RIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffffc58de2d3a008, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff805a59b4570, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for SynTP.sys
*** ERROR: Module load completed but symbols could not be loaded for SynTP.sys
KEY_VALUES_STRING: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 10.0.17134.471 (WinBuild.160101.0800)
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
DUMP_TYPE: 2
BUGCHECK_P1: ffffc58de2d3a008
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff805a59b4570
READ_ADDRESS: fffff8015a64f388: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
ffffc58de2d3a008
CURRENT_IRQL: 2
FAULTING_IP:
SynTP+94570
fffff805`a59b4570 0fb75502 movzx edx,word ptr [rbp+2]
CPU_COUNT: 8
CPU_MHZ: af8
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 9e
CPU_STEPPING: 9
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: System
ANALYSIS_SESSION_HOST: DESKTOP-HH6FM2D
ANALYSIS_SESSION_TIME: 12-20-2018 11:40:44.0444
ANALYSIS_VERSION: 10.0.18272.1001 amd64fre
TRAP_FRAME: fffff8015d1de7d0 -- (.trap 0xfffff8015d1de7d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000001 rbx=0000000000000000 rcx=0000000000000257
rdx=0000000000000003 rsi=0000000000000000 rdi=0000000000000000
rip=fffff805a59b4570 rsp=fffff8015d1de960 rbp=ffffc58de2d3a006
r8=0000000006ac9232 r9=0000000006ac9232 r10=fffff801588ad180
r11=fffff8015d1de654 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
SynTP+0x94570:
fffff805`a59b4570 0fb75502 movzx edx,word ptr [rbp+2] ss:0018:ffffc58d`e2d3a008=????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8015a3bcc69 to fffff8015a3ac0a0
STACK_TEXT:
fffff801`5d1de688 fffff801`5a3bcc69 : 00000000`0000000a ffffc58d`e2d3a008 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff801`5d1de690 fffff801`5a3b98e5 : 00000000`00000000 fffff801`588ad180 fffff801`5d1de654 00001f80`00000200 : nt!KiBugCheckDispatch+0x69
fffff801`5d1de7d0 fffff805`a59b4570 : ffffc58d`e21e8080 ffffc58d`e2d39ffa 00000000`06ac9232 fffff805`a59b5216 : nt!KiPageFault+0x425
fffff801`5d1de960 ffffc58d`e21e8080 : ffffc58d`e2d39ffa 00000000`06ac9232 fffff805`a59b5216 fffff801`5d1df818 : SynTP+0x94570
fffff801`5d1de968 ffffc58d`e2d39ffa : 00000000`06ac9232 fffff805`a59b5216 fffff801`5d1df818 00000000`00000000 : 0xffffc58d`e21e8080
fffff801`5d1de970 00000000`06ac9232 : fffff805`a59b5216 fffff801`5d1df818 00000000`00000000 fffff805`a5911700 : 0xffffc58d`e2d39ffa
fffff801`5d1de978 fffff805`a59b5216 : fffff801`5d1df818 00000000`00000000 fffff805`a5911700 ffffc58d`e21e6048 : 0x6ac9232
fffff801`5d1de980 fffff801`5d1df818 : 00000000`00000000 fffff805`a5911700 ffffc58d`e21e6048 fffff801`5d1dea20 : SynTP+0x95216
fffff801`5d1de988 00000000`00000000 : fffff805`a5911700 ffffc58d`e21e6048 fffff801`5d1dea20 fffff805`a59b4a97 : 0xfffff801`5d1df818
THREAD_SHA1_HASH_MOD_FUNC: 922bc1fb2662283b3a193c8107ba7fa4fa7a58f9
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: afc8b5e076984bcba27dc310a021fdefdfa117e3
THREAD_SHA1_HASH_MOD: 01e560e963fb80559487a0ec470928d96d63483e
FOLLOWUP_IP:
SynTP+94570
fffff805`a59b4570 0fb75502 movzx edx,word ptr [rbp+2]
FAULT_INSTR_CODE: 255b70f
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: SynTP+94570
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: SynTP
IMAGE_NAME: SynTP.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 58ac1697
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 94570
FAILURE_BUCKET_ID: AV_SynTP!unknown_function
BUCKET_ID: AV_SynTP!unknown_function
PRIMARY_PROBLEM_CLASS: AV_SynTP!unknown_function
TARGET_TIME: 2018-12-18T19:00:46.000Z
OSBUILD: 17134
OSSERVICEPACK: 471
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 784
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2018-12-08 10:36:08
BUILDDATESTAMP_STR: 160101.0800
BUILDLAB_STR: WinBuild
BUILDOSVER_STR: 10.0.17134.471
ANALYSIS_SESSION_ELAPSED_TIME: 181e
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_syntp!unknown_function
FAILURE_ID_HASH: {5a0e0965-29dd-7a5b-d737-1762e0ecb848}
