Windows 10 reached EOS (end of support) on October 14, 2025. For more information, see this article.

ابحث في الدعم

Avoid support scams. We will never ask you to call or text a phone number or share personal information. Please report suspicious activity using the “Report Abuse” option.

Learn More

FIREFOX BUG CHECK-WINDOWS 11,FIREFOX V145.0.1

  • ما من ردود
  • 0 have this problem
more options

Bugcheck Analysis *

  • *

IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: 0000000000000030, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000000, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: fffff806b9225392, address which referenced memory

Debugging Details:



KEY_VALUES_STRING: 1

   Key  : Analysis.CPU.mSec
   Value: 1234
   Key  : Analysis.Elapsed.mSec
   Value: 7391
   Key  : Analysis.IO.Other.Mb
   Value: 0
   Key  : Analysis.IO.Read.Mb
   Value: 1
   Key  : Analysis.IO.Write.Mb
   Value: 26
   Key  : Analysis.Init.CPU.mSec
   Value: 1453
   Key  : Analysis.Init.Elapsed.mSec
   Value: 38843
   Key  : Analysis.Memory.CommitPeak.Mb
   Value: 111
   Key  : Analysis.Version.DbgEng
   Value: 10.0.29457.1000
   Key  : Analysis.Version.Description
   Value: 10.2506.23.01 amd64fre
   Key  : Analysis.Version.Ext
   Value: 1.2506.23.1
   Key  : Bugcheck.Code.LegacyAPI
   Value: 0xa
   Key  : Bugcheck.Code.TargetModel
   Value: 0xa
   Key  : Dump.Attributes.AsUlong
   Value: 0x21808
   Key  : Dump.Attributes.DiagDataWrittenToHeader
   Value: 1
   Key  : Dump.Attributes.ErrorCode
   Value: 0x0
   Key  : Dump.Attributes.KernelGeneratedTriageDump
   Value: 1
   Key  : Dump.Attributes.LastLine
   Value: Dump completed successfully.
   Key  : Dump.Attributes.ProgressPercentage
   Value: 0
   Key  : Failure.Bucket
   Value: AV_nt!MiQueryAddressState
   Key  : Failure.Exception.IP.Address
   Value: 0xfffff806b9225392
   Key  : Failure.Exception.IP.Module
   Value: nt
   Key  : Failure.Exception.IP.Offset
   Value: 0x225392
   Key  : Failure.Hash
   Value: {48ac8bd5-3c4d-0c8d-617e-6e5fdec9028e}
   Key  : Hypervisor.Enlightenments.ValueHex
   Value: 0x7417df84
   Key  : Hypervisor.Flags.AnyHypervisorPresent
   Value: 1
   Key  : Hypervisor.Flags.ApicEnlightened
   Value: 0
   Key  : Hypervisor.Flags.ApicVirtualizationAvailable
   Value: 1
   Key  : Hypervisor.Flags.AsyncMemoryHint
   Value: 0
   Key  : Hypervisor.Flags.CoreSchedulerRequested
   Value: 0
   Key  : Hypervisor.Flags.CpuManager
   Value: 1
   Key  : Hypervisor.Flags.DeprecateAutoEoi
   Value: 1
   Key  : Hypervisor.Flags.DynamicCpuDisabled
   Value: 1
   Key  : Hypervisor.Flags.Epf
   Value: 0
   Key  : Hypervisor.Flags.ExtendedProcessorMasks
   Value: 1
   Key  : Hypervisor.Flags.HardwareMbecAvailable
   Value: 1
   Key  : Hypervisor.Flags.MaxBankNumber
   Value: 0
   Key  : Hypervisor.Flags.MemoryZeroingControl
   Value: 0
   Key  : Hypervisor.Flags.NoExtendedRangeFlush
   Value: 0
   Key  : Hypervisor.Flags.NoNonArchCoreSharing
   Value: 1
   Key  : Hypervisor.Flags.Phase0InitDone
   Value: 1
   Key  : Hypervisor.Flags.PowerSchedulerQos
   Value: 0
   Key  : Hypervisor.Flags.RootScheduler
   Value: 0
   Key  : Hypervisor.Flags.SynicAvailable
   Value: 1
   Key  : Hypervisor.Flags.UseQpcBias
   Value: 0
   Key  : Hypervisor.Flags.Value
   Value: 55185662
   Key  : Hypervisor.Flags.ValueHex
   Value: 0x34a10fe
   Key  : Hypervisor.Flags.VpAssistPage
   Value: 1
   Key  : Hypervisor.Flags.VsmAvailable
   Value: 1
   Key  : Hypervisor.RootFlags.AccessStats
   Value: 1
   Key  : Hypervisor.RootFlags.CrashdumpEnlightened
   Value: 1
   Key  : Hypervisor.RootFlags.CreateVirtualProcessor
   Value: 1
   Key  : Hypervisor.RootFlags.DisableHyperthreading
   Value: 0
   Key  : Hypervisor.RootFlags.HostTimelineSync
   Value: 1
   Key  : Hypervisor.RootFlags.HypervisorDebuggingEnabled
   Value: 0
   Key  : Hypervisor.RootFlags.IsHyperV
   Value: 1
   Key  : Hypervisor.RootFlags.LivedumpEnlightened
   Value: 1
   Key  : Hypervisor.RootFlags.MapDeviceInterrupt
   Value: 1
   Key  : Hypervisor.RootFlags.MceEnlightened
   Value: 1
   Key  : Hypervisor.RootFlags.Nested
   Value: 0
   Key  : Hypervisor.RootFlags.StartLogicalProcessor
   Value: 1
   Key  : Hypervisor.RootFlags.Value
   Value: 1015
   Key  : Hypervisor.RootFlags.ValueHex
   Value: 0x3f7
   Key  : WER.System.BIOSRevision
   Value: 7.11.0.0


