1. ************* Preparing the environment for Debugger Extensions Gallery repositories ************** ExtensionRepository : Implicit UseExperimentalFeatureForNugetShare : true AllowNugetExeUpdate : true NonInteractiveNuget : true AllowNugetMSCredentialProviderInstall : true AllowParallelInitializationOfLocalRepositories : true EnableRedirectToChakraJsProvider : false -- Configuring repositories ----> Repository : LocalInstalled, Enabled: true ----> Repository : UserExtensions, Enabled: true >>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds ************* Waiting for Debugger Extensions Gallery to Initialize ************** >>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.422 seconds ----> Repository : UserExtensions, Enabled: true, Packages count: 0 ----> Repository : LocalInstalled, Enabled: true, Packages count: 45 Microsoft (R) Windows Debugger Version 10.0.27871.1001 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Users\kitsuuko\Desktop\1\080225-6000-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available ************* Path validation summary ************** Response Time (ms) Location Deferred srv* Symbol search path is: srv* Executable search path is: Windows 10 Kernel Version 26100 MP (6 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Kernel base = 0xfffff801`b2e00000 PsLoadedModuleList = 0xfffff801`b3cf4c40 Debug session time: Sat Aug 2 17:18:22.793 2025 (UTC + 3:00) System Uptime: 0 days 1:41:52.496 Loading Kernel Symbols .. Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long. Run !sym noisy before .reload to track down problems loading symbols. ............................................................. ................................................................ ................................................................ ... Loading User Symbols PEB is paged out (Peb.Ldr = 00000000`003e1018). Type ".hh dbgerr001" for details Loading unloaded module list ............... For analysis of this file, run !analyze -v nt!KeBugCheckEx: fffff801`b33005d0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffc009`9c1b4500=000000000000000a 3: kd> !analyze -v Loading Kernel Symbols .. Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long. Run !sym noisy before .reload to track down problems loading symbols. ............................................................. ................................................................ ................................................................ ... Loading User Symbols PEB is paged out (Peb.Ldr = 00000000`003e1018). Type ".hh dbgerr001" for details Loading unloaded module list ............... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: 0000000000000000, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000000, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: fffff801b307d119, address which referenced memory Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 1937 Key : Analysis.Elapsed.mSec Value: 2156 Key : Analysis.IO.Other.Mb Value: 0 Key : Analysis.IO.Read.Mb Value: 1 Key : Analysis.IO.Write.Mb Value: 0 Key : Analysis.Init.CPU.mSec Value: 937 Key : Analysis.Init.Elapsed.mSec Value: 50067 Key : Analysis.Memory.CommitPeak.Mb Value: 106 Key : Analysis.Version.DbgEng Value: 10.0.27871.1001 Key : Analysis.Version.Description Value: 10.2505.01.02 amd64fre Key : Analysis.Version.Ext Value: 1.2505.1.2 Key : Bugcheck.Code.LegacyAPI Value: 0xa Key : Bugcheck.Code.TargetModel Value: 0xa Key : Dump.Attributes.AsUlong Value: 0x21008 Key : Dump.Attributes.DiagDataWrittenToHeader Value: 1 Key : Dump.Attributes.ErrorCode Value: 0x0 Key : Dump.Attributes.KernelGeneratedTriageDump Value: 1 Key : Dump.Attributes.LastLine Value: Dump completed