- 3: kd> !analyze -v
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- MEMORY_MANAGEMENT (1a)
- # Any other values for parameter 1 must be individually examined.
- Arguments:
- Arg1: 0000000000041791, The subtype of the bugcheck.
- Arg2: fffff880062b6fe0
- Arg3: ffffa28ec6056250
- Arg4: 0e000230002464ab
- Debugging Details:
- ------------------
- KEY_VALUES_STRING: 1
- Key : Analysis.CPU.Sec
- Value: 4
- Key : Analysis.DebugAnalysisProvider.CPP
- Value: Create: 8007007e on WINGRENDEL02
- Key : Analysis.DebugData
- Value: CreateObject
- Key : Analysis.DebugModel
- Value: CreateObject
- Key : Analysis.Elapsed.Sec
- Value: 17
- Key : Analysis.Memory.CommitPeak.Mb
- Value: 123
- Key : Analysis.System
- Value: CreateObject
- BUGCHECK_CODE: 1a
- BUGCHECK_P1: 41791
- BUGCHECK_P2: fffff880062b6fe0
- BUGCHECK_P3: ffffa28ec6056250
- BUGCHECK_P4: e000230002464ab
- BLACKBOXBSD: 1 (!blackboxbsd)
- BLACKBOXNTFS: 1 (!blackboxntfs)
- BLACKBOXWINLOGON: 1
- PROCESS_NAME: MsMpEng.exe
- STACK_TEXT:
- ffff8d82`d96e4478 fffff805`4d04c249 : 00000000`0000001a 00000000`00041791 fffff880`062b6fe0 ffffa28e`c6056250 : nt!KeBugCheckEx
- ffff8d82`d96e4480 fffff805`4d3ff9a6 : ffff8d82`d96e46c0 00000000`00000103 ffff8d82`00000002 00000000`00000000 : nt!MmUnlockPages+0xd89
- ffff8d82`d96e4570 fffff805`4d3fe703 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmCopyVirtualMemory+0x7d6
- ffff8d82`d96e49c0 fffff805`4d3fe59b : ffffe608`33ae1080 00000042`ac07d908 00000149`2c401fb0 00000042`ac07da20 : nt!MiReadWriteVirtualMemory+0x153
- ffff8d82`d96e4a50 fffff805`4d211e05 : 00000000`00000000 00000000`00000000 00000000`00000000 ffff9200`11379180 : nt!NtReadVirtualMemory+0x1b
- ffff8d82`d96e4a90 00007ffd`0bdedcd4 : 00007ffd`095eeaf5 00000042`ac07d9f8 00007ffc`b7a5d446 00000149`00000000 : nt!KiSystemServiceCopyEnd+0x25
- 00000042`ac07d8e8 00007ffd`095eeaf5 : 00000042`ac07d9f8 00007ffc`b7a5d446 00000149`00000000 00000149`57b68f80 : ntdll!NtReadVirtualMemory+0x14
- 00000042`ac07d8f0 00007ffc`b7b945ee : 000001c9`98aa0000 00000000`00010000 000001c9`98ab0000 00000000`00000040 : KERNELBASE!ReadProcessMemory+0x15
- 00000042`ac07d940 00007ffc`b7a5d1d6 : 00000149`57b68f80 00000042`ac07d9f8 00000042`ac07da70 000001c9`98aa0000 : mpengine!ReadProcessMemoryInternal+0x11e
- 00000042`ac07d9a0 00007ffc`b7a5ce41 : 000001c9`00000040 00000042`ac07da70 00000000`00010000 00000149`00000001 : mpengine!CSMSProcess::ScanRange+0x176
- 00000042`ac07da40 00007ffc`b834f3e2 : 00000149`57b68f80 00000000`00000001 00000000`00000002 00000000`00000000 : mpengine!CSMSProcess::Scan1Worker+0x2d5
- 00000042`ac07daf0 00007ffc`b7afbcd0 : 00000149`57b68f02 00000000`00000002 00000042`00000000 00000000`00000002 : mpengine!CSMSProcess::Scan+0x476
- 00000042`ac07dbd0 00007ffc`b8102f8f : 00000149`00000002 00000149`54da12b0 00000042`ac07ddf0 01dbc02c`9df4fe80 : mpengine!CEMSContext::EmsScan+0x344
- 00000042`ac07dca0 00007ffc`b8103659 : 00000149`2f9c1640 00000149`2f9c1640 00000149`58f50060 00000149`2f9c0bd0 : mpengine!RunEMS+0x41b
- 00000042`ac07de60 00007ffc`b81030b7 : 00000149`58f50060 00000149`392fde40 00000149`2f9c1700 00007ffc`00000009 : mpengine!CResmgrems::ScanImpl+0x21d
- 00000042`ac07df20 00007ffc`b7a70618 : 00000000`00000000 00000000`00000000 00000000`0000008e 00007ffc`b7942532 : mpengine!CResmgrems::Scan+0x17