BUGCHECK_CODE: a

BUGCHECK_P1: 30

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff806b9225392

FILE_IN_CAB: 112125-25031-01.dmp

TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b


DUMP_FILE_ATTRIBUTES: 0x21808

 Kernel Generated Triage Dump

FAULTING_THREAD: ffff808c14a040c0

READ_ADDRESS: fffff806b9fc44c0: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd unable to get nt!MmSpecialPagesInUse

0000000000000030 

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1 (!blackboxwinlogon)


CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: **** FIREFOX.EXE ***

STACK_TEXT: ffff9106`c01ff268 fffff806`b96b2be9  : 00000000`0000000a 00000000`00000030 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx ffff9106`c01ff270 fffff806`b96adea8  : ffff9106`c01ff600 ffffb65b`00000004 fffff806`b92266cb ffff9106`00000001 : nt!KiBugCheckDispatch+0x69 ffff9106`c01ff3b0 fffff806`b9225392  : 04000001`ddeed005 ffff9106`c01ff540 ffffb63f`fdb363f8 ffff9106`c01ff640 : nt!KiPageFault+0x468 ffff9106`c01ff540 fffff806`b9399bda  : 00007ffb`66c00000 ffffb63f`fdb537b0 ffff808c`21a6e400 ffff808c`1fb86c20 : nt!MiQueryAddressState+0x232 ffff9106`c01ff710 fffff806`b99c8d16  : 00000000`00000000 ffff9106`c01f0000 00000000`00000003 ffff808c`00000000 : nt!MiQueryAddressSpan+0x152 ffff9106`c01ff7c0 fffff806`b99c8625  : 00000000`00000000 00000000`00000000 00000000`00000000 ffff808c`21a6edd0 : nt!MmQueryVirtualMemory+0x6d6 ffff9106`c01ff960 fffff806`b96b2255  : 00000088`35103300 00000000`00000000 ffff9106`c01ffaa0 00000000`00000000 : nt!NtQueryVirtualMemory+0x25 ffff9106`c01ff9b0 00007ffb`d8742124  : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25 00000088`35102798 00000000`00000000  : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`d8742124


