Çözüldü DRIVER_IRQL_NOT_LESS_OR_EQUAL mavi ekran hataları

Bu konu çözüldü olarak işaretlenmiştir. Çözülmediğini düşünüyorsanız konuyu rapor edebilirsiniz.
Durum
Mesaj gönderimine kapalı.
İşletim sistemi
Windows 10

utkuedoğdu

Hectopat
Katılım
19 Mayıs 2020
Mesajlar
71
Çözümler
1
Merhaba arkadaşlar, 5-6 aydır çektiğim sorunu sizlerle paylaşayım. Sürekli bilgisayar mavi ekran hataları veriyor. Biraz araştırma sonucu ekran kartından kaynaklandığını öğrendim, RX570 8 GB 256 Bit ekran kartı. Artık yoruldum, ne yaptıysam olmadı, düzelmedi. Artık çıldırma noktasına geldim. Casper Excalibur E600 serisi sıfır olarak aldım. Bilen varsa bir yardımcı olsun.

PC Özellikleri:
  • i5-9400F 2.9GHz Turbo 4.10GHz
  • AMD Radeon RX570 8 GB 256 Bit GDDR5
  • 16 GB RAM
  • 240 GB SSD + 1 TB HDD

Arkadaşlar mavi ekran hatalarından bıktım devamlı mavi ekran hatası alıyorum, hata aldıkça paylaşmaya devam edeceğim, 1 yıldır çıldırma noktasına geldim. Yardımcı olursanız sevinirim.
Not: Daha önce Memtest yapılmıştır.
BIOS güncellemesi yapılmıştır.

Minidump dosyaları:

Arkadaşlar bilgisayarı kırma noktasına geldim. Şu mavi ekran hatalı beni her şeyden bezdirdi. Bir bakarsanız sevinirim hata sebebine.

Not: Daha önce Memtest yapılmıştır.


Arkadaşlar bir türlü çözüm bulunamıyor bir destek lütfen.
PC özellikleri:
i5-9400F 2.9GHz Turbo 4.10GHz.
AMD Radeon RX570 8 GB 256 Bit GDDR5.
16 GB RAM.
240 GB SSD + 1 TB HDD.
@KojiroHyuga04 @The G.O.A.T
Minidump:

Bu önemli bir hata olsa gerek PC'yi kapatıp BIOS'a attı tamamen kapandı sonra.
Minidump:

Bilgisayarımı kullanamıyorum bile 5 dakikada bir mavi ekran verip duruyor arkadaşlar. Çıldırdım, satacağım bilgisayarı o noktadayım.
  • BIOS güncellemesi yapıldı.
  • Ağ sürücüleri kaldırıldı kuruldu.
  • Memtest yapıldı.
PC özellikleri:
  • i5-9400F 2.9GHz Turbo 4.10GHz.
  • AMD Radeon RX570 8 GB 256 Bit GDDR5.
  • 16 GB RAM.
  • 240 GB SSD + 1 TB HDD.
Olay dosyaları:


Minidump:


Arkadaşlar mavi ekran hatalarından dolayı işletim sistemini Windows 8.1 yaptım ama ardı kesilmiyor mavi ekran hataları devam ediyor artık bıktım. Sizlere zahmet bir bakarsanız çok sevinirim.
-BIOS güncellemesi yapıldı.
-Ağ sürücüleri kaldırıldı kuruldu.
-MemTest yapıldı.

PC özellikleri:
  • i5-9400F 2.9GHz Turbo 4.10GHz.
  • AMD Radeon RX570 8 GB 256 Bit GDDR5.
  • 16 GB RAM.
  • 240 GB SSD + 1 TB HDD.
MiniDump:
Arkadaşlar mavi ekran hatalarından dolayı işletim sistemini Windows 8.1 yaptım ama ardı kesilmiyor mavi ekran hataları devam ediyor artık bıktım. Sizlere zahmet bir bakarsanız çok sevinirim.
-BIOS güncellemesi yapıldı.
-Ağ sürücüleri kaldırıldı kuruldu.
-MemTest yapıldı.

PC özellikleri:
  • i5-9400F 2.9GHz Turbo 4.10GHz.
  • AMD Radeon RX570 8 GB 256 Bit GDDR5.
  • 16 GB RAM.
  • 240 GB SSD + 1 TB HDD.
MiniDump:
Yeni bir hata aldım önemli gibi
Minidump:
@Ma'at @KojiroHyuga04 @The G.O.A.T
Arkadaşlar rica ediyorum ilgilenecek misiniz? Yoksa ben bu bilgisayarı fırlatıp atacağım cinnet geçirme noktasındayım zaten vura vura kasayı yamulttum yeter artık gına geldi bir bakın 2 dakika olmazsa zaten daha kırıp atıyorum. @Ma'at @KojiroHyuga04 @The G.O.A.T
 
Çözüm
Zaten bunu sana dedim:

Evet, harici bir ağ kartı almak en uygun fiyatlı çözüm. BIOS'tan dahili olanı da devre dışı bırakabilirsin.

@Recep Baltaş abi PC servise gönderdim, şimdi geri gelecek. Wi-Fi kartı var kasada, aygıt yöneticisinden LAN interneti devre dışı bırakıp Wi-Fi'den girmeyi denedim, olmamıştı. Bir bakar mısın sence bunlardan kaynaklanmış olabilir mi? Saçma geldi, serviste şunlar yapılmış:

629F66BA-4BFF-45B6-A0ED-31F86A62D062.png


Şahsen gidip parça alıp garantisini yakmak istemiyorum :/
Peki port almadan Wi-Fi kartı ile işlem yapabilir miyim? Denemek amaçlı, aynı işlemi görür mü Ethernet kartı almak yerine?

Az önce Windows 10 kurulum videonuzu izledim. GPT kısmını ayarlamazdım. MBR olarak kurulurdu, acaba sürücülerin ve donanımların düzgün çalışmayıp hata verme sebebi bu olabilir mi? PC FreeDOS gelmişti ve ben direkt Windows medya yükleyicisi ile yükledim.

Bilgisayar teknik servise gitti geldi, teknik servis temizlik yapmış. Bir de sistem dosyalarını onarmış. Donanımsal bir arza olmayıp hataların tamamı yazılımsal olduğu belli oldu. Konu çözülmüştür hepinize teşekkür ederim.
  • Tek mobül takılı iken de hata aldınız mı?
  • İşlemcinin üstündeki soğutucu nedir?

Evet defalarca aldım hata. İşlemcinin soğutucusu Intel'e ait kendi kutusundan çıkan soğutucu. Şu anda Win 8 kurdum işletim sistemi herhangi bir çökme yaşamadım hala. Ama kurulum sırasında birkaç mavi ekran yaşadım. Anlamadığım kısım şurası özellikle tüm tarayıcılarda çökme yaşıyorum aldığım ilk günden beri, yani 10 15 saniyede çöküyor.
Şu anda tekrardan hata aldım. Mavi ekran verdi kapandı açıldı yine verdi.
@Recep Baltaş abi istersen Discord falan üzerinden de bakabiliriz şu sorunu çözelim başka bir şey istemiyorum. Aldığım günden beri böyle sadece bir zaman önüne geçtim yine aynı, bilgisayardan soğudum o derece durum.
 
42 tane döküme tek tek baktım. Çıkardığım sonuç: Ya anakartın arızalı ya da kartın üstündeki ağ kontrolcü.

Bir de PSU modelini de belirt ama PSU kaynaklı olduğunu düşünmüyorum.

Ya anakartını değiş -ki benim tavsiye edeceğim budur- ya da harici bir ağ kartı ile dene.

Ağ kartı/sürücüsü kaynaklı gibi gözükenler:

Kod:
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffff8050000363c, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000008, value 0 = read operation, 1 = write operation
Arg4: fffff80553ff363c, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 7139

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 22981

    Key  : Analysis.Init.CPU.mSec
    Value: 859

    Key  : Analysis.Init.Elapsed.mSec
    Value: 1669

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 88

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  d1

BUGCHECK_P1: fffff8050000363c

BUGCHECK_P2: 2

BUGCHECK_P3: 8

BUGCHECK_P4: fffff80553ff363c

READ_ADDRESS: fffff8054f4fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
fffff8050000363c

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  fffff805549fd3a0 -- (.trap 0xfffff805549fd3a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000040 rbx=0000000000000000 rcx=ffff80073410b630
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80553ff363c rsp=fffff805549fd538 rbp=fffff805549fd640
r8=00000000000305ce  r9=0000000000032dbf r10=ffff80073410b000
r11=ffff80073410ba30 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
NETIO!RtlGetNextExpirationTimerWheelTick+0x4c:
fffff805`53ff363c 4883c118        add     rcx,18h
Resetting default scope

STACK_TEXT: 
fffff805`549fd258 fffff805`4ec07b69     : 00000000`0000000a fffff805`0000363c 00000000`00000002 00000000`00000008 : nt!KeBugCheckEx
fffff805`549fd260 fffff805`4ec03e69     : 00000000`ffffffff 00000000`00000000 00000000`00000000 ffff8007`3a4f77c8 : nt!KiBugCheckDispatch+0x69
fffff805`549fd3a0 fffff805`53ff363c     : fffff805`540cf512 00000000`0002d527 00000000`00000000 fffff805`00000006 : nt!KiPageFault+0x469
fffff805`549fd538 fffff805`540cf512     : 00000000`0002d527 00000000`00000000 fffff805`00000006 00000000`0002d527 : NETIO!RtlGetNextExpirationTimerWheelTick+0x4c
fffff805`549fd540 fffff805`4ea0781e     : fffff805`4ba5a240 00000000`00000000 fffff805`549fda20 fffff805`4ba57180 : tcpip!TcpPeriodicTimeoutHandler+0xa72
fffff805`549fd760 fffff805`4ea06b04     : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x30e
fffff805`549fd8d0 fffff805`4ebf97be     : 00000000`00000000 fffff805`4ba57180 fffff805`4f527600 ffff8007`4048c080 : nt!KiRetireDpcList+0x1f4
fffff805`549fdb60 00000000`00000000     : fffff805`549fe000 fffff805`549f7000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e


SYMBOL_NAME:  NETIO!RtlGetNextExpirationTimerWheelTick+4c

MODULE_NAME: NETIO

IMAGE_NAME:  NETIO.SYS

IMAGE_VERSION:  10.0.19041.610

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  4c

FAILURE_BUCKET_ID:  AV_NETIO!RtlGetNextExpirationTimerWheelTick

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {832c4dc1-73b9-2c91-516c-cde32f637c45}

Followup:     MachineOwner
---------


DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffff807089f3630, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000008, value 0 = read operation, 1 = write operation
Arg4: fffff8076b9f3630, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 8155

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 34458

    Key  : Analysis.Init.CPU.mSec
    Value: 780

    Key  : Analysis.Init.Elapsed.mSec
    Value: 1670

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 88

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  d1

BUGCHECK_P1: fffff807089f3630

BUGCHECK_P2: 2

BUGCHECK_P3: 8

BUGCHECK_P4: fffff8076b9f3630

READ_ADDRESS: fffff80768cfb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
fffff807089f3630

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  fffff8076c3fd3a0 -- (.trap 0xfffff8076c3fd3a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000040 rbx=0000000000000000 rcx=ffffd0062b70d180
rdx=0000000000000033 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8076b9f3630 rsp=fffff8076c3fd538 rbp=fffff8076c3fd640
r8=00000000000272c6  r9=000000000002730c r10=ffffd0062b70d000
r11=ffffd0062b70d5d8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
NETIO!RtlGetNextExpirationTimerWheelTick+0x40:
fffff807`6b9f3630 448b09          mov     r9d,dword ptr [rcx] ds:ffffd006`2b70d180=00000000
Resetting default scope

STACK_TEXT: 
fffff807`6c3fd258 fffff807`68407b69     : 00000000`0000000a fffff807`089f3630 00000000`00000002 00000000`00000008 : nt!KeBugCheckEx
fffff807`6c3fd260 fffff807`68403e69     : 00000000`ffffff00 00000000`00000000 00000000`00000000 ffffd006`2bedf601 : nt!KiBugCheckDispatch+0x69
fffff807`6c3fd3a0 fffff807`6b9f3630     : fffff807`6bacf512 00000000`0001c73b 00000000`00000000 fffff807`00000006 : nt!KiPageFault+0x469
fffff807`6c3fd538 fffff807`6bacf512     : 00000000`0001c73b 00000000`00000000 fffff807`00000006 00000000`0001c73b : NETIO!RtlGetNextExpirationTimerWheelTick+0x40
fffff807`6c3fd540 fffff807`6820781e     : fffff807`6344a240 00000000`00000000 fffff807`6c3fda20 fffff807`63447180 : tcpip!TcpPeriodicTimeoutHandler+0xa72
fffff807`6c3fd760 fffff807`68206b04     : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x30e
fffff807`6c3fd8d0 fffff807`683f97be     : 00000000`00000000 fffff807`63447180 fffff807`68d27600 ffffd006`39885080 : nt!KiRetireDpcList+0x1f4
fffff807`6c3fdb60 00000000`00000000     : fffff807`6c3fe000 fffff807`6c3f7000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e


SYMBOL_NAME:  NETIO!RtlGetNextExpirationTimerWheelTick+40

MODULE_NAME: NETIO

IMAGE_NAME:  NETIO.SYS

IMAGE_VERSION:  10.0.19041.610

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  40

FAILURE_BUCKET_ID:  AV_NETIO!RtlGetNextExpirationTimerWheelTick

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {832c4dc1-73b9-2c91-516c-cde32f637c45}

Followup:     MachineOwner
---------


DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffff80600003630, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000008, value 0 = read operation, 1 = write operation
Arg4: fffff806401f3630, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 11686

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 55070

    Key  : Analysis.Init.CPU.mSec
    Value: 749

    Key  : Analysis.Init.Elapsed.mSec
    Value: 1706

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 97

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  d1

BUGCHECK_P1: fffff80600003630

BUGCHECK_P2: 2

BUGCHECK_P3: 8

BUGCHECK_P4: fffff806401f3630

READ_ADDRESS: fffff8063c2fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
fffff80600003630

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  fffff80640bfd3a0 -- (.trap 0xfffff80640bfd3a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000040 rbx=0000000000000000 rcx=ffffdf8fb6eec4e0
rdx=000000000000000f rsi=0000000000000000 rdi=0000000000000000
rip=fffff806401f3630 rsp=fffff80640bfd538 rbp=fffff80640bfd640
r8=0000000000088bd3  r9=0000000000000000 r10=ffffdf8fb6eec000
r11=fffff80640bfcd60 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz ac po nc
NETIO!RtlGetNextExpirationTimerWheelTick+0x40:
fffff806`401f3630 448b09          mov     r9d,dword ptr [rcx] ds:ffffdf8f`b6eec4e0=00000000
Resetting default scope

STACK_TEXT: 
fffff806`40bfd258 fffff806`3ba07b69     : 00000000`0000000a fffff806`00003630 00000000`00000002 00000000`00000008 : nt!KeBugCheckEx
fffff806`40bfd260 fffff806`3ba03e69     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff806`40bfd3a0 fffff806`401f3630     : fffff806`402cf512 00000000`00088aeb 00000000`00000000 fffff806`00000006 : nt!KiPageFault+0x469
fffff806`40bfd538 fffff806`402cf512     : 00000000`00088aeb 00000000`00000000 fffff806`00000006 00000000`00088aeb : NETIO!RtlGetNextExpirationTimerWheelTick+0x40
fffff806`40bfd540 fffff806`3b80781e     : fffff806`37d4a240 00000000`00000000 fffff806`40bfda20 fffff806`37d47180 : tcpip!TcpPeriodicTimeoutHandler+0xa72
fffff806`40bfd760 fffff806`3b806b04     : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x30e
fffff806`40bfd8d0 fffff806`3b9f97be     : 00000000`00000000 fffff806`37d47180 fffff806`3c327600 ffffdf8f`bebe8080 : nt!KiRetireDpcList+0x1f4
fffff806`40bfdb60 00000000`00000000     : fffff806`40bfe000 fffff806`40bf7000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e


SYMBOL_NAME:  NETIO!RtlGetNextExpirationTimerWheelTick+40

MODULE_NAME: NETIO

IMAGE_NAME:  NETIO.SYS

IMAGE_VERSION:  10.0.19041.610

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  40

FAILURE_BUCKET_ID:  AV_NETIO!RtlGetNextExpirationTimerWheelTick

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {832c4dc1-73b9-2c91-516c-cde32f637c45}

Followup:     MachineOwner
---------


IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80562d09c20, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 7593

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 15611

    Key  : Analysis.Init.CPU.mSec
    Value: 1140

    Key  : Analysis.Init.Elapsed.mSec
    Value: 78117

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 82

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  a

BUGCHECK_P1: 0

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff80562d09c20

WRITE_ADDRESS: fffff805636fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
0000000000000000

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

DPC_STACK_BASE:  FFFFF80567275FB0

TRAP_FRAME:  fffff80567271b80 -- (.trap 0xfffff80567271b80)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffff8055f326180
rdx=fffff8056726d6c8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80562d09c20 rsp=fffff80567271d13 rbp=fffff8056726d640
r8=0000000000000000  r9=0000000000016fe8 r10=fffff80562d09be0
r11=fffff8056726d020 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!KeAcquireInStackQueuedSpinLockAtDpcLevel+0x40:
fffff805`62d09c20 488713          xchg    rdx,qword ptr [rbx] ds:00000000`00000000=????????????????
Resetting default scope

UNALIGNED_STACK_POINTER:  fffff80567271d13

STACK_TEXT: 
fffff805`67271a38 fffff805`62e07169     : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff805`67271a40 fffff805`62e03469     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff805`67271b80 fffff805`62d09c20     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x469
fffff805`67271d13 fffff805`6696edc0     : 00000000`00016f44 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeAcquireInStackQueuedSpinLockAtDpcLevel+0x40
fffff805`67271d43 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!TcpPeriodicTimeoutHandler+0xa30


SYMBOL_NAME:  tcpip!TcpPeriodicTimeoutHandler+a30

MODULE_NAME: tcpip

IMAGE_NAME:  tcpip.sys

IMAGE_VERSION:  10.0.19041.610

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  a30

FAILURE_BUCKET_ID:  AV_tcpip!TcpPeriodicTimeoutHandler

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {eea1ea46-f92b-7c89-673c-92993741d2b7}

Followup:     MachineOwner
---------


DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffff803166be600, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff8032f4b3630, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 6717

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 21264

    Key  : Analysis.Init.CPU.mSec
    Value: 890

    Key  : Analysis.Init.Elapsed.mSec
    Value: 67759

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 85

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  d1

BUGCHECK_P1: fffff803166be600

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff8032f4b3630

WRITE_ADDRESS: fffff8032d6fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
fffff803166be600

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  fffff8032fe6d3a0 -- (.trap 0xfffff8032fe6d3a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000040 rbx=0000000000000000 rcx=ffff8001933030f0
rdx=0000000000000039 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8032f4b3630 rsp=fffff8032fe6d538 rbp=fffff8032fe6d640
r8=0000000000038586  r9=0000000000038586 r10=ffff800193303000
r11=ffff800193303fe8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
NETIO!RtlGetNextExpirationTimerWheelTick+0x40:
fffff803`2f4b3630 448b09          mov     r9d,dword ptr [rcx] ds:ffff8001`933030f0=00000000
Resetting default scope

