Çözüldü IRQL_NOT_LESS_OR_EQUAL mavi ekran hatası

Bu konu çözüldü olarak işaretlenmiştir. Çözülmediğini düşünüyorsanız konuyu rapor edebilirsiniz.
Durum
Mesaj gönderimine kapalı.
Çözüm
Olabilir. Bir süre böyle test et. Sorun olmaz ise sebebi buymuş diyebiliriz sanırım.

Yaklaşık 3 saattir oynuyorum tam ekran modunda ve ayar kapalı. Bilgisayarı kapatacağım zaman açacağım tekrardan mavi ekran verecek mi diye denemek için. Verirse sebebinin o olduğu kesinleşmiş olur :)

Olabilir. Bir süre böyle test et. Sorun olmaz ise sebebi buymuş diyebiliriz sanırım.

"Görüntü tekrarı" ayarını açıp denedim ve mavi ekran yedim :) Sanırım sorunun sebebi bulundu. Aklımın ucundan bile geçmiyordu açıkcası bu yüzden olabileceği :D Yardım eden herkese çok teşekkür ederim :kalp:.
Bu yöntemle ekran kartı sürücüsünü kaldırın, sorun kalmamalı:


Sonra tekrar son sürümü kurun tabi.
 
Bu yöntemle ekran kartı sürücüsü kaldırın, sorun kalmamalı:


Ekran kartı sürücüsünü ve ses sürücüsünü DDU ile kaldırıp tekrar yükledim fakat düzelmedi maalesef :( Sorun sadece LoL'de yaşanıyor başka oyunlarda bir sıkıntı yok.
 
Dostum zaten monitörünü OC edince mavi ekran hatası almazsın. Senin sisteminde bir sorun var ve bunu monitör OC ile bağdaştırmışsın nedense.

Minidump paylaşırsan sorunun sebebini söyleriz.


Yoksa DDU ile sürücüyü kaldırınca monitörde OC kalmaz. Kaldı ki monitör yüznden mavi ekran alamazsın.
 
Son düzenleme:
Bu en son aldığım. LoL'ü tam ekran yaptıktan 10-15 saniye sonra mavi ekran yiyorum. Pencereli modda bir sıkıntı yok. İlk başlarda tam ekrana aldığım zaman "HDMI out of range" hatası alıyordum sonra kendi kendine düzeldi ama bu seferde FPS'yi 30'a sabitlemeye başladı. FPS'nin 30'a sabitlenmediği zamanlarda ise mavi ekran yiyorum. Minidump'ımı paylaştığım zaman başka forumdan bir arkadaş monitörden dolayı oluyor demişti. Ben de o yüzden bununla ilgili olabileceğini düşündüm. Ne kadar etik bilmiyorum ama bahsettiğim konunun linki de burada;

https://donanimarsivi.com/forum/konu/lol-oynarken-mavi-ekran.156739/
 
Son düzenleyen: Moderatör:
Monitör kaynaklı mavi ekran ha 🤣🤣🤣 Caps Lock açık çöp başlık değiştirildi.

Sorun ekran kartınızda olabilir. Başka hata alırsanız onları da paylaşın. Ayrıca bellek testi yapın.


Kod:
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000020, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80459ce9a1e, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3608

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-1IBQR0U

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 68020

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 76

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  a

BUGCHECK_P1: 20

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff80459ce9a1e

WRITE_ADDRESS: fffff8045a6fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8045a60f2e0: Unable to get Flags value from nt!KdVersionBlock
fffff8045a60f2e0: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000020

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  fffff8045dc6b6d0 -- (.trap 0xfffff8045dc6b6d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00001e35bc85306d rbx=0000000000000000 rcx=ffffa58d69735000
rdx=00001e3500000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80459ce9a1e rsp=fffff8045dc6b860 rbp=fffff8045dc6b960
r8=0000000000000000  r9=0000000000000000 r10=ffffa58d7219fc88
r11=fffff8045dc6bb10 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz ac po cy
nt!KiExecuteAllDpcs+0x2ee:
fffff804`59ce9a1e 49894720        mov     qword ptr [r15+20h],rax ds:00000000`00000020=????????????????
Resetting default scope

STACK_TEXT:
fffff804`5dc6b588 fffff804`59e05e69     : 00000000`0000000a 00000000`00000020 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff804`5dc6b590 fffff804`59e02169     : ffff8080`845c06f0 ffffa58d`707756e8 ffffa58d`77fc5000 fffff804`6a8ab717 : nt!KiBugCheckDispatch+0x69
fffff804`5dc6b6d0 fffff804`59ce9a1e     : fffff804`559a2240 ffffa58d`698f5000 00000000`00000000 00000000`00000002 : nt!KiPageFault+0x469
fffff804`5dc6b860 fffff804`59ce8d24     : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x2ee
fffff804`5dc6b9d0 fffff804`59df7a0e     : 00000000`00000000 fffff804`5599f180 fffff804`5a726600 ffffa58d`700ad080 : nt!KiRetireDpcList+0x1f4
fffff804`5dc6bc60 00000000`00000000     : fffff804`5dc6c000 fffff804`5dc66000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e


SYMBOL_NAME:  nt!KiExecuteAllDpcs+2ee

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.508

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  2ee

FAILURE_BUCKET_ID:  AV_nt!KiExecuteAllDpcs

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {b88a28a0-fcde-99e9-6174-619833d00ab9}

Followup:     MachineOwner
---------

Kod:
Machine ID Information [From Smbios 3.1, DMIVersion 0, Size=2094]
BiosMajorRelease = 5
BiosMinorRelease = 13
BiosVendor = American Megatrends Inc.
BiosVersion = 2202
BiosReleaseDate = 07/14/2020
SystemManufacturer = System manufacturer
SystemProductName = System Product Name
SystemFamily = To be filled by O.E.M.
SystemVersion = System Version
SystemSKU = SKU
BaseBoardManufacturer = ASUSTeK COMPUTER INC.
BaseBoardProduct = PRIME B450M-K
BaseBoardVersion = Rev X.0x
 
Monitör kaynaklı mavi ekran ha 🤣🤣🤣 Caps Lock açık çöp başlık değiştirildi.

Sorun ekran kartınızda olabilir. Başka hata alırsanız onları da paylaşın. Ayrıca bellek testi yapın.