SYMBOL_NAME: nt!MiQueryAddressState+232

MODULE_NAME: nt

IMAGE_VERSION: 10.0.26100.7171

STACK_COMMAND: .process /r /p 0xffff808c21a6e0c0; .thread 0xffff808c14a040c0 ; kb

IMAGE_NAME: ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET: 232

FAILURE_BUCKET_ID: AV_nt!MiQueryAddressState

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {48ac8bd5-3c4d-0c8d-617e-6e5fdec9028e}

Followup: MachineOwner


8: kd> .thread /r /p ffff808c14a040c0 Implicit thread is now ffff808c`14a040c0 Implicit process is now ffff808c`21a6e0c0 Loading User Symbols PEB is paged out (Peb.Ldr = 00000088`34990018). Type ".hh dbgerr001" for details 8: kd> .process /r /p 0xffff808c21a6e0c0; .thread 0xffff808c14a040c0 ; kb Implicit process is now ffff808c`21a6e0c0 Loading User Symbols PEB is paged out (Peb.Ldr = 00000088`34990018). Type ".hh dbgerr001" for details Implicit thread is now ffff808c`14a040c0

 *** Stack trace for last set context - .thread/.cxr resets it
# RetAddr               : Args to Child                                                           : Call Site

00 fffff806`b96b2be9  : 00000000`0000000a 00000000`00000030 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx 01 fffff806`b96adea8  : ffff9106`c01ff600 ffffb65b`00000004 fffff806`b92266cb ffff9106`00000001 : nt!KiBugCheckDispatch+0x69 02 fffff806`b9225392  : 04000001`ddeed005 ffff9106`c01ff540 ffffb63f`fdb363f8 ffff9106`c01ff640 : nt!KiPageFault+0x468 03 fffff806`b9399bda  : 00007ffb`66c00000 ffffb63f`fdb537b0 ffff808c`21a6e400 ffff808c`1fb86c20 : nt!MiQueryAddressState+0x232 04 fffff806`b99c8d16  : 00000000`00000000 ffff9106`c01f0000 00000000`00000003 ffff808c`00000000 : nt!MiQueryAddressSpan+0x152 05 fffff806`b99c8625  : 00000000`00000000 00000000`00000000 00000000`00000000 ffff808c`21a6edd0 : nt!MmQueryVirtualMemory+0x6d6 06 fffff806`b96b2255  : 00000088`35103300 00000000`00000000 ffff9106`c01ffaa0 00000000`00000000 : nt!NtQueryVirtualMemory+0x25 07 00007ffb`d8742124  : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25 08 00000000`00000000  : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`d8742124 8: kd> .process /r /p 0xffff808c21a6e0c0; .thread 0xffff808c14a040c0 ; kb Implicit process is now ffff808c`21a6e0c0 Loading User Symbols PEB is paged out (Peb.Ldr = 00000088`34990018). Type ".hh dbgerr001" for details Implicit thread is now ffff808c`14a040c0

 *** Stack trace for last set context - .thread/.cxr resets it
# RetAddr               : Args to Child                                                           : Call Site

00 fffff806`b96b2be9  : 00000000`0000000a 00000000`00000030 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx 01 fffff806`b96adea8  : ffff9106`c01ff600 ffffb65b`00000004 fffff806`b92266cb ffff9106`00000001 : nt!KiBugCheckDispatch+0x69 02 fffff806`b9225392  : 04000001`ddeed005 ffff9106`c01ff540 ffffb63f`fdb363f8 ffff9106`c01ff640 : nt!KiPageFault+0x468 03 fffff806`b9399bda  : 00007ffb`66c00000 ffffb63f`fdb537b0 ffff808c`21a6e400 ffff808c`1fb86c20 : nt!MiQueryAddressState+0x232 04 fffff806`b99c8d16  : 00000000`00000000 ffff9106`c01f0000 00000000`00000003 ffff808c`00000000 : nt!MiQueryAddressSpan+0x152 05 fffff806`b99c8625  : 00000000`00000000 00000000`00000000 00000000`00000000 ffff808c`21a6edd0 : nt!MmQueryVirtualMemory+0x6d6 06 fffff806`b96b2255  : 00000088`35103300 00000000`00000000 ffff9106`c01ffaa0 00000000`00000000 : nt!NtQueryVirtualMemory+0x25 07 00007ffb`d8742124  : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25 08 00000000`00000000  : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`d8742124 8: kd> .process /r /p 0xffff808c21a6e0c0; .thread 0xffff808c14a040c0 ; kb Implicit process is now ffff808c`21a6e0c0 Loading User Symbols PEB is paged out (Peb.Ldr = 00000088`34990018). Type ".hh dbgerr001" for details Implicit thread is now ffff808c`14a040c0

 *** Stack trace for last set context - .thread/.cxr resets it
# RetAddr               : Args to Child                                                           : Call Site

00 fffff806`b96b2be9  : 00000000`0000000a 00000000`00000030 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx 01 fffff806`b96adea8  : ffff9106`c01ff600 ffffb65b`00000004 fffff806`b92266cb ffff9106`00000001 : nt!KiBugCheckDispatch+0x69 02 fffff806`b9225392  : 04000001`ddeed005 ffff9106`c01ff540 ffffb63f`fdb363f8 ffff9106`c01ff640 : nt!KiPageFault+0x468 03 fffff806`b9399bda  : 00007ffb`66c00000 ffffb63f`fdb537b0 ffff808c`21a6e400 ffff808c`1fb86c20 : nt!MiQueryAddressState+0x232 04 fffff806`b99c8d16  : 00000000`00000000 ffff9106`c01f0000 00000000`00000003 ffff808c`00000000 : nt!MiQueryAddressSpan+0x152 05 fffff806`b99c8625  : 00000000`00000000 00000000`00000000 00000000`00000000 ffff808c`21a6edd0 : nt!MmQueryVirtualMemory+0x6d6 06 fffff806`b96b2255  : 00000088`35103300 00000000`00000000 ffff9106`c01ffaa0 00000000`00000000 : nt!NtQueryVirtualMemory+0x25 07 00007ffb`d8742124  : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25 08 00000000`00000000  : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`d8742124

