- # crash with Defender and global mount
- ************* Preparing the environment for Debugger Extensions Gallery repositories **************
- ExtensionRepository : Implicit
- UseExperimentalFeatureForNugetShare : true
- AllowNugetExeUpdate : true
- NonInteractiveNuget : true
- AllowNugetMSCredentialProviderInstall : true
- AllowParallelInitializationOfLocalRepositories : true
- EnableRedirectToV8JsProvider : false
- -- Configuring repositories
- ----> Repository : LocalInstalled, Enabled: true
- ----> Repository : UserExtensions, Enabled: true
- >>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.062 seconds
- ************* Waiting for Debugger Extensions Gallery to Initialize **************
- >>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.047 seconds
- ----> Repository : UserExtensions, Enabled: true, Packages count: 0
- ----> Repository : LocalInstalled, Enabled: true, Packages count: 29
- Microsoft (R) Windows Debugger Version 10.0.26100.1591 AMD64
- Copyright (c) Microsoft Corporation. All rights reserved.
- Loading Dump File [C:\Windows\MEMORY.DMP]
- Kernel Bitmap Dump File: Active memory is available
- Primary dump contents written successfully
- Symbol search path is: srv*
- Executable search path is:
- Windows 10 Kernel Version 26100 MP (6 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS
- Edition build lab: 26100.1.amd64fre.ge_release.240331-1435
- Kernel base = 0xfffff800`82400000 PsLoadedModuleList = 0xfffff800`832f4fc0
- Debug session time: Mon Mar 16 17:30:14.694 2026 (UTC + 1:00)
- System Uptime: 0 days 0:11:00.127
- Loading Kernel Symbols
- ...............................................................
- ................................................................
- ................................................................
- ..............
- Loading User Symbols
- ................................................................
- ...........................................
- Loading unloaded module list
- ........................................................................
- For analysis of this file, run !analyze -v
- 4: kd> !analyze -v
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- MEMORY_MANAGEMENT (1a)
- # Any other values for parameter 1 must be individually examined.
- Arguments:
- Arg1: 0000000000041791, The subtype of the BugCheck.
- Arg2: ffffbf0003601260
- Arg3: ffff8080abe6d708
- Arg4: 200000000020d2c7
- Debugging Details:
- ------------------
- KEY_VALUES_STRING: 1
- Key : Analysis.CPU.mSec
- Value: 7139
- Key : Analysis.Elapsed.mSec
- Value: 37292
- Key : Analysis.IO.Other.Mb
- Value: 26
- Key : Analysis.IO.Read.Mb
- Value: 0
- Key : Analysis.IO.Write.Mb
- Value: 111
- Key : Analysis.Init.CPU.mSec
- Value: 3046
- Key : Analysis.Init.Elapsed.mSec
- Value: 25645
- Key : Analysis.Memory.CommitPeak.Mb
- Value: 201
- Key : Bugcheck.Code.KiBugCheckData
- Value: 0x1a
- Key : Bugcheck.Code.LegacyAPI
- Value: 0x1a
- Key : Dump.Attributes.AsUlong
- Value: 21040
- Key : Dump.Attributes.DiagDataWrittenToHeader
- Value: 1
- Key : Dump.Attributes.ErrorCode
- Value: 0
- Key : Dump.Attributes.FilterDumpFile
- Value: 1
- Key : Dump.Attributes.LastLine
- Value: Dump completed successfully.
