Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\maksu\Downloads\Compressed\011021-10421-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff802`77400000 PsLoadedModuleList = 0xfffff802`7802a2b0
Debug session time: Sun Jan 10 22:13:35.296 2021 (UTC + 3:00)
System Uptime: 0 days 19:00:17.939
Loading Kernel Symbols
...............................................................
................................................................
............................................................
Loading User Symbols
Loading unloaded module list
.............
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff802`777f5780 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffa403`9df696c0=000000000000001a
4: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000009696, The subtype of the bugcheck.
Arg2: ffffe680025bad40
Arg3: 0000000000000000
Arg4: 0000000000000000
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 8812
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G2EFLS9
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 38389
Key : Analysis.Memory.CommitPeak.Mb
Value: 83
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1a
BUGCHECK_P1: 9696
BUGCHECK_P2: ffffe680025bad40
BUGCHECK_P3: 0
BUGCHECK_P4: 0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
STACK_TEXT:
ffffa403`9df696b8 fffff802`7774d668 : 00000000`0000001a 00000000`00009696 ffffe680`025bad40 00000000`00000000 : nt!KeBugCheckEx
ffffa403`9df696c0 fffff802`7774f939 : ffff9309`6a3c0018 20000000`002299a9 ffffa403`9df69780 ffff9309`6a3c0008 : nt!MiGetTopLevelPfn+0x148
ffffa403`9df69750 fffff802`7774de25 : fffff802`00000000 ffff9309`6a010028 00000000`002299a9 00000000`00000000 : nt!MiStoreCheckCandidatePage+0x149
ffffa403`9df697b0 fffff802`7774fe8d : ffff9309`6723f260 ffffa403`00000001 ffffe680`002299a9 fffff802`00000000 : nt!MiStoreWriteModifiedPages+0x259
ffffa403`9df698e0 fffff802`777baf59 : ffff9309`6723f260 fffff802`00000100 fffff802`00000100 ffff8080`00000100 : nt!MiGatherPagefilePages+0x455
ffffa403`9df699e0 fffff802`77717e25 : ffff9309`6872e080 ffff9309`6872e080 00000000`00000080 fffff802`777bacc0 : nt!MiModifiedPageWriter+0x299
ffffa403`9df69c10 fffff802`777fcdd8 : ffff8080`260d5180 ffff9309`6872e080 fffff802`77717dd0 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffa403`9df69c60 00000000`00000000 : ffffa403`9df6a000 ffffa403`9df64000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: nt!MiGetTopLevelPfn+148
MODULE_NAME: nt
IMAGE_VERSION: 10.0.19041.685
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 148
FAILURE_BUCKET_ID: 0x1a_9696_nt!MiGetTopLevelPfn
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {d4280011-e8e7-b961-d005-2ab957e4b051}
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\maksu\Downloads\Compressed\010821-10343-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff802`59e00000 PsLoadedModuleList = 0xfffff802`5aa2a2b0
Debug session time: Fri Jan 8 19:31:58.247 2021 (UTC + 3:00)
System Uptime: 2 days 0:05:33.562
Loading Kernel Symbols
...............................................................
................................................................
..........................................................
Loading User Symbols
Loading unloaded module list
........................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff802`5a1f5780 48894c2408 mov qword ptr [rsp+8],rcx ss:ffffc388`339c50f0=000000000000000a
4: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000018, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8025a0ea5b0, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5999
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G2EFLS9
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 10386
Key : Analysis.Memory.CommitPeak.Mb
Value: 76
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: a
BUGCHECK_P1: 18
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff8025a0ea5b0
WRITE_ADDRESS: fffff8025aafa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8025aa0f330: Unable to get Flags value from nt!KdVersionBlock
fffff8025aa0f330: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000018
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: explorer.exe
TRAP_FRAME: ffffc388339c5230 -- (.trap 0xffffc388339c5230)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffffffe00001080
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8025a0ea5b0 rsp=ffffc388339c53c0 rbp=fffff8025aa50b40
r8=0000000fffffffff r9=ffffa48000000000 r10=2aaaaaaaaaaaaaab
r11=0000000000000192 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!MiReplenishPageSlist+0x200:
fffff802`5a0ea5b0 f0480fba6b183f lock bts qword ptr [rbx+18h],3Fh ds:00000000`00000018=????????????????
Resetting default scope
STACK_TEXT:
ffffc388`339c50e8 fffff802`5a207769 : 00000000`0000000a 00000000`00000018 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffffc388`339c50f0 fffff802`5a203a69 : 00000000`00000000 00000000`00002000 00000000`00000000 ffffffff`fa0a1f00 : nt!KiBugCheckDispatch+0x69
ffffc388`339c5230 fffff802`5a0ea5b0 : 00000000`00000000 00000000`00000010 fffff802`5aa50b40 ffffa780`00003840 : nt!KiPageFault+0x469
ffffc388`339c53c0 fffff802`5a0135bc : 00000000`00000000 ffffa780`00003840 00000000`00000000 00000000`00000000 : nt!MiReplenishPageSlist+0x200
ffffc388`339c5510 fffff802`5a0b76aa : fffff802`5aa50b40 ffffc388`00000068 ffffae0f`b7fe6868 ae0fb7fe`00000001 : nt!MiGetPage+0x61c
ffffc388`339c55f0 fffff802`5a015f65 : ffffc388`339c5880 ffff800d`c730de08 ffffa480`03c84570 ffffc388`339c5860 : nt!MiResolveMappedFileFault+0x32a
ffffc388`339c5720 fffff802`5a00e7a5 : ffffc388`339c5880 00000000`00000000 ffffc388`339c5860 ffffc388`339c5a20 : nt!MiResolveProtoPteFault+0x1205
ffffc388`339c5820 fffff802`5a00c6e9 : 00000000`00000100 00000000`00000100 00000000`c0000016 ffff800d`c730de08 : nt!MiDispatchFault+0x3d5
ffffc388`339c5960 fffff802`5a20395e : 00000000`7ffe0385 ffffc388`339c5b80 00000000`00000001 00000000`00000000 : nt!MmAccessFault+0x189
ffffc388`339c5b00 00007ff8`4d995710 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
00000000`110ad058 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`4d995710
SYMBOL_NAME: nt!MiReplenishPageSlist+200
MODULE_NAME: nt
IMAGE_VERSION: 10.0.19041.685
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 200
FAILURE_BUCKET_ID: AV_nt!MiReplenishPageSlist
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e1780c1b-c7ae-f629-f6fa-ba2f8fe42756}
Followup: MachineOwner
---------