Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\hazar\Downloads\020621-4453-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff804`0c600000 PsLoadedModuleList = 0xfffff804`0d22a3b0
Debug session time: Sat Feb 6 12:01:10.958 2021 (UTC + 3:00)
System Uptime: 0 days 0:10:06.811
Loading Kernel Symbols
...............................................................
................................................................
.......................................................
Loading User Symbols
Loading unloaded module list
............
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff804`0c9f5210 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffff9f8b`98a3e710=0000000000000050
4: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffff8ff8f407a508, memory referenced.
Arg2: 0000000000000002, value 0 = read operation, 1 = write operation.
Arg3: fffff80425e5b102, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for nvlddmkm.sys
Could not read faulting driver name
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5046
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on VOSTRO-5468
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 64960
Key : Analysis.Memory.CommitPeak.Mb
Value: 76
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 50
BUGCHECK_P1: ffff8ff8f407a508
BUGCHECK_P2: 2
BUGCHECK_P3: fffff80425e5b102
BUGCHECK_P4: 2
READ_ADDRESS: fffff8040d2fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8040d20f340: Unable to get Flags value from nt!KdVersionBlock
fffff8040d20f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffff8ff8f407a508
MM_INTERNAL_CODE: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: ffff9f8b98a3e9b0 -- (.trap 0xffff9f8b98a3e9b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000009d6fd000 rbx=0000000000000000 rcx=ffff8ff8ce200000
rdx=000000000979e942 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80425e5b102 rsp=ffff9f8b98a3eb48 rbp=ffffb30f9a6a6700
r8=ffffb30f9c6ee0a0 r9=0000000025e7a509 r10=ffffb30f9c6efb30
r11=ffff9f8b98a3eb30 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nvlddmkm+0xbb102:
fffff804`25e5b102 890491 mov dword ptr [rcx+rdx*4],eax ds:ffff8ff8`f407a508=????????
Resetting default scope
STACK_TEXT:
ffff9f8b`98a3e708 fffff804`0ca7a665 : 00000000`00000050 ffff8ff8`f407a508 00000000`00000002 ffff9f8b`98a3e9b0 : nt!KeBugCheckEx
ffff9f8b`98a3e710 fffff804`0c8ea4a0 : 00000000`00000019 00000000`00000002 ffff9f8b`98a3ea30 00000000`00000000 : nt!MiSystemFault+0x172315
ffff9f8b`98a3e810 fffff804`0ca0335e : ffff9f8b`98a3eac8 00000000`00000004 ffff9f8b`98a3ead0 00000000`00000008 : nt!MmAccessFault+0x400
ffff9f8b`98a3e9b0 fffff804`25e5b102 : fffff804`25f0ac69 ffffb30f`9c6ed000 ffffb30f`9a6a6700 00000000`25e7a509 : nt!KiPageFault+0x35e
ffff9f8b`98a3eb48 fffff804`25f0ac69 : ffffb30f`9c6ed000 ffffb30f`9a6a6700 00000000`25e7a509 fffff804`25e74d39 : nvlddmkm+0xbb102
ffff9f8b`98a3eb50 ffffb30f`9c6ed000 : ffffb30f`9a6a6700 00000000`25e7a509 fffff804`25e74d39 ffffb30f`9d6fd000 : nvlddmkm+0x16ac69
ffff9f8b`98a3eb58 ffffb30f`9a6a6700 : 00000000`25e7a509 fffff804`25e74d39 ffffb30f`9d6fd000 fffff804`00000020 : 0xffffb30f`9c6ed000
ffff9f8b`98a3eb60 00000000`25e7a509 : fffff804`25e74d39 ffffb30f`9d6fd000 fffff804`00000020 ffff9f8b`98a3ebc0 : 0xffffb30f`9a6a6700
ffff9f8b`98a3eb68 fffff804`25e74d39 : ffffb30f`9d6fd000 fffff804`00000020 ffff9f8b`98a3ebc0 00000000`00000000 : 0x25e7a509
ffff9f8b`98a3eb70 ffffb30f`9d6fd000 : fffff804`00000020 ffff9f8b`98a3ebc0 00000000`00000000 00000000`00000000 : nvlddmkm+0xd4d39
ffff9f8b`98a3eb78 fffff804`00000020 : ffff9f8b`98a3ebc0 00000000`00000000 00000000`00000000 ffffb30f`9c6ed000 : 0xffffb30f`9d6fd000
ffff9f8b`98a3eb80 ffff9f8b`98a3ebc0 : 00000000`00000000 00000000`00000000 ffffb30f`9c6ed000 00000000`25e7a509 : 0xfffff804`00000020
ffff9f8b`98a3eb88 00000000`00000000 : 00000000`00000000 ffffb30f`9c6ed000 00000000`25e7a509 00000000`9d6fd000 : 0xffff9f8b`98a3ebc0
SYMBOL_NAME: nvlddmkm+bb102
MODULE_NAME: nvlddmkm
IMAGE_NAME: nvlddmkm.sys
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: bb102
FAILURE_BUCKET_ID: AV_INVALID_nvlddmkm!unknown_function
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {df018c6e-47ce-6234-d97b-e5d8699ade66}
Followup: MachineOwner
---------
4: kd> lmvm nvlddmkm
Browse full module list
start end module name
fffff804`25da0000 fffff804`28390000 nvlddmkm T (no symbols)
Loaded symbol image file: nvlddmkm.sys
Image path: \SystemRoot\System32\DriverStore\FileRepository\nvami.inf_amd64_c4c88e9630d3f61b\nvlddmkm.sys
Image name: nvlddmkm.sys
Browse all global symbols functions data
Timestamp: Fri Jan 22 21:52:54 2021 (600B1F06)
CheckSum: 0255AB47
ImageSize: 025F0000
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4
Information from resource tables: