Çözüm Windows 7 Netr28x.sys Mavi Ekran Hatası

Bu konu bir çözümü açıklamaktadır. Herhangi bir çözüm açıklanmadığını düşünüyorsanız konuyu rapor edebilirsiniz.

ceyhunyurt

Decapat
Katılım
17 Haziran 2019
Mesajlar
83
Yer
ANKARA
Daha fazla  
Cinsiyet
Erkek
Merhaba. Öncelikle aranıza yeni katıldım. Bilgisayarım günlük en az 1 defa mavi ekran veriyor. En son aldığım hatanın Adı "RQL NOT LESS OR EQUAL" hatası. Mindump dosyalarını aşağıya bırakacağım. Format attıktan sonrada aynı şey oluyor. 1 Ay falan oldu atalı HDD testi yaptım bir sıkıntı yok. Combofixle tarattım problem yok ama bazen sık sık, bazen ara ara veriyor hatayı. Bu hata hep oluyor ama bugün farklı Olarak PC açılırken şifremi girme ekranına gelmeden önce mouse döndü siyah ekranda kaldı. Batarya söküp kabloları söktüm. 20 saniye güç tuşuna bastım güç boşalsın diye. Biraz bekleyip açtım fakat gene olacak. Ekran kartı Driverlerim falan hepsi güncel (İncelediğim konularda "RGHOST" sitesine atın demişsiniz oraya yükledim) Minidump
BİLGİSAYARIM
  • HP G3 250
  • İ3 4500U
  • İNTEL HD GRAPHİCS
  • 4GB RAM
  • 500GB RAM
  • WİNDOWS 7
 
Son düzenleyen: Moderatör:
Çözüm
Soruna netr28x.sys sebep oluyor. Bu da Ralink 802.11 WiFi sürücüsüdür. Sürücüyü güncelle. Güncellemeyi bilmiyorsan Windows 10'a geç. 7 için destek vermiyoruz.

Kod:
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff8a000d9e618, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff800033386fd, address which referenced memory

Debugging Details:
------------------

GetUlongPtrFromAddress: unable to read from fffff80003304300

KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 1

Key : Analysis.Elapsed.Sec
Value: 1

Key : Analysis.Memory.CommitPeak.Mb
Value: 62


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700

SYSTEM_MANUFACTURER: Hewlett-Packard

SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC

SYSTEM_SKU: J4T62EA#AB8

SYSTEM_VERSION: 0991100000000000000600087

BIOS_VENDOR: Insyde

BIOS_VERSION: F.43

BIOS_DATE: 12/19/2017

BASEBOARD_MANUFACTURER: Hewlett-Packard

BASEBOARD_PRODUCT: 2211

BASEBOARD_VERSION: 86.56

DUMP_TYPE: 2

BUGCHECK_P1: fffff8a000d9e618

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff800033386fd

WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80003304100
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff800033042f0
GetUlongPtrFromAddress: unable to read from fffff800033044a8
GetPointerFromAddress: unable to read from fffff800033040d8
fffff8a000d9e618 Paged pool

CURRENT_IRQL: 2

FAULTING_IP:
nt!HvpDoAllocateCell+101
fffff800`033386fd 89443d00 mov dword ptr [rbp+rdi],eax

CPU_COUNT: 4

CPU_MHZ: 6a0

CPU_VENDOR: GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 45

CPU_STEPPING: 1

CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init)

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT

BUGCHECK_STR: 0xA

PROCESS_NAME: System

ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5

ANALYSIS_SESSION_TIME: 06-17-2019 20:48:20.0473

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

TRAP_FRAME:  fffff80004423950 -- (.trap 0xfffff80004423950)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000000039e8 rbx=0000000000000000 rcx=00000000000005e8
rdx=0000000000000008 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800033386fd rsp=fffff80004423ae0 rbp=0000000000000030
r8=fffff8a000024010 r9=0000000000000005 r10=fffff8a000d9e000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!HvpDoAllocateCell+0x101:
fffff800`033386fd 89443d00 mov dword ptr [rbp+rdi],eax ss:0018:00000000`00000030=????????
Resetting default scope

LAST_CONTROL_TRANSFER: from fffff80003108f69 to fffff800030faba0

STACK_TEXT:
fffff800`04423808 fffff800`03108f69 : 00000000`0000000a fffff8a0`00d9e618 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff800`04423810 fffff800`03106d88 : 00000000`00000001 fffff8a0`00d9e618 00000000`00000000 fffff8a0`00024010 : nt!KiBugCheckDispatch+0x69
fffff800`04423950 fffff800`033386fd : fffff8a0`00024010 fffff8a0`00024010 fffff8a0`00053ae0 00000000`00000000 : nt!KiPageFault+0x448
fffff800`04423ae0 fffff800`0337ad0d : fffff8a0`00024010 00000000`00000000 00000000`00000000 00000000`ffffffff : nt!HvpDoAllocateCell+0x101
fffff800`04423b40 fffff800`0337ab9d : 00000000`00000000 fffff8a0`05585c30 00000000`00000008 fffff800`03368d5c : nt!HvAllocateCell+0x55
fffff800`04423b70 fffff800`0332d4bf : fffff8a0`00024010 fffff8a0`00024010 fffff8a0`05593640 fffff800`04423e18 : nt!CmpAddValueKeyNew+0x69
fffff800`04423c40 fffff800`035136a3 : 01d4f094`f66bc44b fffff800`04423ff0 fffff8a0`0085fa70 00000000`00000000 : nt!CmpSetValueKeyNew+0x77
fffff800`04423c90 fffff800`03338531 : fffff8a0`14bbfca0 fffff800`04423e18 fffffa80`00000004 fffff800`04424210 : nt!CmSetValueKey+0xba3
fffff800`04423dd0 fffff800`03108bd3 : ffffffff`80000bec 00000000`00000002 fffffa80`00000000 fffff800`00000004 : nt!NtSetValueKey+0x349
fffff800`04423f00 fffff800`030fe3b0 : fffff800`0344f272 fffff800`04424248 fffff880`014b9152 00000000`539f0000 : nt!KiSystemServiceCopyEnd+0x13
fffff800`04424108 fffff800`0344f272 : fffff800`04424248 fffff880`014b9152 00000000`539f0000 fffff800`04424270 : nt!KiServiceLinkage
fffff800`04424110 fffff880`014c0d96 : 00000000`00000004 fffffa80`071c5250 00000000`00000000 00000000`000007ff : nt!RtlWriteRegistryValue+0x62
fffff800`04424170 fffff880`04f2698d : fffff800`04424270 fffff880`05135c28 00000000`00000000 00000000`00000000 : ndis!NdisWriteConfiguration+0x156
fffff800`044241d0 fffff800`04424270 : fffff880`05135c28 00000000`00000000 00000000`00000000 fffff800`001801a9 : netr28x+0x4b98d
fffff800`044241d8 fffff880`05135c28 : 00000000`00000000 00000000`00000000 fffff800`001801a9 fffffa80`059cb1a0 : 0xfffff800`04424270
fffff800`044241e0 00000000`00000000 : 00000000`00000000 fffff800`001801a9 fffffa80`059cb1a0 fffff800`00000000 : netr28x+0x25ac28


THREAD_SHA1_HASH_MOD_FUNC: 80858fdf941bd645ff48b6997b30f63ac59926fb

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 394aafee51f76470053fa2102b9df0f0f7df42a3

THREAD_SHA1_HASH_MOD: 5d50876435db08b990ce5928fe5c90526c26b16c

FOLLOWUP_IP:
netr28x+4b98d
fffff880`04f2698d ?? ???

SYMBOL_STACK_INDEX: d

SYMBOL_NAME: netr28x+4b98d

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: netr28x

IMAGE_NAME:  netr28x.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a

STACK_COMMAND: .thread ; .cxr ; kb

FAILURE_BUCKET_ID: X64_0xA_netr28x+4b98d

BUCKET_ID: X64_0xA_netr28x+4b98d

PRIMARY_PROBLEM_CLASS: X64_0xA_netr28x+4b98d

TARGET_TIME: 2019-04-11T18:32:48.000Z

OSBUILD: 7601

OSSERVICEPACK: 1000

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 7

OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2019-03-06 05:38:53

BUILDDATESTAMP_STR: 190305-1700

BUILDLAB_STR: win7sp1_ldr_escrow

BUILDOSVER_STR: 6.1.7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700

ANALYSIS_SESSION_ELAPSED_TIME: 7ae

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:x64_0xa_netr28x+4b98d

FAILURE_ID_HASH: {a6eb3f60-a5c3-0bd6-051c-41bf4427925d}

Followup: MachineOwner
---------


INVALID_PROCESS_ATTACH_ATTEMPT (5)
Arguments:
Arg1: fffffa80042b49b0
Arg2: fffffa80050a0160
Arg3: 0000000000000000
Arg4: 0000000000000001

Debugging Details:
------------------

GetUlongPtrFromAddress: unable to read from fffff800032a0300

KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 2

Key : Analysis.Elapsed.Sec
Value: 2

Key : Analysis.Memory.CommitPeak.Mb
Value: 62


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700

SYSTEM_MANUFACTURER: Hewlett-Packard

SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC

SYSTEM_SKU: J4T62EA#AB8

SYSTEM_VERSION: 0991100000000000000600087

BIOS_VENDOR: Insyde

BIOS_VERSION: F.43

BIOS_DATE: 12/19/2017

BASEBOARD_MANUFACTURER: Hewlett-Packard

BASEBOARD_PRODUCT: 2211

BASEBOARD_VERSION: 86.56

DUMP_TYPE: 2

BUGCHECK_P1: fffffa80042b49b0

BUGCHECK_P2: fffffa80050a0160

BUGCHECK_P3: 0

BUGCHECK_P4: 1

CPU_COUNT: 4

CPU_MHZ: 6a0

CPU_VENDOR: GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 45

CPU_STEPPING: 1

CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init)

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT

BUGCHECK_STR: 0x5

PROCESS_NAME: PointBlank.exe

CURRENT_IRQL: 2

ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5

ANALYSIS_SESSION_TIME: 06-17-2019 20:57:04.0108

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

DPC_STACK_BASE: FFFFF80004428FB0

LOCK_ADDRESS: fffff80003273240 -- (!locks fffff80003273240)
Cannot get _ERESOURCE type

Resource @ nt!PiEngineLock (0xfffff80003273240) Available
1 total locks

PNP_TRIAGE_DATA:
Lock address : 0xfffff80003273240
Thread Count : 0
Thread address: 0x0000000000000000
Thread wait : 0x0

LAST_CONTROL_TRANSFER: from fffff80003045602 to fffff80003096ba0

STACK_TEXT:
fffff800`04427cc8 fffff800`03045602 : 00000000`00000005 fffffa80`042b49b0 fffffa80`050a0160 00000000`00000000 : nt!KeBugCheckEx
fffff800`04427cd0 fffff800`032ee127 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeStackAttachProcess+0x52
fffff800`04427d50 fffff800`032ee4bf : 00000000`00000000 fffff8a0`00000000 fffff8a0`00001910 00000000`00000000 : nt!ObpDecrementHandleCount+0x177
fffff800`04427dd0 fffff800`032ee1e4 : 00000000`00000d08 fffffa80`050a0160 fffff8a0`00001910 00000000`00000d08 : nt!ObpCloseHandleTableEntry+0xaf
fffff800`04427e60 fffff800`030a4bd3 : fffffa80`04b87b50 fffff800`04427f30 fffff800`03358230 fffff800`032e476a : nt!ObpCloseHandle+0x94
fffff800`04427eb0 fffff800`0309a3b0 : fffff800`03331da3 fffffa80`04ea4a10 fffff800`03358230 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
fffff800`04428048 fffff800`03331da3 : fffffa80`04ea4a10 fffff800`03358230 00000000`00000000 00000000`00000000 : nt!KiServiceLinkage
fffff800`04428050 fffff800`0333baa8 : fffffa80`04ea4a10 00000000`00000001 fffffa80`04ea2740 00000000`00000000 : nt!PiGetDeviceRegistryProperty+0xab
fffff800`044281b0 fffff800`03330ac0 : fffffa80`04ea4a10 fffffa80`04ea4a10 00000000`00000000 00000000`00000000 : nt!IoGetDeviceProperty+0xbc
fffff800`04428290 fffff800`03341f81 : 00000000`ffff0000 fffffa80`0802b150 fffff880`01553110 fffffa80`05bb6220 : nt!IopOpenOrCreateDeviceRegistryKey+0x14c
fffff800`04428450 fffff880`01598152 : 00000000`c0000001 fffff800`044285e0 00000000`00000000 00000000`000007ff : nt!IoOpenDeviceRegistryKey+0x11
fffff800`04428490 fffff880`01503b34 : fffff800`044285e0 fffff800`044285b8 fffffa80`05c461a0 fffff800`035e0000 : ndis!NdisOpenConfiguration+0xb2
fffff800`044284d0 fffff880`0508b94f : fffffa80`00000000 fffff800`044285e0 fffff880`0529ac28 00000000`00000000 : ndis!NdisOpenConfigurationEx+0xa4
fffff800`04428540 fffffa80`00000000 : fffff800`044285e0 fffff880`0529ac28 00000000`00000000 00000000`001801a9 : netr28x+0x4b94f
fffff800`04428548 fffff800`044285e0 : fffff880`0529ac28 00000000`00000000 00000000`001801a9 fffffa80`05c461a0 : 0xfffffa80`00000000
fffff800`04428550 fffff880`0529ac28 : 00000000`00000000 00000000`001801a9 fffffa80`05c461a0 00000000`00000000 : 0xfffff800`044285e0
fffff800`04428558 00000000`00000000 : 00000000`001801a9 fffffa80`05c461a0 00000000`00000000 fffffa80`0742b540 : netr28x+0x25ac28


THREAD_SHA1_HASH_MOD_FUNC: 1764d353450a941fbc74295279ec02651c3d9814

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: bdc70d393af014c177e84e60c668cc911acaf71f

THREAD_SHA1_HASH_MOD: 9a9dca34541ae91666e3989df373f06b6e683623

FOLLOWUP_IP:
netr28x+4b94f
fffff880`0508b94f ?? ???

SYMBOL_STACK_INDEX: d

SYMBOL_NAME: netr28x+4b94f

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: netr28x

IMAGE_NAME:  netr28x.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a

STACK_COMMAND: .thread ; .cxr ; kb

FAILURE_BUCKET_ID: X64_0x5_netr28x+4b94f

BUCKET_ID: X64_0x5_netr28x+4b94f

PRIMARY_PROBLEM_CLASS: X64_0x5_netr28x+4b94f

TARGET_TIME: 2019-05-01T21:53:50.000Z

OSBUILD: 7601

OSSERVICEPACK: 1000

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 7

OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2019-03-21 04:38:47

BUILDDATESTAMP_STR: 190320-1700

BUILDLAB_STR: win7sp1_ldr_escrow

BUILDOSVER_STR: 6.1.7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700

ANALYSIS_SESSION_ELAPSED_TIME: 8cb

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:x64_0x5_netr28x+4b94f

FAILURE_ID_HASH: {43753b0b-e234-1a01-8468-7eed644d41ea}

Followup:     MachineOwner
INVALID_PROCESS_ATTACH_ATTEMPT (5)
Arguments:
Arg1: fffffa80042ce9b0
Arg2: fffffa8005d11370
Arg3: 0000000000000000
Arg4: 0000000000000001

Debugging Details:
------------------

GetUlongPtrFromAddress: unable to read from fffff800032b3300

KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 2

Key : Analysis.Elapsed.Sec
Value: 2

Key : Analysis.Memory.CommitPeak.Mb
Value: 62


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700

SYSTEM_MANUFACTURER: Hewlett-Packard

SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC

SYSTEM_SKU: J4T62EA#AB8

SYSTEM_VERSION: 0991100000000000000600087

BIOS_VENDOR: Insyde

BIOS_VERSION: F.43

BIOS_DATE: 12/19/2017

BASEBOARD_MANUFACTURER: Hewlett-Packard

BASEBOARD_PRODUCT: 2211

BASEBOARD_VERSION: 86.56

DUMP_TYPE: 2

BUGCHECK_P1: fffffa80042ce9b0

BUGCHECK_P2: fffffa8005d11370

BUGCHECK_P3: 0

BUGCHECK_P4: 1

CPU_COUNT: 4

CPU_MHZ: 6a0

CPU_VENDOR: GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 45

CPU_STEPPING: 1

CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init)

CUSTOMER_CRASH_COUNT: 2

DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT

BUGCHECK_STR: 0x5

PROCESS_NAME: audiodg.exe

CURRENT_IRQL: 2

ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5

ANALYSIS_SESSION_TIME: 06-17-2019 20:49:02.0621

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

DPC_STACK_BASE: FFFFF80000BA2FB0

LOCK_ADDRESS: fffff80003286240 -- (!locks fffff80003286240)
Cannot get _ERESOURCE type

Resource @ nt!PiEngineLock (0xfffff80003286240) Available
1 total locks

PNP_TRIAGE_DATA:
Lock address : 0xfffff80003286240
Thread Count : 0
Thread address: 0x0000000000000000
Thread wait : 0x0

LAST_CONTROL_TRANSFER: from fffff80003058602 to fffff800030a9ba0

STACK_TEXT:
fffff800`00ba1cc8 fffff800`03058602 : 00000000`00000005 fffffa80`042ce9b0 fffffa80`05d11370 00000000`00000000 : nt!KeBugCheckEx
fffff800`00ba1cd0 fffff800`03301127 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeStackAttachProcess+0x52
fffff800`00ba1d50 fffff800`033014bf : 00000000`00000000 fffff8a0`00000000 fffff8a0`00001910 00000000`00000000 : nt!ObpDecrementHandleCount+0x177
fffff800`00ba1dd0 fffff800`033011e4 : 00000000`00000e48 fffffa80`05d11370 fffff8a0`00001910 00000000`00000e48 : nt!ObpCloseHandleTableEntry+0xaf
fffff800`00ba1e60 fffff800`030b7bd3 : fffffa80`05d7ba00 fffff800`00ba1f30 fffff800`0336b230 fffff800`032f776a : nt!ObpCloseHandle+0x94
fffff800`00ba1eb0 fffff800`030ad3b0 : fffff800`03344da3 fffffa80`04e9e060 fffff800`0336b230 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
fffff800`00ba2048 fffff800`03344da3 : fffffa80`04e9e060 fffff800`0336b230 00000000`00000000 00000000`00000000 : nt!KiServiceLinkage
fffff800`00ba2050 fffff800`0334eaa8 : fffffa80`04e9e060 00000000`00000001 fffffa80`04e9d6e0 00000000`00000000 : nt!PiGetDeviceRegistryProperty+0xab
fffff800`00ba21b0 fffff800`03343ac0 : fffffa80`04e9e060 fffffa80`04e9e060 00000000`00000000 00000000`00000000 : nt!IoGetDeviceProperty+0xbc
fffff800`00ba2290 fffff800`03354f81 : 00000000`ffff0000 fffffa80`05086440 fffff880`01482110 fffffa80`05b713f0 : nt!IopOpenOrCreateDeviceRegistryKey+0x14c
fffff800`00ba2450 fffff880`014c7152 : fffffa80`04a3fd50 fffff800`00ba25e0 fffffa80`05f48a78 00000000`000007ff : nt!IoOpenDeviceRegistryKey+0x11
fffff800`00ba2490 fffff880`01432b34 : fffff800`00ba25e0 fffff800`00ba25b8 fffffa80`05b6d1a0 fffff880`014dd21d : ndis!NdisOpenConfiguration+0xb2
fffff800`00ba24d0 fffff880`0512a94f : fffffa80`00000000 fffff800`00ba25e0 fffff880`05339c28 00000000`00000000 : ndis!NdisOpenConfigurationEx+0xa4
fffff800`00ba2540 fffffa80`00000000 : fffff800`00ba25e0 fffff880`05339c28 00000000`00000000 00000000`001801a9 : netr28x+0x4b94f
fffff800`00ba2548 fffff800`00ba25e0 : fffff880`05339c28 00000000`00000000 00000000`001801a9 fffffa80`05b6d1a0 : 0xfffffa80`00000000
fffff800`00ba2550 fffff880`05339c28 : 00000000`00000000 00000000`001801a9 fffffa80`05b6d1a0 fffffa80`00000000 : 0xfffff800`00ba25e0
fffff800`00ba2558 00000000`00000000 : 00000000`001801a9 fffffa80`05b6d1a0 fffffa80`00000000 fffff880`05136e2e : netr28x+0x25ac28


THREAD_SHA1_HASH_MOD_FUNC: 1764d353450a941fbc74295279ec02651c3d9814

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: bdc70d393af014c177e84e60c668cc911acaf71f

THREAD_SHA1_HASH_MOD: 9a9dca34541ae91666e3989df373f06b6e683623

FOLLOWUP_IP:
netr28x+4b94f
fffff880`0512a94f ?? ???

SYMBOL_STACK_INDEX: d

SYMBOL_NAME: netr28x+4b94f

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: netr28x

IMAGE_NAME:  netr28x.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a

STACK_COMMAND: .thread ; .cxr ; kb

FAILURE_BUCKET_ID: X64_0x5_netr28x+4b94f

BUCKET_ID: X64_0x5_netr28x+4b94f

PRIMARY_PROBLEM_CLASS: X64_0x5_netr28x+4b94f

TARGET_TIME: 2019-04-27T20:53:09.000Z

OSBUILD: 7601

OSSERVICEPACK: 1000

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 7

OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2019-03-21 04:38:47

BUILDDATESTAMP_STR: 190320-1700

BUILDLAB_STR: win7sp1_ldr_escrow

BUILDOSVER_STR: 6.1.7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700

ANALYSIS_SESSION_ELAPSED_TIME: 89c

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:x64_0x5_netr28x+4b94f

FAILURE_ID_HASH: {43753b0b-e234-1a01-8468-7eed644d41ea}

Followup: MachineOwner
---------

INVALID_PROCESS_ATTACH_ATTEMPT (5)
Arguments:
Arg1: fffffa80042b49b0
Arg2: fffffa8004ee55f0
Arg3: 0000000000000000
Arg4: 0000000000000001

Debugging Details:
------------------

GetUlongPtrFromAddress: unable to read from fffff800032b0300

KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 2

Key : Analysis.Elapsed.Sec
Value: 2

Key : Analysis.Memory.CommitPeak.Mb
Value: 62


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700

SYSTEM_MANUFACTURER: Hewlett-Packard

SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC

SYSTEM_SKU: J4T62EA#AB8

SYSTEM_VERSION: 0991100000000000000600087

BIOS_VENDOR: Insyde

BIOS_VERSION: F.43

BIOS_DATE: 12/19/2017

BASEBOARD_MANUFACTURER: Hewlett-Packard

BASEBOARD_PRODUCT: 2211

BASEBOARD_VERSION: 86.56

DUMP_TYPE: 2

BUGCHECK_P1: fffffa80042b49b0

BUGCHECK_P2: fffffa8004ee55f0

BUGCHECK_P3: 0

BUGCHECK_P4: 1

CPU_COUNT: 4

CPU_MHZ: 6a0

CPU_VENDOR: GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 45

CPU_STEPPING: 1

CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init)

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT

BUGCHECK_STR: 0x5

PROCESS_NAME: PointBlank.exe

CURRENT_IRQL: 2

ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5

ANALYSIS_SESSION_TIME: 06-17-2019 20:48:58.0829

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

DPC_STACK_BASE: FFFFF8000441FFB0

LOCK_ADDRESS: fffff80003283240 -- (!locks fffff80003283240)
Cannot get _ERESOURCE type

Resource @ nt!PiEngineLock (0xfffff80003283240) Available
1 total locks

PNP_TRIAGE_DATA:
Lock address : 0xfffff80003283240
Thread Count : 0
Thread address: 0x0000000000000000
Thread wait : 0x0

LAST_CONTROL_TRANSFER: from fffff80003055602 to fffff800030a6ba0

STACK_TEXT:
fffff800`0441ecc8 fffff800`03055602 : 00000000`00000005 fffffa80`042b49b0 fffffa80`04ee55f0 00000000`00000000 : nt!KeBugCheckEx
fffff800`0441ecd0 fffff800`032fe127 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeStackAttachProcess+0x52
fffff800`0441ed50 fffff800`032fe4bf : 00000000`00000000 fffff8a0`00000000 fffff8a0`00001910 00000000`00000000 : nt!ObpDecrementHandleCount+0x177
fffff800`0441edd0 fffff800`032fe1e4 : 00000000`00000a80 fffffa80`04ee55f0 fffff8a0`00001910 00000000`00000a80 : nt!ObpCloseHandleTableEntry+0xaf
fffff800`0441ee60 fffff800`030b4bd3 : fffffa80`0861e940 fffff800`0441ef30 fffff800`03368230 fffff800`032f476a : nt!ObpCloseHandle+0x94
fffff800`0441eeb0 fffff800`030aa3b0 : fffff800`03341da3 fffffa80`04d31a10 fffff800`03368230 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
fffff800`0441f048 fffff800`03341da3 : fffffa80`04d31a10 fffff800`03368230 00000000`00000000 00000000`00000000 : nt!KiServiceLinkage
fffff800`0441f050 fffff800`0334baa8 : fffffa80`04d31a10 00000000`00000001 fffffa80`04d2d740 00000000`00000000 : nt!PiGetDeviceRegistryProperty+0xab
fffff800`0441f1b0 fffff800`03340ac0 : fffffa80`04d31a10 fffffa80`04d31a10 00000000`00000000 00000000`00000000 : nt!IoGetDeviceProperty+0xbc
fffff800`0441f290 fffff800`03351f81 : 00000000`ffff0000 fffffa80`046a8bd0 fffff880`014c6110 fffffa80`05a70cf0 : nt!IopOpenOrCreateDeviceRegistryKey+0x14c
fffff800`0441f450 fffff880`0150b152 : fffffa80`07393890 fffff800`0441f5e0 00000000`0000001f 00000000`000007ff : nt!IoOpenDeviceRegistryKey+0x11
fffff800`0441f490 fffff880`01476b34 : fffff800`0441f5e0 fffff800`0441f5b8 fffffa80`05a6f1a0 fffff800`035f7be3 : ndis!NdisOpenConfiguration+0xb2
fffff800`0441f4d0 fffff880`04e7694f : fffffa80`00000000 fffff800`0441f5e0 fffff880`05085c28 00000000`00000000 : ndis!NdisOpenConfigurationEx+0xa4
fffff800`0441f540 fffffa80`00000000 : fffff800`0441f5e0 fffff880`05085c28 00000000`00000000 00000000`001801a9 : netr28x+0x4b94f
fffff800`0441f548 fffff800`0441f5e0 : fffff880`05085c28 00000000`00000000 00000000`001801a9 fffffa80`05a6f1a0 : 0xfffffa80`00000000
fffff800`0441f550 fffff880`05085c28 : 00000000`00000000 00000000`001801a9 fffffa80`05a6f1a0 00000000`00000000 : 0xfffff800`0441f5e0
fffff800`0441f558 00000000`00000000 : 00000000`001801a9 fffffa80`05a6f1a0 00000000`00000000 fffffa80`0452e670 : netr28x+0x25ac28


THREAD_SHA1_HASH_MOD_FUNC: 1764d353450a941fbc74295279ec02651c3d9814

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: bdc70d393af014c177e84e60c668cc911acaf71f

THREAD_SHA1_HASH_MOD: 9a9dca34541ae91666e3989df373f06b6e683623

FOLLOWUP_IP:
netr28x+4b94f
fffff880`04e7694f ?? ???

SYMBOL_STACK_INDEX: d

SYMBOL_NAME: netr28x+4b94f

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: netr28x

IMAGE_NAME:  netr28x.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a

STACK_COMMAND: .thread ; .cxr ; kb

FAILURE_BUCKET_ID: X64_0x5_netr28x+4b94f

BUCKET_ID: X64_0x5_netr28x+4b94f

PRIMARY_PROBLEM_CLASS: X64_0x5_netr28x+4b94f

TARGET_TIME: 2019-04-21T09:57:22.000Z

OSBUILD: 7601

OSSERVICEPACK: 1000

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 7

OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2019-03-21 04:38:47

BUILDDATESTAMP_STR: 190320-1700

BUILDLAB_STR: win7sp1_ldr_escrow

BUILDOSVER_STR: 6.1.7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700

ANALYSIS_SESSION_ELAPSED_TIME: 8dc

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:x64_0x5_netr28x+4b94f

FAILURE_ID_HASH: {43753b0b-e234-1a01-8468-7eed644d41ea}

Followup: MachineOwner
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff8a000f95c5c, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8000334077c, address which referenced memory

Debugging Details:
------------------

GetUlongPtrFromAddress: unable to read from fffff800032f7300

KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 1

Key : Analysis.Elapsed.Sec
Value: 2

Key : Analysis.Memory.CommitPeak.Mb
Value: 62


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700

SYSTEM_MANUFACTURER: Hewlett-Packard

SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC

SYSTEM_SKU: J4T62EA#AB8

SYSTEM_VERSION: 0991100000000000000600087

BIOS_VENDOR: Insyde

BIOS_VERSION: F.43

BIOS_DATE: 12/19/2017

BASEBOARD_MANUFACTURER: Hewlett-Packard

BASEBOARD_PRODUCT: 2211

BASEBOARD_VERSION: 86.56

DUMP_TYPE: 2

BUGCHECK_P1: fffff8a000f95c5c

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8000334077c

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800032f7100
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff800032f72f0
GetUlongPtrFromAddress: unable to read from fffff800032f74a8
GetPointerFromAddress: unable to read from fffff800032f70d8
fffff8a000f95c5c Paged pool

CURRENT_IRQL: 2

FAULTING_IP:
nt!CmpFindValueByNameFromCache+12c
fffff800`0334077c 41f6401001 test byte ptr [r8+10h],1

CPU_COUNT: 4

CPU_MHZ: 6a0

CPU_VENDOR: GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 45

CPU_STEPPING: 1

CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init)

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT

BUGCHECK_STR: 0xA

PROCESS_NAME: System

ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5

ANALYSIS_SESSION_TIME: 06-17-2019 20:48:55.0594

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

DPC_STACK_BASE: FFFFF80000BA2FB0

TRAP_FRAME:  fffff80000ba1d00 -- (.trap 0xfffff80000ba1d00)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000c64c48 rbx=0000000000000000 rcx=fffff80000ba1fa1
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8000334077c rsp=fffff80000ba1e90 rbp=fffff80000ba2360
r8=fffff8a000f95c4c r9=000000000000ffff r10=fffffa8005aaacfc
r11=fffff8a0018b9b46 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!CmpFindValueByNameFromCache+0x12c:
fffff800`0334077c 41f6401001 test byte ptr [r8+10h],1 ds:fffff8a0`00f95c5c=01
Resetting default scope

LAST_CONTROL_TRANSFER: from fffff800030fbf69 to fffff800030edba0

STACK_TEXT:
fffff800`00ba1bb8 fffff800`030fbf69 : 00000000`0000000a fffff8a0`00f95c5c 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff800`00ba1bc0 fffff800`030f9d88 : 00000000`00000000 fffff8a0`00f95c5c fffffa80`05191000 fffff8a0`00024010 : nt!KiBugCheckDispatch+0x69
fffff800`00ba1d00 fffff800`0334077c : fffff8a0`00024010 fffff8a0`00024010 fffff8a0`00048c80 00000000`00000000 : nt!KiPageFault+0x448
fffff800`00ba1e90 fffff800`03323c38 : fffff8a0`15bf1de8 fffff800`00ba2188 fffff800`00ba1fd0 fffff800`00ba1fb8 : nt!CmpFindValueByNameFromCache+0x12c
fffff800`00ba1f60 fffff800`035061e7 : fffff8a0`15bf1de8 01d4f7b8`449491c9 fffff8a0`15bf1de8 00000000`00000000 : nt!CmpCompareNewValueDataAgainstKCBCache+0x78
fffff800`00ba2000 fffff800`0332b531 : fffff8a0`1f297040 fffff800`00ba2188 fffffa80`00000004 fffff800`00ba2580 : nt!CmSetValueKey+0x6a7
fffff800`00ba2140 fffff800`030fbbd3 : ffffffff`80000cc8 00000000`00000002 fffffa80`00000000 fffff800`00000004 : nt!NtSetValueKey+0x349
fffff800`00ba2270 fffff800`030f13b0 : fffff800`034422a2 fffff800`00ba25b8 fffff880`01514152 00000000`c0000001 : nt!KiSystemServiceCopyEnd+0x13
fffff800`00ba2478 fffff800`034422a2 : fffff800`00ba25b8 fffff880`01514152 00000000`c0000001 fffff800`00ba25e0 : nt!KiServiceLinkage
fffff800`00ba2480 fffff880`0151bd96 : 00000000`00000004 fffffa80`05aaacf0 00000100`00000000 00000000`000007ff : nt!RtlWriteRegistryValue+0x62
fffff800`00ba24e0 fffff880`0514a98d : fffff800`00ba25e0 fffff880`05359c28 00000000`00000000 00000000`00000000 : ndis!NdisWriteConfiguration+0x156
fffff800`00ba2540 fffff800`00ba25e0 : fffff880`05359c28 00000000`00000000 00000000`00000000 fffffa80`001801a9 : netr28x+0x4b98d
fffff800`00ba2548 fffff880`05359c28 : 00000000`00000000 00000000`00000000 fffffa80`001801a9 fffffa80`05b411a0 : 0xfffff800`00ba25e0
fffff800`00ba2550 00000000`00000000 : 00000000`00000000 fffffa80`001801a9 fffffa80`05b411a0 00000000`00000000 : netr28x+0x25ac28


THREAD_SHA1_HASH_MOD_FUNC: 935105e89958188e75032d802c31088ef212f1d5

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: d6275099b99a3ef75c037e31f081aba5025e8f89

THREAD_SHA1_HASH_MOD: 7921e317582c7f98a7f13cfbcd3c02a86fdcafec

FOLLOWUP_IP:
netr28x+4b98d
fffff880`0514a98d ?? ???

SYMBOL_STACK_INDEX: b

SYMBOL_NAME: netr28x+4b98d

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: netr28x

IMAGE_NAME:  netr28x.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a

STACK_COMMAND: .thread ; .cxr ; kb

FAILURE_BUCKET_ID: X64_0xA_netr28x+4b98d

BUCKET_ID: X64_0xA_netr28x+4b98d

PRIMARY_PROBLEM_CLASS: X64_0xA_netr28x+4b98d

TARGET_TIME: 2019-04-20T20:33:09.000Z

OSBUILD: 7601

OSSERVICEPACK: 1000

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 7

OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2019-03-21 04:38:47

BUILDDATESTAMP_STR: 190320-1700

BUILDLAB_STR: win7sp1_ldr_escrow

BUILDOSVER_STR: 6.1.7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700

ANALYSIS_SESSION_ELAPSED_TIME: 7e6

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:x64_0xa_netr28x+4b98d

FAILURE_ID_HASH: {a6eb3f60-a5c3-0bd6-051c-41bf4427925d}

Followup: MachineOwner
---------


INVALID_PROCESS_ATTACH_ATTEMPT (5)
Arguments:
Arg1: fffffa80042d09b0
Arg2: fffffa80075e8060
Arg3: 0000000000000000
Arg4: 0000000000000001

Debugging Details:
------------------

GetUlongPtrFromAddress: unable to read from fffff800032af300

KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 2

Key : Analysis.Elapsed.Sec
Value: 2

Key : Analysis.Memory.CommitPeak.Mb
Value: 62


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700

SYSTEM_MANUFACTURER: Hewlett-Packard

SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC

SYSTEM_SKU: J4T62EA#AB8

SYSTEM_VERSION: 0991100000000000000600087

BIOS_VENDOR: Insyde

BIOS_VERSION: F.43

BIOS_DATE: 12/19/2017

BASEBOARD_MANUFACTURER: Hewlett-Packard

BASEBOARD_PRODUCT: 2211

BASEBOARD_VERSION: 86.56

DUMP_TYPE: 2

BUGCHECK_P1: fffffa80042d09b0

BUGCHECK_P2: fffffa80075e8060

BUGCHECK_P3: 0

BUGCHECK_P4: 1

CPU_COUNT: 4

CPU_MHZ: 6a0

CPU_VENDOR: GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 45

CPU_STEPPING: 1

CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init)

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT

BUGCHECK_STR: 0x5

PROCESS_NAME: audiodg.exe

CURRENT_IRQL: 2

ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5

ANALYSIS_SESSION_TIME: 06-17-2019 20:48:52.0836

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

DPC_STACK_BASE: FFFFF8000441FFB0

LOCK_ADDRESS: fffff80003282240 -- (!locks fffff80003282240)
Cannot get _ERESOURCE type

Resource @ nt!PiEngineLock (0xfffff80003282240) Available
1 total locks

PNP_TRIAGE_DATA:
Lock address : 0xfffff80003282240
Thread Count : 0
Thread address: 0x0000000000000000
Thread wait : 0x0

LAST_CONTROL_TRANSFER: from fffff800030545f2 to fffff800030a5ba0

STACK_TEXT:
fffff800`0441ecc8 fffff800`030545f2 : 00000000`00000005 fffffa80`042d09b0 fffffa80`075e8060 00000000`00000000 : nt!KeBugCheckEx
fffff800`0441ecd0 fffff800`032fd127 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeStackAttachProcess+0x52
fffff800`0441ed50 fffff800`032fd4bf : 00000000`00000000 fffff8a0`00000000 fffff8a0`00001910 00000000`00000000 : nt!ObpDecrementHandleCount+0x177
fffff800`0441edd0 fffff800`032fd1e4 : 00000000`000007c8 fffffa80`075e8060 fffff8a0`00001910 00000000`000007c8 : nt!ObpCloseHandleTableEntry+0xaf
fffff800`0441ee60 fffff800`030b3bd3 : fffffa80`044dab50 fffff800`0441ef30 fffff800`03367200 fffff800`032f376a : nt!ObpCloseHandle+0x94
fffff800`0441eeb0 fffff800`030a93b0 : fffff800`03340d73 fffffa80`04ddc060 fffff800`03367200 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
fffff800`0441f048 fffff800`03340d73 : fffffa80`04ddc060 fffff800`03367200 00000000`00000000 00000000`00000000 : nt!KiServiceLinkage
fffff800`0441f050 fffff800`0334aa78 : fffffa80`04ddc060 00000000`00000001 fffffa80`04dd96e0 00000000`00000000 : nt!PiGetDeviceRegistryProperty+0xab
fffff800`0441f1b0 fffff800`0333fa90 : fffffa80`04ddc060 fffffa80`04ddc060 00000000`00000000 00000000`00000000 : nt!IoGetDeviceProperty+0xbc
fffff800`0441f290 fffff800`03350f51 : 00000000`ffff0000 fffffa80`05a69770 fffff880`014e7110 fffffa80`05ca3270 : nt!IopOpenOrCreateDeviceRegistryKey+0x14c
fffff800`0441f450 fffff880`0152c152 : fffffa80`071bfdc0 fffff800`0441f5e0 00000000`0000001f 00000000`000007ff : nt!IoOpenDeviceRegistryKey+0x11
fffff800`0441f490 fffff880`01497b34 : fffff800`0441f5e0 fffff800`0441f5b8 fffffa80`05c0a1a0 fffff880`0646eab0 : ndis!NdisOpenConfiguration+0xb2
fffff800`0441f4d0 fffff880`04f0c94f : fffffa80`00000000 fffff800`0441f5e0 fffff880`0511bc28 00000000`00000000 : ndis!NdisOpenConfigurationEx+0xa4
fffff800`0441f540 fffffa80`00000000 : fffff800`0441f5e0 fffff880`0511bc28 00000000`00000000 fffffa80`001801a9 : netr28x+0x4b94f
fffff800`0441f548 fffff800`0441f5e0 : fffff880`0511bc28 00000000`00000000 fffffa80`001801a9 fffffa80`05c0a1a0 : 0xfffffa80`00000000
fffff800`0441f550 fffff880`0511bc28 : 00000000`00000000 fffffa80`001801a9 fffffa80`05c0a1a0 00000000`00000000 : 0xfffff800`0441f5e0
fffff800`0441f558 00000000`00000000 : fffffa80`001801a9 fffffa80`05c0a1a0 00000000`00000000 fffff880`00e5028c : netr28x+0x25ac28


THREAD_SHA1_HASH_MOD_FUNC: 1764d353450a941fbc74295279ec02651c3d9814

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: bdc70d393af014c177e84e60c668cc911acaf71f

THREAD_SHA1_HASH_MOD: 9a9dca34541ae91666e3989df373f06b6e683623

FOLLOWUP_IP:
netr28x+4b94f
fffff880`04f0c94f ?? ???

SYMBOL_STACK_INDEX: d

SYMBOL_NAME: netr28x+4b94f

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: netr28x

IMAGE_NAME:  netr28x.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a

STACK_COMMAND: .thread ; .cxr ; kb

FAILURE_BUCKET_ID: X64_0x5_netr28x+4b94f

BUCKET_ID: X64_0x5_netr28x+4b94f

PRIMARY_PROBLEM_CLASS: X64_0x5_netr28x+4b94f

TARGET_TIME: 2019-04-11T15:07:27.000Z

OSBUILD: 7601

OSSERVICEPACK: 1000

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 7

OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2019-03-06 05:38:53

BUILDDATESTAMP_STR: 190305-1700

BUILDLAB_STR: win7sp1_ldr_escrow

BUILDOSVER_STR: 6.1.7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700

ANALYSIS_SESSION_ELAPSED_TIME: 8c6

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:x64_0x5_netr28x+4b94f

FAILURE_ID_HASH: {43753b0b-e234-1a01-8468-7eed644d41ea}

Followup:     MachineOwner


INVALID_PROCESS_ATTACH_ATTEMPT (5)
Arguments:
Arg1: fffffa80042b59b0
Arg2: fffffa8004c74b00
Arg3: 0000000000000001
Arg4: 0000000000000001

Debugging Details:
------------------

GetUlongPtrFromAddress: unable to read from fffff800030f3300

KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 2

Key : Analysis.Elapsed.Sec
Value: 2

Key : Analysis.Memory.CommitPeak.Mb
Value: 62


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700

SYSTEM_MANUFACTURER: Hewlett-Packard

SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC

SYSTEM_SKU: J4T62EA#AB8

SYSTEM_VERSION: 0991100000000000000600087

BIOS_VENDOR: Insyde

BIOS_VERSION: F.43

BIOS_DATE: 12/19/2017

BASEBOARD_MANUFACTURER: Hewlett-Packard

BASEBOARD_PRODUCT: 2211

BASEBOARD_VERSION: 86.56

DUMP_TYPE: 2

BUGCHECK_P1: fffffa80042b59b0

BUGCHECK_P2: fffffa8004c74b00

BUGCHECK_P3: 1

BUGCHECK_P4: 1

CPU_COUNT: 4

CPU_MHZ: 6a0

CPU_VENDOR: GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 45

CPU_STEPPING: 1

CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init)

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT

BUGCHECK_STR: 0x5

PROCESS_NAME: chrome.exe

CURRENT_IRQL: 2

ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5

ANALYSIS_SESSION_TIME: 06-17-2019 20:48:49.0152

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

DPC_STACK_BASE: FFFFF80000BA2FB0

LOCK_ADDRESS: fffff800030c6240 -- (!locks fffff800030c6240)
Cannot get _ERESOURCE type

Resource @ nt!PiEngineLock (0xfffff800030c6240) Available
1 total locks

PNP_TRIAGE_DATA:
Lock address : 0xfffff800030c6240
Thread Count : 0
Thread address: 0x0000000000000000
Thread wait : 0x0

LAST_CONTROL_TRANSFER: from fffff80002e985f2 to fffff80002ee9ba0

STACK_TEXT:
fffff800`00ba1cc8 fffff800`02e985f2 : 00000000`00000005 fffffa80`042b59b0 fffffa80`04c74b00 00000000`00000001 : nt!KeBugCheckEx
fffff800`00ba1cd0 fffff800`03141127 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeStackAttachProcess+0x52
fffff800`00ba1d50 fffff800`031414bf : 00000000`00000000 fffff8a0`00000000 fffff8a0`00001910 00000000`00000000 : nt!ObpDecrementHandleCount+0x177
fffff800`00ba1dd0 fffff800`031411e4 : 00000000`000008e4 fffffa80`04c74b00 fffff8a0`00001910 00000000`000008e4 : nt!ObpCloseHandleTableEntry+0xaf
fffff800`00ba1e60 fffff800`02ef7bd3 : fffffa80`076a6b50 fffff800`00ba1f30 fffff800`031ab200 fffff800`0313776a : nt!ObpCloseHandle+0x94
fffff800`00ba1eb0 fffff800`02eed3b0 : fffff800`03184d73 fffffa80`04e1e060 fffff800`031ab200 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
fffff800`00ba2048 fffff800`03184d73 : fffffa80`04e1e060 fffff800`031ab200 00000000`00000000 00000000`00000000 : nt!KiServiceLinkage
fffff800`00ba2050 fffff800`0318ea78 : fffffa80`04e1e060 00000000`00000001 fffffa80`04e1d6e0 00000000`00000000 : nt!PiGetDeviceRegistryProperty+0xab
fffff800`00ba21b0 fffff800`03183a90 : fffffa80`04e1e060 fffffa80`04e1e060 00000000`00000000 00000000`00000000 : nt!IoGetDeviceProperty+0xbc
fffff800`00ba2290 fffff800`03194f51 : 00000000`ffff0000 fffffa80`07df09f0 fffff880`01480110 fffffa80`05cfe910 : nt!IopOpenOrCreateDeviceRegistryKey+0x14c
fffff800`00ba2450 fffff880`014c5152 : fffffa80`080038e0 fffff800`00ba25e0 fffffa80`0700aa78 00000000`000007ff : nt!IoOpenDeviceRegistryKey+0x11
fffff800`00ba2490 fffff880`01430b34 : fffff800`00ba25e0 fffff800`00ba25b8 fffffa80`055e31a0 fffff880`014db21d : ndis!NdisOpenConfiguration+0xb2
fffff800`00ba24d0 fffff880`04e5194f : 00000000`00000000 fffff800`00ba25e0 fffff880`05060c28 00000000`00000000 : ndis!NdisOpenConfigurationEx+0xa4
fffff800`00ba2540 00000000`00000000 : fffff800`00ba25e0 fffff880`05060c28 00000000`00000000 fffffa80`001801a9 : netr28x+0x4b94f


THREAD_SHA1_HASH_MOD_FUNC: ae5746727567d6f3e980a5bab83b7524a5dc9ee8

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: a4491f04e0c588cecd320ea5c66c026862f569ea

THREAD_SHA1_HASH_MOD: 34d7ba38146ecb972065c22fa7203d72f73eccb4

FOLLOWUP_IP:
netr28x+4b94f
fffff880`04e5194f ?? ???

SYMBOL_STACK_INDEX: d

SYMBOL_NAME: netr28x+4b94f

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: netr28x

IMAGE_NAME:  netr28x.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a

STACK_COMMAND: .thread ; .cxr ; kb

FAILURE_BUCKET_ID: X64_0x5_netr28x+4b94f

BUCKET_ID: X64_0x5_netr28x+4b94f

PRIMARY_PROBLEM_CLASS: X64_0x5_netr28x+4b94f

TARGET_TIME: 2019-04-11T14:09:37.000Z

OSBUILD: 7601

OSSERVICEPACK: 1000

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 7

OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2019-03-06 05:38:53

BUILDDATESTAMP_STR: 190305-1700

BUILDLAB_STR: win7sp1_ldr_escrow

BUILDOSVER_STR: 6.1.7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700

ANALYSIS_SESSION_ELAPSED_TIME: 941

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:x64_0x5_netr28x+4b94f

FAILURE_ID_HASH: {43753b0b-e234-1a01-8468-7eed644d41ea}

Followup: MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff8a002085398, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80003ae56fd, address which referenced memory

Debugging Details:
------------------

GetUlongPtrFromAddress: unable to read from fffff80003ab1300

KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 1

Key : Analysis.Elapsed.Sec
Value: 1

Key : Analysis.Memory.CommitPeak.Mb
Value: 62


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700

SYSTEM_MANUFACTURER: Hewlett-Packard

SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC

SYSTEM_SKU: J4T62EA#AB8

SYSTEM_VERSION: 0991100000000000000600087

BIOS_VENDOR: Insyde

BIOS_VERSION: F.43

BIOS_DATE: 12/19/2017

BASEBOARD_MANUFACTURER: Hewlett-Packard

BASEBOARD_PRODUCT: 2211

BASEBOARD_VERSION: 86.56

DUMP_TYPE: 2

BUGCHECK_P1: fffff8a002085398

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff80003ae56fd

WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80003ab1100
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff80003ab12f0
GetUlongPtrFromAddress: unable to read from fffff80003ab14a8
GetPointerFromAddress: unable to read from fffff80003ab10d8
fffff8a002085398 Paged pool

CURRENT_IRQL: 2

FAULTING_IP:
nt!HvpDoAllocateCell+101
fffff800`03ae56fd 89443d00 mov dword ptr [rbp+rdi],eax

CPU_COUNT: 4

CPU_MHZ: 6a0

CPU_VENDOR: GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 45

CPU_STEPPING: 1

CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init)

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT

BUGCHECK_STR: 0xA

PROCESS_NAME: System

ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5

ANALYSIS_SESSION_TIME: 06-17-2019 20:48:46.0248

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

TRAP_FRAME:  fffff80004c1a950 -- (.trap 0xfffff80004c1a950)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000008 rbx=0000000000000000 rcx=0000000000000368
rdx=0000000000000002 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80003ae56fd rsp=fffff80004c1aae0 rbp=0000000000000030
r8=fffff8a000024010 r9=0000000000000005 r10=fffff8a002085000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!HvpDoAllocateCell+0x101:
fffff800`03ae56fd 89443d00 mov dword ptr [rbp+rdi],eax ss:0018:00000000`00000030=????????
Resetting default scope

LAST_CONTROL_TRANSFER: from fffff800038b5f69 to fffff800038a7ba0

STACK_TEXT:
fffff800`04c1a808 fffff800`038b5f69 : 00000000`0000000a fffff8a0`02085398 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff800`04c1a810 fffff800`038b3d88 : 00000000`00000001 fffff8a0`02085398 00000000`00000000 fffff8a0`00024010 : nt!KiBugCheckDispatch+0x69
fffff800`04c1a950 fffff800`03ae56fd : fffff8a0`00024010 fffff8a0`00024010 fffff8a0`0003b420 fffff800`00000000 : nt!KiPageFault+0x448
fffff800`04c1aae0 fffff800`03b27d1d : fffff8a0`00024010 00000000`00000000 00000000`00000000 00000000`ffffffff : nt!HvpDoAllocateCell+0x101
fffff800`04c1ab40 fffff800`03b27bad : 00000000`00000000 fffff8a0`018bcc30 00000000`00000008 fffff800`03b15d5c : nt!HvAllocateCell+0x55
fffff800`04c1ab70 fffff800`03ada4bf : fffff8a0`00024010 fffff8a0`00024010 fffff8a0`018ca640 fffff800`04c1ae18 : nt!CmpAddValueKeyNew+0x69
fffff800`04c1ac40 fffff800`03cc06e3 : 01d501ff`f5623883 fffff800`04c1aff0 fffff8a0`04468820 00000000`00000000 : nt!CmpSetValueKeyNew+0x77
fffff800`04c1ac90 fffff800`03ae5531 : fffff8a0`0506b140 fffff800`04c1ae18 fffffa80`00000004 fffff800`04c1b210 : nt!CmSetValueKey+0xba3
fffff800`04c1add0 fffff800`038b5bd3 : ffffffff`80000dc4 00000000`00000002 fffffa80`00000000 fffff800`00000004 : nt!NtSetValueKey+0x349
fffff800`04c1af00 fffff800`038ab3b0 : fffff800`03bfc2a2 fffff800`04c1b248 fffff880`01525152 fffffa80`00040001 : nt!KiSystemServiceCopyEnd+0x13
fffff800`04c1b108 fffff800`03bfc2a2 : fffff800`04c1b248 fffff880`01525152 fffffa80`00040001 fffff800`04c1b270 : nt!KiServiceLinkage
fffff800`04c1b110 fffff880`0152cd96 : 00000000`00000004 fffffa80`0449b4e0 fffff880`0525c030 00000000`000007ff : nt!RtlWriteRegistryValue+0x62
fffff800`04c1b170 fffff880`050b698d : fffff800`04c1b270 fffff880`052c5c28 00000000`00000000 00000000`00000000 : ndis!NdisWriteConfiguration+0x156
fffff800`04c1b1d0 fffff800`04c1b270 : fffff880`052c5c28 00000000`00000000 00000000`00000000 fffff800`001801a9 : netr28x+0x4b98d
fffff800`04c1b1d8 fffff880`052c5c28 : 00000000`00000000 00000000`00000000 fffff800`001801a9 fffffa80`05b7f1a0 : 0xfffff800`04c1b270
fffff800`04c1b1e0 00000000`00000000 : 00000000`00000000 fffff800`001801a9 fffffa80`05b7f1a0 fffff800`00000000 : netr28x+0x25ac28


THREAD_SHA1_HASH_MOD_FUNC: 80858fdf941bd645ff48b6997b30f63ac59926fb

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 394aafee51f76470053fa2102b9df0f0f7df42a3

THREAD_SHA1_HASH_MOD: 5d50876435db08b990ce5928fe5c90526c26b16c

FOLLOWUP_IP:
netr28x+4b98d
fffff880`050b698d ?? ???

SYMBOL_STACK_INDEX: d

SYMBOL_NAME: netr28x+4b98d

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: netr28x

IMAGE_NAME:  netr28x.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a

STACK_COMMAND: .thread ; .cxr ; kb

FAILURE_BUCKET_ID: X64_0xA_netr28x+4b98d

BUCKET_ID: X64_0xA_netr28x+4b98d

PRIMARY_PROBLEM_CLASS: X64_0xA_netr28x+4b98d

TARGET_TIME: 2019-05-03T22:31:32.000Z

OSBUILD: 7601

OSSERVICEPACK: 1000

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 7

OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2019-03-21 04:38:47

BUILDDATESTAMP_STR: 190320-1700

BUILDLAB_STR: win7sp1_ldr_escrow

BUILDOSVER_STR: 6.1.7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700

ANALYSIS_SESSION_ELAPSED_TIME: 7b0

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:x64_0xa_netr28x+4b98d

FAILURE_ID_HASH: {a6eb3f60-a5c3-0bd6-051c-41bf4427925d}

Followup: MachineOwner
---------

INVALID_PROCESS_ATTACH_ATTEMPT (5)
Arguments:
Arg1: fffffa80042cf9b0
Arg2: fffffa80045a46e0
Arg3: 0000000000000000
Arg4: 0000000000000001

Debugging Details:
------------------

GetUlongPtrFromAddress: unable to read from fffff800030fb300

KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 2

Key : Analysis.Elapsed.Sec
Value: 2

Key : Analysis.Memory.CommitPeak.Mb
Value: 62


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700

SYSTEM_MANUFACTURER: Hewlett-Packard

SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC

SYSTEM_SKU: J4T62EA#AB8

SYSTEM_VERSION: 0991100000000000000600087

BIOS_VENDOR: Insyde

BIOS_VERSION: F.43

BIOS_DATE: 12/19/2017

BASEBOARD_MANUFACTURER: Hewlett-Packard

BASEBOARD_PRODUCT: 2211

BASEBOARD_VERSION: 86.56

DUMP_TYPE: 2

BUGCHECK_P1: fffffa80042cf9b0

BUGCHECK_P2: fffffa80045a46e0

BUGCHECK_P3: 0

BUGCHECK_P4: 1

CPU_COUNT: 4

CPU_MHZ: 6a0

CPU_VENDOR: GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 45

CPU_STEPPING: 1

CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init)

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT

BUGCHECK_STR: 0x5

PROCESS_NAME: chrome.exe

CURRENT_IRQL: 2

ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5

ANALYSIS_SESSION_TIME: 06-17-2019 20:48:24.0070

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

DPC_STACK_BASE: FFFFF80000BA2FB0

LOCK_ADDRESS: fffff800030ce240 -- (!locks fffff800030ce240)
Cannot get _ERESOURCE type

Resource @ nt!PiEngineLock (0xfffff800030ce240) Available
1 total locks

PNP_TRIAGE_DATA:
Lock address : 0xfffff800030ce240
Thread Count : 0
Thread address: 0x0000000000000000
Thread wait : 0x0

LAST_CONTROL_TRANSFER: from fffff80002ea05f2 to fffff80002ef1ba0

STACK_TEXT:
fffff800`00ba1cc8 fffff800`02ea05f2 : 00000000`00000005 fffffa80`042cf9b0 fffffa80`045a46e0 00000000`00000000 : nt!KeBugCheckEx
fffff800`00ba1cd0 fffff800`03149127 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeStackAttachProcess+0x52
fffff800`00ba1d50 fffff800`031494bf : 00000000`00000000 fffff8a0`00000000 fffff8a0`00001910 00000000`00000000 : nt!ObpDecrementHandleCount+0x177
fffff800`00ba1dd0 fffff800`031491e4 : 00000000`00000b3c fffffa80`045a46e0 fffff8a0`00001910 00000000`00000b3c : nt!ObpCloseHandleTableEntry+0xaf
fffff800`00ba1e60 fffff800`02effbd3 : fffffa80`04502060 fffff800`00ba1f30 fffff800`031b3200 fffff800`0313f76a : nt!ObpCloseHandle+0x94
fffff800`00ba1eb0 fffff800`02ef53b0 : fffff800`0318cd73 fffffa80`04ebd060 fffff800`031b3200 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
fffff800`00ba2048 fffff800`0318cd73 : fffffa80`04ebd060 fffff800`031b3200 00000000`00000000 00000000`00000000 : nt!KiServiceLinkage
fffff800`00ba2050 fffff800`03196a78 : fffffa80`04ebd060 00000000`00000001 fffffa80`04eba6e0 00000000`00000000 : nt!PiGetDeviceRegistryProperty+0xab
fffff800`00ba21b0 fffff800`0318ba90 : fffffa80`04ebd060 fffffa80`04ebd060 00000000`00000000 00000000`00000000 : nt!IoGetDeviceProperty+0xbc
fffff800`00ba2290 fffff800`0319cf51 : 00000000`ffff0000 fffffa80`08470cb0 fffff880`0147f110 fffffa80`059fbe30 : nt!IopOpenOrCreateDeviceRegistryKey+0x14c
fffff800`00ba2450 fffff880`014c4152 : fffffa80`0681f000 fffff800`00ba25e0 00000000`00000005 00000000`000007ff : nt!IoOpenDeviceRegistryKey+0x11
fffff800`00ba2490 fffff880`0142fb34 : fffff800`00ba25e0 fffff800`00ba25b8 fffffa80`05bf61a0 fffff800`02e262ea : ndis!NdisOpenConfiguration+0xb2
fffff800`00ba24d0 fffff880`0511d94f : 00000000`00000000 fffff800`00ba25e0 fffff880`0532cc28 00000000`00000000 : ndis!NdisOpenConfigurationEx+0xa4
fffff800`00ba2540 00000000`00000000 : fffff800`00ba25e0 fffff880`0532cc28 00000000`00000000 fffffa80`001801a9 : netr28x+0x4b94f


THREAD_SHA1_HASH_MOD_FUNC: ae5746727567d6f3e980a5bab83b7524a5dc9ee8

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: a4491f04e0c588cecd320ea5c66c026862f569ea

THREAD_SHA1_HASH_MOD: 34d7ba38146ecb972065c22fa7203d72f73eccb4

FOLLOWUP_IP:
netr28x+4b94f
fffff880`0511d94f ?? ???

SYMBOL_STACK_INDEX: d

SYMBOL_NAME: netr28x+4b94f

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: netr28x

IMAGE_NAME:  netr28x.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a

STACK_COMMAND: .thread ; .cxr ; kb

FAILURE_BUCKET_ID: X64_0x5_netr28x+4b94f

BUCKET_ID: X64_0x5_netr28x+4b94f

PRIMARY_PROBLEM_CLASS: X64_0x5_netr28x+4b94f

TARGET_TIME: 2019-04-11T14:13:16.000Z

OSBUILD: 7601

OSSERVICEPACK: 1000

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 7

OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2019-03-06 05:38:53

BUILDDATESTAMP_STR: 190305-1700

BUILDLAB_STR: win7sp1_ldr_escrow

BUILDOSVER_STR: 6.1.7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700

ANALYSIS_SESSION_ELAPSED_TIME: 851

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:x64_0x5_netr28x+4b94f

FAILURE_ID_HASH: {43753b0b-e234-1a01-8468-7eed644d41ea}

Followup: MachineOwner
---------

INVALID_PROCESS_ATTACH_ATTEMPT (5)
Arguments:
Arg1: fffffa80042ce9b0
Arg2: fffffa800b053b00
Arg3: 0000000000000000
Arg4: 0000000000000001

Debugging Details:
------------------

GetUlongPtrFromAddress: unable to read from fffff800032ed300

KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 1

Key : Analysis.Elapsed.Sec
Value: 2

Key : Analysis.Memory.CommitPeak.Mb
Value: 62


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700

SYSTEM_MANUFACTURER: Hewlett-Packard

SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC

SYSTEM_SKU: J4T62EA#AB8

SYSTEM_VERSION: 0991100000000000000600087

BIOS_VENDOR: Insyde

BIOS_VERSION: F.43

BIOS_DATE: 12/19/2017

BASEBOARD_MANUFACTURER: Hewlett-Packard

BASEBOARD_PRODUCT: 2211

BASEBOARD_VERSION: 86.56

DUMP_TYPE: 2

BUGCHECK_P1: fffffa80042ce9b0

BUGCHECK_P2: fffffa800b053b00

BUGCHECK_P3: 0

BUGCHECK_P4: 1

CPU_COUNT: 4

CPU_MHZ: 6a0

CPU_VENDOR: GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 45

CPU_STEPPING: 1

CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init)

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT

BUGCHECK_STR: 0x5

PROCESS_NAME: mcbuilder.exe

CURRENT_IRQL: 2

ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5

ANALYSIS_SESSION_TIME: 06-17-2019 20:48:40.0990

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

DPC_STACK_BASE: FFFFF80000BA2FB0

LOCK_ADDRESS: fffff800032c0240 -- (!locks fffff800032c0240)
Cannot get _ERESOURCE type

Resource @ nt!PiEngineLock (0xfffff800032c0240) Available
1 total locks

PNP_TRIAGE_DATA:
Lock address : 0xfffff800032c0240
Thread Count : 0
Thread address: 0x0000000000000000
Thread wait : 0x0

LAST_CONTROL_TRANSFER: from fffff800030925f2 to fffff800030e3ba0

STACK_TEXT:
fffff800`00ba1cc8 fffff800`030925f2 : 00000000`00000005 fffffa80`042ce9b0 fffffa80`0b053b00 00000000`00000000 : nt!KeBugCheckEx
fffff800`00ba1cd0 fffff800`0333b127 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeStackAttachProcess+0x52
fffff800`00ba1d50 fffff800`0333b4bf : 00000000`00000000 fffff8a0`00000000 fffff8a0`00001910 00000000`00000000 : nt!ObpDecrementHandleCount+0x177
fffff800`00ba1dd0 fffff800`0333b1e4 : 00000000`00000d0c fffffa80`0b053b00 fffff8a0`00001910 00000000`00000d0c : nt!ObpCloseHandleTableEntry+0xaf
fffff800`00ba1e60 fffff800`030f1bd3 : fffffa80`0568b6e0 fffff800`00ba1f30 fffff800`033a5200 fffff800`0333176a : nt!ObpCloseHandle+0x94
fffff800`00ba1eb0 fffff800`030e73b0 : fffff800`0337ed73 fffffa80`04dc8060 fffff800`033a5200 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
fffff800`00ba2048 fffff800`0337ed73 : fffffa80`04dc8060 fffff800`033a5200 00000000`00000000 00000000`00000000 : nt!KiServiceLinkage
fffff800`00ba2050 fffff800`03388a78 : fffffa80`04dc8060 00000000`00000001 fffffa80`04dc36e0 00000000`00000000 : nt!PiGetDeviceRegistryProperty+0xab
fffff800`00ba21b0 fffff800`0337da90 : fffffa80`04dc8060 fffffa80`04dc8060 00000000`00000000 00000000`00000000 : nt!IoGetDeviceProperty+0xbc
fffff800`00ba2290 fffff800`0338ef51 : 00000000`ffff0000 fffffa80`09035950 fffff880`014a0110 fffffa80`05adbd80 : nt!IopOpenOrCreateDeviceRegistryKey+0x14c
fffff800`00ba2450 fffff880`014e5152 : fffffa80`00000000 fffff800`00ba25e0 00000000`00000000 00000000`000007ff : nt!IoOpenDeviceRegistryKey+0x11
fffff800`00ba2490 fffff880`01450b34 : fffff800`00ba25e0 fffff800`00ba25b8 fffffa80`05bc91a0 00000000`00000001 : ndis!NdisOpenConfiguration+0xb2
fffff800`00ba24d0 fffff880`056cc94f : 00000000`00000000 fffff800`00ba25e0 fffff880`058dbc28 00000000`00000000 : ndis!NdisOpenConfigurationEx+0xa4
fffff800`00ba2540 00000000`00000000 : fffff800`00ba25e0 fffff880`058dbc28 00000000`00000000 fffffa80`001801a9 : netr28x+0x4b94f


THREAD_SHA1_HASH_MOD_FUNC: ae5746727567d6f3e980a5bab83b7524a5dc9ee8

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: a4491f04e0c588cecd320ea5c66c026862f569ea

THREAD_SHA1_HASH_MOD: 34d7ba38146ecb972065c22fa7203d72f73eccb4

FOLLOWUP_IP:
netr28x+4b94f
fffff880`056cc94f ?? ???

SYMBOL_STACK_INDEX: d

SYMBOL_NAME: netr28x+4b94f

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: netr28x

IMAGE_NAME:  netr28x.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a

STACK_COMMAND: .thread ; .cxr ; kb

FAILURE_BUCKET_ID: X64_0x5_netr28x+4b94f

BUCKET_ID: X64_0x5_netr28x+4b94f

PRIMARY_PROBLEM_CLASS: X64_0x5_netr28x+4b94f

TARGET_TIME: 2019-04-11T17:47:48.000Z

OSBUILD: 7601

OSSERVICEPACK: 1000

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 7

OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2019-03-06 05:38:53

BUILDDATESTAMP_STR: 190305-1700

BUILDLAB_STR: win7sp1_ldr_escrow

BUILDOSVER_STR: 6.1.7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700

ANALYSIS_SESSION_ELAPSED_TIME: 7f5

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:x64_0x5_netr28x+4b94f

FAILURE_ID_HASH: {43753b0b-e234-1a01-8468-7eed644d41ea}

Followup: MachineOwner
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff8a006be8c34, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80003afb730, address which referenced memory

Debugging Details:
------------------

GetUlongPtrFromAddress: unable to read from fffff80003ab2300

KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 1

Key : Analysis.Elapsed.Sec
Value: 1

Key : Analysis.Memory.CommitPeak.Mb
Value: 62


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700

SYSTEM_MANUFACTURER: Hewlett-Packard

SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC

SYSTEM_SKU: J4T62EA#AB8

SYSTEM_VERSION: 0991100000000000000600087

BIOS_VENDOR: Insyde

BIOS_VERSION: F.43

BIOS_DATE: 12/19/2017

BASEBOARD_MANUFACTURER: Hewlett-Packard

BASEBOARD_PRODUCT: 2211

BASEBOARD_VERSION: 86.56

DUMP_TYPE: 2

BUGCHECK_P1: fffff8a006be8c34

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff80003afb730

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80003ab2100
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff80003ab22f0
GetUlongPtrFromAddress: unable to read from fffff80003ab24a8
GetPointerFromAddress: unable to read from fffff80003ab20d8
fffff8a006be8c34 Paged pool

CURRENT_IRQL: 2

FAULTING_IP:
nt!CmpFindValueByNameFromCache+e0
fffff800`03afb730 428b14b8 mov edx,dword ptr [rax+r15*4]

CPU_COUNT: 4

CPU_MHZ: 6a0

CPU_VENDOR: GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 45

CPU_STEPPING: 1

CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init)

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT

BUGCHECK_STR: 0xA

PROCESS_NAME: System

ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5

ANALYSIS_SESSION_TIME: 06-17-2019 20:48:30.0482

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

TRAP_FRAME:  fffff80004c21990 -- (.trap 0xfffff80004c21990)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8a006be8c34 rbx=0000000000000000 rcx=0000000000000000
rdx=00000000ffffffff rsi=0000000000000000 rdi=0000000000000000
rip=fffff80003afb730 rsp=fffff80004c21b20 rbp=fffff80004c21ff0
r8=fffff8a00004ad40 r9=000000000000ffff r10=0000000000000001
r11=fffff80004c21dc8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!CmpFindValueByNameFromCache+0xe0:
fffff800`03afb730 428b14b8 mov edx,dword ptr [rax+r15*4] ds:fffff8a0`06be8c34=????????
Resetting default scope

LAST_CONTROL_TRANSFER: from fffff800038b6f69 to fffff800038a8ba0

STACK_TEXT:
fffff800`04c21848 fffff800`038b6f69 : 00000000`0000000a fffff8a0`06be8c34 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff800`04c21850 fffff800`038b4d88 : 00000000`00000000 fffff8a0`06be8c34 fffffa80`0a1a6000 fffff8a0`00024010 : nt!KiBugCheckDispatch+0x69
fffff800`04c21990 fffff800`03afb730 : fffff8a0`00024010 00000000`00c6ac30 fffff8a0`0004ad40 00000000`00000000 : nt!KiPageFault+0x448
fffff800`04c21b20 fffff800`03adec38 : fffff8a0`0e0d74a8 fffff800`04c21e18 fffff800`04c21c60 fffff800`04c21c48 : nt!CmpFindValueByNameFromCache+0xe0
fffff800`04c21bf0 fffff800`03cc11e7 : fffff8a0`0e0d74a8 01d50684`f67b3cde fffff8a0`0e0d74a8 00000000`00000000 : nt!CmpCompareNewValueDataAgainstKCBCache+0x78
fffff800`04c21c90 fffff800`03ae6531 : fffff8a0`01c5f710 fffff800`04c21e18 fffffa80`00000004 fffff800`04c22210 : nt!CmSetValueKey+0x6a7
fffff800`04c21dd0 fffff800`038b6bd3 : ffffffff`80002788 00000000`00000002 fffffa80`00000000 fffff800`00000004 : nt!NtSetValueKey+0x349
fffff800`04c21f00 fffff800`038ac3b0 : fffff800`03bfd2a2 fffff800`04c22248 fffff880`017a5152 00000000`c0000001 : nt!KiSystemServiceCopyEnd+0x13
fffff800`04c22108 fffff800`03bfd2a2 : fffff800`04c22248 fffff880`017a5152 00000000`c0000001 fffff800`04c22270 : nt!KiServiceLinkage
fffff800`04c22110 fffff880`017acd96 : 00000000`00000004 fffffa80`09b31af0 00000100`00000000 00000000`000007ff : nt!RtlWriteRegistryValue+0x62
fffff800`04c22170 fffff880`056a498d : fffff800`04c22270 fffff880`058b3c28 00000000`00000000 00000000`00000000 : ndis!NdisWriteConfiguration+0x156
fffff800`04c221d0 fffff800`04c22270 : fffff880`058b3c28 00000000`00000000 00000000`00000000 00000000`001801a9 : netr28x+0x4b98d
fffff800`04c221d8 fffff880`058b3c28 : 00000000`00000000 00000000`00000000 00000000`001801a9 fffffa80`05b821a0 : 0xfffff800`04c22270
fffff800`04c221e0 00000000`00000000 : 00000000`00000000 00000000`001801a9 fffffa80`05b821a0 00000000`00000000 : netr28x+0x25ac28


THREAD_SHA1_HASH_MOD_FUNC: 935105e89958188e75032d802c31088ef212f1d5

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 050e790aab7ddac4bfe73c42f1350165ef3ea549

THREAD_SHA1_HASH_MOD: 7921e317582c7f98a7f13cfbcd3c02a86fdcafec

FOLLOWUP_IP:
netr28x+4b98d
fffff880`056a498d ?? ???

SYMBOL_STACK_INDEX: b

SYMBOL_NAME: netr28x+4b98d

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: netr28x

IMAGE_NAME:  netr28x.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a

STACK_COMMAND: .thread ; .cxr ; kb

FAILURE_BUCKET_ID: X64_0xA_netr28x+4b98d

BUCKET_ID: X64_0xA_netr28x+4b98d

PRIMARY_PROBLEM_CLASS: X64_0xA_netr28x+4b98d

TARGET_TIME: 2019-05-09T16:33:41.000Z

OSBUILD: 7601

OSSERVICEPACK: 1000

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 7

OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2019-03-21 04:38:47

BUILDDATESTAMP_STR: 190320-1700

BUILDLAB_STR: win7sp1_ldr_escrow

BUILDOSVER_STR: 6.1.7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700

ANALYSIS_SESSION_ELAPSED_TIME: 716

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:x64_0xa_netr28x+4b98d

FAILURE_ID_HASH: {a6eb3f60-a5c3-0bd6-051c-41bf4427925d}

Followup: MachineOwner
---------

INVALID_PROCESS_ATTACH_ATTEMPT (5)
Arguments:
Arg1: fffffa80042b59b0
Arg2: fffffa80048376b0
Arg3: 0000000000000000
Arg4: 0000000000000001

Debugging Details:
------------------

GetUlongPtrFromAddress: unable to read from fffff8000309f300

KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 1

Key : Analysis.Elapsed.Sec
Value: 1

Key : Analysis.Memory.CommitPeak.Mb
Value: 62


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700

SYSTEM_MANUFACTURER: Hewlett-Packard

SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC

SYSTEM_SKU: J4T62EA#AB8

SYSTEM_VERSION: 0991100000000000000600087

BIOS_VENDOR: Insyde

BIOS_VERSION: F.43

BIOS_DATE: 12/19/2017

BASEBOARD_MANUFACTURER: Hewlett-Packard

BASEBOARD_PRODUCT: 2211

BASEBOARD_VERSION: 86.56

DUMP_TYPE: 2

BUGCHECK_P1: fffffa80042b59b0

BUGCHECK_P2: fffffa80048376b0

BUGCHECK_P3: 0

BUGCHECK_P4: 1

CPU_COUNT: 4

CPU_MHZ: 6a0

CPU_VENDOR: GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 45

CPU_STEPPING: 1

CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init)

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT

BUGCHECK_STR: 0x5

PROCESS_NAME: PointBlank.exe

CURRENT_IRQL: 2

ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5

ANALYSIS_SESSION_TIME: 06-17-2019 21:16:16.0171

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

DPC_STACK_BASE: FFFFF80000BA2FB0

LOCK_ADDRESS: fffff80003072240 -- (!locks fffff80003072240)
Cannot get _ERESOURCE type

Resource @ nt!PiEngineLock (0xfffff80003072240) Available
1 total locks

PNP_TRIAGE_DATA:
Lock address : 0xfffff80003072240
Thread Count : 0
Thread address: 0x0000000000000000
Thread wait : 0x0

LAST_CONTROL_TRANSFER: from fffff80002e445f2 to fffff80002e95ba0

STACK_TEXT:
fffff800`00ba1cc8 fffff800`02e445f2 : 00000000`00000005 fffffa80`042b59b0 fffffa80`048376b0 00000000`00000000 : nt!KeBugCheckEx
fffff800`00ba1cd0 fffff800`030ed127 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeStackAttachProcess+0x52
fffff800`00ba1d50 fffff800`030ed4bf : 00000000`00000000 fffff8a0`00000000 fffff8a0`00001910 00000000`00000000 : nt!ObpDecrementHandleCount+0x177
fffff800`00ba1dd0 fffff800`030ed1e4 : 00000000`00000c9c fffffa80`048376b0 fffff8a0`00001910 00000000`00000c9c : nt!ObpCloseHandleTableEntry+0xaf
fffff800`00ba1e60 fffff800`02ea3bd3 : fffffa80`04988060 fffff800`00ba1f30 fffff800`03157200 fffff800`030e376a : nt!ObpCloseHandle+0x94
fffff800`00ba1eb0 fffff800`02e993b0 : fffff800`03130d73 fffffa80`04e7d060 fffff800`03157200 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
fffff800`00ba2048 fffff800`03130d73 : fffffa80`04e7d060 fffff800`03157200 00000000`00000000 00000000`00000000 : nt!KiServiceLinkage
fffff800`00ba2050 fffff800`0313aa78 : fffffa80`04e7d060 00000000`00000001 fffffa80`04e386e0 00000000`00000000 : nt!PiGetDeviceRegistryProperty+0xab
fffff800`00ba21b0 fffff800`0312fa90 : fffffa80`04e7d060 fffffa80`04e7d060 00000000`00000000 00000000`00000000 : nt!IoGetDeviceProperty+0xbc
fffff800`00ba2290 fffff800`03140f51 : 00000000`ffff0000 fffffa80`08033990 fffff880`014d7110 fffffa80`05bfaf70 : nt!IopOpenOrCreateDeviceRegistryKey+0x14c
fffff800`00ba2450 fffff880`0151c152 : fffffa80`049479f0 fffff800`00ba25e0 fffffa80`06f64a78 00000000`000007ff : nt!IoOpenDeviceRegistryKey+0x11
fffff800`00ba2490 fffff880`01487b34 : fffff800`00ba25e0 fffff800`00ba25b8 fffffa80`05bf91a0 fffff880`0153221d : ndis!NdisOpenConfiguration+0xb2
fffff800`00ba24d0 fffff880`04eff94f : fffffa80`00000000 fffff800`00ba25e0 fffff880`0510ec28 00000000`00000000 : ndis!NdisOpenConfigurationEx+0xa4
fffff800`00ba2540 fffffa80`00000000 : fffff800`00ba25e0 fffff880`0510ec28 00000000`00000000 00000000`001801a9 : netr28x+0x4b94f
fffff800`00ba2548 fffff800`00ba25e0 : fffff880`0510ec28 00000000`00000000 00000000`001801a9 fffffa80`05bf91a0 : 0xfffffa80`00000000
fffff800`00ba2550 fffff880`0510ec28 : 00000000`00000000 00000000`001801a9 fffffa80`05bf91a0 fffffa80`00000000 : 0xfffff800`00ba25e0
fffff800`00ba2558 00000000`00000000 : 00000000`001801a9 fffffa80`05bf91a0 fffffa80`00000000 fffff880`04f0be2e : netr28x+0x25ac28


THREAD_SHA1_HASH_MOD_FUNC: 1764d353450a941fbc74295279ec02651c3d9814

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: bdc70d393af014c177e84e60c668cc911acaf71f

THREAD_SHA1_HASH_MOD: 9a9dca34541ae91666e3989df373f06b6e683623

FOLLOWUP_IP:
netr28x+4b94f
fffff880`04eff94f ?? ???

SYMBOL_STACK_INDEX: d

SYMBOL_NAME: netr28x+4b94f

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: netr28x

IMAGE_NAME:  netr28x.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a

STACK_COMMAND: .thread ; .cxr ; kb

FAILURE_BUCKET_ID: X64_0x5_netr28x+4b94f

BUCKET_ID: X64_0x5_netr28x+4b94f

PRIMARY_PROBLEM_CLASS: X64_0x5_netr28x+4b94f

TARGET_TIME: 2019-04-11T14:53:19.000Z

OSBUILD: 7601

OSSERVICEPACK: 1000

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 7

OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2019-03-06 05:38:53

BUILDDATESTAMP_STR: 190305-1700

BUILDLAB_STR: win7sp1_ldr_escrow

BUILDOSVER_STR: 6.1.7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700

ANALYSIS_SESSION_ELAPSED_TIME: 7ca

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:x64_0x5_netr28x+4b94f

FAILURE_ID_HASH: {43753b0b-e234-1a01-8468-7eed644d41ea}

Followup: MachineOwner
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff8a000e8ee98, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff800032e66fd, address which referenced memory

Debugging Details:
------------------

GetUlongPtrFromAddress: unable to read from fffff800032b2300

KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 1

Key : Analysis.Elapsed.Sec
Value: 1

Key : Analysis.Memory.CommitPeak.Mb
Value: 62


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700

SYSTEM_MANUFACTURER: Hewlett-Packard

SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC

SYSTEM_SKU: J4T62EA#AB8

SYSTEM_VERSION: 0991100000000000000600087

BIOS_VENDOR: Insyde

BIOS_VERSION: F.43

BIOS_DATE: 12/19/2017

BASEBOARD_MANUFACTURER: Hewlett-Packard

BASEBOARD_PRODUCT: 2211

BASEBOARD_VERSION: 86.56

DUMP_TYPE: 2

BUGCHECK_P1: fffff8a000e8ee98

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff800032e66fd

WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800032b2100
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff800032b22f0
GetUlongPtrFromAddress: unable to read from fffff800032b24a8
GetPointerFromAddress: unable to read from fffff800032b20d8
fffff8a000e8ee98 Paged pool

CURRENT_IRQL: 2

FAULTING_IP:
nt!HvpDoAllocateCell+101
fffff800`032e66fd 89443d00 mov dword ptr [rbp+rdi],eax

CPU_COUNT: 4

CPU_MHZ: 6a0

CPU_VENDOR: GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 45

CPU_STEPPING: 1

CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init)

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT

BUGCHECK_STR: 0xA

PROCESS_NAME: System

ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5

ANALYSIS_SESSION_TIME: 06-17-2019 21:16:26.0291

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

TRAP_FRAME:  fffff80004418950 -- (.trap 0xfffff80004418950)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000020 rbx=0000000000000000 rcx=0000000000002e68
rdx=0000000000000006 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800032e66fd rsp=fffff80004418ae0 rbp=0000000000000030
r8=fffff8a000024010 r9=0000000000000005 r10=fffff8a000e8c000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!HvpDoAllocateCell+0x101:
fffff800`032e66fd 89443d00 mov dword ptr [rbp+rdi],eax ss:0018:00000000`00000030=????????
Resetting default scope

LAST_CONTROL_TRANSFER: from fffff800030b6f69 to fffff800030a8ba0

STACK_TEXT:
fffff800`04418808 fffff800`030b6f69 : 00000000`0000000a fffff8a0`00e8ee98 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff800`04418810 fffff800`030b4d88 : 00000000`00000001 fffff8a0`00e8ee98 00000000`00000000 fffff8a0`00024010 : nt!KiBugCheckDispatch+0x69
fffff800`04418950 fffff800`032e66fd : fffff8a0`00024010 fffff8a0`00024010 fffff8a0`0004b9a0 fffff800`00000000 : nt!KiPageFault+0x448
fffff800`04418ae0 fffff800`03328d1d : fffff8a0`00024010 00000000`00000000 00000000`00000000 00000000`ffffffff : nt!HvpDoAllocateCell+0x101
fffff800`04418b40 fffff800`03328bad : 00000000`00000000 fffff8a0`00ff0c30 00000000`00000008 fffff800`03316d5c : nt!HvAllocateCell+0x55
fffff800`04418b70 fffff800`032db4bf : fffff8a0`00024010 fffff8a0`00024010 fffff8a0`00ffe640 fffff800`04418e18 : nt!CmpAddValueKeyNew+0x69
fffff800`04418c40 fffff800`034c16e3 : 01d4fd21`140179ca fffff800`04418ff0 fffff8a0`050bd948 00000000`00000000 : nt!CmpSetValueKeyNew+0x77
fffff800`04418c90 fffff800`032e6531 : fffff8a0`0df75fa0 fffff800`04418e18 fffffa80`00000004 fffff800`04419210 : nt!CmSetValueKey+0xba3
fffff800`04418dd0 fffff800`030b6bd3 : ffffffff`80000ab0 00000000`00000002 fffffa80`00000000 fffff800`00000004 : nt!NtSetValueKey+0x349
fffff800`04418f00 fffff800`030ac3b0 : fffff800`033fd2a2 fffff800`04419248 fffff880`014a9152 fffffa80`051e12f0 : nt!KiSystemServiceCopyEnd+0x13
fffff800`04419108 fffff800`033fd2a2 : fffff800`04419248 fffff880`014a9152 fffffa80`051e12f0 fffff800`04419270 : nt!KiServiceLinkage
fffff800`04419110 fffff880`014b0d96 : 00000000`00000004 fffffa80`0855a220 00000000`ffffffff 00000000`000007ff : nt!RtlWriteRegistryValue+0x62
fffff800`04419170 fffff880`04eef98d : fffff800`04419270 fffff880`050fec28 00000000`00000000 00000000`00000000 : ndis!NdisWriteConfiguration+0x156
fffff800`044191d0 fffff800`04419270 : fffff880`050fec28 00000000`00000000 00000000`00000000 fffff800`001801a9 : netr28x+0x4b98d
fffff800`044191d8 fffff880`050fec28 : 00000000`00000000 00000000`00000000 fffff800`001801a9 fffffa80`05be11a0 : 0xfffff800`04419270
fffff800`044191e0 00000000`00000000 : 00000000`00000000 fffff800`001801a9 fffffa80`05be11a0 fffff800`00000000 : netr28x+0x25ac28


THREAD_SHA1_HASH_MOD_FUNC: 80858fdf941bd645ff48b6997b30f63ac59926fb

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 394aafee51f76470053fa2102b9df0f0f7df42a3

THREAD_SHA1_HASH_MOD: 5d50876435db08b990ce5928fe5c90526c26b16c

FOLLOWUP_IP:
netr28x+4b98d
fffff880`04eef98d ?? ???

