Microsoft (R) Windows Debugger Version 10.0.25136.1001 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Windows\Minidump\062522-7250-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available ************* Path validation summary ************** Response Time (ms) Location Deferred srv* Symbol search path is: srv* Executable search path is: Windows 10 Kernel Version 22000 MP (12 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Personal Edition build lab: 22000.1.amd64fre.co_release.210604-1628 Machine Name: Kernel base = 0xfffff807`51800000 PsLoadedModuleList = 0xfffff807`52429690 Debug session time: Sat Jun 25 09:57:18.530 2022 (UTC + 3:00) System Uptime: 0 days 0:00:15.151 Loading Kernel Symbols ............................................................... ................................................................ ............................................ Loading User Symbols Loading unloaded module list ....... For analysis of this file, run !analyze -v nt!KeBugCheckEx: fffff807`51c17850 48894c2408 mov qword ptr [rsp+8],rcx ss:ffffab02`87e97490=000000000000000a 3: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: 00007ffbc0f33d88, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000000, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: fffff80751ab8916, address which referenced memory Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 1858 Key : Analysis.DebugAnalysisManager Value: Create Key : Analysis.Elapsed.mSec Value: 6084 Key : Analysis.Init.CPU.mSec Value: 296 Key : Analysis.Init.Elapsed.mSec Value: 346601 Key : Analysis.Memory.CommitPeak.Mb Value: 89 Key : Bugcheck.Code.DumpHeader Value: 0xa Key : Bugcheck.Code.Register Value: 0xa Key : WER.OS.Branch Value: co_release Key : WER.OS.Timestamp Value: 2021-06-04T16:28:00Z Key : WER.OS.Version Value: 10.0.22000.1 FILE_IN_CAB: 062522-7250-01.dmp BUGCHECK_CODE: a BUGCHECK_P1: 7ffbc0f33d88 BUGCHECK_P2: 2 BUGCHECK_P3: 0 BUGCHECK_P4: fffff80751ab8916 READ_ADDRESS: fffff80752505450: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd unable to get nt!MmSpecialPagesInUse 00007ffbc0f33d88 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: MsMpEng.exe TRAP_FRAME: ffffab0287e975d0 -- (.trap 0xffffab0287e975d0) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000002 rdx=0000000000000040 rsi=0000000000000000 rdi=0000000000000000 rip=fffff80751ab8916 rsp=ffffab0287e97760 rbp=0000000000000000 r8=ffff9a8e765e1d80 r9=0000000000000000 r10=00000007ffbc0020 r11=00000007ffbc0f33 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl zr na po nc nt!MiCheckVadSequential+0x76: fffff807`51ab8916 8b4730 mov eax,dword ptr [rdi+30h] ds:00000000`00000030=???????? Resetting default scope STACK_TEXT: ffffab02`87e97488 fffff807`51c2a4a9 : 00000000`0000000a 00007ffb`c0f33d88 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx ffffab02`87e97490 fffff807`51c26600 : 00000000`00000001 ffffab02`87e97760 fffff807`52454e00 00000000`00000000 : nt!KiBugCheckDispatch+0x69 ffffab02`87e975d0 fffff807`51ab8916 : 00000000`00000040 ffffab02`87e97860 00000208`ea84238e 00000000`00000000 : nt!KiPageFault+0x440 ffffab02`87e97760 fffff807`51a7c731 : 00000000`00000000 ffffc381`00000000 00000000`00000002 ffffab02`87e97859 : nt!MiCheckVadSequential+0x76 ffffab02`87e977d0 fffff807`51a79be1 : 00000000`00000000 ffffab02`87e97940 ffffab02`87e97948 ffffab02`87e97950 : nt!MiZeroFault+0x391 ffffab02`87e978c0 fffff807`51a792cb : 00000000`00000101 00000000`00000000 00000000`00000000 00000000`00000001 : nt!MiUserFault+0x521 ffffab02`87e97940 fffff807`51c264f5 : 00000208`e66ed230 00000055`1af7a8d0 00000000`00000000 ffff9a8e`00000000 : nt!MmAccessFault+0x13b ffffab02`87e97ae0 00007ffb`c0b035fb : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x335 00000055`1af7a850 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`c0b035fb SYMBOL_NAME: nt!MiCheckVadSequential+76 MODULE_NAME: nt IMAGE_VERSION: 10.0.22000.739 STACK_COMMAND: .cxr; .ecxr ; kb IMAGE_NAME: ntkrnlmp.exe BUCKET_ID_FUNC_OFFSET: 76 FAILURE_BUCKET_ID: AV_nt!MiCheckVadSequential OS_VERSION: 10.0.22000.1 BUILDLAB_STR: co_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {cab4d7ae-3ed6-fcd0-5011-383a8f52714a} Followup: MachineOwner ---------