successfully. Key : Dump.Attributes.ProgressPercentage Value: 0 Key : Failure.Bucket Value: AV_nt!KiScheduleThreadToRescheduleContext Key : Failure.Exception.IP.Address Value: 0xfffff801b307d119 Key : Failure.Exception.IP.Module Value: nt Key : Failure.Exception.IP.Offset Value: 0x27d119 Key : Failure.Hash Value: {cab15af6-9142-6288-8aae-d03854b61005} BUGCHECK_CODE: a BUGCHECK_P1: 0 BUGCHECK_P2: 2 BUGCHECK_P3: 0 BUGCHECK_P4: fffff801b307d119 FILE_IN_CAB: 080225-6000-01.dmp DUMP_FILE_ATTRIBUTES: 0x21008 Kernel Generated Triage Dump FAULTING_THREAD: ffffd70abe019080 READ_ADDRESS: fffff801b3dc44c0: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd unable to get nt!MmSpecialPagesInUse 0000000000000000 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: Tanki.exe STACK_TEXT: ffffc009`9c1b44f8 fffff801`b34b96e9 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx ffffc009`9c1b4500 fffff801`b34b49a8 : ffffc300`ba3e7000 ffffd70a`be019080 ffffc300`ba2b7180 fffff801`b34ad6cc : nt!KiBugCheckDispatch+0x69 ffffc009`9c1b4640 fffff801`b307d119 : ffffd70a`be019080 fffff801`b312fb0e 00000000`00000047 ffffc009`9c1b4a20 : nt!KiPageFault+0x468 ffffc009`9c1b47d0 fffff801`b307e9f0 : ffffd70a`becf4080 ffffd70a`becf4080 00000000`00000001 ffffc300`ba2b7180 : nt!KiScheduleThreadToRescheduleContext+0x19 ffffc009`9c1b4810 fffff801`b3090a79 : ffffd70a`00000000 00000000`00000000 ffffc300`ba2b7181 ffffd70a`ad78fe40 : nt!KiSearchForNewThreadsForRescheduleContext+0x3a0 ffffc009`9c1b4990 fffff801`b308ffb3 : ffffd70a`be019080 ffffc300`ba2b7181 00000000`00000000 00000000`00000000 : nt!KeYieldExecution+0x259 ffffc009`9c1b4a10 fffff801`b3661bce : 00000000`00000000 00000000`4bdb4050 ffffc009`9c1b4af0 00000000`00000000 : nt!KeDelayExecutionThread+0x43 ffffc009`9c1b4ab0 fffff801`b34b8d58 : 0000000e`3b690000 00000000`4bdb3f70 00000000`00000000 00000000`0029c000 : nt!NtDelayExecution+0x5e ffffc009`9c1b4ae0 00007ffd`59b82454 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28 00000000`4bdb3f08 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`59b82454 SYMBOL_NAME: nt!KiScheduleThreadToRescheduleContext+19 MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe IMAGE_VERSION: 10.0.26100.4652 STACK_COMMAND: .process /r /p 0xffffd70abc888080; .thread 0xffffd70abe019080 ; kb BUCKET_ID_FUNC_OFFSET: 19 FAILURE_BUCKET_ID: AV_nt!KiScheduleThreadToRescheduleContext OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {cab15af6-9142-6288-8aae-d03854b61005} Followup: MachineOwner --------- 2. ************* Preparing the environment for Debugger Extensions Gallery repositories ************** ExtensionRepository : Implicit UseExperimentalFeatureForNugetShare : true AllowNugetExeUpdate : true NonInteractiveNuget : true AllowNugetMSCredentialProviderInstall : true AllowParallelInitializationOfLocalRepositories : true EnableRedirectToChakraJsProvider : false -- Configuring repositories ----> Repository : LocalInstalled, Enabled: true ----> Repository : UserExtensions, Enabled: true >>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds ************* Waiting for Debugger Extensions Gallery to Initialize ************** >>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.032 seconds ----> Repository : UserExtensions, Enabled: true, Packages count: 0 ----> Repository : LocalInstalled, Enabled: true, Packages count: 45 Microsoft (R) Windows Debugger Version 10.0.27871.1001 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Users\kitsuuko\Desktop\1\080225-6250-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available ************* Path validation summary ************** Response Time (ms) Location Deferred srv* Symbol search path is: srv* Executable search path is: Windows 10 Kernel Version 26100 MP (6 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Kernel base = 0xfffff802`cc200000 PsLoadedModuleList = 0xfffff802`cd0f4c40 Debug session time: Sat Aug 2 19:44:44.555 2025 (UTC + 3:00) System Uptime: 0 days 0:29:04.258 Loading Kernel Symbols .. Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long. Run !sym noisy before .reload to track down problems loading symbols. ............................................................. ................................................................ ................................................................ ... Loading User Symbols PEB is paged out (Peb.Ldr = 000000f0`4cdb2018). Type ".hh dbgerr001" for details Loading unloaded module list ............ For analysis of this file, run !analyze -v nt!KeBugCheckEx: fffff802`cc7005d0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffff9d0d`49dfe400=000000000000000a 3: kd> !analyze -v Loading Kernel Symbols .. Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long. Run !sym noisy before .reload to track down problems loading symbols. ............................................................. ................................................................ ................................................................ ... Loading User Symbols PEB is paged out (Peb.Ldr = 000000f0`4cdb2018). Type ".hh dbgerr001" for details Loading unloaded module list ............ ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: 0000000000000030, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000001, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: fffff802cc42db69, address which referenced memory Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 2328 Key : Analysis.Elapsed.mSec Value: 17858 Key : Analysis.IO.Other.Mb Value: 0 Key : Analysis.IO.Read.Mb Value: 1 Key : Analysis.IO.Write.Mb Value: 6 Key : Analysis.Init.CPU.mSec Value: 968 Key : Analysis.Init.Elapsed.mSec Value: 26093 Key : Analysis.Memory.CommitPeak.Mb Value: 127 Key : Analysis.Version.DbgEng Value: 10.0.27871.1001 Key : Analysis.Version.Description Value: 10.2505.01.02 amd64fre Key : Analysis.Version.Ext Value: 1.2505.1.2 Key : Bugcheck.Code.LegacyAPI Value: 0xa Key : Bugcheck.Code.TargetModel Value: 0xa Key : Dump.Attributes.AsUlong Value: 0x21008 Key : Dump.Attributes.DiagDataWrittenToHeader Value: 1 Key : Dump.Attributes.ErrorCode Value: 0x0 Key : Dump.Attributes.KernelGeneratedTriageDump Value: 1 Key : Dump.Attributes.LastLine Value: Dump completed successfully. Key : Dump.Attributes.ProgressPercentage Value: 0 Key : Failure.Bucket Value: AV_win32kbase!_lambda_63b61c2369133a205197eda5bd671ee7_::_lambda_invoker_cdecl_ Key : Failure.Exception.IP.Address Value: 0xfffff802cc42db69 Key : Failure.Exception.IP.Module Value: nt Key : Failure.Exception.IP.Offset Value: 0x22db69 Key : Failure.Hash Value: {97cde890-d41d-0b64-8a62-9f9cc6a37cce} BUGCHECK_CODE: a BUGCHECK_P1: 30 BUGCHECK_P2: 2 BUGCHECK_P3: 1 BUGCHECK_P4: fffff802cc42db69 FILE_IN_CAB: 080225-6250-01.dmp DUMP_FILE_ATTRIBUTES: 0x21008 Kernel Generated Triage Dump FAULTING_THREAD: ffffbf8c4c2cc080 WRITE_ADDRESS: fffff802cd1c44c0: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd unable to get nt!MmSpecialPagesInUse 0000000000000030 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: Telegram.exe STACK_TEXT: ffff9d0d`49dfe3f8 fffff802`cc8b96e9 : 00000000`0000000a 00000000`00000030 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx ffff9d0d`49dfe400 fffff802`cc8b49a8 : 00000000`00000006 fffff74e`86a3daf0 00000000`00000000 00000000`00000006 : nt!KiBugCheckDispatch+0x69 ffff9d0d`49dfe540 fffff802`cc42db69 : ffff9d0d`0000007e ffff9d0d`49dfe7d0 00000000`00000000 ffff9d0d`49dfe760 : nt!KiPageFault+0x468 ffff9d0d`49dfe6d0 fffff802`cc5676d3 : ffffbf8c`4c2cc080 00000000`00000008 ffff9d0d`49dfe938 ffff9d0d`49dfe940 : nt!KiDeferredReadySingleThread+0x1db9 ffff9d0d`49dfe900 fffff802`cc526051 : ffffbf8c`4c2cc080 ffffe581`d20b7180 ffff9d0d`49dfeae8 fffff802`000000fd : nt!KiSwapThread+0x193 ffff9d0d`49dfe9d0 fffff802`cc524ed3 : ffff9d0d`00000000 ffff8d0b`000000fd 00000000`00000002 00000003`33269e91 : nt!KiCommitThreadWait+0x271 ffff9d0d`49dfea70 fffff802`cc51baf2 : ffff9d0d`49dfec60 00000000`0000001b 00000000`00000000 00000000`00000000 : nt!KeWaitForSingleObject+0x773 ffff9d0d`49dfeb60 fffff802`cc51b7d5 : ffffbf8c`4916f610 ffff9d0d`49dfec48 00000000`00010224 00000000`00000000 : nt!ExpWaitForFastResource+0x92 ffff9d0d`49dfec10 fffff802`cc51b49d : 00000000`00000000 ffffbf8c`4916f650 ffffbf8c`4c2cc080 00000000`00000000 : nt!ExpAcquireFastResourceExclusiveSlow+0x1e5 ffff9d0d`49dfecc0 fffff802`6c40ca9b : 00000000`00000000 000000f0`4cefc128 ffffbf8c`4916f610 fffff802`cc5717e2 : nt!ExAcquireFastResourceExclusive+0x1bd ffff9d0d`49dfed20 fffff802`6c40cbe5 : ffffbf8c`49180000 ffffbf8c`53e3a540 00000000`00040246 fffff802`6c2e1460 : win32kbase!::+0x2b ffff9d0d`49dfed50 fffff802`6c3ccd34 : 00000000`00000000 00000000`00000000 00000000`00000000 ffffbf8c`49180000 : win32kbase!UserCritInternal::`anonymous namespace'::EnterCritInternalEx+0x4d ffff9d0d`49dfed80 fffff802`6c6d3bd4 : 00000000`00000000 00000000`00000000 00000000`00000001 00000000`00000000 : win32kbase!EnterCrit+0x44 ffff9d0d`49dfedb0 fffff802`5e0b1e95 : 00000000`00000000 00000000`00000000 00000000`00000001 000000f0`4cefc128 : win32kfull!NtUserCallNextHookEx+0x34 ffff9d0d`49dfede0 fffff802`cc8b8d58 : ffffbf8c`4c2cc080 ffff9d0d`49dfeea0 000000f0`4cdb3000 ffff9d0d`49ca7c70 : win32k!NtUserCallNextHookEx+0x55 ffff9d0d`49dfee20 00007ffb`4a4c1624 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28 000000f0`4cefbee8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`4a4c1624 SYMBOL_NAME: win32kbase!::+2b MODULE_NAME: win32kbase IMAGE_NAME: win32kbase.sys IMAGE_VERSION: 10.0.26100.4652 STACK_COMMAND: .process /r /p 0xffffbf8c4e8540c0; .thread 0xffffbf8c4c2cc080 ; kb BUCKET_ID_FUNC_OFFSET: 2b FAILURE_BUCKET_ID: AV_win32kbase!_lambda_63b61c2369133a205197eda5bd671ee7_::_lambda_invoker_cdecl_ OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {97cde890-d41d-0b64-8a62-9f9cc6a37cce} Followup: MachineOwner --------- 3. ************* Preparing the environment for Debugger Extensions Gallery repositories ************** ExtensionRepository : Implicit UseExperimentalFeatureForNugetShare : true AllowNugetExeUpdate : true NonInteractiveNuget : true AllowNugetMSCredentialProviderInstall : true AllowParallelInitializationOfLocalRepositories : true EnableRedirectToChakraJsProvider : false -- Configuring repositories ----> Repository : LocalInstalled, Enabled: true ----> Repository : UserExtensions, Enabled: true >>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds ************* Waiting for Debugger Extensions Gallery to Initialize ************** >>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.016 seconds ----> Repository : UserExtensions, Enabled: true, Packages count: 0 ----> Repository : LocalInstalled, Enabled: true, Packages count: 45 Microsoft (R) Windows Debugger Version 10.0.27871.1001 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Users\kitsuuko\Desktop\1\080225-6750-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available ************* Path validation summary ************** Response Time (ms) Location Deferred srv* Symbol search path is: srv* Executable search path is: Windows 10 Kernel Version 26100 MP (6 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Kernel base = 0xfffff802`97c00000 PsLoadedModuleList = 0xfffff802`98af4c40 Debug session time: Sat Aug 2 15:36:09.875 2025 (UTC + 3:00) System Uptime: 0 days 0:07:36.577 Loading Kernel Symbols .. Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long. Run !sym noisy before .reload to track down problems loading symbols. ............................................................. ................................................................ ................................................................ ... Loading User Symbols Loading unloaded module list ......... For analysis of this file, run !analyze -v nt!KeBugCheckEx: fffff802`981005d0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffff681`94e7d0e0=000000000000000a 3: kd> !analyze -v Loading Kernel Symbols .. Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long. Run !sym noisy before .reload to track down problems loading symbols. ............................................................. ................................................................ ................................................................ ... Loading User Symbols Loading unloaded module list ......... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: fffff80200000025, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000000, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: fffff80297e78574, address which referenced memory Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 1578 Key : Analysis.Elapsed.mSec Value: 1640 Key : Analysis.IO.Other.Mb Value: 0 Key : Analysis.IO.Read.Mb Value: 1 Key : Analysis.IO.Write.Mb Value: 0 Key : Analysis.Init.CPU.mSec Value: 1015 Key : Analysis.Init.Elapsed.mSec Value: 26150 Key : Analysis.Memory.CommitPeak.Mb Value: 106 Key : Analysis.Version.DbgEng Value: 10.0.27871.1001 Key : Analysis.Version.Description Value: 10.2505.01.02 amd64fre Key : Analysis.Version.Ext Value: 1.2505.1.2 Key : Bugcheck.Code.LegacyAPI Value: 0xa Key : Bugcheck.Code.TargetModel Value: 0xa Key : Dump.Attributes.AsUlong Value: 0x21008 Key : Dump.Attributes.DiagDataWrittenToHeader Value: 1 Key : Dump.Attributes.ErrorCode Value: 0x0 Key : Dump.Attributes.KernelGeneratedTriageDump Value: 1 Key : Dump.Attributes.LastLine Value: Dump completed successfully. Key : Dump.Attributes.ProgressPercentage Value: 0 Key : Failure.Bucket Value: AV_nt!KiHeteroSelectIdleProcessorFromSubNode Key : Failure.Exception.IP.Address Value: 0xfffff80297e78574 Key : Failure.Exception.IP.Module Value: nt Key : Failure.Exception.IP.Offset Value: 0x278574 Key : Failure.Hash Value: {5f052f63-19f4-2a91-b06a-029828a7d429} BUGCHECK_CODE: a BUGCHECK_P1: fffff80200000025 BUGCHECK_P2: 2 BUGCHECK_P3: 0 BUGCHECK_P4: fffff80297e78574 FILE_IN_CAB: 080225-6750-01.dmp DUMP_FILE_ATTRIBUTES: 0x21008 Kernel Generated Triage Dump FAULTING_THREAD: ffffb881bc789280 READ_ADDRESS: fffff80298bc44c0: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd unable to get nt!MmSpecialPagesInUse fffff80200000025 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: System STACK_TEXT: fffff681`94e7d0d8 fffff802`982b96e9 : 00000000`0000000a fffff802`00000025 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx fffff681`94e7d0e0 fffff802`982b49a8 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`0000003f : nt!KiBugCheckDispatch+0x69 fffff681`94e7d220 fffff802`97e78574 : 00000000`00000000 fffff802`97e7ef4c fffff802`26423180 00000000`00000000 : nt!KiPageFault+0x468 fffff681`94e7d3b0 fffff802`97e2ccf6 : 00000000`00000000 fffff681`94e7d570 ffffa481`8deb7180 00000000`00000000 : nt!KiHeteroSelectIdleProcessorFromSubNode+0x94 fffff681`94e7d470 fffff802`97e268c6 : ffffb881`cc9dd1f0 00000000`00000000 ffffb881`cc9dd1f0 fffff681`94e7d8e8 : nt!KiDeferredReadySingleThread+0xf46 fffff681`94e7d6a0 