SYMBOL_STACK_INDEX: d

SYMBOL_NAME: netr28x+4b98d

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: netr28x

IMAGE_NAME:  netr28x.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a

STACK_COMMAND: .thread ; .cxr ; kb

FAILURE_BUCKET_ID: X64_0xA_netr28x+4b98d

BUCKET_ID: X64_0xA_netr28x+4b98d

PRIMARY_PROBLEM_CLASS: X64_0xA_netr28x+4b98d

TARGET_TIME: 2019-04-27T17:46:01.000Z

OSBUILD: 7601

OSSERVICEPACK: 1000

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 7

OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2019-03-21 04:38:47

BUILDDATESTAMP_STR: 190320-1700

BUILDLAB_STR: win7sp1_ldr_escrow

BUILDOSVER_STR: 6.1.7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700

ANALYSIS_SESSION_ELAPSED_TIME: 720

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:x64_0xa_netr28x+4b98d

FAILURE_ID_HASH: {a6eb3f60-a5c3-0bd6-051c-41bf4427925d}

Followup: MachineOwner
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff8a000b0b260, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff800032d1738, address which referenced memory

Debugging Details:
------------------

GetUlongPtrFromAddress: unable to read from fffff8000329d300

KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 1

Key : Analysis.Elapsed.Sec
Value: 1

Key : Analysis.Memory.CommitPeak.Mb
Value: 62


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700

SYSTEM_MANUFACTURER: Hewlett-Packard

SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC

SYSTEM_SKU: J4T62EA#AB8

SYSTEM_VERSION: 0991100000000000000600087

BIOS_VENDOR: Insyde

BIOS_VERSION: F.43

BIOS_DATE: 12/19/2017

BASEBOARD_MANUFACTURER: Hewlett-Packard

BASEBOARD_PRODUCT: 2211

BASEBOARD_VERSION: 86.56

DUMP_TYPE: 2

BUGCHECK_P1: fffff8a000b0b260

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff800032d1738

WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff8000329d100
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff8000329d2f0
GetUlongPtrFromAddress: unable to read from fffff8000329d4a8
GetPointerFromAddress: unable to read from fffff8000329d0d8
fffff8a000b0b260 Paged pool

CURRENT_IRQL: 2

FAULTING_IP:
nt!HvpDoAllocateCell+13c
fffff800`032d1738 8907 mov dword ptr [rdi],eax

CPU_COUNT: 4

CPU_MHZ: 6a0

CPU_VENDOR: GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 45

CPU_STEPPING: 1

CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init)

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT

BUGCHECK_STR: 0xA

PROCESS_NAME: System

ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5

ANALYSIS_SESSION_TIME: 06-17-2019 21:16:23.0541

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

TRAP_FRAME:  fffff80000b9b950 -- (.trap 0xfffff80000b9b950)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000ffffffd0 rbx=0000000000000000 rcx=000000000000000c
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800032d1738 rsp=fffff80000b9bae0 rbp=0000000000000030
r8=fffff8a0000512e0 r9=0000000000000005 r10=000000000000023b
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe cy
nt!HvpDoAllocateCell+0x13c:
fffff800`032d1738 8907 mov dword ptr [rdi],eax ds:00000000`00000000=????????
Resetting default scope

LAST_CONTROL_TRANSFER: from fffff800030a1f69 to fffff80003093ba0

STACK_TEXT:
fffff800`00b9b808 fffff800`030a1f69 : 00000000`0000000a fffff8a0`00b0b260 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff800`00b9b810 fffff800`0309fd88 : 00000000`00000001 fffff8a0`00b0b260 00000000`00000000 fffff8a0`00024010 : nt!KiBugCheckDispatch+0x69
fffff800`00b9b950 fffff800`032d1738 : fffff8a0`00024010 fffff8a0`00024010 fffff8a0`000512e0 fffff800`00000000 : nt!KiPageFault+0x448
fffff800`00b9bae0 fffff800`03313d0d : fffff8a0`00024010 00000000`00000000 00000000`00000000 00000000`ffffffff : nt!HvpDoAllocateCell+0x13c
fffff800`00b9bb40 fffff800`03313b9d : 00000000`00000000 fffff8a0`00f38c30 00000000`00000008 fffff800`03301d5c : nt!HvAllocateCell+0x55
fffff800`00b9bb70 fffff800`032c64bf : fffff8a0`00024010 fffff8a0`00024010 fffff8a0`00f46640 fffff800`00b9be18 : nt!CmpAddValueKeyNew+0x69
fffff800`00b9bc40 fffff800`034ac6a3 : 01d4f07a`dd071b78 fffff800`00b9bff0 fffff8a0`04a444a8 00000000`00000000 : nt!CmpSetValueKeyNew+0x77
fffff800`00b9bc90 fffff800`032d1531 : fffff8a0`09c3f770 fffff800`00b9be18 fffffa80`00000004 fffff800`00b9c210 : nt!CmSetValueKey+0xba3
fffff800`00b9bdd0 fffff800`030a1bd3 : ffffffff`80000b54 00000000`00000002 fffffa80`00000000 fffff800`00000004 : nt!NtSetValueKey+0x349
fffff800`00b9bf00 fffff800`030973b0 : fffff800`033e8272 fffff800`00b9c248 fffff880`0151b152 fffffa80`074a45f0 : nt!KiSystemServiceCopyEnd+0x13
fffff800`00b9c108 fffff800`033e8272 : fffff800`00b9c248 fffff880`0151b152 fffffa80`074a45f0 fffff800`00b9c270 : nt!KiServiceLinkage
fffff800`00b9c110 fffff880`01522d96 : 00000000`00000004 fffffa80`05970b70 fffff800`03210800 00000000`000007ff : nt!RtlWriteRegistryValue+0x62
fffff800`00b9c170 fffff880`04eef98d : fffff800`00b9c270 fffff880`050fec28 00000000`00000000 00000000`00000000 : ndis!NdisWriteConfiguration+0x156
fffff800`00b9c1d0 fffff800`00b9c270 : fffff880`050fec28 00000000`00000000 00000000`00000000 fffffa80`001801a9 : netr28x+0x4b98d
fffff800`00b9c1d8 fffff880`050fec28 : 00000000`00000000 00000000`00000000 fffffa80`001801a9 fffffa80`05b741a0 : 0xfffff800`00b9c270
fffff800`00b9c1e0 00000000`00000000 : 00000000`00000000 fffffa80`001801a9 fffffa80`05b741a0 00000000`00000000 : netr28x+0x25ac28


THREAD_SHA1_HASH_MOD_FUNC: 80858fdf941bd645ff48b6997b30f63ac59926fb

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 60ef2d8b5c8aa9ab3d61fd3d0f87c6db127d6016

THREAD_SHA1_HASH_MOD: 5d50876435db08b990ce5928fe5c90526c26b16c

FOLLOWUP_IP:
netr28x+4b98d
fffff880`04eef98d ?? ???

SYMBOL_STACK_INDEX: d

SYMBOL_NAME: netr28x+4b98d

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: netr28x

IMAGE_NAME:  netr28x.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a

STACK_COMMAND: .thread ; .cxr ; kb

FAILURE_BUCKET_ID: X64_0xA_netr28x+4b98d

BUCKET_ID: X64_0xA_netr28x+4b98d

PRIMARY_PROBLEM_CLASS: X64_0xA_netr28x+4b98d

TARGET_TIME: 2019-04-11T15:25:58.000Z

OSBUILD: 7601

OSSERVICEPACK: 1000

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 7

OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2019-03-06 05:38:53

BUILDDATESTAMP_STR: 190305-1700

BUILDLAB_STR: win7sp1_ldr_escrow

BUILDOSVER_STR: 6.1.7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700

ANALYSIS_SESSION_ELAPSED_TIME: 7b6

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:x64_0xa_netr28x+4b98d

FAILURE_ID_HASH: {a6eb3f60-a5c3-0bd6-051c-41bf4427925d}

Followup: MachineOwner
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff8a0067d0004, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff800032dccfe, address which referenced memory

Debugging Details:
------------------

GetUlongPtrFromAddress: unable to read from fffff800032a8300

KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 1

Key : Analysis.Elapsed.Sec
Value: 1

Key : Analysis.Memory.CommitPeak.Mb
Value: 62


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700

SYSTEM_MANUFACTURER: Hewlett-Packard

SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC

SYSTEM_SKU: J4T62EA#AB8

SYSTEM_VERSION: 0991100000000000000600087

BIOS_VENDOR: Insyde

BIOS_VERSION: F.43

BIOS_DATE: 12/19/2017

BASEBOARD_MANUFACTURER: Hewlett-Packard

BASEBOARD_PRODUCT: 2211

BASEBOARD_VERSION: 86.56

DUMP_TYPE: 2

BUGCHECK_P1: fffff8a0067d0004

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff800032dccfe

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800032a8100
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff800032a82f0
GetUlongPtrFromAddress: unable to read from fffff800032a84a8
GetPointerFromAddress: unable to read from fffff800032a80d8
fffff8a0067d0004 Paged pool

CURRENT_IRQL: 2

FAULTING_IP:
nt!HvpScanForFreeCellInViewWindow+16a
fffff800`032dccfe 8b4804 mov ecx,dword ptr [rax+4]

CPU_COUNT: 4

CPU_MHZ: 6a0

CPU_VENDOR: GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 45

CPU_STEPPING: 1

CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init)

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT

BUGCHECK_STR: 0xA

PROCESS_NAME: System

ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5

ANALYSIS_SESSION_TIME: 06-17-2019 21:16:21.0060

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

TRAP_FRAME:  fffff80004421860 -- (.trap 0xfffff80004421860)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8a0067d0000 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000683000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800032dccfe rsp=fffff800044219f0 rbp=0000000000000683
r8=0000000000000083 r9=0000000000000000 r10=fffff8000300b000
r11=0000000000000006 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!HvpScanForFreeCellInViewWindow+0x16a:
fffff800`032dccfe 8b4804 mov ecx,dword ptr [rax+4] ds:fffff8a0`067d0004=00683000
Resetting default scope

LAST_CONTROL_TRANSFER: from fffff800030acf69 to fffff8000309eba0

STACK_TEXT:
fffff800`04421718 fffff800`030acf69 : 00000000`0000000a fffff8a0`067d0004 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff800`04421720 fffff800`030aad88 : 00000000`00000000 fffff8a0`067d0004 fffff800`031ff100 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff800`04421860 fffff800`032dccfe : 00000000`00000000 00000000`003fe000 00000000`00001000 00000000`00000000 : nt!KiPageFault+0x448
fffff800`044219f0 fffff800`032dcb0a : fffff800`00683000 fffff800`00000011 00000000`00000030 fffff800`00000000 : nt!HvpScanForFreeCellInViewWindow+0x16a
fffff800`04421a70 fffff800`032dc66e : 00000000`00000030 fffff800`00000005 ffffffff`00000030 fffff800`00000000 : nt!HvpFindFreeCell+0x1ba
fffff800`04421ae0 fffff800`0331ed1d : fffff8a0`00024010 00000000`00000000 00000000`00000000 00000000`ffffffff : nt!HvpDoAllocateCell+0x72
fffff800`04421b40 fffff800`0331ebad : 00000000`00000000 fffff8a0`061e8c30 00000000`00000008 fffff800`0330cd5c : nt!HvAllocateCell+0x55
fffff800`04421b70 fffff800`032d14bf : fffff8a0`00024010 fffff8a0`00024010 fffff8a0`061f6640 fffff800`04421e18 : nt!CmpAddValueKeyNew+0x69
fffff800`04421c40 fffff800`034b76e3 : 01d4f848`5814f677 fffff800`04421ff0 fffff8a0`02c84b98 00000000`00000000 : nt!CmpSetValueKeyNew+0x77
fffff800`04421c90 fffff800`032dc531 : fffff8a0`04cbac70 fffff800`04421e18 fffffa80`00000004 fffff800`04422210 : nt!CmSetValueKey+0xba3
fffff800`04421dd0 fffff800`030acbd3 : ffffffff`80000de8 00000000`00000002 fffffa80`00000000 fffff800`00000004 : nt!NtSetValueKey+0x349
fffff800`04421f00 fffff800`030a23b0 : fffff800`033f32a2 fffff800`04422248 fffff880`01725152 fffffa80`00000000 : nt!KiSystemServiceCopyEnd+0x13
fffff800`04422108 fffff800`033f32a2 : fffff800`04422248 fffff880`01725152 fffffa80`00000000 fffff800`04422270 : nt!KiServiceLinkage
fffff800`04422110 fffff880`0172cd96 : 00000000`00000004 fffffa80`05d89cd0 fffff800`04422200 00000000`000007ff : nt!RtlWriteRegistryValue+0x62
fffff800`04422170 fffff880`0510f98d : fffff800`04422270 fffff880`0531ec28 00000000`00000000 00000000`00000000 : ndis!NdisWriteConfiguration+0x156
fffff800`044221d0 fffff800`04422270 : fffff880`0531ec28 00000000`00000000 00000000`00000000 fffff880`001801a9 : netr28x+0x4b98d
fffff800`044221d8 fffff880`0531ec28 : 00000000`00000000 00000000`00000000 fffff880`001801a9 fffffa80`05b701a0 : 0xfffff800`04422270
fffff800`044221e0 00000000`00000000 : 00000000`00000000 fffff880`001801a9 fffffa80`05b701a0 0000000e`00000000 : netr28x+0x25ac28


THREAD_SHA1_HASH_MOD_FUNC: a2c5409ed52347576830e095aabe2e20325151e5

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: cf883ff24fbd42e0f8dd5b2bf40fd2071e6cd531

THREAD_SHA1_HASH_MOD: 56bd18a7fabf3c16adac1e3911e9aab0524685a1

FOLLOWUP_IP:
netr28x+4b98d
fffff880`0510f98d ?? ???

SYMBOL_STACK_INDEX: f

SYMBOL_NAME: netr28x+4b98d

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: netr28x

IMAGE_NAME:  netr28x.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a

STACK_COMMAND: .thread ; .cxr ; kb

FAILURE_BUCKET_ID: X64_0xA_netr28x+4b98d

BUCKET_ID: X64_0xA_netr28x+4b98d

PRIMARY_PROBLEM_CLASS: X64_0xA_netr28x+4b98d

TARGET_TIME: 2019-04-21T13:44:29.000Z

OSBUILD: 7601

OSSERVICEPACK: 1000

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 7

OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2019-03-21 04:38:47

BUILDDATESTAMP_STR: 190320-1700

BUILDLAB_STR: win7sp1_ldr_escrow

BUILDOSVER_STR: 6.1.7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700

ANALYSIS_SESSION_ELAPSED_TIME: 704

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:x64_0xa_netr28x+4b98d

FAILURE_ID_HASH: {a6eb3f60-a5c3-0bd6-051c-41bf4427925d}

Followup: MachineOwner
---------

0: kd> lmvm netr28x
start end module name
fffff880`050c4000 fffff880`0532e000 netr28x T (no symbols)
Loaded symbol image file: netr28x.sys
Image path: \SystemRoot\system32\DRIVERS\netr28x.sys
Image name: netr28x.sys
Timestamp: Mon Apr 20 03:22:50 2015 (5534D37A)
CheckSum: 0026BF4B
ImageSize: 0026A000
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4
    Information from resource tables:
Soruna netr28x.sys sebep oluyor. Bu da Ralink 802.11 WiFi sürücüsüdür. Sürücüyü güncelle. Güncellemeyi bilmiyorsan Windows 10'a geç. 7 için destek vermiyoruz.

Kod:
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff8a000d9e618, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff800033386fd, address which referenced memory

Debugging Details:
------------------

GetUlongPtrFromAddress: unable to read from fffff80003304300

KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 1

Key : Analysis.Elapsed.Sec
Value: 1

Key : Analysis.Memory.CommitPeak.Mb
Value: 62


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700

SYSTEM_MANUFACTURER: Hewlett-Packard

SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC

SYSTEM_SKU: J4T62EA#AB8

SYSTEM_VERSION: 0991100000000000000600087

BIOS_VENDOR: Insyde

BIOS_VERSION: F.43

BIOS_DATE: 12/19/2017

BASEBOARD_MANUFACTURER: Hewlett-Packard

BASEBOARD_PRODUCT: 2211

BASEBOARD_VERSION: 86.56

DUMP_TYPE: 2

BUGCHECK_P1: fffff8a000d9e618

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff800033386fd

WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80003304100
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff800033042f0
GetUlongPtrFromAddress: unable to read from fffff800033044a8
GetPointerFromAddress: unable to read from fffff800033040d8
fffff8a000d9e618 Paged pool

CURRENT_IRQL: 2

FAULTING_IP:
nt!HvpDoAllocateCell+101
fffff800`033386fd 89443d00 mov dword ptr [rbp+rdi],eax

CPU_COUNT: 4

CPU_MHZ: 6a0

CPU_VENDOR: GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 45

CPU_STEPPING: 1

CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init)

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT

BUGCHECK_STR: 0xA

PROCESS_NAME: System

ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5

ANALYSIS_SESSION_TIME: 06-17-2019 20:48:20.0473

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

TRAP_FRAME:  fffff80004423950 -- (.trap 0xfffff80004423950)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000000039e8 rbx=0000000000000000 rcx=00000000000005e8
rdx=0000000000000008 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800033386fd rsp=fffff80004423ae0 rbp=0000000000000030
r8=fffff8a000024010 r9=0000000000000005 r10=fffff8a000d9e000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!HvpDoAllocateCell+0x101:
fffff800`033386fd 89443d00 mov dword ptr [rbp+rdi],eax ss:0018:00000000`00000030=????????
Resetting default scope

LAST_CONTROL_TRANSFER: from fffff80003108f69 to fffff800030faba0

STACK_TEXT:
fffff800`04423808 fffff800`03108f69 : 00000000`0000000a fffff8a0`00d9e618 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff800`04423810 fffff800`03106d88 : 00000000`00000001 fffff8a0`00d9e618 00000000`00000000 fffff8a0`00024010 : nt!KiBugCheckDispatch+0x69
fffff800`04423950 fffff800`033386fd : fffff8a0`00024010 fffff8a0`00024010 fffff8a0`00053ae0 00000000`00000000 : nt!KiPageFault+0x448
fffff800`04423ae0 fffff800`0337ad0d : fffff8a0`00024010 00000000`00000000 00000000`00000000 00000000`ffffffff : nt!HvpDoAllocateCell+0x101
fffff800`04423b40 fffff800`0337ab9d : 00000000`00000000 fffff8a0`05585c30 00000000`00000008 fffff800`03368d5c : nt!HvAllocateCell+0x55
fffff800`04423b70 fffff800`0332d4bf : fffff8a0`00024010 fffff8a0`00024010 fffff8a0`05593640 fffff800`04423e18 : nt!CmpAddValueKeyNew+0x69
fffff800`04423c40 fffff800`035136a3 : 01d4f094`f66bc44b fffff800`04423ff0 fffff8a0`0085fa70 00000000`00000000 : nt!CmpSetValueKeyNew+0x77
fffff800`04423c90 fffff800`03338531 : fffff8a0`14bbfca0 fffff800`04423e18 fffffa80`00000004 fffff800`04424210 : nt!CmSetValueKey+0xba3
fffff800`04423dd0 fffff800`03108bd3 : ffffffff`80000bec 00000000`00000002 fffffa80`00000000 fffff800`00000004 : nt!NtSetValueKey+0x349
fffff800`04423f00 fffff800`030fe3b0 : fffff800`0344f272 fffff800`04424248 fffff880`014b9152 00000000`539f0000 : nt!KiSystemServiceCopyEnd+0x13
fffff800`04424108 fffff800`0344f272 : fffff800`04424248 fffff880`014b9152 00000000`539f0000 fffff800`04424270 : nt!KiServiceLinkage
fffff800`04424110 fffff880`014c0d96 : 00000000`00000004 fffffa80`071c5250 00000000`00000000 00000000`000007ff : nt!RtlWriteRegistryValue+0x62
fffff800`04424170 fffff880`04f2698d : fffff800`04424270 fffff880`05135c28 00000000`00000000 00000000`00000000 : ndis!NdisWriteConfiguration+0x156
fffff800`044241d0 fffff800`04424270 : fffff880`05135c28 00000000`00000000 00000000`00000000 fffff800`001801a9 : netr28x+0x4b98d
fffff800`044241d8 fffff880`05135c28 : 00000000`00000000 00000000`00000000 fffff800`001801a9 fffffa80`059cb1a0 : 0xfffff800`04424270
fffff800`044241e0 00000000`00000000 : 00000000`00000000 fffff800`001801a9 fffffa80`059cb1a0 fffff800`00000000 : netr28x+0x25ac28


THREAD_SHA1_HASH_MOD_FUNC: 80858fdf941bd645ff48b6997b30f63ac59926fb

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 394aafee51f76470053fa2102b9df0f0f7df42a3

THREAD_SHA1_HASH_MOD: 5d50876435db08b990ce5928fe5c90526c26b16c

FOLLOWUP_IP:
netr28x+4b98d
fffff880`04f2698d ?? ???

SYMBOL_STACK_INDEX: d

SYMBOL_NAME: netr28x+4b98d

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: netr28x

IMAGE_NAME:  netr28x.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a

STACK_COMMAND: .thread ; .cxr ; kb

FAILURE_BUCKET_ID: X64_0xA_netr28x+4b98d

BUCKET_ID: X64_0xA_netr28x+4b98d

PRIMARY_PROBLEM_CLASS: X64_0xA_netr28x+4b98d

TARGET_TIME: 2019-04-11T18:32:48.000Z

OSBUILD: 7601

OSSERVICEPACK: 1000

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 7

OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2019-03-06 05:38:53

BUILDDATESTAMP_STR: 190305-1700

BUILDLAB_STR: win7sp1_ldr_escrow

BUILDOSVER_STR: 6.1.7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700

ANALYSIS_SESSION_ELAPSED_TIME: 7ae

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:x64_0xa_netr28x+4b98d

FAILURE_ID_HASH: {a6eb3f60-a5c3-0bd6-051c-41bf4427925d}

Followup: MachineOwner
---------


INVALID_PROCESS_ATTACH_ATTEMPT (5)
Arguments:
Arg1: fffffa80042b49b0
Arg2: fffffa80050a0160
Arg3: 0000000000000000
Arg4: 0000000000000001

Debugging Details:
------------------

GetUlongPtrFromAddress: unable to read from fffff800032a0300

KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 2

Key : Analysis.Elapsed.Sec
Value: 2

Key : Analysis.Memory.CommitPeak.Mb
Value: 62


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700

SYSTEM_MANUFACTURER: Hewlett-Packard

SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC

SYSTEM_SKU: J4T62EA#AB8

SYSTEM_VERSION: 0991100000000000000600087

BIOS_VENDOR: Insyde

BIOS_VERSION: F.43

BIOS_DATE: 12/19/2017

BASEBOARD_MANUFACTURER: Hewlett-Packard

BASEBOARD_PRODUCT: 2211

BASEBOARD_VERSION: 86.56

DUMP_TYPE: 2

BUGCHECK_P1: fffffa80042b49b0

BUGCHECK_P2: fffffa80050a0160

BUGCHECK_P3: 0

BUGCHECK_P4: 1

CPU_COUNT: 4

CPU_MHZ: 6a0

CPU_VENDOR: GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 45

CPU_STEPPING: 1

CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init)

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT

BUGCHECK_STR: 0x5

PROCESS_NAME: PointBlank.exe

CURRENT_IRQL: 2

ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5

ANALYSIS_SESSION_TIME: 06-17-2019 20:57:04.0108

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

DPC_STACK_BASE: FFFFF80004428FB0

LOCK_ADDRESS: fffff80003273240 -- (!locks fffff80003273240)
Cannot get _ERESOURCE type

Resource @ nt!PiEngineLock (0xfffff80003273240) Available
1 total locks

PNP_TRIAGE_DATA:
Lock address : 0xfffff80003273240
Thread Count : 0
Thread address: 0x0000000000000000
Thread wait : 0x0

LAST_CONTROL_TRANSFER: from fffff80003045602 to fffff80003096ba0

STACK_TEXT:
fffff800`04427cc8 fffff800`03045602 : 00000000`00000005 fffffa80`042b49b0 fffffa80`050a0160 00000000`00000000 : nt!KeBugCheckEx
fffff800`04427cd0 fffff800`032ee127 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeStackAttachProcess+0x52
fffff800`04427d50 fffff800`032ee4bf : 00000000`00000000 fffff8a0`00000000 fffff8a0`00001910 00000000`00000000 : nt!ObpDecrementHandleCount+0x177
fffff800`04427dd0 fffff800`032ee1e4 : 00000000`00000d08 fffffa80`050a0160 fffff8a0`00001910 00000000`00000d08 : nt!ObpCloseHandleTableEntry+0xaf
fffff800`04427e60 fffff800`030a4bd3 : fffffa80`04b87b50 fffff800`04427f30 fffff800`03358230 fffff800`032e476a : nt!ObpCloseHandle+0x94
fffff800`04427eb0 fffff800`0309a3b0 : fffff800`03331da3 fffffa80`04ea4a10 fffff800`03358230 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
fffff800`04428048 fffff800`03331da3 : fffffa80`04ea4a10 fffff800`03358230 00000000`00000000 00000000`00000000 : nt!KiServiceLinkage
fffff800`04428050 fffff800`0333baa8 : fffffa80`04ea4a10 00000000`00000001 fffffa80`04ea2740 00000000`00000000 : nt!PiGetDeviceRegistryProperty+0xab
fffff800`044281b0 fffff800`03330ac0 : fffffa80`04ea4a10 fffffa80`04ea4a10 00000000`00000000 00000000`00000000 : nt!IoGetDeviceProperty+0xbc
fffff800`04428290 fffff800`03341f81 : 00000000`ffff0000 fffffa80`0802b150 fffff880`01553110 fffffa80`05bb6220 : nt!IopOpenOrCreateDeviceRegistryKey+0x14c
fffff800`04428450 fffff880`01598152 : 00000000`c0000001 fffff800`044285e0 00000000`00000000 00000000`000007ff : nt!IoOpenDeviceRegistryKey+0x11
fffff800`04428490 fffff880`01503b34 : fffff800`044285e0 fffff800`044285b8 fffffa80`05c461a0 fffff800`035e0000 : ndis!NdisOpenConfiguration+0xb2
fffff800`044284d0 fffff880`0508b94f : fffffa80`00000000 fffff800`044285e0 fffff880`0529ac28 00000000`00000000 : ndis!NdisOpenConfigurationEx+0xa4
fffff800`04428540 fffffa80`00000000 : fffff800`044285e0 fffff880`0529ac28 00000000`00000000 00000000`001801a9 : netr28x+0x4b94f
fffff800`04428548 fffff800`044285e0 : fffff880`0529ac28 00000000`00000000 00000000`001801a9 fffffa80`05c461a0 : 0xfffffa80`00000000
fffff800`04428550 fffff880`0529ac28 : 00000000`00000000 00000000`001801a9 fffffa80`05c461a0 00000000`00000000 : 0xfffff800`044285e0
fffff800`04428558 00000000`00000000 : 00000000`001801a9 fffffa80`05c461a0 00000000`00000000 fffffa80`0742b540 : netr28x+0x25ac28


THREAD_SHA1_HASH_MOD_FUNC: 1764d353450a941fbc74295279ec02651c3d9814

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: bdc70d393af014c177e84e60c668cc911acaf71f

THREAD_SHA1_HASH_MOD: 9a9dca34541ae91666e3989df373f06b6e683623

FOLLOWUP_IP:
netr28x+4b94f
fffff880`0508b94f ?? ???

SYMBOL_STACK_INDEX: d

SYMBOL_NAME: netr28x+4b94f

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: netr28x

IMAGE_NAME:  netr28x.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a

STACK_COMMAND: .thread ; .cxr ; kb

FAILURE_BUCKET_ID: X64_0x5_netr28x+4b94f

BUCKET_ID: X64_0x5_netr28x+4b94f

PRIMARY_PROBLEM_CLASS: X64_0x5_netr28x+4b94f

TARGET_TIME: 2019-05-01T21:53:50.000Z

OSBUILD: 7601

OSSERVICEPACK: 1000

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 7

OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2019-03-21 04:38:47

BUILDDATESTAMP_STR: 190320-1700

BUILDLAB_STR: win7sp1_ldr_escrow

BUILDOSVER_STR: 6.1.7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700

ANALYSIS_SESSION_ELAPSED_TIME: 8cb

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:x64_0x5_netr28x+4b94f

FAILURE_ID_HASH: {43753b0b-e234-1a01-8468-7eed644d41ea}

Followup:     MachineOwner
INVALID_PROCESS_ATTACH_ATTEMPT (5)
Arguments:
Arg1: fffffa80042ce9b0
Arg2: fffffa8005d11370
Arg3: 0000000000000000
Arg4: 0000000000000001

Debugging Details:
------------------

GetUlongPtrFromAddress: unable to read from fffff800032b3300

KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 2

Key : Analysis.Elapsed.Sec
Value: 2

Key : Analysis.Memory.CommitPeak.Mb
Value: 62


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700

SYSTEM_MANUFACTURER: Hewlett-Packard

SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC

SYSTEM_SKU: J4T62EA#AB8

SYSTEM_VERSION: 0991100000000000000600087

BIOS_VENDOR: Insyde

BIOS_VERSION: F.43

BIOS_DATE: 12/19/2017

BASEBOARD_MANUFACTURER: Hewlett-Packard

BASEBOARD_PRODUCT: 2211

BASEBOARD_VERSION: 86.56

DUMP_TYPE: 2

BUGCHECK_P1: fffffa80042ce9b0

BUGCHECK_P2: fffffa8005d11370

BUGCHECK_P3: 0

BUGCHECK_P4: 1

CPU_COUNT: 4

CPU_MHZ: 6a0

CPU_VENDOR: GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 45

CPU_STEPPING: 1

CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init)

CUSTOMER_CRASH_COUNT: 2

DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT

BUGCHECK_STR: 0x5

PROCESS_NAME: audiodg.exe

CURRENT_IRQL: 2

ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5

ANALYSIS_SESSION_TIME: 06-17-2019 20:49:02.0621

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

DPC_STACK_BASE: FFFFF80000BA2FB0

LOCK_ADDRESS: fffff80003286240 -- (!locks fffff80003286240)
Cannot get _ERESOURCE type

Resource @ nt!PiEngineLock (0xfffff80003286240) Available
1 total locks

PNP_TRIAGE_DATA:
Lock address : 0xfffff80003286240
Thread Count : 0
Thread address: 0x0000000000000000
Thread wait : 0x0

LAST_CONTROL_TRANSFER: from fffff80003058602 to fffff800030a9ba0

STACK_TEXT:
fffff800`00ba1cc8 fffff800`03058602 : 00000000`00000005 fffffa80`042ce9b0 fffffa80`05d11370 00000000`00000000 : nt!KeBugCheckEx
fffff800`00ba1cd0 fffff800`03301127 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeStackAttachProcess+0x52
fffff800`00ba1d50 fffff800`033014bf : 00000000`00000000 fffff8a0`00000000 fffff8a0`00001910 00000000`00000000 : nt!ObpDecrementHandleCount+0x177
fffff800`00ba1dd0 fffff800`033011e4 : 00000000`00000e48 fffffa80`05d11370 fffff8a0`00001910 00000000`00000e48 : nt!ObpCloseHandleTableEntry+0xaf
fffff800`00ba1e60 fffff800`030b7bd3 : fffffa80`05d7ba00 fffff800`00ba1f30 fffff800`0336b230 fffff800`032f776a : nt!ObpCloseHandle+0x94
fffff800`00ba1eb0 fffff800`030ad3b0 : fffff800`03344da3 fffffa80`04e9e060 fffff800`0336b230 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
fffff800`00ba2048 fffff800`03344da3 : fffffa80`04e9e060 fffff800`0336b230 00000000`00000000 00000000`00000000 : nt!KiServiceLinkage
fffff800`00ba2050 fffff800`0334eaa8 : fffffa80`04e9e060 00000000`00000001 fffffa80`04e9d6e0 00000000`00000000 : nt!PiGetDeviceRegistryProperty+0xab
fffff800`00ba21b0 fffff800`03343ac0 : fffffa80`04e9e060 fffffa80`04e9e060 00000000`00000000 00000000`00000000 : nt!IoGetDeviceProperty+0xbc
fffff800`00ba2290 fffff800`03354f81 : 00000000`ffff0000 fffffa80`05086440 fffff880`01482110 fffffa80`05b713f0 : nt!IopOpenOrCreateDeviceRegistryKey+0x14c
fffff800`00ba2450 fffff880`014c7152 : fffffa80`04a3fd50 fffff800`00ba25e0 fffffa80`05f48a78 00000000`000007ff : nt!IoOpenDeviceRegistryKey+0x11
fffff800`00ba2490 fffff880`01432b34 : fffff800`00ba25e0 fffff800`00ba25b8 fffffa80`05b6d1a0 fffff880`014dd21d : ndis!NdisOpenConfiguration+0xb2
fffff800`00ba24d0 fffff880`0512a94f : fffffa80`00000000 fffff800`00ba25e0 fffff880`05339c28 00000000`00000000 : ndis!NdisOpenConfigurationEx+0xa4
fffff800`00ba2540 fffffa80`00000000 : fffff800`00ba25e0 fffff880`05339c28 00000000`00000000 00000000`001801a9 : netr28x+0x4b94f
fffff800`00ba2548 fffff800`00ba25e0 : fffff880`05339c28 00000000`00000000 00000000`001801a9 fffffa80`05b6d1a0 : 0xfffffa80`00000000
fffff800`00ba2550 fffff880`05339c28 : 00000000`00000000 00000000`001801a9 fffffa80`05b6d1a0 fffffa80`00000000 : 0xfffff800`00ba25e0
fffff800`00ba2558 00000000`00000000 : 00000000`001801a9 fffffa80`05b6d1a0 fffffa80`00000000 fffff880`05136e2e : netr28x+0x25ac28


THREAD_SHA1_HASH_MOD_FUNC: 1764d353450a941fbc74295279ec02651c3d9814

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: bdc70d393af014c177e84e60c668cc911acaf71f

THREAD_SHA1_HASH_MOD: 9a9dca34541ae91666e3989df373f06b6e683623

FOLLOWUP_IP:
netr28x+4b94f
fffff880`0512a94f ?? ???

SYMBOL_STACK_INDEX: d

SYMBOL_NAME: netr28x+4b94f

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: netr28x

IMAGE_NAME:  netr28x.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a

STACK_COMMAND: .thread ; .cxr ; kb

FAILURE_BUCKET_ID: X64_0x5_netr28x+4b94f

BUCKET_ID: X64_0x5_netr28x+4b94f

PRIMARY_PROBLEM_CLASS: X64_0x5_netr28x+4b94f

TARGET_TIME: 2019-04-27T20:53:09.000Z

OSBUILD: 7601

OSSERVICEPACK: 1000

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 7

OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2019-03-21 04:38:47

BUILDDATESTAMP_STR: 190320-1700

BUILDLAB_STR: win7sp1_ldr_escrow

BUILDOSVER_STR: 6.1.7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700

ANALYSIS_SESSION_ELAPSED_TIME: 89c

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:x64_0x5_netr28x+4b94f

FAILURE_ID_HASH: {43753b0b-e234-1a01-8468-7eed644d41ea}

Followup: MachineOwner
---------

INVALID_PROCESS_ATTACH_ATTEMPT (5)
Arguments:
Arg1: fffffa80042b49b0
Arg2: fffffa8004ee55f0
Arg3: 0000000000000000
Arg4: 0000000000000001

Debugging Details:
------------------

GetUlongPtrFromAddress: unable to read from fffff800032b0300

KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 2

Key : Analysis.Elapsed.Sec
Value: 2

Key : Analysis.Memory.CommitPeak.Mb
Value: 62


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700

SYSTEM_MANUFACTURER: Hewlett-Packard

SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC

SYSTEM_SKU: J4T62EA#AB8

SYSTEM_VERSION: 0991100000000000000600087

BIOS_VENDOR: Insyde

BIOS_VERSION: F.43

BIOS_DATE: 12/19/2017

BASEBOARD_MANUFACTURER: Hewlett-Packard

BASEBOARD_PRODUCT: 2211

BASEBOARD_VERSION: 86.56

DUMP_TYPE: 2

BUGCHECK_P1: fffffa80042b49b0

BUGCHECK_P2: fffffa8004ee55f0

BUGCHECK_P3: 0

BUGCHECK_P4: 1

CPU_COUNT: 4

CPU_MHZ: 6a0

CPU_VENDOR: GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 45

CPU_STEPPING: 1

CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init)

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT

BUGCHECK_STR: 0x5

PROCESS_NAME: PointBlank.exe

CURRENT_IRQL: 2

ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5

ANALYSIS_SESSION_TIME: 06-17-2019 20:48:58.0829

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

DPC_STACK_BASE: FFFFF8000441FFB0

LOCK_ADDRESS: fffff80003283240 -- (!locks fffff80003283240)
Cannot get _ERESOURCE type

Resource @ nt!PiEngineLock (0xfffff80003283240) Available
1 total locks

PNP_TRIAGE_DATA:
Lock address : 0xfffff80003283240
Thread Count : 0
Thread address: 0x0000000000000000
Thread wait : 0x0

LAST_CONTROL_TRANSFER: from fffff80003055602 to fffff800030a6ba0

STACK_TEXT:
fffff800`0441ecc8 fffff800`03055602 : 00000000`00000005 fffffa80`042b49b0 fffffa80`04ee55f0 00000000`00000000 : nt!KeBugCheckEx
fffff800`0441ecd0 fffff800`032fe127 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeStackAttachProcess+0x52
fffff800`0441ed50 fffff800`032fe4bf : 00000000`00000000 fffff8a0`00000000 fffff8a0`00001910 00000000`00000000 : nt!ObpDecrementHandleCount+0x177
fffff800`0441edd0 fffff800`032fe1e4 : 00000000`00000a80 fffffa80`04ee55f0 fffff8a0`00001910 00000000`00000a80 : nt!ObpCloseHandleTableEntry+0xaf
fffff800`0441ee60 fffff800`030b4bd3 : fffffa80`0861e940 fffff800`0441ef30 fffff800`03368230 fffff800`032f476a : nt!ObpCloseHandle+0x94
fffff800`0441eeb0 fffff800`030aa3b0 : fffff800`03341da3 fffffa80`04d31a10 fffff800`03368230 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
fffff800`0441f048 fffff800`03341da3 : fffffa80`04d31a10 fffff800`03368230 00000000`00000000 00000000`00000000 : nt!KiServiceLinkage
fffff800`0441f050 fffff800`0334baa8 : fffffa80`04d31a10 00000000`00000001 fffffa80`04d2d740 00000000`00000000 : nt!PiGetDeviceRegistryProperty+0xab
fffff800`0441f1b0 fffff800`03340ac0 : fffffa80`04d31a10 fffffa80`04d31a10 00000000`00000000 00000000`00000000 : nt!IoGetDeviceProperty+0xbc
fffff800`0441f290 fffff800`03351f81 : 00000000`ffff0000 fffffa80`046a8bd0 fffff880`014c6110 fffffa80`05a70cf0 : nt!IopOpenOrCreateDeviceRegistryKey+0x14c
fffff800`0441f450 fffff880`0150b152 : fffffa80`07393890 fffff800`0441f5e0 00000000`0000001f 00000000`000007ff : nt!IoOpenDeviceRegistryKey+0x11
fffff800`0441f490 fffff880`01476b34 : fffff800`0441f5e0 fffff800`0441f5b8 fffffa80`05a6f1a0 fffff800`035f7be3 : ndis!NdisOpenConfiguration+0xb2
fffff800`0441f4d0 fffff880`04e7694f : fffffa80`00000000 fffff800`0441f5e0 fffff880`05085c28 00000000`00000000 : ndis!NdisOpenConfigurationEx+0xa4
fffff800`0441f540 fffffa80`00000000 : fffff800`0441f5e0 fffff880`05085c28 00000000`00000000 00000000`001801a9 : netr28x+0x4b94f
fffff800`0441f548 fffff800`0441f5e0 : fffff880`05085c28 00000000`00000000 00000000`001801a9 fffffa80`05a6f1a0 : 0xfffffa80`00000000
fffff800`0441f550 fffff880`05085c28 : 00000000`00000000 00000000`001801a9 fffffa80`05a6f1a0 00000000`00000000 : 0xfffff800`0441f5e0
fffff800`0441f558 00000000`00000000 : 00000000`001801a9 fffffa80`05a6f1a0 00000000`00000000 fffffa80`0452e670 : netr28x+0x25ac28


THREAD_SHA1_HASH_MOD_FUNC: 1764d353450a941fbc74295279ec02651c3d9814

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: bdc70d393af014c177e84e60c668cc911acaf71f

THREAD_SHA1_HASH_MOD: 9a9dca34541ae91666e3989df373f06b6e683623

FOLLOWUP_IP:
netr28x+4b94f
fffff880`04e7694f ?? ???

