Çözüldü INVALID_PROCESS_ATTACH_ATTEMPT netr28x.sys mavi ekran hatası

Bu konu çözüldü olarak işaretlenmiştir. Çözülmediğini düşünüyorsanız konuyu rapor edebilirsiniz.

TheOrderMtk

Hectopat
Katılım
23 Kasım 2019
Mesajlar
170
Yaklaşık bir hafta önce Windows 7 olan bilgisayarımı Windows 8.1'e yükselttim. Yükselttikten sonra ise Windows 7'de hiç almamış olduğum INVALID_PROCESS_ATTACH_ATTEMPT mavi ekran hatasını aldım. Daha sonra düzeleceği umudu ile tüm sürücüleri güncelledim fakat bazen ara ara halen mavi ekran htası veriyor. Bunun çözümü format atmak haricinde nedir? Yardımcı olursanız sevinirim.
 
Son düzenleyen: Moderatör:
Çözüm
Ralink ağ adaptörü problem çıkartıyor, sürücüsünü kaldır Windows 8.1 için uyumlu bir sürücü kur.
Kod:
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffc00163f51998, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff802e30a15a8, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for netr28x.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  9600.17415.amd64fre.winblue_r4.141028-1500

SYSTEM_MANUFACTURER:  Hewlett-Packard

SYSTEM_PRODUCT_NAME:  HP ProBook 4540s

SYSTEM_SKU:  F0X25ES#ABV

SYSTEM_VERSION:  A1018C1100

BIOS_VENDOR:  Hewlett-Packard

BIOS_VERSION:  68IRR Ver. F.41

BIOS_DATE:  05/20/2013

BASEBOARD_MANUFACTURER:  Hewlett-Packard

BASEBOARD_PRODUCT:  17F6

BASEBOARD_VERSION:  KBC Version 58.1E

DUMP_TYPE:  2

BUGCHECK_P1: ffffc00163f51998

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff802e30a15a8

WRITE_ADDRESS: GetUlongPtrFromAddress: unable to read from fffff802e2fd8298
GetUlongPtrFromAddress: unable to read from fffff802e2fd8520
ffffc00163f51998 Paged pool

CURRENT_IRQL:  2

FAULTING_IP:
nt!HvpDoAllocateCell+1bc
fffff802`e30a15a8 8903            mov     dword ptr [rbx],eax

CPU_COUNT: 4

CPU_MHZ: 95b

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 3a

CPU_STEPPING: 9

CPU_MICROCODE: 6,3a,9,0 (F,M,S,R)  SIG: 1B'00000000 (cache) 1B'00000000 (init)

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  AV

PROCESS_NAME:  System

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  02-04-2020 19:25:01.0093

ANALYSIS_VERSION: 10.0.18362.1 x86fre

TRAP_FRAME:  ffffd00124fbbea0 -- (.trap 0xffffd00124fbbea0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000ffffffd0 rbx=0000000000000000 rcx=0000000000000005
rdx=00000000ffffffff rsi=0000000000000000 rdi=0000000000000000
rip=fffff802e30a15a8 rsp=ffffd00124fbc030 rbp=00000000ffffffff
r8=ffffc00163429b40  r9=ffffc00163429c30 r10=ffffffffffffffff
r11=00000000ffffffff r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe cy
nt!HvpDoAllocateCell+0x1bc:
fffff802`e30a15a8 8903            mov     dword ptr [rbx],eax ds:00000000`00000000=????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff802e2dd14e9 to fffff802e2dc59a0

STACK_TEXT:
ffffd001`24fbbd58 fffff802`e2dd14e9 : 00000000`0000000a ffffc001`63f51998 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffffd001`24fbbd60 fffff802`e2dcfd3a : 00000000`00000001 ffffc001`63f51998 00000000`00000000 00000000`0000000a : nt!KiBugCheckDispatch+0x69
ffffd001`24fbbea0 fffff802`e30a15a8 : ffffc001`63f51998 00000000`00000030 ffffe001`00000030 00000000`00000030 : nt!KiPageFault+0x23a
ffffd001`24fbc030 fffff802`e30a093c : ffffc001`63428000 ffffe001`26354418 ffffc001`63428000 ffffd001`24fbc0f0 : nt!HvpDoAllocateCell+0x1bc
ffffd001`24fbc0c0 fffff802`e30a030e : ffffc001`63428000 00000000`00000000 ffffc001`645d22b0 ffffd001`24fbc2d0 : nt!CmpAddValueKeyNew+0x4c
ffffd001`24fbc120 fffff802`e30a4065 : 01d5da00`6d46a8d6 ffffd001`24fbc221 ffffc001`7084d380 00000000`00000000 : nt!CmpSetValueKeyNew+0x66
ffffd001`24fbc160 fffff802`e30a3b9b : ffffc001`6f437e10 ffffd001`24fbc2d0 ffffc001`00000004 ffffd001`24fbc750 : nt!CmSetValueKey+0x2f1
ffffd001`24fbc270 fffff802`e2dd11b3 : 00000000`00000001 00000000`00000012 ffffc001`6347b700 ffffd001`24fbc4e0 : nt!NtSetValueKey+0x55f
ffffd001`24fbc440 fffff802`e2dc9600 : fffff802`e30892f8 00000000`00000004 ffffe001`2dc99210 00000000`40000000 : nt!KiSystemServiceCopyEnd+0x13
ffffd001`24fbc648 fffff802`e30892f8 : 00000000`00000004 ffffe001`2dc99210 00000000`40000000 00000000`00000000 : nt!KiServiceLinkage
ffffd001`24fbc650 fffff800`ef5bc7d8 : 00000000`00000004 ffffd001`24fbc770 00000000`00000000 00000000`00000000 : nt!RtlWriteRegistryValue+0x68
ffffd001`24fbc6b0 fffff800`f08ce98d : ffffd001`24fbc7b0 fffff800`f0addc28 00000000`00000000 fffff800`f0961e51 : ndis!NdisWriteConfiguration+0x160
ffffd001`24fbc710 ffffd001`24fbc7b0 : fffff800`f0addc28 00000000`00000000 fffff800`f0961e51 ffffd001`001801a9 : netr28x+0x4b98d
ffffd001`24fbc718 fffff800`f0addc28 : 00000000`00000000 fffff800`f0961e51 ffffd001`001801a9 ffffe001`2a0081a0 : 0xffffd001`24fbc7b0
ffffd001`24fbc720 00000000`00000000 : fffff800`f0961e51 ffffd001`001801a9 ffffe001`2a0081a0 fffff800`00000000 : netr28x+0x25ac28


THREAD_SHA1_HASH_MOD_FUNC:  22955341d8abb05b401bd49818eceb67e2f7827a

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  d566e3f7b9be6f17dd7d2a068bf0708e2a48ecbd

THREAD_SHA1_HASH_MOD:  d0eb6a1f61014958f024b7745f0b6539ef5d47ac

FOLLOWUP_IP:
netr28x+4b98d
fffff800`f08ce98d ??              ???

SYMBOL_STACK_INDEX:  c

SYMBOL_NAME:  netr28x+4b98d

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: netr28x

IMAGE_NAME:  netr28x.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  5534d37a

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  4b98d

FAILURE_BUCKET_ID:  AV_netr28x!unknown_function

BUCKET_ID:  AV_netr28x!unknown_function

PRIMARY_PROBLEM_CLASS:  AV_netr28x!unknown_function

TARGET_TIME:  2020-02-02T19:39:04.000Z

OSBUILD:  9600

OSSERVICEPACK:  17415

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  784

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8.1

OSEDITION:  Windows 8.1 WinNt TerminalServer SingleUserTS Personal

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  2014-10-29 03:38:48

BUILDDATESTAMP_STR:  141028-1500

BUILDLAB_STR:  winblue_r4

BUILDOSVER_STR:  6.3.9600.17415.amd64fre.winblue_r4.141028-1500

ANALYSIS_SESSION_ELAPSED_TIME:  12db

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:av_netr28x!unknown_function

FAILURE_ID_HASH:  {b1e18842-140d-7b42-6e48-eab659769c49}

Followup:     MachineOwner
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffc00166672e28, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8009dea24b0, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for netr28x.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  9600.17415.amd64fre.winblue_r4.141028-1500

SYSTEM_MANUFACTURER:  Hewlett-Packard

SYSTEM_PRODUCT_NAME:  HP ProBook 4540s

SYSTEM_SKU:  F0X25ES#ABV

SYSTEM_VERSION:  A1018C1100

BIOS_VENDOR:  Hewlett-Packard

BIOS_VERSION:  68IRR Ver. F.41

BIOS_DATE:  05/20/2013

BASEBOARD_MANUFACTURER:  Hewlett-Packard

BASEBOARD_PRODUCT:  17F6

BASEBOARD_VERSION:  KBC Version 58.1E

DUMP_TYPE:  2

BUGCHECK_P1: ffffc00166672e28

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff8009dea24b0

WRITE_ADDRESS: GetUlongPtrFromAddress: unable to read from fffff8009ddd9298
GetUlongPtrFromAddress: unable to read from fffff8009ddd9520
ffffc00166672e28 Paged pool

CURRENT_IRQL:  2

FAULTING_IP:
nt!HvpDoAllocateCell+c4
fffff800`9dea24b0 892c1e          mov     dword ptr [rsi+rbx],ebp

CPU_COUNT: 4

CPU_MHZ: 95b

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 3a

CPU_STEPPING: 9

CPU_MICROCODE: 6,3a,9,0 (F,M,S,R)  SIG: 1B'00000000 (cache) 1B'00000000 (init)

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  AV

PROCESS_NAME:  System

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  02-04-2020 19:25:03.0470

ANALYSIS_VERSION: 10.0.18362.1 x86fre

TRAP_FRAME:  ffffd000c5befea0 -- (.trap 0xffffd000c5befea0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000038 rbx=0000000000000000 rcx=0000000000000001
rdx=ffffd000c5befea0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8009dea24b0 rsp=ffffd000c5bf0030 rbp=00000000000001d8
r8=0000000000000208  r9=0000000000000000 r10=fffff78000000008
r11=ffffd000c5bf0120 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
nt!HvpDoAllocateCell+0xc4:
fffff800`9dea24b0 892c1e          mov     dword ptr [rsi+rbx],ebp ds:00000000`00000000=????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff8009dbd24e9 to fffff8009dbc69a0

STACK_TEXT:
ffffd000`c5befd58 fffff800`9dbd24e9 : 00000000`0000000a ffffc001`66672e28 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffffd000`c5befd60 fffff800`9dbd0d3a : 00000000`00000001 ffffc001`66672df8 00000000`00000000 ffffffff`da3dc980 : nt!KiBugCheckDispatch+0x69
ffffd000`c5befea0 fffff800`9dea24b0 : 00000000`00000005 ffffc001`0000078c ffffe001`00000030 00000000`00000030 : nt!KiPageFault+0x23a
ffffd000`c5bf0030 fffff800`9dea193c : ffffc001`64828000 ffffe001`f8f55048 ffffc001`64828000 ffffd000`c5bf00f0 : nt!HvpDoAllocateCell+0xc4
ffffd000`c5bf00c0 fffff800`9dea130e : ffffc001`64828000 00000000`00000000 ffffc001`658812b0 ffffd000`c5bf02d0 : nt!CmpAddValueKeyNew+0x4c
ffffd000`c5bf0120 fffff800`9dea5065 : 01d5da91`3a0a927c ffffd000`c5bf0221 ffffc001`6f1de4a8 00000000`00000000 : nt!CmpSetValueKeyNew+0x66
ffffd000`c5bf0160 fffff800`9dea4b9b : ffffc001`6f58efa0 ffffd000`c5bf02d0 ffffc001`00000004 ffffd000`c5bf0750 : nt!CmSetValueKey+0x2f1
ffffd000`c5bf0270 fffff800`9dbd21b3 : 00000000`00000001 00000000`00000012 ffffc001`64898010 ffffd000`c5bf04e0 : nt!NtSetValueKey+0x55f
ffffd000`c5bf0440 fffff800`9dbca600 : fffff800`9de8a2f8 00000000`00000004 ffffe001`fccd3930 00000000`40000000 : nt!KiSystemServiceCopyEnd+0x13
ffffd000`c5bf0648 fffff800`9de8a2f8 : 00000000`00000004 ffffe001`fccd3930 00000000`40000000 00000000`00000000 : nt!KiServiceLinkage
ffffd000`c5bf0650 fffff801`91f9c7d8 : 00000000`00000004 ffffd000`c5bf0770 ffffe001`00000000 00000000`00000000 : nt!RtlWriteRegistryValue+0x68
ffffd000`c5bf06b0 fffff801`932b598d : ffffd000`c5bf07b0 fffff801`934c4c28 00000000`00000000 fffff801`93270fc6 : ndis!NdisWriteConfiguration+0x160
ffffd000`c5bf0710 ffffd000`c5bf07b0 : fffff801`934c4c28 00000000`00000000 fffff801`93270fc6 ffffe001`001801a9 : netr28x+0x4b98d
ffffd000`c5bf0718 fffff801`934c4c28 : 00000000`00000000 fffff801`93270fc6 ffffe001`001801a9 ffffe001`fccc51a0 : 0xffffd000`c5bf07b0
ffffd000`c5bf0720 00000000`00000000 : fffff801`93270fc6 ffffe001`001801a9 ffffe001`fccc51a0 ffffe001`00000000 : netr28x+0x25ac28


THREAD_SHA1_HASH_MOD_FUNC:  22955341d8abb05b401bd49818eceb67e2f7827a

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  00663051a00996a7d05651ec0ff70613b5ef291f

THREAD_SHA1_HASH_MOD:  d0eb6a1f61014958f024b7745f0b6539ef5d47ac

FOLLOWUP_IP:
netr28x+4b98d
fffff801`932b598d ??              ???

