IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffc00163f51998, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff802e30a15a8, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for netr28x.sys
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 9600.17415.amd64fre.winblue_r4.141028-1500
SYSTEM_MANUFACTURER: Hewlett-Packard
SYSTEM_PRODUCT_NAME: HP ProBook 4540s
SYSTEM_SKU: F0X25ES#ABV
SYSTEM_VERSION: A1018C1100
BIOS_VENDOR: Hewlett-Packard
BIOS_VERSION: 68IRR Ver. F.41
BIOS_DATE: 05/20/2013
BASEBOARD_MANUFACTURER: Hewlett-Packard
BASEBOARD_PRODUCT: 17F6
BASEBOARD_VERSION: KBC Version 58.1E
DUMP_TYPE: 2
BUGCHECK_P1: ffffc00163f51998
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff802e30a15a8
WRITE_ADDRESS: GetUlongPtrFromAddress: unable to read from fffff802e2fd8298
GetUlongPtrFromAddress: unable to read from fffff802e2fd8520
ffffc00163f51998 Paged pool
CURRENT_IRQL: 2
FAULTING_IP:
nt!HvpDoAllocateCell+1bc
fffff802`e30a15a8 8903 mov dword ptr [rbx],eax
CPU_COUNT: 4
CPU_MHZ: 95b
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 3a
CPU_STEPPING: 9
CPU_MICROCODE: 6,3a,9,0 (F,M,S,R) SIG: 1B'00000000 (cache) 1B'00000000 (init)
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: System
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 02-04-2020 19:25:01.0093
ANALYSIS_VERSION: 10.0.18362.1 x86fre
TRAP_FRAME: ffffd00124fbbea0 -- (.trap 0xffffd00124fbbea0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000ffffffd0 rbx=0000000000000000 rcx=0000000000000005
rdx=00000000ffffffff rsi=0000000000000000 rdi=0000000000000000
rip=fffff802e30a15a8 rsp=ffffd00124fbc030 rbp=00000000ffffffff
r8=ffffc00163429b40 r9=ffffc00163429c30 r10=ffffffffffffffff
r11=00000000ffffffff r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe cy
nt!HvpDoAllocateCell+0x1bc:
fffff802`e30a15a8 8903 mov dword ptr [rbx],eax ds:00000000`00000000=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff802e2dd14e9 to fffff802e2dc59a0
STACK_TEXT:
ffffd001`24fbbd58 fffff802`e2dd14e9 : 00000000`0000000a ffffc001`63f51998 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffffd001`24fbbd60 fffff802`e2dcfd3a : 00000000`00000001 ffffc001`63f51998 00000000`00000000 00000000`0000000a : nt!KiBugCheckDispatch+0x69
ffffd001`24fbbea0 fffff802`e30a15a8 : ffffc001`63f51998 00000000`00000030 ffffe001`00000030 00000000`00000030 : nt!KiPageFault+0x23a
ffffd001`24fbc030 fffff802`e30a093c : ffffc001`63428000 ffffe001`26354418 ffffc001`63428000 ffffd001`24fbc0f0 : nt!HvpDoAllocateCell+0x1bc
ffffd001`24fbc0c0 fffff802`e30a030e : ffffc001`63428000 00000000`00000000 ffffc001`645d22b0 ffffd001`24fbc2d0 : nt!CmpAddValueKeyNew+0x4c
ffffd001`24fbc120 fffff802`e30a4065 : 01d5da00`6d46a8d6 ffffd001`24fbc221 ffffc001`7084d380 00000000`00000000 : nt!CmpSetValueKeyNew+0x66
ffffd001`24fbc160 fffff802`e30a3b9b : ffffc001`6f437e10 ffffd001`24fbc2d0 ffffc001`00000004 ffffd001`24fbc750 : nt!CmSetValueKey+0x2f1
ffffd001`24fbc270 fffff802`e2dd11b3 : 00000000`00000001 00000000`00000012 ffffc001`6347b700 ffffd001`24fbc4e0 : nt!NtSetValueKey+0x55f
ffffd001`24fbc440 fffff802`e2dc9600 : fffff802`e30892f8 00000000`00000004 ffffe001`2dc99210 00000000`40000000 : nt!KiSystemServiceCopyEnd+0x13
ffffd001`24fbc648 fffff802`e30892f8 : 00000000`00000004 ffffe001`2dc99210 00000000`40000000 00000000`00000000 : nt!KiServiceLinkage
ffffd001`24fbc650 fffff800`ef5bc7d8 : 00000000`00000004 ffffd001`24fbc770 00000000`00000000 00000000`00000000 : nt!RtlWriteRegistryValue+0x68
ffffd001`24fbc6b0 fffff800`f08ce98d : ffffd001`24fbc7b0 fffff800`f0addc28 00000000`00000000 fffff800`f0961e51 : ndis!NdisWriteConfiguration+0x160
ffffd001`24fbc710 ffffd001`24fbc7b0 : fffff800`f0addc28 00000000`00000000 fffff800`f0961e51 ffffd001`001801a9 : netr28x+0x4b98d
ffffd001`24fbc718 fffff800`f0addc28 : 00000000`00000000 fffff800`f0961e51 ffffd001`001801a9 ffffe001`2a0081a0 : 0xffffd001`24fbc7b0
ffffd001`24fbc720 00000000`00000000 : fffff800`f0961e51 ffffd001`001801a9 ffffe001`2a0081a0 fffff800`00000000 : netr28x+0x25ac28
THREAD_SHA1_HASH_MOD_FUNC: 22955341d8abb05b401bd49818eceb67e2f7827a
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: d566e3f7b9be6f17dd7d2a068bf0708e2a48ecbd
THREAD_SHA1_HASH_MOD: d0eb6a1f61014958f024b7745f0b6539ef5d47ac
FOLLOWUP_IP:
netr28x+4b98d
fffff800`f08ce98d ?? ???
