Hi,
The computer is a new setup. It keeps crashing and i need some assistance with seeing what may be the issue. I'm using Windbg tool and pasted the results. I made sure all drivers is up to date.
Here is my pc build.
Microsoft (R) Windows Debugger Version 10.0.22000.194 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\030122-5015-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred SRV*C:\Windows\symbol_cache*http://msdl.microsoft.com/download/symbols
Symbol search path is: SRV*C:\Windows\symbol_cache*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 10 Kernel Version 19041 MP (16 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff806`0e200000 PsLoadedModuleList = 0xfffff806`0ee2a270
Debug session time: Tue Mar 1 09:39:00.677 2022 (UTC - 5:00)
System Uptime: 0 days 0:01:36.313
Loading Kernel Symbols
...............................................................
................................................................
..................................................
Loading User Symbols
Loading unloaded module list
.......
For analysis of this file, run !analyze -v
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
CRITICAL_PROCESS_DIED (ef)
A critical system process died
Arguments:
Arg1: ffffc08ff9ed90c0, Process object or thread object
Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
Arg3: 0000000000000000
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4468
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 12240
Key : Analysis.Init.CPU.mSec
Value: 2483
Key : Analysis.Init.Elapsed.mSec
Value: 94897
Key : Analysis.Memory.CommitPeak.Mb
Value: 83
Key : CriticalProcessDied.ExceptionCode
Value: f9f15040
Key : CriticalProcessDied.ImageName
Value: RPCRT4.dll
Key : CriticalProcessDied.ImageOffset
Value: 40694
Key : CriticalProcessDied.ImageSize
Value: 12a000
Key : CriticalProcessDied.ImageTimestamp
Value: 9f38e81d
Key : CriticalProcessDied.Process
Value: wininit.exe
Key : CriticalProcessDied.Symbol
Value: RPCRT4.dll!RpcBindingFromStringBindingW
Key : CriticalProcessDied.WERReportId
Value: 2a15df43-00d1-4d81-bf45-93c9954d61ef
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: ef
BUGCHECK_P1: ffffc08ff9ed90c0
BUGCHECK_P2: 0
BUGCHECK_P3: 0
BUGCHECK_P4: 0
PROCESS_NAME: wininit.exe
CRITICAL_PROCESS: wininit.exe
ERROR_CODE: (NTSTATUS) 0xf9f15040 - <Unable to get error code text>
CRITICAL_PROCESS_REPORTGUID: {2a15df43-00d1-4d81-bf45-93c9954d61ef}
IMAGE_NAME: RPCRT4.dll
MODULE_NAME: RPCRT4
FAULTING_MODULE: 0000000000000000
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
STACK_TEXT:
ffffbc06`789b1938 fffff806`0eb07cb2 : 00000000`000000ef ffffc08f`f9ed90c0 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
ffffbc06`789b1940 fffff806`0ea0eabf : 00000000`00000000 fffff806`0e4fd6ed 00000000`00000002 fffff806`0e4fcd07 : nt!PspCatchCriticalBreak+0x10e
ffffbc06`789b19e0 fffff806`0e8b3cb4 : ffffc08f`00000000 00000000`00000000 ffffc08f`f9ed90c0 ffffc08f`f9ed94f8 : nt!PspTerminateAllThreads+0x15b543
ffffbc06`789b1a50 fffff806`0e8b3fdc : ffffc08f`f9ed90c0 00000000`00000000 0000009d`be9ff62c fffff806`0e800daa : nt!PspTerminateProcess+0xe0
ffffbc06`789b1a90 fffff806`0e608bb8 : ffffc08f`f9ed90c0 ffffc08f`f9f15040 ffffbc06`789b1b80 ffffc08f`f9ed90c0 : nt!NtTerminateProcess+0x9c
ffffbc06`789b1b00 00007ffa`8f96d2f4 : 00007ffa`8f9e2b53 00007ffa`8fa16708 0000009d`be9ff5f0 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000009d`be9fe228 00007ffa`8f9e2b53 : 00007ffa`8fa16708 0000009d`be9ff5f0 00000000`00000000 00007ffa`8f8d0000 : 0x00007ffa`8f96d2f4
0000009d`be9fe230 00007ffa`8fa16708 : 0000009d`be9ff5f0 00000000`00000000 00007ffa`8f8d0000 00000000`00000006 : 0x00007ffa`8f9e2b53
0000009d`be9fe238 0000009d`be9ff5f0 : 00000000`00000000 00007ffa`8f8d0000 00000000`00000006 00007ffa`8f97530e : 0x00007ffa`8fa16708
0000009d`be9fe240 00000000`00000000 : 00007ffa`8f8d0000 00000000`00000006 00007ffa`8f97530e 00007ffa`8fa16708 : 0x0000009d`be9ff5f0
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: 0xEF_wininit.exe_BUGCHECK_CRITICAL_PROCESS_f9f15040_RPCRT4.dll!RpcBindingFromStringBindingW_IMAGE_RPCRT4.dll
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {bffc3f6b-df9e-fb5b-113f-d570cb3a4253}
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 10.0.22000.194 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\030122-4828-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred SRV*C:\Windows\symbol_cache*http://msdl.microsoft.com/download/symbols
Symbol search path is: SRV*C:\Windows\symbol_cache*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 10 Kernel Version 19041 MP (16 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff804`1a200000 PsLoadedModuleList = 0xfffff804`1ae2a270
Debug session time: Tue Mar 1 09:57:19.173 2022 (UTC - 5:00)
System Uptime: 0 days 0:06:27.785
Loading Kernel Symbols
...............................................................
................................................................
................................................................
....
Loading User Symbols
Loading unloaded module list
.........
For analysis of this file, run !analyze -v
10: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffff968f19e92d90, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8041a44a2f0, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3359
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 9481
Key : Analysis.Init.CPU.mSec
Value: 1234
Key : Analysis.Init.Elapsed.mSec
Value: 17428
Key : Analysis.Memory.CommitPeak.Mb
Value: 81
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: a
BUGCHECK_P1: ffff968f19e92d90
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8041a44a2f0
READ_ADDRESS: fffff8041aefb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffff968f19e92d90
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: svchost.exe
TRAP_FRAME: ffff840d76387550 -- (.trap 0xffff840d76387550)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000008 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8041a44a2f0 rsp=ffff840d763876e0 rbp=0000000000000000
r8=fffff8041ae50b00 r9=ffff9e8f19e43000 r10=ffff9e8f19e43080
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!MiDecrementSubsections+0x30:
fffff804`1a44a2f0 48837b0800 cmp qword ptr [rbx+8],0 ds:00000000`00000008=????????????????
Resetting default scope
STACK_TEXT:
ffff840d`76387408 fffff804`1a609169 : 00000000`0000000a ffff968f`19e92d90 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffff840d`76387410 fffff804`1a605469 : 00000000`00000000 ffff9e8f`213b32c0 ffff9e8f`217fca70 fffff804`1abb1149 : nt!KiBugCheckDispatch+0x69
ffff840d`76387550 fffff804`1a44a2f0 : 00000000`00000000 00000000`00000000 ffff9e8f`220cf080 ffff840d`763877b9 : nt!KiPageFault+0x469
ffff840d`763876e0 fffff804`1a413294 : 00000000`00000000 ffff840d`763877b9 ffff9e8f`19e9b028 ffff9e8f`19e43080 : nt!MiDecrementSubsections+0x30
ffff840d`76387710 fffff804`1a801149 : 00000000`00000000 00000000`00000000 ffff9e8f`00000000 ffff9e8f`00000000 : nt!MiDeleteVad+0xb54
ffff840d`76387820 fffff804`1a8007e0 : ffff9e8f`22a56150 ffff9e8f`227732f0 ffff9e8f`220cf080 00000000`00000000 : nt!MiUnmapVad+0x49
ffff840d`76387850 fffff804`1a7feaaf : ffff9e8f`22a54350 ffff9e8f`22a54350 ffff9e8f`22a56150 ffff9e8f`213b32c0 : nt!MiCleanVad+0x30
ffff840d`76387880 fffff804`1a85c5a8 : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffff9e8f`213b32c0 : nt!MmCleanProcessAddressSpace+0x137
ffff840d`76387900 fffff804`1a8b0ab6 : ffff9e8f`213b32c0 ffffb005`05abe630 00000000`00000000 00000000`00000000 : nt!PspRundownSingleProcess+0x20c
ffff840d`76387990 fffff804`1a8b401e : ffff9e8f`00000000 00000000`00000001 00000000`00000000 000000ab`a6d06000 : nt!PspExitThread+0x5f6
ffff840d`76387a90 fffff804`1a608bb5 : ffff9e8f`213b32c0 ffff9e8f`220cf080 ffff840d`76387b80 ffff9e8f`00000000 : nt!NtTerminateProcess+0xde
ffff840d`76387b00 00007ffd`0a22d2f4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
000000ab`a6aafb28 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`0a22d2f4
SYMBOL_NAME: nt!MiDecrementSubsections+30
MODULE_NAME: nt
IMAGE_VERSION: 10.0.19041.1288
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 30
FAILURE_BUCKET_ID: AV_nt!MiDecrementSubsections
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {c3f8815f-6a52-e018-43b8-0890a171d8f0}
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 10.0.22000.194 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\030122-5953-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred SRV*C:\Windows\symbol_cache*http://msdl.microsoft.com/download/symbols
Symbol search path is: SRV*C:\Windows\symbol_cache*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 10 Kernel Version 19041 MP (16 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff802`25600000 PsLoadedModuleList = 0xfffff802`2622a2d0
Debug session time: Tue Mar 1 10:37:24.753 2022 (UTC - 5:00)
System Uptime: 0 days 0:01:14.388
Loading Kernel Symbols
...............................................................
