Loading Dump File [C:\Users\Ahmet\Desktop\Ahmet\Minidumplar\23MAYIS-02.10.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Machine Name:
Kernel base = 0xfffff807`60600000 PsLoadedModuleList = 0xfffff807`6122a1b0
Debug session time: Sun May 23 02:09:21.144 2021 (UTC + 3:00)
System Uptime: 0 days 4:42:04.177
Loading Kernel Symbols
..
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
.............................................................
................................................................
................................................................
................
Loading User Symbols
Loading unloaded module list
........................................
For analysis of this file, run !analyze -v
6: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffac04f23cd1f0, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff80760a09bcf, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 7
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on AHMET
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 8
Key : Analysis.Memory.CommitPeak.Mb
Value: 72
Key : Analysis.System
Value: CreateObject
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
BUGCHECK_CODE: 50
BUGCHECK_P1: ffffac04f23cd1f0
BUGCHECK_P2: 0
BUGCHECK_P3: fffff80760a09bcf
BUGCHECK_P4: 2
READ_ADDRESS: fffff807612fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8076120f378: Unable to get Flags value from nt!KdVersionBlock
fffff8076120f378: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffac04f23cd1f0
MM_INTERNAL_CODE: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
PROCESS_NAME: System
TRAP_FRAME: fffffc8040d06d80 -- (.trap 0xfffffc8040d06d80)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffac04b9871750 rbx=0000000000000000 rcx=ffffac04b9871750
rdx=ffffac04f23cd1f0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80760a09bcf rsp=fffffc8040d06f18 rbp=fffffc8040d070f0
r8=000000000000000e r9=fffff80760600000 r10=000000000000003d
r11=000000000000000d r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe cy
nt!memcpy+0xf:
fffff807`60a09bcf 4c8b1a mov r11,qword ptr [rdx] ds:ffffac04`f23cd1f0=????????????????
Resetting default scope
STACK_TEXT:
fffffc80`40d06ad8 fffff807`60a8de7d : 00000000`00000050 ffffac04`f23cd1f0 00000000`00000000 fffffc80`40d06d80 : nt!KeBugCheckEx
fffffc80`40d06ae0 fffff807`60928210 : 00000000`00000001 00000000`00000000 fffffc80`40d06e00 00000000`00000000 : nt!MiSystemFault+0x147dbd
fffffc80`40d06be0 fffff807`60a04e5e : 00000000`00000000 00000000`00000000 ffffc187`337bedec 00000000`ffffffff : nt!MmAccessFault+0x400
fffffc80`40d06d80 fffff807`60a09bcf : fffff807`60cf7f77 00000000`00000000 00000000`000000ca fffffc80`6d4e624f : nt!KiPageFault+0x35e
fffffc80`40d06f18 fffff807`60cf7f77 : 00000000`00000000 00000000`000000ca fffffc80`6d4e624f fffff807`60cd5700 : nt!memcpy+0xf
fffffc80`40d06f20 fffff807`60a086b5 : 00000000`00000000 ffffac04`bdff8160 00000000`000000ca ffffac04`ae0fe501 : nt!NtQueryDirectoryObject+0x1c7
fffffc80`40d07000 fffff807`609fab50 : fffff807`60cd53c7 00000000`00000001 fffffc80`40d07289 fffff807`60dc68a0 : nt!KiSystemServiceCopyEnd+0x25
fffffc80`40d07208 fffff807`60cd53c7 : 00000000`00000001 fffffc80`40d07289 fffff807`60dc68a0 ffffac04`bdff81a0 : nt!KiServiceLinkage
fffffc80`40d07210 fffff807`60c5017f : fffffc80`40d073a0 00000000`00000060 00000000`00000083 ffffffff`80003df8 : nt!IopGetLegacyVetoListDrivers+0x10b
fffffc80`40d072f0 fffff807`60c4ff52 : 00000000`00000000 fffffc80`40d07410 00000000`00000000 fffff807`61223a00 : nt!IoGetLegacyVetoList+0x57
fffffc80`40d07350 fffff807`60c51003 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!PopFilterCapabilities+0x56
fffffc80`40d07390 fffff807`608f32c4 : 00000000`00000003 00000000`00000000 ffffffff`ffffffff fffff807`61223a00 : nt!PopPolicySystemIdle+0x93
fffffc80`40d07470 fffff807`60941225 : ffffc187`00000003 ffffc187`45070580 fffff807`608f3230 fffff807`00000000 : nt!PopPolicyWorkerThread+0x94
fffffc80`40d074b0 fffff807`608f53b5 : ffffc187`45070580 00000000`00000080 ffffc187`33776180 19b21003`b059f41b : nt!ExpWorkerThread+0x105
fffffc80`40d07550 fffff807`609fe348 : ffffd481`b7640180 ffffc187`45070580 fffff807`608f5360 0201b259`3e100fb1 : nt!PspSystemThreadStartup+0x55
fffffc80`40d075a0 00000000`00000000 : fffffc80`40d08000 fffffc80`40d01000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: nt!MiSystemFault+147dbd
MODULE_NAME: nt
IMAGE_VERSION: 10.0.19041.985
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: memory_corruption
BUCKET_ID_FUNC_OFFSET: 147dbd
FAILURE_BUCKET_ID: AV_R_INVALID_nt!MiSystemFault
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {624e8a06-dc22-13e9-d8b0-4e137ca36c13}
Followup: MachineOwner
---------