Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\maksu\Downloads\Compressed\Yeni klasör\121120-81390-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 17763 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 17763.1.amd64fre.rs5_release.180914-1434
Machine Name:
Kernel base = 0xfffff806`0b617000 PsLoadedModuleList = 0xfffff806`0ba2d6b0
Debug session time: Fri Dec 11 20:02:02.469 2020 (UTC + 3:00)
System Uptime: 5 days 8:23:15.219
Loading Kernel Symbols
...............................................................
................................................................
...........................................................
Loading User Symbols
Loading unloaded module list
..................................................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff806`0b7ce3b0 48894c2408 mov qword ptr [rsp+8],rcx ss:fffffc0f`be357290=0000000000000050
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffbedf6fb04820, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff8060b671840, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 16515
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G2EFLS9
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 63866
Key : Analysis.Memory.CommitPeak.Mb
Value: 74
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: rs5_release
Key : WER.OS.Timestamp
Value: 2018-09-14T14:34:00Z
Key : WER.OS.Version
Value: 10.0.17763.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 50
BUGCHECK_P1: ffffbedf6fb04820
BUGCHECK_P2: 0
BUGCHECK_P3: fffff8060b671840
BUGCHECK_P4: 2
READ_ADDRESS: fffff8060ba14f08: Unable to get Flags value from nt!KdVersionBlock
GetUlongFromAddress: unable to read from fffff8060bad94c0
fffff8060bb54390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8060ba14f08: Unable to get Flags value from nt!KdVersionBlock
ffffbedf6fb04820
MM_INTERNAL_CODE: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXPNP: 1 (!blackboxpnp)
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: fffffc0fbe357570 -- (.trap 0xfffffc0fbe357570)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0a000001d5815863 rbx=0000000000000000 rcx=ffffbedf6fb04820
rdx=ffffbedf6fb7d7f8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8060b671840 rsp=fffffc0fbe357708 rbp=fffff80612f85900
r8=ffffbe8000000000 r9=0000007ffffffff8 r10=0000000000000002
r11=ffffbedf6fb7d000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!MI_READ_PTE_LOCK_FREE:
fffff806`0b671840 488b01 mov rax,qword ptr [rcx] ds:ffffbedf`6fb04820=????????????????
Resetting default scope
STACK_TEXT:
fffffc0f`be357288 fffff806`0b81bd5b : 00000000`00000050 ffffbedf`6fb04820 00000000`00000000 fffffc0f`be357570 : nt!KeBugCheckEx
fffffc0f`be357290 fffff806`0b676d38 : ffffc488`1439a080 ffff8000`00000000 fffffc0f`be3577a0 ffffbedf`6fb04820 : nt!MiSystemFault+0x17baeb
fffffc0f`be3573d0 fffff806`0b7dbec9 : ffffbedf`6fb7d000 00001f80`00000096 ffffbedf`6fb7d7f8 00000000`00000000 : nt!MmAccessFault+0x1d8
fffffc0f`be357570 fffff806`0b671840 : fffff806`0b6e3831 00000000`001aa000 00000000`00000001 00000000`00000104 : nt!KiPageFault+0x349
fffffc0f`be357708 fffff806`0b6e3831 : 00000000`001aa000 00000000`00000001 00000000`00000104 ffffbedf`6fb7d000 : nt!MI_READ_PTE_LOCK_FREE
fffffc0f`be357710 fffff806`0b6e37d3 : 00000000`00000104 fffffc0f`be357818 00000000`00000001 00000000`00000000 : nt!MiGetPhysicalAddress+0x49
fffffc0f`be357760 fffff806`13489688 : 00000000`00000001 00000000`00000000 00000000`00000000 fffffc0f`be357910 : nt!MmGetPhysicalAddress+0x13
fffffc0f`be357790 00000000`00000001 : 00000000`00000000 00000000`00000000 fffffc0f`be357910 fffffc0f`be357aa8 : vgk+0x549688
fffffc0f`be357798 00000000`00000000 : 00000000`00000000 fffffc0f`be357910 fffffc0f`be357aa8 00000000`00000000 : 0x1
SYMBOL_NAME: vgk+549688
MODULE_NAME: vgk
IMAGE_NAME: vgk.sys
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 549688
FAILURE_BUCKET_ID: AV_R_INVALID_vgk!unknown_function
OS_VERSION: 10.0.17763.1
BUILDLAB_STR: rs5_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {b36e8bf9-ceaa-edef-4fc4-24c03e23c347}
Followup: MachineOwner
---------