- Key : Dump.Attributes.ProgressPercentage
- Value: 100
- Key : Failure.Bucket
- Value: 0x1a_41791_ntdll!NtReadVirtualMemoryEx
- Key : Failure.Hash
- Value: {abc0be70-0937-b2c3-2815-bc87094da565}
- Key : Hypervisor.Enlightenments.Value
- Value: 12576
- Key : Hypervisor.Enlightenments.ValueHex
- Value: 3120
- Key : Hypervisor.Flags.AnyHypervisorPresent
- Value: 1
- Key : Hypervisor.Flags.ApicEnlightened
- Value: 0
- Key : Hypervisor.Flags.ApicVirtualizationAvailable
- Value: 0
- Key : Hypervisor.Flags.AsyncMemoryHint
- Value: 0
- Key : Hypervisor.Flags.CoreSchedulerRequested
- Value: 0
- Key : Hypervisor.Flags.CpuManager
- Value: 0
- Key : Hypervisor.Flags.DeprecateAutoEoi
- Value: 1
- Key : Hypervisor.Flags.DynamicCpuDisabled
- Value: 0
- Key : Hypervisor.Flags.Epf
- Value: 0
- Key : Hypervisor.Flags.ExtendedProcessorMasks
- Value: 0
- Key : Hypervisor.Flags.HardwareMbecAvailable
- Value: 0
- Key : Hypervisor.Flags.MaxBankNumber
- Value: 0
- Key : Hypervisor.Flags.MemoryZeroingControl
- Value: 0
- Key : Hypervisor.Flags.NoExtendedRangeFlush
- Value: 1
- Key : Hypervisor.Flags.NoNonArchCoreSharing
- Value: 0
- Key : Hypervisor.Flags.Phase0InitDone
- Value: 1
- Key : Hypervisor.Flags.PowerSchedulerQos
- Value: 0
- Key : Hypervisor.Flags.RootScheduler
- Value: 0
- Key : Hypervisor.Flags.SynicAvailable
- Value: 1
- Key : Hypervisor.Flags.UseQpcBias
- Value: 0
- Key : Hypervisor.Flags.Value
- Value: 536632
- Key : Hypervisor.Flags.ValueHex
- Value: 83038
- Key : Hypervisor.Flags.VpAssistPage
- Value: 1
- Key : Hypervisor.Flags.VsmAvailable
- Value: 0
- Key : Hypervisor.RootFlags.AccessStats
- Value: 0
- Key : Hypervisor.RootFlags.CrashdumpEnlightened
- Value: 0
- Key : Hypervisor.RootFlags.CreateVirtualProcessor
- Value: 0
- Key : Hypervisor.RootFlags.DisableHyperthreading
- Value: 0
- Key : Hypervisor.RootFlags.HostTimelineSync
- Value: 0
- Key : Hypervisor.RootFlags.HypervisorDebuggingEnabled
- Value: 0
- Key : Hypervisor.RootFlags.IsHyperV
- Value: 0
- Key : Hypervisor.RootFlags.LivedumpEnlightened
- Value: 0
- Key : Hypervisor.RootFlags.MapDeviceInterrupt
- Value: 0
- Key : Hypervisor.RootFlags.MceEnlightened
- Value: 0
- Key : Hypervisor.RootFlags.Nested
- Value: 0
- Key : Hypervisor.RootFlags.StartLogicalProcessor
- Value: 0
- Key : Hypervisor.RootFlags.Value
- Value: 0
- Key : Hypervisor.RootFlags.ValueHex
- Value: 0
- Key : SecureKernel.HalpHvciEnabled
- Value: 0
- Key : WER.OS.Branch
- Value: ge_release
- Key : WER.OS.Version
- Value: 10.0.26100.1
- BUGCHECK_CODE: 1a
- BUGCHECK_P1: 41791
- BUGCHECK_P2: ffffbf0003601260
- BUGCHECK_P3: ffff8080abe6d708
- BUGCHECK_P4: 200000000020d2c7
- FILE_IN_CAB: MEMORY.DMP
- DUMP_FILE_ATTRIBUTES: 0x21040
- Filter Dump
- BLACKBOXBSD: 1 (!blackboxbsd)
- BLACKBOXNTFS: 1 (!blackboxntfs)
- BLACKBOXPNP: 1 (!blackboxpnp)
- BLACKBOXWINLOGON: 1