Kod:
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an.
interrupt request level (IRQL) that is too high. This is usually.
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000020, memory referenced.
Arg2: 0000000000000002, IRQL.
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation.
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80459ce9a1e, address which referenced memory.

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys.

KEY_VALUES_STRING: 1.

Key : Analysis.CPU.mSec.
Value: 3608.

Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on DESKTOP-1IBQR0U.

Key : Analysis.DebugData.
Value: CreateObject.

Key : Analysis.DebugModel.
Value: CreateObject.

Key : Analysis.Elapsed.mSec.
Value: 68020.

Key : Analysis.Memory.CommitPeak.Mb.
Value: 76.

Key : Analysis.System.
Value: CreateObject.

Key : WER.OS.Branch.
Value: vb_release.

Key : WER.OS.Timestamp.
Value: 2019-12-06T14:06:00Z.

Key : WER.OS.Version.
Value: 10.0.19041.1.

ADDITIONAL_XML: 1.

OS_BUILD_LAYERS: 1.

BUGCHECK_CODE: a.

BUGCHECK_P1: 20.

BUGCHECK_P2: 2.

BUGCHECK_P3: 1.

BUGCHECK_P4: fffff80459ce9a1e.

WRITE_ADDRESS: fffff8045a6fa390: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
fffff8045a60f2e0: Unable to get Flags value from nt!KdVersionBlock.
fffff8045a60f2e0: Unable to get Flags value from nt!KdVersionBlock.
unable to get nt!MmSpecialPagesInUse.
0000000000000020.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1.

CUSTOMER_CRASH_COUNT: 1.

PROCESS_NAME: System.

TRAP_FRAME: fffff8045dc6b6d0 -- (.trap 0xfffff8045dc6b6d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00001e35bc85306d rbx=0000000000000000 rcx=ffffa58d69735000.
rdx=00001e3500000000 rsi=0000000000000000 rdi=0000000000000000.
rip=fffff80459ce9a1e rsp=fffff8045dc6b860 rbp=fffff8045dc6b960.
r8=0000000000000000 r9=0000000000000000 r10=ffffa58d7219fc88.
r11=fffff8045dc6bb10 r12=0000000000000000 r13=0000000000000000.
r14=0000000000000000 r15=0000000000000000.
iopl=0 nv up ei ng nz ac po cy.
nt!KiExecuteAllDpcs+0x2ee:
fffff804`59ce9a1e 49894720 mov qword ptr [r15+20h],rax ds:00000000`00000020=????????????????
Resetting default scope.

STACK_TEXT:
fffff804`5dc6b588 fffff804`59e05e69 : 00000000`0000000a 00000000`00000020 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx.
fffff804`5dc6b590 fffff804`59e02169 : ffff8080`845c06f0 ffffa58d`707756e8 ffffa58d`77fc5000 fffff804`6a8ab717 : nt!KiBugCheckDispatch+0x69.
fffff804`5dc6b6d0 fffff804`59ce9a1e : fffff804`559a2240 ffffa58d`698f5000 00000000`00000000 00000000`00000002 : nt!KiPageFault+0x469.
fffff804`5dc6b860 fffff804`59ce8d24 : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x2ee.
fffff804`5dc6b9d0 fffff804`59df7a0e : 00000000`00000000 fffff804`5599f180 fffff804`5a726600 ffffa58d`700ad080 : nt!KiRetireDpcList+0x1f4.
fffff804`5dc6bc60 00000000`00000000 : fffff804`5dc6c000 fffff804`5dc66000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e.

SYMBOL_NAME: nt!KiExecuteAllDpcs+2ee.

MODULE_NAME: nt.

IMAGE_NAME: ntkrnlmp.exe.

IMAGE_VERSION: 10.0.19041.508.

STACK_COMMAND: .thread ; .cxr ; kb.

BUCKET_ID_FUNC_OFFSET: 2ee.

FAILURE_BUCKET_ID: AV_nt!KiExecuteAllDpcs.

OS_VERSION: 10.0.19041.1.

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {b88a28a0-fcde-99e9-6174-619833d00ab9}

Followup: MachineOwner.
---------

Kod:
Machine ID Information [From Smbios 3.1, DMIVersion 0, Size=2094]
BiosMajorRelease = 5.
BiosMinorRelease = 13.
BiosVendor = American Megatrends Inc.
BiosVersion = 2202.
BiosReleaseDate = 07/14/2020.
SystemManufacturer = System manufacturer.
SystemProductName = System Product Name.
SystemFamily = To be filled by O.E.M.
SystemVersion = System Version.
SystemSKU = SKU.
BaseBoardManufacturer = ASUSTeK COMPUTER INC.
BaseBoardProduct = PRIME B450M-K.
BaseBoardVersion = Rev X.0x.

Bellek testi yaptım bir sıkıntı yok. Daha önce aldığım mavi ekranlar da var isterseniz hepsini atabilirim yaklaşık 10 tane falan var.

 

Dosya Ekleri

  • ....png
    ....png
    4,7 KB · Görüntüleme: 45
Son düzenleyen: Moderatör:
Monitor.sys bir Windows sürücüsüdür. Sürücü, bilgisayarınızın donanım veya bağlı aygıtlarla iletişim kurmasını sağlayan küçük bir yazılımdır. Yani monitör sürücüsü değildir.

Belleklerin kit mi?

Kod:
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000020, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff800166e9a1e, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 4936

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 74586

Key : Analysis.Memory.CommitPeak.Mb
Value: 83

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: a

BUGCHECK_P1: 20

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff800166e9a1e

WRITE_ADDRESS: fffff800170fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8001700f2e0: Unable to get Flags value from nt!KdVersionBlock
fffff8001700f2e0: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000020

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System

TRAP_FRAME:  fffff8001ba6b6d0 -- (.trap 0xfffff8001ba6b6d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000004559e231800 rbx=0000000000000000 rcx=ffffe68f02b46000
rdx=0000045500000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800166e9a1e rsp=fffff8001ba6b860 rbp=fffff8001ba6b960
r8=0000000000000000 r9=0000000000000000 r10=ffffe68f0b3afc88
r11=fffff8001ba6bb10 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac po cy
nt!KiExecuteAllDpcs+0x2ee:
fffff800`166e9a1e 49894720 mov qword ptr [r15+20h],rax ds:00000000`00000020=????????????????
Resetting default scope