STACK_TEXT: 
fffff803`2fe6d258 fffff803`2ce07169     : 00000000`0000000a fffff803`166be600 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff803`2fe6d260 fffff803`2ce03469     : 00000000`00000000 00000000`00000000 00000000`00000004 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff803`2fe6d3a0 fffff803`2f4b3630     : fffff803`2f58ee02 00000000`00038564 00000000`00000000 fffff803`00000006 : nt!KiPageFault+0x469
fffff803`2fe6d538 fffff803`2f58ee02     : 00000000`00038564 00000000`00000000 fffff803`00000006 00000000`00038564 : NETIO!RtlGetNextExpirationTimerWheelTick+0x40
fffff803`2fe6d540 fffff803`2cce535e     : fffff803`28078240 fffff803`28075180 fffff803`2fe6da20 fffff803`28075180 : tcpip!TcpPeriodicTimeoutHandler+0xa72
fffff803`2fe6d760 fffff803`2cce4644     : 00000000`00000000 00000000`00000000 00000000`00000008 00000000`00002274 : nt!KiExecuteAllDpcs+0x30e
fffff803`2fe6d8d0 fffff803`2cdf8d7e     : 00000000`00000000 fffff803`28075180 fffff803`2d727600 ffff8001`93278040 : nt!KiRetireDpcList+0x1f4
fffff803`2fe6db60 00000000`00000000     : fffff803`2fe6e000 fffff803`2fe67000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e


SYMBOL_NAME:  NETIO!RtlGetNextExpirationTimerWheelTick+40

MODULE_NAME: NETIO

IMAGE_NAME:  NETIO.SYS

IMAGE_VERSION:  10.0.19041.610

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  40

FAILURE_BUCKET_ID:  AV_NETIO!RtlGetNextExpirationTimerWheelTick

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {832c4dc1-73b9-2c91-516c-cde32f637c45}

Followup:     MachineOwner
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffffffffffff93, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8040552b752, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 7781

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 26011

    Key  : Analysis.Init.CPU.mSec
    Value: 1187

    Key  : Analysis.Init.Elapsed.mSec
    Value: 80385

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 97

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  a

BUGCHECK_P1: ffffffffffffff93

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff8040552b752

WRITE_ADDRESS: fffff80405efb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffffffffffff93

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  fffff8040aa6b920 -- (.trap 0xfffff8040aa6b920)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000000000003f rbx=0000000000000000 rcx=0000000000000010
rdx=ffffcefb6fd16630 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8040552b752 rsp=fffff8040aa6bab0 rbp=fffff80405e4ee00
r8=ffffffffffffffff  r9=ffffcefb6fd16bb0 r10=0000000000000020
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!MiReservePtes+0x502:
fffff804`0552b752 4883c208        add     rdx,8
Resetting default scope

STACK_TEXT: 
fffff804`0aa6b7d8 fffff804`05607169     : 00000000`0000000a ffffffff`ffffff93 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff804`0aa6b7e0 fffff804`05603469     : 00000000`00000001 00060080`01000000 00000000`00000000 fffff804`1f7a32fd : nt!KiBugCheckDispatch+0x69
fffff804`0aa6b920 fffff804`0552b752     : fffff804`05e4ee00 fffff804`00000000 ffffae0e`00000000 00000000`000001c0 : nt!KiPageFault+0x469
fffff804`0aa6bab0 fffff804`0552ba34     : ffffae0e`00000000 fffff804`00000000 00000000`00000000 ffffae0e`2b28a1a0 : nt!MiReservePtes+0x502
fffff804`0aa6bb80 fffff804`0a097ce2     : 00000000`00000af0 00000000`00000000 00000000`00000af0 fffff804`0aa6bd28 : nt!MmMapLockedPagesSpecifyCache+0xd4
fffff804`0aa6bbe0 fffff804`0a171380     : fffff804`0aa6bd20 fffff804`0aa6bcdc fffff804`0aa6bd28 fffff804`0aa6bce0 : NETIO!RtlCopyMdlToMdlIndirect+0x242
fffff804`0aa6bc60 fffff804`0a171ae4     : fffff804`0aa6c0d0 fffff804`0a098d88 00000000`00000000 fffff804`0aa6bed9 : tcpip!TcpSatisfyReceiveRequests+0x100
fffff804`0aa6be60 fffff804`0a171815     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!TcpDeliverDataToClient+0xe4
fffff804`0aa6bfe0 fffff804`0a175ebb     : 00000000`00000007 00000000`00000000 00000000`00000000 00000000`ffffffff : tcpip!TcpDeliverReceive+0xb5
fffff804`0aa6c0d0 fffff804`0a174c5f     : 00000000`00000000 fffff804`0a1932d4 ffffae0e`28b319c8 00000000`00000007 : tcpip!TcpTcbFastDatagram+0xfcb
fffff804`0aa6c2a0 fffff804`0a173fff     : 00000000`00000028 ffffae0e`28b51000 00000000`2b28b0c0 ffffae0e`28b51000 : tcpip!TcpTcbReceive+0x18f
fffff804`0aa6c4f0 fffff804`0a173088     : 00000000`000197e0 fffff804`0a35dc00 00000000`f5beb2c1 fffff804`0a358598 : tcpip!TcpMatchReceive+0x51f
fffff804`0aa6c7a0 fffff804`0a1d8a52     : ffffae0e`2899cc00 00000000`00005000 00000000`00000000 ffffae0e`28b51001 : tcpip!TcpReceive+0x358
fffff804`0aa6c890 fffff804`0a199b31     : ffffae0e`33a63a40 fffff804`0aa6c640 00000000`0aa60000 ffffae0e`2889f320 : tcpip!TcpNlClientReceiveDatagrams+0x22
fffff804`0aa6c8d0 fffff804`0a19647b     : 00000000`00000001 00000000`00000000 00000000`00000000 ffffae0e`28b51000 : tcpip!IppProcessDeliverList+0xc1
fffff804`0aa6c9b0 fffff804`0a1959ff     : fffff804`0a358230 ffffae0e`28b778c0 ffffae0e`28b51000 00000000`00000000 : tcpip!IppReceiveHeaderBatch+0x21b
fffff804`0aa6cab0 fffff804`0a192d9c     : ffffae0e`32773a80 ffffae0e`33a63a40 00000000`00000001 00000000`00000000 : tcpip!IppFlcReceivePacketsCore+0x32f
fffff804`0aa6cbd0 fffff804`0a1defd0     : ffffae0e`33a63a40 00000000`00000000 fffff804`0aa6cca1 00000000`00000000 : tcpip!IpFlcReceivePackets+0xc
fffff804`0aa6cc00 fffff804`0a1de5cc     : 00000000`00000001 ffffae0e`28fe8000 fffff804`0a1d1a50 fffff804`0aa6cfdc : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x270
fffff804`0aa6cd00 fffff804`0540d468     : ffffae0e`28bc0780 00000000`00000002 fffff804`05f27600 fffff804`0aa6cff8 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0x17c
fffff804`0aa6ce50 fffff804`0540d3dd     : fffff804`0a1de450 fffff804`0aa6cff8 ffffae0e`28b5ca20 00000000`00000202 : nt!KeExpandKernelStackAndCalloutInternal+0x78
fffff804`0aa6cec0 fffff804`0a1d15ed     : 00000000`00000014 fffff804`0a236b2a ffffae0e`33a63a40 fffff804`0a236b9d : nt!KeExpandKernelStackAndCalloutEx+0x1d
fffff804`0aa6cf00 fffff804`0a1d0ccd     : 00000000`00000001 fffff804`0aa6d060 ffffae0e`28fe8010 fffff804`0aa6d070 : tcpip!NetioExpandKernelStackAndCallout+0x8d
fffff804`0aa6cf60 fffff804`09f11eb1     : ffffae0e`33aebe01 ffffae0e`33aebeb1 00000000`00000020 00000000`00000001 : tcpip!FlReceiveNetBufferListChain+0x46d
fffff804`0aa6d210 fffff804`09f11ccb     : ffffae0e`329c2b20 fffff804`00000001 fffff804`00000000 00000000`00000002 : ndis!ndisMIndicateNetBufferListsToOpen+0x141
fffff804`0aa6d2f0 fffff804`09f17ef1     : ffffae0e`2b28a1a0 ffffae0e`33a63a01 ffffae0e`2b28a1a0 00000000`00000001 : ndis!ndisMTopReceiveNetBufferLists+0x22b
fffff804`0aa6d370 fffff804`09f4dee3     : ffffae0e`33a63a40 fffff804`0aa6d441 00000000`00000000 ffffae0e`2b245910 : ndis!ndisCallReceiveHandler+0x61
fffff804`0aa6d3c0 fffff804`09f14a94     : 00000000`00001a10 00000000`00000001 ffffae0e`2b28a1a0 00000000`00000001 : ndis!ndisInvokeNextReceiveHandler+0x1df
fffff804`0aa6d490 fffff804`282261d8     : ffffae0e`2b28e000 ffffae0e`2b28e000 00000000`00000000 ffffae0e`2b28e5f0 : ndis!NdisMIndicateReceiveNetBufferLists+0x104
fffff804`0aa6d520 fffff804`282125a8     : 00000000`00000000 00000000`3e3cc101 ffffae0e`00000400 fffff804`0aa6d698 : rt640x64!MpHandleRecvIntPriVLanJumbo+0x2c4
fffff804`0aa6d610 fffff804`09f17887     : 00000000`00000000 ffffae0e`2b28b9a0 ffffae0e`2b07b0f0 00000000`00000000 : rt640x64!MPHandleMessageInterrupt+0x398
fffff804`0aa6d680 fffff804`054e535e     : fffff804`02b91240 00000000`00000000 00000000`00000004 fffff804`02b8e180 : ndis!ndisInterruptDpc+0x197
fffff804`0aa6d760 fffff804`054e4644     : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x30e
fffff804`0aa6d8d0 fffff804`055f8d7e     : 00000000`00000000 fffff804`02b8e180 fffff804`05f27600 ffffae0e`26cb4040 : nt!KiRetireDpcList+0x1f4
fffff804`0aa6db60 00000000`00000000     : fffff804`0aa6e000 fffff804`0aa67000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e


SYMBOL_NAME:  NETIO!RtlCopyMdlToMdlIndirect+242

MODULE_NAME: NETIO

IMAGE_NAME:  NETIO.SYS

IMAGE_VERSION:  10.0.19041.610

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  242

FAILURE_BUCKET_ID:  AV_NETIO!RtlCopyMdlToMdlIndirect

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {d357dedb-61ef-0759-396f-911f270bccf3}

Followup:     MachineOwner
---------


DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 00000000be129d80, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 000000000000009f, value 0 = read operation, 1 = write operation
Arg4: fffff8038be9363a, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for rt640x64.sys
*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 6514

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 11750

    Key  : Analysis.Init.CPU.mSec
    Value: 764

    Key  : Analysis.Init.Elapsed.mSec
    Value: 3995

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 81

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  d1

BUGCHECK_P1: be129d80

BUGCHECK_P2: ff

BUGCHECK_P3: 9f

BUGCHECK_P4: fffff8038be9363a

ADDITIONAL_DEBUG_TEXT:  The trap occurred when interrupts are disabled on the target.

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  fffff803719fd610 -- (.trap 0xfffff803719fd610)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000be11da37 rbx=0000000000000000 rcx=0000000000002710
rdx=00000000be12bd74 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8038be9363a rsp=fffff803719fd7a0 rbp=00000000be1116e7
r8=00000000be128296  r9=00000000be105b42 r10=fffff80368c1b180
r11=0000000000000001 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up di ng nz na pe cy
rt640x64+0x363a:
fffff803`8be9363a 89bb84450000    mov     dword ptr [rbx+4584h],edi ds:00000000`00004584=????????
Resetting default scope

STACK_TEXT: 
fffff803`719fd4c8 fffff803`6ce07b69     : 00000000`0000000a 00000000`be129d80 00000000`000000ff 00000000`0000009f : nt!KeBugCheckEx
fffff803`719fd4d0 fffff803`6ce03e69     : ffffe708`473b5320 00000000`be280a54 ffffe708`473b5300 fffff803`719fd7a0 : nt!KiBugCheckDispatch+0x69
fffff803`719fd610 fffff803`8be9363a     : fffff803`68c1b180 00000000`be1116e7 00000000`00000001 fffff803`719fd800 : nt!KiPageFault+0x469
fffff803`719fd7a0 fffff803`68c1b180     : 00000000`be1116e7 00000000`00000001 fffff803`719fd800 fffff803`68c1b180 : rt640x64+0x363a
fffff803`719fd7a8 00000000`be1116e7     : 00000000`00000001 fffff803`719fd800 fffff803`68c1b180 00000000`00000008 : 0xfffff803`68c1b180
fffff803`719fd7b0 00000000`00000001     : fffff803`719fd800 fffff803`68c1b180 00000000`00000008 ffffe708`473b5000 : 0xbe1116e7
fffff803`719fd7b8 fffff803`719fd800     : fffff803`68c1b180 00000000`00000008 ffffe708`473b5000 00000000`00000000 : 0x1
fffff803`719fd7c0 fffff803`68c1b180     : 00000000`00000008 ffffe708`473b5000 00000000`00000000 00000000`00000002 : 0xfffff803`719fd800
fffff803`719fd7c8 00000000`00000008     : ffffe708`473b5000 00000000`00000000 00000000`00000002 fffff803`719fd900 : 0xfffff803`68c1b180
fffff803`719fd7d0 ffffe708`473b5000     : 00000000`00000000 00000000`00000002 fffff803`719fd900 00000000`be113d6f : 0x8
fffff803`719fd7d8 00000000`00000000     : 00000000`00000002 fffff803`719fd900 00000000`be113d6f fffff803`6cc73301 : 0xffffe708`473b5000


SYMBOL_NAME:  rt640x64+363a

MODULE_NAME: rt640x64

IMAGE_NAME:  rt640x64.sys

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  363a

FAILURE_BUCKET_ID:  DISABLED_INTERRUPT_FAULT_CODE_AV_rt640x64!unknown_function

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {ba14d03f-87b2-86f6-7e1e-1db53222cfa1}

Followup:     MachineOwner
---------


UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault).  The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
        use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
        use .trap on that value
Else
        .trap on the appropriate frame will show where the trap was taken
        (on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: fffff8023021ae50
Arg3: fffff8022f88f512
Arg4: fffff8022f7f3633

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 68062

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 75105

    Key  : Analysis.Init.CPU.mSec
    Value: 781

    Key  : Analysis.Init.Elapsed.mSec
    Value: 1892

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 307

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  7f

BUGCHECK_P1: 8

BUGCHECK_P2: fffff8023021ae50

BUGCHECK_P3: fffff8022f88f512

BUGCHECK_P4: fffff8022f7f3633

TRAP_FRAME:  fffff8023021ae50 -- (.trap 0xfffff8023021ae50)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffc40501d053c0
rdx=000000000000001b rsi=0000000000000000 rdi=0000000000000000
rip=fffff8022f7f3633 rsp=fffff8022f88f512 rbp=fffff802301fd640
r8=000000000002e28d  r9=0000000000000000 r10=ffffc40501d05000
r11=ffffc40501d05cb8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
NETIO!RtlGetNextExpirationTimerWheelTick+0x43:
fffff802`2f7f3633 458b4208        mov     r8d,dword ptr [r10+8] ds:ffffc405`01d05008=0002e28d
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  2

PROCESS_NAME:  System

BAD_STACK_POINTER:  fffff8022f88f512

UNALIGNED_STACK_POINTER:  fffff8022f88f512

SYMBOL_NAME:  NETIO!RtlGetNextExpirationTimerWheelTick+43

MODULE_NAME: NETIO

IMAGE_NAME:  NETIO.SYS

IMAGE_VERSION:  10.0.19041.610

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  43

FAILURE_BUCKET_ID:  0x7f_8_STACKPTR_ERROR_NETIO!RtlGetNextExpirationTimerWheelTick

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {0cd6a240-b2ce-b305-b086-130997ee7c49}

Followup:     MachineOwner
---------



DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 00000000000200c0, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8056f3f3632, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 12906

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 22300

    Key  : Analysis.Init.CPU.mSec
    Value: 781

    Key  : Analysis.Init.Elapsed.mSec
    Value: 1976

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 88

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  d1

BUGCHECK_P1: 200c0

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8056f3f3632

READ_ADDRESS: fffff80569cfb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
00000000000200c0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  fffff8056fdfd3a0 -- (.trap 0xfffff8056fdfd3a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000040 rbx=0000000000000000 rcx=ffffdc89197051c8
rdx=0000000000000030 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8056f3f3632 rsp=fffff8056fdfd538 rbp=fffff8056fdfd640
r8=0000000000020088  r9=0000000000000000 r10=ffffdc8919705000
r11=ffffdc8919705688 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
NETIO!RtlGetNextExpirationTimerWheelTick+0x42:
fffff805`6f3f3632 09458b          or      dword ptr [rbp-75h],eax ss:0018:fffff805`6fdfd5cb=fff80569
Resetting default scope

MISALIGNED_IP:
NETIO!RtlGetNextExpirationTimerWheelTick+42
fffff805`6f3f3632 09458b          or      dword ptr [rbp-75h],eax

STACK_TEXT: 
fffff805`6fdfd258 fffff805`69407b69     : 00000000`0000000a 00000000`000200c0 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff805`6fdfd260 fffff805`69403e69     : 00000000`00000000 ffffdc89`19a51420 00000000`00140001 00000000`0000003f : nt!KiBugCheckDispatch+0x69
fffff805`6fdfd3a0 fffff805`6f3f3632     : fffff805`6f4cf512 00000000`00020080 00000000`00000000 fffff805`00000006 : nt!KiPageFault+0x469
fffff805`6fdfd538 fffff805`6f4cf512     : 00000000`00020080 00000000`00000000 fffff805`00000006 00000000`00020080 : NETIO!RtlGetNextExpirationTimerWheelTick+0x42
fffff805`6fdfd540 fffff805`6920781e     : fffff805`66f09240 ffffdc89`17afa000 fffff805`6fdfda30 fffff805`66f06180 : tcpip!TcpPeriodicTimeoutHandler+0xa72
fffff805`6fdfd760 fffff805`69206b04     : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`0000139f : nt!KiExecuteAllDpcs+0x30e
fffff805`6fdfd8d0 fffff805`693f97be     : 00000000`00000000 fffff805`66f06180 fffff805`69d27600 ffffdc89`22bbe040 : nt!KiRetireDpcList+0x1f4
fffff805`6fdfdb60 00000000`00000000     : fffff805`6fdfe000 fffff805`6fdf7000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e


SYMBOL_NAME:  NETIO!RtlGetNextExpirationTimerWheelTick+42

IMAGE_NAME:  hardware

IMAGE_VERSION:  10.0.19041.610

STACK_COMMAND:  .thread ; .cxr ; kb

MODULE_NAME: hardware

FAILURE_BUCKET_ID:  IP_MISALIGNED_NETIO.SYS

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {3000662e-945a-e78f-7508-f07b767bf8de}

Followup:     MachineOwner
---------

0: kd> !sysinfo machineid
Machine ID Information [From Smbios 3.1, DMIVersion 0, Size=4491]
BiosMajorRelease = 5
BiosMinorRelease = 12
BiosVendor = American Megatrends Inc.
BiosVersion = 5.12
BiosReleaseDate = 03/22/2019
SystemManufacturer = ECS
SystemProductName = H310CH5-M7
SystemFamily = Default string
SystemVersion = 1.0
SystemSKU = Default string
BaseBoardManufacturer = ECS
BaseBoardProduct = H310CH5-M7
BaseBoardVersion = 1.0
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 000000000005ce8f, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff80509df3633, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 14265

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 21249

    Key  : Analysis.Init.CPU.mSec
    Value: 796

    Key  : Analysis.Init.Elapsed.mSec
    Value: 2015

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 87

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  d1

BUGCHECK_P1: 5ce8f

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff80509df3633

WRITE_ADDRESS: fffff80504efb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
000000000005ce8f

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  fffff8050a7fd3a0 -- (.trap 0xfffff8050a7fd3a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000040 rbx=0000000000000000 rcx=ffffe10a78cd4180
rdx=0000000000000033 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80509df3633 rsp=fffff8050a7fd538 rbp=fffff8050a7fd640
r8=0000000000058f4c  r9=0000000000058f4c r10=ffffe10a78cd4000
r11=ffffe10a78cd4a18 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
NETIO!RtlGetNextExpirationTimerWheelTick+0x43:
fffff805`09df3633 458b4208        mov     r8d,dword ptr [r10+8] ds:ffffe10a`78cd4008=00058f4c
Resetting default scope

STACK_TEXT: 
fffff805`0a7fd258 fffff805`04607b69     : 00000000`0000000a 00000000`0005ce8f 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff805`0a7fd260 fffff805`04603e69     : 00000000`00000000 ffffe10a`7bde47e0 00000000`00000001 ffffe10a`7f7fd061 : nt!KiBugCheckDispatch+0x69
fffff805`0a7fd3a0 fffff805`09df3633     : fffff805`09ecf512 00000000`00058f26 00000000`00000000 fffff805`00000006 : nt!KiPageFault+0x469
fffff805`0a7fd538 fffff805`09ecf512     : 00000000`00058f26 00000000`00000000 fffff805`00000006 00000000`00058f26 : NETIO!RtlGetNextExpirationTimerWheelTick+0x43
fffff805`0a7fd540 fffff805`0440781e     : fffff805`018ea240 00000000`00000000 fffff805`0a7fda20 fffff805`018e7180 : tcpip!TcpPeriodicTimeoutHandler+0xa72
fffff805`0a7fd760 fffff805`04406b04     : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x30e
fffff805`0a7fd8d0 fffff805`045f97be     : 00000000`00000000 fffff805`018e7180 fffff805`04f27600 ffffe10a`8044b280 : nt!KiRetireDpcList+0x1f4
fffff805`0a7fdb60 00000000`00000000     : fffff805`0a7fe000 fffff805`0a7f7000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e


SYMBOL_NAME:  NETIO!RtlGetNextExpirationTimerWheelTick+43

MODULE_NAME: NETIO

IMAGE_NAME:  NETIO.SYS

IMAGE_VERSION:  10.0.19041.610

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  43

FAILURE_BUCKET_ID:  AV_NETIO!RtlGetNextExpirationTimerWheelTick

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {832c4dc1-73b9-2c91-516c-cde32f637c45}

Followup:     MachineOwner
---------


DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffff80482bf3630, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000008, value 0 = read operation, 1 = write operation
Arg4: fffff80486ff3630, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 10421

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 18579

    Key  : Analysis.Init.CPU.mSec
    Value: 859

    Key  : Analysis.Init.Elapsed.mSec
    Value: 2055

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 88

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  d1

BUGCHECK_P1: fffff80482bf3630

BUGCHECK_P2: 2

BUGCHECK_P3: 8

BUGCHECK_P4: fffff80486ff3630

READ_ADDRESS: fffff804844fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
fffff80482bf3630

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  fffff804879fd3a0 -- (.trap 0xfffff804879fd3a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000040 rbx=0000000000000000 rcx=ffffb58f4f10c1e0
rdx=000000000000002f rsi=0000000000000000 rdi=0000000000000000
rip=fffff80486ff3630 rsp=fffff804879fd538 rbp=fffff804879fd640
r8=0000000000021e42  r9=0000000000027950 r10=ffffb58f4f10c000
r11=ffffb58f4f10ce20 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz ac pe nc
NETIO!RtlGetNextExpirationTimerWheelTick+0x40:
fffff804`86ff3630 448b09          mov     r9d,dword ptr [rcx] ds:ffffb58f`4f10c1e0=00000000
Resetting default scope

STACK_TEXT: 
fffff804`879fd258 fffff804`83c07b69     : 00000000`0000000a fffff804`82bf3630 00000000`00000002 00000000`00000008 : nt!KeBugCheckEx
fffff804`879fd260 fffff804`83c03e69     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff804`879fd3a0 fffff804`86ff3630     : fffff804`870cf512 00000000`0001cad1 00000000`00000000 fffff804`00000006 : nt!KiPageFault+0x469
fffff804`879fd538 fffff804`870cf512     : 00000000`0001cad1 00000000`00000000 fffff804`00000006 00000000`0001cad1 : NETIO!RtlGetNextExpirationTimerWheelTick+0x40
fffff804`879fd540 fffff804`83a0781e     : fffff804`7eb93240 ffffb58f`4a8fb000 fffff804`879fda30 fffff804`7eb90180 : tcpip!TcpPeriodicTimeoutHandler+0xa72
fffff804`879fd760 fffff804`83a06b04     : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00001192 : nt!KiExecuteAllDpcs+0x30e
fffff804`879fd8d0 fffff804`83bf97be     : 00000000`00000000 fffff804`7eb90180 00000000`00000000 fffff804`84527600 : nt!KiRetireDpcList+0x1f4
fffff804`879fdb60 00000000`00000000     : fffff804`879fe000 fffff804`879f7000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e


SYMBOL_NAME:  NETIO!RtlGetNextExpirationTimerWheelTick+40

MODULE_NAME: NETIO

IMAGE_NAME:  NETIO.SYS

IMAGE_VERSION:  10.0.19041.610

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  40

FAILURE_BUCKET_ID:  AV_NETIO!RtlGetNextExpirationTimerWheelTick

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {832c4dc1-73b9-2c91-516c-cde32f637c45}

Followup:     MachineOwner
---------

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 000000000001bbe7, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff802536080c0, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for Rt630x64.sys
*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 10124

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 27866

    Key  : Analysis.Init.CPU.mSec
    Value: 749

    Key  : Analysis.Init.Elapsed.mSec
    Value: 4551

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 85

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  d1

BUGCHECK_P1: 1bbe7

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff802536080c0

READ_ADDRESS: fffff80239cfb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
000000000001bbe7

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  fffff8023e5cd3a0 -- (.trap 0xfffff8023e5cd3a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=000000000001bb4a
rdx=000000000001bb47 rsi=0000000000000000 rdi=0000000000000000
rip=fffff802536080c0 rsp=fffff8023e5cd530 rbp=fffff8023e5cd640
r8=0000000000022ec2  r9=0000000000024098 r10=ffffa3834db3e000
r11=fffff8023e5cd510 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
Rt630x64+0x880c0:
fffff802`536080c0 488b82a0000000  mov     rax,qword ptr [rdx+0A0h] ds:00000000`0001bbe7=????????????????
Resetting default scope

STACK_TEXT: 
fffff802`3e5cd258 fffff802`39407b69     : 00000000`0000000a 00000000`0001bbe7 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff802`3e5cd260 fffff802`39403e69     : ffffa383`541388a0 fffff802`3dcc8d0e ffffa383`55a5c040 ffffa383`543b9171 : nt!KiBugCheckDispatch+0x69
fffff802`3e5cd3a0 fffff802`536080c0     : fffff802`535a3643 fffff802`3dc5f512 00000000`0001bb4a 00000000`0001bb4a : nt!KiPageFault+0x469
fffff802`3e5cd530 fffff802`535a3643     : fffff802`3dc5f512 00000000`0001bb4a 00000000`0001bb4a fffff802`3e5cd640 : Rt630x64+0x880c0
fffff802`3e5cd538 fffff802`3dc5f512     : 00000000`0001bb4a 00000000`0001bb4a fffff802`3e5cd640 00000000`00000000 : Rt630x64+0x23643
fffff802`3e5cd540 fffff802`3920781e     : fffff802`3582d240 00000000`00000000 fffff802`3e5cda20 fffff802`3582a180 : tcpip!TcpPeriodicTimeoutHandler+0xa72
fffff802`3e5cd760 fffff802`39206b04     : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x30e
fffff802`3e5cd8d0 fffff802`393f97be     : 00000000`00000000 fffff802`3582a180 fffff802`39d27600 ffffa383`51f60140 : nt!KiRetireDpcList+0x1f4
fffff802`3e5cdb60 00000000`00000000     : fffff802`3e5ce000 fffff802`3e5c7000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e


SYMBOL_NAME:  Rt630x64+880c0

MODULE_NAME: Rt630x64

IMAGE_NAME:  Rt630x64.sys

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  880c0

FAILURE_BUCKET_ID:  AV_Rt630x64!unknown_function

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {5e5e7311-2d42-08f4-f9f1-9709493bc906}

Followup:     MachineOwner
---------


DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffff80400003630, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000008, value 0 = read operation, 1 = write operation
Arg4: fffff80483043630, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 11890

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 22065

    Key  : Analysis.Init.CPU.mSec
    Value: 874

    Key  : Analysis.Init.Elapsed.mSec
    Value: 2153

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 88

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  d1

BUGCHECK_P1: fffff80400003630

BUGCHECK_P2: 2

BUGCHECK_P3: 8

BUGCHECK_P4: fffff80483043630

READ_ADDRESS: fffff8047f8fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
fffff80400003630

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  fffff80483c6d3a0 -- (.trap 0xfffff80483c6d3a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000040 rbx=0000000000000000 rcx=ffffae867c505168
rdx=0000000000000034 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80483043630 rsp=fffff80483c6d538 rbp=fffff80483c6d640
r8=000000000002540b  r9=000000000002540b r10=ffffae867c505000
r11=ffffae867c505be0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
NETIO!RtlGetNextExpirationTimerWheelTick+0x40:
fffff804`83043630 448b09          mov     r9d,dword ptr [rcx] ds:ffffae86`7c505168=00000000
Resetting default scope

STACK_TEXT: 
fffff804`83c6d258 fffff804`7f007b69     : 00000000`0000000a fffff804`00003630 00000000`00000002 00000000`00000008 : nt!KeBugCheckEx
fffff804`83c6d260 fffff804`7f003e69     : ffffae86`8ac52d10 ffffae86`8ac5d000 00000000`00000246 fffff804`7eef3fe4 : nt!KiBugCheckDispatch+0x69
fffff804`83c6d3a0 fffff804`83043630     : fffff804`8311f512 00000000`0001d039 00000000`00000000 fffff804`00000006 : nt!KiPageFault+0x469
fffff804`83c6d538 fffff804`8311f512     : 00000000`0001d039 00000000`00000000 fffff804`00000006 00000000`0001d039 : NETIO!RtlGetNextExpirationTimerWheelTick+0x40
fffff804`83c6d540 fffff804`7ee0781e     : fffff804`7b56a240 00000000`00000000 fffff804`83c6da20 fffff804`7b567180 : tcpip!TcpPeriodicTimeoutHandler+0xa72
fffff804`83c6d760 fffff804`7ee06b04     : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x30e
fffff804`83c6d8d0 fffff804`7eff97be     : 00000000`00000000 fffff804`7b567180 fffff804`7f927600 ffffae86`90edd080 : nt!KiRetireDpcList+0x1f4
fffff804`83c6db60 00000000`00000000     : fffff804`83c6e000 fffff804`83c67000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e


SYMBOL_NAME:  NETIO!RtlGetNextExpirationTimerWheelTick+40

MODULE_NAME: NETIO

IMAGE_NAME:  NETIO.SYS

IMAGE_VERSION:  10.0.19041.610

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  40

FAILURE_BUCKET_ID:  AV_NETIO!RtlGetNextExpirationTimerWheelTick

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {832c4dc1-73b9-2c91-516c-cde32f637c45}

Followup:     MachineOwner
---------


KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc000001d, The exception code that was not handled
Arg2: fffff806484d3632, The address that the exception occurred at
Arg3: fffff80645d27600, Parameter 0 of the exception
Arg4: ffffe20b74531638, Parameter 1 of the exception

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 8530

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 18556

    Key  : Analysis.Init.CPU.mSec
    Value: 796

    Key  : Analysis.Init.Elapsed.mSec
    Value: 2288

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 83

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  1e

BUGCHECK_P1: ffffffffc000001d

BUGCHECK_P2: fffff806484d3632

BUGCHECK_P3: fffff80645d27600

BUGCHECK_P4: ffffe20b74531638

EXCEPTION_PARAMETER1:  fffff80645d27600

EXCEPTION_PARAMETER2:  ffffe20b74531638

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

FAILED_INSTRUCTION_ADDRESS:
NETIO!RtlGetNextExpirationTimerWheelTick+42
fffff806`484d3632 09458b          or      dword ptr [rbp-75h],eax

STACK_TEXT: 
fffff806`4b3e38e8 fffff806`4549158f     : 00000000`0000001e ffffffff`c000001d fffff806`484d3632 fffff806`45d27600 : nt!KeBugCheckEx
fffff806`4b3e38f0 fffff806`453f6ae2     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x166b2f
fffff806`4b3e3fb0 fffff806`453f6ab0     : fffff806`45407ca5 ffffe20b`00000000 00000000`00000000 ffffe20b`7966b860 : nt!KxExceptionDispatchOnExceptionStack+0x12
fffff806`4b3cd2c8 fffff806`45407ca5     : ffffe20b`00000000 00000000`00000000 ffffe20b`7966b860 ffffe20b`796d1040 : nt!KiExceptionDispatchOnExceptionStackContinue
fffff806`4b3cd2d0 fffff806`454021e9     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0x125
fffff806`4b3cd4b0 fffff806`484d3632     : 00000000`00000000 00000000`00000000 ffffe20b`71dc43f0 00000000`00000000 : nt!KiInvalidOpcodeFault+0x329
fffff806`4b3cd648 00000000`00000000     : 00000000`00000000 ffffe20b`71dc43f0 00000000`00000000 ffffe20b`745da7e0 : NETIO!RtlGetNextExpirationTimerWheelTick+0x42


SYMBOL_NAME:  NETIO!RtlGetNextExpirationTimerWheelTick+42

MODULE_NAME: NETIO

IMAGE_NAME:  NETIO.SYS

IMAGE_VERSION:  10.0.19041.610

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  42

FAILURE_BUCKET_ID:  0x1E_c000001d_BAD_IP_NETIO!RtlGetNextExpirationTimerWheelTick

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {b01e7b3f-a893-d618-acd0-696aecb64915}

Followup:     MachineOwner
---------

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000696c162093f0, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff80043ccb917, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for Rt630x64.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2624

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 44728

    Key  : Analysis.Init.CPU.mSec
    Value: 1077

    Key  : Analysis.Init.Elapsed.mSec
    Value: 31595

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 79

    Key  : WER.OS.Branch
    Value: winblue_r4

    Key  : WER.OS.Timestamp
    Value: 2014-10-28T15:00:00Z

    Key  : WER.OS.Version
    Value: 8.1.9600.17415


BUGCHECK_CODE:  d1

BUGCHECK_P1: 696c162093f0

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff80043ccb917

READ_ADDRESS: GetUlongPtrFromAddress: unable to read from fffff801265d3298
GetUlongPtrFromAddress: unable to read from fffff801265d3520
0000696c162093f0

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  fffff80128849750 -- (.trap 0xfffff80128849750)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000080 rbx=0000000000000000 rcx=0000696c162093d0
rdx=346dc5d63886594b rsi=0000000000000000 rdi=0000000000000000
rip=fffff80043ccb917 rsp=fffff801288498e8 rbp=fffff801288499b9
r8=0624dd2f1a9fbe77  r9=fffff78000000008 r10=fffff80043e24370
r11=0000000000000010 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
tcpip!_security_check_cookie+0x7:
fffff800`43ccb917 7510            jne     tcpip!_security_check_cookie+0x19 (fffff800`43ccb929) [br=1]
Resetting default scope

STACK_TEXT: 
fffff801`28849608 fffff801`263cc4e9     : 00000000`0000000a 0000696c`162093f0 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff801`28849610 fffff801`263cad3a     : 00000000`00000000 00000000`00000000 00000000`00009400 fffff800`43e1f4f0 : nt!KiBugCheckDispatch+0x69
fffff801`28849750 fffff800`43ccb917     : fffff800`43ccf641 ffffe000`0d9a9302 ffffe000`0d931760 ffffe000`0da5ea20 : nt!KiPageFault+0x23a
fffff801`288498e8 fffff800`43ccf641     : ffffe000`0d9a9302 ffffe000`0d931760 ffffe000`0da5ea20 fffff801`28849958 : tcpip!_security_check_cookie+0x7
fffff801`288498f0 fffff800`43ccd900     : 00000000`00000000 ffffe000`0ce95550 fffff800`43e1f180 ffffe000`0c632000 : tcpip!IppReceiveHeaderBatch+0x351
fffff801`28849a20 fffff800`43ccbd22     : ffffe000`0d896400 00000000`00000000 fffff801`28849e01 00000000`00000000 : tcpip!IppFlcReceivePacketsCore+0x680
fffff801`28849da0 fffff800`43ccc745     : ffffe000`0d890002 00000000`00000000 fffff800`43ccc790 fffff801`00000101 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x318
fffff801`28849e80 fffff801`262ae873     : 00000000`00000001 00000000`00000000 ffffe000`0c60a310 fffff801`28844000 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0x155
fffff801`28849fb0 fffff800`43ccc936     : fffff800`43ccc5f0 fffff801`2884a0d0 00000000`00000010 00000000`00000001 : nt!KeExpandKernelStackAndCalloutInternal+0xf3
fffff801`2884a0a0 fffff800`43a7ea53     : 00000000`00000000 fffff801`2884a181 ffffd001`00000001 fffff800`42b39f8b : tcpip!FlReceiveNetBufferListChain+0xb6
fffff801`2884a120 fffff800`43a7ee7f     : 00000000`00000001 00000000`00000000 00000000`00000000 00000000`00000001 : ndis!ndisMIndicateNetBufferListsToOpen+0x123
fffff801`2884a1e0 fffff800`43a7f6b2     : ffffe000`0c65e1a0 00000000`00000001 fffff800`43a8b4e0 00000000`00000001 : ndis!ndisMTopReceiveNetBufferLists+0x22f
fffff801`2884a270 fffff800`452ccd4d     : ffffe000`00000000 ffffe000`0ccad000 ffffe000`0cdbe580 ffffe000`0ce956b0 : ndis!NdisMIndicateReceiveNetBufferLists+0x732
fffff801`2884a460 ffffe000`00000000     : ffffe000`0ccad000 ffffe000`0cdbe580 ffffe000`0ce956b0 00000000`00000001 : Rt630x64+0x24d4d
fffff801`2884a468 ffffe000`0ccad000     : ffffe000`0cdbe580 ffffe000`0ce956b0 00000000`00000001 fffff801`262964ba : 0xffffe000`00000000
fffff801`2884a470 ffffe000`0cdbe580     : ffffe000`0ce956b0 00000000`00000001 fffff801`262964ba 00000000`53020001 : 0xffffe000`0ccad000
fffff801`2884a478 ffffe000`0ce956b0     : 00000000`00000001 fffff801`262964ba 00000000`53020001 8000d000`00000001 : 0xffffe000`0cdbe580
fffff801`2884a480 00000000`00000001     : fffff801`262964ba 00000000`53020001 8000d000`00000001 ffff0000`00000001 : 0xffffe000`0ce956b0
fffff801`2884a488 fffff801`262964ba     : 00000000`53020001 8000d000`00000001 ffff0000`00000001 00205600`00000000 : 0x1
fffff801`2884a490 ffffe000`0ce95550     : 00000000`00000000 ffffe000`0ccb3500 ffffe000`0cd15bc0 ffffe000`0c65e1a0 : nt!PoFxIdleComponent+0xe
fffff801`2884a500 00000000`00000000     : ffffe000`0ccb3500 ffffe000`0cd15bc0 ffffe000`0c65e1a0 ffffe000`0cd0acc0 : 0xffffe000`0ce95550


SYMBOL_NAME:  Rt630x64+24d4d

MODULE_NAME: Rt630x64

IMAGE_NAME:  Rt630x64.sys

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  24d4d

FAILURE_BUCKET_ID:  AV_Rt630x64!unknown_function

OS_VERSION:  8.1.9600.17415

BUILDLAB_STR:  winblue_r4

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8.1

FAILURE_ID_HASH:  {5e5e7311-2d42-08f4-f9f1-9709493bc906}

Followup:     MachineOwner
---------


DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffff80000003630, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000008, value 0 = read operation, 1 = write operation
Arg4: fffff80060fc3630, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 11108

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 15936

    Key  : Analysis.Init.CPU.mSec
    Value: 843

    Key  : Analysis.Init.Elapsed.mSec
    Value: 1885

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 88

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  d1

BUGCHECK_P1: fffff80000003630

BUGCHECK_P2: 2

BUGCHECK_P3: 8

BUGCHECK_P4: fffff80060fc3630

READ_ADDRESS: fffff8005ccfb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
fffff80000003630

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  fffff800619cd3a0 -- (.trap 0xfffff800619cd3a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000040 rbx=0000000000000000 rcx=ffffaa0b72b03300
rdx=0000000000000023 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80060fc3630 rsp=fffff800619cd538 rbp=fffff800619cd640
r8=000000000002e215  r9=0000000000000000 r10=ffffaa0b72b03000
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
NETIO!RtlGetNextExpirationTimerWheelTick+0x40:
fffff800`60fc3630 448b09          mov     r9d,dword ptr [rcx] ds:ffffaa0b`72b03300=00000000
Resetting default scope

STACK_TEXT: 
fffff800`619cd258 fffff800`5c407b69     : 00000000`0000000a fffff800`00003630 00000000`00000002 00000000`00000008 : nt!KeBugCheckEx
fffff800`619cd260 fffff800`5c403e69     : ffffaa0b`76eebf40 fffff800`7436c1d5 00000000`00000000 ffffaa0b`76feebd0 : nt!KiBugCheckDispatch+0x69
fffff800`619cd3a0 fffff800`60fc3630     : fffff800`6105f512 00000000`0002e0ec 00000000`00000000 fffff800`00000006 : nt!KiPageFault+0x469
fffff800`619cd538 fffff800`6105f512     : 00000000`0002e0ec 00000000`00000000 fffff800`00000006 00000000`0002e0ec : NETIO!RtlGetNextExpirationTimerWheelTick+0x40
fffff800`619cd540 fffff800`5c20781e     : fffff800`58b27240 fffff800`619cd860 fffff800`619cda20 fffff800`58b24180 : tcpip!TcpPeriodicTimeoutHandler+0xa72
fffff800`619cd760 fffff800`5c206b04     : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x30e
fffff800`619cd8d0 fffff800`5c3f97be     : 00000000`00000000 fffff800`58b24180 fffff800`5cd27600 ffffaa0b`79ee0040 : nt!KiRetireDpcList+0x1f4
fffff800`619cdb60 00000000`00000000     : fffff800`619ce000 fffff800`619c7000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e


SYMBOL_NAME:  NETIO!RtlGetNextExpirationTimerWheelTick+40

MODULE_NAME: NETIO

IMAGE_NAME:  NETIO.SYS

IMAGE_VERSION:  10.0.19041.610

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  40

FAILURE_BUCKET_ID:  AV_NETIO!RtlGetNextExpirationTimerWheelTick

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {832c4dc1-73b9-2c91-516c-cde32f637c45}

Followup:     MachineOwner
---------


DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffff8000f8ab65c, memory referenced
Arg2: 0000000000000006, IRQL
Arg3: 0000000000000008, value 0 = read operation, 1 = write operation
Arg4: fffff80014a7b65c, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for Rt630x64.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3171

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 30976

    Key  : Analysis.Init.CPU.mSec
    Value: 1265

    Key  : Analysis.Init.Elapsed.mSec
    Value: 30438

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 66

    Key  : WER.OS.Branch
    Value: winblue_r4

    Key  : WER.OS.Timestamp
    Value: 2014-10-28T15:00:00Z

    Key  : WER.OS.Version
    Value: 8.1.9600.17415


BUGCHECK_CODE:  d1

BUGCHECK_P1: fffff8000f8ab65c

BUGCHECK_P2: 6

BUGCHECK_P3: 8

BUGCHECK_P4: fffff80014a7b65c

READ_ADDRESS: GetUlongPtrFromAddress: unable to read from fffff8010fbdf298
GetUlongPtrFromAddress: unable to read from fffff8010fbdf520
fffff8000f8ab65c

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  dwm.exe

TRAP_FRAME:  fffff8011165ccc0 -- (.trap 0xfffff8011165ccc0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffd001215aa0fe rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000084 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80014a7b65c rsp=fffff8011165ce50 rbp=0000000000000001
r8=0000000000000000  r9=0000000000000000 r10=0000000000000001
r11=0000000000008000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
Rt630x64+0x565c:
fffff800`14a7b65c 44388b67750000  cmp     byte ptr [rbx+7567h],r9b ds:00000000`00007567=??
Resetting default scope

STACK_TEXT: 
fffff801`1165cb78 fffff801`0f9d84e9     : 00000000`0000000a fffff800`0f8ab65c 00000000`00000006 00000000`00000008 : nt!KeBugCheckEx
fffff801`1165cb80 fffff801`0f9d6d3a     : 00000000`00000008 ffffe000`67c6d000 ffffe275`79b29000 00000000`0000000d : nt!KiBugCheckDispatch+0x69
fffff801`1165ccc0 fffff800`14a7b65c     : 00000000`00000000 fffff801`0f9471d7 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x23a
fffff801`1165ce50 00000000`00000000     : fffff801`0f9471d7 00000000`00000000 00000000`00000000 00000000`00000000 : Rt630x64+0x565c


SYMBOL_NAME:  Rt630x64+565c

MODULE_NAME: Rt630x64

IMAGE_NAME:  Rt630x64.sys

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  565c

FAILURE_BUCKET_ID:  AV_Rt630x64!unknown_function

OS_VERSION:  8.1.9600.17415

BUILDLAB_STR:  winblue_r4

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8.1

FAILURE_ID_HASH:  {5e5e7311-2d42-08f4-f9f1-9709493bc906}

Followup:     MachineOwner
---------


Microsoft (R) Windows Debugger Version 10.0.21306.1007 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\Recep\Downloads\Compressed\032021-11265-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff801`60600000 PsLoadedModuleList = 0xfffff801`6122a490
Debug session time: Sat Mar 20 19:25:33.893 2021 (UTC + 3:00)
System Uptime: 0 days 0:01:38.605
Loading Kernel Symbols
...............................................................
................................................................
................................................................
.........
Loading User Symbols
Loading unloaded module list
......
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff801`609f5c50 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:fffff801`64c6d260=000000000000000a
0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffff80160503630, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000008, value 0 = read operation, 1 = write operation
Arg4: fffff80163fc3630, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 11390

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 18336

    Key  : Analysis.Init.CPU.mSec
    Value: 734

    Key  : Analysis.Init.Elapsed.mSec
    Value: 2036

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 88

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  d1

BUGCHECK_P1: fffff80160503630

BUGCHECK_P2: 2

BUGCHECK_P3: 8

BUGCHECK_P4: fffff80163fc3630

READ_ADDRESS: fffff801612fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
fffff80160503630

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  fffff80164c6d3a0 -- (.trap 0xfffff80164c6d3a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000040 rbx=0000000000000000 rcx=ffffdd8fe1e991e0
rdx=000000000000002f rsi=0000000000000000 rdi=0000000000000000
rip=fffff80163fc3630 rsp=fffff80164c6d538 rbp=fffff80164c6d640
r8=000000000001830f  r9=0000000000023350 r10=ffffdd8fe1e99000
r11=ffffdd8fe1e99cd0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz ac pe nc
NETIO!RtlGetNextExpirationTimerWheelTick+0x40:
fffff801`63fc3630 448b09          mov     r9d,dword ptr [rcx] ds:ffffdd8f`e1e991e0=00000000
Resetting default scope

STACK_TEXT:
fffff801`64c6d258 fffff801`60a07b69     : 00000000`0000000a fffff801`60503630 00000000`00000002 00000000`00000008 : nt!KeBugCheckEx
fffff801`64c6d260 fffff801`60a03e69     : 00000000`00000000 ffffdd8f`e8abe5f0 ffffdd8f`f1987520 ffffdd8f`ee8a9ac0 : nt!KiBugCheckDispatch+0x69
fffff801`64c6d3a0 fffff801`63fc3630     : fffff801`6409f512 00000000`000181c3 00000000`00000000 fffff801`00000006 : nt!KiPageFault+0x469
fffff801`64c6d538 fffff801`6409f512     : 00000000`000181c3 00000000`00000000 fffff801`00000006 00000000`000181c3 : NETIO!RtlGetNextExpirationTimerWheelTick+0x40
fffff801`64c6d540 fffff801`6080781e     : fffff801`5c612240 00000000`00000000 fffff801`64c6da20 fffff801`5c60f180 : tcpip!TcpPeriodicTimeoutHandler+0xa72
fffff801`64c6d760 fffff801`60806b04     : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x30e
fffff801`64c6d8d0 fffff801`609f97be     : 00000000`00000000 fffff801`5c60f180 fffff801`61327600 ffffdd8f`f9836080 : nt!KiRetireDpcList+0x1f4
fffff801`64c6db60 00000000`00000000     : fffff801`64c6e000 fffff801`64c67000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e


SYMBOL_NAME:  NETIO!RtlGetNextExpirationTimerWheelTick+40

MODULE_NAME: NETIO

IMAGE_NAME:  NETIO.SYS

IMAGE_VERSION:  10.0.19041.610

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  40

FAILURE_BUCKET_ID:  AV_NETIO!RtlGetNextExpirationTimerWheelTick

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {832c4dc1-73b9-2c91-516c-cde32f637c45}

Followup:     MachineOwner
---------

0: kd> lmvm NETIO
Browse full module list
start             end                 module name
fffff801`63fb0000 fffff801`64048000   NETIO    # (pdb symbols)          C:\ProgramData\Dbg\sym\netio.pdb\F2507BD039FA9728FF27C4D5831A36B81\netio.pdb
    Loaded symbol image file: NETIO.SYS
    Mapped memory image file: C:\ProgramData\Dbg\sym\NETIO.SYS\B358C89B98000\NETIO.SYS
    Image path: \SystemRoot\system32\drivers\NETIO.SYS
    Image name: NETIO.SYS
    Browse all global symbols  functions  data
    Image was built with /Brepro flag.
    Timestamp:        B358C89B (This is a reproducible build file hash, not a timestamp)
    CheckSum:         00093D64
    ImageSize:        00098000
    File version:     10.0.19041.610
    Product version:  10.0.19041.610
    File flags:       0 (Mask 3F)
    File OS:          40004 NT Win32
    File type:        3.6 Driver
    File date:        00000000.00000000
    Translations:     0409.04b0
    Information from resource tables:
        CompanyName:      Microsoft Corporation
        ProductName:      Microsoft® Windows® Operating System
        InternalName:     netio.sys
        OriginalFilename: netio.sys
        ProductVersion:   10.0.19041.610
        FileVersion:      10.0.19041.610 (WinBuild.160101.0800)
        FileDescription:  Network I/O Subsystem
        LegalCopyright:   © Microsoft Corporation. All rights reserved.

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000040, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff8002b043630, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 8406

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 38204

    Key  : Analysis.Init.CPU.mSec
    Value: 765

    Key  : Analysis.Init.Elapsed.mSec
    Value: 1949

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 89

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  d1

BUGCHECK_P1: 40

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff8002b043630

WRITE_ADDRESS: fffff800278fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
0000000000000040

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  fffff8002bc6d3a0 -- (.trap 0xfffff8002bc6d3a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000040 rbx=0000000000000000 rcx=ffffb288b3aef438
rdx=0000000000000016 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8002b043630 rsp=fffff8002bc6d538 rbp=fffff8002bc6d640
r8=000000000002448e  r9=0000000000000000 r10=ffffb288b3aef000
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
NETIO!RtlGetNextExpirationTimerWheelTick+0x40:
fffff800`2b043630 448b09          mov     r9d,dword ptr [rcx] ds:ffffb288`b3aef438=00000000
Resetting default scope

STACK_TEXT: 
fffff800`2bc6d258 fffff800`27007b69     : 00000000`0000000a 00000000`00000040 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff800`2bc6d260 fffff800`27003e69     : 00000000`00000000 ffffb288`be992000 00000000`00000200 fffff800`26ef3fe4 : nt!KiBugCheckDispatch+0x69
fffff800`2bc6d3a0 fffff800`2b043630     : fffff800`2b11f512 00000000`000232d0 00000000`00000000 fffff800`00000006 : nt!KiPageFault+0x469
fffff800`2bc6d538 fffff800`2b11f512     : 00000000`000232d0 00000000`00000000 fffff800`00000006 00000000`000232d0 : NETIO!RtlGetNextExpirationTimerWheelTick+0x40
fffff800`2bc6d540 fffff800`26e0781e     : fffff800`2363b240 fffff800`2bc6da10 fffff800`2bc6da30 fffff800`23638180 : tcpip!TcpPeriodicTimeoutHandler+0xa72
fffff800`2bc6d760 fffff800`26e06b04     : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`0000158a : nt!KiExecuteAllDpcs+0x30e
fffff800`2bc6d8d0 fffff800`26ff97be     : 00000000`00000000 fffff800`23638180 fffff800`27927600 ffffb288`c4dae080 : nt!KiRetireDpcList+0x1f4
fffff800`2bc6db60 00000000`00000000     : fffff800`2bc6e000 fffff800`2bc67000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e


SYMBOL_NAME:  NETIO!RtlGetNextExpirationTimerWheelTick+40

MODULE_NAME: NETIO

IMAGE_NAME:  NETIO.SYS

IMAGE_VERSION:  10.0.19041.610

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  40

FAILURE_BUCKET_ID:  AV_NETIO!RtlGetNextExpirationTimerWheelTick

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {832c4dc1-73b9-2c91-516c-cde32f637c45}

Followup:     MachineOwner
---------

Bellek sorunu gibi gözükenler:

Kod:
ATTEMPTED_EXECUTE_OF_NOEXECUTE_MEMORY (fc)
An attempt was made to execute non-executable memory.  The guilty driver
is on the stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: ffffc78cb433d000, Virtual address for the attempted execute.
Arg2: 8a000004248008e3, PTE contents.
Arg3: fffff80255658fc0, (reserved)
Arg4: 0000000000000003, (reserved)

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 6234

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 131692

    Key  : Analysis.Init.CPU.mSec
    Value: 999

    Key  : Analysis.Init.Elapsed.mSec
    Value: 79257

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 72

    Key  : WER.OS.Branch
    Value: 19h1_release

    Key  : WER.OS.Timestamp
    Value: 2019-03-18T12:02:00Z

    Key  : WER.OS.Version
    Value: 10.0.18362.1


BUGCHECK_CODE:  fc

BUGCHECK_P1: ffffc78cb433d000

BUGCHECK_P2: 8a000004248008e3

BUGCHECK_P3: fffff80255658fc0

BUGCHECK_P4: 3

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  fffff80255658fc0 -- (.trap 0xfffff80255658fc0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000001 rbx=0000000000000000 rcx=0000000000004000
rdx=0000000002067121 rsi=0000000000000000 rdi=0000000000000000
rip=ffffc78cb433d000 rsp=fffff80255659150 rbp=fffff80255659150
r8=ffffc78ca4c2ac80  r9=0000000000000000 r10=fffff802508fa8b0
r11=fffff802556590d0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
ffffc78c`b433d000 56              push    rsi
Resetting default scope

STACK_TEXT: 
fffff802`55658d98 fffff802`50a56a82     : 00000000`000000fc ffffc78c`b433d000 8a000004`248008e3 fffff802`55658fc0 : nt!KeBugCheckEx
fffff802`55658da0 fffff802`50a50e29     : 00000000`00000003 00000000`00000001 00000000`00000000 fffff802`55658ee0 : nt!MiCheckSystemNxFault+0x1228be
fffff802`55658de0 fffff802`508cac3a     : 00000000`00000000 00000000`00000011 fffff802`55658f20 00000000`00000000 : nt!MiRaisedIrqlFault+0x127de9
fffff802`55658e20 fffff802`509d1b5e     : fffff802`55658fd0 00000000`00000000 fffff802`556590d8 fffff802`6bd48c58 : nt!MmAccessFault+0x48a
fffff802`55658fc0 ffffc78c`b433d000     : fffff802`55659150 fffff802`55659150 00000000`00000000 ffffc78c`b4232000 : nt!KiPageFault+0x35e
fffff802`55659150 fffff802`55659150     : fffff802`55659150 00000000`00000000 ffffc78c`b4232000 00000000`00000000 : 0xffffc78c`b433d000
fffff802`55659158 fffff802`55659150     : 00000000`00000000 ffffc78c`b4232000 00000000`00000000 ffffc78c`b43d6680 : 0xfffff802`55659150
fffff802`55659160 00000000`00000000     : ffffc78c`b4232000 00000000`00000000 ffffc78c`b43d6680 ffffc78c`b43d6680 : 0xfffff802`55659150


SYMBOL_NAME:  nt!MiCheckSystemNxFault+1228be

MODULE_NAME: nt

IMAGE_VERSION:  10.0.18362.1171

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET:  1228be

FAILURE_BUCKET_ID:  0xFC_nt!MiCheckSystemNxFault

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {a6ae5288-6b71-974a-9b09-23f14d998164}

Followup:     MachineOwner
---------


PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: fffffa276d067686, memory referenced.
Arg2: 0000000000000010, value 0 = read operation, 1 = write operation.
Arg3: fffffa2757607686, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 8968