SYMBOL_STACK_INDEX: c
SYMBOL_NAME: netr28x+4b98d
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: netr28x
IMAGE_NAME: netr28x.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 4b98d
FAILURE_BUCKET_ID: AV_netr28x!unknown_function
BUCKET_ID: AV_netr28x!unknown_function
PRIMARY_PROBLEM_CLASS: AV_netr28x!unknown_function
TARGET_TIME: 2020-02-02T19:39:04.000Z
OSBUILD: 9600
OSSERVICEPACK: 17415
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 784
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 8.1
OSEDITION: Windows 8.1 WinNt TerminalServer SingleUserTS Personal
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2014-10-29 03:38:48
BUILDDATESTAMP_STR: 141028-1500
BUILDLAB_STR: winblue_r4
BUILDOSVER_STR: 6.3.9600.17415.amd64fre.winblue_r4.141028-1500
ANALYSIS_SESSION_ELAPSED_TIME: 12db
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_netr28x!unknown_function
FAILURE_ID_HASH: {b1e18842-140d-7b42-6e48-eab659769c49}
Followup: MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffc00166672e28, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8009dea24b0, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for netr28x.sys
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 9600.17415.amd64fre.winblue_r4.141028-1500
SYSTEM_MANUFACTURER: Hewlett-Packard
SYSTEM_PRODUCT_NAME: HP ProBook 4540s
SYSTEM_SKU: F0X25ES#ABV
SYSTEM_VERSION: A1018C1100
BIOS_VENDOR: Hewlett-Packard
BIOS_VERSION: 68IRR Ver. F.41
BIOS_DATE: 05/20/2013
BASEBOARD_MANUFACTURER: Hewlett-Packard
BASEBOARD_PRODUCT: 17F6
BASEBOARD_VERSION: KBC Version 58.1E
DUMP_TYPE: 2
BUGCHECK_P1: ffffc00166672e28
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff8009dea24b0
WRITE_ADDRESS: GetUlongPtrFromAddress: unable to read from fffff8009ddd9298
GetUlongPtrFromAddress: unable to read from fffff8009ddd9520
ffffc00166672e28 Paged pool
CURRENT_IRQL: 2
FAULTING_IP:
nt!HvpDoAllocateCell+c4
fffff800`9dea24b0 892c1e mov dword ptr [rsi+rbx],ebp
CPU_COUNT: 4
CPU_MHZ: 95b
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 3a
CPU_STEPPING: 9
CPU_MICROCODE: 6,3a,9,0 (F,M,S,R) SIG: 1B'00000000 (cache) 1B'00000000 (init)
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: System
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 02-04-2020 19:25:03.0470
ANALYSIS_VERSION: 10.0.18362.1 x86fre
TRAP_FRAME: ffffd000c5befea0 -- (.trap 0xffffd000c5befea0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000038 rbx=0000000000000000 rcx=0000000000000001
rdx=ffffd000c5befea0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8009dea24b0 rsp=ffffd000c5bf0030 rbp=00000000000001d8
r8=0000000000000208 r9=0000000000000000 r10=fffff78000000008
r11=ffffd000c5bf0120 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!HvpDoAllocateCell+0xc4:
fffff800`9dea24b0 892c1e mov dword ptr [rsi+rbx],ebp ds:00000000`00000000=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8009dbd24e9 to fffff8009dbc69a0
STACK_TEXT:
ffffd000`c5befd58 fffff800`9dbd24e9 : 00000000`0000000a ffffc001`66672e28 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffffd000`c5befd60 fffff800`9dbd0d3a : 00000000`00000001 ffffc001`66672df8 00000000`00000000 ffffffff`da3dc980 : nt!KiBugCheckDispatch+0x69
ffffd000`c5befea0 fffff800`9dea24b0 : 00000000`00000005 ffffc001`0000078c ffffe001`00000030 00000000`00000030 : nt!KiPageFault+0x23a