Bugcheck Analysis * * * ******************************************************************************* IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: 0000000000000030, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000000, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: fffff806b9225392, address which referenced memory Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 1234 Key : Analysis.Elapsed.mSec Value: 7391 Key : Analysis.IO.Other.Mb Value: 0 Key : Analysis.IO.Read.Mb Value: 1 Key : Analysis.IO.Write.Mb Value: 26 Key : Analysis.Init.CPU.mSec Value: 1453 Key : Analysis.Init.Elapsed.mSec Value: 38843 Key : Analysis.Memory.CommitPeak.Mb Value: 111 Key : Analysis.Version.DbgEng Value: 10.0.29457.1000 Key : Analysis.Version.Description Value: 10.2506.23.01 amd64fre Key : Analysis.Version.Ext Value: 1.2506.23.1 Key : Bugcheck.Code.LegacyAPI Value: 0xa Key : Bugcheck.Code.TargetModel Value: 0xa Key : Dump.Attributes.AsUlong Value: 0x21808 Key : Dump.Attributes.DiagDataWrittenToHeader Value: 1 Key : Dump.Attributes.ErrorCode Value: 0x0 Key : Dump.Attributes.KernelGeneratedTriageDump Value: 1 Key : Dump.Attributes.LastLine Value: Dump completed successfully. Key : Dump.Attributes.ProgressPercentage Value: 0 Key : Failure.Bucket Value: AV_nt!MiQueryAddressState Key : Failure.Exception.IP.Address Value: 0xfffff806b9225392 Key : Failure.Exception.IP.Module Value: nt Key : Failure.Exception.IP.Offset Value: 0x225392 Key : Failure.Hash Value: {48ac8bd5-3c4d-0c8d-617e-6e5fdec9028e} Key : Hypervisor.Enlightenments.ValueHex Value: 0x7417df84 Key : Hypervisor.Flags.AnyHypervisorPresent Value: 1 Key : Hypervisor.Flags.ApicEnlightened Value: 0 Key : Hypervisor.Flags.ApicVirtualizationAvailable Value: 1 Key : Hypervisor.Flags.AsyncMemoryHint Value: 0 Key : Hypervisor.Flags.CoreSchedulerRequested Value: 0 Key : Hypervisor.Flags.CpuManager Value: 1 Key : Hypervisor.Flags.DeprecateAutoEoi Value: 1 Key : Hypervisor.Flags.DynamicCpuDisabled Value: 1 Key : Hypervisor.Flags.Epf Value: 0 Key : Hypervisor.Flags.ExtendedProcessorMasks Value: 1 Key : Hypervisor.Flags.HardwareMbecAvailable Value: 1 Key : Hypervisor.Flags.MaxBankNumber Value: 0 Key : Hypervisor.Flags.MemoryZeroingControl Value: 0 Key : Hypervisor.Flags.NoExtendedRangeFlush Value: 0 Key : Hypervisor.Flags.NoNonArchCoreSharing Value: 1 Key : Hypervisor.Flags.Phase0InitDone Value: 1 Key : Hypervisor.Flags.PowerSchedulerQos Value: 0 Key : Hypervisor.Flags.RootScheduler Value: 0 Key : Hypervisor.Flags.SynicAvailable Value: 1 Key : Hypervisor.Flags.UseQpcBias Value: 0 Key : Hypervisor.Flags.Value Value: 55185662 Key : Hypervisor.Flags.ValueHex Value: 0x34a10fe Key : Hypervisor.Flags.VpAssistPage Value: 1 Key : Hypervisor.Flags.VsmAvailable Value: 1 Key : Hypervisor.RootFlags.AccessStats Value: 1 Key : Hypervisor.RootFlags.CrashdumpEnlightened Value: 1 Key : Hypervisor.RootFlags.CreateVirtualProcessor Value: 1 Key : Hypervisor.RootFlags.DisableHyperthreading Value: 0 Key : Hypervisor.RootFlags.HostTimelineSync Value: 1 Key : Hypervisor.RootFlags.HypervisorDebuggingEnabled Value: 0 Key : Hypervisor.RootFlags.IsHyperV Value: 1 Key : Hypervisor.RootFlags.LivedumpEnlightened Value: 1 Key : Hypervisor.RootFlags.MapDeviceInterrupt Value: 1 Key : Hypervisor.RootFlags.MceEnlightened Value: 1 Key : Hypervisor.RootFlags.Nested Value: 0 Key : Hypervisor.RootFlags.StartLogicalProcessor Value: 1 Key : Hypervisor.RootFlags.Value Value: 1015 Key : Hypervisor.RootFlags.ValueHex Value: 0x3f7 Key : WER.System.BIOSRevision Value: 7.11.0.0 BUGCHECK_CODE: a BUGCHECK_P1: 30 BUGCHECK_P2: 2 BUGCHECK_P3: 0 BUGCHECK_P4: fffff806b9225392 FILE_IN_CAB: 112125-25031-01.dmp TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b DUMP_FILE_ATTRIBUTES: 0x21808 Kernel Generated Triage Dump FAULTING_THREAD: ffff808c14a040c0 READ_ADDRESS: fffff806b9fc44c0: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd unable to get nt!MmSpecialPagesInUse 0000000000000030 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 (!blackboxwinlogon) CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: **** FIREFOX.EXE *** STACK_TEXT: ffff9106`c01ff268 fffff806`b96b2be9 : 00000000`0000000a 00000000`00000030 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx ffff9106`c01ff270 fffff806`b96adea8 : ffff9106`c01ff600 ffffb65b`00000004 fffff806`b92266cb ffff9106`00000001 : nt!KiBugCheckDispatch+0x69 ffff9106`c01ff3b0 fffff806`b9225392 : 04000001`ddeed005 ffff9106`c01ff540 ffffb63f`fdb363f8 ffff9106`c01ff640 : nt!KiPageFault+0x468 ffff9106`c01ff540 fffff806`b9399bda : 00007ffb`66c00000 ffffb63f`fdb537b0 ffff808c`21a6e400 ffff808c`1fb86c20 : nt!MiQueryAddressState+0x232 ffff9106`c01ff710 fffff806`b99c8d16 : 00000000`00000000 ffff9106`c01f0000 00000000`00000003 ffff808c`00000000 : nt!MiQueryAddressSpan+0x152 ffff9106`c01ff7c0 fffff806`b99c8625 : 00000000`00000000 00000000`00000000 00000000`00000000 ffff808c`21a6edd0 : nt!MmQueryVirtualMemory+0x6d6 ffff9106`c01ff960 fffff806`b96b2255 : 00000088`35103300 00000000`00000000 ffff9106`c01ffaa0 00000000`00000000 : nt!NtQueryVirtualMemory+0x25 ffff9106`c01ff9b0 00007ffb`d8742124 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25 00000088`35102798 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`d8742124 SYMBOL_NAME: nt!MiQueryAddressState+232 MODULE_NAME: nt IMAGE_VERSION: 10.0.26100.7171 STACK_COMMAND: .process /r /p 0xffff808c21a6e0c0; .thread 0xffff808c14a040c0 ; kb IMAGE_NAME: ntkrnlmp.exe BUCKET_ID_FUNC_OFFSET: 232 FAILURE_BUCKET_ID: AV_nt!MiQueryAddressState OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {48ac8bd5-3c4d-0c8d-617e-6e5fdec9028e} Followup: MachineOwner --------- 8: kd> .thread /r /p ffff808c14a040c0 Implicit thread is now ffff808c`14a040c0 Implicit process is now ffff808c`21a6e0c0 Loading User Symbols PEB is paged out (Peb.Ldr = 00000088`34990018). Type ".hh dbgerr001" for details 8: kd> .process /r /p 0xffff808c21a6e0c0; .thread 0xffff808c14a040c0 ; kb Implicit process is now ffff808c`21a6e0c0 Loading User Symbols PEB is paged out (Peb.Ldr = 00000088`34990018). Type ".hh dbgerr001" for details Implicit thread is now ffff808c`14a040c0 *** Stack trace for last set context - .thread/.cxr resets it # RetAddr : Args to Child : Call Site 00 fffff806`b96b2be9 : 00000000`0000000a 00000000`00000030 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx 01 fffff806`b96adea8 : ffff9106`c01ff600 ffffb65b`00000004 fffff806`b92266cb ffff9106`00000001 : nt!KiBugCheckDispatch+0x69 02 fffff806`b9225392 : 04000001`ddeed005 ffff9106`c01ff540 ffffb63f`fdb363f8 ffff9106`c01ff640 : nt!KiPageFault+0x468 03 fffff806`b9399bda : 00007ffb`66c00000 ffffb63f`fdb537b0 ffff808c`21a6e400 ffff808c`1fb86c20 : nt!MiQueryAddressState+0x232 04 