00007ffb`d2ad16f8 00000000`00000000 : nt!MiIssueHardFault+0x489
fffffe08`4d3b8960 fffff801`113cf320 : ffff848b`c84af080 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x40b
fffffe08`4d3b8b00 00007ffb`e4b1e392 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x360
00000055`6a97a8a0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`e4b1e392
SYMBOL_NAME: Ntfs+11624
IMAGE_NAME: Unknown_Image
IMAGE_VERSION: 10.0.18362.145
STACK_COMMAND: .thread ; .cxr ; kb
MODULE_NAME: Unknown_Module
FAILURE_BUCKET_ID: RAISED_IRQL_USER_FAULT_0x1E_c0000005_R
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {d1e1826c-605d-7a79-a04d-b8220695ad88}
Followup: MachineOwner
---------