ffffd000`c5bf0030 fffff800`9dea193c : ffffc001`64828000 ffffe001`f8f55048 ffffc001`64828000 ffffd000`c5bf00f0 : nt!HvpDoAllocateCell+0xc4
ffffd000`c5bf00c0 fffff800`9dea130e : ffffc001`64828000 00000000`00000000 ffffc001`658812b0 ffffd000`c5bf02d0 : nt!CmpAddValueKeyNew+0x4c
ffffd000`c5bf0120 fffff800`9dea5065 : 01d5da91`3a0a927c ffffd000`c5bf0221 ffffc001`6f1de4a8 00000000`00000000 : nt!CmpSetValueKeyNew+0x66
ffffd000`c5bf0160 fffff800`9dea4b9b : ffffc001`6f58efa0 ffffd000`c5bf02d0 ffffc001`00000004 ffffd000`c5bf0750 : nt!CmSetValueKey+0x2f1
ffffd000`c5bf0270 fffff800`9dbd21b3 : 00000000`00000001 00000000`00000012 ffffc001`64898010 ffffd000`c5bf04e0 : nt!NtSetValueKey+0x55f
ffffd000`c5bf0440 fffff800`9dbca600 : fffff800`9de8a2f8 00000000`00000004 ffffe001`fccd3930 00000000`40000000 : nt!KiSystemServiceCopyEnd+0x13
ffffd000`c5bf0648 fffff800`9de8a2f8 : 00000000`00000004 ffffe001`fccd3930 00000000`40000000 00000000`00000000 : nt!KiServiceLinkage
ffffd000`c5bf0650 fffff801`91f9c7d8 : 00000000`00000004 ffffd000`c5bf0770 ffffe001`00000000 00000000`00000000 : nt!RtlWriteRegistryValue+0x68
ffffd000`c5bf06b0 fffff801`932b598d : ffffd000`c5bf07b0 fffff801`934c4c28 00000000`00000000 fffff801`93270fc6 : ndis!NdisWriteConfiguration+0x160
ffffd000`c5bf0710 ffffd000`c5bf07b0 : fffff801`934c4c28 00000000`00000000 fffff801`93270fc6 ffffe001`001801a9 : netr28x+0x4b98d
ffffd000`c5bf0718 fffff801`934c4c28 : 00000000`00000000 fffff801`93270fc6 ffffe001`001801a9 ffffe001`fccc51a0 : 0xffffd000`c5bf07b0
ffffd000`c5bf0720 00000000`00000000 : fffff801`93270fc6 ffffe001`001801a9 ffffe001`fccc51a0 ffffe001`00000000 : netr28x+0x25ac28
THREAD_SHA1_HASH_MOD_FUNC: 22955341d8abb05b401bd49818eceb67e2f7827a
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 00663051a00996a7d05651ec0ff70613b5ef291f
THREAD_SHA1_HASH_MOD: d0eb6a1f61014958f024b7745f0b6539ef5d47ac
FOLLOWUP_IP:
netr28x+4b98d
fffff801`932b598d ?? ???
SYMBOL_STACK_INDEX: c
SYMBOL_NAME: netr28x+4b98d
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: netr28x
IMAGE_NAME: netr28x.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 4b98d
FAILURE_BUCKET_ID: AV_netr28x!unknown_function
BUCKET_ID: AV_netr28x!unknown_function
PRIMARY_PROBLEM_CLASS: AV_netr28x!unknown_function
TARGET_TIME: 2020-02-03T12:55:35.000Z
OSBUILD: 9600
OSSERVICEPACK: 17415
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 784
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 8.1
OSEDITION: Windows 8.1 WinNt TerminalServer SingleUserTS Personal
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2014-10-29 03:38:48
BUILDDATESTAMP_STR: 141028-1500
BUILDLAB_STR: winblue_r4
BUILDOSVER_STR: 6.3.9600.17415.amd64fre.winblue_r4.141028-1500
ANALYSIS_SESSION_ELAPSED_TIME: cc2
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_netr28x!unknown_function
FAILURE_ID_HASH: {b1e18842-140d-7b42-6e48-eab659769c49}
Followup: MachineOwner
---------
INVALID_PROCESS_ATTACH_ATTEMPT (5)
Arguments:
Arg1: ffffe0009d253900
Arg2: ffffe000a37e4900
Arg3: 0000000000000000
Arg4: 0000000000000001
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for netr28x.sys
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 9600.17415.amd64fre.winblue_r4.141028-1500
SYSTEM_MANUFACTURER: Hewlett-Packard
SYSTEM_PRODUCT_NAME: HP ProBook 4540s
SYSTEM_SKU: F0X25ES#ABV
SYSTEM_VERSION: A1018C1100