SYMBOL_STACK_INDEX:  c

SYMBOL_NAME:  netr28x+4b98d

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: netr28x

IMAGE_NAME:  netr28x.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  5534d37a

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  4b98d

FAILURE_BUCKET_ID:  AV_netr28x!unknown_function

BUCKET_ID:  AV_netr28x!unknown_function

PRIMARY_PROBLEM_CLASS:  AV_netr28x!unknown_function

TARGET_TIME:  2020-02-03T12:55:35.000Z

OSBUILD:  9600

OSSERVICEPACK:  17415

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  784

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8.1

OSEDITION:  Windows 8.1 WinNt TerminalServer SingleUserTS Personal

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  2014-10-29 03:38:48

BUILDDATESTAMP_STR:  141028-1500

BUILDLAB_STR:  winblue_r4

BUILDOSVER_STR:  6.3.9600.17415.amd64fre.winblue_r4.141028-1500

ANALYSIS_SESSION_ELAPSED_TIME:  cc2

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:av_netr28x!unknown_function

FAILURE_ID_HASH:  {b1e18842-140d-7b42-6e48-eab659769c49}

Followup:     MachineOwner
---------
INVALID_PROCESS_ATTACH_ATTEMPT (5)
Arguments:
Arg1: ffffe0009d253900
Arg2: ffffe000a37e4900
Arg3: 0000000000000000
Arg4: 0000000000000001

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for netr28x.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  9600.17415.amd64fre.winblue_r4.141028-1500

SYSTEM_MANUFACTURER:  Hewlett-Packard

SYSTEM_PRODUCT_NAME:  HP ProBook 4540s

SYSTEM_SKU:  F0X25ES#ABV

SYSTEM_VERSION:  A1018C1100

BIOS_VENDOR:  Hewlett-Packard

BIOS_VERSION:  68IRR Ver. F.41

BIOS_DATE:  05/20/2013

BASEBOARD_MANUFACTURER:  Hewlett-Packard

BASEBOARD_PRODUCT:  17F6

BASEBOARD_VERSION:  KBC Version 58.1E

DUMP_TYPE:  2

BUGCHECK_P1: ffffe0009d253900

BUGCHECK_P2: ffffe000a37e4900

BUGCHECK_P3: 0

BUGCHECK_P4: 1

CPU_COUNT: 4

CPU_MHZ: 95b

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 3a

CPU_STEPPING: 9

CPU_MICROCODE: 6,3a,9,0 (F,M,S,R)  SIG: 1B'00000000 (cache) 1B'00000000 (init)

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  0x5

PROCESS_NAME:  Steam.exe

CURRENT_IRQL:  2

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  02-04-2020 19:25:07.0647

ANALYSIS_VERSION: 10.0.18362.1 x86fre

DPC_STACK_BASE:  FFFFD00076FF7FB0

LAST_CONTROL_TRANSFER:  from fffff801416186da to fffff801415dc9a0

STACK_TEXT:
ffffd000`76ff7008 fffff801`416186da : 00000000`00000005 ffffe000`9d253900 ffffe000`a37e4900 00000000`00000000 : nt!KeBugCheckEx
ffffd000`76ff7010 fffff801`418ca5bb : ffffe000`9d3545e0 ffffd000`76ff7119 00000000`00000000 00000000`00000041 : nt! ?? ::FNODOBFM::`string'+0x2b82a
ffffd000`76ff7060 fffff801`415e81b3 : ffffd000`76ff7384 ffffd000`76ff75c4 ffffd000`76ff76e0 ffffe000`9e7a1630 : nt!NtClose+0x3db
ffffd000`76ff7180 fffff801`415e0600 : fffff801`418dafbf ffffc000`5be8fdf0 00000000`00000000 ffffd000`76ff7420 : nt!KiSystemServiceCopyEnd+0x13
ffffd000`76ff7318 fffff801`418dafbf : ffffc000`5be8fdf0 00000000`00000000 ffffd000`76ff7420 ffffd000`76ff75c4 : nt!KiServiceLinkage
ffffd000`76ff7320 fffff801`418d9625 : ffffe000`a2bc0161 00000000`00000003 00000000`00000001 ffffd000`76ff75c0 : nt!CmGetDeviceRegPropWorker+0x1e3
ffffd000`76ff7470 fffff801`4192e455 : ffffe000`a3c52200 00000000`00000000 ffffe000`a2fd2010 00000000`00000002 : nt!CmGetDeviceRegProp+0xf9
ffffd000`76ff7580 fffff801`4192e300 : 00000000`00000000 ffffe000`a123d7d0 00000000`00000000 00000000`00000000 : nt!CmGetDeviceSoftwareKey+0x6d
ffffd000`76ff7690 fffff801`418da29b : 00000000`0000003f 00000000`00000012 00000000`00000012 00000000`00000000 : nt!CmGetDeviceSoftwareKeyPath+0x4c
ffffd000`76ff7770 fffff801`418d9e9f : 00000000`00000000 ffffd000`76ff7830 ffffc000`5be8fdf0 ffffe000`00000000 : nt!CmGetDeviceRegKeyPath+0x123
ffffd000`76ff77c0 fffff801`418d94eb : ffffe000`a2a3f1a0 ffffe000`9e7a1630 00000000`00000001 00000000`c0000120 : nt!CmOpenDeviceRegKeyWorker+0x9f
ffffd000`76ff7860 fffff801`4192b2f7 : 00000000`00000002 00000000`00000012 00000000`c2000000 ffffe000`a2a3f1a0 : nt!CmOpenDeviceRegKey+0xdb
ffffd000`76ff7960 fffff800`63cf8621 : ffffe000`a2a3f180 00000000`00000000 ffffd000`76ff7a60 ffffe000`9d2d9da0 : nt!IoOpenDeviceRegistryKey+0xbb
ffffd000`76ff79b0 fffff800`63cf840c : ffffd000`76ff7b00 ffffd000`76ff7a30 ffffd000`76ff7ad8 ffffe000`a10de1a0 : ndis!NdisOpenConfiguration+0xa1
ffffd000`76ff79e0 fffff800`6530094f : 00000000`00000000 ffffd000`76ff7b00 00000000`00000000 fffff800`65393e51 : ndis!NdisOpenConfigurationEx+0xb0
ffffd000`76ff7a60 00000000`00000000 : ffffd000`76ff7b00 00000000`00000000 fffff800`65393e51 00000001`001801a9 : netr28x+0x4b94f


THREAD_SHA1_HASH_MOD_FUNC:  a853edfda1fb7a5ed32d2337b134958b15615a0f

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  66a01394e0907a86783e891512c3e1ca5d86e78c

THREAD_SHA1_HASH_MOD:  fa0c2be74be916a0b1322731a8c4c3632a6d3119

FOLLOWUP_IP:
netr28x+4b94f
fffff800`6530094f ??              ???

SYMBOL_STACK_INDEX:  f

SYMBOL_NAME:  netr28x+4b94f

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: netr28x

IMAGE_NAME:  netr28x.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  5534d37a

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  4b94f

FAILURE_BUCKET_ID:  0x5_netr28x!unknown_function

BUCKET_ID:  0x5_netr28x!unknown_function

PRIMARY_PROBLEM_CLASS:  0x5_netr28x!unknown_function

TARGET_TIME:  2020-02-03T18:55:14.000Z

OSBUILD:  9600

OSSERVICEPACK:  17415

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  784

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8.1

OSEDITION:  Windows 8.1 WinNt TerminalServer SingleUserTS Personal

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  2014-10-29 03:38:48

BUILDDATESTAMP_STR:  141028-1500

BUILDLAB_STR:  winblue_r4

BUILDOSVER_STR:  6.3.9600.17415.amd64fre.winblue_r4.141028-1500

ANALYSIS_SESSION_ELAPSED_TIME:  c69

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x5_netr28x!unknown_function

FAILURE_ID_HASH:  {0a19e2eb-42cd-b574-1749-ac631b1c739d}

Followup:     MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffc001bde87538, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff801566404b0, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for netr28x.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  9600.17415.amd64fre.winblue_r4.141028-1500

SYSTEM_MANUFACTURER:  Hewlett-Packard

SYSTEM_PRODUCT_NAME:  HP ProBook 4540s

SYSTEM_SKU:  F0X25ES#ABV

SYSTEM_VERSION:  A1018C1100

BIOS_VENDOR:  Hewlett-Packard

BIOS_VERSION:  68IRR Ver. F.41

BIOS_DATE:  05/20/2013

BASEBOARD_MANUFACTURER:  Hewlett-Packard

BASEBOARD_PRODUCT:  17F6

BASEBOARD_VERSION:  KBC Version 58.1E

DUMP_TYPE:  2

BUGCHECK_P1: ffffc001bde87538

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff801566404b0

WRITE_ADDRESS: GetUlongPtrFromAddress: unable to read from fffff80156577298
GetUlongPtrFromAddress: unable to read from fffff80156577520
ffffc001bde87538 Paged pool

CURRENT_IRQL:  2

FAULTING_IP:
nt!HvpDoAllocateCell+c4
fffff801`566404b0 892c1e          mov     dword ptr [rsi+rbx],ebp

CPU_COUNT: 4

CPU_MHZ: 95b

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 3a

CPU_STEPPING: 9

CPU_MICROCODE: 6,3a,9,0 (F,M,S,R)  SIG: 1B'00000000 (cache) 1B'00000000 (init)

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  AV

PROCESS_NAME:  System

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  02-04-2020 19:25:11.0532

ANALYSIS_VERSION: 10.0.18362.1 x86fre

TRAP_FRAME:  ffffd000ff66bea0 -- (.trap 0xffffd000ff66bea0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000038 rbx=0000000000000000 rcx=0000000000000001
rdx=ffffd000ff66bea0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff801566404b0 rsp=ffffd000ff66c030 rbp=00000000000000c0
r8=00000000000000f0  r9=0000000000000000 r10=0000000000000000
r11=ffffd000ff66c120 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
nt!HvpDoAllocateCell+0xc4:
fffff801`566404b0 892c1e          mov     dword ptr [rsi+rbx],ebp ds:00000000`00000000=????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff801563704e9 to fffff801563649a0

STACK_TEXT:
ffffd000`ff66bd58 fffff801`563704e9 : 00000000`0000000a ffffc001`bde87538 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffffd000`ff66bd60 fffff801`5636ed3a : 00000000`00000001 ffffc001`bde87508 00000000`00000000 ffffe001`f35be220 : nt!KiBugCheckDispatch+0x69
ffffd000`ff66bea0 fffff801`566404b0 : 00000000`00000005 ffffc001`000006b7 ffffe001`00000030 00000000`00000030 : nt!KiPageFault+0x23a
ffffd000`ff66c030 fffff801`5663f93c : ffffc001`b8a28000 ffffe001`ecd55048 ffffc001`b8a28000 ffffd000`ff66c0f0 : nt!HvpDoAllocateCell+0xc4
ffffd000`ff66c0c0 fffff801`5663f30e : ffffc001`b8a28000 00000000`00000000 ffffc001`b99832b0 ffffd000`ff66c2d0 : nt!CmpAddValueKeyNew+0x4c
ffffd000`ff66c120 fffff801`56643065 : 01d5da8a`21485003 ffffd000`ff66c221 ffffc001`c27e4a70 00000000`00000000 : nt!CmpSetValueKeyNew+0x66
ffffd000`ff66c160 fffff801`56642b9b : ffffc001`c275b960 ffffd000`ff66c2d0 ffffc001`00000004 ffffd000`ff66c750 : nt!CmSetValueKey+0x2f1
ffffd000`ff66c270 fffff801`563701b3 : 00000000`00000001 00000000`00000012 ffffc001`b8a7dce0 ffffd000`ff66c4e0 : nt!NtSetValueKey+0x55f
ffffd000`ff66c440 fffff801`56368600 : fffff801`566282f8 00000000`00000004 ffffe001`f3844240 00000000`40000000 : nt!KiSystemServiceCopyEnd+0x13
ffffd000`ff66c648 fffff801`566282f8 : 00000000`00000004 ffffe001`f3844240 00000000`40000000 00000000`00000000 : nt!KiServiceLinkage
ffffd000`ff66c650 fffff800`e7d7f7d8 : 00000000`00000004 ffffd000`ff66c770 00000000`00000000 00000000`00000000 : nt!RtlWriteRegistryValue+0x68
ffffd000`ff66c6b0 fffff800`e932498d : ffffd000`ff66c7b0 fffff800`e9533c28 00000000`00000000 fffff801`56350fb8 : ndis!NdisWriteConfiguration+0x160
ffffd000`ff66c710 ffffd000`ff66c7b0 : fffff800`e9533c28 00000000`00000000 fffff801`56350fb8 00000000`001801a9 : netr28x+0x4b98d
ffffd000`ff66c718 fffff800`e9533c28 : 00000000`00000000 fffff801`56350fb8 00000000`001801a9 ffffe001`f0b991a0 : 0xffffd000`ff66c7b0
ffffd000`ff66c720 00000000`00000000 : fffff801`56350fb8 00000000`001801a9 ffffe001`f0b991a0 00000000`00000000 : netr28x+0x25ac28


THREAD_SHA1_HASH_MOD_FUNC:  22955341d8abb05b401bd49818eceb67e2f7827a

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  00663051a00996a7d05651ec0ff70613b5ef291f

THREAD_SHA1_HASH_MOD:  d0eb6a1f61014958f024b7745f0b6539ef5d47ac

FOLLOWUP_IP:
netr28x+4b98d
fffff800`e932498d ??              ???

SYMBOL_STACK_INDEX:  c

SYMBOL_NAME:  netr28x+4b98d

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: netr28x

IMAGE_NAME:  netr28x.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  5534d37a

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  4b98d

FAILURE_BUCKET_ID:  AV_netr28x!unknown_function

BUCKET_ID:  AV_netr28x!unknown_function

PRIMARY_PROBLEM_CLASS:  AV_netr28x!unknown_function

TARGET_TIME:  2020-02-03T12:04:47.000Z

OSBUILD:  9600

OSSERVICEPACK:  17415

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  784

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8.1

OSEDITION:  Windows 8.1 WinNt TerminalServer SingleUserTS Personal

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  2014-10-29 03:38:48

BUILDDATESTAMP_STR:  141028-1500

BUILDLAB_STR:  winblue_r4

BUILDOSVER_STR:  6.3.9600.17415.amd64fre.winblue_r4.141028-1500

ANALYSIS_SESSION_ELAPSED_TIME:  cae

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:av_netr28x!unknown_function

FAILURE_ID_HASH:  {b1e18842-140d-7b42-6e48-eab659769c49}

Followup:     MachineOwner
---------


IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffc000a95bdb50, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8026d42d4b0, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for netr28x.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  9600.17415.amd64fre.winblue_r4.141028-1500

SYSTEM_MANUFACTURER:  Hewlett-Packard

SYSTEM_PRODUCT_NAME:  HP ProBook 4540s

SYSTEM_SKU:  F0X25ES#ABV

SYSTEM_VERSION:  A1018C1100

BIOS_VENDOR:  Hewlett-Packard

BIOS_VERSION:  68IRR Ver. F.41

BIOS_DATE:  05/20/2013

BASEBOARD_MANUFACTURER:  Hewlett-Packard

BASEBOARD_PRODUCT:  17F6

BASEBOARD_VERSION:  KBC Version 58.1E

DUMP_TYPE:  2

BUGCHECK_P1: ffffc000a95bdb50

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff8026d42d4b0

WRITE_ADDRESS: GetUlongPtrFromAddress: unable to read from fffff8026d364298
GetUlongPtrFromAddress: unable to read from fffff8026d364520
ffffc000a95bdb50 Paged pool

CURRENT_IRQL:  2

FAULTING_IP:
nt!HvpDoAllocateCell+c4
fffff802`6d42d4b0 892c1e          mov     dword ptr [rsi+rbx],ebp

CPU_COUNT: 4

CPU_MHZ: 95b

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 3a

CPU_STEPPING: 9

CPU_MICROCODE: 6,3a,9,0 (F,M,S,R)  SIG: 1B'00000000 (cache) 1B'00000000 (init)

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  AV

PROCESS_NAME:  System

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  02-04-2020 19:25:15.0050

ANALYSIS_VERSION: 10.0.18362.1 x86fre

TRAP_FRAME:  ffffd0008fc6bea0 -- (.trap 0xffffd0008fc6bea0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000038 rbx=0000000000000000 rcx=0000000000000001
rdx=ffffd0008fc6bea0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8026d42d4b0 rsp=ffffd0008fc6c030 rbp=00000000000000f8
r8=0000000000000128  r9=0000000000000000 r10=fffff78000000008
r11=ffffd0008fc6c120 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
nt!HvpDoAllocateCell+0xc4:
fffff802`6d42d4b0 892c1e          mov     dword ptr [rsi+rbx],ebp ds:00000000`00000000=????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff8026d15d4e9 to fffff8026d1519a0