................................................................
............................................................
Loading User Symbols
Loading unloaded module list
........
For analysis of this file, run !analyze -v
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000d800bd, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff802258a449a, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4062
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 4383
Key : Analysis.Init.CPU.mSec
Value: 1077
Key : Analysis.Init.Elapsed.mSec
Value: 12398
Key : Analysis.Memory.CommitPeak.Mb
Value: 82
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: a
BUGCHECK_P1: d800bd
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff802258a449a
READ_ADDRESS: fffff802262fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
0000000000d800bd
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: iCUE.exe
TRAP_FRAME: ffffb80387ce6590 -- (.trap 0xffffb80387ce6590)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff9719f0f443b2 rbx=0000000000000000 rcx=0000000000d80005
rdx=ffffc2398b110000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff802258a449a rsp=ffffb80387ce6720 rbp=ffffb80387ce67a9
r8=000000000000f085 r9=0000000000000005 r10=0000000000d80005
r11=ffffb80387ce6b00 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!MiAddWorkingSetEntries+0x2a:
fffff802`258a449a 0fb681b8000000 movzx eax,byte ptr [rcx+0B8h] ds:00000000`00d800bd=??
Resetting default scope
STACK_TEXT:
ffffb803`87ce6448 fffff802`25a09569 : 00000000`0000000a 00000000`00d800bd 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffb803`87ce6450 fffff802`25a05869 : ffffb803`87ce6b00 ffff9080`034da4b0 ffff9719`f0f44022 fffff802`26250b80 : nt!KiBugCheckDispatch+0x69
ffffb803`87ce6590 fffff802`258a449a : ffffb803`87ce6880 ffffa10e`24049610 ffff9080`034da4b0 ffffb803`87ce6860 : nt!KiPageFault+0x469
ffffb803`87ce6720 fffff802`2585d2d2 : 00000000`00000000 fffff802`258a12e8 ffffb803`87ce6880 ffff8006`fac07960 : nt!MiAddWorkingSetEntries+0x2a
ffffb803`87ce6810 fffff802`25a4afab : ffff8006`fac07960 ffffa10e`24049610 ffff8006`f9545910 fffff802`258294f2 : nt!MiEmptyDeferredWorkingSetEntries+0x6e
ffffb803`87ce6840 fffff802`2585be65 : 00000000`00000001 00000000`00d80005 00000000`00008000 00000000`00000000 : nt!MiUnlockFaultPageTable+0x18cd03
ffffb803`87ce6870 fffff802`2585b7d5 : 00000000`00000000 ffffb803`87ce68e0 ffff8006`fac07960 ffff8006`faafe5f0 : nt!MiReleaseFaultState+0x2d
ffffb803`87ce68a0 fffff802`2589f5a8 : 00000000`c0033333 00000000`00000001 00007ffe`7f252650 ffffa10e`24049610 : nt!MiIssueHardFault+0x95
ffffb803`87ce6960 fffff802`25a0575e : ffff8006`fa8a1000 ffff8006`00000000 ffffb803`87ce6b80 ffff8006`f6bd8080 : nt!MmAccessFault+0x468
ffffb803`87ce6b00 00007ffe`7f252650 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
000000c8`b70fb2c8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`7f252650
SYMBOL_NAME: nt!MiAddWorkingSetEntries+2a
MODULE_NAME: nt
IMAGE_VERSION: 10.0.19041.1566
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 2a
FAILURE_BUCKET_ID: AV_nt!MiAddWorkingSetEntries
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {f5a11243-4cf5-5895-9c75-d32dc752b601}
Followup: MachineOwner
---------
The computer is a new setup. It keeps crashing and i need some assistance with seeing what may be the issue. I'm using Windbg tool and pasted the results. I made sure all drivers is up to date.