STACK_TEXT:
fffff800`1ba6b588 fffff800`16805e69 : 00000000`0000000a 00000000`00000020 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff800`1ba6b590 fffff800`16802169 : ffffab00`ae17b6f0 ffffe68f`08fcc6e8 ffffe68f`0b523000 fffff800`290bb717 : nt!KiBugCheckDispatch+0x69
fffff800`1ba6b6d0 fffff800`166e9a1e : fffff800`13857240 ffffe68f`02ce5000 00000000`00000000 00000000`00000002 : nt!KiPageFault+0x469
fffff800`1ba6b860 fffff800`166e8d24 : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x2ee
fffff800`1ba6b9d0 fffff800`167f7a0e : 00000000`00000000 fffff800`13854180 fffff800`17126600 ffffe68f`0dc16080 : nt!KiRetireDpcList+0x1f4
fffff800`1ba6bc60 00000000`00000000 : fffff800`1ba6c000 fffff800`1ba66000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e


SYMBOL_NAME: nt!KiExecuteAllDpcs+2ee

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.508

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 2ee

FAILURE_BUCKET_ID: AV_nt!KiExecuteAllDpcs

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {b88a28a0-fcde-99e9-6174-619833d00ab9}

Followup: MachineOwner
---------

0: kd> kb
# RetAddr : Args to Child : Call Site
00 fffff800`16805e69     : 00000000`0000000a 00000000`00000020 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
01 fffff800`16802169     : ffffab00`ae17b6f0 ffffe68f`08fcc6e8 ffffe68f`0b523000 fffff800`290bb717 : nt!KiBugCheckDispatch+0x69
02 fffff800`166e9a1e     : fffff800`13857240 ffffe68f`02ce5000 00000000`00000000 00000000`00000002 : nt!KiPageFault+0x469
03 fffff800`166e8d24     : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x2ee
04 fffff800`167f7a0e     : 00000000`00000000 fffff800`13854180 fffff800`17126600 ffffe68f`0dc16080 : nt!KiRetireDpcList+0x1f4
05 00000000`00000000     : fffff800`1ba6c000 fffff800`1ba66000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
0: kd> kv
# Child-SP RetAddr : Args to Child : Call Site
00 fffff800`1ba6b588 fffff800`16805e69     : 00000000`0000000a 00000000`00000020 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
01 fffff800`1ba6b590 fffff800`16802169     : ffffab00`ae17b6f0 ffffe68f`08fcc6e8 ffffe68f`0b523000 fffff800`290bb717 : nt!KiBugCheckDispatch+0x69
02 fffff800`1ba6b6d0 fffff800`166e9a1e     : fffff800`13857240 ffffe68f`02ce5000 00000000`00000000 00000000`00000002 : nt!KiPageFault+0x469 (TrapFrame @ fffff800`1ba6b6d0)
03 fffff800`1ba6b860 fffff800`166e8d24     : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x2ee
04 fffff800`1ba6b9d0 fffff800`167f7a0e     : 00000000`00000000 fffff800`13854180 fffff800`17126600 ffffe68f`0dc16080 : nt!KiRetireDpcList+0x1f4
05 fffff800`1ba6bc60 00000000`00000000     : fffff800`1ba6c000 fffff800`1ba66000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
0: kd> .trap fffff800`1ba6b6d0
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000004559e231800 rbx=0000000000000000 rcx=ffffe68f02b46000
rdx=0000045500000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800166e9a1e rsp=fffff8001ba6b860 rbp=fffff8001ba6b960
r8=0000000000000000 r9=0000000000000000 r10=ffffe68f0b3afc88
r11=fffff8001ba6bb10 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac po cy
nt!KiExecuteAllDpcs+0x2ee:
fffff800`166e9a1e 49894720 mov qword ptr [r15+20h],rax ds:00000000`00000020=????????????????
0: kd> kb
*** Stack trace for last set context - .thread/.cxr resets it
# RetAddr : Args to Child : Call Site
00 fffff800`166e8d24     : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x2ee
01 fffff800`167f7a0e     : 00000000`00000000 fffff800`13854180 fffff800`17126600 ffffe68f`0dc16080 : nt!KiRetireDpcList+0x1f4
02 00000000`00000000     : fffff800`1ba6c000 fffff800`1ba66000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e


IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000020, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80459ce9a1e, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 4593

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 66280

Key : Analysis.Memory.CommitPeak.Mb
Value: 83

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: a

BUGCHECK_P1: 20

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff80459ce9a1e

WRITE_ADDRESS: fffff8045a6fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8045a60f2e0: Unable to get Flags value from nt!KdVersionBlock
fffff8045a60f2e0: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000020

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System

TRAP_FRAME:  fffff8045dc6b6d0 -- (.trap 0xfffff8045dc6b6d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00001e35bc85306d rbx=0000000000000000 rcx=ffffa58d69735000
rdx=00001e3500000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80459ce9a1e rsp=fffff8045dc6b860 rbp=fffff8045dc6b960
r8=0000000000000000 r9=0000000000000000 r10=ffffa58d7219fc88
r11=fffff8045dc6bb10 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac po cy
nt!KiExecuteAllDpcs+0x2ee:
fffff804`59ce9a1e 49894720 mov qword ptr [r15+20h],rax ds:00000000`00000020=????????????????
Resetting default scope

STACK_TEXT:
fffff804`5dc6b588 fffff804`59e05e69 : 00000000`0000000a 00000000`00000020 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff804`5dc6b590 fffff804`59e02169 : ffff8080`845c06f0 ffffa58d`707756e8 ffffa58d`77fc5000 fffff804`6a8ab717 : nt!KiBugCheckDispatch+0x69
fffff804`5dc6b6d0 fffff804`59ce9a1e : fffff804`559a2240 ffffa58d`698f5000 00000000`00000000 00000000`00000002 : nt!KiPageFault+0x469
fffff804`5dc6b860 fffff804`59ce8d24 : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x2ee
fffff804`5dc6b9d0 fffff804`59df7a0e : 00000000`00000000 fffff804`5599f180 fffff804`5a726600 ffffa58d`700ad080 : nt!KiRetireDpcList+0x1f4
fffff804`5dc6bc60 00000000`00000000 : fffff804`5dc6c000 fffff804`5dc66000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e