- PROCESS_NAME: MsMpEng.exe
- STACK_TEXT:
- ffff9903`71179478 fffff800`827a8932 : 00000000`0000001a 00000000`00041791 ffffbf00`03601260 ffff8080`abe6d708 : nt!KeBugCheckEx
- ffff9903`71179480 fffff800`8261b738 : 00000000`00000013 ffff9903`71179b60 00000000`00000001 00000000`00000000 : nt!MiUnlockPageTableCharges+0xf2
- ffff9903`711794e0 fffff800`82da9f53 : ffff9903`71179690 00000000`00000002 ffff9903`71179b60 00000000`00120062 : nt!MmUnlockPages+0x378
- ffff9903`71179570 fffff800`82da93c0 : 00000000`000014d4 0000001f`00000010 ffffe383`cc690600 00000000`00000001 : nt!MiCopyVirtualMemory+0x6f3
- ffff9903`71179990 fffff800`8286ffd3 : ffffe383`d7bec080 00000195`d6590000 00000158`1a776040 0000001f`ed9fd518 : nt!MiReadWriteVirtualMemory+0x1d0
- ffff9903`71179a20 fffff800`82ab5755 : ffff9903`71179b60 00000158`19e9bc00 ffff9903`71179b60 00000000`00000002 : nt!NtReadVirtualMemoryEx+0x23
- ffff9903`71179a70 00007ffa`9b464a94 : 00007ffa`2c4216a5 00000158`19e9bc00 00000000`7ffe9000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
- 0000001f`ed9fd4f8 00007ffa`2c4216a5 : 00000158`19e9bc00 00000000`7ffe9000 00000000`00000000 00000000`0000100c : ntdll!NtReadVirtualMemoryEx+0x14
- 0000001f`ed9fd500 00007ffa`2c091a7d : 00000158`1a777040 00000158`19e9bc00 00000158`19e9bc00 00000000`00000001 : mpengine!ReadProcessMemoryInternal+0xb5
- 0000001f`ed9fd590 00007ffa`2c090995 : 00000158`19e0ed80 00000000`00000000 00000158`19e9bc00 00000000`00000100 : mpengine!CSMSProcess::ScanRange+0x11d
- 0000001f`ed9fd660 00007ffa`2c1ca6e4 : 00000000`00000008 00000000`00000008 00000000`00000000 00000158`19e9bc00 : mpengine!CSMSProcess::Scan1Worker+0x2e5
- 0000001f`ed9fd720 00007ffa`2c1c92d0 : 00000158`19e9bc00 00000000`00000000 0000001f`00000000 00000000`000018ac : mpengine!CSMSProcess::Scan+0x460
- 0000001f`ed9fd830 00007ffa`2c6b6614 : 00000158`0d8cf480 00000158`1a429890 00007ffa`2cadf498 00000000`000014d4 : mpengine!CEMSContext::EmsScan+0x350
- 0000001f`ed9fd930 00007ffa`2c6b6cca : 00000000`00000000 00000157`d580a830 00000157`d580a8d0 00000000`00000000 : mpengine!RunEMS+0x460
- 0000001f`ed9fdac0 00007ffa`2c6b6707 : 00000000`00000170 00007ffa`2c1229fc 00000000`00000000 00000157`951d16fe : mpengine!CResmgrems::ScanImpl+0x23e
- 0000001f`ed9fdba0 00007ffa`2c11822c : 00000000`00000000 00000000`00000000 00000000`0000008e 00000000`00000000 : mpengine!CResmgrems::Scan+0x17
- 0000001f`ed9fdcf0 00007ffa`2c125183 : 00000158`174b3b90 0000001f`ed9fdfe0 00000000`00000000 00000158`0d8cf480 : mpengine!ResmgrProcessResource+0x230
- 0000001f`ed9fdea0 00007ffa`2c1103be : 00000158`1a6fe130 00000000`00000000 00000000`00000000 00000158`1a6fe130 : mpengine!ResScan+0xa17
- 0000001f`ed9fe2f0 00007ffa`2c10c7f9 : 00000157`e0fd6de0 00000000`00000000 00000158`1a6fe130 00007ffa`2cd45200 : mpengine!ScanOpenWithContext+0x74a
