************* Preparing the environment for Debugger Extensions Gallery repositories **************
ExtensionRepository : Implicit
UseExperimentalFeatureForNugetShare : true
AllowNugetExeUpdate : true
NonInteractiveNuget : true
AllowNugetMSCredentialProviderInstall : true
AllowParallelInitializationOfLocalRepositories : true
EnableRedirectToV8JsProvider : false
-- Configuring repositories
----> Repository : LocalInstalled, Enabled: true
----> Repository : UserExtensions, Enabled: true
Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.015 seconds
************* Waiting for Debugger Extensions Gallery to Initialize **************
Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.016 seconds
----> Repository : UserExtensions, Enabled: true, Packages count: 0
----> Repository : LocalInstalled, Enabled: true, Packages count: 29
Microsoft (R) Windows Debugger Version 10.0.26100.1 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\090824-9546-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (32 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Kernel base = 0xfffff8043f400000 PsLoadedModuleList = 0xfffff804
4002a770
Debug session time: Sun Sep 8 17:54:31.906 2024 (UTC + 8:00)
System Uptime: 0 days 0:15:59.576
Loading Kernel Symbols
...............................................................
................................................................
................................................................
..
Loading User Symbols
PEB is paged out (Peb.Ldr = 00000076`6aeac018). Type ".hh dbgerr001" for details
Loading unloaded module list
.......
For analysis of this file, run !analyze -v
3: kd> !analyze -v
ATTEMPTED_WRITE_TO_READONLY_MEMORY (be)
An attempt was made to write to readonly memory. The guilty driver is on the
stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the BugCheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: fffff804422af000, Virtual address for the attempted write.
Arg2: 090000000361a121, PTE contents.
Arg3: ffffd806f218e1f0, (reserved)
Arg4: 000000000000000b, (reserved)
Debugging Details:
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1671
Key : Analysis.Elapsed.mSec
Value: 1683
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 1077
Key : Analysis.Init.Elapsed.mSec
Value: 17547
Key : Analysis.Memory.CommitPeak.Mb
Value: 95
Key : Bugcheck.Code.LegacyAPI
Value: 0xbe
Key : Failure.Bucket
Value: AV_nt!MiSystemFault
Key : Failure.Hash
Value: {d80c40a2-5000-439f-696b-1bd8abb14be3}
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: be
BUGCHECK_P1: fffff804422af000
BUGCHECK_P2: 90000000361a121
BUGCHECK_P3: ffffd806f218e1f0
BUGCHECK_P4: b
FILE_IN_CAB: 090824-9546-01.dmp
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: cs2.exe
TRAP_FRAME: ffffd806f218e1f0 -- (.trap 0xffffd806f218e1f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000030 rbx=0000000000000000 rcx=0000000000000030
rdx=0000000000000090 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8043f84da49 rsp=ffffd806f218e380 rbp=00000000000001a2
r8=0000000000000060 r9=0000000000000000 r10=fffff804422af000
r11=fffff80440200490 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!RtlpxLookupFunctionTable+0x1a0409:
fffff8043f84da49 4b110c0a adc qword ptr [r10+r9],rcx ds:fffff804
422af000=000000a000000880
Resetting default scope
STACK_TEXT:
ffffd806f218df48 fffff804
3f83bcb3 : 00000000000000be fffff804
422af000 090000000361a121 ffffd806