fffff806`b99c8d16 : 00000000`00000000 ffff9106`c01f0000 00000000`00000003 ffff808c`00000000 : nt!MiQueryAddressSpan+0x152 05 fffff806`b99c8625 : 00000000`00000000 00000000`00000000 00000000`00000000 ffff808c`21a6edd0 : nt!MmQueryVirtualMemory+0x6d6 06 fffff806`b96b2255 : 00000088`35103300 00000000`00000000 ffff9106`c01ffaa0 00000000`00000000 : nt!NtQueryVirtualMemory+0x25 07 00007ffb`d8742124 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25 08 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`d8742124 8: kd> .process /r /p 0xffff808c21a6e0c0; .thread 0xffff808c14a040c0 ; kb Implicit process is now ffff808c`21a6e0c0 Loading User Symbols PEB is paged out (Peb.Ldr = 00000088`34990018). Type ".hh dbgerr001" for details Implicit thread is now ffff808c`14a040c0 *** Stack trace for last set context - .thread/.cxr resets it # RetAddr : Args to Child : Call Site 00 fffff806`b96b2be9 : 00000000`0000000a 00000000`00000030 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx 01 fffff806`b96adea8 : ffff9106`c01ff600 ffffb65b`00000004 fffff806`b92266cb ffff9106`00000001 : nt!KiBugCheckDispatch+0x69 02 fffff806`b9225392 : 04000001`ddeed005 ffff9106`c01ff540 ffffb63f`fdb363f8 ffff9106`c01ff640 : nt!KiPageFault+0x468 03 fffff806`b9399bda : 00007ffb`66c00000 ffffb63f`fdb537b0 ffff808c`21a6e400 ffff808c`1fb86c20 : nt!MiQueryAddressState+0x232 04 fffff806`b99c8d16 : 00000000`00000000 ffff9106`c01f0000 00000000`00000003 ffff808c`00000000 : nt!MiQueryAddressSpan+0x152 05 fffff806`b99c8625 : 00000000`00000000 00000000`00000000 00000000`00000000 ffff808c`21a6edd0 : nt!MmQueryVirtualMemory+0x6d6 06 fffff806`b96b2255 : 00000088`35103300 00000000`00000000 ffff9106`c01ffaa0 00000000`00000000 : nt!NtQueryVirtualMemory+0x25 07 00007ffb`d8742124 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25 08 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`d8742124 8: kd> .process /r /p 0xffff808c21a6e0c0; .thread 0xffff808c14a040c0 ; kb Implicit process is now ffff808c`21a6e0c0 Loading User Symbols PEB is paged out (Peb.Ldr = 00000088`34990018). Type ".hh dbgerr001" for details Implicit thread is now ffff808c`14a040c0 *** Stack trace for last set context - .thread/.cxr resets it # RetAddr : Args to Child : Call Site 00 fffff806`b96b2be9 : 00000000`0000000a 00000000`00000030 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx 01 fffff806`b96adea8 : ffff9106`c01ff600 ffffb65b`00000004 fffff806`b92266cb ffff9106`00000001 : nt!KiBugCheckDispatch+0x69 02 fffff806`b9225392 : 04000001`ddeed005 ffff9106`c01ff540 ffffb63f`fdb363f8 ffff9106`c01ff640 : nt!KiPageFault+0x468 03 fffff806`b9399bda : 00007ffb`66c00000 ffffb63f`fdb537b0 ffff808c`21a6e400 ffff808c`1fb86c20 : nt!MiQueryAddressState+0x232 04 fffff806`b99c8d16 : 00000000`00000000 ffff9106`c01f0000 00000000`00000003 ffff808c`00000000 : nt!MiQueryAddressSpan+0x152 05 fffff806`b99c8625 : 00000000`00000000 00000000`00000000 00000000`00000000 ffff808c`21a6edd0 : nt!MmQueryVirtualMemory+0x6d6 06 fffff806`b96b2255 : 00000088`35103300 00000000`00000000 ffff9106`c01ffaa0 00000000`00000000 : nt!NtQueryVirtualMemory+0x25 07 00007ffb`d8742124 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25 08 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`d8742124

You must log in to your account to reply to posts. Please start a new question, if you do not have an account yet.