SYMBOL_NAME: nt!KiExecuteAllDpcs+2ee

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.508

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 2ee

FAILURE_BUCKET_ID: AV_nt!KiExecuteAllDpcs

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {b88a28a0-fcde-99e9-6174-619833d00ab9}

Followup: MachineOwner
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000020, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff802834e9a1e, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 4359

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 49402

Key : Analysis.Memory.CommitPeak.Mb
Value: 83

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: a

BUGCHECK_P1: 20

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff802834e9a1e

WRITE_ADDRESS: fffff80283efa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80283e0f2e0: Unable to get Flags value from nt!KdVersionBlock
fffff80283e0f2e0: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000020

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System

TRAP_FRAME:  fffff8028706b6d0 -- (.trap 0xfffff8028706b6d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00017b9d122a9cb4 rbx=0000000000000000 rcx=ffff968dfa135000
rdx=00017b9d00000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff802834e9a1e rsp=fffff8028706b860 rbp=fffff8028706b960
r8=0000000000000000 r9=0000000000000000 r10=ffff968e01a59f88
r11=fffff8028706bb10 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac po cy
nt!KiExecuteAllDpcs+0x2ee:
fffff802`834e9a1e 49894720 mov qword ptr [r15+20h],rax ds:00000000`00000020=????????????????
Resetting default scope

STACK_TEXT:
fffff802`8706b588 fffff802`83605e69 : 00000000`0000000a 00000000`00000020 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff802`8706b590 fffff802`83602169 : 00000000`00000000 ffff968e`042176e8 00000000`00000000 fffff802`9390b978 : nt!KiBugCheckDispatch+0x69
fffff802`8706b6d0 fffff802`834e9a1e : fffff802`7ed7b240 ffff968d`fa2f5000 00000000`00000000 00000000`00000002 : nt!KiPageFault+0x469
fffff802`8706b860 fffff802`834e8d24 : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x2ee
fffff802`8706b9d0 fffff802`835f7a0e : 00000000`00000000 fffff802`7ed78180 fffff802`83f26600 ffff968e`068a1080 : nt!KiRetireDpcList+0x1f4
fffff802`8706bc60 00000000`00000000 : fffff802`8706c000 fffff802`87066000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e


SYMBOL_NAME: nt!KiExecuteAllDpcs+2ee

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.508

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 2ee

FAILURE_BUCKET_ID: AV_nt!KiExecuteAllDpcs

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {b88a28a0-fcde-99e9-6174-619833d00ab9}

Followup: MachineOwner
---------


IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000020, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8016a4e9a1e, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 4812

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 80069

Key : Analysis.Memory.CommitPeak.Mb
Value: 83

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: a

BUGCHECK_P1: 20

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff8016a4e9a1e

WRITE_ADDRESS: fffff8016aefa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8016ae0f2e0: Unable to get Flags value from nt!KdVersionBlock
fffff8016ae0f2e0: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000020

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System

TRAP_FRAME:  fffff8016fe6b6d0 -- (.trap 0xfffff8016fe6b6d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000d01fe6c4b44 rbx=0000000000000000 rcx=ffffb186a8735000
rdx=00000d0100000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8016a4e9a1e rsp=fffff8016fe6b860 rbp=fffff8016fe6b960
r8=0000000000000000 r9=0000000000000000 r10=ffffb186b0fd9f48
r11=fffff8016fe6bb10 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac po cy
nt!KiExecuteAllDpcs+0x2ee:
fffff801`6a4e9a1e 49894720 mov qword ptr [r15+20h],rax ds:00000000`00000020=????????????????
Resetting default scope

STACK_TEXT:
fffff801`6fe6b588 fffff801`6a605e69 : 00000000`0000000a 00000000`00000020 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff801`6fe6b590 fffff801`6a602169 : ffff9681`dd4a46f0 ffffb186`af7986e8 ffffb186`b0f54000 fffff801`7c76b717 : nt!KiBugCheckDispatch+0x69
fffff801`6fe6b6d0 fffff801`6a4e9a1e : fffff801`67ca9240 ffffb186`a88f5000 00000000`00000000 00000000`00000002 : nt!KiPageFault+0x469
fffff801`6fe6b860 fffff801`6a4e8d24 : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x2ee
fffff801`6fe6b9d0 fffff801`6a5f7a0e : 00000000`00000000 fffff801`67ca6180 fffff801`6af26600 ffffb186`b1c48080 : nt!KiRetireDpcList+0x1f4
fffff801`6fe6bc60 00000000`00000000 : fffff801`6fe6c000 fffff801`6fe66000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e


SYMBOL_NAME: nt!KiExecuteAllDpcs+2ee

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.508

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 2ee

FAILURE_BUCKET_ID: AV_nt!KiExecuteAllDpcs

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {b88a28a0-fcde-99e9-6174-619833d00ab9}