Here is my pc build.
Microsoft (R) Windows Debugger Version 10.0.22000.194 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\030122-5015-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred SRV*C:\Windows\symbol_cache*http://msdl.microsoft.com/download/symbols
Symbol search path is: SRV*C:\Windows\symbol_cache*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 10 Kernel Version 19041 MP (16 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff806`0e200000 PsLoadedModuleList = 0xfffff806`0ee2a270
Debug session time: Tue Mar 1 09:39:00.677 2022 (UTC - 5:00)
System Uptime: 0 days 0:01:36.313
Loading Kernel Symbols
...............................................................
................................................................
..................................................
Loading User Symbols
Loading unloaded module list
.......
For analysis of this file, run !analyze -v
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
CRITICAL_PROCESS_DIED (ef)
A critical system process died
Arguments:
Arg1: ffffc08ff9ed90c0, Process object or thread object
Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
Arg3: 0000000000000000
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4468
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 12240
Key : Analysis.Init.CPU.mSec
Value: 2483
Key : Analysis.Init.Elapsed.mSec
Value: 94897
Key : Analysis.Memory.CommitPeak.Mb
Value: 83
Key : CriticalProcessDied.ExceptionCode
Value: f9f15040
Key : CriticalProcessDied.ImageName
Value: RPCRT4.dll
Key : CriticalProcessDied.ImageOffset
Value: 40694
Key : CriticalProcessDied.ImageSize
Value: 12a000
Key : CriticalProcessDied.ImageTimestamp
Value: 9f38e81d
Key : CriticalProcessDied.Process
Value: wininit.exe
Key : CriticalProcessDied.Symbol
Value: RPCRT4.dll!RpcBindingFromStringBindingW
Key : CriticalProcessDied.WERReportId
Value: 2a15df43-00d1-4d81-bf45-93c9954d61ef
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: ef
BUGCHECK_P1: ffffc08ff9ed90c0
BUGCHECK_P2: 0
BUGCHECK_P3: 0
BUGCHECK_P4: 0
PROCESS_NAME: wininit.exe
CRITICAL_PROCESS: wininit.exe
ERROR_CODE: (NTSTATUS) 0xf9f15040 - <Unable to get error code text>
CRITICAL_PROCESS_REPORTGUID: {2a15df43-00d1-4d81-bf45-93c9954d61ef}
IMAGE_NAME: RPCRT4.dll
MODULE_NAME: RPCRT4
FAULTING_MODULE: 0000000000000000
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
STACK_TEXT:
ffffbc06`789b1938 fffff806`0eb07cb2 : 00000000`000000ef ffffc08f`f9ed90c0 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
ffffbc06`789b1940 fffff806`0ea0eabf : 00000000`00000000 fffff806`0e4fd6ed 00000000`00000002 fffff806`0e4fcd07 : nt!PspCatchCriticalBreak+0x10e
ffffbc06`789b19e0 fffff806`0e8b3cb4 : ffffc08f`00000000 00000000`00000000 ffffc08f`f9ed90c0 ffffc08f`f9ed94f8 : nt!PspTerminateAllThreads+0x15b543
ffffbc06`789b1a50 fffff806`0e8b3fdc : ffffc08f`f9ed90c0 00000000`00000000 0000009d`be9ff62c fffff806`0e800daa : nt!PspTerminateProcess+0xe0
ffffbc06`789b1a90 fffff806`0e608bb8 : ffffc08f`f9ed90c0 ffffc08f`f9f15040 ffffbc06`789b1b80 ffffc08f`f9ed90c0 : nt!NtTerminateProcess+0x9c
ffffbc06`789b1b00 00007ffa`8f96d2f4 : 00007ffa`8f9e2b53 00007ffa`8fa16708 0000009d`be9ff5f0 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000009d`be9fe228 00007ffa`8f9e2b53 : 00007ffa`8fa16708 0000009d`be9ff5f0 00000000`00000000 00007ffa`8f8d0000 : 0x00007ffa`8f96d2f4
0000009d`be9fe230 00007ffa`8fa16708 : 0000009d`be9ff5f0 00000000`00000000 00007ffa`8f8d0000 00000000`00000006 : 0x00007ffa`8f9e2b53
0000009d`be9fe238 0000009d`be9ff5f0 : 00000000`00000000 00007ffa`8f8d0000 00000000`00000006 00007ffa`8f97530e : 0x00007ffa`8fa16708
0000009d`be9fe240 00000000`00000000 : 00007ffa`8f8d0000 00000000`00000006 00007ffa`8f97530e 00007ffa`8fa16708 : 0x0000009d`be9ff5f0
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: 0xEF_wininit.exe_BUGCHECK_CRITICAL_PROCESS_f9f15040_RPCRT4.dll!RpcBindingFromStringBindingW_IMAGE_RPCRT4.dll
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {bffc3f6b-df9e-fb5b-113f-d570cb3a4253}
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 10.0.22000.194 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\030122-4828-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred SRV*C:\Windows\symbol_cache*http://msdl.microsoft.com/download/symbols
Symbol search path is: SRV*C:\Windows\symbol_cache*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 10 Kernel Version 19041 MP (16 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff804`1a200000 PsLoadedModuleList = 0xfffff804`1ae2a270
Debug session time: Tue Mar 1 09:57:19.173 2022 (UTC - 5:00)
System Uptime: 0 days 0:06:27.785
Loading Kernel Symbols
...............................................................
