[CODE title="Kod"]
Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\maksu\Downloads\Compressed\011021-7015-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 (Service Pack 3) MP (16 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff806`66600000 PsLoadedModuleList = 0xfffff806`6722a2b0
Debug session time: Sat Jan 9 23:52:13.827 2021 (UTC + 3:00)
System Uptime: 0 days 21:56:05.513
Loading Kernel Symbols
...............................................................
................................................................
.............................................................
Loading User Symbols
Loading unloaded module list
.......................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff806`669f5780 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffff800b`3617f340=000000000000003b
11: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80666956475, Address of the instruction which caused the bugcheck
Arg3: ffff800b3617fc40, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 8405
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G2EFLS9
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 11367
Key : Analysis.Memory.CommitPeak.Mb
Value: 74
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff80666956475
BUGCHECK_P3: ffff800b3617fc40
BUGCHECK_P4: 0
CONTEXT: ffff800b3617fc40 -- (.cxr 0xffff800b3617fc40)
rax=ffff800b36180690 rbx=ffffa00bff8ae080 rcx=ffff800b36180720
rdx=0000000000000000 rsi=ffffa00bff8ae308 rdi=f7ffa00bff8ae080
rip=fffff80666956475 rsp=ffff800b36180640 rbp=ffff800b36180709
r8=0000000000000008 r9=0000000000000000 r10=0000fffff8066695
r11=ffffbf7d13000000 r12=fffff806669973d0 r13=0000000000000000
r14=0000000000000000 r15=ffff800b36180b00
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050202
nt!KiSchedulerApc+0x45:
fffff806`66956475 448b7778 mov r14d,dword ptr [rdi+78h] ds:002b:f7ffa00b`ff8ae0f8=????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: steam.exe
STACK_TEXT:
ffff800b`36180640 fffff806`66867e19 : 00000000`00000000 ffffa00b`ff8ae080 ffffa00b`ff8ae308 ffffa00b`ff8ae118 : nt!KiSchedulerApc+0x45
ffff800b`36180770 fffff806`66865b77 : 00000000`00000002 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x2e9
ffff800b`36180820 fffff806`66864d7f : ffffa00b`00000005 0000ffff`0000000c ffff800b`361809e0 00001f80`00000000 : nt!KiSwapThread+0x827
ffff800b`361808d0 fffff806`66864623 : ffff800b`000000cd fffff806`00000000 ffffa00c`016e2801 ffffa00b`ff8ae1c0 : nt!KiCommitThreadWait+0x14f
ffff800b`36180970 fffff806`66c2c6a1 : ffffa00c`016e2860 00000000`00000006 00000000`00000001 00000000`00000000 : nt!KeWaitForSingleObject+0x233
ffff800b`36180a60 fffff806`66c2c74a : ffffa00b`ff8ae080 00000000`00000000 00000000`00000000 fffff806`66a07018 : nt!ObWaitForSingleObject+0x91
ffff800b`36180ac0 fffff806`66a071b8 : 00000000`6ec17e40 00000000`0000000b ffff800b`36180b18 ffffffff`ffd9da60 : nt!NtWaitForSingleObject+0x6a
ffff800b`36180b00 00000000`77301cfc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`090df168 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77301cfc
SYMBOL_NAME: nt!KiSchedulerApc+45
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.685
STACK_COMMAND: .cxr 0xffff800b3617fc40 ; kb
BUCKET_ID_FUNC_OFFSET: 45
FAILURE_BUCKET_ID: 0x3B_c0000005_nt!KiSchedulerApc
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e85a6041-adb4-a2f5-2ff7-c19c8aa8e87a}
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\maksu\Downloads\Compressed\010521-7015-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 (Service Pack 3) MP (16 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff800`33c00000 PsLoadedModuleList = 0xfffff800`3482a2b0
Debug session time: Tue Jan 5 02:00:07.447 2021 (UTC + 3:00)
System Uptime: 0 days 7:35:05.133
Loading Kernel Symbols
...............................................................
................................................................
.............................................................