STACK_TEXT:
ffffd000`8fc6bd58 fffff802`6d15d4e9 : 00000000`0000000a ffffc000`a95bdb50 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffffd000`8fc6bd60 fffff802`6d15bd3a : 00000000`00000001 ffffc000`a95bdb20 00000000`00000000 ffffffff`da3dc980 : nt!KiBugCheckDispatch+0x69
ffffd000`8fc6bea0 fffff802`6d42d4b0 : 00000000`00000005 ffffc000`0000089f ffffe001`00000030 00000000`00000030 : nt!KiPageFault+0x23a
ffffd000`8fc6c030 fffff802`6d42c93c : ffffc000`a9228000 ffffe001`1fe5a048 ffffc000`a9228000 ffffd000`8fc6c0f0 : nt!HvpDoAllocateCell+0xc4
ffffd000`8fc6c0c0 fffff802`6d42c30e : ffffc000`a9228000 00000000`00000000 ffffc000`aad002b0 ffffd000`8fc6c2d0 : nt!CmpAddValueKeyNew+0x4c
ffffd000`8fc6c120 fffff802`6d430065 : 01d5dabf`670d87e2 ffffd000`8fc6c221 ffffc000`bf61e008 00000000`00000000 : nt!CmpSetValueKeyNew+0x66
ffffd000`8fc6c160 fffff802`6d42fb9b : ffffc000`b88929f0 ffffd000`8fc6c2d0 ffffc000`00000004 ffffd000`8fc6c750 : nt!CmSetValueKey+0x2f1
ffffd000`8fc6c270 fffff802`6d15d1b3 : 00000000`00000001 00000000`00000012 ffffc000`a928d780 ffffd000`8fc6c4e0 : nt!NtSetValueKey+0x55f
ffffd000`8fc6c440 fffff802`6d155600 : fffff802`6d4152f8 00000000`00000004 ffffe001`2713a3d0 00000000`40000000 : nt!KiSystemServiceCopyEnd+0x13
ffffd000`8fc6c648 fffff802`6d4152f8 : 00000000`00000004 ffffe001`2713a3d0 00000000`40000000 00000000`00000000 : nt!KiServiceLinkage
ffffd000`8fc6c650 fffff801`43da47d8 : 00000000`00000004 ffffd000`8fc6c770 00000000`00000000 00000000`00000000 : nt!RtlWriteRegistryValue+0x68
ffffd000`8fc6c6b0 fffff801`4532498d : ffffd000`8fc6c7b0 fffff801`45533c28 00000000`00000000 ffffe001`2434d968 : ndis!NdisWriteConfiguration+0x160
ffffd000`8fc6c710 ffffd000`8fc6c7b0 : fffff801`45533c28 00000000`00000000 ffffe001`2434d968 00000000`001801a9 : netr28x+0x4b98d
ffffd000`8fc6c718 fffff801`45533c28 : 00000000`00000000 ffffe001`2434d968 00000000`001801a9 ffffe001`23df81a0 : 0xffffd000`8fc6c7b0
ffffd000`8fc6c720 00000000`00000000 : ffffe001`2434d968 00000000`001801a9 ffffe001`23df81a0 ffffe001`00000000 : netr28x+0x25ac28


THREAD_SHA1_HASH_MOD_FUNC:  22955341d8abb05b401bd49818eceb67e2f7827a

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  00663051a00996a7d05651ec0ff70613b5ef291f

THREAD_SHA1_HASH_MOD:  d0eb6a1f61014958f024b7745f0b6539ef5d47ac

FOLLOWUP_IP:
netr28x+4b98d
fffff801`4532498d ??              ???

SYMBOL_STACK_INDEX:  c

SYMBOL_NAME:  netr28x+4b98d

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: netr28x

IMAGE_NAME:  netr28x.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  5534d37a

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  4b98d

FAILURE_BUCKET_ID:  AV_netr28x!unknown_function

BUCKET_ID:  AV_netr28x!unknown_function

PRIMARY_PROBLEM_CLASS:  AV_netr28x!unknown_function

TARGET_TIME:  2020-02-03T18:26:07.000Z

OSBUILD:  9600

OSSERVICEPACK:  17415

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  784

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8.1

OSEDITION:  Windows 8.1 WinNt TerminalServer SingleUserTS Personal

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  2014-10-29 03:38:48

BUILDDATESTAMP_STR:  141028-1500

BUILDLAB_STR:  winblue_r4

BUILDOSVER_STR:  6.3.9600.17415.amd64fre.winblue_r4.141028-1500

ANALYSIS_SESSION_ELAPSED_TIME:  c88

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:av_netr28x!unknown_function

FAILURE_ID_HASH:  {b1e18842-140d-7b42-6e48-eab659769c49}

Followup:     MachineOwner
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffc00024c9d538, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff802f124b4b0, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for netr28x.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  9600.17415.amd64fre.winblue_r4.141028-1500

SYSTEM_MANUFACTURER:  Hewlett-Packard

SYSTEM_PRODUCT_NAME:  HP ProBook 4540s

SYSTEM_SKU:  F0X25ES#ABV

SYSTEM_VERSION:  A1018C1100

BIOS_VENDOR:  Hewlett-Packard

BIOS_VERSION:  68IRR Ver. F.41

BIOS_DATE:  05/20/2013

BASEBOARD_MANUFACTURER:  Hewlett-Packard

BASEBOARD_PRODUCT:  17F6

BASEBOARD_VERSION:  KBC Version 58.1E

DUMP_TYPE:  2

BUGCHECK_P1: ffffc00024c9d538

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff802f124b4b0

WRITE_ADDRESS: GetUlongPtrFromAddress: unable to read from fffff802f1182298
GetUlongPtrFromAddress: unable to read from fffff802f1182520
ffffc00024c9d538 Paged pool

CURRENT_IRQL:  2

FAULTING_IP:
nt!HvpDoAllocateCell+c4
fffff802`f124b4b0 892c1e          mov     dword ptr [rsi+rbx],ebp

CPU_COUNT: 4

CPU_MHZ: 95b

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 3a

CPU_STEPPING: 9

CPU_MICROCODE: 6,3a,9,0 (F,M,S,R)  SIG: 1B'00000000 (cache) 1B'00000000 (init)

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  AV

PROCESS_NAME:  System

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  02-04-2020 19:25:20.0258

ANALYSIS_VERSION: 10.0.18362.1 x86fre

TRAP_FRAME:  ffffd0018f7efea0 -- (.trap 0xffffd0018f7efea0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000038 rbx=0000000000000000 rcx=0000000000000001
rdx=ffffd0018f7efea0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff802f124b4b0 rsp=ffffd0018f7f0030 rbp=00000000000000c0
r8=00000000000000f0  r9=0000000000000000 r10=fffff78000000008
r11=ffffd0018f7f0120 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
nt!HvpDoAllocateCell+0xc4:
fffff802`f124b4b0 892c1e          mov     dword ptr [rsi+rbx],ebp ds:00000000`00000000=????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff802f0f7b4e9 to fffff802f0f6f9a0

STACK_TEXT:
ffffd001`8f7efd58 fffff802`f0f7b4e9 : 00000000`0000000a ffffc000`24c9d538 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffffd001`8f7efd60 fffff802`f0f79d3a : 00000000`00000001 ffffc000`24c9d508 00000000`00000000 ffffe001`d434f320 : nt!KiBugCheckDispatch+0x69
ffffd001`8f7efea0 fffff802`f124b4b0 : 00000000`00000005 ffffc000`000006b7 ffffe001`00000030 00000000`00000030 : nt!KiPageFault+0x23a
ffffd001`8f7f0030 fffff802`f124a93c : ffffc000`1f628000 ffffe001`ce0588b8 ffffc000`1f628000 ffffd001`8f7f00f0 : nt!HvpDoAllocateCell+0xc4
ffffd001`8f7f00c0 fffff802`f124a30e : ffffc000`1f628000 00000000`00000000 ffffc000`208552b0 ffffd001`8f7f02d0 : nt!CmpAddValueKeyNew+0x4c
ffffd001`8f7f0120 fffff802`f124e065 : 01d5da88`fb08e0a0 ffffd001`8f7f0221 ffffc000`2b4c1008 00000000`00000000 : nt!CmpSetValueKeyNew+0x66
ffffd001`8f7f0160 fffff802`f124db9b : ffffc000`2939ce90 ffffd001`8f7f02d0 ffffc000`00000004 ffffd001`8f7f0750 : nt!CmSetValueKey+0x2f1
ffffd001`8f7f0270 fffff802`f0f7b1b3 : 00000000`00000001 00000000`00000012 ffffc000`1f67c460 ffffd001`8f7f04e0 : nt!NtSetValueKey+0x55f
ffffd001`8f7f0440 fffff802`f0f73600 : fffff802`f12332f8 00000000`00000004 ffffe001`d3718160 00000000`40000000 : nt!KiSystemServiceCopyEnd+0x13
ffffd001`8f7f0648 fffff802`f12332f8 : 00000000`00000004 ffffe001`d3718160 00000000`40000000 00000000`00000000 : nt!KiServiceLinkage
ffffd001`8f7f0650 fffff800`72d3b7d8 : 00000000`00000004 ffffd001`8f7f0770 ffffe001`00000000 00000000`00000000 : nt!RtlWriteRegistryValue+0x68
ffffd001`8f7f06b0 fffff800`7426d98d : ffffd001`8f7f07b0 fffff800`7447cc28 00000000`00000000 fffff800`74228fc6 : ndis!NdisWriteConfiguration+0x160
ffffd001`8f7f0710 ffffd001`8f7f07b0 : fffff800`7447cc28 00000000`00000000 fffff800`74228fc6 ffffe001`001801a9 : netr28x+0x4b98d
ffffd001`8f7f0718 fffff800`7447cc28 : 00000000`00000000 fffff800`74228fc6 ffffe001`001801a9 ffffe001`d1e591a0 : 0xffffd001`8f7f07b0
ffffd001`8f7f0720 00000000`00000000 : fffff800`74228fc6 ffffe001`001801a9 ffffe001`d1e591a0 ffffe001`00000000 : netr28x+0x25ac28


THREAD_SHA1_HASH_MOD_FUNC:  22955341d8abb05b401bd49818eceb67e2f7827a

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  00663051a00996a7d05651ec0ff70613b5ef291f

THREAD_SHA1_HASH_MOD:  d0eb6a1f61014958f024b7745f0b6539ef5d47ac

FOLLOWUP_IP:
netr28x+4b98d
fffff800`7426d98d ??              ???

SYMBOL_STACK_INDEX:  c

SYMBOL_NAME:  netr28x+4b98d

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: netr28x

IMAGE_NAME:  netr28x.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  5534d37a

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  4b98d

FAILURE_BUCKET_ID:  AV_netr28x!unknown_function

BUCKET_ID:  AV_netr28x!unknown_function

PRIMARY_PROBLEM_CLASS:  AV_netr28x!unknown_function

TARGET_TIME:  2020-02-03T11:56:33.000Z

OSBUILD:  9600

OSSERVICEPACK:  17415

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  784

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8.1

OSEDITION:  Windows 8.1 WinNt TerminalServer SingleUserTS Personal

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  2014-10-29 03:38:48

BUILDDATESTAMP_STR:  141028-1500

BUILDLAB_STR:  winblue_r4

BUILDOSVER_STR:  6.3.9600.17415.amd64fre.winblue_r4.141028-1500

ANALYSIS_SESSION_ELAPSED_TIME:  c98

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:av_netr28x!unknown_function

FAILURE_ID_HASH:  {b1e18842-140d-7b42-6e48-eab659769c49}

Followup:     MachineOwner
---------
 
Ralink ağ adaptörü problem çıkartıyor, sürücüsünü kaldır Windows 8.1 için uyumlu bir sürücü kur.
Kod:
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffc00163f51998, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff802e30a15a8, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for netr28x.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  9600.17415.amd64fre.winblue_r4.141028-1500

SYSTEM_MANUFACTURER:  Hewlett-Packard

SYSTEM_PRODUCT_NAME:  HP ProBook 4540s

SYSTEM_SKU:  F0X25ES#ABV

SYSTEM_VERSION:  A1018C1100

BIOS_VENDOR:  Hewlett-Packard

BIOS_VERSION:  68IRR Ver. F.41

BIOS_DATE:  05/20/2013

BASEBOARD_MANUFACTURER:  Hewlett-Packard

BASEBOARD_PRODUCT:  17F6

BASEBOARD_VERSION:  KBC Version 58.1E

DUMP_TYPE:  2

BUGCHECK_P1: ffffc00163f51998

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff802e30a15a8

WRITE_ADDRESS: GetUlongPtrFromAddress: unable to read from fffff802e2fd8298
GetUlongPtrFromAddress: unable to read from fffff802e2fd8520
ffffc00163f51998 Paged pool

CURRENT_IRQL:  2

FAULTING_IP:
nt!HvpDoAllocateCell+1bc
fffff802`e30a15a8 8903            mov     dword ptr [rbx],eax

CPU_COUNT: 4

CPU_MHZ: 95b

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 3a

CPU_STEPPING: 9

CPU_MICROCODE: 6,3a,9,0 (F,M,S,R)  SIG: 1B'00000000 (cache) 1B'00000000 (init)

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  AV

PROCESS_NAME:  System

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  02-04-2020 19:25:01.0093

ANALYSIS_VERSION: 10.0.18362.1 x86fre

TRAP_FRAME:  ffffd00124fbbea0 -- (.trap 0xffffd00124fbbea0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000ffffffd0 rbx=0000000000000000 rcx=0000000000000005
rdx=00000000ffffffff rsi=0000000000000000 rdi=0000000000000000
rip=fffff802e30a15a8 rsp=ffffd00124fbc030 rbp=00000000ffffffff
r8=ffffc00163429b40  r9=ffffc00163429c30 r10=ffffffffffffffff
r11=00000000ffffffff r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe cy
nt!HvpDoAllocateCell+0x1bc:
fffff802`e30a15a8 8903            mov     dword ptr [rbx],eax ds:00000000`00000000=????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff802e2dd14e9 to fffff802e2dc59a0

STACK_TEXT:
ffffd001`24fbbd58 fffff802`e2dd14e9 : 00000000`0000000a ffffc001`63f51998 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffffd001`24fbbd60 fffff802`e2dcfd3a : 00000000`00000001 ffffc001`63f51998 00000000`00000000 00000000`0000000a : nt!KiBugCheckDispatch+0x69
ffffd001`24fbbea0 fffff802`e30a15a8 : ffffc001`63f51998 00000000`00000030 ffffe001`00000030 00000000`00000030 : nt!KiPageFault+0x23a
ffffd001`24fbc030 fffff802`e30a093c : ffffc001`63428000 ffffe001`26354418 ffffc001`63428000 ffffd001`24fbc0f0 : nt!HvpDoAllocateCell+0x1bc
ffffd001`24fbc0c0 fffff802`e30a030e : ffffc001`63428000 00000000`00000000 ffffc001`645d22b0 ffffd001`24fbc2d0 : nt!CmpAddValueKeyNew+0x4c
ffffd001`24fbc120 fffff802`e30a4065 : 01d5da00`6d46a8d6 ffffd001`24fbc221 ffffc001`7084d380 00000000`00000000 : nt!CmpSetValueKeyNew+0x66
ffffd001`24fbc160 fffff802`e30a3b9b : ffffc001`6f437e10 ffffd001`24fbc2d0 ffffc001`00000004 ffffd001`24fbc750 : nt!CmSetValueKey+0x2f1
ffffd001`24fbc270 fffff802`e2dd11b3 : 00000000`00000001 00000000`00000012 ffffc001`6347b700 ffffd001`24fbc4e0 : nt!NtSetValueKey+0x55f
ffffd001`24fbc440 fffff802`e2dc9600 : fffff802`e30892f8 00000000`00000004 ffffe001`2dc99210 00000000`40000000 : nt!KiSystemServiceCopyEnd+0x13
ffffd001`24fbc648 fffff802`e30892f8 : 00000000`00000004 ffffe001`2dc99210 00000000`40000000 00000000`00000000 : nt!KiServiceLinkage
ffffd001`24fbc650 fffff800`ef5bc7d8 : 00000000`00000004 ffffd001`24fbc770 00000000`00000000 00000000`00000000 : nt!RtlWriteRegistryValue+0x68
ffffd001`24fbc6b0 fffff800`f08ce98d : ffffd001`24fbc7b0 fffff800`f0addc28 00000000`00000000 fffff800`f0961e51 : ndis!NdisWriteConfiguration+0x160
ffffd001`24fbc710 ffffd001`24fbc7b0 : fffff800`f0addc28 00000000`00000000 fffff800`f0961e51 ffffd001`001801a9 : netr28x+0x4b98d
ffffd001`24fbc718 fffff800`f0addc28 : 00000000`00000000 fffff800`f0961e51 ffffd001`001801a9 ffffe001`2a0081a0 : 0xffffd001`24fbc7b0
ffffd001`24fbc720 00000000`00000000 : fffff800`f0961e51 ffffd001`001801a9 ffffe001`2a0081a0 fffff800`00000000 : netr28x+0x25ac28


THREAD_SHA1_HASH_MOD_FUNC:  22955341d8abb05b401bd49818eceb67e2f7827a

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  d566e3f7b9be6f17dd7d2a068bf0708e2a48ecbd

THREAD_SHA1_HASH_MOD:  d0eb6a1f61014958f024b7745f0b6539ef5d47ac

FOLLOWUP_IP:
netr28x+4b98d
fffff800`f08ce98d ??              ???