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffffd68ae77f5004, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8052ba94570, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for SynTP.sys
*** ERROR: Module load completed but symbols could not be loaded for SynTP.sys
KEY_VALUES_STRING: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 10.0.17134.471 (WinBuild.160101.0800)
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
DUMP_TYPE: 2
BUGCHECK_P1: ffffd68ae77f5004
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8052ba94570
READ_ADDRESS: fffff80161667388: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
ffffd68ae77f5004
CURRENT_IRQL: 2
FAULTING_IP:
SynTP+94570
fffff805`2ba94570 0fb75502 movzx edx,word ptr [rbp+2]
CPU_COUNT: 8
CPU_MHZ: af8
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 9e
CPU_STEPPING: 9
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: System
ANALYSIS_SESSION_HOST: DESKTOP-HH6FM2D
ANALYSIS_SESSION_TIME: 12-20-2018 11:40:51.0008
ANALYSIS_VERSION: 10.0.18272.1001 amd64fre
TRAP_FRAME: fffff801641de7d0 -- (.trap 0xfffff801641de7d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000001 rbx=0000000000000000 rcx=00000000000002bd
rdx=0000000000000003 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8052ba94570 rsp=fffff801641de960 rbp=ffffd68ae77f5002
r8=00000000021b5c03 r9=00000000021b5c03 r10=fffff8015f90b180
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac pe nc
SynTP+0x94570:
fffff805`2ba94570 0fb75502 movzx edx,word ptr [rbp+2] ss:0018:ffffd68a`e77f5004=????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff801613d4c69 to fffff801613c40a0
STACK_TEXT:
fffff801`641de688 fffff801`613d4c69 : 00000000`0000000a ffffd68a`e77f5004 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff801`641de690 fffff801`613d18e5 : 00000000`00000000 fffff801`5f90b180 00000000`00000000 00000000`0000e765 : nt!KiBugCheckDispatch+0x69
fffff801`641de7d0 fffff805`2ba94570 : ffffd68a`e3fc7080 ffffd68a`e77f4ff6 00000000`021b5c03 fffff805`2ba95216 : nt!KiPageFault+0x425
fffff801`641de960 ffffd68a`e3fc7080 : ffffd68a`e77f4ff6 00000000`021b5c03 fffff805`2ba95216 fffff801`641df818 : SynTP+0x94570
fffff801`641de968 ffffd68a`e77f4ff6 : 00000000`021b5c03 fffff805`2ba95216 fffff801`641df818 00000000`00000000 : 0xffffd68a`e3fc7080
fffff801`641de970 00000000`021b5c03 : fffff805`2ba95216 fffff801`641df818 00000000`00000000 fffff805`2c381700 : 0xffffd68a`e77f4ff6
fffff801`641de978 fffff805`2ba95216 : fffff801`641df818 00000000`00000000 fffff805`2c381700 ffffd68a`e3fc5048 : 0x21b5c03
fffff801`641de980 fffff801`641df818 : 00000000`00000000 fffff805`2c381700 ffffd68a`e3fc5048 fffff801`641dea20 : SynTP+0x95216
fffff801`641de988 00000000`00000000 : fffff805`2c381700 ffffd68a`e3fc5048 fffff801`641dea20 fffff805`2ba94a97 : 0xfffff801`641df818
THREAD_SHA1_HASH_MOD_FUNC: 922bc1fb2662283b3a193c8107ba7fa4fa7a58f9
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: afc8b5e076984bcba27dc310a021fdefdfa117e3
THREAD_SHA1_HASH_MOD: 01e560e963fb80559487a0ec470928d96d63483e
FOLLOWUP_IP:
SynTP+94570
fffff805`2ba94570 0fb75502 movzx edx,word ptr [rbp+2]
FAULT_INSTR_CODE: 255b70f
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: SynTP+94570
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: SynTP
IMAGE_NAME: SynTP.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 58ac1697
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 94570
FAILURE_BUCKET_ID: AV_SynTP!unknown_function
BUCKET_ID: AV_SynTP!unknown_function
PRIMARY_PROBLEM_CLASS: AV_SynTP!unknown_function
TARGET_TIME: 2018-12-16T23:57:21.000Z
OSBUILD: 17134
OSSERVICEPACK: 471
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 784
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2018-12-08 10:36:08
BUILDDATESTAMP_STR: 160101.0800
BUILDLAB_STR: WinBuild
BUILDOSVER_STR: 10.0.17134.471
ANALYSIS_SESSION_ELAPSED_TIME: 1a17
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_syntp!unknown_function
FAILURE_ID_HASH: {5a0e0965-29dd-7a5b-d737-1762e0ecb848}