Followup: MachineOwner
---------

0: kd> lm
start             end                 module name
ffffa68d`dee00000 ffffa68d`df0e2000   win32kbase   (deferred)             
ffffa68d`df0f0000 ffffa68d`df4a6000   win32kfull   (deferred)             
ffffa68d`df4c0000 ffffa68d`df55a000   win32k   C (pdb symbols)          C:\ProgramData\Dbg\sym\win32k.pdb\ED706A38659240A066E6FB19B994BAAA1\win32k.pdb
ffffa68d`df560000 ffffa68d`df5a8000   cdd        (deferred)             
fffff801`68b50000 fffff801`68b78000   mcupdate_AuthenticAMD   (deferred)             
fffff801`68b80000 fffff801`68b86000   hal        (deferred)             
fffff801`68b90000 fffff801`68b9b000   kd         (deferred)             
fffff801`68ba0000 fffff801`68bc7000   tm         (deferred)             
fffff801`68bd0000 fffff801`68c39000   CLFS       (deferred)             
fffff801`68c40000 fffff801`68c5a000   PSHED      (deferred)             
fffff801`68c60000 fffff801`68c6b000   BOOTVID    (deferred)             
fffff801`68c70000 fffff801`68d83000   clipsp     (deferred)             
fffff801`68d90000 fffff801`68dff000   FLTMGR     (deferred)             
fffff801`68e00000 fffff801`68e29000   ksecdd     (deferred)             
fffff801`68e30000 fffff801`68e92000   msrpc      (deferred)             
fffff801`68ea0000 fffff801`68eae000   cmimcext   (deferred)             
fffff801`68eb0000 fffff801`68ec1000   werkernel   (deferred)             
fffff801`68ed0000 fffff801`68edc000   ntosext    (deferred)             
fffff801`68ee0000 fffff801`68ef3000   WDFLDR     (deferred)             
fffff801`68f00000 fffff801`68f0f000   SleepStudyHelper   (deferred)             
fffff801`68f10000 fffff801`68f21000   WppRecorder   (deferred)             
fffff801`68f30000 fffff801`68f4a000   SgrmAgent   (deferred)             
fffff801`6a200000 fffff801`6b246000   nt         (pdb symbols)          C:\ProgramData\Dbg\sym\ntkrnlmp.pdb\641F55C592201DCC4F59FACC72EA54DA1\ntkrnlmp.pdb
fffff801`6e400000 fffff801`6e4e3000   CI         (deferred)             
fffff801`6e4f0000 fffff801`6e5a7000   cng        (deferred)             
fffff801`6e5b0000 fffff801`6e681000   Wdf01000   (deferred)             
fffff801`6e690000 fffff801`6e6b6000   acpiex     (deferred)             
fffff801`6e6c0000 fffff801`6e70b000   mssecflt   (deferred)             
fffff801`6e710000 fffff801`6e7dc000   ACPI       (deferred)             
fffff801`6e7e0000 fffff801`6e7ec000   WMILIB     (deferred)             
fffff801`6e810000 fffff801`6e87b000   intelpep   (deferred)             
fffff801`6e880000 fffff801`6e897000   WindowsTrustedRT   (deferred)             
fffff801`6e8a0000 fffff801`6e8ab000   IntelTA    (deferred)             
fffff801`6e8b0000 fffff801`6e8bb000   WindowsTrustedRTProxy   (deferred)             
fffff801`6e8c0000 fffff801`6e8d4000   pcw        (deferred)             
fffff801`6e8e0000 fffff801`6e8eb000   msisadrv   (deferred)             
fffff801`6e8f0000 fffff801`6e968000   pci        (deferred)             
fffff801`6e970000 fffff801`6e985000   vdrvroot   (deferred)             
fffff801`6e990000 fffff801`6e9a6000   amdkmpfd   (deferred)             
fffff801`6e9b0000 fffff801`6e9df000   pdc        (deferred)             
fffff801`6e9e0000 fffff801`6e9f9000   CEA        (deferred)             
fffff801`6ea00000 fffff801`6ea31000   partmgr    (deferred)             
fffff801`6ea40000 fffff801`6eaea000   spaceport   (deferred)             
fffff801`6eaf0000 fffff801`6eb09000   volmgr     (deferred)             
fffff801`6eb10000 fffff801`6eb73000   volmgrx    (deferred)             
fffff801`6eb80000 fffff801`6eb9e000   mountmgr   (deferred)             
fffff801`6eba0000 fffff801`6ebd2000   storahci   (deferred)             
fffff801`6ebe0000 fffff801`6ebfc000   EhStorClass   (deferred)             
fffff801`6ec00000 fffff801`6ecb0000   storport   (deferred)             
fffff801`6ecc0000 fffff801`6ecda000   fileinfo   (deferred)             
fffff801`6ece0000 fffff801`6ed20000   Wof        (deferred)             
fffff801`6ed30000 fffff801`6ed9c000   WdFilter   (deferred)             
fffff801`6eda0000 fffff801`6edad000   Fs_Rec     (deferred)             
fffff801`6edb0000 fffff801`6ef1f000   ndis       (deferred)             
fffff801`6ef20000 fffff801`6efb8000   NETIO      (deferred)             
fffff801`6efc0000 fffff801`6eff2000   ksecpkg    (deferred)             
fffff801`6f000000 fffff801`6f2d9000   Ntfs       (deferred)             
fffff801`6f2e0000 fffff801`6f301000   amdpsp     (deferred)             
fffff801`6f310000 fffff801`6f5fc000   tcpip      (deferred)             
fffff801`6f600000 fffff801`6f67f000   fwpkclnt   (deferred)             
fffff801`6f680000 fffff801`6f6b0000   wfplwfs    (deferred)             
fffff801`6f6c0000 fffff801`6f789000   fvevol     (deferred)             
fffff801`6f790000 fffff801`6f79b000   volume     (deferred)             
fffff801`6f7a0000 fffff801`6f80d000   volsnap    (deferred)             
fffff801`6f810000 fffff801`6f860000   rdyboost   (deferred)             
fffff801`6f870000 fffff801`6f896000   mup        (deferred)             
fffff801`6f8a0000 fffff801`6f8b2000   iorate     (deferred)             
fffff801`6f8e0000 fffff801`6f8fc000   disk       (deferred)             
fffff801`6f900000 fffff801`6f96c000   CLASSPNP   (deferred)             
fffff801`760a0000 fffff801`760be000   crashdmp   (deferred)             
fffff801`76800000 fffff801`76830000   cdrom      (deferred)             
fffff801`76840000 fffff801`76855000   filecrypt   (deferred)             
fffff801`76860000 fffff801`7686e000   tbs        (deferred)             
fffff801`76870000 fffff801`7687a000   Null       (deferred)             
fffff801`76880000 fffff801`7688a000   Beep       (deferred)             
fffff801`76890000 fffff801`76dc7000   vgk        (deferred)             
fffff801`76e00000 fffff801`76e10000   TDI        (deferred)             
fffff801`76e20000 fffff801`76e7c000   netbt      (deferred)             
fffff801`76e80000 fffff801`76e93000   afunix     (deferred)             
fffff801`76ea0000 fffff801`76f43000   afd        (deferred)             
fffff801`76f50000 fffff801`76f6a000   vwififlt   (deferred)             
fffff801`76f70000 fffff801`76f9b000   pacer      (deferred)             
fffff801`76fa0000 fffff801`76fb4000   ndiscap    (deferred)             
fffff801`76fc0000 fffff801`76fd4000   netbios    (deferred)             
fffff801`76fe0000 fffff801`77081000   Vid        (deferred)             
fffff801`77090000 fffff801`770b1000   winhvr     (deferred)             
fffff801`770c0000 fffff801`7713b000   rdbss      (deferred)             
fffff801`77140000 fffff801`771d4000   csc        (deferred)             
fffff801`771e0000 fffff801`771f2000   nsiproxy   (deferred)             
fffff801`77200000 fffff801`7720e000   npsvctrig   (deferred)             
fffff801`77210000 fffff801`77220000   mssmbios   (deferred)             
fffff801`77230000 fffff801`7723a000   gpuenergydrv   (deferred)             