SYMBOL_STACK_INDEX:  c

SYMBOL_NAME:  netr28x+4b98d

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: netr28x

IMAGE_NAME:  netr28x.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  5534d37a

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  4b98d

FAILURE_BUCKET_ID:  AV_netr28x!unknown_function

BUCKET_ID:  AV_netr28x!unknown_function

PRIMARY_PROBLEM_CLASS:  AV_netr28x!unknown_function

TARGET_TIME:  2020-02-02T19:39:04.000Z

OSBUILD:  9600

OSSERVICEPACK:  17415

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  784

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8.1

OSEDITION:  Windows 8.1 WinNt TerminalServer SingleUserTS Personal

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  2014-10-29 03:38:48

BUILDDATESTAMP_STR:  141028-1500

BUILDLAB_STR:  winblue_r4

BUILDOSVER_STR:  6.3.9600.17415.amd64fre.winblue_r4.141028-1500

ANALYSIS_SESSION_ELAPSED_TIME:  12db

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:av_netr28x!unknown_function

FAILURE_ID_HASH:  {b1e18842-140d-7b42-6e48-eab659769c49}

Followup:     MachineOwner
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffc00166672e28, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8009dea24b0, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for netr28x.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  9600.17415.amd64fre.winblue_r4.141028-1500

SYSTEM_MANUFACTURER:  Hewlett-Packard

SYSTEM_PRODUCT_NAME:  HP ProBook 4540s

SYSTEM_SKU:  F0X25ES#ABV

SYSTEM_VERSION:  A1018C1100

BIOS_VENDOR:  Hewlett-Packard

BIOS_VERSION:  68IRR Ver. F.41

BIOS_DATE:  05/20/2013

BASEBOARD_MANUFACTURER:  Hewlett-Packard

BASEBOARD_PRODUCT:  17F6

BASEBOARD_VERSION:  KBC Version 58.1E

DUMP_TYPE:  2

BUGCHECK_P1: ffffc00166672e28

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff8009dea24b0

WRITE_ADDRESS: GetUlongPtrFromAddress: unable to read from fffff8009ddd9298
GetUlongPtrFromAddress: unable to read from fffff8009ddd9520
ffffc00166672e28 Paged pool

CURRENT_IRQL:  2

FAULTING_IP:
nt!HvpDoAllocateCell+c4
fffff800`9dea24b0 892c1e          mov     dword ptr [rsi+rbx],ebp

CPU_COUNT: 4

CPU_MHZ: 95b

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 3a

CPU_STEPPING: 9

CPU_MICROCODE: 6,3a,9,0 (F,M,S,R)  SIG: 1B'00000000 (cache) 1B'00000000 (init)

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  AV

PROCESS_NAME:  System

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  02-04-2020 19:25:03.0470

ANALYSIS_VERSION: 10.0.18362.1 x86fre

TRAP_FRAME:  ffffd000c5befea0 -- (.trap 0xffffd000c5befea0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000038 rbx=0000000000000000 rcx=0000000000000001
rdx=ffffd000c5befea0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8009dea24b0 rsp=ffffd000c5bf0030 rbp=00000000000001d8
r8=0000000000000208  r9=0000000000000000 r10=fffff78000000008
r11=ffffd000c5bf0120 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
nt!HvpDoAllocateCell+0xc4:
fffff800`9dea24b0 892c1e          mov     dword ptr [rsi+rbx],ebp ds:00000000`00000000=????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff8009dbd24e9 to fffff8009dbc69a0

STACK_TEXT:
ffffd000`c5befd58 fffff800`9dbd24e9 : 00000000`0000000a ffffc001`66672e28 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffffd000`c5befd60 fffff800`9dbd0d3a : 00000000`00000001 ffffc001`66672df8 00000000`00000000 ffffffff`da3dc980 : nt!KiBugCheckDispatch+0x69
ffffd000`c5befea0 fffff800`9dea24b0 : 00000000`00000005 ffffc001`0000078c ffffe001`00000030 00000000`00000030 : nt!KiPageFault+0x23a
ffffd000`c5bf0030 fffff800`9dea193c : ffffc001`64828000 ffffe001`f8f55048 ffffc001`64828000 ffffd000`c5bf00f0 : nt!HvpDoAllocateCell+0xc4
ffffd000`c5bf00c0 fffff800`9dea130e : ffffc001`64828000 00000000`00000000 ffffc001`658812b0 ffffd000`c5bf02d0 : nt!CmpAddValueKeyNew+0x4c
ffffd000`c5bf0120 fffff800`9dea5065 : 01d5da91`3a0a927c ffffd000`c5bf0221 ffffc001`6f1de4a8 00000000`00000000 : nt!CmpSetValueKeyNew+0x66
ffffd000`c5bf0160 fffff800`9dea4b9b : ffffc001`6f58efa0 ffffd000`c5bf02d0 ffffc001`00000004 ffffd000`c5bf0750 : nt!CmSetValueKey+0x2f1
ffffd000`c5bf0270 fffff800`9dbd21b3 : 00000000`00000001 00000000`00000012 ffffc001`64898010 ffffd000`c5bf04e0 : nt!NtSetValueKey+0x55f
ffffd000`c5bf0440 fffff800`9dbca600 : fffff800`9de8a2f8 00000000`00000004 ffffe001`fccd3930 00000000`40000000 : nt!KiSystemServiceCopyEnd+0x13
ffffd000`c5bf0648 fffff800`9de8a2f8 : 00000000`00000004 ffffe001`fccd3930 00000000`40000000 00000000`00000000 : nt!KiServiceLinkage
ffffd000`c5bf0650 fffff801`91f9c7d8 : 00000000`00000004 ffffd000`c5bf0770 ffffe001`00000000 00000000`00000000 : nt!RtlWriteRegistryValue+0x68
ffffd000`c5bf06b0 fffff801`932b598d : ffffd000`c5bf07b0 fffff801`934c4c28 00000000`00000000 fffff801`93270fc6 : ndis!NdisWriteConfiguration+0x160
ffffd000`c5bf0710 ffffd000`c5bf07b0 : fffff801`934c4c28 00000000`00000000 fffff801`93270fc6 ffffe001`001801a9 : netr28x+0x4b98d
ffffd000`c5bf0718 fffff801`934c4c28 : 00000000`00000000 fffff801`93270fc6 ffffe001`001801a9 ffffe001`fccc51a0 : 0xffffd000`c5bf07b0
ffffd000`c5bf0720 00000000`00000000 : fffff801`93270fc6 ffffe001`001801a9 ffffe001`fccc51a0 ffffe001`00000000 : netr28x+0x25ac28


THREAD_SHA1_HASH_MOD_FUNC:  22955341d8abb05b401bd49818eceb67e2f7827a

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  00663051a00996a7d05651ec0ff70613b5ef291f

THREAD_SHA1_HASH_MOD:  d0eb6a1f61014958f024b7745f0b6539ef5d47ac

FOLLOWUP_IP:
netr28x+4b98d
fffff801`932b598d ??              ???

SYMBOL_STACK_INDEX:  c

SYMBOL_NAME:  netr28x+4b98d

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: netr28x

IMAGE_NAME:  netr28x.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  5534d37a

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  4b98d

FAILURE_BUCKET_ID:  AV_netr28x!unknown_function

BUCKET_ID:  AV_netr28x!unknown_function

PRIMARY_PROBLEM_CLASS:  AV_netr28x!unknown_function

TARGET_TIME:  2020-02-03T12:55:35.000Z

OSBUILD:  9600

OSSERVICEPACK:  17415

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  784

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8.1

OSEDITION:  Windows 8.1 WinNt TerminalServer SingleUserTS Personal

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  2014-10-29 03:38:48

BUILDDATESTAMP_STR:  141028-1500

BUILDLAB_STR:  winblue_r4

BUILDOSVER_STR:  6.3.9600.17415.amd64fre.winblue_r4.141028-1500

ANALYSIS_SESSION_ELAPSED_TIME:  cc2

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:av_netr28x!unknown_function

FAILURE_ID_HASH:  {b1e18842-140d-7b42-6e48-eab659769c49}

Followup:     MachineOwner
---------
INVALID_PROCESS_ATTACH_ATTEMPT (5)
Arguments:
Arg1: ffffe0009d253900
Arg2: ffffe000a37e4900
Arg3: 0000000000000000
Arg4: 0000000000000001

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for netr28x.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  9600.17415.amd64fre.winblue_r4.141028-1500

SYSTEM_MANUFACTURER:  Hewlett-Packard

SYSTEM_PRODUCT_NAME:  HP ProBook 4540s

SYSTEM_SKU:  F0X25ES#ABV

SYSTEM_VERSION:  A1018C1100

BIOS_VENDOR:  Hewlett-Packard

BIOS_VERSION:  68IRR Ver. F.41

BIOS_DATE:  05/20/2013

BASEBOARD_MANUFACTURER:  Hewlett-Packard

BASEBOARD_PRODUCT:  17F6

BASEBOARD_VERSION:  KBC Version 58.1E

DUMP_TYPE:  2

BUGCHECK_P1: ffffe0009d253900

BUGCHECK_P2: ffffe000a37e4900

BUGCHECK_P3: 0

BUGCHECK_P4: 1

CPU_COUNT: 4

CPU_MHZ: 95b

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 3a

CPU_STEPPING: 9

CPU_MICROCODE: 6,3a,9,0 (F,M,S,R)  SIG: 1B'00000000 (cache) 1B'00000000 (init)

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  0x5

PROCESS_NAME:  Steam.exe

CURRENT_IRQL:  2

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  02-04-2020 19:25:07.0647

ANALYSIS_VERSION: 10.0.18362.1 x86fre

DPC_STACK_BASE:  FFFFD00076FF7FB0

LAST_CONTROL_TRANSFER:  from fffff801416186da to fffff801415dc9a0

STACK_TEXT:
ffffd000`76ff7008 fffff801`416186da : 00000000`00000005 ffffe000`9d253900 ffffe000`a37e4900 00000000`00000000 : nt!KeBugCheckEx
ffffd000`76ff7010 fffff801`418ca5bb : ffffe000`9d3545e0 ffffd000`76ff7119 00000000`00000000 00000000`00000041 : nt! ?? ::FNODOBFM::`string'+0x2b82a
ffffd000`76ff7060 fffff801`415e81b3 : ffffd000`76ff7384 ffffd000`76ff75c4 ffffd000`76ff76e0 ffffe000`9e7a1630 : nt!NtClose+0x3db
ffffd000`76ff7180 fffff801`415e0600 : fffff801`418dafbf ffffc000`5be8fdf0 00000000`00000000 ffffd000`76ff7420 : nt!KiSystemServiceCopyEnd+0x13
ffffd000`76ff7318 fffff801`418dafbf : ffffc000`5be8fdf0 00000000`00000000 ffffd000`76ff7420 ffffd000`76ff75c4 : nt!KiServiceLinkage
ffffd000`76ff7320 fffff801`418d9625 : ffffe000`a2bc0161 00000000`00000003 00000000`00000001 ffffd000`76ff75c0 : nt!CmGetDeviceRegPropWorker+0x1e3
ffffd000`76ff7470 fffff801`4192e455 : ffffe000`a3c52200 00000000`00000000 ffffe000`a2fd2010 00000000`00000002 : nt!CmGetDeviceRegProp+0xf9
ffffd000`76ff7580 fffff801`4192e300 : 00000000`00000000 ffffe000`a123d7d0 00000000`00000000 00000000`00000000 : nt!CmGetDeviceSoftwareKey+0x6d
ffffd000`76ff7690 fffff801`418da29b : 00000000`0000003f 00000000`00000012 00000000`00000012 00000000`00000000 : nt!CmGetDeviceSoftwareKeyPath+0x4c
ffffd000`76ff7770 fffff801`418d9e9f : 00000000`00000000 ffffd000`76ff7830 ffffc000`5be8fdf0 ffffe000`00000000 : nt!CmGetDeviceRegKeyPath+0x123
ffffd000`76ff77c0 fffff801`418d94eb : ffffe000`a2a3f1a0 ffffe000`9e7a1630 00000000`00000001 00000000`c0000120 : nt!CmOpenDeviceRegKeyWorker+0x9f
ffffd000`76ff7860 fffff801`4192b2f7 : 00000000`00000002 00000000`00000012 00000000`c2000000 ffffe000`a2a3f1a0 : nt!CmOpenDeviceRegKey+0xdb
ffffd000`76ff7960 fffff800`63cf8621 : ffffe000`a2a3f180 00000000`00000000 ffffd000`76ff7a60 ffffe000`9d2d9da0 : nt!IoOpenDeviceRegistryKey+0xbb
ffffd000`76ff79b0 fffff800`63cf840c : ffffd000`76ff7b00 ffffd000`76ff7a30 ffffd000`76ff7ad8 ffffe000`a10de1a0 : ndis!NdisOpenConfiguration+0xa1
ffffd000`76ff79e0 fffff800`6530094f : 00000000`00000000 ffffd000`76ff7b00 00000000`00000000 fffff800`65393e51 : ndis!NdisOpenConfigurationEx+0xb0
ffffd000`76ff7a60 00000000`00000000 : ffffd000`76ff7b00 00000000`00000000 fffff800`65393e51 00000001`001801a9 : netr28x+0x4b94f


THREAD_SHA1_HASH_MOD_FUNC:  a853edfda1fb7a5ed32d2337b134958b15615a0f

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  66a01394e0907a86783e891512c3e1ca5d86e78c

THREAD_SHA1_HASH_MOD:  fa0c2be74be916a0b1322731a8c4c3632a6d3119

FOLLOWUP_IP:
netr28x+4b94f
fffff800`6530094f ??              ???