SYMBOL_STACK_INDEX: d

SYMBOL_NAME: netr28x+4b94f

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: netr28x

IMAGE_NAME:  netr28x.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a

STACK_COMMAND: .thread ; .cxr ; kb

FAILURE_BUCKET_ID: X64_0x5_netr28x+4b94f

BUCKET_ID: X64_0x5_netr28x+4b94f

PRIMARY_PROBLEM_CLASS: X64_0x5_netr28x+4b94f

TARGET_TIME: 2019-04-21T09:57:22.000Z

OSBUILD: 7601

OSSERVICEPACK: 1000

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 7

OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2019-03-21 04:38:47

BUILDDATESTAMP_STR: 190320-1700

BUILDLAB_STR: win7sp1_ldr_escrow

BUILDOSVER_STR: 6.1.7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700

ANALYSIS_SESSION_ELAPSED_TIME: 8dc

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:x64_0x5_netr28x+4b94f

FAILURE_ID_HASH: {43753b0b-e234-1a01-8468-7eed644d41ea}

Followup: MachineOwner
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff8a000f95c5c, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8000334077c, address which referenced memory

Debugging Details:
------------------

GetUlongPtrFromAddress: unable to read from fffff800032f7300

KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 1

Key : Analysis.Elapsed.Sec
Value: 2

Key : Analysis.Memory.CommitPeak.Mb
Value: 62


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700

SYSTEM_MANUFACTURER: Hewlett-Packard

SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC

SYSTEM_SKU: J4T62EA#AB8

SYSTEM_VERSION: 0991100000000000000600087

BIOS_VENDOR: Insyde

BIOS_VERSION: F.43

BIOS_DATE: 12/19/2017

BASEBOARD_MANUFACTURER: Hewlett-Packard

BASEBOARD_PRODUCT: 2211

BASEBOARD_VERSION: 86.56

DUMP_TYPE: 2

BUGCHECK_P1: fffff8a000f95c5c

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8000334077c

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800032f7100
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff800032f72f0
GetUlongPtrFromAddress: unable to read from fffff800032f74a8
GetPointerFromAddress: unable to read from fffff800032f70d8
fffff8a000f95c5c Paged pool

CURRENT_IRQL: 2

FAULTING_IP:
nt!CmpFindValueByNameFromCache+12c
fffff800`0334077c 41f6401001 test byte ptr [r8+10h],1

CPU_COUNT: 4

CPU_MHZ: 6a0

CPU_VENDOR: GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 45

CPU_STEPPING: 1

CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init)

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT

BUGCHECK_STR: 0xA

PROCESS_NAME: System

ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5

ANALYSIS_SESSION_TIME: 06-17-2019 20:48:55.0594

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

DPC_STACK_BASE: FFFFF80000BA2FB0

TRAP_FRAME:  fffff80000ba1d00 -- (.trap 0xfffff80000ba1d00)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000c64c48 rbx=0000000000000000 rcx=fffff80000ba1fa1
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8000334077c rsp=fffff80000ba1e90 rbp=fffff80000ba2360
r8=fffff8a000f95c4c r9=000000000000ffff r10=fffffa8005aaacfc
r11=fffff8a0018b9b46 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!CmpFindValueByNameFromCache+0x12c:
fffff800`0334077c 41f6401001 test byte ptr [r8+10h],1 ds:fffff8a0`00f95c5c=01
Resetting default scope

LAST_CONTROL_TRANSFER: from fffff800030fbf69 to fffff800030edba0

STACK_TEXT:
fffff800`00ba1bb8 fffff800`030fbf69 : 00000000`0000000a fffff8a0`00f95c5c 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff800`00ba1bc0 fffff800`030f9d88 : 00000000`00000000 fffff8a0`00f95c5c fffffa80`05191000 fffff8a0`00024010 : nt!KiBugCheckDispatch+0x69
fffff800`00ba1d00 fffff800`0334077c : fffff8a0`00024010 fffff8a0`00024010 fffff8a0`00048c80 00000000`00000000 : nt!KiPageFault+0x448
fffff800`00ba1e90 fffff800`03323c38 : fffff8a0`15bf1de8 fffff800`00ba2188 fffff800`00ba1fd0 fffff800`00ba1fb8 : nt!CmpFindValueByNameFromCache+0x12c
fffff800`00ba1f60 fffff800`035061e7 : fffff8a0`15bf1de8 01d4f7b8`449491c9 fffff8a0`15bf1de8 00000000`00000000 : nt!CmpCompareNewValueDataAgainstKCBCache+0x78
fffff800`00ba2000 fffff800`0332b531 : fffff8a0`1f297040 fffff800`00ba2188 fffffa80`00000004 fffff800`00ba2580 : nt!CmSetValueKey+0x6a7
fffff800`00ba2140 fffff800`030fbbd3 : ffffffff`80000cc8 00000000`00000002 fffffa80`00000000 fffff800`00000004 : nt!NtSetValueKey+0x349
fffff800`00ba2270 fffff800`030f13b0 : fffff800`034422a2 fffff800`00ba25b8 fffff880`01514152 00000000`c0000001 : nt!KiSystemServiceCopyEnd+0x13
fffff800`00ba2478 fffff800`034422a2 : fffff800`00ba25b8 fffff880`01514152 00000000`c0000001 fffff800`00ba25e0 : nt!KiServiceLinkage
fffff800`00ba2480 fffff880`0151bd96 : 00000000`00000004 fffffa80`05aaacf0 00000100`00000000 00000000`000007ff : nt!RtlWriteRegistryValue+0x62
fffff800`00ba24e0 fffff880`0514a98d : fffff800`00ba25e0 fffff880`05359c28 00000000`00000000 00000000`00000000 : ndis!NdisWriteConfiguration+0x156
fffff800`00ba2540 fffff800`00ba25e0 : fffff880`05359c28 00000000`00000000 00000000`00000000 fffffa80`001801a9 : netr28x+0x4b98d
fffff800`00ba2548 fffff880`05359c28 : 00000000`00000000 00000000`00000000 fffffa80`001801a9 fffffa80`05b411a0 : 0xfffff800`00ba25e0
fffff800`00ba2550 00000000`00000000 : 00000000`00000000 fffffa80`001801a9 fffffa80`05b411a0 00000000`00000000 : netr28x+0x25ac28


THREAD_SHA1_HASH_MOD_FUNC: 935105e89958188e75032d802c31088ef212f1d5

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: d6275099b99a3ef75c037e31f081aba5025e8f89

THREAD_SHA1_HASH_MOD: 7921e317582c7f98a7f13cfbcd3c02a86fdcafec

FOLLOWUP_IP:
netr28x+4b98d
fffff880`0514a98d ?? ???

SYMBOL_STACK_INDEX: b

SYMBOL_NAME: netr28x+4b98d

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: netr28x

IMAGE_NAME:  netr28x.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a

STACK_COMMAND: .thread ; .cxr ; kb

FAILURE_BUCKET_ID: X64_0xA_netr28x+4b98d

BUCKET_ID: X64_0xA_netr28x+4b98d

PRIMARY_PROBLEM_CLASS: X64_0xA_netr28x+4b98d

TARGET_TIME: 2019-04-20T20:33:09.000Z

OSBUILD: 7601

OSSERVICEPACK: 1000

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 7

OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2019-03-21 04:38:47

BUILDDATESTAMP_STR: 190320-1700

BUILDLAB_STR: win7sp1_ldr_escrow

BUILDOSVER_STR: 6.1.7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700

ANALYSIS_SESSION_ELAPSED_TIME: 7e6

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:x64_0xa_netr28x+4b98d

FAILURE_ID_HASH: {a6eb3f60-a5c3-0bd6-051c-41bf4427925d}

Followup: MachineOwner
---------


INVALID_PROCESS_ATTACH_ATTEMPT (5)
Arguments:
Arg1: fffffa80042d09b0
Arg2: fffffa80075e8060
Arg3: 0000000000000000
Arg4: 0000000000000001

Debugging Details:
------------------

GetUlongPtrFromAddress: unable to read from fffff800032af300

KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 2

Key : Analysis.Elapsed.Sec
Value: 2

Key : Analysis.Memory.CommitPeak.Mb
Value: 62


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700

SYSTEM_MANUFACTURER: Hewlett-Packard

SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC

SYSTEM_SKU: J4T62EA#AB8

SYSTEM_VERSION: 0991100000000000000600087

BIOS_VENDOR: Insyde

BIOS_VERSION: F.43

BIOS_DATE: 12/19/2017

BASEBOARD_MANUFACTURER: Hewlett-Packard

BASEBOARD_PRODUCT: 2211

BASEBOARD_VERSION: 86.56

DUMP_TYPE: 2

BUGCHECK_P1: fffffa80042d09b0

BUGCHECK_P2: fffffa80075e8060

BUGCHECK_P3: 0

BUGCHECK_P4: 1

CPU_COUNT: 4

CPU_MHZ: 6a0

CPU_VENDOR: GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 45

CPU_STEPPING: 1

CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init)

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT

BUGCHECK_STR: 0x5

PROCESS_NAME: audiodg.exe

CURRENT_IRQL: 2

ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5

ANALYSIS_SESSION_TIME: 06-17-2019 20:48:52.0836

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

DPC_STACK_BASE: FFFFF8000441FFB0

LOCK_ADDRESS: fffff80003282240 -- (!locks fffff80003282240)
Cannot get _ERESOURCE type

Resource @ nt!PiEngineLock (0xfffff80003282240) Available
1 total locks

PNP_TRIAGE_DATA:
Lock address : 0xfffff80003282240
Thread Count : 0
Thread address: 0x0000000000000000
Thread wait : 0x0

LAST_CONTROL_TRANSFER: from fffff800030545f2 to fffff800030a5ba0

STACK_TEXT:
fffff800`0441ecc8 fffff800`030545f2 : 00000000`00000005 fffffa80`042d09b0 fffffa80`075e8060 00000000`00000000 : nt!KeBugCheckEx
fffff800`0441ecd0 fffff800`032fd127 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeStackAttachProcess+0x52
fffff800`0441ed50 fffff800`032fd4bf : 00000000`00000000 fffff8a0`00000000 fffff8a0`00001910 00000000`00000000 : nt!ObpDecrementHandleCount+0x177
fffff800`0441edd0 fffff800`032fd1e4 : 00000000`000007c8 fffffa80`075e8060 fffff8a0`00001910 00000000`000007c8 : nt!ObpCloseHandleTableEntry+0xaf
fffff800`0441ee60 fffff800`030b3bd3 : fffffa80`044dab50 fffff800`0441ef30 fffff800`03367200 fffff800`032f376a : nt!ObpCloseHandle+0x94
fffff800`0441eeb0 fffff800`030a93b0 : fffff800`03340d73 fffffa80`04ddc060 fffff800`03367200 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
fffff800`0441f048 fffff800`03340d73 : fffffa80`04ddc060 fffff800`03367200 00000000`00000000 00000000`00000000 : nt!KiServiceLinkage
fffff800`0441f050 fffff800`0334aa78 : fffffa80`04ddc060 00000000`00000001 fffffa80`04dd96e0 00000000`00000000 : nt!PiGetDeviceRegistryProperty+0xab
fffff800`0441f1b0 fffff800`0333fa90 : fffffa80`04ddc060 fffffa80`04ddc060 00000000`00000000 00000000`00000000 : nt!IoGetDeviceProperty+0xbc
fffff800`0441f290 fffff800`03350f51 : 00000000`ffff0000 fffffa80`05a69770 fffff880`014e7110 fffffa80`05ca3270 : nt!IopOpenOrCreateDeviceRegistryKey+0x14c
fffff800`0441f450 fffff880`0152c152 : fffffa80`071bfdc0 fffff800`0441f5e0 00000000`0000001f 00000000`000007ff : nt!IoOpenDeviceRegistryKey+0x11
fffff800`0441f490 fffff880`01497b34 : fffff800`0441f5e0 fffff800`0441f5b8 fffffa80`05c0a1a0 fffff880`0646eab0 : ndis!NdisOpenConfiguration+0xb2
fffff800`0441f4d0 fffff880`04f0c94f : fffffa80`00000000 fffff800`0441f5e0 fffff880`0511bc28 00000000`00000000 : ndis!NdisOpenConfigurationEx+0xa4
fffff800`0441f540 fffffa80`00000000 : fffff800`0441f5e0 fffff880`0511bc28 00000000`00000000 fffffa80`001801a9 : netr28x+0x4b94f
fffff800`0441f548 fffff800`0441f5e0 : fffff880`0511bc28 00000000`00000000 fffffa80`001801a9 fffffa80`05c0a1a0 : 0xfffffa80`00000000
fffff800`0441f550 fffff880`0511bc28 : 00000000`00000000 fffffa80`001801a9 fffffa80`05c0a1a0 00000000`00000000 : 0xfffff800`0441f5e0
fffff800`0441f558 00000000`00000000 : fffffa80`001801a9 fffffa80`05c0a1a0 00000000`00000000 fffff880`00e5028c : netr28x+0x25ac28


THREAD_SHA1_HASH_MOD_FUNC: 1764d353450a941fbc74295279ec02651c3d9814

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: bdc70d393af014c177e84e60c668cc911acaf71f

THREAD_SHA1_HASH_MOD: 9a9dca34541ae91666e3989df373f06b6e683623

FOLLOWUP_IP:
netr28x+4b94f
fffff880`04f0c94f ?? ???

SYMBOL_STACK_INDEX: d

SYMBOL_NAME: netr28x+4b94f

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: netr28x

IMAGE_NAME:  netr28x.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a

STACK_COMMAND: .thread ; .cxr ; kb

FAILURE_BUCKET_ID: X64_0x5_netr28x+4b94f

BUCKET_ID: X64_0x5_netr28x+4b94f

PRIMARY_PROBLEM_CLASS: X64_0x5_netr28x+4b94f

TARGET_TIME: 2019-04-11T15:07:27.000Z

OSBUILD: 7601

OSSERVICEPACK: 1000

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 7

OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2019-03-06 05:38:53

BUILDDATESTAMP_STR: 190305-1700

BUILDLAB_STR: win7sp1_ldr_escrow

BUILDOSVER_STR: 6.1.7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700

ANALYSIS_SESSION_ELAPSED_TIME: 8c6

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:x64_0x5_netr28x+4b94f

FAILURE_ID_HASH: {43753b0b-e234-1a01-8468-7eed644d41ea}

Followup:     MachineOwner


INVALID_PROCESS_ATTACH_ATTEMPT (5)
Arguments:
Arg1: fffffa80042b59b0
Arg2: fffffa8004c74b00
Arg3: 0000000000000001
Arg4: 0000000000000001

Debugging Details:
------------------

GetUlongPtrFromAddress: unable to read from fffff800030f3300

KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 2

Key : Analysis.Elapsed.Sec
Value: 2

Key : Analysis.Memory.CommitPeak.Mb
Value: 62


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700

SYSTEM_MANUFACTURER: Hewlett-Packard

SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC

SYSTEM_SKU: J4T62EA#AB8

SYSTEM_VERSION: 0991100000000000000600087

BIOS_VENDOR: Insyde

BIOS_VERSION: F.43

BIOS_DATE: 12/19/2017

BASEBOARD_MANUFACTURER: Hewlett-Packard

BASEBOARD_PRODUCT: 2211

BASEBOARD_VERSION: 86.56

DUMP_TYPE: 2

BUGCHECK_P1: fffffa80042b59b0

BUGCHECK_P2: fffffa8004c74b00

BUGCHECK_P3: 1

BUGCHECK_P4: 1

CPU_COUNT: 4

CPU_MHZ: 6a0

CPU_VENDOR: GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 45

CPU_STEPPING: 1

CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init)

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT

BUGCHECK_STR: 0x5

PROCESS_NAME: chrome.exe

CURRENT_IRQL: 2

ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5

ANALYSIS_SESSION_TIME: 06-17-2019 20:48:49.0152

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

DPC_STACK_BASE: FFFFF80000BA2FB0

LOCK_ADDRESS: fffff800030c6240 -- (!locks fffff800030c6240)
Cannot get _ERESOURCE type

Resource @ nt!PiEngineLock (0xfffff800030c6240) Available
1 total locks

PNP_TRIAGE_DATA:
Lock address : 0xfffff800030c6240
Thread Count : 0
Thread address: 0x0000000000000000
Thread wait : 0x0

LAST_CONTROL_TRANSFER: from fffff80002e985f2 to fffff80002ee9ba0

STACK_TEXT:
fffff800`00ba1cc8 fffff800`02e985f2 : 00000000`00000005 fffffa80`042b59b0 fffffa80`04c74b00 00000000`00000001 : nt!KeBugCheckEx
fffff800`00ba1cd0 fffff800`03141127 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeStackAttachProcess+0x52
fffff800`00ba1d50 fffff800`031414bf : 00000000`00000000 fffff8a0`00000000 fffff8a0`00001910 00000000`00000000 : nt!ObpDecrementHandleCount+0x177
fffff800`00ba1dd0 fffff800`031411e4 : 00000000`000008e4 fffffa80`04c74b00 fffff8a0`00001910 00000000`000008e4 : nt!ObpCloseHandleTableEntry+0xaf
fffff800`00ba1e60 fffff800`02ef7bd3 : fffffa80`076a6b50 fffff800`00ba1f30 fffff800`031ab200 fffff800`0313776a : nt!ObpCloseHandle+0x94
fffff800`00ba1eb0 fffff800`02eed3b0 : fffff800`03184d73 fffffa80`04e1e060 fffff800`031ab200 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
fffff800`00ba2048 fffff800`03184d73 : fffffa80`04e1e060 fffff800`031ab200 00000000`00000000 00000000`00000000 : nt!KiServiceLinkage
fffff800`00ba2050 fffff800`0318ea78 : fffffa80`04e1e060 00000000`00000001 fffffa80`04e1d6e0 00000000`00000000 : nt!PiGetDeviceRegistryProperty+0xab
fffff800`00ba21b0 fffff800`03183a90 : fffffa80`04e1e060 fffffa80`04e1e060 00000000`00000000 00000000`00000000 : nt!IoGetDeviceProperty+0xbc
fffff800`00ba2290 fffff800`03194f51 : 00000000`ffff0000 fffffa80`07df09f0 fffff880`01480110 fffffa80`05cfe910 : nt!IopOpenOrCreateDeviceRegistryKey+0x14c
fffff800`00ba2450 fffff880`014c5152 : fffffa80`080038e0 fffff800`00ba25e0 fffffa80`0700aa78 00000000`000007ff : nt!IoOpenDeviceRegistryKey+0x11
fffff800`00ba2490 fffff880`01430b34 : fffff800`00ba25e0 fffff800`00ba25b8 fffffa80`055e31a0 fffff880`014db21d : ndis!NdisOpenConfiguration+0xb2
fffff800`00ba24d0 fffff880`04e5194f : 00000000`00000000 fffff800`00ba25e0 fffff880`05060c28 00000000`00000000 : ndis!NdisOpenConfigurationEx+0xa4
fffff800`00ba2540 00000000`00000000 : fffff800`00ba25e0 fffff880`05060c28 00000000`00000000 fffffa80`001801a9 : netr28x+0x4b94f


THREAD_SHA1_HASH_MOD_FUNC: ae5746727567d6f3e980a5bab83b7524a5dc9ee8

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: a4491f04e0c588cecd320ea5c66c026862f569ea

THREAD_SHA1_HASH_MOD: 34d7ba38146ecb972065c22fa7203d72f73eccb4

FOLLOWUP_IP:
netr28x+4b94f
fffff880`04e5194f ?? ???

SYMBOL_STACK_INDEX: d

SYMBOL_NAME: netr28x+4b94f

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: netr28x

IMAGE_NAME:  netr28x.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a

STACK_COMMAND: .thread ; .cxr ; kb

FAILURE_BUCKET_ID: X64_0x5_netr28x+4b94f

BUCKET_ID: X64_0x5_netr28x+4b94f

PRIMARY_PROBLEM_CLASS: X64_0x5_netr28x+4b94f

TARGET_TIME: 2019-04-11T14:09:37.000Z

OSBUILD: 7601

OSSERVICEPACK: 1000

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 7

OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2019-03-06 05:38:53

BUILDDATESTAMP_STR: 190305-1700

BUILDLAB_STR: win7sp1_ldr_escrow

BUILDOSVER_STR: 6.1.7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700

ANALYSIS_SESSION_ELAPSED_TIME: 941

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:x64_0x5_netr28x+4b94f

FAILURE_ID_HASH: {43753b0b-e234-1a01-8468-7eed644d41ea}

Followup: MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff8a002085398, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80003ae56fd, address which referenced memory

Debugging Details:
------------------

GetUlongPtrFromAddress: unable to read from fffff80003ab1300

KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 1

Key : Analysis.Elapsed.Sec
Value: 1

Key : Analysis.Memory.CommitPeak.Mb
Value: 62


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700

SYSTEM_MANUFACTURER: Hewlett-Packard

SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC

SYSTEM_SKU: J4T62EA#AB8

SYSTEM_VERSION: 0991100000000000000600087

BIOS_VENDOR: Insyde

BIOS_VERSION: F.43

BIOS_DATE: 12/19/2017

BASEBOARD_MANUFACTURER: Hewlett-Packard

BASEBOARD_PRODUCT: 2211

BASEBOARD_VERSION: 86.56

DUMP_TYPE: 2

BUGCHECK_P1: fffff8a002085398

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff80003ae56fd

WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80003ab1100
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff80003ab12f0
GetUlongPtrFromAddress: unable to read from fffff80003ab14a8
GetPointerFromAddress: unable to read from fffff80003ab10d8
fffff8a002085398 Paged pool

CURRENT_IRQL: 2

FAULTING_IP:
nt!HvpDoAllocateCell+101
fffff800`03ae56fd 89443d00 mov dword ptr [rbp+rdi],eax

CPU_COUNT: 4

CPU_MHZ: 6a0

CPU_VENDOR: GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 45

CPU_STEPPING: 1

CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init)

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT

BUGCHECK_STR: 0xA

PROCESS_NAME: System

ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5

ANALYSIS_SESSION_TIME: 06-17-2019 20:48:46.0248

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

TRAP_FRAME:  fffff80004c1a950 -- (.trap 0xfffff80004c1a950)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000008 rbx=0000000000000000 rcx=0000000000000368
rdx=0000000000000002 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80003ae56fd rsp=fffff80004c1aae0 rbp=0000000000000030
r8=fffff8a000024010 r9=0000000000000005 r10=fffff8a002085000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!HvpDoAllocateCell+0x101:
fffff800`03ae56fd 89443d00 mov dword ptr [rbp+rdi],eax ss:0018:00000000`00000030=????????
Resetting default scope

LAST_CONTROL_TRANSFER: from fffff800038b5f69 to fffff800038a7ba0

STACK_TEXT:
fffff800`04c1a808 fffff800`038b5f69 : 00000000`0000000a fffff8a0`02085398 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff800`04c1a810 fffff800`038b3d88 : 00000000`00000001 fffff8a0`02085398 00000000`00000000 fffff8a0`00024010 : nt!KiBugCheckDispatch+0x69
fffff800`04c1a950 fffff800`03ae56fd : fffff8a0`00024010 fffff8a0`00024010 fffff8a0`0003b420 fffff800`00000000 : nt!KiPageFault+0x448
fffff800`04c1aae0 fffff800`03b27d1d : fffff8a0`00024010 00000000`00000000 00000000`00000000 00000000`ffffffff : nt!HvpDoAllocateCell+0x101
fffff800`04c1ab40 fffff800`03b27bad : 00000000`00000000 fffff8a0`018bcc30 00000000`00000008 fffff800`03b15d5c : nt!HvAllocateCell+0x55
fffff800`04c1ab70 fffff800`03ada4bf : fffff8a0`00024010 fffff8a0`00024010 fffff8a0`018ca640 fffff800`04c1ae18 : nt!CmpAddValueKeyNew+0x69
fffff800`04c1ac40 fffff800`03cc06e3 : 01d501ff`f5623883 fffff800`04c1aff0 fffff8a0`04468820 00000000`00000000 : nt!CmpSetValueKeyNew+0x77
fffff800`04c1ac90 fffff800`03ae5531 : fffff8a0`0506b140 fffff800`04c1ae18 fffffa80`00000004 fffff800`04c1b210 : nt!CmSetValueKey+0xba3
fffff800`04c1add0 fffff800`038b5bd3 : ffffffff`80000dc4 00000000`00000002 fffffa80`00000000 fffff800`00000004 : nt!NtSetValueKey+0x349
fffff800`04c1af00 fffff800`038ab3b0 : fffff800`03bfc2a2 fffff800`04c1b248 fffff880`01525152 fffffa80`00040001 : nt!KiSystemServiceCopyEnd+0x13
fffff800`04c1b108 fffff800`03bfc2a2 : fffff800`04c1b248 fffff880`01525152 fffffa80`00040001 fffff800`04c1b270 : nt!KiServiceLinkage
fffff800`04c1b110 fffff880`0152cd96 : 00000000`00000004 fffffa80`0449b4e0 fffff880`0525c030 00000000`000007ff : nt!RtlWriteRegistryValue+0x62
fffff800`04c1b170 fffff880`050b698d : fffff800`04c1b270 fffff880`052c5c28 00000000`00000000 00000000`00000000 : ndis!NdisWriteConfiguration+0x156
fffff800`04c1b1d0 fffff800`04c1b270 : fffff880`052c5c28 00000000`00000000 00000000`00000000 fffff800`001801a9 : netr28x+0x4b98d
fffff800`04c1b1d8 fffff880`052c5c28 : 00000000`00000000 00000000`00000000 fffff800`001801a9 fffffa80`05b7f1a0 : 0xfffff800`04c1b270
fffff800`04c1b1e0 00000000`00000000 : 00000000`00000000 fffff800`001801a9 fffffa80`05b7f1a0 fffff800`00000000 : netr28x+0x25ac28


THREAD_SHA1_HASH_MOD_FUNC: 80858fdf941bd645ff48b6997b30f63ac59926fb

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 394aafee51f76470053fa2102b9df0f0f7df42a3

THREAD_SHA1_HASH_MOD: 5d50876435db08b990ce5928fe5c90526c26b16c

FOLLOWUP_IP:
netr28x+4b98d
fffff880`050b698d ?? ???

SYMBOL_STACK_INDEX: d

SYMBOL_NAME: netr28x+4b98d

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: netr28x

IMAGE_NAME:  netr28x.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a

STACK_COMMAND: .thread ; .cxr ; kb

FAILURE_BUCKET_ID: X64_0xA_netr28x+4b98d

BUCKET_ID: X64_0xA_netr28x+4b98d

PRIMARY_PROBLEM_CLASS: X64_0xA_netr28x+4b98d

TARGET_TIME: 2019-05-03T22:31:32.000Z

OSBUILD: 7601

OSSERVICEPACK: 1000

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 7

OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2019-03-21 04:38:47

BUILDDATESTAMP_STR: 190320-1700

BUILDLAB_STR: win7sp1_ldr_escrow

BUILDOSVER_STR: 6.1.7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700

ANALYSIS_SESSION_ELAPSED_TIME: 7b0

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:x64_0xa_netr28x+4b98d

FAILURE_ID_HASH: {a6eb3f60-a5c3-0bd6-051c-41bf4427925d}

Followup: MachineOwner
---------

INVALID_PROCESS_ATTACH_ATTEMPT (5)
Arguments:
Arg1: fffffa80042cf9b0
Arg2: fffffa80045a46e0
Arg3: 0000000000000000
Arg4: 0000000000000001

Debugging Details:
------------------

GetUlongPtrFromAddress: unable to read from fffff800030fb300

KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 2

Key : Analysis.Elapsed.Sec
Value: 2

Key : Analysis.Memory.CommitPeak.Mb
Value: 62


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700

SYSTEM_MANUFACTURER: Hewlett-Packard

SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC

SYSTEM_SKU: J4T62EA#AB8

SYSTEM_VERSION: 0991100000000000000600087

BIOS_VENDOR: Insyde

BIOS_VERSION: F.43

BIOS_DATE: 12/19/2017

BASEBOARD_MANUFACTURER: Hewlett-Packard

BASEBOARD_PRODUCT: 2211

BASEBOARD_VERSION: 86.56

DUMP_TYPE: 2

BUGCHECK_P1: fffffa80042cf9b0

BUGCHECK_P2: fffffa80045a46e0

BUGCHECK_P3: 0

BUGCHECK_P4: 1

CPU_COUNT: 4

CPU_MHZ: 6a0

CPU_VENDOR: GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 45

CPU_STEPPING: 1

CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init)

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT

BUGCHECK_STR: 0x5

PROCESS_NAME: chrome.exe

CURRENT_IRQL: 2

ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5

ANALYSIS_SESSION_TIME: 06-17-2019 20:48:24.0070

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

DPC_STACK_BASE: FFFFF80000BA2FB0

LOCK_ADDRESS: fffff800030ce240 -- (!locks fffff800030ce240)
Cannot get _ERESOURCE type

Resource @ nt!PiEngineLock (0xfffff800030ce240) Available
1 total locks

PNP_TRIAGE_DATA:
Lock address : 0xfffff800030ce240
Thread Count : 0
Thread address: 0x0000000000000000
Thread wait : 0x0

LAST_CONTROL_TRANSFER: from fffff80002ea05f2 to fffff80002ef1ba0

STACK_TEXT:
fffff800`00ba1cc8 fffff800`02ea05f2 : 00000000`00000005 fffffa80`042cf9b0 fffffa80`045a46e0 00000000`00000000 : nt!KeBugCheckEx
fffff800`00ba1cd0 fffff800`03149127 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeStackAttachProcess+0x52
fffff800`00ba1d50 fffff800`031494bf : 00000000`00000000 fffff8a0`00000000 fffff8a0`00001910 00000000`00000000 : nt!ObpDecrementHandleCount+0x177
fffff800`00ba1dd0 fffff800`031491e4 : 00000000`00000b3c fffffa80`045a46e0 fffff8a0`00001910 00000000`00000b3c : nt!ObpCloseHandleTableEntry+0xaf
fffff800`00ba1e60 fffff800`02effbd3 : fffffa80`04502060 fffff800`00ba1f30 fffff800`031b3200 fffff800`0313f76a : nt!ObpCloseHandle+0x94
fffff800`00ba1eb0 fffff800`02ef53b0 : fffff800`0318cd73 fffffa80`04ebd060 fffff800`031b3200 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
fffff800`00ba2048 fffff800`0318cd73 : fffffa80`04ebd060 fffff800`031b3200 00000000`00000000 00000000`00000000 : nt!KiServiceLinkage
fffff800`00ba2050 fffff800`03196a78 : fffffa80`04ebd060 00000000`00000001 fffffa80`04eba6e0 00000000`00000000 : nt!PiGetDeviceRegistryProperty+0xab
fffff800`00ba21b0 fffff800`0318ba90 : fffffa80`04ebd060 fffffa80`04ebd060 00000000`00000000 00000000`00000000 : nt!IoGetDeviceProperty+0xbc
fffff800`00ba2290 fffff800`0319cf51 : 00000000`ffff0000 fffffa80`08470cb0 fffff880`0147f110 fffffa80`059fbe30 : nt!IopOpenOrCreateDeviceRegistryKey+0x14c
fffff800`00ba2450 fffff880`014c4152 : fffffa80`0681f000 fffff800`00ba25e0 00000000`00000005 00000000`000007ff : nt!IoOpenDeviceRegistryKey+0x11
fffff800`00ba2490 fffff880`0142fb34 : fffff800`00ba25e0 fffff800`00ba25b8 fffffa80`05bf61a0 fffff800`02e262ea : ndis!NdisOpenConfiguration+0xb2
fffff800`00ba24d0 fffff880`0511d94f : 00000000`00000000 fffff800`00ba25e0 fffff880`0532cc28 00000000`00000000 : ndis!NdisOpenConfigurationEx+0xa4
fffff800`00ba2540 00000000`00000000 : fffff800`00ba25e0 fffff880`0532cc28 00000000`00000000 fffffa80`001801a9 : netr28x+0x4b94f


THREAD_SHA1_HASH_MOD_FUNC: ae5746727567d6f3e980a5bab83b7524a5dc9ee8

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: a4491f04e0c588cecd320ea5c66c026862f569ea

THREAD_SHA1_HASH_MOD: 34d7ba38146ecb972065c22fa7203d72f73eccb4

FOLLOWUP_IP:
netr28x+4b94f
fffff880`0511d94f ?? ???

SYMBOL_STACK_INDEX: d

SYMBOL_NAME: netr28x+4b94f

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: netr28x

IMAGE_NAME:  netr28x.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a

STACK_COMMAND: .thread ; .cxr ; kb

FAILURE_BUCKET_ID: X64_0x5_netr28x+4b94f

BUCKET_ID: X64_0x5_netr28x+4b94f

PRIMARY_PROBLEM_CLASS: X64_0x5_netr28x+4b94f

TARGET_TIME: 2019-04-11T14:13:16.000Z

OSBUILD: 7601

OSSERVICEPACK: 1000

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 7

OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2019-03-06 05:38:53

BUILDDATESTAMP_STR: 190305-1700

BUILDLAB_STR: win7sp1_ldr_escrow

BUILDOSVER_STR: 6.1.7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700

ANALYSIS_SESSION_ELAPSED_TIME: 851

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:x64_0x5_netr28x+4b94f

FAILURE_ID_HASH: {43753b0b-e234-1a01-8468-7eed644d41ea}

Followup: MachineOwner
---------

INVALID_PROCESS_ATTACH_ATTEMPT (5)
Arguments:
Arg1: fffffa80042ce9b0
Arg2: fffffa800b053b00
Arg3: 0000000000000000
Arg4: 0000000000000001

Debugging Details:
------------------

GetUlongPtrFromAddress: unable to read from fffff800032ed300

KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 1

Key : Analysis.Elapsed.Sec
Value: 2

Key : Analysis.Memory.CommitPeak.Mb
Value: 62


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700

SYSTEM_MANUFACTURER: Hewlett-Packard

SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC

SYSTEM_SKU: J4T62EA#AB8

SYSTEM_VERSION: 0991100000000000000600087

BIOS_VENDOR: Insyde

BIOS_VERSION: F.43

BIOS_DATE: 12/19/2017

BASEBOARD_MANUFACTURER: Hewlett-Packard

BASEBOARD_PRODUCT: 2211

BASEBOARD_VERSION: 86.56

DUMP_TYPE: 2

BUGCHECK_P1: fffffa80042ce9b0

BUGCHECK_P2: fffffa800b053b00

BUGCHECK_P3: 0

BUGCHECK_P4: 1

CPU_COUNT: 4

CPU_MHZ: 6a0

CPU_VENDOR: GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 45

CPU_STEPPING: 1

CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init)

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT

BUGCHECK_STR: 0x5

PROCESS_NAME: mcbuilder.exe

CURRENT_IRQL: 2

ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5

ANALYSIS_SESSION_TIME: 06-17-2019 20:48:40.0990

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

DPC_STACK_BASE: FFFFF80000BA2FB0

LOCK_ADDRESS: fffff800032c0240 -- (!locks fffff800032c0240)
Cannot get _ERESOURCE type

Resource @ nt!PiEngineLock (0xfffff800032c0240) Available
1 total locks

PNP_TRIAGE_DATA:
Lock address : 0xfffff800032c0240
Thread Count : 0
Thread address: 0x0000000000000000
Thread wait : 0x0

LAST_CONTROL_TRANSFER: from fffff800030925f2 to fffff800030e3ba0

STACK_TEXT:
fffff800`00ba1cc8 fffff800`030925f2 : 00000000`00000005 fffffa80`042ce9b0 fffffa80`0b053b00 00000000`00000000 : nt!KeBugCheckEx
fffff800`00ba1cd0 fffff800`0333b127 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeStackAttachProcess+0x52
fffff800`00ba1d50 fffff800`0333b4bf : 00000000`00000000 fffff8a0`00000000 fffff8a0`00001910 00000000`00000000 : nt!ObpDecrementHandleCount+0x177
fffff800`00ba1dd0 fffff800`0333b1e4 : 00000000`00000d0c fffffa80`0b053b00 fffff8a0`00001910 00000000`00000d0c : nt!ObpCloseHandleTableEntry+0xaf
fffff800`00ba1e60 fffff800`030f1bd3 : fffffa80`0568b6e0 fffff800`00ba1f30 fffff800`033a5200 fffff800`0333176a : nt!ObpCloseHandle+0x94
fffff800`00ba1eb0 fffff800`030e73b0 : fffff800`0337ed73 fffffa80`04dc8060 fffff800`033a5200 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
fffff800`00ba2048 fffff800`0337ed73 : fffffa80`04dc8060 fffff800`033a5200 00000000`00000000 00000000`00000000 : nt!KiServiceLinkage
fffff800`00ba2050 fffff800`03388a78 : fffffa80`04dc8060 00000000`00000001 fffffa80`04dc36e0 00000000`00000000 : nt!PiGetDeviceRegistryProperty+0xab
fffff800`00ba21b0 fffff800`0337da90 : fffffa80`04dc8060 fffffa80`04dc8060 00000000`00000000 00000000`00000000 : nt!IoGetDeviceProperty+0xbc
fffff800`00ba2290 fffff800`0338ef51 : 00000000`ffff0000 fffffa80`09035950 fffff880`014a0110 fffffa80`05adbd80 : nt!IopOpenOrCreateDeviceRegistryKey+0x14c
fffff800`00ba2450 fffff880`014e5152 : fffffa80`00000000 fffff800`00ba25e0 00000000`00000000 00000000`000007ff : nt!IoOpenDeviceRegistryKey+0x11
fffff800`00ba2490 fffff880`01450b34 : fffff800`00ba25e0 fffff800`00ba25b8 fffffa80`05bc91a0 00000000`00000001 : ndis!NdisOpenConfiguration+0xb2
fffff800`00ba24d0 fffff880`056cc94f : 00000000`00000000 fffff800`00ba25e0 fffff880`058dbc28 00000000`00000000 : ndis!NdisOpenConfigurationEx+0xa4
fffff800`00ba2540 00000000`00000000 : fffff800`00ba25e0 fffff880`058dbc28 00000000`00000000 fffffa80`001801a9 : netr28x+0x4b94f


THREAD_SHA1_HASH_MOD_FUNC: ae5746727567d6f3e980a5bab83b7524a5dc9ee8

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: a4491f04e0c588cecd320ea5c66c026862f569ea

THREAD_SHA1_HASH_MOD: 34d7ba38146ecb972065c22fa7203d72f73eccb4

FOLLOWUP_IP:
netr28x+4b94f
fffff880`056cc94f ?? ???