BIOS_VENDOR: Hewlett-Packard
BIOS_VERSION: 68IRR Ver. F.41
BIOS_DATE: 05/20/2013
BASEBOARD_MANUFACTURER: Hewlett-Packard
BASEBOARD_PRODUCT: 17F6
BASEBOARD_VERSION: KBC Version 58.1E
DUMP_TYPE: 2
BUGCHECK_P1: ffffe0009d253900
BUGCHECK_P2: ffffe000a37e4900
BUGCHECK_P3: 0
BUGCHECK_P4: 1
CPU_COUNT: 4
CPU_MHZ: 95b
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 3a
CPU_STEPPING: 9
CPU_MICROCODE: 6,3a,9,0 (F,M,S,R) SIG: 1B'00000000 (cache) 1B'00000000 (init)
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: 0x5
PROCESS_NAME: Steam.exe
CURRENT_IRQL: 2
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 02-04-2020 19:25:07.0647
ANALYSIS_VERSION: 10.0.18362.1 x86fre
DPC_STACK_BASE: FFFFD00076FF7FB0
LAST_CONTROL_TRANSFER: from fffff801416186da to fffff801415dc9a0
STACK_TEXT:
ffffd000`76ff7008 fffff801`416186da : 00000000`00000005 ffffe000`9d253900 ffffe000`a37e4900 00000000`00000000 : nt!KeBugCheckEx
ffffd000`76ff7010 fffff801`418ca5bb : ffffe000`9d3545e0 ffffd000`76ff7119 00000000`00000000 00000000`00000041 : nt! ?? ::FNODOBFM::`string'+0x2b82a
ffffd000`76ff7060 fffff801`415e81b3 : ffffd000`76ff7384 ffffd000`76ff75c4 ffffd000`76ff76e0 ffffe000`9e7a1630 : nt!NtClose+0x3db
ffffd000`76ff7180 fffff801`415e0600 : fffff801`418dafbf ffffc000`5be8fdf0 00000000`00000000 ffffd000`76ff7420 : nt!KiSystemServiceCopyEnd+0x13
ffffd000`76ff7318 fffff801`418dafbf : ffffc000`5be8fdf0 00000000`00000000 ffffd000`76ff7420 ffffd000`76ff75c4 : nt!KiServiceLinkage
ffffd000`76ff7320 fffff801`418d9625 : ffffe000`a2bc0161 00000000`00000003 00000000`00000001 ffffd000`76ff75c0 : nt!CmGetDeviceRegPropWorker+0x1e3
ffffd000`76ff7470 fffff801`4192e455 : ffffe000`a3c52200 00000000`00000000 ffffe000`a2fd2010 00000000`00000002 : nt!CmGetDeviceRegProp+0xf9
ffffd000`76ff7580 fffff801`4192e300 : 00000000`00000000 ffffe000`a123d7d0 00000000`00000000 00000000`00000000 : nt!CmGetDeviceSoftwareKey+0x6d
ffffd000`76ff7690 fffff801`418da29b : 00000000`0000003f 00000000`00000012 00000000`00000012 00000000`00000000 : nt!CmGetDeviceSoftwareKeyPath+0x4c
ffffd000`76ff7770 fffff801`418d9e9f : 00000000`00000000 ffffd000`76ff7830 ffffc000`5be8fdf0 ffffe000`00000000 : nt!CmGetDeviceRegKeyPath+0x123
ffffd000`76ff77c0 fffff801`418d94eb : ffffe000`a2a3f1a0 ffffe000`9e7a1630 00000000`00000001 00000000`c0000120 : nt!CmOpenDeviceRegKeyWorker+0x9f
ffffd000`76ff7860 fffff801`4192b2f7 : 00000000`00000002 00000000`00000012 00000000`c2000000 ffffe000`a2a3f1a0 : nt!CmOpenDeviceRegKey+0xdb
ffffd000`76ff7960 fffff800`63cf8621 : ffffe000`a2a3f180 00000000`00000000 ffffd000`76ff7a60 ffffe000`9d2d9da0 : nt!IoOpenDeviceRegistryKey+0xbb
ffffd000`76ff79b0 fffff800`63cf840c : ffffd000`76ff7b00 ffffd000`76ff7a30 ffffd000`76ff7ad8 ffffe000`a10de1a0 : ndis!NdisOpenConfiguration+0xa1
ffffd000`76ff79e0 fffff800`6530094f : 00000000`00000000 ffffd000`76ff7b00 00000000`00000000 fffff800`65393e51 : ndis!NdisOpenConfigurationEx+0xb0
ffffd000`76ff7a60 00000000`00000000 : ffffd000`76ff7b00 00000000`00000000 fffff800`65393e51 00000001`001801a9 : netr28x+0x4b94f
THREAD_SHA1_HASH_MOD_FUNC: a853edfda1fb7a5ed32d2337b134958b15615a0f
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 66a01394e0907a86783e891512c3e1ca5d86e78c
THREAD_SHA1_HASH_MOD: fa0c2be74be916a0b1322731a8c4c3632a6d3119
FOLLOWUP_IP:
netr28x+4b94f
fffff800`6530094f ?? ???