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 16158

    Key  : Analysis.Init.CPU.mSec
    Value: 827

    Key  : Analysis.Init.Elapsed.mSec
    Value: 2061

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 80

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  50

BUGCHECK_P1: fffffa276d067686

BUGCHECK_P2: 10

BUGCHECK_P3: fffffa2757607686

BUGCHECK_P4: 2

READ_ADDRESS: fffff8046dafb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
fffffa276d067686

MM_INTERNAL_CODE:  2

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  dwm.exe

TRAP_FRAME:  ffffa60414bff7e0 -- (.trap 0xffffa60414bff7e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa4b406098a0 rbx=0000000000000000 rcx=0000000000000021
rdx=0000000000000020 rsi=0000000000000000 rdi=0000000000000000
rip=fffffa2757607686 rsp=ffffa60414bff970 rbp=ffffa60414bffa80
r8=0000000000000008  r9=7fffb908bcdf4130 r10=0000000000000000
r11=ffffa60414bff900 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
win32kbase!NtDCompositionConfirmFrame+0x236:
fffffa27`57607686 48ffc2          inc     rdx
Resetting default scope

STACK_TEXT: 
ffffa604`14bff538 fffff804`6d21eb01     : 00000000`00000050 fffffa27`6d067686 00000000`00000010 ffffa604`14bff7e0 : nt!KeBugCheckEx
ffffa604`14bff540 fffff804`6d00c960     : ffff9185`98849dc0 00000000`00000010 ffffa604`14bff860 00000000`00000000 : nt!MiSystemFault+0x1f42f1
ffffa604`14bff640 fffff804`6d203d5e     : 00000000`00000000 00000000`00000001 00000000`00000458 fffff804`6d3da890 : nt!MmAccessFault+0x400
ffffa604`14bff7e0 fffffa27`57607686     : ffffa604`14bffa80 fffffa4b`40716190 fffffa4b`40608a30 ffff9185`98aa5b90 : nt!KiPageFault+0x35e
ffffa604`14bff970 fffffa27`57fcea8e     : 00000000`00000004 00000000`0000001d fffffa4b`40608a30 ffffb908`c2d1bab0 : win32kbase!NtDCompositionConfirmFrame+0x236
ffffa604`14bff9d0 fffff804`6d2075b5     : ffff9185`95488080 ffff9185`95488080 00000220`fec825b8 00000000`00000020 : win32k!NtDCompositionConfirmFrame+0x16
ffffa604`14bffa00 00007ff9`dedc3464     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
0000007b`c22ff568 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`dedc3464


SYMBOL_NAME:  win32kbase!NtDCompositionConfirmFrame+236

MODULE_NAME: win32kbase

IMAGE_NAME:  win32kbase.sys

IMAGE_VERSION:  10.0.19041.1140

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  236

FAILURE_BUCKET_ID:  AV_INVALID_win32kbase!NtDCompositionConfirmFrame

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {98e5e761-10b5-a9f3-5600-52cd0706e901}

Followup:     MachineOwner
---------

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffffffffffff8f, memory referenced.
Arg2: 0000000000000001, value 0 = read operation, 1 = write operation.
Arg3: fffff960001cb4ae, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000000, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4062

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 58432

    Key  : Analysis.Init.CPU.mSec
    Value: 1233

    Key  : Analysis.Init.Elapsed.mSec
    Value: 35166

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 83

    Key  : WER.OS.Branch
    Value: winblue_r4

    Key  : WER.OS.Timestamp
    Value: 2014-10-28T15:00:00Z

    Key  : WER.OS.Version
    Value: 8.1.9600.17415


BUGCHECK_CODE:  50

BUGCHECK_P1: ffffffffffffff8f

BUGCHECK_P2: 1

BUGCHECK_P3: fffff960001cb4ae

BUGCHECK_P4: 0

WRITE_ADDRESS: GetUlongPtrFromAddress: unable to read from fffff80391978298
GetUlongPtrFromAddress: unable to read from fffff80391978520
ffffffffffffff8f

MM_INTERNAL_CODE:  0

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  csrss.exe

TRAP_FRAME:  ffffd000d4a8ed80 -- (.trap 0xffffd000d4a8ed80)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000003
rdx=0000000000000002 rsi=0000000000000000 rdi=0000000000000000
rip=fffff960001cb4ae rsp=ffffd000d4a8ef10 rbp=0000000000000003
r8=0000000000000000  r9=0000000000004000 r10=ffffd000d4a8f000
r11=fffff90144592488 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz ac po cy
win32k!itrp_DeltaEngine+0x156:
fffff960`001cb4ae 478b6437fc      mov     r12d,dword ptr [r15+r14-4] ds:ffffffff`fffffffc=????????
Resetting default scope

STACK_TEXT: 
ffffd000`d4a8eb18 fffff803`91793bd2     : 00000000`00000050 ffffffff`ffffff8f 00000000`00000001 ffffd000`d4a8ed80 : nt!KeBugCheckEx
ffffd000`d4a8eb20 fffff803`9166d2b9     : 00000000`00000001 ffffe000`ad481900 ffffd000`d4a8ed80 fffff803`916790f3 : nt! ?? ::FNODOBFM::`string'+0x1dd22
ffffd000`d4a8ebc0 fffff803`9176fc2f     : 00000000`00000001 00000000`00000002 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x769
ffffd000`d4a8ed80 fffff960`001cb4ae     : 00000000`00000000 fffff901`4459426f fffff901`44594100 fffff960`001ca126 : nt!KiPageFault+0x12f
ffffd000`d4a8ef10 fffff960`001f8bd3     : fffff901`445941b4 fffff960`001b4554 fffff901`445941b4 fffff960`001a0b14 : win32k!itrp_DeltaEngine+0x156
ffffd000`d4a8ef90 fffff960`001f89ad     : ffffd000`d4a8f0a9 fffff901`44593b5b 00000000`00000001 0000023c`0000041a : win32k!itrp_InnerExecute+0xb3
ffffd000`d4a8efe0 fffff960`001cba19     : fffff901`44592488 fffff901`44594270 00000000`00000010 ffffd000`d4a8f198 : win32k!itrp_Execute+0x2e9
ffffd000`d4a8f100 fffff960`001cb949     : fffff901`44591c78 fffff901`445890d0 000000e5`038c349c 00000000`00000000 : win32k!itrp_ExecutePrePgm+0x95
ffffd000`d4a8f140 fffff960`001f0037     : fffff901`445891b8 ffffd000`d4a8f200 fffff901`445890d0 00000000`00000000 : win32k!fsg_RunPreProgram+0x18d
ffffd000`d4a8f180 fffff960`001ee19c     : 00000000`00000000 fffff901`44589020 00000000`00000001 00000000`00000000 : win32k!fs__Contour+0x823
ffffd000`d4a8f240 fffff960`001f2a55     : fffff901`407a5030 ffffd000`d4a8f380 00000000`00000000 fffff901`44589378 : win32k!bGetGlyphOutline+0xf8
ffffd000`d4a8f280 fffff960`001f28fe     : fffff901`407a5030 fffff901`407a5030 00000000`00000004 00000000`00000001 : win32k!lGetGlyphBitmap+0x61
ffffd000`d4a8f460 fffff960`001f2737     : ffffe000`00000000 ffffe000`ad4b2a50 fffff901`42372ca0 fffff901`42372cb8 : win32k!ttfdQueryFontData+0x146
ffffd000`d4a8f4c0 fffff960`0013abf6     : fffff960`001f2690 fffff901`42372ca0 fffff901`400d3020 00000000`ffffffff : win32k!ttfdSemQueryFontData+0xa7
ffffd000`d4a8f520 fffff960`001398ae     : 00000000`00000001 80000000`3dd00020 3dd00000`00000000 00000000`00000003 : win32k!PDEVOBJ::QueryFontData+0x86
ffffd000`d4a8f5e0 fffff960`001395c2     : fffff901`42400000 fffff901`400be010 ffffd000`d4a8f7a0 00000000`00000000 : win32k!RFONTOBJ::bInitCache+0x11e
ffffd000`d4a8f6a0 fffff960`0013d196     : ffffe000`ae4fc5a0 ffffd000`d4a8f8f0 ffffd000`d4a8f990 ffffd000`d4a8f8b0 : win32k!RFONTOBJ::bRealizeFont+0x6a2
ffffd000`d4a8f7f0 fffff960`00149c1e     : 00000000`0018eb00 ffffd000`d4a8fa80 00000000`0018eb00 00000000`0018ea94 : win32k!RFONTOBJ::bInit+0x966
ffffd000`d4a8f940 fffff960`0013d55e     : 00000000`0018eb00 fffff960`0013d540 fffff901`42372ca0 fffff960`0016617e : win32k!GreGetTextMetricsW+0x3e
ffffd000`d4a8f980 fffff803`917711b3     : 00000000`00000044 fffff960`0013d540 00000000`00000020 00000000`7ffdb000 : win32k!NtGdiGetTextMetricsW+0x1f
ffffd000`d4a8fa00 00000000`77122352     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0008ee08 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77122352


SYMBOL_NAME:  win32k!itrp_DeltaEngine+156

MODULE_NAME: win32k

IMAGE_NAME:  win32k.sys

IMAGE_VERSION:  6.3.9600.17393

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  156

FAILURE_BUCKET_ID:  AV_win32k!itrp_DeltaEngine

OS_VERSION:  8.1.9600.17415

BUILDLAB_STR:  winblue_r4

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8.1

FAILURE_ID_HASH:  {ac44b6f3-08c5-0dc1-99e9-1692038be45b}

Followup:     MachineOwner
---------

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffffffffffff88, memory referenced.
Arg2: 0000000000000002, value 0 = read operation, 1 = write operation.
Arg3: fffff8075c606181, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


Could not read faulting driver name
*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 6655

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 20210

    Key  : Analysis.Init.CPU.mSec
    Value: 749

    Key  : Analysis.Init.Elapsed.mSec
    Value: 1997

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 78

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  50

BUGCHECK_P1: ffffffffffffff88

BUGCHECK_P2: 2

BUGCHECK_P3: fffff8075c606181

BUGCHECK_P4: 2

READ_ADDRESS: fffff8075d0fa388: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffffffffffff88

MM_INTERNAL_CODE:  2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  fffffc0500bbf5d0 -- (.trap 0xfffffc0500bbf5d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000fffffffe rbx=0000000000000000 rcx=fffffc0500bbf800
rdx=ffffd081c8217410 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8075c606181 rsp=fffffc0500bbf768 rbp=0000000000000008
r8=0000000000000008  r9=0000000000000000 r10=00000000ffffffff
r11=00000000ffffffff r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
nt!PopScanIdleList+0x315:
fffff807`5c606181 4c896580        mov     qword ptr [rbp-80h],r12 ss:0018:ffffffff`ffffff88=????????????????
Resetting default scope

STACK_TEXT:
fffffc05`00bbf3b8 fffff807`5c7de677     : 00000000`00000050 ffffffff`ffffff88 00000000`00000002 fffffc05`00bbf5d0 : nt!KeBugCheckEx
fffffc05`00bbf3c0 fffff807`5c666508     : ffffffff`ffffff88 00000000`c0000016 fffffc05`00bbf5d0 00000000`00000002 : nt!MiSystemFault+0x17f6fb
fffffc05`00bbf4c0 fffff807`5c7ab91e     : ffff9b03`00000002 ffff9b03`00000dd0 ffffcc86`c8dd6be0 00000000`00000000 : nt!MmAccessFault+0x218
fffffc05`00bbf5d0 fffff807`5c606181     : fffff807`5c9b3e82 ffffcc86`bde70000 ffff9b03`20666e57 ffffcc86`00000000 : nt!KiPageFault+0x35e
fffffc05`00bbf768 ffff9b03`67c43340     : fffff807`5c684911 00000000`00000000 ffff9b03`67c43778 ffff9b03`67c43340 : nt!PopScanIdleList+0x315
fffffc05`00bbf8e8 fffff807`5c684911     : 00000000`00000000 ffff9b03`67c43778 ffff9b03`67c43340 00000000`00000000 : 0xffff9b03`67c43340
fffffc05`00bbf8f0 fffff807`5c9a253c     : 00000000`00000000 ffff9b03`67818568 ffff9b03`67c43778 ffff9b03`67818050 : nt!ObfDereferenceObjectWithTag+0x91
fffffc05`00bbf930 fffff807`5c9dd1b8     : 00000000`00000000 ffff9b03`67818050 ffff9b03`67818080 ffff9b03`524b7a20 : nt!PspThreadDelete+0x33c
fffffc05`00bbf9a0 fffff807`5c684911     : 00000000`00000000 00000000`00000000 ffff9b03`67818080 00000000`00000000 : nt!ObpRemoveObjectRoutine+0x84
fffffc05`00bbfa00 fffff807`5c6eb4c2     : 00000000`00000000 00000000`00000000 00000000`00000000 ffff9b03`678184d8 : nt!ObfDereferenceObjectWithTag+0x91
fffffc05`00bbfa40 fffff807`5c61a349     : ffff9b03`65de6040 fffff807`5c6eb450 fffff807`5d0259a0 00000000`00000200 : nt!PspReaper+0x72
fffffc05`00bbfa70 fffff807`5c60b1b5     : ffff9b03`65de6040 ffff9b03`65de6040 00000000`00000080 00000000`00000000 : nt!ExpWorkerThread+0xf9
fffffc05`00bbfb10 fffff807`5c7a4e98     : fffff807`58137180 ffff9b03`65de6040 fffff807`5c60b160 00000000`00000000 : nt!PspSystemThreadStartup+0x55
fffffc05`00bbfb60 00000000`00000000     : fffffc05`00bc0000 fffffc05`00bb9000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  nt!PopScanIdleList+315

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.1

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  315

FAILURE_BUCKET_ID:  AV_INVALID_nt!PopScanIdleList

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {c4575f46-bd11-a9ca-7ee7-f8e501aac631}

Followup:     MachineOwner
---------

Kategorisiz/donanımsal:

Kod:
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 000000003c143a35, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 00000000000000e0, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80420473631, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 7234

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 14432

    Key  : Analysis.Init.CPU.mSec
    Value: 796

    Key  : Analysis.Init.Elapsed.mSec
    Value: 2025

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 81

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  a

BUGCHECK_P1: 3c143a35

BUGCHECK_P2: ff

BUGCHECK_P3: e0

BUGCHECK_P4: fffff80420473631

READ_ADDRESS: fffff80420efb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
000000003c143a35

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  fffff8042586d610 -- (.trap 0xfffff8042586d610)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000003c143a35 rbx=0000000000000000 rcx=0000000000002710
rdx=000000003c15f064 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80420473631 rsp=fffff8042586d7a0 rbp=000000003c134fd5
r8=000000003c159d82  r9=000000003c138e2a r10=fffff8041d11f180
r11=0000000000000001 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up di ng nz na pe cy
nt!KiGetNextTimerExpirationDueTime+0x2a1:
fffff804`20473631 4803c1          add     rax,rcx
Resetting default scope

STACK_TEXT:
fffff804`2586d4c8 fffff804`20607b69     : 00000000`0000000a 00000000`3c143a35 00000000`000000ff 00000000`000000e0 : nt!KeBugCheckEx
fffff804`2586d4d0 fffff804`20603e69     : 00000000`00000000 00000000`0000003f 00000000`00000000 fffff804`00000000 : nt!KiBugCheckDispatch+0x69
fffff804`2586d610 fffff804`20473631     : fffff804`1d11f180 00000000`3c134fd5 00000000`00000f01 fffff804`2586d800 : nt!KiPageFault+0x469
fffff804`2586d7a0 fffff804`20473301     : 00000000`3c138e2a 00000000`00989601 00000000`3c134fd5 ffffffff`ffffffff : nt!KiGetNextTimerExpirationDueTime+0x2a1
fffff804`2586d800 fffff804`2046ffd7     : 00000000`00000000 00001f80`00000000 00000000`00000003 00000000`00000002 : nt!PpmIdlePrepare+0x581
fffff804`2586d9f0 fffff804`205f9774     : 00000000`00000000 fffff804`20f27600 ffffb70f`f1d0e080 00000000`000002ba : nt!PoIdle+0x1f7
fffff804`2586db60 00000000`00000000     : fffff804`2586e000 fffff804`25867000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x54


SYMBOL_NAME:  nt!KiGetNextTimerExpirationDueTime+2a1

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.867

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  2a1

FAILURE_BUCKET_ID:  AV_nt!KiGetNextTimerExpirationDueTime

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {fb98d682-2f5f-b11b-1a7d-94cf0bd39105}

Followup:     MachineOwner
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80529f7b687, Address of the instruction which caused the bugcheck
Arg3: fffffe0acb818a70, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5374

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 8523

    Key  : Analysis.Init.CPU.mSec
    Value: 812

    Key  : Analysis.Init.Elapsed.mSec
    Value: 2006

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 73

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff80529f7b687

BUGCHECK_P3: fffffe0acb818a70

BUGCHECK_P4: 0

CONTEXT:  fffffe0acb818a70 -- (.cxr 0xfffffe0acb818a70)
rax=0000000000000100 rbx=ffffe501656497ac rcx=ffffe501656497b8
rdx=ffffbd8d4641681c rsi=0000000000000004 rdi=0000000000000001
rip=fffff80529f7b687 rsp=fffffe0acb819478 rbp=00000000000f0100
r8=0000000000000008  r9=0000000000000000 r10=ffffa28ec00ee6d0
r11=7fffe5015c20b040 r12=00000000000f0101 r13=0000000000000000
r14=fffffe0acb819600 r15=ffffa28eaba5ffd0
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050246
nt!memcmp+0x87:
fffff805`29f7b687 4d8bc8          mov     r9,r8
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  svchost.exe

STACK_TEXT: 
fffffe0a`cb819478 fffff805`29e853be     : 00000000`00000000 ffffe501`5c20b040 ffffe501`5c20b030 fffff805`2a1ddb73 : nt!memcmp+0x87
fffffe0a`cb819480 fffff805`29e84adf     : ffffa28e`abe10300 ffffa28e`abaa70c0 fffffe0a`cb8196d0 fffffe0a`cb819500 : nt!RtlEqualSid+0x1e
fffffe0a`cb8194b0 fffff805`29e870f1     : ffffe501`65649760 00000000`000f01ff 00000000`00000000 00000000`00000000 : nt!RtlpOwnerAcesPresent+0x97
fffffe0a`cb8194f0 fffff805`2a1dd64f     : 00000000`00000000 fffffe0a`cb819629 fffffe0a`00000000 fffffe0a`cb819600 : nt!SeComputeCreatorDeniedRights+0x9d
fffffe0a`cb819580 fffff805`2a19e171     : ffffa28e`00000001 fffffe0a`cb8196d0 00000000`00000000 fffff805`29e8143c : nt!ObpCreateHandle+0x1cf
fffffe0a`cb819670 fffff805`2a19d335     : ffffa28e`c00ee001 fffffe0a`cb819a80 00000033`3e67f501 ffffa28e`c00ee080 : nt!ObOpenObjectByPointer+0x111
fffffe0a`cb8198a0 fffff805`2a19cf91     : ffffa28e`c00ee080 000001c8`000f01ff 00000033`3e67f500 00000033`3e67f4a0 : nt!NtOpenThreadTokenEx+0x395
fffffe0a`cb8199c0 fffff805`29faf175     : 00000033`3e67f4a0 00000000`00000001 00000000`000f01ff ffffffff`fffffffe : nt!NtOpenThreadToken+0x11
fffffe0a`cb819a00 00007ffc`6bc6b254     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
00000033`3e67f408 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`6bc6b254