SYMBOL_STACK_INDEX:  f

SYMBOL_NAME:  netr28x+4b94f

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: netr28x

IMAGE_NAME:  netr28x.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  5534d37a

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  4b94f

FAILURE_BUCKET_ID:  0x5_netr28x!unknown_function

BUCKET_ID:  0x5_netr28x!unknown_function

PRIMARY_PROBLEM_CLASS:  0x5_netr28x!unknown_function

TARGET_TIME:  2020-02-03T18:55:14.000Z

OSBUILD:  9600

OSSERVICEPACK:  17415

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  784

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8.1

OSEDITION:  Windows 8.1 WinNt TerminalServer SingleUserTS Personal

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  2014-10-29 03:38:48

BUILDDATESTAMP_STR:  141028-1500

BUILDLAB_STR:  winblue_r4

BUILDOSVER_STR:  6.3.9600.17415.amd64fre.winblue_r4.141028-1500

ANALYSIS_SESSION_ELAPSED_TIME:  c69

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x5_netr28x!unknown_function

FAILURE_ID_HASH:  {0a19e2eb-42cd-b574-1749-ac631b1c739d}

Followup:     MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffc001bde87538, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff801566404b0, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for netr28x.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  9600.17415.amd64fre.winblue_r4.141028-1500

SYSTEM_MANUFACTURER:  Hewlett-Packard

SYSTEM_PRODUCT_NAME:  HP ProBook 4540s

SYSTEM_SKU:  F0X25ES#ABV

SYSTEM_VERSION:  A1018C1100

BIOS_VENDOR:  Hewlett-Packard

BIOS_VERSION:  68IRR Ver. F.41

BIOS_DATE:  05/20/2013

BASEBOARD_MANUFACTURER:  Hewlett-Packard

BASEBOARD_PRODUCT:  17F6

BASEBOARD_VERSION:  KBC Version 58.1E

DUMP_TYPE:  2

BUGCHECK_P1: ffffc001bde87538

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff801566404b0

WRITE_ADDRESS: GetUlongPtrFromAddress: unable to read from fffff80156577298
GetUlongPtrFromAddress: unable to read from fffff80156577520
ffffc001bde87538 Paged pool

CURRENT_IRQL:  2

FAULTING_IP:
nt!HvpDoAllocateCell+c4
fffff801`566404b0 892c1e          mov     dword ptr [rsi+rbx],ebp

CPU_COUNT: 4

CPU_MHZ: 95b

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 3a

CPU_STEPPING: 9

CPU_MICROCODE: 6,3a,9,0 (F,M,S,R)  SIG: 1B'00000000 (cache) 1B'00000000 (init)

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  AV

PROCESS_NAME:  System

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  02-04-2020 19:25:11.0532

ANALYSIS_VERSION: 10.0.18362.1 x86fre

TRAP_FRAME:  ffffd000ff66bea0 -- (.trap 0xffffd000ff66bea0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000038 rbx=0000000000000000 rcx=0000000000000001
rdx=ffffd000ff66bea0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff801566404b0 rsp=ffffd000ff66c030 rbp=00000000000000c0
r8=00000000000000f0  r9=0000000000000000 r10=0000000000000000
r11=ffffd000ff66c120 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
nt!HvpDoAllocateCell+0xc4:
fffff801`566404b0 892c1e          mov     dword ptr [rsi+rbx],ebp ds:00000000`00000000=????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff801563704e9 to fffff801563649a0

STACK_TEXT:
ffffd000`ff66bd58 fffff801`563704e9 : 00000000`0000000a ffffc001`bde87538 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffffd000`ff66bd60 fffff801`5636ed3a : 00000000`00000001 ffffc001`bde87508 00000000`00000000 ffffe001`f35be220 : nt!KiBugCheckDispatch+0x69
ffffd000`ff66bea0 fffff801`566404b0 : 00000000`00000005 ffffc001`000006b7 ffffe001`00000030 00000000`00000030 : nt!KiPageFault+0x23a
ffffd000`ff66c030 fffff801`5663f93c : ffffc001`b8a28000 ffffe001`ecd55048 ffffc001`b8a28000 ffffd000`ff66c0f0 : nt!HvpDoAllocateCell+0xc4
ffffd000`ff66c0c0 fffff801`5663f30e : ffffc001`b8a28000 00000000`00000000 ffffc001`b99832b0 ffffd000`ff66c2d0 : nt!CmpAddValueKeyNew+0x4c
ffffd000`ff66c120 fffff801`56643065 : 01d5da8a`21485003 ffffd000`ff66c221 ffffc001`c27e4a70 00000000`00000000 : nt!CmpSetValueKeyNew+0x66
ffffd000`ff66c160 fffff801`56642b9b : ffffc001`c275b960 ffffd000`ff66c2d0 ffffc001`00000004 ffffd000`ff66c750 : nt!CmSetValueKey+0x2f1
ffffd000`ff66c270 fffff801`563701b3 : 00000000`00000001 00000000`00000012 ffffc001`b8a7dce0 ffffd000`ff66c4e0 : nt!NtSetValueKey+0x55f
ffffd000`ff66c440 fffff801`56368600 : fffff801`566282f8 00000000`00000004 ffffe001`f3844240 00000000`40000000 : nt!KiSystemServiceCopyEnd+0x13
ffffd000`ff66c648 fffff801`566282f8 : 00000000`00000004 ffffe001`f3844240 00000000`40000000 00000000`00000000 : nt!KiServiceLinkage
ffffd000`ff66c650 fffff800`e7d7f7d8 : 00000000`00000004 ffffd000`ff66c770 00000000`00000000 00000000`00000000 : nt!RtlWriteRegistryValue+0x68
ffffd000`ff66c6b0 fffff800`e932498d : ffffd000`ff66c7b0 fffff800`e9533c28 00000000`00000000 fffff801`56350fb8 : ndis!NdisWriteConfiguration+0x160
ffffd000`ff66c710 ffffd000`ff66c7b0 : fffff800`e9533c28 00000000`00000000 fffff801`56350fb8 00000000`001801a9 : netr28x+0x4b98d
ffffd000`ff66c718 fffff800`e9533c28 : 00000000`00000000 fffff801`56350fb8 00000000`001801a9 ffffe001`f0b991a0 : 0xffffd000`ff66c7b0
ffffd000`ff66c720 00000000`00000000 : fffff801`56350fb8 00000000`001801a9 ffffe001`f0b991a0 00000000`00000000 : netr28x+0x25ac28


THREAD_SHA1_HASH_MOD_FUNC:  22955341d8abb05b401bd49818eceb67e2f7827a

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  00663051a00996a7d05651ec0ff70613b5ef291f

THREAD_SHA1_HASH_MOD:  d0eb6a1f61014958f024b7745f0b6539ef5d47ac

FOLLOWUP_IP:
netr28x+4b98d
fffff800`e932498d ??              ???

SYMBOL_STACK_INDEX:  c

SYMBOL_NAME:  netr28x+4b98d

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: netr28x

IMAGE_NAME:  netr28x.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  5534d37a

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  4b98d

FAILURE_BUCKET_ID:  AV_netr28x!unknown_function

BUCKET_ID:  AV_netr28x!unknown_function

PRIMARY_PROBLEM_CLASS:  AV_netr28x!unknown_function

TARGET_TIME:  2020-02-03T12:04:47.000Z

OSBUILD:  9600

OSSERVICEPACK:  17415

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  784

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8.1

OSEDITION:  Windows 8.1 WinNt TerminalServer SingleUserTS Personal

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  2014-10-29 03:38:48

BUILDDATESTAMP_STR:  141028-1500

BUILDLAB_STR:  winblue_r4

BUILDOSVER_STR:  6.3.9600.17415.amd64fre.winblue_r4.141028-1500

ANALYSIS_SESSION_ELAPSED_TIME:  cae

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:av_netr28x!unknown_function

FAILURE_ID_HASH:  {b1e18842-140d-7b42-6e48-eab659769c49}

Followup:     MachineOwner
---------


IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffc000a95bdb50, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8026d42d4b0, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for netr28x.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  9600.17415.amd64fre.winblue_r4.141028-1500

SYSTEM_MANUFACTURER:  Hewlett-Packard

SYSTEM_PRODUCT_NAME:  HP ProBook 4540s

SYSTEM_SKU:  F0X25ES#ABV

SYSTEM_VERSION:  A1018C1100

BIOS_VENDOR:  Hewlett-Packard

BIOS_VERSION:  68IRR Ver. F.41

BIOS_DATE:  05/20/2013

BASEBOARD_MANUFACTURER:  Hewlett-Packard

BASEBOARD_PRODUCT:  17F6

BASEBOARD_VERSION:  KBC Version 58.1E

DUMP_TYPE:  2

BUGCHECK_P1: ffffc000a95bdb50

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff8026d42d4b0

WRITE_ADDRESS: GetUlongPtrFromAddress: unable to read from fffff8026d364298
GetUlongPtrFromAddress: unable to read from fffff8026d364520
ffffc000a95bdb50 Paged pool

CURRENT_IRQL:  2

FAULTING_IP:
nt!HvpDoAllocateCell+c4
fffff802`6d42d4b0 892c1e          mov     dword ptr [rsi+rbx],ebp

CPU_COUNT: 4

CPU_MHZ: 95b

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 3a

CPU_STEPPING: 9

CPU_MICROCODE: 6,3a,9,0 (F,M,S,R)  SIG: 1B'00000000 (cache) 1B'00000000 (init)

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  AV

PROCESS_NAME:  System

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  02-04-2020 19:25:15.0050

ANALYSIS_VERSION: 10.0.18362.1 x86fre

TRAP_FRAME:  ffffd0008fc6bea0 -- (.trap 0xffffd0008fc6bea0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000038 rbx=0000000000000000 rcx=0000000000000001
rdx=ffffd0008fc6bea0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8026d42d4b0 rsp=ffffd0008fc6c030 rbp=00000000000000f8
r8=0000000000000128  r9=0000000000000000 r10=fffff78000000008
r11=ffffd0008fc6c120 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
nt!HvpDoAllocateCell+0xc4:
fffff802`6d42d4b0 892c1e          mov     dword ptr [rsi+rbx],ebp ds:00000000`00000000=????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff8026d15d4e9 to fffff8026d1519a0

STACK_TEXT:
ffffd000`8fc6bd58 fffff802`6d15d4e9 : 00000000`0000000a ffffc000`a95bdb50 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffffd000`8fc6bd60 fffff802`6d15bd3a : 00000000`00000001 ffffc000`a95bdb20 00000000`00000000 ffffffff`da3dc980 : nt!KiBugCheckDispatch+0x69
ffffd000`8fc6bea0 fffff802`6d42d4b0 : 00000000`00000005 ffffc000`0000089f ffffe001`00000030 00000000`00000030 : nt!KiPageFault+0x23a
ffffd000`8fc6c030 fffff802`6d42c93c : ffffc000`a9228000 ffffe001`1fe5a048 ffffc000`a9228000 ffffd000`8fc6c0f0 : nt!HvpDoAllocateCell+0xc4
ffffd000`8fc6c0c0 fffff802`6d42c30e : ffffc000`a9228000 00000000`00000000 ffffc000`aad002b0 ffffd000`8fc6c2d0 : nt!CmpAddValueKeyNew+0x4c
ffffd000`8fc6c120 fffff802`6d430065 : 01d5dabf`670d87e2 ffffd000`8fc6c221 ffffc000`bf61e008 00000000`00000000 : nt!CmpSetValueKeyNew+0x66
ffffd000`8fc6c160 fffff802`6d42fb9b : ffffc000`b88929f0 ffffd000`8fc6c2d0 ffffc000`00000004 ffffd000`8fc6c750 : nt!CmSetValueKey+0x2f1
ffffd000`8fc6c270 fffff802`6d15d1b3 : 00000000`00000001 00000000`00000012 ffffc000`a928d780 ffffd000`8fc6c4e0 : nt!NtSetValueKey+0x55f
ffffd000`8fc6c440 fffff802`6d155600 : fffff802`6d4152f8 00000000`00000004 ffffe001`2713a3d0 00000000`40000000 : nt!KiSystemServiceCopyEnd+0x13
ffffd000`8fc6c648 fffff802`6d4152f8 : 00000000`00000004 ffffe001`2713a3d0 00000000`40000000 00000000`00000000 : nt!KiServiceLinkage
ffffd000`8fc6c650 fffff801`43da47d8 : 00000000`00000004 ffffd000`8fc6c770 00000000`00000000 00000000`00000000 : nt!RtlWriteRegistryValue+0x68
ffffd000`8fc6c6b0 fffff801`4532498d : ffffd000`8fc6c7b0 fffff801`45533c28 00000000`00000000 ffffe001`2434d968 : ndis!NdisWriteConfiguration+0x160
ffffd000`8fc6c710 ffffd000`8fc6c7b0 : fffff801`45533c28 00000000`00000000 ffffe001`2434d968 00000000`001801a9 : netr28x+0x4b98d
ffffd000`8fc6c718 fffff801`45533c28 : 00000000`00000000 ffffe001`2434d968 00000000`001801a9 ffffe001`23df81a0 : 0xffffd000`8fc6c7b0
ffffd000`8fc6c720 00000000`00000000 : ffffe001`2434d968 00000000`001801a9 ffffe001`23df81a0 ffffe001`00000000 : netr28x+0x25ac28


THREAD_SHA1_HASH_MOD_FUNC:  22955341d8abb05b401bd49818eceb67e2f7827a

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  00663051a00996a7d05651ec0ff70613b5ef291f

THREAD_SHA1_HASH_MOD:  d0eb6a1f61014958f024b7745f0b6539ef5d47ac

FOLLOWUP_IP:
netr28x+4b98d
fffff801`4532498d ??              ???

SYMBOL_STACK_INDEX:  c

SYMBOL_NAME:  netr28x+4b98d

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: netr28x

IMAGE_NAME:  netr28x.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  5534d37a

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  4b98d

FAILURE_BUCKET_ID:  AV_netr28x!unknown_function

BUCKET_ID:  AV_netr28x!unknown_function

PRIMARY_PROBLEM_CLASS:  AV_netr28x!unknown_function

TARGET_TIME:  2020-02-03T18:26:07.000Z

OSBUILD:  9600

OSSERVICEPACK:  17415

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  784

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8.1

OSEDITION:  Windows 8.1 WinNt TerminalServer SingleUserTS Personal

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  2014-10-29 03:38:48

BUILDDATESTAMP_STR:  141028-1500

BUILDLAB_STR:  winblue_r4

BUILDOSVER_STR:  6.3.9600.17415.amd64fre.winblue_r4.141028-1500

ANALYSIS_SESSION_ELAPSED_TIME:  c88

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:av_netr28x!unknown_function

FAILURE_ID_HASH:  {b1e18842-140d-7b42-6e48-eab659769c49}

Followup:     MachineOwner
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffc00024c9d538, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff802f124b4b0, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for netr28x.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  9600.17415.amd64fre.winblue_r4.141028-1500

SYSTEM_MANUFACTURER:  Hewlett-Packard

SYSTEM_PRODUCT_NAME:  HP ProBook 4540s

SYSTEM_SKU:  F0X25ES#ABV

SYSTEM_VERSION:  A1018C1100

BIOS_VENDOR:  Hewlett-Packard

BIOS_VERSION:  68IRR Ver. F.41

BIOS_DATE:  05/20/2013

BASEBOARD_MANUFACTURER:  Hewlett-Packard

BASEBOARD_PRODUCT:  17F6

BASEBOARD_VERSION:  KBC Version 58.1E

DUMP_TYPE:  2

BUGCHECK_P1: ffffc00024c9d538

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff802f124b4b0

WRITE_ADDRESS: GetUlongPtrFromAddress: unable to read from fffff802f1182298
GetUlongPtrFromAddress: unable to read from fffff802f1182520
ffffc00024c9d538 Paged pool

CURRENT_IRQL:  2

FAULTING_IP:
nt!HvpDoAllocateCell+c4
fffff802`f124b4b0 892c1e          mov     dword ptr [rsi+rbx],ebp

CPU_COUNT: 4

CPU_MHZ: 95b

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 3a

CPU_STEPPING: 9

CPU_MICROCODE: 6,3a,9,0 (F,M,S,R)  SIG: 1B'00000000 (cache) 1B'00000000 (init)