f218e1f0 : nt!KeBugCheckEx
ffffd806f218df50 fffff804
3f624660 : ffffd806f218e550 00000000
00000003 ffffd806f218e270 00000000
00000000 : nt!MiSystemFault+0x1d8753
ffffd806f218e050 fffff804
3f80d458 : ffffb60500000000 00000000
00000000 0000000000000000 ffffd98f
01231a90 : nt!MmAccessFault+0x400
ffffd806f218e1f0 fffff804
3f84da49 : ffffd80600000080 00000000
00000000 ffffd806f218e568 fffff804
3fd86090 : nt!KiPageFault+0x358
ffffd806f218e380 fffff804
3f6acbae : fffff804423f04b1 00000000
00000000 ffffd80600000001 00007fff
00000000 : nt!RtlpxLookupFunctionTable+0x1a0409
ffffd806f218e3e0 fffff804
3f6ac02e : 0000000000000000 ffffd806
f218ea98 ffffd806f218ebf0 fffff804
3f4d0110 : nt!RtlpLookupFunctionEntryForStackWalks+0x1be
ffffd806f218e460 fffff804
3f6abcac : 0000000000000003 00000000
0000000d 0000000000000000 00000000
00000000 : nt!RtlpWalkFrameChain+0x34e
ffffd806f218eb70 fffff804
3f6abb42 : 0000000000000002 fffff804
42481050 0000000000000000 ffffd806
f2189000 : nt!RtlWalkFrameChain+0x11c
ffffd806f218ebc0 fffff804
423f04b1 : 000000000000000a 00000000
0000113d 0000000000000001 00000000
00000000 : nt!RtlCaptureStackBackTrace+0x42
ffffd806f218ebf0 fffff804
424d0fa6 : 0000000000000001 00000000
c0000034 0000000000000008 ffffd806
f218f040 : Ntfs!NtfsStatusTraceAndDebugInternal+0x161
ffffd806f218ec50 fffff804
424cbe6b : ffffd98efb792010 ffffd806
f218f040 ffffd98efb792010 00000000
00000000 : Ntfs!NtfsCommonCreate+0xb66
ffffd806f218ef30 fffff804
3f635cf5 : ffffd98eea397030 ffffd98e
fb792010 ffffd806f218f200 ffffd98f
00a34cd0 : Ntfs!NtfsFsdCreate+0x1db
ffffd806f218f1b0 fffff804
3c3b710f : ffffd98f00a34d00 ffffd806
f218f2a0 ffffd806f218f2a9 fffff804
3c3b5f7a : nt!IofCallDriver+0x55
ffffd806f218f1f0 fffff804
3c3e9f54 : ffffd806f218f2a0 ffffd98f
00a34d28 ffffd98eea230d80 00000000
00000000 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x28f
ffffd806f218f260 fffff804
3f635cf5 : ffffd98f00a34c00 ffffd98e
ea335930 0000000000000000 00000000
00000000 : FLTMGR!FltpCreate+0x324
ffffd806f218f310 fffff804
3f64cac4 : 0000000000000000 ffffd98e
fb792010 ffffd98eea0fa990 ffffd98e
ea230d80 : nt!IofCallDriver+0x55
ffffd806f218f350 fffff804
3fa55e0b : ffffd806f218f610 ffffd98e
ea335930 ffffd98f00a34d68 ffffd806
00000001 : nt!IoCallDriverWithTracing+0x34
ffffd806f218f3a0 fffff804
3fa4a4c7 : ffffd98eea335930 ffffd98e
ea335900 ffffd98f01231a70 ffffb605
35a3d301 : nt!IopParseDevice+0x11bb
ffffd806f218f510 fffff804
3fa52c6a : ffffd98f01231a01 ffffd806
f218f778 0000000000000840 ffffd98e
dd3de6c0 : nt!ObpLookupObjectName+0x1117
ffffd806f218f6e0 fffff804
3faeb9b5 : ffffd80600000000 00000076
6adda998 000000766addabd0 00000076
6adda968 : nt!ObOpenObjectByNameEx+0x1fa
ffffd806f218f810 fffff804
3f811238 : ffffd98f01546000 00000000
00000005 ffffd98f015460c0 00000000
00000000 : nt!NtQueryAttributesFile+0x1c5
ffffd806f218fac0 00007fff
0c6ed784 : 0000000000000000 00000000
00000000 0000000000000000 00000000
00000000 : nt!KiSystemServiceCopyEnd+0x28
000000766adda908 00000000
00000000 : 0000000000000000 00000000
00000000 0000000000000000 00000000
00000000 : 0x00007fff`0c6ed784
SYMBOL_NAME: nt!MiSystemFault+1d8753
MODULE_NAME: nt
IMAGE_VERSION: 10.0.19041.3803
STACK_COMMAND: .cxr; .ecxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 1d8753
FAILURE_BUCKET_ID: AV_nt!MiSystemFault
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {d80c40a2-5000-439f-696b-1bd8abb14be3}
Followup: MachineOwner