SYMBOL_STACK_INDEX: f
SYMBOL_NAME: netr28x+4b94f
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: netr28x
IMAGE_NAME: netr28x.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 4b94f
FAILURE_BUCKET_ID: 0x5_netr28x!unknown_function
BUCKET_ID: 0x5_netr28x!unknown_function
PRIMARY_PROBLEM_CLASS: 0x5_netr28x!unknown_function
TARGET_TIME: 2020-02-03T18:55:14.000Z
OSBUILD: 9600
OSSERVICEPACK: 17415
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 784
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 8.1
OSEDITION: Windows 8.1 WinNt TerminalServer SingleUserTS Personal
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2014-10-29 03:38:48
BUILDDATESTAMP_STR: 141028-1500
BUILDLAB_STR: winblue_r4
BUILDOSVER_STR: 6.3.9600.17415.amd64fre.winblue_r4.141028-1500
ANALYSIS_SESSION_ELAPSED_TIME: c69
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x5_netr28x!unknown_function
FAILURE_ID_HASH: {0a19e2eb-42cd-b574-1749-ac631b1c739d}
Followup: MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffc001bde87538, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff801566404b0, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for netr28x.sys
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 9600.17415.amd64fre.winblue_r4.141028-1500
SYSTEM_MANUFACTURER: Hewlett-Packard
SYSTEM_PRODUCT_NAME: HP ProBook 4540s
SYSTEM_SKU: F0X25ES#ABV
SYSTEM_VERSION: A1018C1100
BIOS_VENDOR: Hewlett-Packard
BIOS_VERSION: 68IRR Ver. F.41
BIOS_DATE: 05/20/2013
BASEBOARD_MANUFACTURER: Hewlett-Packard
BASEBOARD_PRODUCT: 17F6
BASEBOARD_VERSION: KBC Version 58.1E
DUMP_TYPE: 2
BUGCHECK_P1: ffffc001bde87538
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff801566404b0
WRITE_ADDRESS: GetUlongPtrFromAddress: unable to read from fffff80156577298
GetUlongPtrFromAddress: unable to read from fffff80156577520
ffffc001bde87538 Paged pool
CURRENT_IRQL: 2
FAULTING_IP:
nt!HvpDoAllocateCell+c4
fffff801`566404b0 892c1e mov dword ptr [rsi+rbx],ebp
CPU_COUNT: 4
CPU_MHZ: 95b
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 3a
CPU_STEPPING: 9
CPU_MICROCODE: 6,3a,9,0 (F,M,S,R) SIG: 1B'00000000 (cache) 1B'00000000 (init)
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: System
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 02-04-2020 19:25:11.0532
ANALYSIS_VERSION: 10.0.18362.1 x86fre
TRAP_FRAME: ffffd000ff66bea0 -- (.trap 0xffffd000ff66bea0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000038 rbx=0000000000000000 rcx=0000000000000001
rdx=ffffd000ff66bea0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff801566404b0 rsp=ffffd000ff66c030 rbp=00000000000000c0
r8=00000000000000f0 r9=0000000000000000 r10=0000000000000000
r11=ffffd000ff66c120 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!HvpDoAllocateCell+0xc4:
fffff801`566404b0 892c1e mov dword ptr [rsi+rbx],ebp ds:00000000`00000000=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff801563704e9 to fffff801563649a0
STACK_TEXT:
ffffd000`ff66bd58 fffff801`563704e9 : 00000000`0000000a ffffc001`bde87538 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffffd000`ff66bd60 fffff801`5636ed3a : 00000000`00000001 ffffc001`bde87508 00000000`00000000 ffffe001`f35be220 : nt!KiBugCheckDispatch+0x69
ffffd000`ff66bea0 fffff801`566404b0 : 00000000`00000005 ffffc001`000006b7 ffffe001`00000030 00000000`00000030 : nt!KiPageFault+0x23a
ffffd000`ff66c030 fffff801`5663f93c : ffffc001`b8a28000 ffffe001`ecd55048 ffffc001`b8a28000 ffffd000`ff66c0f0 : nt!HvpDoAllocateCell+0xc4
ffffd000`ff66c0c0 fffff801`5663f30e : ffffc001`b8a28000 00000000`00000000 ffffc001`b99832b0 ffffd000`ff66c2d0 : nt!CmpAddValueKeyNew+0x4c
ffffd000`ff66c120 fffff801`56643065 : 01d5da8a`21485003 ffffd000`ff66c221 ffffc001`c27e4a70 00000000`00000000 : nt!CmpSetValueKeyNew+0x66
ffffd000`ff66c160 fffff801`56642b9b : ffffc001`c275b960 ffffd000`ff66c2d0 ffffc001`00000004 ffffd000`ff66c750 : nt!CmSetValueKey+0x2f1
ffffd000`ff66c270 fffff801`563701b3 : 00000000`00000001 00000000`00000012 ffffc001`b8a7dce0 ffffd000`ff66c4e0 : nt!NtSetValueKey+0x55f
ffffd000`ff66c440 fffff801`56368600 : fffff801`566282f8 00000000`00000004 ffffe001`f3844240 00000000`40000000 : nt!KiSystemServiceCopyEnd+0x13
ffffd000`ff66c648 fffff801`566282f8 : 00000000`00000004 ffffe001`f3844240 00000000`40000000 00000000`00000000 : nt!KiServiceLinkage
ffffd000`ff66c650 fffff800`e7d7f7d8 : 00000000`00000004 ffffd000`ff66c770 00000000`00000000 00000000`00000000 : nt!RtlWriteRegistryValue+0x68
ffffd000`ff66c6b0 fffff800`e932498d : ffffd000`ff66c7b0 fffff800`e9533c28 00000000`00000000 fffff801`56350fb8 : ndis!NdisWriteConfiguration+0x160
ffffd000`ff66c710 ffffd000`ff66c7b0 : fffff800`e9533c28 00000000`00000000 fffff801`56350fb8 00000000`001801a9 : netr28x+0x4b98d
ffffd000`ff66c718 fffff800`e9533c28 : 00000000`00000000 fffff801`56350fb8 00000000`001801a9 ffffe001`f0b991a0 : 0xffffd000`ff66c7b0
ffffd000`ff66c720 00000000`00000000 : fffff801`56350fb8 00000000`001801a9 ffffe001`f0b991a0 00000000`00000000 : netr28x+0x25ac28
THREAD_SHA1_HASH_MOD_FUNC: 22955341d8abb05b401bd49818eceb67e2f7827a
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 00663051a00996a7d05651ec0ff70613b5ef291f
THREAD_SHA1_HASH_MOD: d0eb6a1f61014958f024b7745f0b6539ef5d47ac
FOLLOWUP_IP:
netr28x+4b98d
fffff800`e932498d ?? ???