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  AV

PROCESS_NAME:  System

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  02-04-2020 19:25:20.0258

ANALYSIS_VERSION: 10.0.18362.1 x86fre

TRAP_FRAME:  ffffd0018f7efea0 -- (.trap 0xffffd0018f7efea0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000038 rbx=0000000000000000 rcx=0000000000000001
rdx=ffffd0018f7efea0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff802f124b4b0 rsp=ffffd0018f7f0030 rbp=00000000000000c0
r8=00000000000000f0  r9=0000000000000000 r10=fffff78000000008
r11=ffffd0018f7f0120 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
nt!HvpDoAllocateCell+0xc4:
fffff802`f124b4b0 892c1e          mov     dword ptr [rsi+rbx],ebp ds:00000000`00000000=????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff802f0f7b4e9 to fffff802f0f6f9a0

STACK_TEXT:
ffffd001`8f7efd58 fffff802`f0f7b4e9 : 00000000`0000000a ffffc000`24c9d538 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffffd001`8f7efd60 fffff802`f0f79d3a : 00000000`00000001 ffffc000`24c9d508 00000000`00000000 ffffe001`d434f320 : nt!KiBugCheckDispatch+0x69
ffffd001`8f7efea0 fffff802`f124b4b0 : 00000000`00000005 ffffc000`000006b7 ffffe001`00000030 00000000`00000030 : nt!KiPageFault+0x23a
ffffd001`8f7f0030 fffff802`f124a93c : ffffc000`1f628000 ffffe001`ce0588b8 ffffc000`1f628000 ffffd001`8f7f00f0 : nt!HvpDoAllocateCell+0xc4
ffffd001`8f7f00c0 fffff802`f124a30e : ffffc000`1f628000 00000000`00000000 ffffc000`208552b0 ffffd001`8f7f02d0 : nt!CmpAddValueKeyNew+0x4c
ffffd001`8f7f0120 fffff802`f124e065 : 01d5da88`fb08e0a0 ffffd001`8f7f0221 ffffc000`2b4c1008 00000000`00000000 : nt!CmpSetValueKeyNew+0x66
ffffd001`8f7f0160 fffff802`f124db9b : ffffc000`2939ce90 ffffd001`8f7f02d0 ffffc000`00000004 ffffd001`8f7f0750 : nt!CmSetValueKey+0x2f1
ffffd001`8f7f0270 fffff802`f0f7b1b3 : 00000000`00000001 00000000`00000012 ffffc000`1f67c460 ffffd001`8f7f04e0 : nt!NtSetValueKey+0x55f
ffffd001`8f7f0440 fffff802`f0f73600 : fffff802`f12332f8 00000000`00000004 ffffe001`d3718160 00000000`40000000 : nt!KiSystemServiceCopyEnd+0x13
ffffd001`8f7f0648 fffff802`f12332f8 : 00000000`00000004 ffffe001`d3718160 00000000`40000000 00000000`00000000 : nt!KiServiceLinkage
ffffd001`8f7f0650 fffff800`72d3b7d8 : 00000000`00000004 ffffd001`8f7f0770 ffffe001`00000000 00000000`00000000 : nt!RtlWriteRegistryValue+0x68
ffffd001`8f7f06b0 fffff800`7426d98d : ffffd001`8f7f07b0 fffff800`7447cc28 00000000`00000000 fffff800`74228fc6 : ndis!NdisWriteConfiguration+0x160
ffffd001`8f7f0710 ffffd001`8f7f07b0 : fffff800`7447cc28 00000000`00000000 fffff800`74228fc6 ffffe001`001801a9 : netr28x+0x4b98d
ffffd001`8f7f0718 fffff800`7447cc28 : 00000000`00000000 fffff800`74228fc6 ffffe001`001801a9 ffffe001`d1e591a0 : 0xffffd001`8f7f07b0
ffffd001`8f7f0720 00000000`00000000 : fffff800`74228fc6 ffffe001`001801a9 ffffe001`d1e591a0 ffffe001`00000000 : netr28x+0x25ac28


THREAD_SHA1_HASH_MOD_FUNC:  22955341d8abb05b401bd49818eceb67e2f7827a

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  00663051a00996a7d05651ec0ff70613b5ef291f

THREAD_SHA1_HASH_MOD:  d0eb6a1f61014958f024b7745f0b6539ef5d47ac

FOLLOWUP_IP:
netr28x+4b98d
fffff800`7426d98d ??              ???

SYMBOL_STACK_INDEX:  c

SYMBOL_NAME:  netr28x+4b98d

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: netr28x

IMAGE_NAME:  netr28x.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  5534d37a

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  4b98d

FAILURE_BUCKET_ID:  AV_netr28x!unknown_function

BUCKET_ID:  AV_netr28x!unknown_function

PRIMARY_PROBLEM_CLASS:  AV_netr28x!unknown_function

TARGET_TIME:  2020-02-03T11:56:33.000Z

OSBUILD:  9600

OSSERVICEPACK:  17415

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  784

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8.1

OSEDITION:  Windows 8.1 WinNt TerminalServer SingleUserTS Personal

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  2014-10-29 03:38:48

BUILDDATESTAMP_STR:  141028-1500

BUILDLAB_STR:  winblue_r4

BUILDOSVER_STR:  6.3.9600.17415.amd64fre.winblue_r4.141028-1500

ANALYSIS_SESSION_ELAPSED_TIME:  c98

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:av_netr28x!unknown_function

FAILURE_ID_HASH:  {b1e18842-140d-7b42-6e48-eab659769c49}

Followup:     MachineOwner
---------
 
Son düzenleme:
Çözüm
Ralink ağ adaptörü problem çıkartıyor, sürücüsünü kaldır Windows 8.1 için uyumlu bir sürücü kur.
Kod:
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffc00163f51998, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff802e30a15a8, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for netr28x.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  9600.17415.amd64fre.winblue_r4.141028-1500

SYSTEM_MANUFACTURER:  Hewlett-Packard

SYSTEM_PRODUCT_NAME:  HP ProBook 4540s

SYSTEM_SKU:  F0X25ES#ABV

SYSTEM_VERSION:  A1018C1100

BIOS_VENDOR:  Hewlett-Packard

BIOS_VERSION:  68IRR Ver. F.41

BIOS_DATE:  05/20/2013

BASEBOARD_MANUFACTURER:  Hewlett-Packard

BASEBOARD_PRODUCT:  17F6

BASEBOARD_VERSION:  KBC Version 58.1E

DUMP_TYPE:  2

BUGCHECK_P1: ffffc00163f51998

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff802e30a15a8

WRITE_ADDRESS: GetUlongPtrFromAddress: unable to read from fffff802e2fd8298
GetUlongPtrFromAddress: unable to read from fffff802e2fd8520
ffffc00163f51998 Paged pool

CURRENT_IRQL:  2

FAULTING_IP:
nt!HvpDoAllocateCell+1bc
fffff802`e30a15a8 8903            mov     dword ptr [rbx],eax

CPU_COUNT: 4

CPU_MHZ: 95b

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 3a

CPU_STEPPING: 9

CPU_MICROCODE: 6,3a,9,0 (F,M,S,R)  SIG: 1B'00000000 (cache) 1B'00000000 (init)

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  AV

PROCESS_NAME:  System

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  02-04-2020 19:25:01.0093

ANALYSIS_VERSION: 10.0.18362.1 x86fre

TRAP_FRAME:  ffffd00124fbbea0 -- (.trap 0xffffd00124fbbea0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000ffffffd0 rbx=0000000000000000 rcx=0000000000000005
rdx=00000000ffffffff rsi=0000000000000000 rdi=0000000000000000
rip=fffff802e30a15a8 rsp=ffffd00124fbc030 rbp=00000000ffffffff
r8=ffffc00163429b40  r9=ffffc00163429c30 r10=ffffffffffffffff
r11=00000000ffffffff r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe cy
nt!HvpDoAllocateCell+0x1bc:
fffff802`e30a15a8 8903            mov     dword ptr [rbx],eax ds:00000000`00000000=????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff802e2dd14e9 to fffff802e2dc59a0

STACK_TEXT:
ffffd001`24fbbd58 fffff802`e2dd14e9 : 00000000`0000000a ffffc001`63f51998 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffffd001`24fbbd60 fffff802`e2dcfd3a : 00000000`00000001 ffffc001`63f51998 00000000`00000000 00000000`0000000a : nt!KiBugCheckDispatch+0x69
ffffd001`24fbbea0 fffff802`e30a15a8 : ffffc001`63f51998 00000000`00000030 ffffe001`00000030 00000000`00000030 : nt!KiPageFault+0x23a
ffffd001`24fbc030 fffff802`e30a093c : ffffc001`63428000 ffffe001`26354418 ffffc001`63428000 ffffd001`24fbc0f0 : nt!HvpDoAllocateCell+0x1bc
ffffd001`24fbc0c0 fffff802`e30a030e : ffffc001`63428000 00000000`00000000 ffffc001`645d22b0 ffffd001`24fbc2d0 : nt!CmpAddValueKeyNew+0x4c
ffffd001`24fbc120 fffff802`e30a4065 : 01d5da00`6d46a8d6 ffffd001`24fbc221 ffffc001`7084d380 00000000`00000000 : nt!CmpSetValueKeyNew+0x66
ffffd001`24fbc160 fffff802`e30a3b9b : ffffc001`6f437e10 ffffd001`24fbc2d0 ffffc001`00000004 ffffd001`24fbc750 : nt!CmSetValueKey+0x2f1
ffffd001`24fbc270 fffff802`e2dd11b3 : 00000000`00000001 00000000`00000012 ffffc001`6347b700 ffffd001`24fbc4e0 : nt!NtSetValueKey+0x55f
ffffd001`24fbc440 fffff802`e2dc9600 : fffff802`e30892f8 00000000`00000004 ffffe001`2dc99210 00000000`40000000 : nt!KiSystemServiceCopyEnd+0x13
ffffd001`24fbc648 fffff802`e30892f8 : 00000000`00000004 ffffe001`2dc99210 00000000`40000000 00000000`00000000 : nt!KiServiceLinkage
ffffd001`24fbc650 fffff800`ef5bc7d8 : 00000000`00000004 ffffd001`24fbc770 00000000`00000000 00000000`00000000 : nt!RtlWriteRegistryValue+0x68
ffffd001`24fbc6b0 fffff800`f08ce98d : ffffd001`24fbc7b0 fffff800`f0addc28 00000000`00000000 fffff800`f0961e51 : ndis!NdisWriteConfiguration+0x160
ffffd001`24fbc710 ffffd001`24fbc7b0 : fffff800`f0addc28 00000000`00000000 fffff800`f0961e51 ffffd001`001801a9 : netr28x+0x4b98d
ffffd001`24fbc718 fffff800`f0addc28 : 00000000`00000000 fffff800`f0961e51 ffffd001`001801a9 ffffe001`2a0081a0 : 0xffffd001`24fbc7b0
ffffd001`24fbc720 00000000`00000000 : fffff800`f0961e51 ffffd001`001801a9 ffffe001`2a0081a0 fffff800`00000000 : netr28x+0x25ac28


THREAD_SHA1_HASH_MOD_FUNC:  22955341d8abb05b401bd49818eceb67e2f7827a

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  d566e3f7b9be6f17dd7d2a068bf0708e2a48ecbd

THREAD_SHA1_HASH_MOD:  d0eb6a1f61014958f024b7745f0b6539ef5d47ac

FOLLOWUP_IP:
netr28x+4b98d
fffff800`f08ce98d ??              ???

SYMBOL_STACK_INDEX:  c

SYMBOL_NAME:  netr28x+4b98d

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: netr28x

IMAGE_NAME:  netr28x.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  5534d37a

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  4b98d

FAILURE_BUCKET_ID:  AV_netr28x!unknown_function

BUCKET_ID:  AV_netr28x!unknown_function

PRIMARY_PROBLEM_CLASS:  AV_netr28x!unknown_function

TARGET_TIME:  2020-02-02T19:39:04.000Z

OSBUILD:  9600

OSSERVICEPACK:  17415

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  784

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8.1

OSEDITION:  Windows 8.1 WinNt TerminalServer SingleUserTS Personal

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  2014-10-29 03:38:48

BUILDDATESTAMP_STR:  141028-1500

BUILDLAB_STR:  winblue_r4

BUILDOSVER_STR:  6.3.9600.17415.amd64fre.winblue_r4.141028-1500

ANALYSIS_SESSION_ELAPSED_TIME:  12db

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:av_netr28x!unknown_function

FAILURE_ID_HASH:  {b1e18842-140d-7b42-6e48-eab659769c49}

Followup:     MachineOwner
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffc00166672e28, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8009dea24b0, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for netr28x.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  9600.17415.amd64fre.winblue_r4.141028-1500

SYSTEM_MANUFACTURER:  Hewlett-Packard

SYSTEM_PRODUCT_NAME:  HP ProBook 4540s

SYSTEM_SKU:  F0X25ES#ABV

SYSTEM_VERSION:  A1018C1100

BIOS_VENDOR:  Hewlett-Packard

BIOS_VERSION:  68IRR Ver. F.41

BIOS_DATE:  05/20/2013

BASEBOARD_MANUFACTURER:  Hewlett-Packard

BASEBOARD_PRODUCT:  17F6

BASEBOARD_VERSION:  KBC Version 58.1E

DUMP_TYPE:  2

BUGCHECK_P1: ffffc00166672e28

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff8009dea24b0

WRITE_ADDRESS: GetUlongPtrFromAddress: unable to read from fffff8009ddd9298
GetUlongPtrFromAddress: unable to read from fffff8009ddd9520
ffffc00166672e28 Paged pool

CURRENT_IRQL:  2

FAULTING_IP:
nt!HvpDoAllocateCell+c4
fffff800`9dea24b0 892c1e          mov     dword ptr [rsi+rbx],ebp

CPU_COUNT: 4

CPU_MHZ: 95b

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 3a

CPU_STEPPING: 9

CPU_MICROCODE: 6,3a,9,0 (F,M,S,R)  SIG: 1B'00000000 (cache) 1B'00000000 (init)

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  AV

PROCESS_NAME:  System

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  02-04-2020 19:25:03.0470

ANALYSIS_VERSION: 10.0.18362.1 x86fre

TRAP_FRAME:  ffffd000c5befea0 -- (.trap 0xffffd000c5befea0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000038 rbx=0000000000000000 rcx=0000000000000001
rdx=ffffd000c5befea0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8009dea24b0 rsp=ffffd000c5bf0030 rbp=00000000000001d8
r8=0000000000000208  r9=0000000000000000 r10=fffff78000000008
r11=ffffd000c5bf0120 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
nt!HvpDoAllocateCell+0xc4:
fffff800`9dea24b0 892c1e          mov     dword ptr [rsi+rbx],ebp ds:00000000`00000000=????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff8009dbd24e9 to fffff8009dbc69a0