SYMBOL_STACK_INDEX: d

SYMBOL_NAME: netr28x+4b94f

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: netr28x

IMAGE_NAME:  netr28x.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a

STACK_COMMAND: .thread ; .cxr ; kb

FAILURE_BUCKET_ID: X64_0x5_netr28x+4b94f

BUCKET_ID: X64_0x5_netr28x+4b94f

PRIMARY_PROBLEM_CLASS: X64_0x5_netr28x+4b94f

TARGET_TIME: 2019-04-11T17:47:48.000Z

OSBUILD: 7601

OSSERVICEPACK: 1000

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 7

OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2019-03-06 05:38:53

BUILDDATESTAMP_STR: 190305-1700

BUILDLAB_STR: win7sp1_ldr_escrow

BUILDOSVER_STR: 6.1.7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700

ANALYSIS_SESSION_ELAPSED_TIME: 7f5

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:x64_0x5_netr28x+4b94f

FAILURE_ID_HASH: {43753b0b-e234-1a01-8468-7eed644d41ea}

Followup: MachineOwner
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff8a006be8c34, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80003afb730, address which referenced memory

Debugging Details:
------------------

GetUlongPtrFromAddress: unable to read from fffff80003ab2300

KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 1

Key : Analysis.Elapsed.Sec
Value: 1

Key : Analysis.Memory.CommitPeak.Mb
Value: 62


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700

SYSTEM_MANUFACTURER: Hewlett-Packard

SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC

SYSTEM_SKU: J4T62EA#AB8

SYSTEM_VERSION: 0991100000000000000600087

BIOS_VENDOR: Insyde

BIOS_VERSION: F.43

BIOS_DATE: 12/19/2017

BASEBOARD_MANUFACTURER: Hewlett-Packard

BASEBOARD_PRODUCT: 2211

BASEBOARD_VERSION: 86.56

DUMP_TYPE: 2

BUGCHECK_P1: fffff8a006be8c34

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff80003afb730

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80003ab2100
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff80003ab22f0
GetUlongPtrFromAddress: unable to read from fffff80003ab24a8
GetPointerFromAddress: unable to read from fffff80003ab20d8
fffff8a006be8c34 Paged pool

CURRENT_IRQL: 2

FAULTING_IP:
nt!CmpFindValueByNameFromCache+e0
fffff800`03afb730 428b14b8 mov edx,dword ptr [rax+r15*4]

CPU_COUNT: 4

CPU_MHZ: 6a0

CPU_VENDOR: GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 45

CPU_STEPPING: 1

CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init)

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT

BUGCHECK_STR: 0xA

PROCESS_NAME: System

ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5

ANALYSIS_SESSION_TIME: 06-17-2019 20:48:30.0482

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

TRAP_FRAME:  fffff80004c21990 -- (.trap 0xfffff80004c21990)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8a006be8c34 rbx=0000000000000000 rcx=0000000000000000
rdx=00000000ffffffff rsi=0000000000000000 rdi=0000000000000000
rip=fffff80003afb730 rsp=fffff80004c21b20 rbp=fffff80004c21ff0
r8=fffff8a00004ad40 r9=000000000000ffff r10=0000000000000001
r11=fffff80004c21dc8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!CmpFindValueByNameFromCache+0xe0:
fffff800`03afb730 428b14b8 mov edx,dword ptr [rax+r15*4] ds:fffff8a0`06be8c34=????????
Resetting default scope

LAST_CONTROL_TRANSFER: from fffff800038b6f69 to fffff800038a8ba0

STACK_TEXT:
fffff800`04c21848 fffff800`038b6f69 : 00000000`0000000a fffff8a0`06be8c34 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff800`04c21850 fffff800`038b4d88 : 00000000`00000000 fffff8a0`06be8c34 fffffa80`0a1a6000 fffff8a0`00024010 : nt!KiBugCheckDispatch+0x69
fffff800`04c21990 fffff800`03afb730 : fffff8a0`00024010 00000000`00c6ac30 fffff8a0`0004ad40 00000000`00000000 : nt!KiPageFault+0x448
fffff800`04c21b20 fffff800`03adec38 : fffff8a0`0e0d74a8 fffff800`04c21e18 fffff800`04c21c60 fffff800`04c21c48 : nt!CmpFindValueByNameFromCache+0xe0
fffff800`04c21bf0 fffff800`03cc11e7 : fffff8a0`0e0d74a8 01d50684`f67b3cde fffff8a0`0e0d74a8 00000000`00000000 : nt!CmpCompareNewValueDataAgainstKCBCache+0x78
fffff800`04c21c90 fffff800`03ae6531 : fffff8a0`01c5f710 fffff800`04c21e18 fffffa80`00000004 fffff800`04c22210 : nt!CmSetValueKey+0x6a7
fffff800`04c21dd0 fffff800`038b6bd3 : ffffffff`80002788 00000000`00000002 fffffa80`00000000 fffff800`00000004 : nt!NtSetValueKey+0x349
fffff800`04c21f00 fffff800`038ac3b0 : fffff800`03bfd2a2 fffff800`04c22248 fffff880`017a5152 00000000`c0000001 : nt!KiSystemServiceCopyEnd+0x13
fffff800`04c22108 fffff800`03bfd2a2 : fffff800`04c22248 fffff880`017a5152 00000000`c0000001 fffff800`04c22270 : nt!KiServiceLinkage
fffff800`04c22110 fffff880`017acd96 : 00000000`00000004 fffffa80`09b31af0 00000100`00000000 00000000`000007ff : nt!RtlWriteRegistryValue+0x62
fffff800`04c22170 fffff880`056a498d : fffff800`04c22270 fffff880`058b3c28 00000000`00000000 00000000`00000000 : ndis!NdisWriteConfiguration+0x156
fffff800`04c221d0 fffff800`04c22270 : fffff880`058b3c28 00000000`00000000 00000000`00000000 00000000`001801a9 : netr28x+0x4b98d
fffff800`04c221d8 fffff880`058b3c28 : 00000000`00000000 00000000`00000000 00000000`001801a9 fffffa80`05b821a0 : 0xfffff800`04c22270
fffff800`04c221e0 00000000`00000000 : 00000000`00000000 00000000`001801a9 fffffa80`05b821a0 00000000`00000000 : netr28x+0x25ac28


THREAD_SHA1_HASH_MOD_FUNC: 935105e89958188e75032d802c31088ef212f1d5

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 050e790aab7ddac4bfe73c42f1350165ef3ea549

THREAD_SHA1_HASH_MOD: 7921e317582c7f98a7f13cfbcd3c02a86fdcafec

FOLLOWUP_IP:
netr28x+4b98d
fffff880`056a498d ?? ???

SYMBOL_STACK_INDEX: b

SYMBOL_NAME: netr28x+4b98d

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: netr28x

IMAGE_NAME:  netr28x.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a

STACK_COMMAND: .thread ; .cxr ; kb

FAILURE_BUCKET_ID: X64_0xA_netr28x+4b98d

BUCKET_ID: X64_0xA_netr28x+4b98d

PRIMARY_PROBLEM_CLASS: X64_0xA_netr28x+4b98d

TARGET_TIME: 2019-05-09T16:33:41.000Z

OSBUILD: 7601

OSSERVICEPACK: 1000

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 7

OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2019-03-21 04:38:47

BUILDDATESTAMP_STR: 190320-1700

BUILDLAB_STR: win7sp1_ldr_escrow

BUILDOSVER_STR: 6.1.7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700

ANALYSIS_SESSION_ELAPSED_TIME: 716

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:x64_0xa_netr28x+4b98d

FAILURE_ID_HASH: {a6eb3f60-a5c3-0bd6-051c-41bf4427925d}

Followup: MachineOwner
---------

INVALID_PROCESS_ATTACH_ATTEMPT (5)
Arguments:
Arg1: fffffa80042b59b0
Arg2: fffffa80048376b0
Arg3: 0000000000000000
Arg4: 0000000000000001

Debugging Details:
------------------

GetUlongPtrFromAddress: unable to read from fffff8000309f300

KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 1

Key : Analysis.Elapsed.Sec
Value: 1

Key : Analysis.Memory.CommitPeak.Mb
Value: 62


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700

SYSTEM_MANUFACTURER: Hewlett-Packard

SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC

SYSTEM_SKU: J4T62EA#AB8

SYSTEM_VERSION: 0991100000000000000600087

BIOS_VENDOR: Insyde

BIOS_VERSION: F.43

BIOS_DATE: 12/19/2017

BASEBOARD_MANUFACTURER: Hewlett-Packard

BASEBOARD_PRODUCT: 2211

BASEBOARD_VERSION: 86.56

DUMP_TYPE: 2

BUGCHECK_P1: fffffa80042b59b0

BUGCHECK_P2: fffffa80048376b0

BUGCHECK_P3: 0

BUGCHECK_P4: 1

CPU_COUNT: 4

CPU_MHZ: 6a0

CPU_VENDOR: GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 45

CPU_STEPPING: 1

CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init)

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT

BUGCHECK_STR: 0x5

PROCESS_NAME: PointBlank.exe

CURRENT_IRQL: 2

ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5

ANALYSIS_SESSION_TIME: 06-17-2019 21:16:16.0171

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

DPC_STACK_BASE: FFFFF80000BA2FB0

LOCK_ADDRESS: fffff80003072240 -- (!locks fffff80003072240)
Cannot get _ERESOURCE type

Resource @ nt!PiEngineLock (0xfffff80003072240) Available
1 total locks

PNP_TRIAGE_DATA:
Lock address : 0xfffff80003072240
Thread Count : 0
Thread address: 0x0000000000000000
Thread wait : 0x0

LAST_CONTROL_TRANSFER: from fffff80002e445f2 to fffff80002e95ba0

STACK_TEXT:
fffff800`00ba1cc8 fffff800`02e445f2 : 00000000`00000005 fffffa80`042b59b0 fffffa80`048376b0 00000000`00000000 : nt!KeBugCheckEx
fffff800`00ba1cd0 fffff800`030ed127 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeStackAttachProcess+0x52
fffff800`00ba1d50 fffff800`030ed4bf : 00000000`00000000 fffff8a0`00000000 fffff8a0`00001910 00000000`00000000 : nt!ObpDecrementHandleCount+0x177
fffff800`00ba1dd0 fffff800`030ed1e4 : 00000000`00000c9c fffffa80`048376b0 fffff8a0`00001910 00000000`00000c9c : nt!ObpCloseHandleTableEntry+0xaf
fffff800`00ba1e60 fffff800`02ea3bd3 : fffffa80`04988060 fffff800`00ba1f30 fffff800`03157200 fffff800`030e376a : nt!ObpCloseHandle+0x94
fffff800`00ba1eb0 fffff800`02e993b0 : fffff800`03130d73 fffffa80`04e7d060 fffff800`03157200 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
fffff800`00ba2048 fffff800`03130d73 : fffffa80`04e7d060 fffff800`03157200 00000000`00000000 00000000`00000000 : nt!KiServiceLinkage
fffff800`00ba2050 fffff800`0313aa78 : fffffa80`04e7d060 00000000`00000001 fffffa80`04e386e0 00000000`00000000 : nt!PiGetDeviceRegistryProperty+0xab
fffff800`00ba21b0 fffff800`0312fa90 : fffffa80`04e7d060 fffffa80`04e7d060 00000000`00000000 00000000`00000000 : nt!IoGetDeviceProperty+0xbc
fffff800`00ba2290 fffff800`03140f51 : 00000000`ffff0000 fffffa80`08033990 fffff880`014d7110 fffffa80`05bfaf70 : nt!IopOpenOrCreateDeviceRegistryKey+0x14c
fffff800`00ba2450 fffff880`0151c152 : fffffa80`049479f0 fffff800`00ba25e0 fffffa80`06f64a78 00000000`000007ff : nt!IoOpenDeviceRegistryKey+0x11
fffff800`00ba2490 fffff880`01487b34 : fffff800`00ba25e0 fffff800`00ba25b8 fffffa80`05bf91a0 fffff880`0153221d : ndis!NdisOpenConfiguration+0xb2
fffff800`00ba24d0 fffff880`04eff94f : fffffa80`00000000 fffff800`00ba25e0 fffff880`0510ec28 00000000`00000000 : ndis!NdisOpenConfigurationEx+0xa4
fffff800`00ba2540 fffffa80`00000000 : fffff800`00ba25e0 fffff880`0510ec28 00000000`00000000 00000000`001801a9 : netr28x+0x4b94f
fffff800`00ba2548 fffff800`00ba25e0 : fffff880`0510ec28 00000000`00000000 00000000`001801a9 fffffa80`05bf91a0 : 0xfffffa80`00000000
fffff800`00ba2550 fffff880`0510ec28 : 00000000`00000000 00000000`001801a9 fffffa80`05bf91a0 fffffa80`00000000 : 0xfffff800`00ba25e0
fffff800`00ba2558 00000000`00000000 : 00000000`001801a9 fffffa80`05bf91a0 fffffa80`00000000 fffff880`04f0be2e : netr28x+0x25ac28


THREAD_SHA1_HASH_MOD_FUNC: 1764d353450a941fbc74295279ec02651c3d9814

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: bdc70d393af014c177e84e60c668cc911acaf71f

THREAD_SHA1_HASH_MOD: 9a9dca34541ae91666e3989df373f06b6e683623

FOLLOWUP_IP:
netr28x+4b94f
fffff880`04eff94f ?? ???

SYMBOL_STACK_INDEX: d

SYMBOL_NAME: netr28x+4b94f

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: netr28x

IMAGE_NAME:  netr28x.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a

STACK_COMMAND: .thread ; .cxr ; kb

FAILURE_BUCKET_ID: X64_0x5_netr28x+4b94f

BUCKET_ID: X64_0x5_netr28x+4b94f

PRIMARY_PROBLEM_CLASS: X64_0x5_netr28x+4b94f

TARGET_TIME: 2019-04-11T14:53:19.000Z

OSBUILD: 7601

OSSERVICEPACK: 1000

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 7

OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2019-03-06 05:38:53

BUILDDATESTAMP_STR: 190305-1700

BUILDLAB_STR: win7sp1_ldr_escrow

BUILDOSVER_STR: 6.1.7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700

ANALYSIS_SESSION_ELAPSED_TIME: 7ca

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:x64_0x5_netr28x+4b94f

FAILURE_ID_HASH: {43753b0b-e234-1a01-8468-7eed644d41ea}

Followup: MachineOwner
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff8a000e8ee98, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff800032e66fd, address which referenced memory

Debugging Details:
------------------

GetUlongPtrFromAddress: unable to read from fffff800032b2300

KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 1

Key : Analysis.Elapsed.Sec
Value: 1

Key : Analysis.Memory.CommitPeak.Mb
Value: 62


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700

SYSTEM_MANUFACTURER: Hewlett-Packard

SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC

SYSTEM_SKU: J4T62EA#AB8

SYSTEM_VERSION: 0991100000000000000600087

BIOS_VENDOR: Insyde

BIOS_VERSION: F.43

BIOS_DATE: 12/19/2017

BASEBOARD_MANUFACTURER: Hewlett-Packard

BASEBOARD_PRODUCT: 2211

BASEBOARD_VERSION: 86.56

DUMP_TYPE: 2

BUGCHECK_P1: fffff8a000e8ee98

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff800032e66fd

WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800032b2100
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff800032b22f0
GetUlongPtrFromAddress: unable to read from fffff800032b24a8
GetPointerFromAddress: unable to read from fffff800032b20d8
fffff8a000e8ee98 Paged pool

CURRENT_IRQL: 2

FAULTING_IP:
nt!HvpDoAllocateCell+101
fffff800`032e66fd 89443d00 mov dword ptr [rbp+rdi],eax

CPU_COUNT: 4

CPU_MHZ: 6a0

CPU_VENDOR: GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 45

CPU_STEPPING: 1

CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init)

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT

BUGCHECK_STR: 0xA

PROCESS_NAME: System

ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5

ANALYSIS_SESSION_TIME: 06-17-2019 21:16:26.0291

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

TRAP_FRAME:  fffff80004418950 -- (.trap 0xfffff80004418950)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000020 rbx=0000000000000000 rcx=0000000000002e68
rdx=0000000000000006 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800032e66fd rsp=fffff80004418ae0 rbp=0000000000000030
r8=fffff8a000024010 r9=0000000000000005 r10=fffff8a000e8c000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!HvpDoAllocateCell+0x101:
fffff800`032e66fd 89443d00 mov dword ptr [rbp+rdi],eax ss:0018:00000000`00000030=????????
Resetting default scope

LAST_CONTROL_TRANSFER: from fffff800030b6f69 to fffff800030a8ba0

STACK_TEXT:
fffff800`04418808 fffff800`030b6f69 : 00000000`0000000a fffff8a0`00e8ee98 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff800`04418810 fffff800`030b4d88 : 00000000`00000001 fffff8a0`00e8ee98 00000000`00000000 fffff8a0`00024010 : nt!KiBugCheckDispatch+0x69
fffff800`04418950 fffff800`032e66fd : fffff8a0`00024010 fffff8a0`00024010 fffff8a0`0004b9a0 fffff800`00000000 : nt!KiPageFault+0x448
fffff800`04418ae0 fffff800`03328d1d : fffff8a0`00024010 00000000`00000000 00000000`00000000 00000000`ffffffff : nt!HvpDoAllocateCell+0x101
fffff800`04418b40 fffff800`03328bad : 00000000`00000000 fffff8a0`00ff0c30 00000000`00000008 fffff800`03316d5c : nt!HvAllocateCell+0x55
fffff800`04418b70 fffff800`032db4bf : fffff8a0`00024010 fffff8a0`00024010 fffff8a0`00ffe640 fffff800`04418e18 : nt!CmpAddValueKeyNew+0x69
fffff800`04418c40 fffff800`034c16e3 : 01d4fd21`140179ca fffff800`04418ff0 fffff8a0`050bd948 00000000`00000000 : nt!CmpSetValueKeyNew+0x77
fffff800`04418c90 fffff800`032e6531 : fffff8a0`0df75fa0 fffff800`04418e18 fffffa80`00000004 fffff800`04419210 : nt!CmSetValueKey+0xba3
fffff800`04418dd0 fffff800`030b6bd3 : ffffffff`80000ab0 00000000`00000002 fffffa80`00000000 fffff800`00000004 : nt!NtSetValueKey+0x349
fffff800`04418f00 fffff800`030ac3b0 : fffff800`033fd2a2 fffff800`04419248 fffff880`014a9152 fffffa80`051e12f0 : nt!KiSystemServiceCopyEnd+0x13
fffff800`04419108 fffff800`033fd2a2 : fffff800`04419248 fffff880`014a9152 fffffa80`051e12f0 fffff800`04419270 : nt!KiServiceLinkage
fffff800`04419110 fffff880`014b0d96 : 00000000`00000004 fffffa80`0855a220 00000000`ffffffff 00000000`000007ff : nt!RtlWriteRegistryValue+0x62
fffff800`04419170 fffff880`04eef98d : fffff800`04419270 fffff880`050fec28 00000000`00000000 00000000`00000000 : ndis!NdisWriteConfiguration+0x156
fffff800`044191d0 fffff800`04419270 : fffff880`050fec28 00000000`00000000 00000000`00000000 fffff800`001801a9 : netr28x+0x4b98d
fffff800`044191d8 fffff880`050fec28 : 00000000`00000000 00000000`00000000 fffff800`001801a9 fffffa80`05be11a0 : 0xfffff800`04419270
fffff800`044191e0 00000000`00000000 : 00000000`00000000 fffff800`001801a9 fffffa80`05be11a0 fffff800`00000000 : netr28x+0x25ac28


THREAD_SHA1_HASH_MOD_FUNC: 80858fdf941bd645ff48b6997b30f63ac59926fb

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 394aafee51f76470053fa2102b9df0f0f7df42a3

THREAD_SHA1_HASH_MOD: 5d50876435db08b990ce5928fe5c90526c26b16c

FOLLOWUP_IP:
netr28x+4b98d
fffff880`04eef98d ?? ???

SYMBOL_STACK_INDEX: d

SYMBOL_NAME: netr28x+4b98d

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: netr28x

IMAGE_NAME:  netr28x.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a

STACK_COMMAND: .thread ; .cxr ; kb

FAILURE_BUCKET_ID: X64_0xA_netr28x+4b98d

BUCKET_ID: X64_0xA_netr28x+4b98d

PRIMARY_PROBLEM_CLASS: X64_0xA_netr28x+4b98d

TARGET_TIME: 2019-04-27T17:46:01.000Z

OSBUILD: 7601

OSSERVICEPACK: 1000

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 7

OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2019-03-21 04:38:47

BUILDDATESTAMP_STR: 190320-1700

BUILDLAB_STR: win7sp1_ldr_escrow

BUILDOSVER_STR: 6.1.7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700

ANALYSIS_SESSION_ELAPSED_TIME: 720

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:x64_0xa_netr28x+4b98d

FAILURE_ID_HASH: {a6eb3f60-a5c3-0bd6-051c-41bf4427925d}

Followup: MachineOwner
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff8a000b0b260, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff800032d1738, address which referenced memory

Debugging Details:
------------------

GetUlongPtrFromAddress: unable to read from fffff8000329d300

KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 1

Key : Analysis.Elapsed.Sec
Value: 1

Key : Analysis.Memory.CommitPeak.Mb
Value: 62


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700

SYSTEM_MANUFACTURER: Hewlett-Packard

SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC

SYSTEM_SKU: J4T62EA#AB8

SYSTEM_VERSION: 0991100000000000000600087

BIOS_VENDOR: Insyde

BIOS_VERSION: F.43

BIOS_DATE: 12/19/2017

BASEBOARD_MANUFACTURER: Hewlett-Packard

BASEBOARD_PRODUCT: 2211

BASEBOARD_VERSION: 86.56

DUMP_TYPE: 2

BUGCHECK_P1: fffff8a000b0b260

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff800032d1738

WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff8000329d100
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff8000329d2f0
GetUlongPtrFromAddress: unable to read from fffff8000329d4a8
GetPointerFromAddress: unable to read from fffff8000329d0d8
fffff8a000b0b260 Paged pool

CURRENT_IRQL: 2

FAULTING_IP:
nt!HvpDoAllocateCell+13c
fffff800`032d1738 8907 mov dword ptr [rdi],eax

CPU_COUNT: 4

CPU_MHZ: 6a0

CPU_VENDOR: GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 45

CPU_STEPPING: 1

CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init)

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT

BUGCHECK_STR: 0xA

PROCESS_NAME: System

ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5

ANALYSIS_SESSION_TIME: 06-17-2019 21:16:23.0541

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

TRAP_FRAME:  fffff80000b9b950 -- (.trap 0xfffff80000b9b950)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000ffffffd0 rbx=0000000000000000 rcx=000000000000000c
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800032d1738 rsp=fffff80000b9bae0 rbp=0000000000000030
r8=fffff8a0000512e0 r9=0000000000000005 r10=000000000000023b
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe cy
nt!HvpDoAllocateCell+0x13c:
fffff800`032d1738 8907 mov dword ptr [rdi],eax ds:00000000`00000000=????????
Resetting default scope

LAST_CONTROL_TRANSFER: from fffff800030a1f69 to fffff80003093ba0

STACK_TEXT:
fffff800`00b9b808 fffff800`030a1f69 : 00000000`0000000a fffff8a0`00b0b260 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff800`00b9b810 fffff800`0309fd88 : 00000000`00000001 fffff8a0`00b0b260 00000000`00000000 fffff8a0`00024010 : nt!KiBugCheckDispatch+0x69
fffff800`00b9b950 fffff800`032d1738 : fffff8a0`00024010 fffff8a0`00024010 fffff8a0`000512e0 fffff800`00000000 : nt!KiPageFault+0x448
fffff800`00b9bae0 fffff800`03313d0d : fffff8a0`00024010 00000000`00000000 00000000`00000000 00000000`ffffffff : nt!HvpDoAllocateCell+0x13c
fffff800`00b9bb40 fffff800`03313b9d : 00000000`00000000 fffff8a0`00f38c30 00000000`00000008 fffff800`03301d5c : nt!HvAllocateCell+0x55
fffff800`00b9bb70 fffff800`032c64bf : fffff8a0`00024010 fffff8a0`00024010 fffff8a0`00f46640 fffff800`00b9be18 : nt!CmpAddValueKeyNew+0x69
fffff800`00b9bc40 fffff800`034ac6a3 : 01d4f07a`dd071b78 fffff800`00b9bff0 fffff8a0`04a444a8 00000000`00000000 : nt!CmpSetValueKeyNew+0x77
fffff800`00b9bc90 fffff800`032d1531 : fffff8a0`09c3f770 fffff800`00b9be18 fffffa80`00000004 fffff800`00b9c210 : nt!CmSetValueKey+0xba3
fffff800`00b9bdd0 fffff800`030a1bd3 : ffffffff`80000b54 00000000`00000002 fffffa80`00000000 fffff800`00000004 : nt!NtSetValueKey+0x349
fffff800`00b9bf00 fffff800`030973b0 : fffff800`033e8272 fffff800`00b9c248 fffff880`0151b152 fffffa80`074a45f0 : nt!KiSystemServiceCopyEnd+0x13
fffff800`00b9c108 fffff800`033e8272 : fffff800`00b9c248 fffff880`0151b152 fffffa80`074a45f0 fffff800`00b9c270 : nt!KiServiceLinkage
fffff800`00b9c110 fffff880`01522d96 : 00000000`00000004 fffffa80`05970b70 fffff800`03210800 00000000`000007ff : nt!RtlWriteRegistryValue+0x62
fffff800`00b9c170 fffff880`04eef98d : fffff800`00b9c270 fffff880`050fec28 00000000`00000000 00000000`00000000 : ndis!NdisWriteConfiguration+0x156
fffff800`00b9c1d0 fffff800`00b9c270 : fffff880`050fec28 00000000`00000000 00000000`00000000 fffffa80`001801a9 : netr28x+0x4b98d
fffff800`00b9c1d8 fffff880`050fec28 : 00000000`00000000 00000000`00000000 fffffa80`001801a9 fffffa80`05b741a0 : 0xfffff800`00b9c270
fffff800`00b9c1e0 00000000`00000000 : 00000000`00000000 fffffa80`001801a9 fffffa80`05b741a0 00000000`00000000 : netr28x+0x25ac28


THREAD_SHA1_HASH_MOD_FUNC: 80858fdf941bd645ff48b6997b30f63ac59926fb

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 60ef2d8b5c8aa9ab3d61fd3d0f87c6db127d6016

THREAD_SHA1_HASH_MOD: 5d50876435db08b990ce5928fe5c90526c26b16c

FOLLOWUP_IP:
netr28x+4b98d
fffff880`04eef98d ?? ???

SYMBOL_STACK_INDEX: d

SYMBOL_NAME: netr28x+4b98d

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: netr28x

IMAGE_NAME:  netr28x.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a

STACK_COMMAND: .thread ; .cxr ; kb

FAILURE_BUCKET_ID: X64_0xA_netr28x+4b98d

BUCKET_ID: X64_0xA_netr28x+4b98d

PRIMARY_PROBLEM_CLASS: X64_0xA_netr28x+4b98d

TARGET_TIME: 2019-04-11T15:25:58.000Z

OSBUILD: 7601

OSSERVICEPACK: 1000

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 7

OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2019-03-06 05:38:53

BUILDDATESTAMP_STR: 190305-1700

BUILDLAB_STR: win7sp1_ldr_escrow

BUILDOSVER_STR: 6.1.7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700

ANALYSIS_SESSION_ELAPSED_TIME: 7b6

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:x64_0xa_netr28x+4b98d

FAILURE_ID_HASH: {a6eb3f60-a5c3-0bd6-051c-41bf4427925d}

Followup: MachineOwner
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff8a0067d0004, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff800032dccfe, address which referenced memory

Debugging Details:
------------------

GetUlongPtrFromAddress: unable to read from fffff800032a8300

KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 1

Key : Analysis.Elapsed.Sec
Value: 1

Key : Analysis.Memory.CommitPeak.Mb
Value: 62


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700

SYSTEM_MANUFACTURER: Hewlett-Packard

SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC

SYSTEM_SKU: J4T62EA#AB8

SYSTEM_VERSION: 0991100000000000000600087

BIOS_VENDOR: Insyde

BIOS_VERSION: F.43

BIOS_DATE: 12/19/2017

BASEBOARD_MANUFACTURER: Hewlett-Packard

BASEBOARD_PRODUCT: 2211

BASEBOARD_VERSION: 86.56

DUMP_TYPE: 2

BUGCHECK_P1: fffff8a0067d0004

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff800032dccfe

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800032a8100
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff800032a82f0
GetUlongPtrFromAddress: unable to read from fffff800032a84a8
GetPointerFromAddress: unable to read from fffff800032a80d8
fffff8a0067d0004 Paged pool

CURRENT_IRQL: 2

FAULTING_IP:
nt!HvpScanForFreeCellInViewWindow+16a
fffff800`032dccfe 8b4804 mov ecx,dword ptr [rax+4]

CPU_COUNT: 4

CPU_MHZ: 6a0

CPU_VENDOR: GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 45

CPU_STEPPING: 1

CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init)

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT

BUGCHECK_STR: 0xA

PROCESS_NAME: System

ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5

ANALYSIS_SESSION_TIME: 06-17-2019 21:16:21.0060

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

TRAP_FRAME:  fffff80004421860 -- (.trap 0xfffff80004421860)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8a0067d0000 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000683000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800032dccfe rsp=fffff800044219f0 rbp=0000000000000683
r8=0000000000000083 r9=0000000000000000 r10=fffff8000300b000
r11=0000000000000006 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!HvpScanForFreeCellInViewWindow+0x16a:
fffff800`032dccfe 8b4804 mov ecx,dword ptr [rax+4] ds:fffff8a0`067d0004=00683000
Resetting default scope

LAST_CONTROL_TRANSFER: from fffff800030acf69 to fffff8000309eba0

STACK_TEXT:
fffff800`04421718 fffff800`030acf69 : 00000000`0000000a fffff8a0`067d0004 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff800`04421720 fffff800`030aad88 : 00000000`00000000 fffff8a0`067d0004 fffff800`031ff100 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff800`04421860 fffff800`032dccfe : 00000000`00000000 00000000`003fe000 00000000`00001000 00000000`00000000 : nt!KiPageFault+0x448
fffff800`044219f0 fffff800`032dcb0a : fffff800`00683000 fffff800`00000011 00000000`00000030 fffff800`00000000 : nt!HvpScanForFreeCellInViewWindow+0x16a
fffff800`04421a70 fffff800`032dc66e : 00000000`00000030 fffff800`00000005 ffffffff`00000030 fffff800`00000000 : nt!HvpFindFreeCell+0x1ba
fffff800`04421ae0 fffff800`0331ed1d : fffff8a0`00024010 00000000`00000000 00000000`00000000 00000000`ffffffff : nt!HvpDoAllocateCell+0x72
fffff800`04421b40 fffff800`0331ebad : 00000000`00000000 fffff8a0`061e8c30 00000000`00000008 fffff800`0330cd5c : nt!HvAllocateCell+0x55
fffff800`04421b70 fffff800`032d14bf : fffff8a0`00024010 fffff8a0`00024010 fffff8a0`061f6640 fffff800`04421e18 : nt!CmpAddValueKeyNew+0x69
fffff800`04421c40 fffff800`034b76e3 : 01d4f848`5814f677 fffff800`04421ff0 fffff8a0`02c84b98 00000000`00000000 : nt!CmpSetValueKeyNew+0x77
fffff800`04421c90 fffff800`032dc531 : fffff8a0`04cbac70 fffff800`04421e18 fffffa80`00000004 fffff800`04422210 : nt!CmSetValueKey+0xba3
fffff800`04421dd0 fffff800`030acbd3 : ffffffff`80000de8 00000000`00000002 fffffa80`00000000 fffff800`00000004 : nt!NtSetValueKey+0x349
fffff800`04421f00 fffff800`030a23b0 : fffff800`033f32a2 fffff800`04422248 fffff880`01725152 fffffa80`00000000 : nt!KiSystemServiceCopyEnd+0x13
fffff800`04422108 fffff800`033f32a2 : fffff800`04422248 fffff880`01725152 fffffa80`00000000 fffff800`04422270 : nt!KiServiceLinkage
fffff800`04422110 fffff880`0172cd96 : 00000000`00000004 fffffa80`05d89cd0 fffff800`04422200 00000000`000007ff : nt!RtlWriteRegistryValue+0x62
fffff800`04422170 fffff880`0510f98d : fffff800`04422270 fffff880`0531ec28 00000000`00000000 00000000`00000000 : ndis!NdisWriteConfiguration+0x156
fffff800`044221d0 fffff800`04422270 : fffff880`0531ec28 00000000`00000000 00000000`00000000 fffff880`001801a9 : netr28x+0x4b98d
fffff800`044221d8 fffff880`0531ec28 : 00000000`00000000 00000000`00000000 fffff880`001801a9 fffffa80`05b701a0 : 0xfffff800`04422270
fffff800`044221e0 00000000`00000000 : 00000000`00000000 fffff880`001801a9 fffffa80`05b701a0 0000000e`00000000 : netr28x+0x25ac28


THREAD_SHA1_HASH_MOD_FUNC: a2c5409ed52347576830e095aabe2e20325151e5

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: cf883ff24fbd42e0f8dd5b2bf40fd2071e6cd531

THREAD_SHA1_HASH_MOD: 56bd18a7fabf3c16adac1e3911e9aab0524685a1

FOLLOWUP_IP:
netr28x+4b98d
fffff880`0510f98d ?? ???

SYMBOL_STACK_INDEX: f

SYMBOL_NAME: netr28x+4b98d

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: netr28x

IMAGE_NAME:  netr28x.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a

STACK_COMMAND: .thread ; .cxr ; kb

FAILURE_BUCKET_ID: X64_0xA_netr28x+4b98d

BUCKET_ID: X64_0xA_netr28x+4b98d

PRIMARY_PROBLEM_CLASS: X64_0xA_netr28x+4b98d

TARGET_TIME: 2019-04-21T13:44:29.000Z

OSBUILD: 7601

OSSERVICEPACK: 1000

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 7

OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2019-03-21 04:38:47

BUILDDATESTAMP_STR: 190320-1700

BUILDLAB_STR: win7sp1_ldr_escrow

BUILDOSVER_STR: 6.1.7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700

ANALYSIS_SESSION_ELAPSED_TIME: 704

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:x64_0xa_netr28x+4b98d

FAILURE_ID_HASH: {a6eb3f60-a5c3-0bd6-051c-41bf4427925d}

Followup: MachineOwner
---------

0: kd> lmvm netr28x
start end module name
fffff880`050c4000 fffff880`0532e000 netr28x T (no symbols)
Loaded symbol image file: netr28x.sys
Image path: \SystemRoot\system32\DRIVERS\netr28x.sys
Image name: netr28x.sys
Timestamp: Mon Apr 20 03:22:50 2015 (5534D37A)
CheckSum: 0026BF4B
ImageSize: 0026A000
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4
    Information from resource tables:
 
Çözüm
Soruna netr28x.sys sebep oluyor. Bu da Ralink 802.11 WiFi sürücüsüdür. Sürücüyü güncelle. Güncellemeyi bilmiyorsan Windows 10'a geç. 7 için destek vermiyoruz.

Kod:
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff8a000d9e618, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff800033386fd, address which referenced memory

Debugging Details:
------------------

GetUlongPtrFromAddress: unable to read from fffff80003304300

KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 1

Key : Analysis.Elapsed.Sec
Value: 1

Key : Analysis.Memory.CommitPeak.Mb
Value: 62


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700

SYSTEM_MANUFACTURER: Hewlett-Packard

SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC

SYSTEM_SKU: J4T62EA#AB8

SYSTEM_VERSION: 0991100000000000000600087

BIOS_VENDOR: Insyde

BIOS_VERSION: F.43

BIOS_DATE: 12/19/2017

BASEBOARD_MANUFACTURER: Hewlett-Packard

BASEBOARD_PRODUCT: 2211

BASEBOARD_VERSION: 86.56

DUMP_TYPE: 2

BUGCHECK_P1: fffff8a000d9e618

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff800033386fd

WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80003304100
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff800033042f0
GetUlongPtrFromAddress: unable to read from fffff800033044a8
GetPointerFromAddress: unable to read from fffff800033040d8
fffff8a000d9e618 Paged pool

CURRENT_IRQL: 2

FAULTING_IP:
nt!HvpDoAllocateCell+101
fffff800`033386fd 89443d00 mov dword ptr [rbp+rdi],eax

CPU_COUNT: 4

CPU_MHZ: 6a0

CPU_VENDOR: GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 45

CPU_STEPPING: 1

CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init)

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT

BUGCHECK_STR: 0xA

PROCESS_NAME: System

ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5

ANALYSIS_SESSION_TIME: 06-17-2019 20:48:20.0473

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

TRAP_FRAME:  fffff80004423950 -- (.trap 0xfffff80004423950)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000000039e8 rbx=0000000000000000 rcx=00000000000005e8
rdx=0000000000000008 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800033386fd rsp=fffff80004423ae0 rbp=0000000000000030
r8=fffff8a000024010 r9=0000000000000005 r10=fffff8a000d9e000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!HvpDoAllocateCell+0x101:
fffff800`033386fd 89443d00 mov dword ptr [rbp+rdi],eax ss:0018:00000000`00000030=????????
Resetting default scope

LAST_CONTROL_TRANSFER: from fffff80003108f69 to fffff800030faba0

STACK_TEXT:
fffff800`04423808 fffff800`03108f69 : 00000000`0000000a fffff8a0`00d9e618 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff800`04423810 fffff800`03106d88 : 00000000`00000001 fffff8a0`00d9e618 00000000`00000000 fffff8a0`00024010 : nt!KiBugCheckDispatch+0x69
fffff800`04423950 fffff800`033386fd : fffff8a0`00024010 fffff8a0`00024010 fffff8a0`00053ae0 00000000`00000000 : nt!KiPageFault+0x448
fffff800`04423ae0 fffff800`0337ad0d : fffff8a0`00024010 00000000`00000000 00000000`00000000 00000000`ffffffff : nt!HvpDoAllocateCell+0x101
fffff800`04423b40 fffff800`0337ab9d : 00000000`00000000 fffff8a0`05585c30 00000000`00000008 fffff800`03368d5c : nt!HvAllocateCell+0x55
fffff800`04423b70 fffff800`0332d4bf : fffff8a0`00024010 fffff8a0`00024010 fffff8a0`05593640 fffff800`04423e18 : nt!CmpAddValueKeyNew+0x69
fffff800`04423c40 fffff800`035136a3 : 01d4f094`f66bc44b fffff800`04423ff0 fffff8a0`0085fa70 00000000`00000000 : nt!CmpSetValueKeyNew+0x77
fffff800`04423c90 fffff800`03338531 : fffff8a0`14bbfca0 fffff800`04423e18 fffffa80`00000004 fffff800`04424210 : nt!CmSetValueKey+0xba3
fffff800`04423dd0 fffff800`03108bd3 : ffffffff`80000bec 00000000`00000002 fffffa80`00000000 fffff800`00000004 : nt!NtSetValueKey+0x349
fffff800`04423f00 fffff800`030fe3b0 : fffff800`0344f272 fffff800`04424248 fffff880`014b9152 00000000`539f0000 : nt!KiSystemServiceCopyEnd+0x13
fffff800`04424108 fffff800`0344f272 : fffff800`04424248 fffff880`014b9152 00000000`539f0000 fffff800`04424270 : nt!KiServiceLinkage
fffff800`04424110 fffff880`014c0d96 : 00000000`00000004 fffffa80`071c5250 00000000`00000000 00000000`000007ff : nt!RtlWriteRegistryValue+0x62
fffff800`04424170 fffff880`04f2698d : fffff800`04424270 fffff880`05135c28 00000000`00000000 00000000`00000000 : ndis!NdisWriteConfiguration+0x156
fffff800`044241d0 fffff800`04424270 : fffff880`05135c28 00000000`00000000 00000000`00000000 fffff800`001801a9 : netr28x+0x4b98d
fffff800`044241d8 fffff880`05135c28 : 00000000`00000000 00000000`00000000 fffff800`001801a9 fffffa80`059cb1a0 : 0xfffff800`04424270
fffff800`044241e0 00000000`00000000 : 00000000`00000000 fffff800`001801a9 fffffa80`059cb1a0 fffff800`00000000 : netr28x+0x25ac28


THREAD_SHA1_HASH_MOD_FUNC: 80858fdf941bd645ff48b6997b30f63ac59926fb

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 394aafee51f76470053fa2102b9df0f0f7df42a3

THREAD_SHA1_HASH_MOD: 5d50876435db08b990ce5928fe5c90526c26b16c

FOLLOWUP_IP:
netr28x+4b98d
fffff880`04f2698d ?? ???