................................................................
................................................................
....
Loading User Symbols
Loading unloaded module list
.........
For analysis of this file, run !analyze -v
10: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffff968f19e92d90, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8041a44a2f0, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3359
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 9481
Key : Analysis.Init.CPU.mSec
Value: 1234
Key : Analysis.Init.Elapsed.mSec
Value: 17428
Key : Analysis.Memory.CommitPeak.Mb
Value: 81
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: a
BUGCHECK_P1: ffff968f19e92d90
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8041a44a2f0
READ_ADDRESS: fffff8041aefb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffff968f19e92d90
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: svchost.exe
TRAP_FRAME: ffff840d76387550 -- (.trap 0xffff840d76387550)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000008 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8041a44a2f0 rsp=ffff840d763876e0 rbp=0000000000000000
r8=fffff8041ae50b00 r9=ffff9e8f19e43000 r10=ffff9e8f19e43080
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!MiDecrementSubsections+0x30:
fffff804`1a44a2f0 48837b0800 cmp qword ptr [rbx+8],0 ds:00000000`00000008=????????????????
Resetting default scope
STACK_TEXT:
ffff840d`76387408 fffff804`1a609169 : 00000000`0000000a ffff968f`19e92d90 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffff840d`76387410 fffff804`1a605469 : 00000000`00000000 ffff9e8f`213b32c0 ffff9e8f`217fca70 fffff804`1abb1149 : nt!KiBugCheckDispatch+0x69
ffff840d`76387550 fffff804`1a44a2f0 : 00000000`00000000 00000000`00000000 ffff9e8f`220cf080 ffff840d`763877b9 : nt!KiPageFault+0x469
ffff840d`763876e0 fffff804`1a413294 : 00000000`00000000 ffff840d`763877b9 ffff9e8f`19e9b028 ffff9e8f`19e43080 : nt!MiDecrementSubsections+0x30
ffff840d`76387710 fffff804`1a801149 : 00000000`00000000 00000000`00000000 ffff9e8f`00000000 ffff9e8f`00000000 : nt!MiDeleteVad+0xb54
ffff840d`76387820 fffff804`1a8007e0 : ffff9e8f`22a56150 ffff9e8f`227732f0 ffff9e8f`220cf080 00000000`00000000 : nt!MiUnmapVad+0x49
ffff840d`76387850 fffff804`1a7feaaf : ffff9e8f`22a54350 ffff9e8f`22a54350 ffff9e8f`22a56150 ffff9e8f`213b32c0 : nt!MiCleanVad+0x30
ffff840d`76387880 fffff804`1a85c5a8 : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffff9e8f`213b32c0 : nt!MmCleanProcessAddressSpace+0x137
ffff840d`76387900 fffff804`1a8b0ab6 : ffff9e8f`213b32c0 ffffb005`05abe630 00000000`00000000 00000000`00000000 : nt!PspRundownSingleProcess+0x20c
ffff840d`76387990 fffff804`1a8b401e : ffff9e8f`00000000 00000000`00000001 00000000`00000000 000000ab`a6d06000 : nt!PspExitThread+0x5f6
ffff840d`76387a90 fffff804`1a608bb5 : ffff9e8f`213b32c0 ffff9e8f`220cf080 ffff840d`76387b80 ffff9e8f`00000000 : nt!NtTerminateProcess+0xde
ffff840d`76387b00 00007ffd`0a22d2f4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
000000ab`a6aafb28 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`0a22d2f4
SYMBOL_NAME: nt!MiDecrementSubsections+30
MODULE_NAME: nt
IMAGE_VERSION: 10.0.19041.1288
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 30
FAILURE_BUCKET_ID: AV_nt!MiDecrementSubsections
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {c3f8815f-6a52-e018-43b8-0890a171d8f0}
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 10.0.22000.194 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\030122-5953-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred SRV*C:\Windows\symbol_cache*http://msdl.microsoft.com/download/symbols
Symbol search path is: SRV*C:\Windows\symbol_cache*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 10 Kernel Version 19041 MP (16 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff802`25600000 PsLoadedModuleList = 0xfffff802`2622a2d0
Debug session time: Tue Mar 1 10:37:24.753 2022 (UTC - 5:00)
System Uptime: 0 days 0:01:14.388
Loading Kernel Symbols
...............................................................