- 00000042`ac07e070 00007ffc`b7fbd75f : 00000149`27854c70 00000042`ac07e380 00000000`00000000 00000149`28a754f0 : mpengine!ResmgrProcessResource+0x97c
- 00000042`ac07e240 00007ffc`b7fafbfd : 00000149`2d36faf0 00000000`00000000 00000000`00000000 00000149`2d36faf0 : mpengine!ResScan+0x8fb
- 00000042`ac07e690 00007ffc`b7a10ce4 : 00000149`39181370 00000000`00000000 00000149`2d36faf0 00007ffc`b8994500 : mpengine!ScanOpenWithContext+0x1af9
- 00000042`ac07ea90 00007ffc`b79cb02c : 00000149`39181370 00000000`00000000 00000000`00000000 00000000`00000078 : mpengine!UberScanOpen+0xad0
- 00000042`ac07eba0 00007ffc`b79ca209 : 00000042`ac07ee60 00000042`ac07ee60 00000000`00000002 00000000`00000002 : mpengine!ksignal+0xd4c
- 00000042`ac07ee40 00007ffc`b79fca6f : 00000000`00000000 00000042`ac07f780 00000149`47a27640 00000149`39181370 : mpengine!DispatchSignalHelper+0x71
- 00000042`ac07eea0 00007ffc`fcf5b072 : 00000000`00004026 00000149`47b24eb0 00000042`ac07f780 0000000f`89f37e01 : mpengine!DispatchSignalOnHandle+0x1a7
- 00000042`ac07f6a0 00007ffc`fd1c9e94 : 00000149`00000000 00000149`47b24eb0 00000149`39181370 00007ffc`fd394ee0 : mpsvc!rsignal_wrapper+0x1d2
- 00000042`ac07f730 00007ffc`fd1c1582 : 00000149`39108560 00000149`39108560 00000149`265b0120 00007ffc`fd394420 : mpsvc!OnDemandScanWorker+0x554
- 00000042`ac07f7b0 00007ffc`fd1c1425 : 00000149`39108560 00000149`39108570 00000000`000003a0 00000149`25f10cc0 : mpsvc!MpService::CMpSvcScanWorkItem::Run+0xae
- 00000042`ac07f810 00007ffc`fcfe8ebd : 00000149`39108560 00000149`39108570 00000149`265522a0 00000000`00000000 : mpsvc!MpService::CMpSvcScansQueue::Dispatch+0x35
- 00000042`ac07f850 00007ffc`fce35831 : 00000042`ac07f8c8 00000000`00000000 00000149`265c2a70 00006c22`3b2fa3d2 : mpsvc!MpService::CMpSvcScanWorkItem::OnAction+0x1d
- 00000042`ac07f880 00007ffc`fce3571f : 00000149`265522a0 00000149`265522b0 00000149`265522a0 00000149`265522b0 : MpClient!CommonUtil::CMpSimpleThreadPool::Call+0x59
- 00000042`ac07f8d0 00007ffd`0bdb3720 : 00000149`265b1610 00000149`265b16d8 00000149`47a279e0 00000149`265c2a70 : MpClient!CommonUtil::CMpSimpleThreadPool::AsyncDequeue+0xdf
- 00000042`ac07f940 00007ffd`0bd9d79a : 00000000`00000000 00000000`00000000 00000149`265c2a70 00000000`00000000 : ntdll!TppWorkpExecuteCallback+0x130
- 00000042`ac07f990 00007ffd`0b567374 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ntdll!TppWorkerThread+0x68a
- 00000042`ac07fc90 00007ffd`0bd9cc91 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : KERNEL32!BaseThreadInitThunk+0x14
- 00000042`ac07fcc0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ntdll!RtlUserThreadStart+0x21
- SYMBOL_NAME: nt!MmUnlockPages+d89
- MODULE_NAME: nt
- STACK_COMMAND: .thread ; .cxr ; kb
- IMAGE_NAME: memory_corruption
- BUCKET_ID_FUNC_OFFSET: d89
- FAILURE_BUCKET_ID: 0x1a_41791_nt!MmUnlockPages
- OS_VERSION: 10.0.19041.1
- BUILDLAB_STR: vb_release
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- FAILURE_ID_HASH: {257cd050-e4e1-a6f4-7c65-0c6aaef71f68}
- Followup: MachineOwner
- ---------
MsMpEng.exe kernel crash
Posted by Anonymous on Thu 8th May 2025 16:31
raw | new post
Submit a correction or amendment below (click here to make a fresh posting)
After submitting an amendment, you'll be able to view the differences between the old and new posts easily.