SYMBOL_STACK_INDEX: d

SYMBOL_NAME: netr28x+4b98d

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: netr28x

IMAGE_NAME:  netr28x.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a

STACK_COMMAND: .thread ; .cxr ; kb

FAILURE_BUCKET_ID: X64_0xA_netr28x+4b98d

BUCKET_ID: X64_0xA_netr28x+4b98d

PRIMARY_PROBLEM_CLASS: X64_0xA_netr28x+4b98d

TARGET_TIME: 2019-04-11T18:32:48.000Z

OSBUILD: 7601

OSSERVICEPACK: 1000

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 7

OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2019-03-06 05:38:53

BUILDDATESTAMP_STR: 190305-1700

BUILDLAB_STR: win7sp1_ldr_escrow

BUILDOSVER_STR: 6.1.7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700

ANALYSIS_SESSION_ELAPSED_TIME: 7ae

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:x64_0xa_netr28x+4b98d

FAILURE_ID_HASH: {a6eb3f60-a5c3-0bd6-051c-41bf4427925d}

Followup: MachineOwner
---------


INVALID_PROCESS_ATTACH_ATTEMPT (5)
Arguments:
Arg1: fffffa80042b49b0
Arg2: fffffa80050a0160
Arg3: 0000000000000000
Arg4: 0000000000000001

Debugging Details:
------------------

GetUlongPtrFromAddress: unable to read from fffff800032a0300

KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 2

Key : Analysis.Elapsed.Sec
Value: 2

Key : Analysis.Memory.CommitPeak.Mb
Value: 62


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700

SYSTEM_MANUFACTURER: Hewlett-Packard

SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC

SYSTEM_SKU: J4T62EA#AB8

SYSTEM_VERSION: 0991100000000000000600087

BIOS_VENDOR: Insyde

BIOS_VERSION: F.43

BIOS_DATE: 12/19/2017

BASEBOARD_MANUFACTURER: Hewlett-Packard

BASEBOARD_PRODUCT: 2211

BASEBOARD_VERSION: 86.56

DUMP_TYPE: 2

BUGCHECK_P1: fffffa80042b49b0

BUGCHECK_P2: fffffa80050a0160

BUGCHECK_P3: 0

BUGCHECK_P4: 1

CPU_COUNT: 4

CPU_MHZ: 6a0

CPU_VENDOR: GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 45

CPU_STEPPING: 1

CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init)

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT

BUGCHECK_STR: 0x5

PROCESS_NAME: PointBlank.exe

CURRENT_IRQL: 2

ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5

ANALYSIS_SESSION_TIME: 06-17-2019 20:57:04.0108

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

DPC_STACK_BASE: FFFFF80004428FB0

LOCK_ADDRESS: fffff80003273240 -- (!locks fffff80003273240)
Cannot get _ERESOURCE type

Resource @ nt!PiEngineLock (0xfffff80003273240) Available
1 total locks

PNP_TRIAGE_DATA:
Lock address : 0xfffff80003273240
Thread Count : 0
Thread address: 0x0000000000000000
Thread wait : 0x0

LAST_CONTROL_TRANSFER: from fffff80003045602 to fffff80003096ba0

STACK_TEXT:
fffff800`04427cc8 fffff800`03045602 : 00000000`00000005 fffffa80`042b49b0 fffffa80`050a0160 00000000`00000000 : nt!KeBugCheckEx
fffff800`04427cd0 fffff800`032ee127 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeStackAttachProcess+0x52
fffff800`04427d50 fffff800`032ee4bf : 00000000`00000000 fffff8a0`00000000 fffff8a0`00001910 00000000`00000000 : nt!ObpDecrementHandleCount+0x177
fffff800`04427dd0 fffff800`032ee1e4 : 00000000`00000d08 fffffa80`050a0160 fffff8a0`00001910 00000000`00000d08 : nt!ObpCloseHandleTableEntry+0xaf
fffff800`04427e60 fffff800`030a4bd3 : fffffa80`04b87b50 fffff800`04427f30 fffff800`03358230 fffff800`032e476a : nt!ObpCloseHandle+0x94
fffff800`04427eb0 fffff800`0309a3b0 : fffff800`03331da3 fffffa80`04ea4a10 fffff800`03358230 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
fffff800`04428048 fffff800`03331da3 : fffffa80`04ea4a10 fffff800`03358230 00000000`00000000 00000000`00000000 : nt!KiServiceLinkage
fffff800`04428050 fffff800`0333baa8 : fffffa80`04ea4a10 00000000`00000001 fffffa80`04ea2740 00000000`00000000 : nt!PiGetDeviceRegistryProperty+0xab
fffff800`044281b0 fffff800`03330ac0 : fffffa80`04ea4a10 fffffa80`04ea4a10 00000000`00000000 00000000`00000000 : nt!IoGetDeviceProperty+0xbc
fffff800`04428290 fffff800`03341f81 : 00000000`ffff0000 fffffa80`0802b150 fffff880`01553110 fffffa80`05bb6220 : nt!IopOpenOrCreateDeviceRegistryKey+0x14c
fffff800`04428450 fffff880`01598152 : 00000000`c0000001 fffff800`044285e0 00000000`00000000 00000000`000007ff : nt!IoOpenDeviceRegistryKey+0x11
fffff800`04428490 fffff880`01503b34 : fffff800`044285e0 fffff800`044285b8 fffffa80`05c461a0 fffff800`035e0000 : ndis!NdisOpenConfiguration+0xb2
fffff800`044284d0 fffff880`0508b94f : fffffa80`00000000 fffff800`044285e0 fffff880`0529ac28 00000000`00000000 : ndis!NdisOpenConfigurationEx+0xa4
fffff800`04428540 fffffa80`00000000 : fffff800`044285e0 fffff880`0529ac28 00000000`00000000 00000000`001801a9 : netr28x+0x4b94f
fffff800`04428548 fffff800`044285e0 : fffff880`0529ac28 00000000`00000000 00000000`001801a9 fffffa80`05c461a0 : 0xfffffa80`00000000
fffff800`04428550 fffff880`0529ac28 : 00000000`00000000 00000000`001801a9 fffffa80`05c461a0 00000000`00000000 : 0xfffff800`044285e0
fffff800`04428558 00000000`00000000 : 00000000`001801a9 fffffa80`05c461a0 00000000`00000000 fffffa80`0742b540 : netr28x+0x25ac28


THREAD_SHA1_HASH_MOD_FUNC: 1764d353450a941fbc74295279ec02651c3d9814

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: bdc70d393af014c177e84e60c668cc911acaf71f

THREAD_SHA1_HASH_MOD: 9a9dca34541ae91666e3989df373f06b6e683623

FOLLOWUP_IP:
netr28x+4b94f
fffff880`0508b94f ?? ???

SYMBOL_STACK_INDEX: d

SYMBOL_NAME: netr28x+4b94f

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: netr28x

IMAGE_NAME:  netr28x.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a

STACK_COMMAND: .thread ; .cxr ; kb

FAILURE_BUCKET_ID: X64_0x5_netr28x+4b94f

BUCKET_ID: X64_0x5_netr28x+4b94f

PRIMARY_PROBLEM_CLASS: X64_0x5_netr28x+4b94f

TARGET_TIME: 2019-05-01T21:53:50.000Z

OSBUILD: 7601

OSSERVICEPACK: 1000

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 7

OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2019-03-21 04:38:47

BUILDDATESTAMP_STR: 190320-1700

BUILDLAB_STR: win7sp1_ldr_escrow

BUILDOSVER_STR: 6.1.7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700

ANALYSIS_SESSION_ELAPSED_TIME: 8cb

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:x64_0x5_netr28x+4b94f

FAILURE_ID_HASH: {43753b0b-e234-1a01-8468-7eed644d41ea}

Followup:     MachineOwner
INVALID_PROCESS_ATTACH_ATTEMPT (5)
Arguments:
Arg1: fffffa80042ce9b0
Arg2: fffffa8005d11370
Arg3: 0000000000000000
Arg4: 0000000000000001

Debugging Details:
------------------

GetUlongPtrFromAddress: unable to read from fffff800032b3300

KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 2

Key : Analysis.Elapsed.Sec
Value: 2

Key : Analysis.Memory.CommitPeak.Mb
Value: 62


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700

SYSTEM_MANUFACTURER: Hewlett-Packard

SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC

SYSTEM_SKU: J4T62EA#AB8

SYSTEM_VERSION: 0991100000000000000600087

BIOS_VENDOR: Insyde

BIOS_VERSION: F.43

BIOS_DATE: 12/19/2017

BASEBOARD_MANUFACTURER: Hewlett-Packard

BASEBOARD_PRODUCT: 2211

BASEBOARD_VERSION: 86.56

DUMP_TYPE: 2

BUGCHECK_P1: fffffa80042ce9b0

BUGCHECK_P2: fffffa8005d11370

BUGCHECK_P3: 0

BUGCHECK_P4: 1

CPU_COUNT: 4

CPU_MHZ: 6a0

CPU_VENDOR: GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 45

CPU_STEPPING: 1

CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init)

CUSTOMER_CRASH_COUNT: 2

DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT

BUGCHECK_STR: 0x5

PROCESS_NAME: audiodg.exe

CURRENT_IRQL: 2

ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5

ANALYSIS_SESSION_TIME: 06-17-2019 20:49:02.0621

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

DPC_STACK_BASE: FFFFF80000BA2FB0

LOCK_ADDRESS: fffff80003286240 -- (!locks fffff80003286240)
Cannot get _ERESOURCE type

Resource @ nt!PiEngineLock (0xfffff80003286240) Available
1 total locks

PNP_TRIAGE_DATA:
Lock address : 0xfffff80003286240
Thread Count : 0
Thread address: 0x0000000000000000
Thread wait : 0x0

LAST_CONTROL_TRANSFER: from fffff80003058602 to fffff800030a9ba0

STACK_TEXT:
fffff800`00ba1cc8 fffff800`03058602 : 00000000`00000005 fffffa80`042ce9b0 fffffa80`05d11370 00000000`00000000 : nt!KeBugCheckEx
fffff800`00ba1cd0 fffff800`03301127 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeStackAttachProcess+0x52
fffff800`00ba1d50 fffff800`033014bf : 00000000`00000000 fffff8a0`00000000 fffff8a0`00001910 00000000`00000000 : nt!ObpDecrementHandleCount+0x177
fffff800`00ba1dd0 fffff800`033011e4 : 00000000`00000e48 fffffa80`05d11370 fffff8a0`00001910 00000000`00000e48 : nt!ObpCloseHandleTableEntry+0xaf
fffff800`00ba1e60 fffff800`030b7bd3 : fffffa80`05d7ba00 fffff800`00ba1f30 fffff800`0336b230 fffff800`032f776a : nt!ObpCloseHandle+0x94
fffff800`00ba1eb0 fffff800`030ad3b0 : fffff800`03344da3 fffffa80`04e9e060 fffff800`0336b230 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
fffff800`00ba2048 fffff800`03344da3 : fffffa80`04e9e060 fffff800`0336b230 00000000`00000000 00000000`00000000 : nt!KiServiceLinkage
fffff800`00ba2050 fffff800`0334eaa8 : fffffa80`04e9e060 00000000`00000001 fffffa80`04e9d6e0 00000000`00000000 : nt!PiGetDeviceRegistryProperty+0xab
fffff800`00ba21b0 fffff800`03343ac0 : fffffa80`04e9e060 fffffa80`04e9e060 00000000`00000000 00000000`00000000 : nt!IoGetDeviceProperty+0xbc
fffff800`00ba2290 fffff800`03354f81 : 00000000`ffff0000 fffffa80`05086440 fffff880`01482110 fffffa80`05b713f0 : nt!IopOpenOrCreateDeviceRegistryKey+0x14c
fffff800`00ba2450 fffff880`014c7152 : fffffa80`04a3fd50 fffff800`00ba25e0 fffffa80`05f48a78 00000000`000007ff : nt!IoOpenDeviceRegistryKey+0x11
fffff800`00ba2490 fffff880`01432b34 : fffff800`00ba25e0 fffff800`00ba25b8 fffffa80`05b6d1a0 fffff880`014dd21d : ndis!NdisOpenConfiguration+0xb2
fffff800`00ba24d0 fffff880`0512a94f : fffffa80`00000000 fffff800`00ba25e0 fffff880`05339c28 00000000`00000000 : ndis!NdisOpenConfigurationEx+0xa4
fffff800`00ba2540 fffffa80`00000000 : fffff800`00ba25e0 fffff880`05339c28 00000000`00000000 00000000`001801a9 : netr28x+0x4b94f
fffff800`00ba2548 fffff800`00ba25e0 : fffff880`05339c28 00000000`00000000 00000000`001801a9 fffffa80`05b6d1a0 : 0xfffffa80`00000000
fffff800`00ba2550 fffff880`05339c28 : 00000000`00000000 00000000`001801a9 fffffa80`05b6d1a0 fffffa80`00000000 : 0xfffff800`00ba25e0
fffff800`00ba2558 00000000`00000000 : 00000000`001801a9 fffffa80`05b6d1a0 fffffa80`00000000 fffff880`05136e2e : netr28x+0x25ac28


THREAD_SHA1_HASH_MOD_FUNC: 1764d353450a941fbc74295279ec02651c3d9814

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: bdc70d393af014c177e84e60c668cc911acaf71f

THREAD_SHA1_HASH_MOD: 9a9dca34541ae91666e3989df373f06b6e683623

FOLLOWUP_IP:
netr28x+4b94f
fffff880`0512a94f ?? ???

SYMBOL_STACK_INDEX: d

SYMBOL_NAME: netr28x+4b94f

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: netr28x

IMAGE_NAME:  netr28x.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a

STACK_COMMAND: .thread ; .cxr ; kb

FAILURE_BUCKET_ID: X64_0x5_netr28x+4b94f

BUCKET_ID: X64_0x5_netr28x+4b94f

PRIMARY_PROBLEM_CLASS: X64_0x5_netr28x+4b94f

TARGET_TIME: 2019-04-27T20:53:09.000Z

OSBUILD: 7601

OSSERVICEPACK: 1000

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 7

OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2019-03-21 04:38:47

BUILDDATESTAMP_STR: 190320-1700

BUILDLAB_STR: win7sp1_ldr_escrow

BUILDOSVER_STR: 6.1.7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700

ANALYSIS_SESSION_ELAPSED_TIME: 89c

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:x64_0x5_netr28x+4b94f

FAILURE_ID_HASH: {43753b0b-e234-1a01-8468-7eed644d41ea}

Followup: MachineOwner
---------

INVALID_PROCESS_ATTACH_ATTEMPT (5)
Arguments:
Arg1: fffffa80042b49b0
Arg2: fffffa8004ee55f0
Arg3: 0000000000000000
Arg4: 0000000000000001

Debugging Details:
------------------

GetUlongPtrFromAddress: unable to read from fffff800032b0300

KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 2

Key : Analysis.Elapsed.Sec
Value: 2

Key : Analysis.Memory.CommitPeak.Mb
Value: 62


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700

SYSTEM_MANUFACTURER: Hewlett-Packard

SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC

SYSTEM_SKU: J4T62EA#AB8

SYSTEM_VERSION: 0991100000000000000600087

BIOS_VENDOR: Insyde

BIOS_VERSION: F.43

BIOS_DATE: 12/19/2017

BASEBOARD_MANUFACTURER: Hewlett-Packard

BASEBOARD_PRODUCT: 2211

BASEBOARD_VERSION: 86.56

DUMP_TYPE: 2

BUGCHECK_P1: fffffa80042b49b0

BUGCHECK_P2: fffffa8004ee55f0

BUGCHECK_P3: 0

BUGCHECK_P4: 1

CPU_COUNT: 4

CPU_MHZ: 6a0

CPU_VENDOR: GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 45

CPU_STEPPING: 1

CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init)

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT

BUGCHECK_STR: 0x5

PROCESS_NAME: PointBlank.exe

CURRENT_IRQL: 2

ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5

ANALYSIS_SESSION_TIME: 06-17-2019 20:48:58.0829

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

DPC_STACK_BASE: FFFFF8000441FFB0

LOCK_ADDRESS: fffff80003283240 -- (!locks fffff80003283240)
Cannot get _ERESOURCE type

Resource @ nt!PiEngineLock (0xfffff80003283240) Available
1 total locks

PNP_TRIAGE_DATA:
Lock address : 0xfffff80003283240
Thread Count : 0
Thread address: 0x0000000000000000
Thread wait : 0x0

LAST_CONTROL_TRANSFER: from fffff80003055602 to fffff800030a6ba0

STACK_TEXT:
fffff800`0441ecc8 fffff800`03055602 : 00000000`00000005 fffffa80`042b49b0 fffffa80`04ee55f0 00000000`00000000 : nt!KeBugCheckEx
fffff800`0441ecd0 fffff800`032fe127 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeStackAttachProcess+0x52
fffff800`0441ed50 fffff800`032fe4bf : 00000000`00000000 fffff8a0`00000000 fffff8a0`00001910 00000000`00000000 : nt!ObpDecrementHandleCount+0x177
fffff800`0441edd0 fffff800`032fe1e4 : 00000000`00000a80 fffffa80`04ee55f0 fffff8a0`00001910 00000000`00000a80 : nt!ObpCloseHandleTableEntry+0xaf
fffff800`0441ee60 fffff800`030b4bd3 : fffffa80`0861e940 fffff800`0441ef30 fffff800`03368230 fffff800`032f476a : nt!ObpCloseHandle+0x94
fffff800`0441eeb0 fffff800`030aa3b0 : fffff800`03341da3 fffffa80`04d31a10 fffff800`03368230 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
fffff800`0441f048 fffff800`03341da3 : fffffa80`04d31a10 fffff800`03368230 00000000`00000000 00000000`00000000 : nt!KiServiceLinkage
fffff800`0441f050 fffff800`0334baa8 : fffffa80`04d31a10 00000000`00000001 fffffa80`04d2d740 00000000`00000000 : nt!PiGetDeviceRegistryProperty+0xab
fffff800`0441f1b0 fffff800`03340ac0 : fffffa80`04d31a10 fffffa80`04d31a10 00000000`00000000 00000000`00000000 : nt!IoGetDeviceProperty+0xbc
fffff800`0441f290 fffff800`03351f81 : 00000000`ffff0000 fffffa80`046a8bd0 fffff880`014c6110 fffffa80`05a70cf0 : nt!IopOpenOrCreateDeviceRegistryKey+0x14c
fffff800`0441f450 fffff880`0150b152 : fffffa80`07393890 fffff800`0441f5e0 00000000`0000001f 00000000`000007ff : nt!IoOpenDeviceRegistryKey+0x11
fffff800`0441f490 fffff880`01476b34 : fffff800`0441f5e0 fffff800`0441f5b8 fffffa80`05a6f1a0 fffff800`035f7be3 : ndis!NdisOpenConfiguration+0xb2
fffff800`0441f4d0 fffff880`04e7694f : fffffa80`00000000 fffff800`0441f5e0 fffff880`05085c28 00000000`00000000 : ndis!NdisOpenConfigurationEx+0xa4
fffff800`0441f540 fffffa80`00000000 : fffff800`0441f5e0 fffff880`05085c28 00000000`00000000 00000000`001801a9 : netr28x+0x4b94f
fffff800`0441f548 fffff800`0441f5e0 : fffff880`05085c28 00000000`00000000 00000000`001801a9 fffffa80`05a6f1a0 : 0xfffffa80`00000000
fffff800`0441f550 fffff880`05085c28 : 00000000`00000000 00000000`001801a9 fffffa80`05a6f1a0 00000000`00000000 : 0xfffff800`0441f5e0
fffff800`0441f558 00000000`00000000 : 00000000`001801a9 fffffa80`05a6f1a0 00000000`00000000 fffffa80`0452e670 : netr28x+0x25ac28


THREAD_SHA1_HASH_MOD_FUNC: 1764d353450a941fbc74295279ec02651c3d9814

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: bdc70d393af014c177e84e60c668cc911acaf71f

THREAD_SHA1_HASH_MOD: 9a9dca34541ae91666e3989df373f06b6e683623

FOLLOWUP_IP:
netr28x+4b94f
fffff880`04e7694f ?? ???

SYMBOL_STACK_INDEX: d

SYMBOL_NAME: netr28x+4b94f

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: netr28x

IMAGE_NAME:  netr28x.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a

STACK_COMMAND: .thread ; .cxr ; kb

FAILURE_BUCKET_ID: X64_0x5_netr28x+4b94f

BUCKET_ID: X64_0x5_netr28x+4b94f

PRIMARY_PROBLEM_CLASS: X64_0x5_netr28x+4b94f

TARGET_TIME: 2019-04-21T09:57:22.000Z

OSBUILD: 7601

OSSERVICEPACK: 1000

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 7

OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2019-03-21 04:38:47

BUILDDATESTAMP_STR: 190320-1700

BUILDLAB_STR: win7sp1_ldr_escrow

BUILDOSVER_STR: 6.1.7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700

ANALYSIS_SESSION_ELAPSED_TIME: 8dc

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:x64_0x5_netr28x+4b94f

FAILURE_ID_HASH: {43753b0b-e234-1a01-8468-7eed644d41ea}

Followup: MachineOwner
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff8a000f95c5c, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8000334077c, address which referenced memory

Debugging Details:
------------------

GetUlongPtrFromAddress: unable to read from fffff800032f7300

KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 1

Key : Analysis.Elapsed.Sec
Value: 2

Key : Analysis.Memory.CommitPeak.Mb
Value: 62


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700

SYSTEM_MANUFACTURER: Hewlett-Packard

SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC

SYSTEM_SKU: J4T62EA#AB8

SYSTEM_VERSION: 0991100000000000000600087

BIOS_VENDOR: Insyde

BIOS_VERSION: F.43

BIOS_DATE: 12/19/2017

BASEBOARD_MANUFACTURER: Hewlett-Packard

BASEBOARD_PRODUCT: 2211

BASEBOARD_VERSION: 86.56

DUMP_TYPE: 2

BUGCHECK_P1: fffff8a000f95c5c

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8000334077c

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800032f7100
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff800032f72f0
GetUlongPtrFromAddress: unable to read from fffff800032f74a8
GetPointerFromAddress: unable to read from fffff800032f70d8
fffff8a000f95c5c Paged pool

CURRENT_IRQL: 2

FAULTING_IP:
nt!CmpFindValueByNameFromCache+12c
fffff800`0334077c 41f6401001 test byte ptr [r8+10h],1

CPU_COUNT: 4

CPU_MHZ: 6a0

CPU_VENDOR: GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 45

CPU_STEPPING: 1

CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init)

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT

BUGCHECK_STR: 0xA

PROCESS_NAME: System

ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5

ANALYSIS_SESSION_TIME: 06-17-2019 20:48:55.0594

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

DPC_STACK_BASE: FFFFF80000BA2FB0

TRAP_FRAME:  fffff80000ba1d00 -- (.trap 0xfffff80000ba1d00)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000c64c48 rbx=0000000000000000 rcx=fffff80000ba1fa1
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8000334077c rsp=fffff80000ba1e90 rbp=fffff80000ba2360
r8=fffff8a000f95c4c r9=000000000000ffff r10=fffffa8005aaacfc
r11=fffff8a0018b9b46 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!CmpFindValueByNameFromCache+0x12c:
fffff800`0334077c 41f6401001 test byte ptr [r8+10h],1 ds:fffff8a0`00f95c5c=01
Resetting default scope

LAST_CONTROL_TRANSFER: from fffff800030fbf69 to fffff800030edba0

STACK_TEXT:
fffff800`00ba1bb8 fffff800`030fbf69 : 00000000`0000000a fffff8a0`00f95c5c 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff800`00ba1bc0 fffff800`030f9d88 : 00000000`00000000 fffff8a0`00f95c5c fffffa80`05191000 fffff8a0`00024010 : nt!KiBugCheckDispatch+0x69
fffff800`00ba1d00 fffff800`0334077c : fffff8a0`00024010 fffff8a0`00024010 fffff8a0`00048c80 00000000`00000000 : nt!KiPageFault+0x448
fffff800`00ba1e90 fffff800`03323c38 : fffff8a0`15bf1de8 fffff800`00ba2188 fffff800`00ba1fd0 fffff800`00ba1fb8 : nt!CmpFindValueByNameFromCache+0x12c
fffff800`00ba1f60 fffff800`035061e7 : fffff8a0`15bf1de8 01d4f7b8`449491c9 fffff8a0`15bf1de8 00000000`00000000 : nt!CmpCompareNewValueDataAgainstKCBCache+0x78
fffff800`00ba2000 fffff800`0332b531 : fffff8a0`1f297040 fffff800`00ba2188 fffffa80`00000004 fffff800`00ba2580 : nt!CmSetValueKey+0x6a7
fffff800`00ba2140 fffff800`030fbbd3 : ffffffff`80000cc8 00000000`00000002 fffffa80`00000000 fffff800`00000004 : nt!NtSetValueKey+0x349
fffff800`00ba2270 fffff800`030f13b0 : fffff800`034422a2 fffff800`00ba25b8 fffff880`01514152 00000000`c0000001 : nt!KiSystemServiceCopyEnd+0x13
fffff800`00ba2478 fffff800`034422a2 : fffff800`00ba25b8 fffff880`01514152 00000000`c0000001 fffff800`00ba25e0 : nt!KiServiceLinkage
fffff800`00ba2480 fffff880`0151bd96 : 00000000`00000004 fffffa80`05aaacf0 00000100`00000000 00000000`000007ff : nt!RtlWriteRegistryValue+0x62
fffff800`00ba24e0 fffff880`0514a98d : fffff800`00ba25e0 fffff880`05359c28 00000000`00000000 00000000`00000000 : ndis!NdisWriteConfiguration+0x156
fffff800`00ba2540 fffff800`00ba25e0 : fffff880`05359c28 00000000`00000000 00000000`00000000 fffffa80`001801a9 : netr28x+0x4b98d
fffff800`00ba2548 fffff880`05359c28 : 00000000`00000000 00000000`00000000 fffffa80`001801a9 fffffa80`05b411a0 : 0xfffff800`00ba25e0
fffff800`00ba2550 00000000`00000000 : 00000000`00000000 fffffa80`001801a9 fffffa80`05b411a0 00000000`00000000 : netr28x+0x25ac28


THREAD_SHA1_HASH_MOD_FUNC: 935105e89958188e75032d802c31088ef212f1d5

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: d6275099b99a3ef75c037e31f081aba5025e8f89

THREAD_SHA1_HASH_MOD: 7921e317582c7f98a7f13cfbcd3c02a86fdcafec

FOLLOWUP_IP:
netr28x+4b98d
fffff880`0514a98d ?? ???

SYMBOL_STACK_INDEX: b

SYMBOL_NAME: netr28x+4b98d

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: netr28x

IMAGE_NAME:  netr28x.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a

STACK_COMMAND: .thread ; .cxr ; kb

FAILURE_BUCKET_ID: X64_0xA_netr28x+4b98d

BUCKET_ID: X64_0xA_netr28x+4b98d

PRIMARY_PROBLEM_CLASS: X64_0xA_netr28x+4b98d

TARGET_TIME: 2019-04-20T20:33:09.000Z

OSBUILD: 7601

OSSERVICEPACK: 1000

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 7

OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2019-03-21 04:38:47

BUILDDATESTAMP_STR: 190320-1700

BUILDLAB_STR: win7sp1_ldr_escrow

BUILDOSVER_STR: 6.1.7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700

ANALYSIS_SESSION_ELAPSED_TIME: 7e6

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:x64_0xa_netr28x+4b98d

FAILURE_ID_HASH: {a6eb3f60-a5c3-0bd6-051c-41bf4427925d}

Followup: MachineOwner
---------


INVALID_PROCESS_ATTACH_ATTEMPT (5)
Arguments:
Arg1: fffffa80042d09b0
Arg2: fffffa80075e8060
Arg3: 0000000000000000
Arg4: 0000000000000001

Debugging Details:
------------------

GetUlongPtrFromAddress: unable to read from fffff800032af300

KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 2

Key : Analysis.Elapsed.Sec
Value: 2

Key : Analysis.Memory.CommitPeak.Mb
Value: 62


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700

SYSTEM_MANUFACTURER: Hewlett-Packard

SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC

SYSTEM_SKU: J4T62EA#AB8

SYSTEM_VERSION: 0991100000000000000600087

BIOS_VENDOR: Insyde

BIOS_VERSION: F.43

BIOS_DATE: 12/19/2017

BASEBOARD_MANUFACTURER: Hewlett-Packard

BASEBOARD_PRODUCT: 2211

BASEBOARD_VERSION: 86.56

DUMP_TYPE: 2

BUGCHECK_P1: fffffa80042d09b0

BUGCHECK_P2: fffffa80075e8060

BUGCHECK_P3: 0

BUGCHECK_P4: 1

CPU_COUNT: 4

CPU_MHZ: 6a0

CPU_VENDOR: GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 45

CPU_STEPPING: 1

CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init)

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT

BUGCHECK_STR: 0x5

PROCESS_NAME: audiodg.exe

CURRENT_IRQL: 2

ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5

ANALYSIS_SESSION_TIME: 06-17-2019 20:48:52.0836

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

DPC_STACK_BASE: FFFFF8000441FFB0

LOCK_ADDRESS: fffff80003282240 -- (!locks fffff80003282240)
Cannot get _ERESOURCE type

Resource @ nt!PiEngineLock (0xfffff80003282240) Available
1 total locks

PNP_TRIAGE_DATA:
Lock address : 0xfffff80003282240
Thread Count : 0
Thread address: 0x0000000000000000
Thread wait : 0x0

LAST_CONTROL_TRANSFER: from fffff800030545f2 to fffff800030a5ba0

STACK_TEXT:
fffff800`0441ecc8 fffff800`030545f2 : 00000000`00000005 fffffa80`042d09b0 fffffa80`075e8060 00000000`00000000 : nt!KeBugCheckEx
fffff800`0441ecd0 fffff800`032fd127 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeStackAttachProcess+0x52
fffff800`0441ed50 fffff800`032fd4bf : 00000000`00000000 fffff8a0`00000000 fffff8a0`00001910 00000000`00000000 : nt!ObpDecrementHandleCount+0x177
fffff800`0441edd0 fffff800`032fd1e4 : 00000000`000007c8 fffffa80`075e8060 fffff8a0`00001910 00000000`000007c8 : nt!ObpCloseHandleTableEntry+0xaf
fffff800`0441ee60 fffff800`030b3bd3 : fffffa80`044dab50 fffff800`0441ef30 fffff800`03367200 fffff800`032f376a : nt!ObpCloseHandle+0x94
fffff800`0441eeb0 fffff800`030a93b0 : fffff800`03340d73 fffffa80`04ddc060 fffff800`03367200 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
fffff800`0441f048 fffff800`03340d73 : fffffa80`04ddc060 fffff800`03367200 00000000`00000000 00000000`00000000 : nt!KiServiceLinkage
fffff800`0441f050 fffff800`0334aa78 : fffffa80`04ddc060 00000000`00000001 fffffa80`04dd96e0 00000000`00000000 : nt!PiGetDeviceRegistryProperty+0xab
fffff800`0441f1b0 fffff800`0333fa90 : fffffa80`04ddc060 fffffa80`04ddc060 00000000`00000000 00000000`00000000 : nt!IoGetDeviceProperty+0xbc
fffff800`0441f290 fffff800`03350f51 : 00000000`ffff0000 fffffa80`05a69770 fffff880`014e7110 fffffa80`05ca3270 : nt!IopOpenOrCreateDeviceRegistryKey+0x14c
fffff800`0441f450 fffff880`0152c152 : fffffa80`071bfdc0 fffff800`0441f5e0 00000000`0000001f 00000000`000007ff : nt!IoOpenDeviceRegistryKey+0x11
fffff800`0441f490 fffff880`01497b34 : fffff800`0441f5e0 fffff800`0441f5b8 fffffa80`05c0a1a0 fffff880`0646eab0 : ndis!NdisOpenConfiguration+0xb2
fffff800`0441f4d0 fffff880`04f0c94f : fffffa80`00000000 fffff800`0441f5e0 fffff880`0511bc28 00000000`00000000 : ndis!NdisOpenConfigurationEx+0xa4
fffff800`0441f540 fffffa80`00000000 : fffff800`0441f5e0 fffff880`0511bc28 00000000`00000000 fffffa80`001801a9 : netr28x+0x4b94f
fffff800`0441f548 fffff800`0441f5e0 : fffff880`0511bc28 00000000`00000000 fffffa80`001801a9 fffffa80`05c0a1a0 : 0xfffffa80`00000000
fffff800`0441f550 fffff880`0511bc28 : 00000000`00000000 fffffa80`001801a9 fffffa80`05c0a1a0 00000000`00000000 : 0xfffff800`0441f5e0
fffff800`0441f558 00000000`00000000 : fffffa80`001801a9 fffffa80`05c0a1a0 00000000`00000000 fffff880`00e5028c : netr28x+0x25ac28


THREAD_SHA1_HASH_MOD_FUNC: 1764d353450a941fbc74295279ec02651c3d9814

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: bdc70d393af014c177e84e60c668cc911acaf71f

THREAD_SHA1_HASH_MOD: 9a9dca34541ae91666e3989df373f06b6e683623

FOLLOWUP_IP:
netr28x+4b94f
fffff880`04f0c94f ?? ???

SYMBOL_STACK_INDEX: d

SYMBOL_NAME: netr28x+4b94f

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: netr28x

IMAGE_NAME:  netr28x.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a

STACK_COMMAND: .thread ; .cxr ; kb

FAILURE_BUCKET_ID: X64_0x5_netr28x+4b94f

BUCKET_ID: X64_0x5_netr28x+4b94f

PRIMARY_PROBLEM_CLASS: X64_0x5_netr28x+4b94f

TARGET_TIME: 2019-04-11T15:07:27.000Z

OSBUILD: 7601

OSSERVICEPACK: 1000

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 7

OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2019-03-06 05:38:53

BUILDDATESTAMP_STR: 190305-1700

BUILDLAB_STR: win7sp1_ldr_escrow

BUILDOSVER_STR: 6.1.7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700

ANALYSIS_SESSION_ELAPSED_TIME: 8c6

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:x64_0x5_netr28x+4b94f

FAILURE_ID_HASH: {43753b0b-e234-1a01-8468-7eed644d41ea}

Followup:     MachineOwner


INVALID_PROCESS_ATTACH_ATTEMPT (5)
Arguments:
Arg1: fffffa80042b59b0
Arg2: fffffa8004c74b00
Arg3: 0000000000000001
Arg4: 0000000000000001

Debugging Details:
------------------

GetUlongPtrFromAddress: unable to read from fffff800030f3300

KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 2

Key : Analysis.Elapsed.Sec
Value: 2

Key : Analysis.Memory.CommitPeak.Mb
Value: 62


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700

SYSTEM_MANUFACTURER: Hewlett-Packard

SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC

SYSTEM_SKU: J4T62EA#AB8

SYSTEM_VERSION: 0991100000000000000600087

BIOS_VENDOR: Insyde

BIOS_VERSION: F.43

BIOS_DATE: 12/19/2017

BASEBOARD_MANUFACTURER: Hewlett-Packard

BASEBOARD_PRODUCT: 2211

BASEBOARD_VERSION: 86.56

DUMP_TYPE: 2

BUGCHECK_P1: fffffa80042b59b0

BUGCHECK_P2: fffffa8004c74b00

BUGCHECK_P3: 1

BUGCHECK_P4: 1

CPU_COUNT: 4

CPU_MHZ: 6a0

CPU_VENDOR: GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 45

CPU_STEPPING: 1

CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init)

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT

BUGCHECK_STR: 0x5

PROCESS_NAME: chrome.exe

CURRENT_IRQL: 2

ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5

ANALYSIS_SESSION_TIME: 06-17-2019 20:48:49.0152

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

DPC_STACK_BASE: FFFFF80000BA2FB0

LOCK_ADDRESS: fffff800030c6240 -- (!locks fffff800030c6240)
Cannot get _ERESOURCE type

Resource @ nt!PiEngineLock (0xfffff800030c6240) Available
1 total locks

PNP_TRIAGE_DATA:
Lock address : 0xfffff800030c6240
Thread Count : 0
Thread address: 0x0000000000000000
Thread wait : 0x0

LAST_CONTROL_TRANSFER: from fffff80002e985f2 to fffff80002ee9ba0

STACK_TEXT:
fffff800`00ba1cc8 fffff800`02e985f2 : 00000000`00000005 fffffa80`042b59b0 fffffa80`04c74b00 00000000`00000001 : nt!KeBugCheckEx
fffff800`00ba1cd0 fffff800`03141127 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeStackAttachProcess+0x52
fffff800`00ba1d50 fffff800`031414bf : 00000000`00000000 fffff8a0`00000000 fffff8a0`00001910 00000000`00000000 : nt!ObpDecrementHandleCount+0x177
fffff800`00ba1dd0 fffff800`031411e4 : 00000000`000008e4 fffffa80`04c74b00 fffff8a0`00001910 00000000`000008e4 : nt!ObpCloseHandleTableEntry+0xaf
fffff800`00ba1e60 fffff800`02ef7bd3 : fffffa80`076a6b50 fffff800`00ba1f30 fffff800`031ab200 fffff800`0313776a : nt!ObpCloseHandle+0x94
fffff800`00ba1eb0 fffff800`02eed3b0 : fffff800`03184d73 fffffa80`04e1e060 fffff800`031ab200 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
fffff800`00ba2048 fffff800`03184d73 : fffffa80`04e1e060 fffff800`031ab200 00000000`00000000 00000000`00000000 : nt!KiServiceLinkage
fffff800`00ba2050 fffff800`0318ea78 : fffffa80`04e1e060 00000000`00000001 fffffa80`04e1d6e0 00000000`00000000 : nt!PiGetDeviceRegistryProperty+0xab
fffff800`00ba21b0 fffff800`03183a90 : fffffa80`04e1e060 fffffa80`04e1e060 00000000`00000000 00000000`00000000 : nt!IoGetDeviceProperty+0xbc
fffff800`00ba2290 fffff800`03194f51 : 00000000`ffff0000 fffffa80`07df09f0 fffff880`01480110 fffffa80`05cfe910 : nt!IopOpenOrCreateDeviceRegistryKey+0x14c
fffff800`00ba2450 fffff880`014c5152 : fffffa80`080038e0 fffff800`00ba25e0 fffffa80`0700aa78 00000000`000007ff : nt!IoOpenDeviceRegistryKey+0x11
fffff800`00ba2490 fffff880`01430b34 : fffff800`00ba25e0 fffff800`00ba25b8 fffffa80`055e31a0 fffff880`014db21d : ndis!NdisOpenConfiguration+0xb2
fffff800`00ba24d0 fffff880`04e5194f : 00000000`00000000 fffff800`00ba25e0 fffff880`05060c28 00000000`00000000 : ndis!NdisOpenConfigurationEx+0xa4
fffff800`00ba2540 00000000`00000000 : fffff800`00ba25e0 fffff880`05060c28 00000000`00000000 fffffa80`001801a9 : netr28x+0x4b94f


THREAD_SHA1_HASH_MOD_FUNC: ae5746727567d6f3e980a5bab83b7524a5dc9ee8

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: a4491f04e0c588cecd320ea5c66c026862f569ea

THREAD_SHA1_HASH_MOD: 34d7ba38146ecb972065c22fa7203d72f73eccb4

FOLLOWUP_IP:
netr28x+4b94f
fffff880`04e5194f ?? ???

SYMBOL_STACK_INDEX: d

SYMBOL_NAME: netr28x+4b94f

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: netr28x

IMAGE_NAME:  netr28x.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a

STACK_COMMAND: .thread ; .cxr ; kb

FAILURE_BUCKET_ID: X64_0x5_netr28x+4b94f

BUCKET_ID: X64_0x5_netr28x+4b94f

PRIMARY_PROBLEM_CLASS: X64_0x5_netr28x+4b94f

TARGET_TIME: 2019-04-11T14:09:37.000Z

OSBUILD: 7601

OSSERVICEPACK: 1000

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 7

OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2019-03-06 05:38:53

BUILDDATESTAMP_STR: 190305-1700

BUILDLAB_STR: win7sp1_ldr_escrow

BUILDOSVER_STR: 6.1.7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700

ANALYSIS_SESSION_ELAPSED_TIME: 941

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:x64_0x5_netr28x+4b94f

FAILURE_ID_HASH: {43753b0b-e234-1a01-8468-7eed644d41ea}

Followup: MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff8a002085398, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80003ae56fd, address which referenced memory

Debugging Details:
------------------

GetUlongPtrFromAddress: unable to read from fffff80003ab1300

KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 1

Key : Analysis.Elapsed.Sec
Value: 1

Key : Analysis.Memory.CommitPeak.Mb
Value: 62


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700

SYSTEM_MANUFACTURER: Hewlett-Packard

SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC

SYSTEM_SKU: J4T62EA#AB8

SYSTEM_VERSION: 0991100000000000000600087

BIOS_VENDOR: Insyde

BIOS_VERSION: F.43

BIOS_DATE: 12/19/2017

BASEBOARD_MANUFACTURER: Hewlett-Packard

BASEBOARD_PRODUCT: 2211

BASEBOARD_VERSION: 86.56

DUMP_TYPE: 2

BUGCHECK_P1: fffff8a002085398

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff80003ae56fd

WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80003ab1100
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff80003ab12f0
GetUlongPtrFromAddress: unable to read from fffff80003ab14a8
GetPointerFromAddress: unable to read from fffff80003ab10d8
fffff8a002085398 Paged pool

CURRENT_IRQL: 2

FAULTING_IP:
nt!HvpDoAllocateCell+101
fffff800`03ae56fd 89443d00 mov dword ptr [rbp+rdi],eax

CPU_COUNT: 4

CPU_MHZ: 6a0

CPU_VENDOR: GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 45

CPU_STEPPING: 1

CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init)

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT

BUGCHECK_STR: 0xA

PROCESS_NAME: System

ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5

ANALYSIS_SESSION_TIME: 06-17-2019 20:48:46.0248

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

TRAP_FRAME:  fffff80004c1a950 -- (.trap 0xfffff80004c1a950)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000008 rbx=0000000000000000 rcx=0000000000000368
rdx=0000000000000002 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80003ae56fd rsp=fffff80004c1aae0 rbp=0000000000000030
r8=fffff8a000024010 r9=0000000000000005 r10=fffff8a002085000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!HvpDoAllocateCell+0x101:
fffff800`03ae56fd 89443d00 mov dword ptr [rbp+rdi],eax ss:0018:00000000`00000030=????????
Resetting default scope

LAST_CONTROL_TRANSFER: from fffff800038b5f69 to fffff800038a7ba0

STACK_TEXT:
fffff800`04c1a808 fffff800`038b5f69 : 00000000`0000000a fffff8a0`02085398 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff800`04c1a810 fffff800`038b3d88 : 00000000`00000001 fffff8a0`02085398 00000000`00000000 fffff8a0`00024010 : nt!KiBugCheckDispatch+0x69
fffff800`04c1a950 fffff800`03ae56fd : fffff8a0`00024010 fffff8a0`00024010 fffff8a0`0003b420 fffff800`00000000 : nt!KiPageFault+0x448
fffff800`04c1aae0 fffff800`03b27d1d : fffff8a0`00024010 00000000`00000000 00000000`00000000 00000000`ffffffff : nt!HvpDoAllocateCell+0x101
fffff800`04c1ab40 fffff800`03b27bad : 00000000`00000000 fffff8a0`018bcc30 00000000`00000008 fffff800`03b15d5c : nt!HvAllocateCell+0x55
fffff800`04c1ab70 fffff800`03ada4bf : fffff8a0`00024010 fffff8a0`00024010 fffff8a0`018ca640 fffff800`04c1ae18 : nt!CmpAddValueKeyNew+0x69
fffff800`04c1ac40 fffff800`03cc06e3 : 01d501ff`f5623883 fffff800`04c1aff0 fffff8a0`04468820 00000000`00000000 : nt!CmpSetValueKeyNew+0x77
fffff800`04c1ac90 fffff800`03ae5531 : fffff8a0`0506b140 fffff800`04c1ae18 fffffa80`00000004 fffff800`04c1b210 : nt!CmSetValueKey+0xba3
fffff800`04c1add0 fffff800`038b5bd3 : ffffffff`80000dc4 00000000`00000002 fffffa80`00000000 fffff800`00000004 : nt!NtSetValueKey+0x349
fffff800`04c1af00 fffff800`038ab3b0 : fffff800`03bfc2a2 fffff800`04c1b248 fffff880`01525152 fffffa80`00040001 : nt!KiSystemServiceCopyEnd+0x13
fffff800`04c1b108 fffff800`03bfc2a2 : fffff800`04c1b248 fffff880`01525152 fffffa80`00040001 fffff800`04c1b270 : nt!KiServiceLinkage
fffff800`04c1b110 fffff880`0152cd96 : 00000000`00000004 fffffa80`0449b4e0 fffff880`0525c030 00000000`000007ff : nt!RtlWriteRegistryValue+0x62
fffff800`04c1b170 fffff880`050b698d : fffff800`04c1b270 fffff880`052c5c28 00000000`00000000 00000000`00000000 : ndis!NdisWriteConfiguration+0x156
fffff800`04c1b1d0 fffff800`04c1b270 : fffff880`052c5c28 00000000`00000000 00000000`00000000 fffff800`001801a9 : netr28x+0x4b98d
fffff800`04c1b1d8 fffff880`052c5c28 : 00000000`00000000 00000000`00000000 fffff800`001801a9 fffffa80`05b7f1a0 : 0xfffff800`04c1b270
fffff800`04c1b1e0 00000000`00000000 : 00000000`00000000 fffff800`001801a9 fffffa80`05b7f1a0 fffff800`00000000 : netr28x+0x25ac28


THREAD_SHA1_HASH_MOD_FUNC: 80858fdf941bd645ff48b6997b30f63ac59926fb

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 394aafee51f76470053fa2102b9df0f0f7df42a3

THREAD_SHA1_HASH_MOD: 5d50876435db08b990ce5928fe5c90526c26b16c

FOLLOWUP_IP:
netr28x+4b98d
fffff880`050b698d ?? ???