SYMBOL_NAME:  nt!RtlEqualSid+1e

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.1

STACK_COMMAND:  .cxr 0xfffffe0acb818a70 ; kb

BUCKET_ID_FUNC_OFFSET:  1e

FAILURE_BUCKET_ID:  0x3B_c0000005_nt!RtlEqualSid

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {17930790-1e42-fd4b-da61-00f39cc7aac1}

Followup:     MachineOwner
---------

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 0000000080000003, Exception code that caused the bugcheck
Arg2: fffff8001ccf1b93, Address of the instruction which caused the bugcheck
Arg3: fffff609e535a870, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 6187

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 23354

    Key  : Analysis.Init.CPU.mSec
    Value: 827

    Key  : Analysis.Init.Elapsed.mSec
    Value: 2049

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 73

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  3b

BUGCHECK_P1: 80000003

BUGCHECK_P2: fffff8001ccf1b93

BUGCHECK_P3: fffff609e535a870

BUGCHECK_P4: 0

CONTEXT:  fffff609e535a870 -- (.cxr 0xfffff609e535a870)
rax=fffff609e535b298 rbx=fffff609e535c4a8 rcx=0000000000000000
rdx=fffff609e535c4a8 rsi=fffff609e535baa0 rdi=0000000000000000
rip=fffff8001ccf1b93 rsp=fffff609e535b270 rbp=fffff609e535b880
r8=fffff609e535baa0  r9=fffff609e535b8e0 r10=0000000000000007
r11=00007fffffff0000 r12=fffff609e535c8a0 r13=fffff609e535c268
r14=fffff609e535b8e0 r15=fffff609e535b380
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00040246
nt!KeCheckStackAndTargetAddress+0x53:
fffff800`1ccf1b93 cc              int     3
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  svchost.exe

STACK_TEXT: 
fffff609`e535b270 fffff800`1cd790eb     : fffff609`e535c8a0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeCheckStackAndTargetAddress+0x53
fffff609`e535b2a0 fffff800`1cda66ff     : 00000000`00000000 fffff609`e535b880 fffff609`e535c8a0 00000000`00000000 : nt!_C_specific_handler+0x3b
fffff609`e535b310 fffff800`1cc485d0     : 00000000`00000000 fffff609`e535b880 fffff609`e535c8a0 ffffc809`a42c4040 : nt!RtlpExecuteHandlerForException+0xf
fffff609`e535b340 fffff800`1ccccdd6     : fffff609`e535c268 fffff609`e535bfa0 fffff609`e535c268 00000000`00000001 : nt!RtlDispatchException+0x280
fffff609`e535ba70 fffff800`1cdaf86c     : ffffc809`a42eba40 00000000`00000000 fffff609`e535c278 ffffc809`a42eb980 : nt!KiDispatchException+0x186
fffff609`e535c130 fffff800`1cdaba03     : 00000000`00000000 fffff800`1cfd3421 ffffb70a`1e4c4dac 00000000`00000000 : nt!KiExceptionDispatch+0x12c
fffff609`e535c310 00000000`00000000     : fffff800`1cc84adf ffffc809`a42eb300 ffffc809`8fcc1e80 fffff609`e535c6d0 : nt!KiPageFault+0x443


SYMBOL_NAME:  nt!KeCheckStackAndTargetAddress+53

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.1

STACK_COMMAND:  .cxr 0xfffff609e535a870 ; kb

BUCKET_ID_FUNC_OFFSET:  53

FAILURE_BUCKET_ID:  0x3B_80000003_nt!KeCheckStackAndTargetAddress

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {3c8e413e-71c2-0077-9ab0-f2dd61308472}

Followup:     MachineOwner
---------

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8004ad7b687, Address of the instruction which caused the bugcheck
Arg3: ffff900a0bceb9a0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5749

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 16817

    Key  : Analysis.Init.CPU.mSec
    Value: 733

    Key  : Analysis.Init.Elapsed.mSec
    Value: 1956

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 73

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff8004ad7b687

BUGCHECK_P3: ffff900a0bceb9a0

BUGCHECK_P4: 0

CONTEXT:  ffff900a0bceb9a0 -- (.cxr 0xffff900a0bceb9a0)
rax=0000000000000101 rbx=ffff9f8fdb9ecca8 rcx=ffff9f8fdb9eccb0
rdx=00002675b1a73320 rsi=0000000000000004 rdi=0000000000000003
rip=fffff8004ad7b687 rsp=ffff900a0bcec3a8 rbp=00000000000f0100
r8=000000000000000c  r9=0000000000000000 r10=0000000000000000
r11=0000000000000005 r12=ffff9f8fedd71001 r13=ffffc6058d4a7bc0
r14=ffff900a0bcec600 r15=ffffc6058d45ffd0
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050246
nt!memcmp+0x87:
fffff800`4ad7b687 4d8bc8          mov     r9,r8
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  svchost.exe

STACK_TEXT: 
ffff900a`0bcec3a8 fffff800`4ac853be     : ffff9f8f`ce600000 00000000`64536553 00000000`00000000 00000000`00000000 : nt!memcmp+0x87
ffff900a`0bcec3b0 fffff800`4ac84adf     : ffff9f8f`ce600100 fffff800`4ac68eff 00000000`011000d0 00000000`00000000 : nt!RtlEqualSid+0x1e
ffff900a`0bcec3e0 fffff800`4ac870f1     : ffff9f8f`db9ecc20 00000000`000f01ff 00000000`00000000 fffff800`4ac93431 : nt!RtlpOwnerAcesPresent+0x97
ffff900a`0bcec420 fffff800`4afde598     : ffff900a`0bcec6d0 ffffc605`8d4a7bc0 ffffc605`00000000 fffff800`4ac68eff : nt!SeComputeCreatorDeniedRights+0x9d
ffff900a`0bcec4b0 fffff800`4afde154     : ffff9f8f`e8fa0000 ffff900a`0bcec6d0 00000000`00000103 00000000`00000000 : nt!ObpAdjustCreatorAccessState+0x90
ffff900a`0bcec520 fffff800`4afdd574     : ffffffff`00000000 00000000`00000000 ffff9f8f`db9ecc20 00000000`00000000 : nt!ObpGrantAccess+0x64
ffff900a`0bcec560 fffff800`4afebfb9     : 00000000`00000000 00000000`00000000 ffff900a`00000000 ffffc605`a3bdcae0 : nt!ObpCreateHandle+0xf4
ffff900a`0bcec650 fffff800`4af9d26a     : ffff9f8f`e617a380 00000000`00000000 00000000`00000000 ffff9f8f`e617a380 : nt!ObInsertObjectEx+0x2bd
ffff900a`0bcec8a0 fffff800`4af9cf91     : ffffc605`9fbd5080 00000194`02000000 00000000`00000000 0000003a`c58fe3f0 : nt!NtOpenThreadTokenEx+0x2ca
ffff900a`0bcec9c0 fffff800`4adaf175     : 0000003a`c58fe3f0 00000000`00000001 00000000`02000000 ffffffff`fffffffe : nt!NtOpenThreadToken+0x11
ffff900a`0bceca00 00007ffc`dc60b254     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
0000003a`c58fe358 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`dc60b254


SYMBOL_NAME:  nt!RtlEqualSid+1e

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.1

STACK_COMMAND:  .cxr 0xffff900a0bceb9a0 ; kb

BUCKET_ID_FUNC_OFFSET:  1e

FAILURE_BUCKET_ID:  0x3B_c0000005_nt!RtlEqualSid

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {17930790-1e42-fd4b-da61-00f39cc7aac1}

Followup:     MachineOwner
---------

DRIVER_OVERRAN_STACK_BUFFER (f7)
A driver has overrun a stack-based buffer.  This overrun could potentially
allow a malicious user to gain control of this machine.
DESCRIPTION
A driver overran a stack-based buffer (or local variable) in a way that would
have overwritten the function's return address and jumped back to an arbitrary
address when the function returned.  This is the classic "buffer overrun"
hacking attack and the system has been brought down to prevent a malicious user
from gaining complete control of it.
Do a kb to get a stack backtrace -- the last routine on the stack before the
buffer overrun handlers and bugcheck call is the one that overran its local
variable(s).
Arguments:
Arg1: fffff688aef5930d, Actual security check cookie from the stack
Arg2: 000048421633d90b, Expected security check cookie
Arg3: ffffb7bde9cc26f4, Complement of the expected security check cookie
Arg4: 0000000000000000, zero

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5640

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 8031

    Key  : Analysis.Init.CPU.mSec
    Value: 811

    Key  : Analysis.Init.Elapsed.mSec
    Value: 1896

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 73

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  f7

BUGCHECK_P1: fffff688aef5930d

BUGCHECK_P2: 48421633d90b

BUGCHECK_P3: ffffb7bde9cc26f4

BUGCHECK_P4: 0

SECURITY_COOKIE:  Expected 000048421633d90b found fffff688aef5930d

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  WerFault.exe

TRAP_FRAME:  fffff688ae4e49f8 -- (.trap 0xfffff688ae4e49f8)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=0000000000000272 rsp=ffffcc88923f9370 rbp=0000000000000000
r8=0000000000000000  r9=fffff80426108537 r10=ffffbecab87d908b
r11=fffff8040cbb82f2 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0     vif ov up ei ng zr ac pe nc
0000:0272 ??              ???
Resetting default scope

BAD_STACK_POINTER:  ffffcc88923f9370

STACK_TEXT: 
fffff688`ae4e39e8 fffff804`0d84cda5     : 00000000`000000f7 fffff688`aef5930d 00004842`1633d90b ffffb7bd`e9cc26f4 : nt!KeBugCheckEx
fffff688`ae4e39f0 fffff804`0d77ea1e     : fffff688`ae4e4000 fffff804`0d648e7f ffffcc88`00000001 fffff804`0d400000 : nt!_report_gsfailure+0x25
fffff688`ae4e3a30 fffff804`0d77e9b3     : fffff688`ae4e3b00 00000000`00000000 fffff688`ae4e4038 fffff688`ae4e4008 : nt!_GSHandlerCheckCommon+0x5a
fffff688`ae4e3a60 fffff804`0d7a66ff     : fffff804`0d77e9a0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!_GSHandlerCheck+0x13
fffff688`ae4e3a90 fffff804`0d6485d0     : 00000000`00000000 fffff688`ae4e4000 fffff688`ae4e4c30 fffff688`ae4e3f80 : nt!RtlpExecuteHandlerForException+0xf
fffff688`ae4e3ac0 fffff804`0d6ccdd6     : fffff688`ae4e49e8 fffff688`ae4e4720 fffff688`ae4e49e8 00000000`00000000 : nt!RtlDispatchException+0x280
fffff688`ae4e41f0 fffff804`0d7af86c     : ffffcc88`90804a80 00000000`00000000 fffff688`ae4e49f8 ffffcc88`908049c0 : nt!KiDispatchException+0x186
fffff688`ae4e48b0 fffff804`0d7aba03     : ffff8e03`10d95db8 fffff804`260b7118 00000000`00000000 fffff688`ae4e4ae0 : nt!KiExceptionDispatch+0x12c
fffff688`ae4e4a90 fffff804`0da15c75     : fffff804`0d9d6821 ffffcc88`9144a010 00000000`00000000 fffff688`ae4e4e00 : nt!KiPageFault+0x443
fffff688`ae4e4c28 fffff804`0d9d6821     : ffffcc88`9144a010 00000000`00000000 fffff688`ae4e4e00 00000000`00000000 : nt!CmpRecordParseFailure+0x5
fffff688`ae4e4c30 00000000`00000000     : ffffcc88`00000000 ffff8e03`10d95b40 00000000`00000000 00000000`00000000 : nt!CmpDoParseKey+0x891


SYMBOL_NAME:  nt!_report_gsfailure+25

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.1

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  25

FAILURE_BUCKET_ID:  0xF7_MISSING_GSFRAME_STACKPTR_ERROR_nt!_report_gsfailure

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {b04fd4cf-a24c-7b9c-56e7-12bf917fd01c}

Followup:     MachineOwner
---------

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8074ee97630, Address of the instruction which caused the bugcheck
Arg3: ffffea8ad047e7a0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 6593

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 10454

    Key  : Analysis.Init.CPU.mSec
    Value: 811

    Key  : Analysis.Init.Elapsed.mSec
    Value: 1919

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 74

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff8074ee97630

BUGCHECK_P3: ffffea8ad047e7a0

BUGCHECK_P4: 0

CONTEXT:  ffffea8ad047e7a0 -- (.cxr 0xffffea8ad047e7a0)
rax=00000000000000a1 rbx=0000000000000000 rcx=00000000000000a0
rdx=ffffa0016037def2 rsi=0000000000000144 rdi=0000000000000000
rip=fffff8074ee97630 rsp=ffffea8ad047f1a0 rbp=0000000000000000
r8=ffffa0016037ddb0  r9=000000000000002e r10=ffffa0016037dd30
r11=00000000000000a2 r12=ffffa0016037dd68 r13=0000000000000000
r14=ffffa0016037dd88 r15=ffffa0016037dd78
iopl=0         nv up ei pl nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050206
FLTMGR!FltParseFileNameInformation+0x170:
fffff807`4ee97630 480fbfc1        movsx   rax,cx
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  MicrosoftEdgeCP.exe

STACK_TEXT: 
ffffea8a`d047f1a0 fffff807`4ee97454     : ffffd98e`3648e860 ffffd98e`3648e820 ffffd98e`259956a0 fffff807`4ee6214e : FLTMGR!FltParseFileNameInformation+0x170
ffffea8a`d047f1d0 fffff807`4ee99b3c     : ffffa001`582bed08 ffffd98e`3648e820 ffffd98e`3648e820 ffffd98e`3716da20 : FLTMGR!FltpIsCandidateForNameTunneling+0x20
ffffea8a`d047f220 fffff807`4ee670e4     : ffffd98e`3648e820 ffffd98e`36ea2d60 ffffd98e`3648e824 ffffd98e`3648e860 : FLTMGR!FltpCacheCreateNames+0x2ac
ffffea8a`d047f2b0 fffff807`4ee9bbc4     : ffffea8a`d047f360 ffffd98e`36ea2db8 ffffd98e`25979d60 fffff807`50c938ca : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x6a4
ffffea8a`d047f320 fffff807`50c87d3a     : 00000000`00000000 ffffd98e`25979d60 00000000`00000000 00000000`00000000 : FLTMGR!FltpCreate+0x324
ffffea8a`d047f3d0 fffff807`50c87ce7     : 00000000`00000000 00000000`00000001 00000000`00000000 fffff807`50c6aebc : nt!IopfCallDriver+0x46
ffffea8a`d047f410 fffff807`50c87ca0     : 00000000`00000000 fffff807`5133305b ffffd98e`3716da40 fffff807`50c88ab7 : nt!IofCallDriver+0x17
ffffea8a`d047f440 fffff807`50fe58be     : ffffd98e`25979d60 ffffea8a`d047f6f0 ffffd98e`36ea2d60 ffffa001`00000040 : nt!IoCallDriverWithTracing+0x2c
ffffea8a`d047f490 fffff807`50fdae0e     : ffffd98e`258b18f0 ffffea8a`00120196 ffffd98e`370c9a20 ffffa001`4d41fe01 : nt!IopParseDevice+0x69e
ffffea8a`d047f5f0 fffff807`50fdbf4d     : ffffd98e`370c9a01 ffffea8a`d047f7c0 d98e3415`00000040 ffffd98e`370c9a20 : nt!ObpLookupObjectName+0x3ee
ffffea8a`d047f740 fffff807`50fc9154     : 00000000`00000000 ffffd98e`371f8a20 00000000`00000001 00000000`00000000 : nt!ObOpenObjectByNameEx+0x17d
ffffea8a`d047f850 fffff807`50fc65b8     : 0000007c`9157ed28 00000000`40100080 0000007c`9157ed68 0000007c`9157ed30 : nt!IopCreateFile+0x408
ffffea8a`d047f900 fffff807`50daf175     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtCreateFile+0x78
ffffea8a`d047f990 00007ff8`8326b874     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
0000007c`9157eca8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`8326b874


SYMBOL_NAME:  FLTMGR!FltParseFileNameInformation+170

MODULE_NAME: FLTMGR

IMAGE_NAME:  FLTMGR.SYS

IMAGE_VERSION:  10.0.19041.1030

STACK_COMMAND:  .cxr 0xffffea8ad047e7a0 ; kb

BUCKET_ID_FUNC_OFFSET:  170

FAILURE_BUCKET_ID:  0x3B_c0000005_FLTMGR!FltParseFileNameInformation

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {2587afae-7a66-7e0b-b76d-e7d6b4fc00cf}

Followup:     MachineOwner
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 000000006c2a84f7, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 00000000000000f8, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8004f073631, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 8546

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 15120

    Key  : Analysis.Init.CPU.mSec
    Value: 734

    Key  : Analysis.Init.Elapsed.mSec
    Value: 1876

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 82

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  a

BUGCHECK_P1: 6c2a84f7

BUGCHECK_P2: ff

BUGCHECK_P3: f8

BUGCHECK_P4: fffff8004f073631

READ_ADDRESS: fffff8004fafb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
000000006c2a84f7

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  fffff8005386d340 -- (.trap 0xfffff8005386d340)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000006c2a84f7 rbx=0000000000000000 rcx=0000000000002710
rdx=000000006c2be87d rsi=0000000000000000 rdi=0000000000000000
rip=fffff8004f073631 rsp=fffff8005386d4d0 rbp=000000006c299a97
r8=000000006c2bd4f5  r9=000000006c29864a r10=fffff8004b146180
r11=0000000000000001 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up di ng nz na pe cy
nt!KiGetNextTimerExpirationDueTime+0x2a1:
fffff800`4f073631 4803c1          add     rax,rcx
Resetting default scope

STACK_TEXT: 
fffff800`5386d1f8 fffff800`4f207b69     : 00000000`0000000a 00000000`6c2a84f7 00000000`000000ff 00000000`000000f8 : nt!KeBugCheckEx
fffff800`5386d200 fffff800`4f203e69     : ffffa50d`95e7f000 00000000`00000000 ffffa50d`95e7f000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff800`5386d340 fffff800`4f073631     : fffff800`4b146180 00000000`6c299a97 00000000`00000001 fffff800`5386d530 : nt!KiPageFault+0x469
fffff800`5386d4d0 fffff800`4f041e94     : 00000000`6c29864a 00000000`00000001 00000000`6c299a97 00000000`00000000 : nt!KiGetNextTimerExpirationDueTime+0x2a1
fffff800`5386d530 fffff800`4f070d30     : 00000000`00000000 fffff800`4b146180 00000000`6c408eba 00000000`00000000 : nt!KePrepareClockTimerForIdle+0x124
fffff800`5386d5f0 fffff800`4f070154     : 00000000`00000000 00001f80`00000008 00000000`00000003 00000000`00000002 : nt!PpmIdleExecuteTransition+0xa60
fffff800`5386d9f0 fffff800`4f1f9774     : 00000000`00000000 fffff800`4fb27600 ffffa50d`8b2670c0 00000000`00000255 : nt!PoIdle+0x374
fffff800`5386db60 00000000`00000000     : fffff800`5386e000 fffff800`53867000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x54