Loading User Symbols
Loading unloaded module list
..........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff800`33ff5780 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffa98c`540a7b40=000000000000000a
12: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 00000000562cac00, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 0000000000000098, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80033ff910f, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 8171
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G2EFLS9
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 10309
Key : Analysis.Memory.CommitPeak.Mb
Value: 75
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: a
BUGCHECK_P1: 562cac00
BUGCHECK_P2: ff
BUGCHECK_P3: 98
BUGCHECK_P4: fffff80033ff910f
READ_ADDRESS: fffff800348fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8003480f330: Unable to get Flags value from nt!KdVersionBlock
fffff8003480f330: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
00000000562cac00
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: dwm.exe
TRAP_FRAME: ffffa98c540a7c80 -- (.trap 0xffffa98c540a7c80)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=00000097a667f330
rdx=0000000000000018 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80033ff910f rsp=ffffa98c540a7e10 rbp=ffffa98c540a7ec0
r8=00000000562cab00 r9=ffffa98c562c9060 r10=ffffa98c540a7fd0
r11=ffffb00ceb321080 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di pl zr na po nc
nt!NtCallbackReturn+0x4f:
fffff800`33ff910f 6641c780000100000000 mov word ptr [r8+100h],0 ds:00000000`562cac00=????
Resetting default scope
STACK_TEXT:
ffffa98c`540a7b38 fffff800`34007769 : 00000000`0000000a 00000000`562cac00 00000000`000000ff 00000000`00000098 : nt!KeBugCheckEx
ffffa98c`540a7b40 fffff800`34003a69 : ffffb00c`002be1c9 ffffb00c`e274c1c0 ffffa98c`549f77b0 ffffb00c`e274c080 : nt!KiBugCheckDispatch+0x69
ffffa98c`540a7c80 fffff800`33ff910f : ffffb00c`e8d26080 ffffa98c`540a7ec0 ffffb00c`e8d26080 00000065`3a9fe2d0 : nt!KiPageFault+0x469
ffffa98c`540a7e10 fffff800`340071b8 : ffffb00c`eb321080 00000000`00000000 00000000`00000000 ffffb00c`00000000 : nt!NtCallbackReturn+0x4f
ffffa98c`540a7e40 00007ff8`f9e4c054 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000097`a667f308 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`f9e4c054
SYMBOL_NAME: nt!NtCallbackReturn+4f
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.685
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 4f
FAILURE_BUCKET_ID: AV_nt!NtCallbackReturn
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {c5e59f8b-b1d8-17df-8284-4f5cbacae96b}
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\maksu\Downloads\Compressed\010421-6953-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 (Service Pack 3) MP (16 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff805`4a400000 PsLoadedModuleList = 0xfffff805`4b02a2b0
Debug session time: Mon Jan 4 18:24:34.950 2021 (UTC + 3:00)
System Uptime: 0 days 0:09:26.637
Loading Kernel Symbols
...............................................................
................................................................
............................................................
Loading User Symbols
Loading unloaded module list
.......
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff805`4a7f5780 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffff805`5046c440=000000000000000a
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000008, value 0 = read operation, 1 = write operation
Arg4: 0000000000000000, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 6093
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G2EFLS9
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 9647
Key : Analysis.Memory.CommitPeak.Mb
Value: 82
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: d1
BUGCHECK_P1: 0
BUGCHECK_P2: 2
BUGCHECK_P3: 8
BUGCHECK_P4: 0
READ_ADDRESS: fffff8054b0fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8054b00f330: Unable to get Flags value from nt!KdVersionBlock
fffff8054b00f330: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000000
PROCESS_NAME: System
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
TRAP_FRAME: fffff8055046c580 -- (.trap 0xfffff8055046c580)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000001 rbx=0000000000000000 rcx=0000000000000001
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=0000000000000000 rsp=fffff8055046c710 rbp=0000000000000000
r8=ffffb001da7c7180 r9=0000000000000000 r10=0000000000000000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
00000000`00000000 ?? ???
Resetting default scope
IP_IN_FREE_BLOCK: 0
FAILED_INSTRUCTION_ADDRESS:
+0
00000000`00000000 ?? ???