SYMBOL_STACK_INDEX: d

SYMBOL_NAME: netr28x+4b98d

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: netr28x

IMAGE_NAME:  netr28x.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a

STACK_COMMAND: .thread ; .cxr ; kb

FAILURE_BUCKET_ID: X64_0xA_netr28x+4b98d

BUCKET_ID: X64_0xA_netr28x+4b98d

PRIMARY_PROBLEM_CLASS: X64_0xA_netr28x+4b98d

TARGET_TIME: 2019-05-03T22:31:32.000Z

OSBUILD: 7601

OSSERVICEPACK: 1000

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 7

OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2019-03-21 04:38:47

BUILDDATESTAMP_STR: 190320-1700

BUILDLAB_STR: win7sp1_ldr_escrow

BUILDOSVER_STR: 6.1.7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700

ANALYSIS_SESSION_ELAPSED_TIME: 7b0

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:x64_0xa_netr28x+4b98d

FAILURE_ID_HASH: {a6eb3f60-a5c3-0bd6-051c-41bf4427925d}

Followup: MachineOwner
---------

INVALID_PROCESS_ATTACH_ATTEMPT (5)
Arguments:
Arg1: fffffa80042cf9b0
Arg2: fffffa80045a46e0
Arg3: 0000000000000000
Arg4: 0000000000000001

Debugging Details:
------------------

GetUlongPtrFromAddress: unable to read from fffff800030fb300

KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 2

Key : Analysis.Elapsed.Sec
Value: 2

Key : Analysis.Memory.CommitPeak.Mb
Value: 62


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700

SYSTEM_MANUFACTURER: Hewlett-Packard

SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC

SYSTEM_SKU: J4T62EA#AB8

SYSTEM_VERSION: 0991100000000000000600087

BIOS_VENDOR: Insyde

BIOS_VERSION: F.43

BIOS_DATE: 12/19/2017

BASEBOARD_MANUFACTURER: Hewlett-Packard

BASEBOARD_PRODUCT: 2211

BASEBOARD_VERSION: 86.56

DUMP_TYPE: 2

BUGCHECK_P1: fffffa80042cf9b0

BUGCHECK_P2: fffffa80045a46e0

BUGCHECK_P3: 0

BUGCHECK_P4: 1

CPU_COUNT: 4

CPU_MHZ: 6a0

CPU_VENDOR: GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 45

CPU_STEPPING: 1

CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init)

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT

BUGCHECK_STR: 0x5

PROCESS_NAME: chrome.exe

CURRENT_IRQL: 2

ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5

ANALYSIS_SESSION_TIME: 06-17-2019 20:48:24.0070

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

DPC_STACK_BASE: FFFFF80000BA2FB0

LOCK_ADDRESS: fffff800030ce240 -- (!locks fffff800030ce240)
Cannot get _ERESOURCE type

Resource @ nt!PiEngineLock (0xfffff800030ce240) Available
1 total locks

PNP_TRIAGE_DATA:
Lock address : 0xfffff800030ce240
Thread Count : 0
Thread address: 0x0000000000000000
Thread wait : 0x0

LAST_CONTROL_TRANSFER: from fffff80002ea05f2 to fffff80002ef1ba0

STACK_TEXT:
fffff800`00ba1cc8 fffff800`02ea05f2 : 00000000`00000005 fffffa80`042cf9b0 fffffa80`045a46e0 00000000`00000000 : nt!KeBugCheckEx
fffff800`00ba1cd0 fffff800`03149127 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeStackAttachProcess+0x52
fffff800`00ba1d50 fffff800`031494bf : 00000000`00000000 fffff8a0`00000000 fffff8a0`00001910 00000000`00000000 : nt!ObpDecrementHandleCount+0x177
fffff800`00ba1dd0 fffff800`031491e4 : 00000000`00000b3c fffffa80`045a46e0 fffff8a0`00001910 00000000`00000b3c : nt!ObpCloseHandleTableEntry+0xaf
fffff800`00ba1e60 fffff800`02effbd3 : fffffa80`04502060 fffff800`00ba1f30 fffff800`031b3200 fffff800`0313f76a : nt!ObpCloseHandle+0x94
fffff800`00ba1eb0 fffff800`02ef53b0 : fffff800`0318cd73 fffffa80`04ebd060 fffff800`031b3200 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
fffff800`00ba2048 fffff800`0318cd73 : fffffa80`04ebd060 fffff800`031b3200 00000000`00000000 00000000`00000000 : nt!KiServiceLinkage
fffff800`00ba2050 fffff800`03196a78 : fffffa80`04ebd060 00000000`00000001 fffffa80`04eba6e0 00000000`00000000 : nt!PiGetDeviceRegistryProperty+0xab
fffff800`00ba21b0 fffff800`0318ba90 : fffffa80`04ebd060 fffffa80`04ebd060 00000000`00000000 00000000`00000000 : nt!IoGetDeviceProperty+0xbc
fffff800`00ba2290 fffff800`0319cf51 : 00000000`ffff0000 fffffa80`08470cb0 fffff880`0147f110 fffffa80`059fbe30 : nt!IopOpenOrCreateDeviceRegistryKey+0x14c
fffff800`00ba2450 fffff880`014c4152 : fffffa80`0681f000 fffff800`00ba25e0 00000000`00000005 00000000`000007ff : nt!IoOpenDeviceRegistryKey+0x11
fffff800`00ba2490 fffff880`0142fb34 : fffff800`00ba25e0 fffff800`00ba25b8 fffffa80`05bf61a0 fffff800`02e262ea : ndis!NdisOpenConfiguration+0xb2
fffff800`00ba24d0 fffff880`0511d94f : 00000000`00000000 fffff800`00ba25e0 fffff880`0532cc28 00000000`00000000 : ndis!NdisOpenConfigurationEx+0xa4
fffff800`00ba2540 00000000`00000000 : fffff800`00ba25e0 fffff880`0532cc28 00000000`00000000 fffffa80`001801a9 : netr28x+0x4b94f


THREAD_SHA1_HASH_MOD_FUNC: ae5746727567d6f3e980a5bab83b7524a5dc9ee8

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: a4491f04e0c588cecd320ea5c66c026862f569ea

THREAD_SHA1_HASH_MOD: 34d7ba38146ecb972065c22fa7203d72f73eccb4

FOLLOWUP_IP:
netr28x+4b94f
fffff880`0511d94f ?? ???

SYMBOL_STACK_INDEX: d

SYMBOL_NAME: netr28x+4b94f

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: netr28x

IMAGE_NAME:  netr28x.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a

STACK_COMMAND: .thread ; .cxr ; kb

FAILURE_BUCKET_ID: X64_0x5_netr28x+4b94f

BUCKET_ID: X64_0x5_netr28x+4b94f

PRIMARY_PROBLEM_CLASS: X64_0x5_netr28x+4b94f

TARGET_TIME: 2019-04-11T14:13:16.000Z

OSBUILD: 7601

OSSERVICEPACK: 1000

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 7

OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2019-03-06 05:38:53

BUILDDATESTAMP_STR: 190305-1700

BUILDLAB_STR: win7sp1_ldr_escrow

BUILDOSVER_STR: 6.1.7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700

ANALYSIS_SESSION_ELAPSED_TIME: 851

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:x64_0x5_netr28x+4b94f

FAILURE_ID_HASH: {43753b0b-e234-1a01-8468-7eed644d41ea}

Followup: MachineOwner
---------

INVALID_PROCESS_ATTACH_ATTEMPT (5)
Arguments:
Arg1: fffffa80042ce9b0
Arg2: fffffa800b053b00
Arg3: 0000000000000000
Arg4: 0000000000000001

Debugging Details:
------------------

GetUlongPtrFromAddress: unable to read from fffff800032ed300

KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 1

Key : Analysis.Elapsed.Sec
Value: 2

Key : Analysis.Memory.CommitPeak.Mb
Value: 62


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700

SYSTEM_MANUFACTURER: Hewlett-Packard

SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC

SYSTEM_SKU: J4T62EA#AB8

SYSTEM_VERSION: 0991100000000000000600087

BIOS_VENDOR: Insyde

BIOS_VERSION: F.43

BIOS_DATE: 12/19/2017

BASEBOARD_MANUFACTURER: Hewlett-Packard

BASEBOARD_PRODUCT: 2211

BASEBOARD_VERSION: 86.56

DUMP_TYPE: 2

BUGCHECK_P1: fffffa80042ce9b0

BUGCHECK_P2: fffffa800b053b00

BUGCHECK_P3: 0

BUGCHECK_P4: 1

CPU_COUNT: 4

CPU_MHZ: 6a0

CPU_VENDOR: GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 45

CPU_STEPPING: 1

CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init)

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT

BUGCHECK_STR: 0x5

PROCESS_NAME: mcbuilder.exe

CURRENT_IRQL: 2

ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5

ANALYSIS_SESSION_TIME: 06-17-2019 20:48:40.0990

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

DPC_STACK_BASE: FFFFF80000BA2FB0

LOCK_ADDRESS: fffff800032c0240 -- (!locks fffff800032c0240)
Cannot get _ERESOURCE type

Resource @ nt!PiEngineLock (0xfffff800032c0240) Available
1 total locks

PNP_TRIAGE_DATA:
Lock address : 0xfffff800032c0240
Thread Count : 0
Thread address: 0x0000000000000000
Thread wait : 0x0

LAST_CONTROL_TRANSFER: from fffff800030925f2 to fffff800030e3ba0

STACK_TEXT:
fffff800`00ba1cc8 fffff800`030925f2 : 00000000`00000005 fffffa80`042ce9b0 fffffa80`0b053b00 00000000`00000000 : nt!KeBugCheckEx
fffff800`00ba1cd0 fffff800`0333b127 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeStackAttachProcess+0x52
fffff800`00ba1d50 fffff800`0333b4bf : 00000000`00000000 fffff8a0`00000000 fffff8a0`00001910 00000000`00000000 : nt!ObpDecrementHandleCount+0x177
fffff800`00ba1dd0 fffff800`0333b1e4 : 00000000`00000d0c fffffa80`0b053b00 fffff8a0`00001910 00000000`00000d0c : nt!ObpCloseHandleTableEntry+0xaf
fffff800`00ba1e60 fffff800`030f1bd3 : fffffa80`0568b6e0 fffff800`00ba1f30 fffff800`033a5200 fffff800`0333176a : nt!ObpCloseHandle+0x94
fffff800`00ba1eb0 fffff800`030e73b0 : fffff800`0337ed73 fffffa80`04dc8060 fffff800`033a5200 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
fffff800`00ba2048 fffff800`0337ed73 : fffffa80`04dc8060 fffff800`033a5200 00000000`00000000 00000000`00000000 : nt!KiServiceLinkage
fffff800`00ba2050 fffff800`03388a78 : fffffa80`04dc8060 00000000`00000001 fffffa80`04dc36e0 00000000`00000000 : nt!PiGetDeviceRegistryProperty+0xab
fffff800`00ba21b0 fffff800`0337da90 : fffffa80`04dc8060 fffffa80`04dc8060 00000000`00000000 00000000`00000000 : nt!IoGetDeviceProperty+0xbc
fffff800`00ba2290 fffff800`0338ef51 : 00000000`ffff0000 fffffa80`09035950 fffff880`014a0110 fffffa80`05adbd80 : nt!IopOpenOrCreateDeviceRegistryKey+0x14c
fffff800`00ba2450 fffff880`014e5152 : fffffa80`00000000 fffff800`00ba25e0 00000000`00000000 00000000`000007ff : nt!IoOpenDeviceRegistryKey+0x11
fffff800`00ba2490 fffff880`01450b34 : fffff800`00ba25e0 fffff800`00ba25b8 fffffa80`05bc91a0 00000000`00000001 : ndis!NdisOpenConfiguration+0xb2
fffff800`00ba24d0 fffff880`056cc94f : 00000000`00000000 fffff800`00ba25e0 fffff880`058dbc28 00000000`00000000 : ndis!NdisOpenConfigurationEx+0xa4
fffff800`00ba2540 00000000`00000000 : fffff800`00ba25e0 fffff880`058dbc28 00000000`00000000 fffffa80`001801a9 : netr28x+0x4b94f


THREAD_SHA1_HASH_MOD_FUNC: ae5746727567d6f3e980a5bab83b7524a5dc9ee8

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: a4491f04e0c588cecd320ea5c66c026862f569ea

THREAD_SHA1_HASH_MOD: 34d7ba38146ecb972065c22fa7203d72f73eccb4

FOLLOWUP_IP:
netr28x+4b94f
fffff880`056cc94f ?? ???

SYMBOL_STACK_INDEX: d

SYMBOL_NAME: netr28x+4b94f

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: netr28x

IMAGE_NAME:  netr28x.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a

STACK_COMMAND: .thread ; .cxr ; kb

FAILURE_BUCKET_ID: X64_0x5_netr28x+4b94f

BUCKET_ID: X64_0x5_netr28x+4b94f

PRIMARY_PROBLEM_CLASS: X64_0x5_netr28x+4b94f

TARGET_TIME: 2019-04-11T17:47:48.000Z

OSBUILD: 7601

OSSERVICEPACK: 1000

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 7

OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2019-03-06 05:38:53

BUILDDATESTAMP_STR: 190305-1700

BUILDLAB_STR: win7sp1_ldr_escrow

BUILDOSVER_STR: 6.1.7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700

ANALYSIS_SESSION_ELAPSED_TIME: 7f5

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:x64_0x5_netr28x+4b94f

FAILURE_ID_HASH: {43753b0b-e234-1a01-8468-7eed644d41ea}

Followup: MachineOwner
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff8a006be8c34, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80003afb730, address which referenced memory

Debugging Details:
------------------

GetUlongPtrFromAddress: unable to read from fffff80003ab2300

KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 1

Key : Analysis.Elapsed.Sec
Value: 1

Key : Analysis.Memory.CommitPeak.Mb
Value: 62


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700

SYSTEM_MANUFACTURER: Hewlett-Packard

SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC

SYSTEM_SKU: J4T62EA#AB8

SYSTEM_VERSION: 0991100000000000000600087

BIOS_VENDOR: Insyde

BIOS_VERSION: F.43

BIOS_DATE: 12/19/2017

BASEBOARD_MANUFACTURER: Hewlett-Packard

BASEBOARD_PRODUCT: 2211

BASEBOARD_VERSION: 86.56

DUMP_TYPE: 2

BUGCHECK_P1: fffff8a006be8c34

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff80003afb730

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80003ab2100
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff80003ab22f0
GetUlongPtrFromAddress: unable to read from fffff80003ab24a8
GetPointerFromAddress: unable to read from fffff80003ab20d8
fffff8a006be8c34 Paged pool

CURRENT_IRQL: 2

FAULTING_IP:
nt!CmpFindValueByNameFromCache+e0
fffff800`03afb730 428b14b8 mov edx,dword ptr [rax+r15*4]

CPU_COUNT: 4

CPU_MHZ: 6a0

CPU_VENDOR: GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 45

CPU_STEPPING: 1

CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init)

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT

BUGCHECK_STR: 0xA

PROCESS_NAME: System

ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5

ANALYSIS_SESSION_TIME: 06-17-2019 20:48:30.0482

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

TRAP_FRAME:  fffff80004c21990 -- (.trap 0xfffff80004c21990)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8a006be8c34 rbx=0000000000000000 rcx=0000000000000000
rdx=00000000ffffffff rsi=0000000000000000 rdi=0000000000000000
rip=fffff80003afb730 rsp=fffff80004c21b20 rbp=fffff80004c21ff0
r8=fffff8a00004ad40 r9=000000000000ffff r10=0000000000000001
r11=fffff80004c21dc8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!CmpFindValueByNameFromCache+0xe0:
fffff800`03afb730 428b14b8 mov edx,dword ptr [rax+r15*4] ds:fffff8a0`06be8c34=????????
Resetting default scope

LAST_CONTROL_TRANSFER: from fffff800038b6f69 to fffff800038a8ba0

STACK_TEXT:
fffff800`04c21848 fffff800`038b6f69 : 00000000`0000000a fffff8a0`06be8c34 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff800`04c21850 fffff800`038b4d88 : 00000000`00000000 fffff8a0`06be8c34 fffffa80`0a1a6000 fffff8a0`00024010 : nt!KiBugCheckDispatch+0x69
fffff800`04c21990 fffff800`03afb730 : fffff8a0`00024010 00000000`00c6ac30 fffff8a0`0004ad40 00000000`00000000 : nt!KiPageFault+0x448
fffff800`04c21b20 fffff800`03adec38 : fffff8a0`0e0d74a8 fffff800`04c21e18 fffff800`04c21c60 fffff800`04c21c48 : nt!CmpFindValueByNameFromCache+0xe0
fffff800`04c21bf0 fffff800`03cc11e7 : fffff8a0`0e0d74a8 01d50684`f67b3cde fffff8a0`0e0d74a8 00000000`00000000 : nt!CmpCompareNewValueDataAgainstKCBCache+0x78
fffff800`04c21c90 fffff800`03ae6531 : fffff8a0`01c5f710 fffff800`04c21e18 fffffa80`00000004 fffff800`04c22210 : nt!CmSetValueKey+0x6a7
fffff800`04c21dd0 fffff800`038b6bd3 : ffffffff`80002788 00000000`00000002 fffffa80`00000000 fffff800`00000004 : nt!NtSetValueKey+0x349
fffff800`04c21f00 fffff800`038ac3b0 : fffff800`03bfd2a2 fffff800`04c22248 fffff880`017a5152 00000000`c0000001 : nt!KiSystemServiceCopyEnd+0x13
fffff800`04c22108 fffff800`03bfd2a2 : fffff800`04c22248 fffff880`017a5152 00000000`c0000001 fffff800`04c22270 : nt!KiServiceLinkage
fffff800`04c22110 fffff880`017acd96 : 00000000`00000004 fffffa80`09b31af0 00000100`00000000 00000000`000007ff : nt!RtlWriteRegistryValue+0x62
fffff800`04c22170 fffff880`056a498d : fffff800`04c22270 fffff880`058b3c28 00000000`00000000 00000000`00000000 : ndis!NdisWriteConfiguration+0x156
fffff800`04c221d0 fffff800`04c22270 : fffff880`058b3c28 00000000`00000000 00000000`00000000 00000000`001801a9 : netr28x+0x4b98d
fffff800`04c221d8 fffff880`058b3c28 : 00000000`00000000 00000000`00000000 00000000`001801a9 fffffa80`05b821a0 : 0xfffff800`04c22270
fffff800`04c221e0 00000000`00000000 : 00000000`00000000 00000000`001801a9 fffffa80`05b821a0 00000000`00000000 : netr28x+0x25ac28


THREAD_SHA1_HASH_MOD_FUNC: 935105e89958188e75032d802c31088ef212f1d5

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 050e790aab7ddac4bfe73c42f1350165ef3ea549

THREAD_SHA1_HASH_MOD: 7921e317582c7f98a7f13cfbcd3c02a86fdcafec

FOLLOWUP_IP:
netr28x+4b98d
fffff880`056a498d ?? ???

SYMBOL_STACK_INDEX: b

SYMBOL_NAME: netr28x+4b98d

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: netr28x

IMAGE_NAME:  netr28x.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a

STACK_COMMAND: .thread ; .cxr ; kb

FAILURE_BUCKET_ID: X64_0xA_netr28x+4b98d

BUCKET_ID: X64_0xA_netr28x+4b98d

PRIMARY_PROBLEM_CLASS: X64_0xA_netr28x+4b98d

TARGET_TIME: 2019-05-09T16:33:41.000Z

OSBUILD: 7601

OSSERVICEPACK: 1000

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 7

OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2019-03-21 04:38:47

BUILDDATESTAMP_STR: 190320-1700

BUILDLAB_STR: win7sp1_ldr_escrow

BUILDOSVER_STR: 6.1.7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700

ANALYSIS_SESSION_ELAPSED_TIME: 716

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:x64_0xa_netr28x+4b98d

FAILURE_ID_HASH: {a6eb3f60-a5c3-0bd6-051c-41bf4427925d}

Followup: MachineOwner
---------

INVALID_PROCESS_ATTACH_ATTEMPT (5)
Arguments:
Arg1: fffffa80042b59b0
Arg2: fffffa80048376b0
Arg3: 0000000000000000
Arg4: 0000000000000001

Debugging Details:
------------------

GetUlongPtrFromAddress: unable to read from fffff8000309f300

KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 1

Key : Analysis.Elapsed.Sec
Value: 1

Key : Analysis.Memory.CommitPeak.Mb
Value: 62


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700

SYSTEM_MANUFACTURER: Hewlett-Packard

SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC

SYSTEM_SKU: J4T62EA#AB8

SYSTEM_VERSION: 0991100000000000000600087

BIOS_VENDOR: Insyde

BIOS_VERSION: F.43

BIOS_DATE: 12/19/2017

BASEBOARD_MANUFACTURER: Hewlett-Packard

BASEBOARD_PRODUCT: 2211

BASEBOARD_VERSION: 86.56

DUMP_TYPE: 2

BUGCHECK_P1: fffffa80042b59b0

BUGCHECK_P2: fffffa80048376b0

BUGCHECK_P3: 0

BUGCHECK_P4: 1

CPU_COUNT: 4

CPU_MHZ: 6a0

CPU_VENDOR: GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 45

CPU_STEPPING: 1

CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init)

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT

BUGCHECK_STR: 0x5

PROCESS_NAME: PointBlank.exe

CURRENT_IRQL: 2

ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5

ANALYSIS_SESSION_TIME: 06-17-2019 21:16:16.0171

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

DPC_STACK_BASE: FFFFF80000BA2FB0

LOCK_ADDRESS: fffff80003072240 -- (!locks fffff80003072240)
Cannot get _ERESOURCE type

Resource @ nt!PiEngineLock (0xfffff80003072240) Available
1 total locks

PNP_TRIAGE_DATA:
Lock address : 0xfffff80003072240
Thread Count : 0
Thread address: 0x0000000000000000
Thread wait : 0x0

LAST_CONTROL_TRANSFER: from fffff80002e445f2 to fffff80002e95ba0

STACK_TEXT:
fffff800`00ba1cc8 fffff800`02e445f2 : 00000000`00000005 fffffa80`042b59b0 fffffa80`048376b0 00000000`00000000 : nt!KeBugCheckEx
fffff800`00ba1cd0 fffff800`030ed127 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeStackAttachProcess+0x52
fffff800`00ba1d50 fffff800`030ed4bf : 00000000`00000000 fffff8a0`00000000 fffff8a0`00001910 00000000`00000000 : nt!ObpDecrementHandleCount+0x177
fffff800`00ba1dd0 fffff800`030ed1e4 : 00000000`00000c9c fffffa80`048376b0 fffff8a0`00001910 00000000`00000c9c : nt!ObpCloseHandleTableEntry+0xaf
fffff800`00ba1e60 fffff800`02ea3bd3 : fffffa80`04988060 fffff800`00ba1f30 fffff800`03157200 fffff800`030e376a : nt!ObpCloseHandle+0x94
fffff800`00ba1eb0 fffff800`02e993b0 : fffff800`03130d73 fffffa80`04e7d060 fffff800`03157200 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
fffff800`00ba2048 fffff800`03130d73 : fffffa80`04e7d060 fffff800`03157200 00000000`00000000 00000000`00000000 : nt!KiServiceLinkage
fffff800`00ba2050 fffff800`0313aa78 : fffffa80`04e7d060 00000000`00000001 fffffa80`04e386e0 00000000`00000000 : nt!PiGetDeviceRegistryProperty+0xab
fffff800`00ba21b0 fffff800`0312fa90 : fffffa80`04e7d060 fffffa80`04e7d060 00000000`00000000 00000000`00000000 : nt!IoGetDeviceProperty+0xbc
fffff800`00ba2290 fffff800`03140f51 : 00000000`ffff0000 fffffa80`08033990 fffff880`014d7110 fffffa80`05bfaf70 : nt!IopOpenOrCreateDeviceRegistryKey+0x14c
fffff800`00ba2450 fffff880`0151c152 : fffffa80`049479f0 fffff800`00ba25e0 fffffa80`06f64a78 00000000`000007ff : nt!IoOpenDeviceRegistryKey+0x11
fffff800`00ba2490 fffff880`01487b34 : fffff800`00ba25e0 fffff800`00ba25b8 fffffa80`05bf91a0 fffff880`0153221d : ndis!NdisOpenConfiguration+0xb2
fffff800`00ba24d0 fffff880`04eff94f : fffffa80`00000000 fffff800`00ba25e0 fffff880`0510ec28 00000000`00000000 : ndis!NdisOpenConfigurationEx+0xa4
fffff800`00ba2540 fffffa80`00000000 : fffff800`00ba25e0 fffff880`0510ec28 00000000`00000000 00000000`001801a9 : netr28x+0x4b94f
fffff800`00ba2548 fffff800`00ba25e0 : fffff880`0510ec28 00000000`00000000 00000000`001801a9 fffffa80`05bf91a0 : 0xfffffa80`00000000
fffff800`00ba2550 fffff880`0510ec28 : 00000000`00000000 00000000`001801a9 fffffa80`05bf91a0 fffffa80`00000000 : 0xfffff800`00ba25e0
fffff800`00ba2558 00000000`00000000 : 00000000`001801a9 fffffa80`05bf91a0 fffffa80`00000000 fffff880`04f0be2e : netr28x+0x25ac28


THREAD_SHA1_HASH_MOD_FUNC: 1764d353450a941fbc74295279ec02651c3d9814

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: bdc70d393af014c177e84e60c668cc911acaf71f

THREAD_SHA1_HASH_MOD: 9a9dca34541ae91666e3989df373f06b6e683623

FOLLOWUP_IP:
netr28x+4b94f
fffff880`04eff94f ?? ???

SYMBOL_STACK_INDEX: d

SYMBOL_NAME: netr28x+4b94f

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: netr28x

IMAGE_NAME:  netr28x.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a

STACK_COMMAND: .thread ; .cxr ; kb

FAILURE_BUCKET_ID: X64_0x5_netr28x+4b94f

BUCKET_ID: X64_0x5_netr28x+4b94f

PRIMARY_PROBLEM_CLASS: X64_0x5_netr28x+4b94f

TARGET_TIME: 2019-04-11T14:53:19.000Z

OSBUILD: 7601

OSSERVICEPACK: 1000

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 7

OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2019-03-06 05:38:53

BUILDDATESTAMP_STR: 190305-1700

BUILDLAB_STR: win7sp1_ldr_escrow

BUILDOSVER_STR: 6.1.7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700

ANALYSIS_SESSION_ELAPSED_TIME: 7ca

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:x64_0x5_netr28x+4b94f

FAILURE_ID_HASH: {43753b0b-e234-1a01-8468-7eed644d41ea}

Followup: MachineOwner
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff8a000e8ee98, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff800032e66fd, address which referenced memory

Debugging Details:
------------------

GetUlongPtrFromAddress: unable to read from fffff800032b2300

KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 1

Key : Analysis.Elapsed.Sec
Value: 1

Key : Analysis.Memory.CommitPeak.Mb
Value: 62


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700

SYSTEM_MANUFACTURER: Hewlett-Packard

SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC

SYSTEM_SKU: J4T62EA#AB8

SYSTEM_VERSION: 0991100000000000000600087

BIOS_VENDOR: Insyde

BIOS_VERSION: F.43

BIOS_DATE: 12/19/2017

BASEBOARD_MANUFACTURER: Hewlett-Packard

BASEBOARD_PRODUCT: 2211

BASEBOARD_VERSION: 86.56

DUMP_TYPE: 2

BUGCHECK_P1: fffff8a000e8ee98

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff800032e66fd

WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800032b2100
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff800032b22f0
GetUlongPtrFromAddress: unable to read from fffff800032b24a8
GetPointerFromAddress: unable to read from fffff800032b20d8
fffff8a000e8ee98 Paged pool

CURRENT_IRQL: 2

FAULTING_IP:
nt!HvpDoAllocateCell+101
fffff800`032e66fd 89443d00 mov dword ptr [rbp+rdi],eax

CPU_COUNT: 4

CPU_MHZ: 6a0

CPU_VENDOR: GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 45

CPU_STEPPING: 1

CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init)

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT

BUGCHECK_STR: 0xA

PROCESS_NAME: System

ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5

ANALYSIS_SESSION_TIME: 06-17-2019 21:16:26.0291

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

TRAP_FRAME:  fffff80004418950 -- (.trap 0xfffff80004418950)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000020 rbx=0000000000000000 rcx=0000000000002e68
rdx=0000000000000006 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800032e66fd rsp=fffff80004418ae0 rbp=0000000000000030
r8=fffff8a000024010 r9=0000000000000005 r10=fffff8a000e8c000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!HvpDoAllocateCell+0x101:
fffff800`032e66fd 89443d00 mov dword ptr [rbp+rdi],eax ss:0018:00000000`00000030=????????
Resetting default scope

LAST_CONTROL_TRANSFER: from fffff800030b6f69 to fffff800030a8ba0

STACK_TEXT:
fffff800`04418808 fffff800`030b6f69 : 00000000`0000000a fffff8a0`00e8ee98 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff800`04418810 fffff800`030b4d88 : 00000000`00000001 fffff8a0`00e8ee98 00000000`00000000 fffff8a0`00024010 : nt!KiBugCheckDispatch+0x69
fffff800`04418950 fffff800`032e66fd : fffff8a0`00024010 fffff8a0`00024010 fffff8a0`0004b9a0 fffff800`00000000 : nt!KiPageFault+0x448
fffff800`04418ae0 fffff800`03328d1d : fffff8a0`00024010 00000000`00000000 00000000`00000000 00000000`ffffffff : nt!HvpDoAllocateCell+0x101
fffff800`04418b40 fffff800`03328bad : 00000000`00000000 fffff8a0`00ff0c30 00000000`00000008 fffff800`03316d5c : nt!HvAllocateCell+0x55
fffff800`04418b70 fffff800`032db4bf : fffff8a0`00024010 fffff8a0`00024010 fffff8a0`00ffe640 fffff800`04418e18 : nt!CmpAddValueKeyNew+0x69
fffff800`04418c40 fffff800`034c16e3 : 01d4fd21`140179ca fffff800`04418ff0 fffff8a0`050bd948 00000000`00000000 : nt!CmpSetValueKeyNew+0x77
fffff800`04418c90 fffff800`032e6531 : fffff8a0`0df75fa0 fffff800`04418e18 fffffa80`00000004 fffff800`04419210 : nt!CmSetValueKey+0xba3
fffff800`04418dd0 fffff800`030b6bd3 : ffffffff`80000ab0 00000000`00000002 fffffa80`00000000 fffff800`00000004 : nt!NtSetValueKey+0x349
fffff800`04418f00 fffff800`030ac3b0 : fffff800`033fd2a2 fffff800`04419248 fffff880`014a9152 fffffa80`051e12f0 : nt!KiSystemServiceCopyEnd+0x13
fffff800`04419108 fffff800`033fd2a2 : fffff800`04419248 fffff880`014a9152 fffffa80`051e12f0 fffff800`04419270 : nt!KiServiceLinkage
fffff800`04419110 fffff880`014b0d96 : 00000000`00000004 fffffa80`0855a220 00000000`ffffffff 00000000`000007ff : nt!RtlWriteRegistryValue+0x62
fffff800`04419170 fffff880`04eef98d : fffff800`04419270 fffff880`050fec28 00000000`00000000 00000000`00000000 : ndis!NdisWriteConfiguration+0x156
fffff800`044191d0 fffff800`04419270 : fffff880`050fec28 00000000`00000000 00000000`00000000 fffff800`001801a9 : netr28x+0x4b98d
fffff800`044191d8 fffff880`050fec28 : 00000000`00000000 00000000`00000000 fffff800`001801a9 fffffa80`05be11a0 : 0xfffff800`04419270
fffff800`044191e0 00000000`00000000 : 00000000`00000000 fffff800`001801a9 fffffa80`05be11a0 fffff800`00000000 : netr28x+0x25ac28


THREAD_SHA1_HASH_MOD_FUNC: 80858fdf941bd645ff48b6997b30f63ac59926fb

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 394aafee51f76470053fa2102b9df0f0f7df42a3

THREAD_SHA1_HASH_MOD: 5d50876435db08b990ce5928fe5c90526c26b16c

FOLLOWUP_IP:
netr28x+4b98d
fffff880`04eef98d ?? ???

SYMBOL_STACK_INDEX: d

SYMBOL_NAME: netr28x+4b98d

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: netr28x

IMAGE_NAME:  netr28x.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a

STACK_COMMAND: .thread ; .cxr ; kb

FAILURE_BUCKET_ID: X64_0xA_netr28x+4b98d

BUCKET_ID: X64_0xA_netr28x+4b98d

PRIMARY_PROBLEM_CLASS: X64_0xA_netr28x+4b98d

TARGET_TIME: 2019-04-27T17:46:01.000Z

OSBUILD: 7601

OSSERVICEPACK: 1000

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 7

OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2019-03-21 04:38:47

BUILDDATESTAMP_STR: 190320-1700

BUILDLAB_STR: win7sp1_ldr_escrow

BUILDOSVER_STR: 6.1.7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700

ANALYSIS_SESSION_ELAPSED_TIME: 720

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:x64_0xa_netr28x+4b98d

FAILURE_ID_HASH: {a6eb3f60-a5c3-0bd6-051c-41bf4427925d}

Followup: MachineOwner
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff8a000b0b260, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff800032d1738, address which referenced memory

Debugging Details:
------------------

GetUlongPtrFromAddress: unable to read from fffff8000329d300

KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 1

Key : Analysis.Elapsed.Sec
Value: 1

Key : Analysis.Memory.CommitPeak.Mb
Value: 62


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700

SYSTEM_MANUFACTURER: Hewlett-Packard

SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC

SYSTEM_SKU: J4T62EA#AB8

SYSTEM_VERSION: 0991100000000000000600087

BIOS_VENDOR: Insyde

BIOS_VERSION: F.43

BIOS_DATE: 12/19/2017

BASEBOARD_MANUFACTURER: Hewlett-Packard

BASEBOARD_PRODUCT: 2211

BASEBOARD_VERSION: 86.56

DUMP_TYPE: 2

BUGCHECK_P1: fffff8a000b0b260

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff800032d1738

WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff8000329d100
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff8000329d2f0
GetUlongPtrFromAddress: unable to read from fffff8000329d4a8
GetPointerFromAddress: unable to read from fffff8000329d0d8
fffff8a000b0b260 Paged pool

CURRENT_IRQL: 2

FAULTING_IP:
nt!HvpDoAllocateCell+13c
fffff800`032d1738 8907 mov dword ptr [rdi],eax

CPU_COUNT: 4

CPU_MHZ: 6a0

CPU_VENDOR: GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 45

CPU_STEPPING: 1

CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init)

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT

BUGCHECK_STR: 0xA

PROCESS_NAME: System

ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5

ANALYSIS_SESSION_TIME: 06-17-2019 21:16:23.0541

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

TRAP_FRAME:  fffff80000b9b950 -- (.trap 0xfffff80000b9b950)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000ffffffd0 rbx=0000000000000000 rcx=000000000000000c
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800032d1738 rsp=fffff80000b9bae0 rbp=0000000000000030
r8=fffff8a0000512e0 r9=0000000000000005 r10=000000000000023b
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe cy
nt!HvpDoAllocateCell+0x13c:
fffff800`032d1738 8907 mov dword ptr [rdi],eax ds:00000000`00000000=????????
Resetting default scope

LAST_CONTROL_TRANSFER: from fffff800030a1f69 to fffff80003093ba0

STACK_TEXT:
fffff800`00b9b808 fffff800`030a1f69 : 00000000`0000000a fffff8a0`00b0b260 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff800`00b9b810 fffff800`0309fd88 : 00000000`00000001 fffff8a0`00b0b260 00000000`00000000 fffff8a0`00024010 : nt!KiBugCheckDispatch+0x69
fffff800`00b9b950 fffff800`032d1738 : fffff8a0`00024010 fffff8a0`00024010 fffff8a0`000512e0 fffff800`00000000 : nt!KiPageFault+0x448
fffff800`00b9bae0 fffff800`03313d0d : fffff8a0`00024010 00000000`00000000 00000000`00000000 00000000`ffffffff : nt!HvpDoAllocateCell+0x13c
fffff800`00b9bb40 fffff800`03313b9d : 00000000`00000000 fffff8a0`00f38c30 00000000`00000008 fffff800`03301d5c : nt!HvAllocateCell+0x55
fffff800`00b9bb70 fffff800`032c64bf : fffff8a0`00024010 fffff8a0`00024010 fffff8a0`00f46640 fffff800`00b9be18 : nt!CmpAddValueKeyNew+0x69
fffff800`00b9bc40 fffff800`034ac6a3 : 01d4f07a`dd071b78 fffff800`00b9bff0 fffff8a0`04a444a8 00000000`00000000 : nt!CmpSetValueKeyNew+0x77
fffff800`00b9bc90 fffff800`032d1531 : fffff8a0`09c3f770 fffff800`00b9be18 fffffa80`00000004 fffff800`00b9c210 : nt!CmSetValueKey+0xba3
fffff800`00b9bdd0 fffff800`030a1bd3 : ffffffff`80000b54 00000000`00000002 fffffa80`00000000 fffff800`00000004 : nt!NtSetValueKey+0x349
fffff800`00b9bf00 fffff800`030973b0 : fffff800`033e8272 fffff800`00b9c248 fffff880`0151b152 fffffa80`074a45f0 : nt!KiSystemServiceCopyEnd+0x13
fffff800`00b9c108 fffff800`033e8272 : fffff800`00b9c248 fffff880`0151b152 fffffa80`074a45f0 fffff800`00b9c270 : nt!KiServiceLinkage
fffff800`00b9c110 fffff880`01522d96 : 00000000`00000004 fffffa80`05970b70 fffff800`03210800 00000000`000007ff : nt!RtlWriteRegistryValue+0x62
fffff800`00b9c170 fffff880`04eef98d : fffff800`00b9c270 fffff880`050fec28 00000000`00000000 00000000`00000000 : ndis!NdisWriteConfiguration+0x156
fffff800`00b9c1d0 fffff800`00b9c270 : fffff880`050fec28 00000000`00000000 00000000`00000000 fffffa80`001801a9 : netr28x+0x4b98d
fffff800`00b9c1d8 fffff880`050fec28 : 00000000`00000000 00000000`00000000 fffffa80`001801a9 fffffa80`05b741a0 : 0xfffff800`00b9c270
fffff800`00b9c1e0 00000000`00000000 : 00000000`00000000 fffffa80`001801a9 fffffa80`05b741a0 00000000`00000000 : netr28x+0x25ac28


THREAD_SHA1_HASH_MOD_FUNC: 80858fdf941bd645ff48b6997b30f63ac59926fb

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 60ef2d8b5c8aa9ab3d61fd3d0f87c6db127d6016

THREAD_SHA1_HASH_MOD: 5d50876435db08b990ce5928fe5c90526c26b16c

FOLLOWUP_IP:
netr28x+4b98d
fffff880`04eef98d ?? ???