fffff801`77240000 fffff801`77248000   GLCKIO2    (deferred)             
fffff801`77250000 fffff801`77257000   ene        (deferred)             
fffff801`77260000 fffff801`7728c000   dfsc       (deferred)             
fffff801`772b0000 fffff801`7731c000   fastfat    (deferred)             
fffff801`77320000 fffff801`77337000   bam        (deferred)             
fffff801`77340000 fffff801`77349000   AsIO2      (deferred)             
fffff801`77350000 fffff801`77359000   AsUpIO     (deferred)             
fffff801`77360000 fffff801`77366000   AsIO       (deferred)             
fffff801`77370000 fffff801`773be000   ahcache    (deferred)             
fffff801`773c0000 fffff801`773d2000   CompositeBus   (deferred)             
fffff801`773e0000 fffff801`773ed000   kdnic      (deferred)             
fffff801`773f0000 fffff801`77405000   umbus      (deferred)             
fffff801`77410000 fffff801`77411f80   AiCharger   (deferred)             
fffff801`77420000 fffff801`774b8000   USBXHCI    (deferred)             
fffff801`774c0000 fffff801`77504000   ucx01000   (deferred)             
fffff801`77510000 fffff801`77626000   rt640x64   (deferred)             
fffff801`77630000 fffff801`776c2000   atikmpag   (deferred)             
fffff801`776d0000 fffff801`777a6000   peauth     (deferred)             
fffff801`777b0000 fffff801`77877000   srv2       (deferred)             
fffff801`77880000 fffff801`778a1000   raspptp    (deferred)             
fffff801`778b0000 fffff801`778cc000   raspppoe   (deferred)             
fffff801`778d0000 fffff801`7790a000   ndiswan    (deferred)             
fffff801`77910000 fffff801`77926000   WdNisDrv   (deferred)             
fffff801`77930000 fffff801`77943000   condrv     (deferred)             
fffff801`77d50000 fffff801`780f4000   dxgkrnl    (deferred)             
fffff801`78100000 fffff801`78118000   watchdog   (deferred)             
fffff801`78120000 fffff801`78136000   BasicDisplay   (deferred)             
fffff801`78140000 fffff801`78151000   BasicRender   (deferred)             
fffff801`78160000 fffff801`7817c000   Npfs       (deferred)             
fffff801`78180000 fffff801`78191000   Msfs       (deferred)             
fffff801`781a0000 fffff801`781bb000   CimFS      (deferred)             
fffff801`781c0000 fffff801`781e2000   tdx        (deferred)             
fffff801`78a00000 fffff801`78a11000   kbdhid     (deferred)             
fffff801`78a20000 fffff801`78a34000   kbdclass   (deferred)             
fffff801`78a40000 fffff801`78a50000   mouhid     (deferred)             
fffff801`78a60000 fffff801`78a73000   mouclass   (deferred)             
fffff801`78a90000 fffff801`78a9e000   dump_diskdump   (deferred)             
fffff801`78ae0000 fffff801`78b12000   dump_storahci   (deferred)             
fffff801`78b40000 fffff801`78b5d000   dump_dumpfve   (deferred)             
fffff801`78b60000 fffff801`78c41000   dxgmms2    (deferred)             
fffff801`78c50000 fffff801`78c6b000   monitor    (deferred)             
fffff801`78c70000 fffff801`78c84000   qwavedrv   (deferred)             
fffff801`78d10000 fffff801`78d39000   luafv      (deferred)             
fffff801`78d40000 fffff801`78d76000   wcifs      (deferred)             
fffff801`78d80000 fffff801`78e00000   cldflt     (deferred)             
fffff801`78e10000 fffff801`78e2a000   storqosflt   (deferred)             
fffff801`78e30000 fffff801`78e57000   bindflt    (deferred)             
fffff801`78e60000 fffff801`78e78000   mslldp     (deferred)             
fffff801`78e80000 fffff801`78e98000   lltdio     (deferred)             
fffff801`78ea0000 fffff801`78ebb000   rspndr     (deferred)             
fffff801`78ec0000 fffff801`78edd000   wanarp     (deferred)             
fffff801`78ee0000 fffff801`78f36000   msquic     (deferred)             
fffff801`78f40000 fffff801`790c6000   HTTP       (deferred)             
fffff801`790d0000 fffff801`790f5000   bowser     (deferred)             
fffff801`79100000 fffff801`7911a000   mpsdrv     (deferred)             
fffff801`79120000 fffff801`79165000   mrxsmb20   (deferred)             
fffff801`79170000 fffff801`791a4000   AMDRyzenMasterDriver   (deferred)             
fffff801`791b0000 fffff801`7983c000   RTKVHD64   (deferred)             
fffff801`79850000 fffff801`79883000   usbccgp    (deferred)             
fffff801`79890000 fffff801`798e2000   srvnet     (deferred)             
fffff801`798f0000 fffff801`79904000   mmcss      (deferred)             
fffff801`79910000 fffff801`7991f000   ndistapi   (deferred)             
fffff801`79920000 fffff801`79931000   UAExt      (deferred)             
fffff801`79940000 fffff801`79977000   usbaudio   (deferred)             
fffff801`79980000 fffff801`79992000   hidusb     (deferred)             
fffff801`799a0000 fffff801`799df000   HIDCLASS   (deferred)             
fffff801`799e0000 fffff801`799f3000   HIDPARSE   (deferred)             
fffff801`7c200000 fffff801`7c221000   drmk       (deferred)             
fffff801`7c230000 fffff801`7c2a6000   ks         (deferred)             
fffff801`7c2b0000 fffff801`7c2ba000   AMDPCIDev   (deferred)             
fffff801`7c2c0000 fffff801`7c2dc000   serial     (deferred)             
fffff801`7c2e0000 fffff801`7c2ef000   serenum    (deferred)             
fffff801`7c2f0000 fffff801`7c2fd000   amdgpio2   (deferred)             
fffff801`7c300000 fffff801`7c332000   msgpioclx   (deferred)             
fffff801`7c340000 fffff801`7c34c000   wmiacpi    (deferred)             
fffff801`7c350000 fffff801`7c38b000   amdppm     (deferred)             
fffff801`7c390000 fffff801`7c39a000   amdgpio3   (deferred)             
fffff801`7c3a0000 fffff801`7c3ae000   UEFI       (deferred)             
fffff801`7c3b0000 fffff801`7c3bd000   NdisVirtualBus   (deferred)             
fffff801`7c3c0000 fffff801`7c3cc000   swenum     (deferred)             
fffff801`7c3d0000 fffff801`7c3de000   rdpbus     (deferred)             
fffff801`7c3e0000 fffff801`7c483000   UsbHub3    (deferred)             
fffff801`7c490000 fffff801`7c49e000   USBD       (deferred)             
fffff801`7c4a0000 fffff801`7c4bd000   AtihdWT6   (deferred)             
fffff801`7c4c0000 fffff801`7c4cf000   ksthunk    (deferred)             
fffff801`7c4d0000 fffff801`7c563000   mrxsmb     (deferred)             
fffff801`7c570000 fffff801`7c597000   Ndu        (deferred)             
fffff801`7c5a0000 fffff801`7c5b5000   tcpipreg   (deferred)             
fffff801`7c5c0000 fffff801`7c5dc000   rassstp    (deferred)             
fffff801`7c5e0000 fffff801`7c5fd000   NDProxy    (deferred)             
fffff801`7c600000 fffff801`7c627000   AgileVpn   (deferred)             
fffff801`7c630000 fffff801`7c651000   rasl2tp    (deferred)             
fffff801`7c660000 fffff801`7c669000   IOMap64    (deferred)             
fffff801`7c670000 fffff801`80556000   atikmdag   (deferred)             
fffff801`80560000 fffff801`80585000   HDAudBus   (deferred)             
fffff801`80590000 fffff801`805f6000   portcls    (deferred)             