SYMBOL_STACK_INDEX: c
SYMBOL_NAME: netr28x+4b98d
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: netr28x
IMAGE_NAME: netr28x.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 4b98d
FAILURE_BUCKET_ID: AV_netr28x!unknown_function
BUCKET_ID: AV_netr28x!unknown_function
PRIMARY_PROBLEM_CLASS: AV_netr28x!unknown_function
TARGET_TIME: 2020-02-03T12:04:47.000Z
OSBUILD: 9600
OSSERVICEPACK: 17415
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 784
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 8.1
OSEDITION: Windows 8.1 WinNt TerminalServer SingleUserTS Personal
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2014-10-29 03:38:48
BUILDDATESTAMP_STR: 141028-1500
BUILDLAB_STR: winblue_r4
BUILDOSVER_STR: 6.3.9600.17415.amd64fre.winblue_r4.141028-1500
ANALYSIS_SESSION_ELAPSED_TIME: cae
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_netr28x!unknown_function
FAILURE_ID_HASH: {b1e18842-140d-7b42-6e48-eab659769c49}
Followup: MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffc000a95bdb50, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8026d42d4b0, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for netr28x.sys
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 9600.17415.amd64fre.winblue_r4.141028-1500
SYSTEM_MANUFACTURER: Hewlett-Packard
SYSTEM_PRODUCT_NAME: HP ProBook 4540s
SYSTEM_SKU: F0X25ES#ABV
SYSTEM_VERSION: A1018C1100
BIOS_VENDOR: Hewlett-Packard
BIOS_VERSION: 68IRR Ver. F.41
BIOS_DATE: 05/20/2013
BASEBOARD_MANUFACTURER: Hewlett-Packard
BASEBOARD_PRODUCT: 17F6
BASEBOARD_VERSION: KBC Version 58.1E
DUMP_TYPE: 2
BUGCHECK_P1: ffffc000a95bdb50
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff8026d42d4b0
WRITE_ADDRESS: GetUlongPtrFromAddress: unable to read from fffff8026d364298
GetUlongPtrFromAddress: unable to read from fffff8026d364520
ffffc000a95bdb50 Paged pool
CURRENT_IRQL: 2
FAULTING_IP:
nt!HvpDoAllocateCell+c4
fffff802`6d42d4b0 892c1e mov dword ptr [rsi+rbx],ebp
CPU_COUNT: 4
CPU_MHZ: 95b
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 3a
CPU_STEPPING: 9
CPU_MICROCODE: 6,3a,9,0 (F,M,S,R) SIG: 1B'00000000 (cache) 1B'00000000 (init)
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: System
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 02-04-2020 19:25:15.0050
ANALYSIS_VERSION: 10.0.18362.1 x86fre
TRAP_FRAME: ffffd0008fc6bea0 -- (.trap 0xffffd0008fc6bea0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000038 rbx=0000000000000000 rcx=0000000000000001
rdx=ffffd0008fc6bea0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8026d42d4b0 rsp=ffffd0008fc6c030 rbp=00000000000000f8
r8=0000000000000128 r9=0000000000000000 r10=fffff78000000008
r11=ffffd0008fc6c120 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!HvpDoAllocateCell+0xc4:
fffff802`6d42d4b0 892c1e mov dword ptr [rsi+rbx],ebp ds:00000000`00000000=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8026d15d4e9 to fffff8026d1519a0
STACK_TEXT:
ffffd000`8fc6bd58 fffff802`6d15d4e9 : 00000000`0000000a ffffc000`a95bdb50 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffffd000`8fc6bd60 fffff802`6d15bd3a : 00000000`00000001 ffffc000`a95bdb20 00000000`00000000 ffffffff`da3dc980 : nt!KiBugCheckDispatch+0x69
ffffd000`8fc6bea0 fffff802`6d42d4b0 : 00000000`00000005 ffffc000`0000089f ffffe001`00000030 00000000`00000030 : nt!KiPageFault+0x23a
ffffd000`8fc6c030 fffff802`6d42c93c : ffffc000`a9228000 ffffe001`1fe5a048 ffffc000`a9228000 ffffd000`8fc6c0f0 : nt!HvpDoAllocateCell+0xc4
ffffd000`8fc6c0c0 fffff802`6d42c30e : ffffc000`a9228000 00000000`00000000 ffffc000`aad002b0 ffffd000`8fc6c2d0 : nt!CmpAddValueKeyNew+0x4c
ffffd000`8fc6c120 fffff802`6d430065 : 01d5dabf`670d87e2 ffffd000`8fc6c221 ffffc000`bf61e008 00000000`00000000 : nt!CmpSetValueKeyNew+0x66
ffffd000`8fc6c160 fffff802`6d42fb9b : ffffc000`b88929f0 ffffd000`8fc6c2d0 ffffc000`00000004 ffffd000`8fc6c750 : nt!CmSetValueKey+0x2f1