SYMBOL_NAME:  nt!KiGetNextTimerExpirationDueTime+2a1

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.867

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  2a1

FAILURE_BUCKET_ID:  AV_nt!KiGetNextTimerExpirationDueTime

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {fb98d682-2f5f-b11b-1a7d-94cf0bd39105}

Followup:     MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000023a6d, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80140fc365a, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 9515

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 17702

    Key  : Analysis.Init.CPU.mSec
    Value: 780

    Key  : Analysis.Init.Elapsed.mSec
    Value: 1815

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 80

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  a

BUGCHECK_P1: 23a6d

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff80140fc365a

WRITE_ADDRESS: fffff801418fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
0000000000023a6d

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  fffff80147bcd3a0 -- (.trap 0xfffff80147bcd3a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000023effffff rbx=0000000000000000 rcx=0000000000000021
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80140fc365a rsp=fffff80147bcd538 rbp=fffff80147bcd640
r8=00000000ffffffff  r9=00000000000298b1 r10=ffffe286c0f0f000
r11=fffff80147bcd510 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
nt!HalpDmaAllocateDomain+0xc2:
fffff801`40fc365a 44886b20        mov     byte ptr [rbx+20h],r13b ds:00000000`00000020=??
Resetting default scope

STACK_TEXT: 
fffff801`47bcd258 fffff801`41007b69     : 00000000`0000000a 00000000`00023a6d 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff801`47bcd260 fffff801`41003e69     : ffffe286`c0fa6bc0 00000000`00000002 ffffe286`c77bd0f0 00000000`00000001 : nt!KiBugCheckDispatch+0x69
fffff801`47bcd3a0 fffff801`40fc365a     : 00000000`00023a4d 00000000`00023a44 00000000`00023a4d fffff801`47bcd640 : nt!KiPageFault+0x469
fffff801`47bcd538 00023a70`00000001     : 00000006`00000000 00000000`0000000a 00000000`00000000 00002476`00001c0d : nt!HalpDmaAllocateDomain+0xc2
fffff801`47bcd5a8 00000006`00000000     : 00000000`0000000a 00000000`00000000 00002476`00001c0d fffff801`40efccc2 : 0x00023a70`00000001
fffff801`47bcd5b0 00000000`0000000a     : 00000000`00000000 00002476`00001c0d fffff801`40efccc2 ffffe286`c0f0eab0 : 0x00000006`00000000
fffff801`47bcd5b8 00000000`00000000     : 00002476`00001c0d fffff801`40efccc2 ffffe286`c0f0eab0 00000000`00000000 : 0xa


SYMBOL_NAME:  nt!HalpDmaAllocateDomain+c2

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.867

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  c2

FAILURE_BUCKET_ID:  AV_nt!HalpDmaAllocateDomain

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {1065c0c9-bb12-ca19-ca95-177ff351174a}

Followup:     MachineOwner
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 000000041eecb9d9, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80181073631, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 9358

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 16611

    Key  : Analysis.Init.CPU.mSec
    Value: 889

    Key  : Analysis.Init.Elapsed.mSec
    Value: 1947

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 80

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  a

BUGCHECK_P1: 41eecb9d9

BUGCHECK_P2: ff

BUGCHECK_P3: 0

BUGCHECK_P4: fffff80181073631

READ_ADDRESS: fffff80181afb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
000000041eecb9d9

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  fffff80184dcd340 -- (.trap 0xfffff80184dcd340)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000041eecb9d9 rbx=0000000000000000 rcx=0000000000002710
rdx=000000041eed699c rsi=0000000000000000 rdi=0000000000000000
rip=fffff80181073631 rsp=fffff80184dcd4d0 rbp=000000041eeba869
r8=000000041eecc7f5  r9=000000041eeb0766 r10=fffff8017c093180
r11=0000000000000001 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up di ng nz na po cy
nt!KiGetNextTimerExpirationDueTime+0x2a1:
fffff801`81073631 4803c1          add     rax,rcx
Resetting default scope

STACK_TEXT: 
fffff801`84dcd1f8 fffff801`81207b69     : 00000000`0000000a 00000004`1eecb9d9 00000000`000000ff 00000000`00000000 : nt!KeBugCheckEx
fffff801`84dcd200 fffff801`81203e69     : 00000000`00000000 fffff801`82bb7ebc 00000000`00000002 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff801`84dcd340 fffff801`81073631     : fffff801`7c093180 00000004`1eeba869 00000000`00000001 fffff801`84dcd530 : nt!KiPageFault+0x469
fffff801`84dcd4d0 fffff801`81041e94     : 00000004`1eeb0766 00000000`00000001 00000004`1eeba869 00000000`00000000 : nt!KiGetNextTimerExpirationDueTime+0x2a1
fffff801`84dcd530 fffff801`81070d30     : 00000000`00000000 fffff801`7c093180 00000004`1f029bdc 00000000`00000000 : nt!KePrepareClockTimerForIdle+0x124
fffff801`84dcd5f0 fffff801`81070154     : 00000000`00000000 00001f80`00000000 00000000`00000003 00000000`00000002 : nt!PpmIdleExecuteTransition+0xa60
fffff801`84dcd9f0 fffff801`811f9774     : 00000000`00000000 00000000`00000000 fffff801`81b27600 00000000`00000bac : nt!PoIdle+0x374
fffff801`84dcdb60 00000000`00000000     : fffff801`84dce000 fffff801`84dc7000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x54


SYMBOL_NAME:  nt!KiGetNextTimerExpirationDueTime+2a1

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.867

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  2a1

FAILURE_BUCKET_ID:  AV_nt!KiGetNextTimerExpirationDueTime

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {fb98d682-2f5f-b11b-1a7d-94cf0bd39105}

Followup:     MachineOwner
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff80416853631, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80436873631, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 8936

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 18110

    Key  : Analysis.Init.CPU.mSec
    Value: 796

    Key  : Analysis.Init.Elapsed.mSec
    Value: 1979

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 80

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  a

BUGCHECK_P1: fffff80416853631

BUGCHECK_P2: ff

BUGCHECK_P3: 0

BUGCHECK_P4: fffff80436873631

READ_ADDRESS: fffff804372fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
fffff80416853631

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  fffff8043dbfd340 -- (.trap 0xfffff8043dbfd340)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000021aa2c0d rbx=0000000000000000 rcx=0000000000002710
rdx=0000000021abbd0a rsi=0000000000000000 rdi=0000000000000000
rip=fffff80436873631 rsp=fffff8043dbfd4d0 rbp=0000000021a968bd
r8=0000000021ab3346  r9=0000000021a95ad6 r10=fffff80434ca5180
r11=0000000000000001 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up di ng nz na pe cy
nt!KiGetNextTimerExpirationDueTime+0x2a1:
fffff804`36873631 4803c1          add     rax,rcx
Resetting default scope

STACK_TEXT: 
fffff804`3dbfd1f8 fffff804`36a07b69     : 00000000`0000000a fffff804`16853631 00000000`000000ff 00000000`00000000 : nt!KeBugCheckEx
fffff804`3dbfd200 fffff804`36a03e69     : ffff9189`cf41ec00 00000000`00000000 ffff9189`cf3d6000 ffff9189`cf41ebf0 : nt!KiBugCheckDispatch+0x69
fffff804`3dbfd340 fffff804`36873631     : fffff804`34ca5180 00000000`21a968bd 00000000`00000001 fffff804`3dbfd530 : nt!KiPageFault+0x469
fffff804`3dbfd4d0 fffff804`36841e94     : 00000000`21a95ad6 00000000`00000001 00000000`21a968bd 00000000`00000000 : nt!KiGetNextTimerExpirationDueTime+0x2a1
fffff804`3dbfd530 fffff804`36870d30     : 00000000`00000000 fffff804`34ca5180 00000000`21c05c70 00000000`00000000 : nt!KePrepareClockTimerForIdle+0x124
fffff804`3dbfd5f0 fffff804`36870154     : 00000000`00000000 00001f80`00000000 00000000`00000003 00000000`00000002 : nt!PpmIdleExecuteTransition+0xa60
fffff804`3dbfd9f0 fffff804`369f9774     : 00000000`00000000 00000000`00000000 fffff804`37327600 00000000`00000400 : nt!PoIdle+0x374
fffff804`3dbfdb60 00000000`00000000     : fffff804`3dbfe000 fffff804`3dbf7000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x54


SYMBOL_NAME:  nt!KiGetNextTimerExpirationDueTime+2a1

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.867

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  2a1

FAILURE_BUCKET_ID:  AV_nt!KiGetNextTimerExpirationDueTime

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {fb98d682-2f5f-b11b-1a7d-94cf0bd39105}

Followup:     MachineOwner
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff806426c3688, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 8437

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 14283

    Key  : Analysis.Init.CPU.mSec
    Value: 718

    Key  : Analysis.Init.Elapsed.mSec
    Value: 2048

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 80

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  a

BUGCHECK_P1: 0

BUGCHECK_P2: ff

BUGCHECK_P3: 0

BUGCHECK_P4: fffff806426c3688

READ_ADDRESS: fffff80642efb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
0000000000000000

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  fffff806495fd610 -- (.trap 0xfffff806495fd610)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000fff rbx=0000000000000000 rcx=0000000000001201
rdx=000000007d18b633 rsi=0000000000000000 rdi=0000000000000000
rip=fffff806426c3688 rsp=fffff806495fd7a0 rbp=000000000810b031
r8=000000000810b031  r9=0000000000000202 r10=0000000000000000
r11=0000000000000001 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up di pl nz ac pe nc
nt!HalpFlushMapBuffers+0x11c:
fffff806`426c3688 4d892a          mov     qword ptr [r10],r13 ds:00000000`00000000=????????????????
Resetting default scope

STACK_TEXT: 
fffff806`495fd4c8 fffff806`42607b69     : 00000000`0000000a 00000000`00000000 00000000`000000ff 00000000`00000000 : nt!KeBugCheckEx
fffff806`495fd4d0 fffff806`42603e69     : 00000000`00000000 00000000`0000003f 00000001`ffffffff fffffff6`00000002 : nt!KiBugCheckDispatch+0x69
fffff806`495fd610 fffff806`426c3688     : fffff806`406d4180 00000000`82e65f6d ffff9009`3e3ba901 fffff806`495fd800 : nt!KiPageFault+0x469
fffff806`495fd7a0 fffff806`42473301     : 00000000`82e685d1 00000000`00989601 00000000`82e65f6d ffffffff`ffffffff : nt!HalpFlushMapBuffers+0x11c
fffff806`495fd800 fffff806`4246ffd7     : 00000000`00000000 00001f80`00000000 00000000`00000003 00000000`00000002 : nt!PpmIdlePrepare+0x581
fffff806`495fd9f0 fffff806`425f9774     : 00000000`00000000 fffff806`42f27600 ffffbc8c`dc081080 00000000`00000a3e : nt!PoIdle+0x1f7
fffff806`495fdb60 00000000`00000000     : fffff806`495fe000 fffff806`495f7000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x54


SYMBOL_NAME:  nt!HalpFlushMapBuffers+11c

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.867

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  11c

FAILURE_BUCKET_ID:  AV_nt!HalpFlushMapBuffers

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {51e7042b-4e17-c749-e8fc-5cba655bc2b7}

Followup:     MachineOwner
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 00000000467516d5, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 0000000000000009, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8021ba73631, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 8468

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 17248

    Key  : Analysis.Init.CPU.mSec
    Value: 827

    Key  : Analysis.Init.Elapsed.mSec
    Value: 2001

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 80

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  a

BUGCHECK_P1: 467516d5

BUGCHECK_P2: ff

BUGCHECK_P3: 9

BUGCHECK_P4: fffff8021ba73631

WRITE_ADDRESS: fffff8021c4fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
00000000467516d5

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  fffff80220bcd610 -- (.trap 0xfffff80220bcd610)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000467516d5 rbx=0000000000000000 rcx=0000000000002710
rdx=0000000046763ded rsi=0000000000000000 rdi=0000000000000000
rip=fffff8021ba73631 rsp=fffff80220bcd7a0 rbp=0000000046739035
r8=000000004675da68  r9=000000004673dbb8 r10=fffff80217ce3180
r11=0000000000000001 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up di ng nz ac pe cy
nt!KiGetNextTimerExpirationDueTime+0x2a1:
fffff802`1ba73631 4803c1          add     rax,rcx
Resetting default scope

STACK_TEXT: 
fffff802`20bcd4c8 fffff802`1bc07b69     : 00000000`0000000a 00000000`467516d5 00000000`000000ff 00000000`00000009 : nt!KeBugCheckEx
fffff802`20bcd4d0 fffff802`1bc03e69     : ffffa107`4097c320 00000000`468a815e ffffa107`4097c300 fffff802`20bcd7a0 : nt!KiBugCheckDispatch+0x69
fffff802`20bcd610 fffff802`1ba73631     : fffff802`17ce3180 00000000`46739035 00000000`00000001 fffff802`20bcd800 : nt!KiPageFault+0x469
fffff802`20bcd7a0 fffff802`1ba73301     : 00000000`4673dbb8 00000000`00989601 00000000`46739035 ffffffff`ffffffff : nt!KiGetNextTimerExpirationDueTime+0x2a1
fffff802`20bcd800 fffff802`1ba6ffd7     : 00000000`00000000 00001f80`00000000 00000000`00000003 00000000`00000002 : nt!PpmIdlePrepare+0x581
fffff802`20bcd9f0 fffff802`1bbf9774     : 00000000`00000000 fffff802`1c527600 ffffa107`40cb7080 00000000`000008e5 : nt!PoIdle+0x1f7
fffff802`20bcdb60 00000000`00000000     : fffff802`20bce000 fffff802`20bc7000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x54


SYMBOL_NAME:  nt!KiGetNextTimerExpirationDueTime+2a1

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.867

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  2a1

FAILURE_BUCKET_ID:  AV_nt!KiGetNextTimerExpirationDueTime

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {fb98d682-2f5f-b11b-1a7d-94cf0bd39105}

Followup:     MachineOwner
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 00000002385eafd8, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 000000000000003c, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8021d473631, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 10015

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 18259

    Key  : Analysis.Init.CPU.mSec
    Value: 796

    Key  : Analysis.Init.Elapsed.mSec
    Value: 2370

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 81

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  a

BUGCHECK_P1: 2385eafd8

BUGCHECK_P2: ff

BUGCHECK_P3: 3c

BUGCHECK_P4: fffff8021d473631

READ_ADDRESS: fffff8021defb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
00000002385eafd8

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  fffff802249fd610 -- (.trap 0xfffff802249fd610)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000002385eafd8 rbx=0000000000000000 rcx=0000000000002710
rdx=00000002386088ac rsi=0000000000000000 rdi=0000000000000000
rip=fffff8021d473631 rsp=fffff802249fd7a0 rbp=00000002385e1398
r8=00000002386061ee  r9=000000023860f2f2 r10=fffff8021bad5180
r11=0000000000000001 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up di ng nz ac pe cy
nt!KiGetNextTimerExpirationDueTime+0x2a1:
fffff802`1d473631 4803c1          add     rax,rcx
Resetting default scope

STACK_TEXT: 
fffff802`249fd4c8 fffff802`1d607b69     : 00000000`0000000a 00000002`385eafd8 00000000`000000ff 00000000`0000003c : nt!KeBugCheckEx
fffff802`249fd4d0 fffff802`1d603e69     : 00000000`00000000 00000000`0000003f 00000000`00000000 fffff802`00000000 : nt!KiBugCheckDispatch+0x69
fffff802`249fd610 fffff802`1d473631     : fffff802`1bad5180 00000002`385e1398 00000000`00008e01 fffff802`249fd800 : nt!KiPageFault+0x469
fffff802`249fd7a0 fffff802`1d473301     : 00000002`385e267a 00000000`00989601 00000002`385e1398 ffffffff`ffffffff : nt!KiGetNextTimerExpirationDueTime+0x2a1
fffff802`249fd800 fffff802`1d46ffd7     : 00000000`00000000 00001f80`00000000 00000000`00000003 00000000`00000002 : nt!PpmIdlePrepare+0x581
fffff802`249fd9f0 fffff802`1d5f9774     : 00000000`00000000 fffff802`1df27600 ffffdc8a`8d31a040 00000000`00000bc5 : nt!PoIdle+0x1f7
fffff802`249fdb60 00000000`00000000     : fffff802`249fe000 fffff802`249f7000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x54


SYMBOL_NAME:  nt!KiGetNextTimerExpirationDueTime+2a1

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.867

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  2a1

FAILURE_BUCKET_ID:  AV_nt!KiGetNextTimerExpirationDueTime

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {fb98d682-2f5f-b11b-1a7d-94cf0bd39105}

Followup:     MachineOwner
---------

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff80084a93631, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 11515

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 18812

    Key  : Analysis.Init.CPU.mSec
    Value: 765

    Key  : Analysis.Init.Elapsed.mSec
    Value: 2205

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 82

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  d1

BUGCHECK_P1: 0

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff80084a93631

WRITE_ADDRESS: fffff8006dafb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
0000000000000000

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  fffff800717fd3a0 -- (.trap 0xfffff800717fd3a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000040 rbx=0000000000000000 rcx=ffffd886c16db1f7
rdx=000000000000002e rsi=0000000000000000 rdi=0000000000000000
rip=fffff80084a93631 rsp=fffff800717fd538 rbp=fffff800717fd640
r8=0000000000017b89  r9=0000000000000000 r10=ffffd886c16db000
r11=ffffd886c16db218 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
USBXHCI!WPP_RECORDER_SF_qd+0x41:
fffff800`84a93631 ff07            inc     dword ptr [rdi] ds:00000000`00000000=????????
Resetting default scope

MISALIGNED_IP:
USBXHCI!WPP_RECORDER_SF_qd+41
fffff800`84a93631 ff07            inc     dword ptr [rdi]

STACK_TEXT: 
fffff800`717fd258 fffff800`6d207b69     : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff800`717fd260 fffff800`6d203e69     : ffffd886`c8764b40 fffff800`6d0c0add 00000000`00000000 ffffd886`c881ab60 : nt!KiBugCheckDispatch+0x69
fffff800`717fd3a0 fffff800`84a93631     : fffff800`70e8f512 00000000`00017993 00000000`00000000 fffff800`00000006 : nt!KiPageFault+0x469
fffff800`717fd538 000179d9`00000008     : 00000006`717fd640 00000000`0000000a fffff800`00000000 00001820`0000163c : USBXHCI!WPP_RECORDER_SF_qd+0x41
fffff800`717fd5a8 00000006`717fd640     : 00000000`0000000a fffff800`00000000 00001820`0000163c fffff800`717fd650 : 0x000179d9`00000008
fffff800`717fd5b0 00000000`0000000a     : fffff800`00000000 00001820`0000163c fffff800`717fd650 ffffd886`c16daab0 : 0x00000006`717fd640
fffff800`717fd5b8 fffff800`00000000     : 00001820`0000163c fffff800`717fd650 ffffd886`c16daab0 00000000`00000000 : 0xa
fffff800`717fd5c0 00001820`0000163c     : fffff800`717fd650 ffffd886`c16daab0 00000000`00000000 ffffd886`bfbbc440 : 0xfffff800`00000000
fffff800`717fd5c8 fffff800`717fd650     : ffffd886`c16daab0 00000000`00000000 ffffd886`bfbbc440 00000000`00000000 : 0x00001820`0000163c
fffff800`717fd5d0 ffffd886`c16daab0     : 00000000`00000000 ffffd886`bfbbc440 00000000`00000000 ffffd886`c1a49420 : 0xfffff800`717fd650
fffff800`717fd5d8 00000000`00000000     : ffffd886`bfbbc440 00000000`00000000 ffffd886`c1a49420 00000000`00000000 : 0xffffd886`c16daab0