STACK_TEXT:
fffff805`5046c438 fffff805`4a807769 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000008 : nt!KeBugCheckEx
fffff805`5046c440 fffff805`4a803a69 : 00000000`00000020 00000000`00000000 00000000`00000064 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff805`5046c580 00000000`00000000 : fffff805`5046c960 fffff805`5046cb20 00000001`51dfbcc1 00000000`00989680 : nt!KiPageFault+0x469
SYMBOL_NAME: nt!KiPageFault+469
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.685
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 469
FAILURE_BUCKET_ID: AV_CODE_AV_NULL_IP_nt!KiPageFault
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {4ce35ff9-c5cf-d66d-0323-0f05e33f6692}
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\maksu\Downloads\Compressed\010421-7671-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Mini Kernel Dump does not have process information
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 (Service Pack 3) MP (16 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Machine Name:
Kernel base = 0xfffff800`33000000 PsLoadedModuleList = 0xfffff800`33c2a2b0
Debug session time: Mon Jan 4 18:04:03.053 2021 (UTC + 3:00)
System Uptime: 0 days 3:17:39.740
Loading Kernel Symbols
..
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
.............................................................
................................................................
................................................................
.
Loading User Symbols
Loading unloaded module list
.........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff800`333f5780 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffff958d`ab75d650=00000000000000a0
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
INTERNAL_POWER_ERROR (a0)
The power policy manager experienced a fatal error.
Arguments:
Arg1: 000000000000010e, The disk subsystem returned corrupt data while reading from the
hibernation file.
Arg2: 000000000000000a
Arg3: 0000000000008371, Incorrect checksum
Arg4: 000000000000be8e, Previous disk read's checksum
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4062
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G2EFLS9
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 5254
Key : Analysis.Memory.CommitPeak.Mb
Value: 76
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
DUMP_FILE_ATTRIBUTES: 0x9
Hiber Crash Dump
Kernel Generated Triage Dump
BUGCHECK_CODE: a0
BUGCHECK_P1: 10e
BUGCHECK_P2: a
BUGCHECK_P3: 8371
BUGCHECK_P4: be8e
CUSTOMER_CRASH_COUNT: 1
STACK_TEXT:
ffff958d`ab75d648 fffff800`339a07ee : 00000000`000000a0 00000000`0000010e 00000000`0000000a 00000000`00008371 : nt!KeBugCheckEx
ffff958d`ab75d650 fffff800`339adc01 : 00000000`00000001 ffffe08f`bb460b90 00000002`07758000 ffffe08f`d4149000 : nt!PopHiberChecksumHiberFileData+0x103ae
ffff958d`ab75d6b0 fffff800`3399fdc7 : 00000000`00000000 ffffbd08`db135f38 00000000`00000001 00000000`00000001 : nt!PopRequestRead+0x7d
ffff958d`ab75d720 fffff800`3398f5d0 : 000025cb`f2426a08 ffffbd08`db135f38 00000000`00000000 00000000`00000000 : nt!PopRestoreHiberContext+0x1069f
ffff958d`ab75d7b0 fffff800`3398f316 : fffff800`33c50460 ffff958d`ab75d930 fffff800`33c50460 00000000`00000100 : nt!PopHandleNextState+0x210
ffff958d`ab75d800 fffff800`3398f093 : 00000000`00000100 fffff800`33c50460 0000001b`9d166555 00000000`00989680 : nt!PopIssueNextState+0x1a
ffff958d`ab75d830 fffff800`33991c99 : 00000000`0000000a ffff958d`ab75db40 00000000`00000000 fffff800`33991a1f : nt!PopInvokeSystemStateHandler+0x33b
ffff958d`ab75da30 fffff800`3398c98a : ffffffff`00000000 ffffffff`ffffffff 00000000`00000000 00000000`00000000 : nt!PopEndMirroring+0x1e9
ffff958d`ab75daf0 fffff800`3398c675 : 00000000`00000000 00000000`00000000 00000000`00000001 00000000`00000000 : nt!MmDuplicateMemory+0x2be
ffff958d`ab75db80 fffff800`33317e25 : ffffe08f`c862c000 ffffe08f`c862c080 fffff800`3398c540 00000000`00000001 : nt!PopTransitionToSleep+0x135
ffff958d`ab75dc10 fffff800`333fcdd8 : ffffa880`2e100180 ffffe08f`c862c080 fffff800`33317dd0 00000000`00000246 : nt!PspSystemThreadStartup+0x55
ffff958d`ab75dc60 00000000`00000000 : ffff958d`ab75e000 ffff958d`ab758000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: nt!PopHiberChecksumHiberFileData+103ae
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.685
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 103ae
FAILURE_BUCKET_ID: 0xa0_10e_nt!PopHiberChecksumHiberFileData
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {28ba2091-a476-6f77-2dec-6241bccd4685}
Followup: MachineOwner
---------
[/CODE]