................................................................
............................................................
Loading User Symbols
Loading unloaded module list
........
For analysis of this file, run !analyze -v
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000d800bd, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff802258a449a, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4062
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 4383
Key : Analysis.Init.CPU.mSec
Value: 1077
Key : Analysis.Init.Elapsed.mSec
Value: 12398
Key : Analysis.Memory.CommitPeak.Mb
Value: 82
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: a
BUGCHECK_P1: d800bd
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff802258a449a
READ_ADDRESS: fffff802262fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
0000000000d800bd
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: iCUE.exe
TRAP_FRAME: ffffb80387ce6590 -- (.trap 0xffffb80387ce6590)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff9719f0f443b2 rbx=0000000000000000 rcx=0000000000d80005
rdx=ffffc2398b110000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff802258a449a rsp=ffffb80387ce6720 rbp=ffffb80387ce67a9
r8=000000000000f085 r9=0000000000000005 r10=0000000000d80005
r11=ffffb80387ce6b00 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!MiAddWorkingSetEntries+0x2a:
fffff802`258a449a 0fb681b8000000 movzx eax,byte ptr [rcx+0B8h] ds:00000000`00d800bd=??
Resetting default scope
STACK_TEXT:
ffffb803`87ce6448 fffff802`25a09569 : 00000000`0000000a 00000000`00d800bd 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffb803`87ce6450 fffff802`25a05869 : ffffb803`87ce6b00 ffff9080`034da4b0 ffff9719`f0f44022 fffff802`26250b80 : nt!KiBugCheckDispatch+0x69
ffffb803`87ce6590 fffff802`258a449a : ffffb803`87ce6880 ffffa10e`24049610 ffff9080`034da4b0 ffffb803`87ce6860 : nt!KiPageFault+0x469
ffffb803`87ce6720 fffff802`2585d2d2 : 00000000`00000000 fffff802`258a12e8 ffffb803`87ce6880 ffff8006`fac07960 : nt!MiAddWorkingSetEntries+0x2a
ffffb803`87ce6810 fffff802`25a4afab : ffff8006`fac07960 ffffa10e`24049610 ffff8006`f9545910 fffff802`258294f2 : nt!MiEmptyDeferredWorkingSetEntries+0x6e
ffffb803`87ce6840 fffff802`2585be65 : 00000000`00000001 00000000`00d80005 00000000`00008000 00000000`00000000 : nt!MiUnlockFaultPageTable+0x18cd03
ffffb803`87ce6870 fffff802`2585b7d5 : 00000000`00000000 ffffb803`87ce68e0 ffff8006`fac07960 ffff8006`faafe5f0 : nt!MiReleaseFaultState+0x2d
ffffb803`87ce68a0 fffff802`2589f5a8 : 00000000`c0033333 00000000`00000001 00007ffe`7f252650 ffffa10e`24049610 : nt!MiIssueHardFault+0x95
ffffb803`87ce6960 fffff802`25a0575e : ffff8006`fa8a1000 ffff8006`00000000 ffffb803`87ce6b80 ffff8006`f6bd8080 : nt!MmAccessFault+0x468
ffffb803`87ce6b00 00007ffe`7f252650 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
000000c8`b70fb2c8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`7f252650
SYMBOL_NAME: nt!MiAddWorkingSetEntries+2a
MODULE_NAME: nt
IMAGE_VERSION: 10.0.19041.1566
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 2a
FAILURE_BUCKET_ID: AV_nt!MiAddWorkingSetEntries
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {f5a11243-4cf5-5895-9c75-d32dc752b601}
Followup: MachineOwner
---------