SYMBOL_NAME:  USBXHCI!WPP_RECORDER_SF_qd+41

IMAGE_NAME:  hardware

IMAGE_VERSION:  10.0.19041.508

STACK_COMMAND:  .thread ; .cxr ; kb

MODULE_NAME: hardware

FAILURE_BUCKET_ID:  IP_MISALIGNED

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {201b0e5d-db2a-63d2-77be-8ce8ff234750}

Followup:     MachineOwner
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000079, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80474ec3628, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3765

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 24053

    Key  : Analysis.Init.CPU.mSec
    Value: 1062

    Key  : Analysis.Init.Elapsed.mSec
    Value: 73461

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 72

    Key  : WER.OS.Branch
    Value: 19h1_release

    Key  : WER.OS.Timestamp
    Value: 2019-03-18T12:02:00Z

    Key  : WER.OS.Version
    Value: 10.0.18362.1


BUGCHECK_CODE:  a

BUGCHECK_P1: 79

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff80474ec3628

WRITE_ADDRESS: fffff804753713b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
0000000000000079

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  fffff8047a2596b0 -- (.trap 0xfffff8047a2596b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000b4008bfb rbx=0000000000000000 rcx=ffffcd0328b45188
rdx=0000000000000040 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80474ec3628 rsp=fffff8047a259840 rbp=ffffcd033115e5c0
r8=0000000000000040  r9=000000000000002f r10=fffff80474d5db50
r11=fffff8047a259740 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
nt!KiProcessExpiredTimerList+0x238:
fffff804`74ec3628 4b084839        or      byte ptr [r8+39h],cl ds:00000000`00000079=??
Resetting default scope

MISALIGNED_IP:
nt!KiProcessExpiredTimerList+238
fffff804`74ec3628 4b084839        or      byte ptr [r8+39h],cl

STACK_TEXT: 
fffff804`7a259568 fffff804`74fd5929     : 00000000`0000000a 00000000`00000079 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff804`7a259570 fffff804`74fd1c69     : 00000000`00000045 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff804`7a2596b0 fffff804`74ec3628     : ffffcd03`3115e1a0 ffffcd03`33f9e1f0 00000000`00000080 ffffcd03`28b53000 : nt!KiPageFault+0x469
fffff804`7a259840 fffff804`74ec22b9     : 00000000`0000001c 00000000`00989680 00000000`000067c5 00000000`000000dd : nt!KiProcessExpiredTimerList+0x238
fffff804`7a259930 fffff804`74fc764e     : 00000000`00000000 fffff804`71b5d180 fffff804`7538f400 ffffcd03`34037080 : nt!KiRetireDpcList+0x4e9
fffff804`7a259b60 00000000`00000000     : fffff804`7a25a000 fffff804`7a253000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x7e


SYMBOL_NAME:  nt!KiProcessExpiredTimerList+238

IMAGE_NAME:  hardware

IMAGE_VERSION:  10.0.18362.1171

STACK_COMMAND:  .thread ; .cxr ; kb

MODULE_NAME: hardware

FAILURE_BUCKET_ID:  IP_MISALIGNED

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {201b0e5d-db2a-63d2-77be-8ce8ff234750}

Followup:     MachineOwner
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff803724a35fc, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000008, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8032d4c35fc, address which referenced memory

Debugging Details:
------------------

***** Debugger could not find nt in module list, module list might be corrupt, error 0x80070057.


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 30

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 40

    Key  : Analysis.Init.CPU.mSec
    Value: 296

    Key  : Analysis.Init.Elapsed.mSec
    Value: 8169

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 45

    Key  : WER.CorruptModuleList
    Value: 1


BUGCHECK_CODE:  a

BUGCHECK_P1: fffff803724a35fc

BUGCHECK_P2: 2

BUGCHECK_P3: 8

BUGCHECK_P4: fffff8032d4c35fc

READ_ADDRESS: Unable to get size of nt!_MMPTE - probably bad symbols
fffff803724a35fc

CUSTOMER_CRASH_COUNT:  1

STACK_TEXT: 
fffff803`32259568 fffff803`2d5d5929     : 00000000`0000000a fffff803`724a35fc 00000000`00000002 00000000`00000008 : 0xfffff803`2d5c3b20
fffff803`32259570 00000000`0000000a     : fffff803`724a35fc 00000000`00000002 00000000`00000008 fffff803`2d4c35fc : 0xfffff803`2d5d5929
fffff803`32259578 fffff803`724a35fc     : 00000000`00000002 00000000`00000008 fffff803`2d4c35fc fffff803`2d98f400 : 0xa
fffff803`32259580 00000000`00000002     : 00000000`00000008 fffff803`2d4c35fc fffff803`2d98f400 00000000`00000000 : 0xfffff803`724a35fc
fffff803`32259588 00000000`00000008     : fffff803`2d4c35fc fffff803`2d98f400 00000000`00000000 00000000`00000000 : 0x2
fffff803`32259590 fffff803`2d4c35fc     : fffff803`2d98f400 00000000`00000000 00000000`00000000 00000000`00000000 : 0x8
fffff803`32259598 fffff803`2d98f400     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xfffff803`2d4c35fc
fffff803`322595a0 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xfffff803`2d98f400


SYMBOL_NAME:  ANALYSIS_INCONCLUSIVE

MODULE_NAME: Unknown_Module

IMAGE_NAME:  Unknown_Image

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  CORRUPT_MODULELIST_AV

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {fc259191-ef0c-6215-476f-d32e5dcaf1b7}

Followup:     MachineOwner
---------

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000008, value 0 = read operation, 1 = write operation
Arg4: 0000000000000000, address which referenced memory

Debugging Details:
------------------

***** Debugger could not find nt in module list, module list might be corrupt, error 0x80070057.


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 30

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 39

    Key  : Analysis.Init.CPU.mSec
    Value: 218

    Key  : Analysis.Init.Elapsed.mSec
    Value: 8128

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 45

    Key  : WER.CorruptModuleList
    Value: 1


BUGCHECK_CODE:  d1

BUGCHECK_P1: 0

BUGCHECK_P2: 2

BUGCHECK_P3: 8

BUGCHECK_P4: 0

READ_ADDRESS: Unable to get size of nt!_MMPTE - probably bad symbols
0000000000000000

CUSTOMER_CRASH_COUNT:  1

FAILED_INSTRUCTION_ADDRESS:
+0
STACK_TEXT: 
fffff803`16e595c8 fffff803`119d5929     : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000008 : 0xfffff803`119c3b20
fffff803`16e595d0 00000000`0000000a     : 00000000`00000000 00000000`00000002 00000000`00000008 00000000`00000000 : 0xfffff803`119d5929
fffff803`16e595d8 00000000`00000000     : 00000000`00000002 00000000`00000008 00000000`00000000 fffff803`0e724f08 : 0xa


SYMBOL_NAME:  ANALYSIS_INCONCLUSIVE

MODULE_NAME: Unknown_Module

IMAGE_NAME:  Unknown_Image

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  CORRUPT_MODULELIST_AV

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {fc259191-ef0c-6215-476f-d32e5dcaf1b7}

Followup:     MachineOwner
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffffffffffffb9, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8026972b760, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 7093

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 31073

    Key  : Analysis.Init.CPU.mSec
    Value: 1062

    Key  : Analysis.Init.Elapsed.mSec
    Value: 65719

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 85

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  a

BUGCHECK_P1: ffffffffffffffb9

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff8026972b760

WRITE_ADDRESS: fffff8026a0fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffffffffffffb9

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  dwm.exe

DPC_STACK_BASE:  FFFFF8026C275FB0

TRAP_FRAME:  fffff8026c273d60 -- (.trap 0xfffff8026c273d60)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000058b7e83f rbx=0000000000000000 rcx=0000000000000000
rdx=ffffd2fcfb50a6d8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8026972b760 rsp=fffff8026c273ef0 rbp=fffff8026a04ee00
r8=ffffffffffffffff  r9=ffffd2fcfb50aa38 r10=0000000000000021
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!MiReservePtes+0x510:
fffff802`6972b760 f8              clc
Resetting default scope

MISALIGNED_IP:
nt!MiReservePtes+510
fffff802`6972b760 f8              clc

STACK_TEXT: 
fffff802`6c273c18 fffff802`69807169     : 00000000`0000000a ffffffff`ffffffb9 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff802`6c273c20 fffff802`69803469     : fffff802`698c6a20 ffff9907`8a1bd050 00000000`00000001 00060080`01000000 : nt!KiBugCheckDispatch+0x69
fffff802`6c273d60 fffff802`6972b760     : fffff802`6a04ee00 00000000`58b7e83f fffff802`6a04ee00 00000000`00000000 : nt!KiPageFault+0x469
fffff802`6c273ef0 00000000`00000021     : ffff9907`9296da10 fffff802`6972ba34 00000000`00000000 fffff802`00000000 : nt!MiReservePtes+0x510
fffff802`6c273fc0 ffff9907`9296da10     : fffff802`6972ba34 00000000`00000000 fffff802`00000000 ffff9907`00000000 : 0x21
fffff802`6c273fc8 fffff802`6972ba34     : 00000000`00000000 fffff802`00000000 ffff9907`00000000 fffff802`7e8dce28 : 0xffff9907`9296da10
fffff802`6c273fd0 fffff802`6b897ce2     : 00000000`00000578 00000000`00000000 00000000`00000578 fffff802`6c274178 : nt!MmMapLockedPagesSpecifyCache+0xd4
fffff802`6c274030 fffff802`6b971380     : fffff802`6c274170 fffff802`6c27412c fffff802`6c274178 fffff802`6c274130 : NETIO!RtlCopyMdlToMdlIndirect+0x242
fffff802`6c2740b0 fffff802`6b971ae4     : fffff802`6c274520 fffff802`6b898d88 00000000`00000000 fffff802`6c274329 : tcpip!TcpSatisfyReceiveRequests+0x100
fffff802`6c2742b0 fffff802`6b971815     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!TcpDeliverDataToClient+0xe4
fffff802`6c274430 fffff802`6b975ebb     : 00000000`00000007 00000000`00000000 00000000`00000000 00000000`ffffffff : tcpip!TcpDeliverReceive+0xb5
fffff802`6c274520 fffff802`6b974c5f     : 00000000`00000000 fffff802`6b9932d4 ffff9907`87ef59c8 00000000`00000007 : tcpip!TcpTcbFastDatagram+0xfcb
fffff802`6c2746f0 fffff802`6b973fff     : 00000000`00000028 ffff9907`87f67000 00000000`8a1be0c0 ffff9907`87f67000 : tcpip!TcpTcbReceive+0x18f
fffff802`6c274940 fffff802`6b973088     : 00000000`0002bedc fffff802`6bb5dc00 00000000`4c83f156 fffff802`6bb58598 : tcpip!TcpMatchReceive+0x51f
fffff802`6c274bf0 fffff802`6b9d8a52     : ffff9907`87e0e380 00000000`00005000 ffffffff`00000000 ffff9907`87f67001 : tcpip!TcpReceive+0x358
fffff802`6c274ce0 fffff802`6b999b31     : ffff9907`8a296480 fffff802`6b996f00 00000000`8a180000 ffff9907`87ce13c0 : tcpip!TcpNlClientReceiveDatagrams+0x22
fffff802`6c274d20 fffff802`6b99647b     : 00000000`00000001 ffff9907`86a02000 00000000`00000000 ffff9907`87f67000 : tcpip!IppProcessDeliverList+0xc1
fffff802`6c274e00 fffff802`6b9959ff     : fffff802`6bb58230 ffff9907`87f7d8c0 ffff9907`87f67000 00000000`00000000 : tcpip!IppReceiveHeaderBatch+0x21b
fffff802`6c274f00 fffff802`6b992d9c     : ffff9907`8a08c320 ffff9907`8a296480 00000000`00000001 00000000`00000000 : tcpip!IppFlcReceivePacketsCore+0x32f
fffff802`6c275020 fffff802`6b9defd0     : ffff9907`8a296480 00000000`00000000 fffff802`6c2750f1 00000000`00000000 : tcpip!IpFlcReceivePackets+0xc
fffff802`6c275050 fffff802`6b9de5cc     : ffff9907`90109001 ffff9907`910a5900 fffff802`6b9d1a50 fffff802`6c27542c : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x270
fffff802`6c275150 fffff802`6960d468     : ffff9907`87fcdba0 00000000`00000002 ffff9907`90144080 fffff802`6c275448 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0x17c
fffff802`6c2752a0 fffff802`6960d3dd     : fffff802`6b9de450 fffff802`6c275448 ffff9907`87f618a0 fffff802`6bb218c4 : nt!KeExpandKernelStackAndCalloutInternal+0x78
fffff802`6c275310 fffff802`6b9d15ed     : 00000000`00000014 fffff802`6ba36b2a ffff9907`8a296600 fffff802`6bc5142f : nt!KeExpandKernelStackAndCalloutEx+0x1d
fffff802`6c275350 fffff802`6b9d0ccd     : 00000000`00000001 fffff802`6c2754b0 ffff9907`910a59a0 fffff802`6c2754c0 : tcpip!NetioExpandKernelStackAndCallout+0x8d
fffff802`6c2753b0 fffff802`6b711eb1     : ffff9907`8a0f2e01 ffff9907`91dd9151 00000000`00000020 00000000`00000001 : tcpip!FlReceiveNetBufferListChain+0x46d
fffff802`6c275660 fffff802`6b711ccb     : ffff9907`9109ea20 fffff802`00000001 fffff802`00000000 00000000`00000001 : ndis!ndisMIndicateNetBufferListsToOpen+0x141
fffff802`6c275740 fffff802`6b717ef1     : ffff9907`8a1bd1a0 ffff9907`8a296401 ffff9907`8a1bd1a0 00000000`00000001 : ndis!ndisMTopReceiveNetBufferLists+0x22b
fffff802`6c2757c0 fffff802`6b74dee3     : ffff9907`8a296480 fffff802`6c275891 00000000`00000000 ffff9907`8a21ae70 : ndis!ndisCallReceiveHandler+0x61
fffff802`6c275810 fffff802`6b714a94     : 00000000`00002cf1 00000000`00000001 ffff9907`8a1bd1a0 00000000`00000001 : ndis!ndisInvokeNextReceiveHandler+0x1df
fffff802`6c2758e0 fffff802`7efb61d8     : ffff9907`8a284000 ffff9907`8a284000 00000000`00000000 ffff9907`8a2845f0 : ndis!NdisMIndicateReceiveNetBufferLists+0x104
fffff802`6c275970 fffff802`7efa25a8     : 00000000`00000000 ffff9907`8a284501 00000000`00000400 fffff802`6c275ae8 : rt640x64!MpHandleRecvIntPriVLanJumbo+0x2c4
fffff802`6c275a60 fffff802`6b717887     : 00000000`00000010 ffff9907`8a3f3280 00000000`00000000 00000000`00000000 : rt640x64!MPHandleMessageInterrupt+0x398
fffff802`6c275ad0 fffff802`696e535e     : fffff802`64390240 ffff9907`873b0000 fffff802`6c275e70 ffff9907`00000002 : ndis!ndisInterruptDpc+0x197
fffff802`6c275bb0 fffff802`696e4644     : 00000000`00000000 00000000`00000000 00000000`00000008 00000000`00001ad3 : nt!KiExecuteAllDpcs+0x30e
fffff802`6c275d20 fffff802`697fc255     : 00000000`00000000 fffff802`6438d180 ffffc300`52aacb40 ffffd2fd`28d7c400 : nt!KiRetireDpcList+0x1f4
fffff802`6c275fb0 fffff802`697fc040     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxRetireDpcList+0x5
ffffef0f`8252a0f0 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchInterruptContinue


SYMBOL_NAME:  NETIO!RtlCopyMdlToMdlIndirect+242

IMAGE_NAME:  hardware

IMAGE_VERSION:  10.0.19041.610

STACK_COMMAND:  .thread ; .cxr ; kb

MODULE_NAME: hardware

FAILURE_BUCKET_ID:  IP_MISALIGNED

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {201b0e5d-db2a-63d2-77be-8ce8ff234750}

Followup:     MachineOwner
---------
 
Son düzenleme:
Peki aklıma bir şey takıldı bilgisayar güvenli modda mavi ekran vermiyor ama internete bağlı güvenli mod açtığımda veriyor bence sorun RJ45 portunda. Benim düşüncem yarın harici bir RJ45 portu alıp denemek. Ya da anakartın bu RJ45 portu arızalı.
 
Peki aklıma bir şey takıldı bilgisayar güvenli modda mavi ekran vermiyor ama internete bağlı güvenli mod açtığımda veriyor bence sorun RJ45 portunda. Benim düşüncem yarın harici bir RJ45 portu alıp denemek. Ya da anakartın bu RJ45 portu arızalı.

Zaten bunu sana dedim:

42 tane döküme tek tek baktım. Çıkardığım sonuç: Ya anakartın arızalı ya da kartın üstündeki ağ kontrolcü.

Evet, harici bir ağ kartı almak en uygun fiyatlı çözüm. BIOS'tan dahili olanı da devre dışı bırakabilirsin.
 
Zaten bunu sana dedim:

Evet, harici bir ağ kartı almak en uygun fiyatlı çözüm. BIOS'tan dahili olanı da devre dışı bırakabilirsin.

@Recep Baltaş abi PC servise gönderdim, şimdi geri gelecek. Wi-Fi kartı var kasada, aygıt yöneticisinden LAN interneti devre dışı bırakıp Wi-Fi'den girmeyi denedim, olmamıştı. Bir bakar mısın sence bunlardan kaynaklanmış olabilir mi? Saçma geldi, serviste şunlar yapılmış:

629F66BA-4BFF-45B6-A0ED-31F86A62D062.png


Şahsen gidip parça alıp garantisini yakmak istemiyorum :/
Peki port almadan Wi-Fi kartı ile işlem yapabilir miyim? Denemek amaçlı, aynı işlemi görür mü Ethernet kartı almak yerine?

Az önce Windows 10 kurulum videonuzu izledim. GPT kısmını ayarlamazdım. MBR olarak kurulurdu, acaba sürücülerin ve donanımların düzgün çalışmayıp hata verme sebebi bu olabilir mi? PC FreeDOS gelmişti ve ben direkt Windows medya yükleyicisi ile yükledim.

Bilgisayar teknik servise gitti geldi, teknik servis temizlik yapmış. Bir de sistem dosyalarını onarmış. Donanımsal bir arza olmayıp hataların tamamı yazılımsal olduğu belli oldu. Konu çözülmüştür hepinize teşekkür ederim.
 
Çözüm
Durum
Mesaj gönderimine kapalı.

Yeni konular

Geri
Yukarı