ffffd000`8fc6c270 fffff802`6d15d1b3 : 00000000`00000001 00000000`00000012 ffffc000`a928d780 ffffd000`8fc6c4e0 : nt!NtSetValueKey+0x55f
ffffd000`8fc6c440 fffff802`6d155600 : fffff802`6d4152f8 00000000`00000004 ffffe001`2713a3d0 00000000`40000000 : nt!KiSystemServiceCopyEnd+0x13
ffffd000`8fc6c648 fffff802`6d4152f8 : 00000000`00000004 ffffe001`2713a3d0 00000000`40000000 00000000`00000000 : nt!KiServiceLinkage
ffffd000`8fc6c650 fffff801`43da47d8 : 00000000`00000004 ffffd000`8fc6c770 00000000`00000000 00000000`00000000 : nt!RtlWriteRegistryValue+0x68
ffffd000`8fc6c6b0 fffff801`4532498d : ffffd000`8fc6c7b0 fffff801`45533c28 00000000`00000000 ffffe001`2434d968 : ndis!NdisWriteConfiguration+0x160
ffffd000`8fc6c710 ffffd000`8fc6c7b0 : fffff801`45533c28 00000000`00000000 ffffe001`2434d968 00000000`001801a9 : netr28x+0x4b98d
ffffd000`8fc6c718 fffff801`45533c28 : 00000000`00000000 ffffe001`2434d968 00000000`001801a9 ffffe001`23df81a0 : 0xffffd000`8fc6c7b0
ffffd000`8fc6c720 00000000`00000000 : ffffe001`2434d968 00000000`001801a9 ffffe001`23df81a0 ffffe001`00000000 : netr28x+0x25ac28
THREAD_SHA1_HASH_MOD_FUNC: 22955341d8abb05b401bd49818eceb67e2f7827a
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 00663051a00996a7d05651ec0ff70613b5ef291f
THREAD_SHA1_HASH_MOD: d0eb6a1f61014958f024b7745f0b6539ef5d47ac
FOLLOWUP_IP:
netr28x+4b98d
fffff801`4532498d ?? ???
SYMBOL_STACK_INDEX: c
SYMBOL_NAME: netr28x+4b98d
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: netr28x
IMAGE_NAME: netr28x.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 4b98d
FAILURE_BUCKET_ID: AV_netr28x!unknown_function
BUCKET_ID: AV_netr28x!unknown_function
PRIMARY_PROBLEM_CLASS: AV_netr28x!unknown_function
TARGET_TIME: 2020-02-03T18:26:07.000Z
OSBUILD: 9600
OSSERVICEPACK: 17415
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 784
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 8.1
OSEDITION: Windows 8.1 WinNt TerminalServer SingleUserTS Personal
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2014-10-29 03:38:48
BUILDDATESTAMP_STR: 141028-1500
BUILDLAB_STR: winblue_r4
BUILDOSVER_STR: 6.3.9600.17415.amd64fre.winblue_r4.141028-1500
ANALYSIS_SESSION_ELAPSED_TIME: c88
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_netr28x!unknown_function
FAILURE_ID_HASH: {b1e18842-140d-7b42-6e48-eab659769c49}
Followup: MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffc00024c9d538, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff802f124b4b0, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for netr28x.sys
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 9600.17415.amd64fre.winblue_r4.141028-1500
SYSTEM_MANUFACTURER: Hewlett-Packard
SYSTEM_PRODUCT_NAME: HP ProBook 4540s
SYSTEM_SKU: F0X25ES#ABV
SYSTEM_VERSION: A1018C1100
BIOS_VENDOR: Hewlett-Packard
BIOS_VERSION: 68IRR Ver. F.41
BIOS_DATE: 05/20/2013
BASEBOARD_MANUFACTURER: Hewlett-Packard
BASEBOARD_PRODUCT: 17F6
BASEBOARD_VERSION: KBC Version 58.1E
DUMP_TYPE: 2
BUGCHECK_P1: ffffc00024c9d538
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff802f124b4b0
WRITE_ADDRESS: GetUlongPtrFromAddress: unable to read from fffff802f1182298
GetUlongPtrFromAddress: unable to read from fffff802f1182520
ffffc00024c9d538 Paged pool
CURRENT_IRQL: 2
FAULTING_IP:
nt!HvpDoAllocateCell+c4
fffff802`f124b4b0 892c1e mov dword ptr [rsi+rbx],ebp
CPU_COUNT: 4
CPU_MHZ: 95b
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 3a
CPU_STEPPING: 9
CPU_MICROCODE: 6,3a,9,0 (F,M,S,R) SIG: 1B'00000000 (cache) 1B'00000000 (init)
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: System
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 02-04-2020 19:25:20.0258
ANALYSIS_VERSION: 10.0.18362.1 x86fre
TRAP_FRAME: ffffd0018f7efea0 -- (.trap 0xffffd0018f7efea0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000038 rbx=0000000000000000 rcx=0000000000000001