Unloaded modules:
fffff801`768b0000 fffff801`76df5000 vgk.sys
fffff801`79840000 fffff801`7984e000 AppleLowerFi
fffff801`78d00000 fffff801`78d0f000 WpdUpFltr.sy
fffff801`78ca0000 fffff801`78cf5000 WUDFRd.sys
fffff801`78c70000 fffff801`78c91000 WinUSB.SYS
fffff801`760d0000 fffff801`760df000 dump_storpor
fffff801`76120000 fffff801`76153000 dump_storahc
fffff801`76180000 fffff801`7619e000 dump_dumpfve
fffff801`79890000 fffff801`798b1000 WinUSB.SYS
fffff801`798c0000 fffff801`79915000 WUDFRd.sys
fffff801`77290000 fffff801`772ac000 dam.sys
fffff801`6e7f0000 fffff801`6e801000 WdBoot.sys
fffff801`6f8c0000 fffff801`6f8d1000 hwpolicy.sys
0: kd> lmDvmmonitor
Browse full module list
start             end                 module name
fffff801`78c50000 fffff801`78c6b000   monitor    (deferred)             
    Mapped memory image file: C:\ProgramData\Dbg\sym\monitor.sys\1CD682D71b000\monitor.sys
Image path: \SystemRoot\System32\drivers\monitor.sys
Image name: monitor.sys
    Browse all global symbols  functions  data
    Image was built with /Brepro flag.
    Timestamp:        1CD682D7 (This is a reproducible build file hash, not a timestamp)
CheckSum: 0001751B
ImageSize: 0001B000
File version: 10.0.19041.508
Product version: 10.0.19041.508
File flags: 0 (Mask 3F)
File OS: 40004 NT Win32
File type: 3.7 Driver
File date: 00000000.00000000
Translations: 0409.04b0
Information from resource tables:
CompanyName: Microsoft Corporation
ProductName: Microsoft® Windows® Operating System
InternalName: monitor.sys
OriginalFilename: monitor.sys
ProductVersion: 10.0.19041.508
FileVersion: 10.0.19041.508 (WinBuild.160101.0800)
FileDescription: Monitor Driver
LegalCopyright: © Microsoft Corporation. All rights reserved.
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000020, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80203ae9a1e, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5218

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-1IBQR0U

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 77906

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 85

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  a

BUGCHECK_P1: 20

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff80203ae9a1e

WRITE_ADDRESS: fffff802044fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8020440f2e0: Unable to get Flags value from nt!KdVersionBlock
fffff8020440f2e0: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 0000000000000020

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  fffff8020946b6d0 -- (.trap 0xfffff8020946b6d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000096746f53086 rbx=0000000000000000 rcx=ffffd78eccf46000
rdx=0000096700000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80203ae9a1e rsp=fffff8020946b860 rbp=fffff8020946b960
 r8=0000000000000000  r9=0000000000000000 r10=ffffd78ecffbbe38
r11=fffff8020946bb10 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz ac po cy
nt!KiExecuteAllDpcs+0x2ee:
fffff802`03ae9a1e 49894720        mov     qword ptr [r15+20h],rax ds:00000000`00000020=????????????????
Resetting default scope

STACK_TEXT: 
fffff802`0946b588 fffff802`03c05e69     : 00000000`0000000a 00000000`00000020 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff802`0946b590 fffff802`03c02169     : ffff9480`3c2fe1f0 ffffd78e`cffec6e8 ffffd78e`d68a6000 fffff802`1929bd87 : nt!KiBugCheckDispatch+0x69
fffff802`0946b6d0 fffff802`03ae9a1e     : fffff802`00fdf240 ffffd78e`ce0f1000 00000000`00000000 00000000`00000002 : nt!KiPageFault+0x469
fffff802`0946b860 fffff802`03ae8d24     : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x2ee
fffff802`0946b9d0 fffff802`03bf7a0e     : 00000000`00000000 fffff802`00fdc180 fffff802`04526600 ffffd78e`d83b7080 : nt!KiRetireDpcList+0x1f4
fffff802`0946bc60 00000000`00000000     : fffff802`0946c000 fffff802`09466000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e


SYMBOL_NAME:  nt!KiExecuteAllDpcs+2ee

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.508

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  2ee

FAILURE_BUCKET_ID:  AV_nt!KiExecuteAllDpcs

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {b88a28a0-fcde-99e9-6174-619833d00ab9}

Followup:     MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000020, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8001f4e9a1e, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 6296