fffff802`97f5171f : ffffa481`00000014 fffff802`00000001 fffff681`00000000 fffff802`00000002 : nt!KiProcessThreadWaitList+0x106 fffff681`94e7d740 fffff802`97f523f5 : 00000001`10242f75 00000000`0000000f fffff681`94e7d979 ffffa481`8deb7180 : nt!KiProcessExpiredTimerList+0x10f fffff681`94e7d870 fffff802`97ec8235 : 00000000`00000000 00000000`00000000 ffffa481`8deb7180 ffffb881`bc789280 : nt!KiTimerExpiration+0x2b5 fffff681`94e7d9b0 fffff802`982a66be : ffffa481`8deb7180 ffffa481`8deb7180 00000000`00000000 00000000`00000000 : nt!KiRetireDpcList+0xc45 fffff681`94e7dc40 00000000`00000000 : fffff681`94e7e000 fffff681`94e78000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e SYMBOL_NAME: nt!KiHeteroSelectIdleProcessorFromSubNode+94 MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe IMAGE_VERSION: 10.0.26100.4652 STACK_COMMAND: .process /r /p 0xfffff80298bcef80; .thread 0xffffb881bc789280 ; kb BUCKET_ID_FUNC_OFFSET: 94 FAILURE_BUCKET_ID: AV_nt!KiHeteroSelectIdleProcessorFromSubNode OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {5f052f63-19f4-2a91-b06a-029828a7d429} Followup: MachineOwner --------- 4. ************* Preparing the environment for Debugger Extensions Gallery repositories ************** ExtensionRepository : Implicit UseExperimentalFeatureForNugetShare : true AllowNugetExeUpdate : true NonInteractiveNuget : true AllowNugetMSCredentialProviderInstall : true AllowParallelInitializationOfLocalRepositories : true EnableRedirectToChakraJsProvider : false -- Configuring repositories ----> Repository : LocalInstalled, Enabled: true ----> Repository : UserExtensions, Enabled: true >>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds ************* Waiting for Debugger Extensions Gallery to Initialize ************** >>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.015 seconds ----> Repository : UserExtensions, Enabled: true, Packages count: 0 ----> Repository : LocalInstalled, Enabled: true, Packages count: 45 Microsoft (R) Windows Debugger Version 10.0.27871.1001 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Users\kitsuuko\Desktop\1\080225-7484-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available ************* Path validation summary ************** Response Time (ms) Location Deferred srv* Symbol search path is: srv* Executable search path is: Windows 10 Kernel Version 26100 MP (6 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Kernel base = 0xfffff800`d3a00000 PsLoadedModuleList = 0xfffff800`d48f4c40 Debug session time: Sat Aug 2 20:28:22.182 2025 (UTC + 3:00) System Uptime: 0 days 0:43:19.885 Loading Kernel Symbols .. Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long. Run !sym noisy before .reload to track down problems loading symbols. ............................................................. ................................................................ ................................................................ ... Loading User Symbols PEB is paged out (Peb.Ldr = 00000092`db9ef018). Type ".hh dbgerr001" for details Loading unloaded module list ......... For analysis of this file, run !analyze -v nt!KeBugCheckEx: fffff800`d3f005d0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffa50b`2f387390=000000000000000a 3: kd> !analyze -v Loading Kernel Symbols .. Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long. Run !sym noisy before .reload to track down problems loading symbols. ............................................................. ................................................................ ................................................................ ... Loading User Symbols PEB is paged out (Peb.Ldr = 00000092`db9ef018). Type ".hh dbgerr001" for details Loading unloaded module list ......... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: 0000000000000030, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000001, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: fffff800d3c2d0a9, address which referenced memory Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 1578 Key : Analysis.Elapsed.mSec Value: 1633 Key : Analysis.IO.Other.Mb Value: 0 Key : Analysis.IO.Read.Mb Value: 1 Key : Analysis.IO.Write.Mb Value: 0 Key : Analysis.Init.CPU.mSec Value: 812 Key : Analysis.Init.Elapsed.mSec Value: 25032 Key : Analysis.Memory.CommitPeak.Mb Value: 106 Key : Analysis.Version.DbgEng Value: 10.0.27871.1001 Key : Analysis.Version.Description Value: 10.2505.01.02 amd64fre Key : Analysis.Version.Ext Value: 1.2505.1.2 Key : Bugcheck.Code.LegacyAPI Value: 0xa Key : Bugcheck.Code.TargetModel Value: 0xa Key : Dump.Attributes.AsUlong Value: 0x21008 Key : Dump.Attributes.DiagDataWrittenToHeader Value: 1 Key : Dump.Attributes.ErrorCode Value: 0x0 Key : Dump.Attributes.KernelGeneratedTriageDump Value: 1 Key : Dump.Attributes.LastLine Value: Dump completed successfully. Key : Dump.Attributes.ProgressPercentage Value: 0 Key : Failure.Bucket Value: AV_nt!KiDeferredReadySingleThread Key : Failure.Exception.IP.Address Value: 0xfffff800d3c2d0a9 Key : Failure.Exception.IP.Module Value: nt Key : Failure.Exception.IP.Offset Value: 0x22d0a9 Key : Failure.Hash Value: {626f59d5-90cc-ab48-85f0-60e170096c96} BUGCHECK_CODE: a BUGCHECK_P1: 30 BUGCHECK_P2: 2 BUGCHECK_P3: 1 BUGCHECK_P4: fffff800d3c2d0a9 FILE_IN_CAB: 080225-7484-01.dmp DUMP_FILE_ATTRIBUTES: 0x21008 Kernel Generated Triage Dump FAULTING_THREAD: ffff8882e22670c0 WRITE_ADDRESS: fffff800d49c44c0: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd unable to get nt!MmSpecialPagesInUse 0000000000000030 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: audiodg.exe STACK_TEXT: ffffa50b`2f387388 fffff800`d40b96e9 : 00000000`0000000a 00000000`00000030 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx ffffa50b`2f387390 fffff800`d40b49a8 : ffff8882`e63efaa0 ffff8882`e28d6a40 00000000`00000000 00000000`0000000f : nt!KiBugCheckDispatch+0x69 ffffa50b`2f3874d0 fffff800`d3c2d0a9 : 00000000`00000000 00000000`00000000 ffffd081`3a347180 ffffa50b`2f3876f0 : nt!KiPageFault+0x468 ffffa50b`2f387660 fffff800`d3c268c6 : 00000000`00000000 00000000`00000220 ffff8882`e0420260 00000000`00000000 : nt!KiDeferredReadySingleThread+0x12f9 ffffa50b`2f387890 fffff800`d3c265bc : 00000000`00000000 00000000`00000001 ffffd081`00000001 00000000`00000000 : nt!KiProcessThreadWaitList+0x106 ffffa50b`2f387930 fffff800`d3cc2f8f : 00000000`00000000 00000000`000007b8 ffff8882`e86e3080 00000000`00000001 : nt!KiExitDispatcher+0x4c ffffa50b`2f387990 fffff800`d43958de : 00000000`00000000 00000000`00000001 00000092`dbeff200 ffffd081`3a2b7180 : nt!KeSetEvent+0x10f ffffa50b`2f387a30 fffff800`d439580c : ffff8882`e22670c0 00000000`00000001 00000000`00000000 00000000`00000000 : nt!NtSetEventEx+0xbe ffffa50b`2f387ab0 fffff800`d40b8d58 : ffff8882`e2267000 00000285`7977c8d8 ffff8882`e22670c0 00000000`00000001 : nt!NtSetEvent+0xc ffffa50b`2f387ae0 00007ff9`023a1f94 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28 00000092`dbeff4a8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`023a1f94 SYMBOL_NAME: nt!KiDeferredReadySingleThread+12f9 MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe IMAGE_VERSION: 10.0.26100.4652 STACK_COMMAND: .process /r /p 0xffff8882dfdbf080; .thread 0xffff8882e22670c0 ; kb BUCKET_ID_FUNC_OFFSET: 12f9 FAILURE_BUCKET_ID: AV_nt!KiDeferredReadySingleThread OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {626f59d5-90cc-ab48-85f0-60e170096c96} Followup: MachineOwner ---------