rdx=ffffd0018f7efea0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff802f124b4b0 rsp=ffffd0018f7f0030 rbp=00000000000000c0
r8=00000000000000f0 r9=0000000000000000 r10=fffff78000000008
r11=ffffd0018f7f0120 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!HvpDoAllocateCell+0xc4:
fffff802`f124b4b0 892c1e mov dword ptr [rsi+rbx],ebp ds:00000000`00000000=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff802f0f7b4e9 to fffff802f0f6f9a0
STACK_TEXT:
ffffd001`8f7efd58 fffff802`f0f7b4e9 : 00000000`0000000a ffffc000`24c9d538 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffffd001`8f7efd60 fffff802`f0f79d3a : 00000000`00000001 ffffc000`24c9d508 00000000`00000000 ffffe001`d434f320 : nt!KiBugCheckDispatch+0x69
ffffd001`8f7efea0 fffff802`f124b4b0 : 00000000`00000005 ffffc000`000006b7 ffffe001`00000030 00000000`00000030 : nt!KiPageFault+0x23a
ffffd001`8f7f0030 fffff802`f124a93c : ffffc000`1f628000 ffffe001`ce0588b8 ffffc000`1f628000 ffffd001`8f7f00f0 : nt!HvpDoAllocateCell+0xc4
ffffd001`8f7f00c0 fffff802`f124a30e : ffffc000`1f628000 00000000`00000000 ffffc000`208552b0 ffffd001`8f7f02d0 : nt!CmpAddValueKeyNew+0x4c
ffffd001`8f7f0120 fffff802`f124e065 : 01d5da88`fb08e0a0 ffffd001`8f7f0221 ffffc000`2b4c1008 00000000`00000000 : nt!CmpSetValueKeyNew+0x66
ffffd001`8f7f0160 fffff802`f124db9b : ffffc000`2939ce90 ffffd001`8f7f02d0 ffffc000`00000004 ffffd001`8f7f0750 : nt!CmSetValueKey+0x2f1
ffffd001`8f7f0270 fffff802`f0f7b1b3 : 00000000`00000001 00000000`00000012 ffffc000`1f67c460 ffffd001`8f7f04e0 : nt!NtSetValueKey+0x55f
ffffd001`8f7f0440 fffff802`f0f73600 : fffff802`f12332f8 00000000`00000004 ffffe001`d3718160 00000000`40000000 : nt!KiSystemServiceCopyEnd+0x13
ffffd001`8f7f0648 fffff802`f12332f8 : 00000000`00000004 ffffe001`d3718160 00000000`40000000 00000000`00000000 : nt!KiServiceLinkage
ffffd001`8f7f0650 fffff800`72d3b7d8 : 00000000`00000004 ffffd001`8f7f0770 ffffe001`00000000 00000000`00000000 : nt!RtlWriteRegistryValue+0x68
ffffd001`8f7f06b0 fffff800`7426d98d : ffffd001`8f7f07b0 fffff800`7447cc28 00000000`00000000 fffff800`74228fc6 : ndis!NdisWriteConfiguration+0x160
ffffd001`8f7f0710 ffffd001`8f7f07b0 : fffff800`7447cc28 00000000`00000000 fffff800`74228fc6 ffffe001`001801a9 : netr28x+0x4b98d
ffffd001`8f7f0718 fffff800`7447cc28 : 00000000`00000000 fffff800`74228fc6 ffffe001`001801a9 ffffe001`d1e591a0 : 0xffffd001`8f7f07b0
ffffd001`8f7f0720 00000000`00000000 : fffff800`74228fc6 ffffe001`001801a9 ffffe001`d1e591a0 ffffe001`00000000 : netr28x+0x25ac28
THREAD_SHA1_HASH_MOD_FUNC: 22955341d8abb05b401bd49818eceb67e2f7827a
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 00663051a00996a7d05651ec0ff70613b5ef291f
THREAD_SHA1_HASH_MOD: d0eb6a1f61014958f024b7745f0b6539ef5d47ac
FOLLOWUP_IP:
netr28x+4b98d
fffff800`7426d98d ?? ???
SYMBOL_STACK_INDEX: c
SYMBOL_NAME: netr28x+4b98d
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: netr28x
IMAGE_NAME: netr28x.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 4b98d
FAILURE_BUCKET_ID: AV_netr28x!unknown_function
BUCKET_ID: AV_netr28x!unknown_function
PRIMARY_PROBLEM_CLASS: AV_netr28x!unknown_function
TARGET_TIME: 2020-02-03T11:56:33.000Z
OSBUILD: 9600
OSSERVICEPACK: 17415
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 784
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 8.1
OSEDITION: Windows 8.1 WinNt TerminalServer SingleUserTS Personal
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2014-10-29 03:38:48
BUILDDATESTAMP_STR: 141028-1500
BUILDLAB_STR: winblue_r4
BUILDOSVER_STR: 6.3.9600.17415.amd64fre.winblue_r4.141028-1500
ANALYSIS_SESSION_ELAPSED_TIME: c98
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_netr28x!unknown_function
FAILURE_ID_HASH: {b1e18842-140d-7b42-6e48-eab659769c49}
Followup: MachineOwner
---------