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-1IBQR0U

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 71698

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 93

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  a

BUGCHECK_P1: 20

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff8001f4e9a1e

WRITE_ADDRESS: fffff8001fefa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8001fe0f2e0: Unable to get Flags value from nt!KdVersionBlock
fffff8001fe0f2e0: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 0000000000000020

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  AMDRSServ.exe

DPC_STACK_BASE:  FFFFF80022C72FB0

TRAP_FRAME:  ffff9cad82e97010 -- (.trap 0xffff9cad82e97010)
Unable to read trap frame at ffff9cad`82e97010

STACK_TEXT: 
fffff800`22c728d8 fffff800`1f605e69     : 00000000`0000000a 00000000`00000020 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff800`22c728e0 fffff800`1f602169     : 000022f5`cb0d972c 00000000`00000002 ffffb08d`6d902000 fffff800`2fc59f37 : nt!KiBugCheckDispatch+0x69
fffff800`22c72a20 fffff800`1f4e9a1e     : fffff800`1a7b9240 ffffb08d`650f8000 fffff800`22c72e70 fffff800`00000002 : nt!KiPageFault+0x469
fffff800`22c72bb0 fffff800`1f4e8d24     : fffff800`1a7b6180 00000000`00000000 00000000`00000002 00000000`00000004 : nt!KiExecuteAllDpcs+0x2ee
fffff800`22c72d20 fffff800`1f5faee5     : 00000000`00000000 fffff800`1a7b6180 ffff9f80`60cfe140 00000000`00000000 : nt!KiRetireDpcList+0x1f4
fffff800`22c72fb0 fffff800`1f5facd0     : fffff800`1f5eff90 fffff800`1f43f03a ffffb08d`6f192000 00000000`ffffffff : nt!KxRetireDpcList+0x5
ffffc109`a2253850 fffff800`1f5fa585     : 00000000`00000000 fffff800`1f5f5a11 00000000`00300d68 00000000`00000000 : nt!KiDispatchInterruptContinue
ffffc109`a2253880 fffff800`1f5f5a11     : 00000000`00300d68 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDpcInterruptBypass+0x25
ffffc109`a2253890 ffff9c86`ab6656d4     : 00000000`00300d68 ffffef8b`09542b92 ffff9cad`82e97010 ffffc109`a2253a30 : nt!KiInterruptDispatch+0xb1
ffffc109`a2253a20 ffff9c86`acb6473f     : 000001c0`7236dc90 00000000`00300d68 ffffc109`a2253b80 ffff9c86`acafb28a : win32kbase!ValidateHwnd+0x4
ffffc109`a2253a50 ffff9c86`abb75bf1     : ffffb08d`6d7e8300 00000000`00000001 00000000`00000000 000001c0`4f023e70 : win32kfull!NtUserGetClassName+0x4f
ffffc109`a2253ad0 fffff800`1f6058b8     : ffffb08d`6d7e8300 00000000`00000000 00000000`00000000 00000000`00000001 : win32k!NtUserGetClassName+0x15
ffffc109`a2253b00 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28


SYMBOL_NAME:  nt!KiExecuteAllDpcs+2ee

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.508

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  2ee

FAILURE_BUCKET_ID:  AV_nt!KiExecuteAllDpcs

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {b88a28a0-fcde-99e9-6174-619833d00ab9}

Followup:     MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000020, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80142ce9a1e, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5218

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-1IBQR0U

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 74598

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 75

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  a

BUGCHECK_P1: 20

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff80142ce9a1e

WRITE_ADDRESS: fffff801436fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8014360f2e0: Unable to get Flags value from nt!KdVersionBlock
fffff8014360f2e0: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 0000000000000020

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  League of Legends.exe

DPC_STACK_BASE:  FFFFF80145872FB0

TRAP_FRAME:  fffff80145872a20 -- (.trap 0xfffff80145872a20)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00004a83da5af6e4 rbx=0000000000000000 rcx=ffff978fb7935000
rdx=00004a8300000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80142ce9a1e rsp=fffff80145872bb0 rbp=fffff80145872cb0
 r8=0000000000000000  r9=0000000000000000 r10=ffff978fc11ecf88
r11=fffff80145872e60 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz ac po cy
nt!KiExecuteAllDpcs+0x2ee:
fffff801`42ce9a1e 49894720        mov     qword ptr [r15+20h],rax ds:00000000`00000020=????????????????
Resetting default scope

STACK_TEXT: 
fffff801`458728d8 fffff801`42e05e69     : 00000000`0000000a 00000000`00000020 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff801`458728e0 fffff801`42e02169     : 00004a83`da570c24 00000000`00000000 ffff978f`c1002000 fffff801`526e9c37 : nt!KiBugCheckDispatch+0x69
fffff801`45872a20 fffff801`42ce9a1e     : fffff801`3d759240 ffff978f`b7af7000 fffff801`45872e70 fffff801`00000002 : nt!KiPageFault+0x469
fffff801`45872bb0 fffff801`42ce8d24     : fffff801`3d756180 00000000`00000000 00000000`00000002 00000000`00000004 : nt!KiExecuteAllDpcs+0x2ee
fffff801`45872d20 fffff801`42dfaee5     : 00000000`00000000 fffff801`3d756180 ffff8081`42834640 00000000`7ffea000 : nt!KiRetireDpcList+0x1f4
fffff801`45872fb0 fffff801`42dfacd0     : fffff801`42deff90 fffff801`42c3f03a ffff978f`c8ba9080 00000000`76359560 : nt!KxRetireDpcList+0x5
ffffe80b`8b4d8ac0 fffff801`42dfa585     : 00000000`7ffea000 fffff801`42df5a11 00000000`0000e383 ffff978f`c80cd080 : nt!KiDispatchInterruptContinue
ffffe80b`8b4d8af0 fffff801`42df5a11     : 00000000`0000e383 ffff978f`c80cd080 00000000`00000000 00000000`00000000 : nt!KiDpcInterruptBypass+0x25
ffffe80b`8b4d8b00 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatch+0xb1


SYMBOL_NAME:  nt!KiExecuteAllDpcs+2ee

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.508

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  2ee

FAILURE_BUCKET_ID:  AV_nt!KiExecuteAllDpcs

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {b88a28a0-fcde-99e9-6174-619833d00ab9}

Followup:     MachineOwner
---------
 
Durum
Mesaj gönderimine kapalı.

Yeni konular

Geri
Yukarı