- 0000001f`ed9fe700 00007ffa`2c1c0080 : 00000000`00000000 00000000`00000078 00000157`e0fd6de0 00000000`0000800c : mpengine!UberScanOpen+0x1c9
- 0000001f`ed9fe820 00007ffa`2c1be2d5 : 00007ffa`9b47944c 00000000`00000000 00000000`00000000 00007ffa`9b478058 : mpengine!ksignal+0xdd0
- 0000001f`ed9feac0 00007ffa`86237fe1 : 00000000`00000000 00000000`00000078 00000157`e0ff9b80 00007ffa`86370ea7 : mpengine!DispatchSignalOnHandle+0xdd
- 0000001f`ed9ff2c0 00007ffa`86260eee : 00000000`ffffffff 00007ffa`863161d8 00000000`00001174 00000000`ffffffff : mpsvc!rsignal_wrapper+0x1f1
- 0000001f`ed9ff380 00007ffa`862814ce : 00000158`0eb0eb00 00000158`0eb0eb00 00000157`b81cb240 00007ffa`8664a8f8 : mpsvc!OnDemandScanWorker+0x5de
- 0000001f`ed9ff410 00007ffa`863220b3 : 00000000`00000000 00000158`0eb0eb00 00000157`b81c4d60 00007ffa`9b35b785 : mpsvc!MpService::CMpSvcScanWorkItem::Run+0xca
- 0000001f`ed9ff480 00007ffa`86324a6d : 00000000`00000001 00007ffa`9b3d9110 00000158`0eb0eb00 00000158`0eb0eb10 : mpsvc!MpService::CMpSvcScansQueue::Dispatch+0x33
- 0000001f`ed9ff4c0 00007ffa`85baed48 : 00000000`00000000 0000001f`ed9ff8a8 00000000`00000006 0000001f`ed9ff508 : mpsvc!MpService::CMpSvcScanWorkItem::OnAction+0x1d
- 0000001f`ed9ff4f0 00007ffa`85baec33 : 00000157`b81cb240 00000157`b81cb250 0000001f`ed9ff548 00000157`b81cb240 : MpClient!CommonUtil::CMpSimpleThreadPool::Call+0x5c
- 0000001f`ed9ff540 00007ffa`9b375370 : 0000001f`ed9ff8a8 0000001f`ed9ff6b0 00000000`7ffe0386 00007ffa`9b31cc64 : MpClient!CommonUtil::CMpSimpleThreadPool::AsyncDequeue+0xdf
- 0000001f`ed9ff5b0 00007ffa`9b3763c1 : 00000000`00000000 00000000`00000001 00007ffa`9b3d8280 00000000`00000000 : ntdll!TppWorkpExecuteCallback+0x4d0
- 0000001f`ed9ff710 00007ffa`9ab8e8d7 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ntdll!TppWorkerThread+0x801
- 0000001f`ed9ffa70 00007ffa`9b38c53c : 00000000`00000000 00000000`00000000 000004f0`fffffb30 000004d0`fffffb30 : KERNEL32!BaseThreadInitThunk+0x17
- 0000001f`ed9ffaa0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ntdll!RtlUserThreadStart+0x2c
- SYMBOL_NAME: ntdll!NtReadVirtualMemoryEx+14
- MODULE_NAME: ntdll
- IMAGE_NAME: ntdll.dll
- IMAGE_VERSION: 10.0.26100.7623
- STACK_COMMAND: .cxr; .ecxr ; kb
- BUCKET_ID_FUNC_OFFSET: 14
- FAILURE_BUCKET_ID: 0x1a_41791_ntdll!NtReadVirtualMemoryEx
- OS_VERSION: 10.0.26100.1
- BUILDLAB_STR: ge_release
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- FAILURE_ID_HASH: {abc0be70-0937-b2c3-2815-bc87094da565}
- Followup: MachineOwner
- ---------
crash with Defender and global mount
Posted by Anonymous on Mon 16th Mar 2026 16:38
raw | new post
Submit a correction or amendment below (click here to make a fresh posting)
After submitting an amendment, you'll be able to view the differences between the old and new posts easily.
nrubsig.kpaste.net RSS