STACK_TEXT:
ffffd000`c5befd58 fffff800`9dbd24e9 : 00000000`0000000a ffffc001`66672e28 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffffd000`c5befd60 fffff800`9dbd0d3a : 00000000`00000001 ffffc001`66672df8 00000000`00000000 ffffffff`da3dc980 : nt!KiBugCheckDispatch+0x69
ffffd000`c5befea0 fffff800`9dea24b0 : 00000000`00000005 ffffc001`0000078c ffffe001`00000030 00000000`00000030 : nt!KiPageFault+0x23a
ffffd000`c5bf0030 fffff800`9dea193c : ffffc001`64828000 ffffe001`f8f55048 ffffc001`64828000 ffffd000`c5bf00f0 : nt!HvpDoAllocateCell+0xc4
ffffd000`c5bf00c0 fffff800`9dea130e : ffffc001`64828000 00000000`00000000 ffffc001`658812b0 ffffd000`c5bf02d0 : nt!CmpAddValueKeyNew+0x4c
ffffd000`c5bf0120 fffff800`9dea5065 : 01d5da91`3a0a927c ffffd000`c5bf0221 ffffc001`6f1de4a8 00000000`00000000 : nt!CmpSetValueKeyNew+0x66
ffffd000`c5bf0160 fffff800`9dea4b9b : ffffc001`6f58efa0 ffffd000`c5bf02d0 ffffc001`00000004 ffffd000`c5bf0750 : nt!CmSetValueKey+0x2f1
ffffd000`c5bf0270 fffff800`9dbd21b3 : 00000000`00000001 00000000`00000012 ffffc001`64898010 ffffd000`c5bf04e0 : nt!NtSetValueKey+0x55f
ffffd000`c5bf0440 fffff800`9dbca600 : fffff800`9de8a2f8 00000000`00000004 ffffe001`fccd3930 00000000`40000000 : nt!KiSystemServiceCopyEnd+0x13
ffffd000`c5bf0648 fffff800`9de8a2f8 : 00000000`00000004 ffffe001`fccd3930 00000000`40000000 00000000`00000000 : nt!KiServiceLinkage
ffffd000`c5bf0650 fffff801`91f9c7d8 : 00000000`00000004 ffffd000`c5bf0770 ffffe001`00000000 00000000`00000000 : nt!RtlWriteRegistryValue+0x68
ffffd000`c5bf06b0 fffff801`932b598d : ffffd000`c5bf07b0 fffff801`934c4c28 00000000`00000000 fffff801`93270fc6 : ndis!NdisWriteConfiguration+0x160
ffffd000`c5bf0710 ffffd000`c5bf07b0 : fffff801`934c4c28 00000000`00000000 fffff801`93270fc6 ffffe001`001801a9 : netr28x+0x4b98d
ffffd000`c5bf0718 fffff801`934c4c28 : 00000000`00000000 fffff801`93270fc6 ffffe001`001801a9 ffffe001`fccc51a0 : 0xffffd000`c5bf07b0
ffffd000`c5bf0720 00000000`00000000 : fffff801`93270fc6 ffffe001`001801a9 ffffe001`fccc51a0 ffffe001`00000000 : netr28x+0x25ac28


THREAD_SHA1_HASH_MOD_FUNC:  22955341d8abb05b401bd49818eceb67e2f7827a

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  00663051a00996a7d05651ec0ff70613b5ef291f

THREAD_SHA1_HASH_MOD:  d0eb6a1f61014958f024b7745f0b6539ef5d47ac

FOLLOWUP_IP:
netr28x+4b98d
fffff801`932b598d ??              ???

SYMBOL_STACK_INDEX:  c

SYMBOL_NAME:  netr28x+4b98d

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: netr28x

IMAGE_NAME:  netr28x.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  5534d37a

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  4b98d

FAILURE_BUCKET_ID:  AV_netr28x!unknown_function

BUCKET_ID:  AV_netr28x!unknown_function

PRIMARY_PROBLEM_CLASS:  AV_netr28x!unknown_function

TARGET_TIME:  2020-02-03T12:55:35.000Z

OSBUILD:  9600

OSSERVICEPACK:  17415

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  784

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8.1

OSEDITION:  Windows 8.1 WinNt TerminalServer SingleUserTS Personal

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  2014-10-29 03:38:48

BUILDDATESTAMP_STR:  141028-1500

BUILDLAB_STR:  winblue_r4

BUILDOSVER_STR:  6.3.9600.17415.amd64fre.winblue_r4.141028-1500

ANALYSIS_SESSION_ELAPSED_TIME:  cc2

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:av_netr28x!unknown_function

FAILURE_ID_HASH:  {b1e18842-140d-7b42-6e48-eab659769c49}

Followup:     MachineOwner
---------
INVALID_PROCESS_ATTACH_ATTEMPT (5)
Arguments:
Arg1: ffffe0009d253900
Arg2: ffffe000a37e4900
Arg3: 0000000000000000
Arg4: 0000000000000001

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for netr28x.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  9600.17415.amd64fre.winblue_r4.141028-1500

SYSTEM_MANUFACTURER:  Hewlett-Packard

SYSTEM_PRODUCT_NAME:  HP ProBook 4540s

SYSTEM_SKU:  F0X25ES#ABV

SYSTEM_VERSION:  A1018C1100

BIOS_VENDOR:  Hewlett-Packard

BIOS_VERSION:  68IRR Ver. F.41

BIOS_DATE:  05/20/2013

BASEBOARD_MANUFACTURER:  Hewlett-Packard

BASEBOARD_PRODUCT:  17F6

BASEBOARD_VERSION:  KBC Version 58.1E

DUMP_TYPE:  2

BUGCHECK_P1: ffffe0009d253900

BUGCHECK_P2: ffffe000a37e4900

BUGCHECK_P3: 0

BUGCHECK_P4: 1

CPU_COUNT: 4

CPU_MHZ: 95b

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 3a

CPU_STEPPING: 9

CPU_MICROCODE: 6,3a,9,0 (F,M,S,R)  SIG: 1B'00000000 (cache) 1B'00000000 (init)

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  0x5

PROCESS_NAME:  Steam.exe

CURRENT_IRQL:  2

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  02-04-2020 19:25:07.0647

ANALYSIS_VERSION: 10.0.18362.1 x86fre

DPC_STACK_BASE:  FFFFD00076FF7FB0

LAST_CONTROL_TRANSFER:  from fffff801416186da to fffff801415dc9a0

STACK_TEXT:
ffffd000`76ff7008 fffff801`416186da : 00000000`00000005 ffffe000`9d253900 ffffe000`a37e4900 00000000`00000000 : nt!KeBugCheckEx
ffffd000`76ff7010 fffff801`418ca5bb : ffffe000`9d3545e0 ffffd000`76ff7119 00000000`00000000 00000000`00000041 : nt! ?? ::FNODOBFM::`string'+0x2b82a
ffffd000`76ff7060 fffff801`415e81b3 : ffffd000`76ff7384 ffffd000`76ff75c4 ffffd000`76ff76e0 ffffe000`9e7a1630 : nt!NtClose+0x3db
ffffd000`76ff7180 fffff801`415e0600 : fffff801`418dafbf ffffc000`5be8fdf0 00000000`00000000 ffffd000`76ff7420 : nt!KiSystemServiceCopyEnd+0x13
ffffd000`76ff7318 fffff801`418dafbf : ffffc000`5be8fdf0 00000000`00000000 ffffd000`76ff7420 ffffd000`76ff75c4 : nt!KiServiceLinkage
ffffd000`76ff7320 fffff801`418d9625 : ffffe000`a2bc0161 00000000`00000003 00000000`00000001 ffffd000`76ff75c0 : nt!CmGetDeviceRegPropWorker+0x1e3
ffffd000`76ff7470 fffff801`4192e455 : ffffe000`a3c52200 00000000`00000000 ffffe000`a2fd2010 00000000`00000002 : nt!CmGetDeviceRegProp+0xf9
ffffd000`76ff7580 fffff801`4192e300 : 00000000`00000000 ffffe000`a123d7d0 00000000`00000000 00000000`00000000 : nt!CmGetDeviceSoftwareKey+0x6d
ffffd000`76ff7690 fffff801`418da29b : 00000000`0000003f 00000000`00000012 00000000`00000012 00000000`00000000 : nt!CmGetDeviceSoftwareKeyPath+0x4c
ffffd000`76ff7770 fffff801`418d9e9f : 00000000`00000000 ffffd000`76ff7830 ffffc000`5be8fdf0 ffffe000`00000000 : nt!CmGetDeviceRegKeyPath+0x123
ffffd000`76ff77c0 fffff801`418d94eb : ffffe000`a2a3f1a0 ffffe000`9e7a1630 00000000`00000001 00000000`c0000120 : nt!CmOpenDeviceRegKeyWorker+0x9f
ffffd000`76ff7860 fffff801`4192b2f7 : 00000000`00000002 00000000`00000012 00000000`c2000000 ffffe000`a2a3f1a0 : nt!CmOpenDeviceRegKey+0xdb
ffffd000`76ff7960 fffff800`63cf8621 : ffffe000`a2a3f180 00000000`00000000 ffffd000`76ff7a60 ffffe000`9d2d9da0 : nt!IoOpenDeviceRegistryKey+0xbb
ffffd000`76ff79b0 fffff800`63cf840c : ffffd000`76ff7b00 ffffd000`76ff7a30 ffffd000`76ff7ad8 ffffe000`a10de1a0 : ndis!NdisOpenConfiguration+0xa1
ffffd000`76ff79e0 fffff800`6530094f : 00000000`00000000 ffffd000`76ff7b00 00000000`00000000 fffff800`65393e51 : ndis!NdisOpenConfigurationEx+0xb0
ffffd000`76ff7a60 00000000`00000000 : ffffd000`76ff7b00 00000000`00000000 fffff800`65393e51 00000001`001801a9 : netr28x+0x4b94f


THREAD_SHA1_HASH_MOD_FUNC:  a853edfda1fb7a5ed32d2337b134958b15615a0f

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  66a01394e0907a86783e891512c3e1ca5d86e78c

THREAD_SHA1_HASH_MOD:  fa0c2be74be916a0b1322731a8c4c3632a6d3119

FOLLOWUP_IP:
netr28x+4b94f
fffff800`6530094f ??              ???

SYMBOL_STACK_INDEX:  f

SYMBOL_NAME:  netr28x+4b94f

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: netr28x

IMAGE_NAME:  netr28x.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  5534d37a

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  4b94f

FAILURE_BUCKET_ID:  0x5_netr28x!unknown_function

BUCKET_ID:  0x5_netr28x!unknown_function

PRIMARY_PROBLEM_CLASS:  0x5_netr28x!unknown_function

TARGET_TIME:  2020-02-03T18:55:14.000Z

OSBUILD:  9600

OSSERVICEPACK:  17415

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  784

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8.1

OSEDITION:  Windows 8.1 WinNt TerminalServer SingleUserTS Personal

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  2014-10-29 03:38:48

BUILDDATESTAMP_STR:  141028-1500

BUILDLAB_STR:  winblue_r4

BUILDOSVER_STR:  6.3.9600.17415.amd64fre.winblue_r4.141028-1500

ANALYSIS_SESSION_ELAPSED_TIME:  c69

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x5_netr28x!unknown_function

FAILURE_ID_HASH:  {0a19e2eb-42cd-b574-1749-ac631b1c739d}

Followup:     MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffc001bde87538, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff801566404b0, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for netr28x.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  9600.17415.amd64fre.winblue_r4.141028-1500

SYSTEM_MANUFACTURER:  Hewlett-Packard

SYSTEM_PRODUCT_NAME:  HP ProBook 4540s

SYSTEM_SKU:  F0X25ES#ABV

SYSTEM_VERSION:  A1018C1100

BIOS_VENDOR:  Hewlett-Packard

BIOS_VERSION:  68IRR Ver. F.41

BIOS_DATE:  05/20/2013

BASEBOARD_MANUFACTURER:  Hewlett-Packard

BASEBOARD_PRODUCT:  17F6

BASEBOARD_VERSION:  KBC Version 58.1E

DUMP_TYPE:  2

BUGCHECK_P1: ffffc001bde87538

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff801566404b0

WRITE_ADDRESS: GetUlongPtrFromAddress: unable to read from fffff80156577298
GetUlongPtrFromAddress: unable to read from fffff80156577520
ffffc001bde87538 Paged pool

CURRENT_IRQL:  2

FAULTING_IP:
nt!HvpDoAllocateCell+c4
fffff801`566404b0 892c1e          mov     dword ptr [rsi+rbx],ebp

CPU_COUNT: 4

CPU_MHZ: 95b

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 3a

CPU_STEPPING: 9

CPU_MICROCODE: 6,3a,9,0 (F,M,S,R)  SIG: 1B'00000000 (cache) 1B'00000000 (init)

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  AV

PROCESS_NAME:  System

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  02-04-2020 19:25:11.0532

ANALYSIS_VERSION: 10.0.18362.1 x86fre

TRAP_FRAME:  ffffd000ff66bea0 -- (.trap 0xffffd000ff66bea0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000038 rbx=0000000000000000 rcx=0000000000000001
rdx=ffffd000ff66bea0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff801566404b0 rsp=ffffd000ff66c030 rbp=00000000000000c0
r8=00000000000000f0  r9=0000000000000000 r10=0000000000000000
r11=ffffd000ff66c120 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
nt!HvpDoAllocateCell+0xc4:
fffff801`566404b0 892c1e          mov     dword ptr [rsi+rbx],ebp ds:00000000`00000000=????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff801563704e9 to fffff801563649a0

STACK_TEXT:
ffffd000`ff66bd58 fffff801`563704e9 : 00000000`0000000a ffffc001`bde87538 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffffd000`ff66bd60 fffff801`5636ed3a : 00000000`00000001 ffffc001`bde87508 00000000`00000000 ffffe001`f35be220 : nt!KiBugCheckDispatch+0x69
ffffd000`ff66bea0 fffff801`566404b0 : 00000000`00000005 ffffc001`000006b7 ffffe001`00000030 00000000`00000030 : nt!KiPageFault+0x23a
ffffd000`ff66c030 fffff801`5663f93c : ffffc001`b8a28000 ffffe001`ecd55048 ffffc001`b8a28000 ffffd000`ff66c0f0 : nt!HvpDoAllocateCell+0xc4
ffffd000`ff66c0c0 fffff801`5663f30e : ffffc001`b8a28000 00000000`00000000 ffffc001`b99832b0 ffffd000`ff66c2d0 : nt!CmpAddValueKeyNew+0x4c
ffffd000`ff66c120 fffff801`56643065 : 01d5da8a`21485003 ffffd000`ff66c221 ffffc001`c27e4a70 00000000`00000000 : nt!CmpSetValueKeyNew+0x66
ffffd000`ff66c160 fffff801`56642b9b : ffffc001`c275b960 ffffd000`ff66c2d0 ffffc001`00000004 ffffd000`ff66c750 : nt!CmSetValueKey+0x2f1
ffffd000`ff66c270 fffff801`563701b3 : 00000000`00000001 00000000`00000012 ffffc001`b8a7dce0 ffffd000`ff66c4e0 : nt!NtSetValueKey+0x55f
ffffd000`ff66c440 fffff801`56368600 : fffff801`566282f8 00000000`00000004 ffffe001`f3844240 00000000`40000000 : nt!KiSystemServiceCopyEnd+0x13
ffffd000`ff66c648 fffff801`566282f8 : 00000000`00000004 ffffe001`f3844240 00000000`40000000 00000000`00000000 : nt!KiServiceLinkage
ffffd000`ff66c650 fffff800`e7d7f7d8 : 00000000`00000004 ffffd000`ff66c770 00000000`00000000 00000000`00000000 : nt!RtlWriteRegistryValue+0x68
ffffd000`ff66c6b0 fffff800`e932498d : ffffd000`ff66c7b0 fffff800`e9533c28 00000000`00000000 fffff801`56350fb8 : ndis!NdisWriteConfiguration+0x160
ffffd000`ff66c710 ffffd000`ff66c7b0 : fffff800`e9533c28 00000000`00000000 fffff801`56350fb8 00000000`001801a9 : netr28x+0x4b98d
ffffd000`ff66c718 fffff800`e9533c28 : 00000000`00000000 fffff801`56350fb8 00000000`001801a9 ffffe001`f0b991a0 : 0xffffd000`ff66c7b0
ffffd000`ff66c720 00000000`00000000 : fffff801`56350fb8 00000000`001801a9 ffffe001`f0b991a0 00000000`00000000 : netr28x+0x25ac28


THREAD_SHA1_HASH_MOD_FUNC:  22955341d8abb05b401bd49818eceb67e2f7827a

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  00663051a00996a7d05651ec0ff70613b5ef291f

THREAD_SHA1_HASH_MOD:  d0eb6a1f61014958f024b7745f0b6539ef5d47ac

FOLLOWUP_IP:
netr28x+4b98d
fffff800`e932498d ??              ???

