Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\PC\Desktop\120920-5015-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff804`2a800000 PsLoadedModuleList = 0xfffff804`2b42a2b0
Debug session time: Wed Dec 9 10:02:19.699 2020 (UTC + 3:00)
System Uptime: 0 days 12:45:48.324
Loading Kernel Symbols
...............................................................
................................................................
....................................................
Loading User Symbols
Loading unloaded module list
................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff804`2abf5780 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffbb86`f0378cf0=000000000000000a
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000006afb576127, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8042aa65656, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4030
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-CSC8G7S
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 5911
Key : Analysis.Memory.CommitPeak.Mb
Value: 76
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: a
BUGCHECK_P1: 6afb576127
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8042aa65656
READ_ADDRESS: fffff8042b4fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8042b40f330: Unable to get Flags value from nt!KdVersionBlock
fffff8042b40f330: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000006afb576127
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: EBA Canli Ders.exe
TRAP_FRAME: ffffbb86f0378e30 -- (.trap 0xffffbb86f0378e30)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000002 rbx=0000000000000000 rcx=fffff8042b524440
rdx=0000000000000004 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8042aa65656 rsp=ffffbb86f0378fc0 rbp=0000000000000000
r8=00000000ffffffff r9=000000000000003f r10=0000000000000001
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po cy
nt!KiSwapThread+0x306:
fffff804`2aa65656 f6470204 test byte ptr [rdi+2],4 ds:00000000`00000002=??
Resetting default scope
STACK_TEXT:
ffffbb86`f0378ce8 fffff804`2ac07769 : 00000000`0000000a 0000006a`fb576127 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffbb86`f0378cf0 fffff804`2ac03a69 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffbb86`f0378e30 fffff804`2aa65656 : ffffbd00`fffffffe 00000000`ffffffff ffffd18b`82d4b080 00000000`00000002 : nt!KiPageFault+0x469
ffffbb86`f0378fc0 fffff804`2aa64d7f : ffffd18b`82d4b080 00000000`00000003 ffffbb86`f0379180 00000000`00000000 : nt!KiSwapThread+0x306
ffffbb86`f0379070 fffff804`2aa64623 : 00000000`000000d5 00000000`00000000 00000000`00000001 ffffd18b`82d4b1c0 : nt!KiCommitThreadWait+0x14f
ffffbb86`f0379110 fffff804`2aa43efb : ffffd18b`806857e0 00000000`00000006 00000000`00000001 00000000`00000000 : nt!KeWaitForSingleObject+0x233
ffffbb86`f0379200 fffff804`2adf7740 : ffffbb86`f03795c0 00000000`00000001 00000001`ffffffff fffffff6`00000007 : nt!KeWaitForMultipleObjects+0x45b
ffffbb86`f0379310 fffff804`2aec2dfb : ffffd18b`83a71080 ffffbb86`f0379901 00000000`00000001 fffff804`2abfc744 : nt!ObWaitForMultipleObjects+0x2f0
ffffbb86`f0379810 fffff804`2ac071b8 : 00000000`0712eb80 ffffd18b`82d4b080 00000000`0712eb98 ffffbb86`f0379aa8 : nt!NtWaitForMultipleObjects32+0x11b
ffffbb86`f0379a90 00000000`77551cfc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`0712eb78 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77551cfc
SYMBOL_NAME: nt!KiSwapThread+306
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.662
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 306
FAILURE_BUCKET_ID: AV_nt!KiSwapThread
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {3a5eca23-a992-0c0e-a0ce-d48add0d8eda}
Followup: MachineOwner
---------