SYMBOL_STACK_INDEX:  c

SYMBOL_NAME:  netr28x+4b98d

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: netr28x

IMAGE_NAME:  netr28x.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  5534d37a

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  4b98d

FAILURE_BUCKET_ID:  AV_netr28x!unknown_function

BUCKET_ID:  AV_netr28x!unknown_function

PRIMARY_PROBLEM_CLASS:  AV_netr28x!unknown_function

TARGET_TIME:  2020-02-03T12:04:47.000Z

OSBUILD:  9600

OSSERVICEPACK:  17415

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  784

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8.1

OSEDITION:  Windows 8.1 WinNt TerminalServer SingleUserTS Personal

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  2014-10-29 03:38:48

BUILDDATESTAMP_STR:  141028-1500

BUILDLAB_STR:  winblue_r4

BUILDOSVER_STR:  6.3.9600.17415.amd64fre.winblue_r4.141028-1500

ANALYSIS_SESSION_ELAPSED_TIME:  cae

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:av_netr28x!unknown_function

FAILURE_ID_HASH:  {b1e18842-140d-7b42-6e48-eab659769c49}

Followup:     MachineOwner
---------


IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffc000a95bdb50, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8026d42d4b0, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for netr28x.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  9600.17415.amd64fre.winblue_r4.141028-1500

SYSTEM_MANUFACTURER:  Hewlett-Packard

SYSTEM_PRODUCT_NAME:  HP ProBook 4540s

SYSTEM_SKU:  F0X25ES#ABV

SYSTEM_VERSION:  A1018C1100

BIOS_VENDOR:  Hewlett-Packard

BIOS_VERSION:  68IRR Ver. F.41

BIOS_DATE:  05/20/2013

BASEBOARD_MANUFACTURER:  Hewlett-Packard

BASEBOARD_PRODUCT:  17F6

BASEBOARD_VERSION:  KBC Version 58.1E

DUMP_TYPE:  2

BUGCHECK_P1: ffffc000a95bdb50

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff8026d42d4b0

WRITE_ADDRESS: GetUlongPtrFromAddress: unable to read from fffff8026d364298
GetUlongPtrFromAddress: unable to read from fffff8026d364520
ffffc000a95bdb50 Paged pool

CURRENT_IRQL:  2

FAULTING_IP:
nt!HvpDoAllocateCell+c4
fffff802`6d42d4b0 892c1e          mov     dword ptr [rsi+rbx],ebp

CPU_COUNT: 4

CPU_MHZ: 95b

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 3a

CPU_STEPPING: 9

CPU_MICROCODE: 6,3a,9,0 (F,M,S,R)  SIG: 1B'00000000 (cache) 1B'00000000 (init)

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  AV

PROCESS_NAME:  System

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  02-04-2020 19:25:15.0050

ANALYSIS_VERSION: 10.0.18362.1 x86fre

TRAP_FRAME:  ffffd0008fc6bea0 -- (.trap 0xffffd0008fc6bea0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000038 rbx=0000000000000000 rcx=0000000000000001
rdx=ffffd0008fc6bea0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8026d42d4b0 rsp=ffffd0008fc6c030 rbp=00000000000000f8
r8=0000000000000128  r9=0000000000000000 r10=fffff78000000008
r11=ffffd0008fc6c120 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
nt!HvpDoAllocateCell+0xc4:
fffff802`6d42d4b0 892c1e          mov     dword ptr [rsi+rbx],ebp ds:00000000`00000000=????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff8026d15d4e9 to fffff8026d1519a0

STACK_TEXT:
ffffd000`8fc6bd58 fffff802`6d15d4e9 : 00000000`0000000a ffffc000`a95bdb50 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffffd000`8fc6bd60 fffff802`6d15bd3a : 00000000`00000001 ffffc000`a95bdb20 00000000`00000000 ffffffff`da3dc980 : nt!KiBugCheckDispatch+0x69
ffffd000`8fc6bea0 fffff802`6d42d4b0 : 00000000`00000005 ffffc000`0000089f ffffe001`00000030 00000000`00000030 : nt!KiPageFault+0x23a
ffffd000`8fc6c030 fffff802`6d42c93c : ffffc000`a9228000 ffffe001`1fe5a048 ffffc000`a9228000 ffffd000`8fc6c0f0 : nt!HvpDoAllocateCell+0xc4
ffffd000`8fc6c0c0 fffff802`6d42c30e : ffffc000`a9228000 00000000`00000000 ffffc000`aad002b0 ffffd000`8fc6c2d0 : nt!CmpAddValueKeyNew+0x4c
ffffd000`8fc6c120 fffff802`6d430065 : 01d5dabf`670d87e2 ffffd000`8fc6c221 ffffc000`bf61e008 00000000`00000000 : nt!CmpSetValueKeyNew+0x66
ffffd000`8fc6c160 fffff802`6d42fb9b : ffffc000`b88929f0 ffffd000`8fc6c2d0 ffffc000`00000004 ffffd000`8fc6c750 : nt!CmSetValueKey+0x2f1
ffffd000`8fc6c270 fffff802`6d15d1b3 : 00000000`00000001 00000000`00000012 ffffc000`a928d780 ffffd000`8fc6c4e0 : nt!NtSetValueKey+0x55f
ffffd000`8fc6c440 fffff802`6d155600 : fffff802`6d4152f8 00000000`00000004 ffffe001`2713a3d0 00000000`40000000 : nt!KiSystemServiceCopyEnd+0x13
ffffd000`8fc6c648 fffff802`6d4152f8 : 00000000`00000004 ffffe001`2713a3d0 00000000`40000000 00000000`00000000 : nt!KiServiceLinkage
ffffd000`8fc6c650 fffff801`43da47d8 : 00000000`00000004 ffffd000`8fc6c770 00000000`00000000 00000000`00000000 : nt!RtlWriteRegistryValue+0x68
ffffd000`8fc6c6b0 fffff801`4532498d : ffffd000`8fc6c7b0 fffff801`45533c28 00000000`00000000 ffffe001`2434d968 : ndis!NdisWriteConfiguration+0x160
ffffd000`8fc6c710 ffffd000`8fc6c7b0 : fffff801`45533c28 00000000`00000000 ffffe001`2434d968 00000000`001801a9 : netr28x+0x4b98d
ffffd000`8fc6c718 fffff801`45533c28 : 00000000`00000000 ffffe001`2434d968 00000000`001801a9 ffffe001`23df81a0 : 0xffffd000`8fc6c7b0
ffffd000`8fc6c720 00000000`00000000 : ffffe001`2434d968 00000000`001801a9 ffffe001`23df81a0 ffffe001`00000000 : netr28x+0x25ac28


THREAD_SHA1_HASH_MOD_FUNC:  22955341d8abb05b401bd49818eceb67e2f7827a

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  00663051a00996a7d05651ec0ff70613b5ef291f

THREAD_SHA1_HASH_MOD:  d0eb6a1f61014958f024b7745f0b6539ef5d47ac

FOLLOWUP_IP:
netr28x+4b98d
fffff801`4532498d ??              ???

SYMBOL_STACK_INDEX:  c

SYMBOL_NAME:  netr28x+4b98d

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: netr28x

IMAGE_NAME:  netr28x.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  5534d37a

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  4b98d

FAILURE_BUCKET_ID:  AV_netr28x!unknown_function

BUCKET_ID:  AV_netr28x!unknown_function

PRIMARY_PROBLEM_CLASS:  AV_netr28x!unknown_function

TARGET_TIME:  2020-02-03T18:26:07.000Z

OSBUILD:  9600

OSSERVICEPACK:  17415

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  784

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8.1

OSEDITION:  Windows 8.1 WinNt TerminalServer SingleUserTS Personal

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  2014-10-29 03:38:48

BUILDDATESTAMP_STR:  141028-1500

BUILDLAB_STR:  winblue_r4

BUILDOSVER_STR:  6.3.9600.17415.amd64fre.winblue_r4.141028-1500

ANALYSIS_SESSION_ELAPSED_TIME:  c88

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:av_netr28x!unknown_function

FAILURE_ID_HASH:  {b1e18842-140d-7b42-6e48-eab659769c49}

Followup:     MachineOwner
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffc00024c9d538, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff802f124b4b0, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for netr28x.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  9600.17415.amd64fre.winblue_r4.141028-1500

SYSTEM_MANUFACTURER:  Hewlett-Packard

SYSTEM_PRODUCT_NAME:  HP ProBook 4540s

SYSTEM_SKU:  F0X25ES#ABV

SYSTEM_VERSION:  A1018C1100

BIOS_VENDOR:  Hewlett-Packard

BIOS_VERSION:  68IRR Ver. F.41

BIOS_DATE:  05/20/2013

BASEBOARD_MANUFACTURER:  Hewlett-Packard

BASEBOARD_PRODUCT:  17F6

BASEBOARD_VERSION:  KBC Version 58.1E

DUMP_TYPE:  2

BUGCHECK_P1: ffffc00024c9d538

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff802f124b4b0

WRITE_ADDRESS: GetUlongPtrFromAddress: unable to read from fffff802f1182298
GetUlongPtrFromAddress: unable to read from fffff802f1182520
ffffc00024c9d538 Paged pool

CURRENT_IRQL:  2

FAULTING_IP:
nt!HvpDoAllocateCell+c4
fffff802`f124b4b0 892c1e          mov     dword ptr [rsi+rbx],ebp

CPU_COUNT: 4

CPU_MHZ: 95b

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 3a

CPU_STEPPING: 9

CPU_MICROCODE: 6,3a,9,0 (F,M,S,R)  SIG: 1B'00000000 (cache) 1B'00000000 (init)

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  AV

PROCESS_NAME:  System

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  02-04-2020 19:25:20.0258

ANALYSIS_VERSION: 10.0.18362.1 x86fre

TRAP_FRAME:  ffffd0018f7efea0 -- (.trap 0xffffd0018f7efea0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000038 rbx=0000000000000000 rcx=0000000000000001
rdx=ffffd0018f7efea0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff802f124b4b0 rsp=ffffd0018f7f0030 rbp=00000000000000c0
r8=00000000000000f0  r9=0000000000000000 r10=fffff78000000008
r11=ffffd0018f7f0120 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
nt!HvpDoAllocateCell+0xc4:
fffff802`f124b4b0 892c1e          mov     dword ptr [rsi+rbx],ebp ds:00000000`00000000=????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff802f0f7b4e9 to fffff802f0f6f9a0

STACK_TEXT:
ffffd001`8f7efd58 fffff802`f0f7b4e9 : 00000000`0000000a ffffc000`24c9d538 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffffd001`8f7efd60 fffff802`f0f79d3a : 00000000`00000001 ffffc000`24c9d508 00000000`00000000 ffffe001`d434f320 : nt!KiBugCheckDispatch+0x69
ffffd001`8f7efea0 fffff802`f124b4b0 : 00000000`00000005 ffffc000`000006b7 ffffe001`00000030 00000000`00000030 : nt!KiPageFault+0x23a
ffffd001`8f7f0030 fffff802`f124a93c : ffffc000`1f628000 ffffe001`ce0588b8 ffffc000`1f628000 ffffd001`8f7f00f0 : nt!HvpDoAllocateCell+0xc4
ffffd001`8f7f00c0 fffff802`f124a30e : ffffc000`1f628000 00000000`00000000 ffffc000`208552b0 ffffd001`8f7f02d0 : nt!CmpAddValueKeyNew+0x4c
ffffd001`8f7f0120 fffff802`f124e065 : 01d5da88`fb08e0a0 ffffd001`8f7f0221 ffffc000`2b4c1008 00000000`00000000 : nt!CmpSetValueKeyNew+0x66
ffffd001`8f7f0160 fffff802`f124db9b : ffffc000`2939ce90 ffffd001`8f7f02d0 ffffc000`00000004 ffffd001`8f7f0750 : nt!CmSetValueKey+0x2f1
ffffd001`8f7f0270 fffff802`f0f7b1b3 : 00000000`00000001 00000000`00000012 ffffc000`1f67c460 ffffd001`8f7f04e0 : nt!NtSetValueKey+0x55f
ffffd001`8f7f0440 fffff802`f0f73600 : fffff802`f12332f8 00000000`00000004 ffffe001`d3718160 00000000`40000000 : nt!KiSystemServiceCopyEnd+0x13
ffffd001`8f7f0648 fffff802`f12332f8 : 00000000`00000004 ffffe001`d3718160 00000000`40000000 00000000`00000000 : nt!KiServiceLinkage
ffffd001`8f7f0650 fffff800`72d3b7d8 : 00000000`00000004 ffffd001`8f7f0770 ffffe001`00000000 00000000`00000000 : nt!RtlWriteRegistryValue+0x68
ffffd001`8f7f06b0 fffff800`7426d98d : ffffd001`8f7f07b0 fffff800`7447cc28 00000000`00000000 fffff800`74228fc6 : ndis!NdisWriteConfiguration+0x160
ffffd001`8f7f0710 ffffd001`8f7f07b0 : fffff800`7447cc28 00000000`00000000 fffff800`74228fc6 ffffe001`001801a9 : netr28x+0x4b98d
ffffd001`8f7f0718 fffff800`7447cc28 : 00000000`00000000 fffff800`74228fc6 ffffe001`001801a9 ffffe001`d1e591a0 : 0xffffd001`8f7f07b0
ffffd001`8f7f0720 00000000`00000000 : fffff800`74228fc6 ffffe001`001801a9 ffffe001`d1e591a0 ffffe001`00000000 : netr28x+0x25ac28


THREAD_SHA1_HASH_MOD_FUNC:  22955341d8abb05b401bd49818eceb67e2f7827a

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  00663051a00996a7d05651ec0ff70613b5ef291f

THREAD_SHA1_HASH_MOD:  d0eb6a1f61014958f024b7745f0b6539ef5d47ac

FOLLOWUP_IP:
netr28x+4b98d
fffff800`7426d98d ??              ???

SYMBOL_STACK_INDEX:  c

SYMBOL_NAME:  netr28x+4b98d

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: netr28x

IMAGE_NAME:  netr28x.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  5534d37a

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  4b98d

FAILURE_BUCKET_ID:  AV_netr28x!unknown_function

BUCKET_ID:  AV_netr28x!unknown_function

PRIMARY_PROBLEM_CLASS:  AV_netr28x!unknown_function

TARGET_TIME:  2020-02-03T11:56:33.000Z

OSBUILD:  9600

OSSERVICEPACK:  17415

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  784

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8.1

OSEDITION:  Windows 8.1 WinNt TerminalServer SingleUserTS Personal

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  2014-10-29 03:38:48

BUILDDATESTAMP_STR:  141028-1500

BUILDLAB_STR:  winblue_r4

BUILDOSVER_STR:  6.3.9600.17415.amd64fre.winblue_r4.141028-1500

ANALYSIS_SESSION_ELAPSED_TIME:  c98

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:av_netr28x!unknown_function

FAILURE_ID_HASH:  {b1e18842-140d-7b42-6e48-eab659769c49}

Followup:     MachineOwner
---------
Meşgul edip yordum ama kusura bakma. Yardımcı olduğun için ve sorunumu çözdüğün için çok teşekkür ederim :D.
 
Son düzenleyen: Moderatör:
Uyarı! Bu konu 5 yıl önce açıldı.
Muhtemelen daha fazla tartışma gerekli değildir ki bu durumda yeni bir konu başlatmayı öneririz. Eğer yine de cevabınızın gerekli olduğunu düşünüyorsanız buna rağmen cevap verebilirsiniz.

Geri
Yukarı