SYMBOL_STACK_INDEX: d

SYMBOL_NAME: netr28x+4b98d

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: netr28x

IMAGE_NAME:  netr28x.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a

STACK_COMMAND: .thread ; .cxr ; kb

FAILURE_BUCKET_ID: X64_0xA_netr28x+4b98d

BUCKET_ID: X64_0xA_netr28x+4b98d

PRIMARY_PROBLEM_CLASS: X64_0xA_netr28x+4b98d

TARGET_TIME: 2019-04-11T15:25:58.000Z

OSBUILD: 7601

OSSERVICEPACK: 1000

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 7

OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2019-03-06 05:38:53

BUILDDATESTAMP_STR: 190305-1700

BUILDLAB_STR: win7sp1_ldr_escrow

BUILDOSVER_STR: 6.1.7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700

ANALYSIS_SESSION_ELAPSED_TIME: 7b6

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:x64_0xa_netr28x+4b98d

FAILURE_ID_HASH: {a6eb3f60-a5c3-0bd6-051c-41bf4427925d}

Followup: MachineOwner
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff8a0067d0004, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff800032dccfe, address which referenced memory

Debugging Details:
------------------

GetUlongPtrFromAddress: unable to read from fffff800032a8300

KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 1

Key : Analysis.Elapsed.Sec
Value: 1

Key : Analysis.Memory.CommitPeak.Mb
Value: 62


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700

SYSTEM_MANUFACTURER: Hewlett-Packard

SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC

SYSTEM_SKU: J4T62EA#AB8

SYSTEM_VERSION: 0991100000000000000600087

BIOS_VENDOR: Insyde

BIOS_VERSION: F.43

BIOS_DATE: 12/19/2017

BASEBOARD_MANUFACTURER: Hewlett-Packard

BASEBOARD_PRODUCT: 2211

BASEBOARD_VERSION: 86.56

DUMP_TYPE: 2

BUGCHECK_P1: fffff8a0067d0004

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff800032dccfe

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800032a8100
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff800032a82f0
GetUlongPtrFromAddress: unable to read from fffff800032a84a8
GetPointerFromAddress: unable to read from fffff800032a80d8
fffff8a0067d0004 Paged pool

CURRENT_IRQL: 2

FAULTING_IP:
nt!HvpScanForFreeCellInViewWindow+16a
fffff800`032dccfe 8b4804 mov ecx,dword ptr [rax+4]

CPU_COUNT: 4

CPU_MHZ: 6a0

CPU_VENDOR: GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 45

CPU_STEPPING: 1

CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init)

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT

BUGCHECK_STR: 0xA

PROCESS_NAME: System

ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5

ANALYSIS_SESSION_TIME: 06-17-2019 21:16:21.0060

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

TRAP_FRAME:  fffff80004421860 -- (.trap 0xfffff80004421860)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8a0067d0000 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000683000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800032dccfe rsp=fffff800044219f0 rbp=0000000000000683
r8=0000000000000083 r9=0000000000000000 r10=fffff8000300b000
r11=0000000000000006 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!HvpScanForFreeCellInViewWindow+0x16a:
fffff800`032dccfe 8b4804 mov ecx,dword ptr [rax+4] ds:fffff8a0`067d0004=00683000
Resetting default scope

LAST_CONTROL_TRANSFER: from fffff800030acf69 to fffff8000309eba0

STACK_TEXT:
fffff800`04421718 fffff800`030acf69 : 00000000`0000000a fffff8a0`067d0004 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff800`04421720 fffff800`030aad88 : 00000000`00000000 fffff8a0`067d0004 fffff800`031ff100 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff800`04421860 fffff800`032dccfe : 00000000`00000000 00000000`003fe000 00000000`00001000 00000000`00000000 : nt!KiPageFault+0x448
fffff800`044219f0 fffff800`032dcb0a : fffff800`00683000 fffff800`00000011 00000000`00000030 fffff800`00000000 : nt!HvpScanForFreeCellInViewWindow+0x16a
fffff800`04421a70 fffff800`032dc66e : 00000000`00000030 fffff800`00000005 ffffffff`00000030 fffff800`00000000 : nt!HvpFindFreeCell+0x1ba
fffff800`04421ae0 fffff800`0331ed1d : fffff8a0`00024010 00000000`00000000 00000000`00000000 00000000`ffffffff : nt!HvpDoAllocateCell+0x72
fffff800`04421b40 fffff800`0331ebad : 00000000`00000000 fffff8a0`061e8c30 00000000`00000008 fffff800`0330cd5c : nt!HvAllocateCell+0x55
fffff800`04421b70 fffff800`032d14bf : fffff8a0`00024010 fffff8a0`00024010 fffff8a0`061f6640 fffff800`04421e18 : nt!CmpAddValueKeyNew+0x69
fffff800`04421c40 fffff800`034b76e3 : 01d4f848`5814f677 fffff800`04421ff0 fffff8a0`02c84b98 00000000`00000000 : nt!CmpSetValueKeyNew+0x77
fffff800`04421c90 fffff800`032dc531 : fffff8a0`04cbac70 fffff800`04421e18 fffffa80`00000004 fffff800`04422210 : nt!CmSetValueKey+0xba3
fffff800`04421dd0 fffff800`030acbd3 : ffffffff`80000de8 00000000`00000002 fffffa80`00000000 fffff800`00000004 : nt!NtSetValueKey+0x349
fffff800`04421f00 fffff800`030a23b0 : fffff800`033f32a2 fffff800`04422248 fffff880`01725152 fffffa80`00000000 : nt!KiSystemServiceCopyEnd+0x13
fffff800`04422108 fffff800`033f32a2 : fffff800`04422248 fffff880`01725152 fffffa80`00000000 fffff800`04422270 : nt!KiServiceLinkage
fffff800`04422110 fffff880`0172cd96 : 00000000`00000004 fffffa80`05d89cd0 fffff800`04422200 00000000`000007ff : nt!RtlWriteRegistryValue+0x62
fffff800`04422170 fffff880`0510f98d : fffff800`04422270 fffff880`0531ec28 00000000`00000000 00000000`00000000 : ndis!NdisWriteConfiguration+0x156
fffff800`044221d0 fffff800`04422270 : fffff880`0531ec28 00000000`00000000 00000000`00000000 fffff880`001801a9 : netr28x+0x4b98d
fffff800`044221d8 fffff880`0531ec28 : 00000000`00000000 00000000`00000000 fffff880`001801a9 fffffa80`05b701a0 : 0xfffff800`04422270
fffff800`044221e0 00000000`00000000 : 00000000`00000000 fffff880`001801a9 fffffa80`05b701a0 0000000e`00000000 : netr28x+0x25ac28


THREAD_SHA1_HASH_MOD_FUNC: a2c5409ed52347576830e095aabe2e20325151e5

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: cf883ff24fbd42e0f8dd5b2bf40fd2071e6cd531

THREAD_SHA1_HASH_MOD: 56bd18a7fabf3c16adac1e3911e9aab0524685a1

FOLLOWUP_IP:
netr28x+4b98d
fffff880`0510f98d ?? ???

SYMBOL_STACK_INDEX: f

SYMBOL_NAME: netr28x+4b98d

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: netr28x

IMAGE_NAME:  netr28x.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a

STACK_COMMAND: .thread ; .cxr ; kb

FAILURE_BUCKET_ID: X64_0xA_netr28x+4b98d

BUCKET_ID: X64_0xA_netr28x+4b98d

PRIMARY_PROBLEM_CLASS: X64_0xA_netr28x+4b98d

TARGET_TIME: 2019-04-21T13:44:29.000Z

OSBUILD: 7601

OSSERVICEPACK: 1000

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 7

OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2019-03-21 04:38:47

BUILDDATESTAMP_STR: 190320-1700

BUILDLAB_STR: win7sp1_ldr_escrow

BUILDOSVER_STR: 6.1.7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700

ANALYSIS_SESSION_ELAPSED_TIME: 704

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:x64_0xa_netr28x+4b98d

FAILURE_ID_HASH: {a6eb3f60-a5c3-0bd6-051c-41bf4427925d}

Followup: MachineOwner
---------

0: kd> lmvm netr28x
start end module name
fffff880`050c4000 fffff880`0532e000 netr28x T (no symbols)
Loaded symbol image file: netr28x.sys
Image path: \SystemRoot\system32\DRIVERS\netr28x.sys
Image name: netr28x.sys
Timestamp: Mon Apr 20 03:22:50 2015 (5534D37A)
CheckSum: 0026BF4B
ImageSize: 0026A000
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4
    Information from resource tables:
5
Win
Soruna netr28x.sys sebep oluyor. Bu da Ralink 802.11 WiFi sürücüsüdür. Sürücüyü güncelle. Güncellemeyi bilmiyorsan Windows 10'a geç. 7 için destek vermiyoruz.

Kod:
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff8a000d9e618, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff800033386fd, address which referenced memory

Debugging Details:
------------------

GetUlongPtrFromAddress: unable to read from fffff80003304300

KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 1

Key : Analysis.Elapsed.Sec
Value: 1

Key : Analysis.Memory.CommitPeak.Mb
Value: 62


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700

SYSTEM_MANUFACTURER: Hewlett-Packard

SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC

SYSTEM_SKU: J4T62EA#AB8

SYSTEM_VERSION: 0991100000000000000600087

BIOS_VENDOR: Insyde

BIOS_VERSION: F.43

BIOS_DATE: 12/19/2017

BASEBOARD_MANUFACTURER: Hewlett-Packard

BASEBOARD_PRODUCT: 2211

BASEBOARD_VERSION: 86.56

DUMP_TYPE: 2

BUGCHECK_P1: fffff8a000d9e618

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff800033386fd

WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80003304100
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff800033042f0
GetUlongPtrFromAddress: unable to read from fffff800033044a8
GetPointerFromAddress: unable to read from fffff800033040d8
fffff8a000d9e618 Paged pool

CURRENT_IRQL: 2

FAULTING_IP:
nt!HvpDoAllocateCell+101
fffff800`033386fd 89443d00 mov dword ptr [rbp+rdi],eax

CPU_COUNT: 4

CPU_MHZ: 6a0

CPU_VENDOR: GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 45

CPU_STEPPING: 1

CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init)

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT

BUGCHECK_STR: 0xA

PROCESS_NAME: System

ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5

ANALYSIS_SESSION_TIME: 06-17-2019 20:48:20.0473

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

TRAP_FRAME:  fffff80004423950 -- (.trap 0xfffff80004423950)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000000039e8 rbx=0000000000000000 rcx=00000000000005e8
rdx=0000000000000008 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800033386fd rsp=fffff80004423ae0 rbp=0000000000000030
r8=fffff8a000024010 r9=0000000000000005 r10=fffff8a000d9e000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!HvpDoAllocateCell+0x101:
fffff800`033386fd 89443d00 mov dword ptr [rbp+rdi],eax ss:0018:00000000`00000030=????????
Resetting default scope

LAST_CONTROL_TRANSFER: from fffff80003108f69 to fffff800030faba0

STACK_TEXT:
fffff800`04423808 fffff800`03108f69 : 00000000`0000000a fffff8a0`00d9e618 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff800`04423810 fffff800`03106d88 : 00000000`00000001 fffff8a0`00d9e618 00000000`00000000 fffff8a0`00024010 : nt!KiBugCheckDispatch+0x69
fffff800`04423950 fffff800`033386fd : fffff8a0`00024010 fffff8a0`00024010 fffff8a0`00053ae0 00000000`00000000 : nt!KiPageFault+0x448
fffff800`04423ae0 fffff800`0337ad0d : fffff8a0`00024010 00000000`00000000 00000000`00000000 00000000`ffffffff : nt!HvpDoAllocateCell+0x101
fffff800`04423b40 fffff800`0337ab9d : 00000000`00000000 fffff8a0`05585c30 00000000`00000008 fffff800`03368d5c : nt!HvAllocateCell+0x55
fffff800`04423b70 fffff800`0332d4bf : fffff8a0`00024010 fffff8a0`00024010 fffff8a0`05593640 fffff800`04423e18 : nt!CmpAddValueKeyNew+0x69
fffff800`04423c40 fffff800`035136a3 : 01d4f094`f66bc44b fffff800`04423ff0 fffff8a0`0085fa70 00000000`00000000 : nt!CmpSetValueKeyNew+0x77
fffff800`04423c90 fffff800`03338531 : fffff8a0`14bbfca0 fffff800`04423e18 fffffa80`00000004 fffff800`04424210 : nt!CmSetValueKey+0xba3
fffff800`04423dd0 fffff800`03108bd3 : ffffffff`80000bec 00000000`00000002 fffffa80`00000000 fffff800`00000004 : nt!NtSetValueKey+0x349
fffff800`04423f00 fffff800`030fe3b0 : fffff800`0344f272 fffff800`04424248 fffff880`014b9152 00000000`539f0000 : nt!KiSystemServiceCopyEnd+0x13
fffff800`04424108 fffff800`0344f272 : fffff800`04424248 fffff880`014b9152 00000000`539f0000 fffff800`04424270 : nt!KiServiceLinkage
fffff800`04424110 fffff880`014c0d96 : 00000000`00000004 fffffa80`071c5250 00000000`00000000 00000000`000007ff : nt!RtlWriteRegistryValue+0x62
fffff800`04424170 fffff880`04f2698d : fffff800`04424270 fffff880`05135c28 00000000`00000000 00000000`00000000 : ndis!NdisWriteConfiguration+0x156
fffff800`044241d0 fffff800`04424270 : fffff880`05135c28 00000000`00000000 00000000`00000000 fffff800`001801a9 : netr28x+0x4b98d
fffff800`044241d8 fffff880`05135c28 : 00000000`00000000 00000000`00000000 fffff800`001801a9 fffffa80`059cb1a0 : 0xfffff800`04424270
fffff800`044241e0 00000000`00000000 : 00000000`00000000 fffff800`001801a9 fffffa80`059cb1a0 fffff800`00000000 : netr28x+0x25ac28


THREAD_SHA1_HASH_MOD_FUNC: 80858fdf941bd645ff48b6997b30f63ac59926fb

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 394aafee51f76470053fa2102b9df0f0f7df42a3

THREAD_SHA1_HASH_MOD: 5d50876435db08b990ce5928fe5c90526c26b16c

FOLLOWUP_IP:
netr28x+4b98d
fffff880`04f2698d ?? ???

SYMBOL_STACK_INDEX: d

SYMBOL_NAME: netr28x+4b98d

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: netr28x

IMAGE_NAME:  netr28x.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a

STACK_COMMAND: .thread ; .cxr ; kb

FAILURE_BUCKET_ID: X64_0xA_netr28x+4b98d

BUCKET_ID: X64_0xA_netr28x+4b98d

PRIMARY_PROBLEM_CLASS: X64_0xA_netr28x+4b98d

TARGET_TIME: 2019-04-11T18:32:48.000Z

OSBUILD: 7601

OSSERVICEPACK: 1000

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 7

OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2019-03-06 05:38:53

BUILDDATESTAMP_STR: 190305-1700

BUILDLAB_STR: win7sp1_ldr_escrow

BUILDOSVER_STR: 6.1.7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700

ANALYSIS_SESSION_ELAPSED_TIME: 7ae

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:x64_0xa_netr28x+4b98d

FAILURE_ID_HASH: {a6eb3f60-a5c3-0bd6-051c-41bf4427925d}

Followup: MachineOwner
---------


INVALID_PROCESS_ATTACH_ATTEMPT (5)
Arguments:
Arg1: fffffa80042b49b0
Arg2: fffffa80050a0160
Arg3: 0000000000000000
Arg4: 0000000000000001

Debugging Details:
------------------

GetUlongPtrFromAddress: unable to read from fffff800032a0300

KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 2

Key : Analysis.Elapsed.Sec
Value: 2

Key : Analysis.Memory.CommitPeak.Mb
Value: 62


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700

SYSTEM_MANUFACTURER: Hewlett-Packard

SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC

SYSTEM_SKU: J4T62EA#AB8

SYSTEM_VERSION: 0991100000000000000600087

BIOS_VENDOR: Insyde

BIOS_VERSION: F.43

BIOS_DATE: 12/19/2017

BASEBOARD_MANUFACTURER: Hewlett-Packard

BASEBOARD_PRODUCT: 2211

BASEBOARD_VERSION: 86.56

DUMP_TYPE: 2

BUGCHECK_P1: fffffa80042b49b0

BUGCHECK_P2: fffffa80050a0160

BUGCHECK_P3: 0

BUGCHECK_P4: 1

CPU_COUNT: 4

CPU_MHZ: 6a0

CPU_VENDOR: GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 45

CPU_STEPPING: 1

CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init)

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT

BUGCHECK_STR: 0x5

PROCESS_NAME: PointBlank.exe

CURRENT_IRQL: 2

ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5

ANALYSIS_SESSION_TIME: 06-17-2019 20:57:04.0108

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

DPC_STACK_BASE: FFFFF80004428FB0

LOCK_ADDRESS: fffff80003273240 -- (!locks fffff80003273240)
Cannot get _ERESOURCE type

Resource @ nt!PiEngineLock (0xfffff80003273240) Available
1 total locks

PNP_TRIAGE_DATA:
Lock address : 0xfffff80003273240
Thread Count : 0
Thread address: 0x0000000000000000
Thread wait : 0x0

LAST_CONTROL_TRANSFER: from fffff80003045602 to fffff80003096ba0

STACK_TEXT:
fffff800`04427cc8 fffff800`03045602 : 00000000`00000005 fffffa80`042b49b0 fffffa80`050a0160 00000000`00000000 : nt!KeBugCheckEx
fffff800`04427cd0 fffff800`032ee127 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeStackAttachProcess+0x52
fffff800`04427d50 fffff800`032ee4bf : 00000000`00000000 fffff8a0`00000000 fffff8a0`00001910 00000000`00000000 : nt!ObpDecrementHandleCount+0x177
fffff800`04427dd0 fffff800`032ee1e4 : 00000000`00000d08 fffffa80`050a0160 fffff8a0`00001910 00000000`00000d08 : nt!ObpCloseHandleTableEntry+0xaf
fffff800`04427e60 fffff800`030a4bd3 : fffffa80`04b87b50 fffff800`04427f30 fffff800`03358230 fffff800`032e476a : nt!ObpCloseHandle+0x94
fffff800`04427eb0 fffff800`0309a3b0 : fffff800`03331da3 fffffa80`04ea4a10 fffff800`03358230 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
fffff800`04428048 fffff800`03331da3 : fffffa80`04ea4a10 fffff800`03358230 00000000`00000000 00000000`00000000 : nt!KiServiceLinkage
fffff800`04428050 fffff800`0333baa8 : fffffa80`04ea4a10 00000000`00000001 fffffa80`04ea2740 00000000`00000000 : nt!PiGetDeviceRegistryProperty+0xab
fffff800`044281b0 fffff800`03330ac0 : fffffa80`04ea4a10 fffffa80`04ea4a10 00000000`00000000 00000000`00000000 : nt!IoGetDeviceProperty+0xbc
fffff800`04428290 fffff800`03341f81 : 00000000`ffff0000 fffffa80`0802b150 fffff880`01553110 fffffa80`05bb6220 : nt!IopOpenOrCreateDeviceRegistryKey+0x14c
fffff800`04428450 fffff880`01598152 : 00000000`c0000001 fffff800`044285e0 00000000`00000000 00000000`000007ff : nt!IoOpenDeviceRegistryKey+0x11
fffff800`04428490 fffff880`01503b34 : fffff800`044285e0 fffff800`044285b8 fffffa80`05c461a0 fffff800`035e0000 : ndis!NdisOpenConfiguration+0xb2
fffff800`044284d0 fffff880`0508b94f : fffffa80`00000000 fffff800`044285e0 fffff880`0529ac28 00000000`00000000 : ndis!NdisOpenConfigurationEx+0xa4
fffff800`04428540 fffffa80`00000000 : fffff800`044285e0 fffff880`0529ac28 00000000`00000000 00000000`001801a9 : netr28x+0x4b94f
fffff800`04428548 fffff800`044285e0 : fffff880`0529ac28 00000000`00000000 00000000`001801a9 fffffa80`05c461a0 : 0xfffffa80`00000000
fffff800`04428550 fffff880`0529ac28 : 00000000`00000000 00000000`001801a9 fffffa80`05c461a0 00000000`00000000 : 0xfffff800`044285e0
fffff800`04428558 00000000`00000000 : 00000000`001801a9 fffffa80`05c461a0 00000000`00000000 fffffa80`0742b540 : netr28x+0x25ac28


THREAD_SHA1_HASH_MOD_FUNC: 1764d353450a941fbc74295279ec02651c3d9814

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: bdc70d393af014c177e84e60c668cc911acaf71f

THREAD_SHA1_HASH_MOD: 9a9dca34541ae91666e3989df373f06b6e683623

FOLLOWUP_IP:
netr28x+4b94f
fffff880`0508b94f ?? ???

SYMBOL_STACK_INDEX: d

SYMBOL_NAME: netr28x+4b94f

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: netr28x

IMAGE_NAME:  netr28x.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a

STACK_COMMAND: .thread ; .cxr ; kb

FAILURE_BUCKET_ID: X64_0x5_netr28x+4b94f

BUCKET_ID: X64_0x5_netr28x+4b94f

PRIMARY_PROBLEM_CLASS: X64_0x5_netr28x+4b94f

TARGET_TIME: 2019-05-01T21:53:50.000Z

OSBUILD: 7601

OSSERVICEPACK: 1000

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 7

OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2019-03-21 04:38:47

BUILDDATESTAMP_STR: 190320-1700

BUILDLAB_STR: win7sp1_ldr_escrow

BUILDOSVER_STR: 6.1.7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700

ANALYSIS_SESSION_ELAPSED_TIME: 8cb

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:x64_0x5_netr28x+4b94f

FAILURE_ID_HASH: {43753b0b-e234-1a01-8468-7eed644d41ea}

Followup:     MachineOwner
INVALID_PROCESS_ATTACH_ATTEMPT (5)
Arguments:
Arg1: fffffa80042ce9b0
Arg2: fffffa8005d11370
Arg3: 0000000000000000
Arg4: 0000000000000001

Debugging Details:
------------------

GetUlongPtrFromAddress: unable to read from fffff800032b3300

KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 2

Key : Analysis.Elapsed.Sec
Value: 2

Key : Analysis.Memory.CommitPeak.Mb
Value: 62


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700

SYSTEM_MANUFACTURER: Hewlett-Packard

SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC

SYSTEM_SKU: J4T62EA#AB8

SYSTEM_VERSION: 0991100000000000000600087

BIOS_VENDOR: Insyde

BIOS_VERSION: F.43

BIOS_DATE: 12/19/2017

BASEBOARD_MANUFACTURER: Hewlett-Packard

BASEBOARD_PRODUCT: 2211

BASEBOARD_VERSION: 86.56

DUMP_TYPE: 2

BUGCHECK_P1: fffffa80042ce9b0

BUGCHECK_P2: fffffa8005d11370

BUGCHECK_P3: 0

BUGCHECK_P4: 1

CPU_COUNT: 4

CPU_MHZ: 6a0

CPU_VENDOR: GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 45

CPU_STEPPING: 1

CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init)

CUSTOMER_CRASH_COUNT: 2

DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT

BUGCHECK_STR: 0x5

PROCESS_NAME: audiodg.exe

CURRENT_IRQL: 2

ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5

ANALYSIS_SESSION_TIME: 06-17-2019 20:49:02.0621

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

DPC_STACK_BASE: FFFFF80000BA2FB0

LOCK_ADDRESS: fffff80003286240 -- (!locks fffff80003286240)
Cannot get _ERESOURCE type

Resource @ nt!PiEngineLock (0xfffff80003286240) Available
1 total locks

PNP_TRIAGE_DATA:
Lock address : 0xfffff80003286240
Thread Count : 0
Thread address: 0x0000000000000000
Thread wait : 0x0

LAST_CONTROL_TRANSFER: from fffff80003058602 to fffff800030a9ba0

STACK_TEXT:
fffff800`00ba1cc8 fffff800`03058602 : 00000000`00000005 fffffa80`042ce9b0 fffffa80`05d11370 00000000`00000000 : nt!KeBugCheckEx
fffff800`00ba1cd0 fffff800`03301127 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeStackAttachProcess+0x52
fffff800`00ba1d50 fffff800`033014bf : 00000000`00000000 fffff8a0`00000000 fffff8a0`00001910 00000000`00000000 : nt!ObpDecrementHandleCount+0x177
fffff800`00ba1dd0 fffff800`033011e4 : 00000000`00000e48 fffffa80`05d11370 fffff8a0`00001910 00000000`00000e48 : nt!ObpCloseHandleTableEntry+0xaf
fffff800`00ba1e60 fffff800`030b7bd3 : fffffa80`05d7ba00 fffff800`00ba1f30 fffff800`0336b230 fffff800`032f776a : nt!ObpCloseHandle+0x94
fffff800`00ba1eb0 fffff800`030ad3b0 : fffff800`03344da3 fffffa80`04e9e060 fffff800`0336b230 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
fffff800`00ba2048 fffff800`03344da3 : fffffa80`04e9e060 fffff800`0336b230 00000000`00000000 00000000`00000000 : nt!KiServiceLinkage
fffff800`00ba2050 fffff800`0334eaa8 : fffffa80`04e9e060 00000000`00000001 fffffa80`04e9d6e0 00000000`00000000 : nt!PiGetDeviceRegistryProperty+0xab
fffff800`00ba21b0 fffff800`03343ac0 : fffffa80`04e9e060 fffffa80`04e9e060 00000000`00000000 00000000`00000000 : nt!IoGetDeviceProperty+0xbc
fffff800`00ba2290 fffff800`03354f81 : 00000000`ffff0000 fffffa80`05086440 fffff880`01482110 fffffa80`05b713f0 : nt!IopOpenOrCreateDeviceRegistryKey+0x14c
fffff800`00ba2450 fffff880`014c7152 : fffffa80`04a3fd50 fffff800`00ba25e0 fffffa80`05f48a78 00000000`000007ff : nt!IoOpenDeviceRegistryKey+0x11
fffff800`00ba2490 fffff880`01432b34 : fffff800`00ba25e0 fffff800`00ba25b8 fffffa80`05b6d1a0 fffff880`014dd21d : ndis!NdisOpenConfiguration+0xb2
fffff800`00ba24d0 fffff880`0512a94f : fffffa80`00000000 fffff800`00ba25e0 fffff880`05339c28 00000000`00000000 : ndis!NdisOpenConfigurationEx+0xa4
fffff800`00ba2540 fffffa80`00000000 : fffff800`00ba25e0 fffff880`05339c28 00000000`00000000 00000000`001801a9 : netr28x+0x4b94f
fffff800`00ba2548 fffff800`00ba25e0 : fffff880`05339c28 00000000`00000000 00000000`001801a9 fffffa80`05b6d1a0 : 0xfffffa80`00000000
fffff800`00ba2550 fffff880`05339c28 : 00000000`00000000 00000000`001801a9 fffffa80`05b6d1a0 fffffa80`00000000 : 0xfffff800`00ba25e0
fffff800`00ba2558 00000000`00000000 : 00000000`001801a9 fffffa80`05b6d1a0 fffffa80`00000000 fffff880`05136e2e : netr28x+0x25ac28


THREAD_SHA1_HASH_MOD_FUNC: 1764d353450a941fbc74295279ec02651c3d9814

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: bdc70d393af014c177e84e60c668cc911acaf71f

THREAD_SHA1_HASH_MOD: 9a9dca34541ae91666e3989df373f06b6e683623

FOLLOWUP_IP:
netr28x+4b94f
fffff880`0512a94f ?? ???

SYMBOL_STACK_INDEX: d

SYMBOL_NAME: netr28x+4b94f

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: netr28x

IMAGE_NAME:  netr28x.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a

STACK_COMMAND: .thread ; .cxr ; kb

FAILURE_BUCKET_ID: X64_0x5_netr28x+4b94f

BUCKET_ID: X64_0x5_netr28x+4b94f

PRIMARY_PROBLEM_CLASS: X64_0x5_netr28x+4b94f

TARGET_TIME: 2019-04-27T20:53:09.000Z

OSBUILD: 7601

OSSERVICEPACK: 1000

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 7

OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2019-03-21 04:38:47

BUILDDATESTAMP_STR: 190320-1700

BUILDLAB_STR: win7sp1_ldr_escrow

BUILDOSVER_STR: 6.1.7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700

ANALYSIS_SESSION_ELAPSED_TIME: 89c

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:x64_0x5_netr28x+4b94f

FAILURE_ID_HASH: {43753b0b-e234-1a01-8468-7eed644d41ea}

Followup: MachineOwner
---------

INVALID_PROCESS_ATTACH_ATTEMPT (5)
Arguments:
Arg1: fffffa80042b49b0
Arg2: fffffa8004ee55f0
Arg3: 0000000000000000
Arg4: 0000000000000001

Debugging Details:
------------------

GetUlongPtrFromAddress: unable to read from fffff800032b0300

KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 2

Key : Analysis.Elapsed.Sec
Value: 2

Key : Analysis.Memory.CommitPeak.Mb
Value: 62


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700

SYSTEM_MANUFACTURER: Hewlett-Packard

SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC

SYSTEM_SKU: J4T62EA#AB8

SYSTEM_VERSION: 0991100000000000000600087

BIOS_VENDOR: Insyde

BIOS_VERSION: F.43

BIOS_DATE: 12/19/2017

BASEBOARD_MANUFACTURER: Hewlett-Packard

BASEBOARD_PRODUCT: 2211

BASEBOARD_VERSION: 86.56

DUMP_TYPE: 2

BUGCHECK_P1: fffffa80042b49b0

BUGCHECK_P2: fffffa8004ee55f0

BUGCHECK_P3: 0

BUGCHECK_P4: 1

CPU_COUNT: 4

CPU_MHZ: 6a0

CPU_VENDOR: GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 45

CPU_STEPPING: 1

CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init)

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT

BUGCHECK_STR: 0x5

PROCESS_NAME: PointBlank.exe

CURRENT_IRQL: 2

ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5

ANALYSIS_SESSION_TIME: 06-17-2019 20:48:58.0829

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

DPC_STACK_BASE: FFFFF8000441FFB0

LOCK_ADDRESS: fffff80003283240 -- (!locks fffff80003283240)
Cannot get _ERESOURCE type

Resource @ nt!PiEngineLock (0xfffff80003283240) Available
1 total locks

PNP_TRIAGE_DATA:
Lock address : 0xfffff80003283240
Thread Count : 0
Thread address: 0x0000000000000000
Thread wait : 0x0

LAST_CONTROL_TRANSFER: from fffff80003055602 to fffff800030a6ba0

STACK_TEXT:
fffff800`0441ecc8 fffff800`03055602 : 00000000`00000005 fffffa80`042b49b0 fffffa80`04ee55f0 00000000`00000000 : nt!KeBugCheckEx
fffff800`0441ecd0 fffff800`032fe127 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeStackAttachProcess+0x52
fffff800`0441ed50 fffff800`032fe4bf : 00000000`00000000 fffff8a0`00000000 fffff8a0`00001910 00000000`00000000 : nt!ObpDecrementHandleCount+0x177
fffff800`0441edd0 fffff800`032fe1e4 : 00000000`00000a80 fffffa80`04ee55f0 fffff8a0`00001910 00000000`00000a80 : nt!ObpCloseHandleTableEntry+0xaf
fffff800`0441ee60 fffff800`030b4bd3 : fffffa80`0861e940 fffff800`0441ef30 fffff800`03368230 fffff800`032f476a : nt!ObpCloseHandle+0x94
fffff800`0441eeb0 fffff800`030aa3b0 : fffff800`03341da3 fffffa80`04d31a10 fffff800`03368230 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
fffff800`0441f048 fffff800`03341da3 : fffffa80`04d31a10 fffff800`03368230 00000000`00000000 00000000`00000000 : nt!KiServiceLinkage
fffff800`0441f050 fffff800`0334baa8 : fffffa80`04d31a10 00000000`00000001 fffffa80`04d2d740 00000000`00000000 : nt!PiGetDeviceRegistryProperty+0xab
fffff800`0441f1b0 fffff800`03340ac0 : fffffa80`04d31a10 fffffa80`04d31a10 00000000`00000000 00000000`00000000 : nt!IoGetDeviceProperty+0xbc
fffff800`0441f290 fffff800`03351f81 : 00000000`ffff0000 fffffa80`046a8bd0 fffff880`014c6110 fffffa80`05a70cf0 : nt!IopOpenOrCreateDeviceRegistryKey+0x14c
fffff800`0441f450 fffff880`0150b152 : fffffa80`07393890 fffff800`0441f5e0 00000000`0000001f 00000000`000007ff : nt!IoOpenDeviceRegistryKey+0x11
fffff800`0441f490 fffff880`01476b34 : fffff800`0441f5e0 fffff800`0441f5b8 fffffa80`05a6f1a0 fffff800`035f7be3 : ndis!NdisOpenConfiguration+0xb2
fffff800`0441f4d0 fffff880`04e7694f : fffffa80`00000000 fffff800`0441f5e0 fffff880`05085c28 00000000`00000000 : ndis!NdisOpenConfigurationEx+0xa4
fffff800`0441f540 fffffa80`00000000 : fffff800`0441f5e0 fffff880`05085c28 00000000`00000000 00000000`001801a9 : netr28x+0x4b94f
fffff800`0441f548 fffff800`0441f5e0 : fffff880`05085c28 00000000`00000000 00000000`001801a9 fffffa80`05a6f1a0 : 0xfffffa80`00000000
fffff800`0441f550 fffff880`05085c28 : 00000000`00000000 00000000`001801a9 fffffa80`05a6f1a0 00000000`00000000 : 0xfffff800`0441f5e0
fffff800`0441f558 00000000`00000000 : 00000000`001801a9 fffffa80`05a6f1a0 00000000`00000000 fffffa80`0452e670 : netr28x+0x25ac28


THREAD_SHA1_HASH_MOD_FUNC: 1764d353450a941fbc74295279ec02651c3d9814

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: bdc70d393af014c177e84e60c668cc911acaf71f

THREAD_SHA1_HASH_MOD: 9a9dca34541ae91666e3989df373f06b6e683623

FOLLOWUP_IP:
netr28x+4b94f
fffff880`04e7694f ?? ???

SYMBOL_STACK_INDEX: d

SYMBOL_NAME: netr28x+4b94f

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: netr28x

IMAGE_NAME:  netr28x.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a

STACK_COMMAND: .thread ; .cxr ; kb

FAILURE_BUCKET_ID: X64_0x5_netr28x+4b94f

BUCKET_ID: X64_0x5_netr28x+4b94f

PRIMARY_PROBLEM_CLASS: X64_0x5_netr28x+4b94f

TARGET_TIME: 2019-04-21T09:57:22.000Z

OSBUILD: 7601

OSSERVICEPACK: 1000

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 7

OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2019-03-21 04:38:47

BUILDDATESTAMP_STR: 190320-1700

BUILDLAB_STR: win7sp1_ldr_escrow

BUILDOSVER_STR: 6.1.7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700

ANALYSIS_SESSION_ELAPSED_TIME: 8dc

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:x64_0x5_netr28x+4b94f

FAILURE_ID_HASH: {43753b0b-e234-1a01-8468-7eed644d41ea}

Followup: MachineOwner
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff8a000f95c5c, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8000334077c, address which referenced memory

Debugging Details:
------------------

GetUlongPtrFromAddress: unable to read from fffff800032f7300

KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 1

Key : Analysis.Elapsed.Sec
Value: 2

Key : Analysis.Memory.CommitPeak.Mb
Value: 62


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700

SYSTEM_MANUFACTURER: Hewlett-Packard

SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC

SYSTEM_SKU: J4T62EA#AB8

SYSTEM_VERSION: 0991100000000000000600087

BIOS_VENDOR: Insyde

BIOS_VERSION: F.43

BIOS_DATE: 12/19/2017

BASEBOARD_MANUFACTURER: Hewlett-Packard

BASEBOARD_PRODUCT: 2211

BASEBOARD_VERSION: 86.56

DUMP_TYPE: 2

BUGCHECK_P1: fffff8a000f95c5c

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8000334077c

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800032f7100
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff800032f72f0
GetUlongPtrFromAddress: unable to read from fffff800032f74a8
GetPointerFromAddress: unable to read from fffff800032f70d8
fffff8a000f95c5c Paged pool

CURRENT_IRQL: 2

FAULTING_IP:
nt!CmpFindValueByNameFromCache+12c
fffff800`0334077c 41f6401001 test byte ptr [r8+10h],1

CPU_COUNT: 4

CPU_MHZ: 6a0

CPU_VENDOR: GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 45

CPU_STEPPING: 1

CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init)

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT

BUGCHECK_STR: 0xA

PROCESS_NAME: System

ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5

ANALYSIS_SESSION_TIME: 06-17-2019 20:48:55.0594

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

DPC_STACK_BASE: FFFFF80000BA2FB0

TRAP_FRAME:  fffff80000ba1d00 -- (.trap 0xfffff80000ba1d00)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000c64c48 rbx=0000000000000000 rcx=fffff80000ba1fa1
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8000334077c rsp=fffff80000ba1e90 rbp=fffff80000ba2360
r8=fffff8a000f95c4c r9=000000000000ffff r10=fffffa8005aaacfc
r11=fffff8a0018b9b46 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!CmpFindValueByNameFromCache+0x12c:
fffff800`0334077c 41f6401001 test byte ptr [r8+10h],1 ds:fffff8a0`00f95c5c=01
Resetting default scope

LAST_CONTROL_TRANSFER: from fffff800030fbf69 to fffff800030edba0

STACK_TEXT:
fffff800`00ba1bb8 fffff800`030fbf69 : 00000000`0000000a fffff8a0`00f95c5c 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff800`00ba1bc0 fffff800`030f9d88 : 00000000`00000000 fffff8a0`00f95c5c fffffa80`05191000 fffff8a0`00024010 : nt!KiBugCheckDispatch+0x69
fffff800`00ba1d00 fffff800`0334077c : fffff8a0`00024010 fffff8a0`00024010 fffff8a0`00048c80 00000000`00000000 : nt!KiPageFault+0x448
fffff800`00ba1e90 fffff800`03323c38 : fffff8a0`15bf1de8 fffff800`00ba2188 fffff800`00ba1fd0 fffff800`00ba1fb8 : nt!CmpFindValueByNameFromCache+0x12c
fffff800`00ba1f60 fffff800`035061e7 : fffff8a0`15bf1de8 01d4f7b8`449491c9 fffff8a0`15bf1de8 00000000`00000000 : nt!CmpCompareNewValueDataAgainstKCBCache+0x78
fffff800`00ba2000 fffff800`0332b531 : fffff8a0`1f297040 fffff800`00ba2188 fffffa80`00000004 fffff800`00ba2580 : nt!CmSetValueKey+0x6a7
fffff800`00ba2140 fffff800`030fbbd3 : ffffffff`80000cc8 00000000`00000002 fffffa80`00000000 fffff800`00000004 : nt!NtSetValueKey+0x349
fffff800`00ba2270 fffff800`030f13b0 : fffff800`034422a2 fffff800`00ba25b8 fffff880`01514152 00000000`c0000001 : nt!KiSystemServiceCopyEnd+0x13
fffff800`00ba2478 fffff800`034422a2 : fffff800`00ba25b8 fffff880`01514152 00000000`c0000001 fffff800`00ba25e0 : nt!KiServiceLinkage
fffff800`00ba2480 fffff880`0151bd96 : 00000000`00000004 fffffa80`05aaacf0 00000100`00000000 00000000`000007ff : nt!RtlWriteRegistryValue+0x62
fffff800`00ba24e0 fffff880`0514a98d : fffff800`00ba25e0 fffff880`05359c28 00000000`00000000 00000000`00000000 : ndis!NdisWriteConfiguration+0x156
fffff800`00ba2540 fffff800`00ba25e0 : fffff880`05359c28 00000000`00000000 00000000`00000000 fffffa80`001801a9 : netr28x+0x4b98d
fffff800`00ba2548 fffff880`05359c28 : 00000000`00000000 00000000`00000000 fffffa80`001801a9 fffffa80`05b411a0 : 0xfffff800`00ba25e0
fffff800`00ba2550 00000000`00000000 : 00000000`00000000 fffffa80`001801a9 fffffa80`05b411a0 00000000`00000000 : netr28x+0x25ac28


THREAD_SHA1_HASH_MOD_FUNC: 935105e89958188e75032d802c31088ef212f1d5

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: d6275099b99a3ef75c037e31f081aba5025e8f89

THREAD_SHA1_HASH_MOD: 7921e317582c7f98a7f13cfbcd3c02a86fdcafec

FOLLOWUP_IP:
netr28x+4b98d
fffff880`0514a98d ?? ???

SYMBOL_STACK_INDEX: b

SYMBOL_NAME: netr28x+4b98d

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: netr28x

IMAGE_NAME:  netr28x.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a

STACK_COMMAND: .thread ; .cxr ; kb

FAILURE_BUCKET_ID: X64_0xA_netr28x+4b98d

BUCKET_ID: X64_0xA_netr28x+4b98d

PRIMARY_PROBLEM_CLASS: X64_0xA_netr28x+4b98d

TARGET_TIME: 2019-04-20T20:33:09.000Z

OSBUILD: 7601

OSSERVICEPACK: 1000

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 7

OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2019-03-21 04:38:47

BUILDDATESTAMP_STR: 190320-1700

BUILDLAB_STR: win7sp1_ldr_escrow

BUILDOSVER_STR: 6.1.7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700

ANALYSIS_SESSION_ELAPSED_TIME: 7e6

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:x64_0xa_netr28x+4b98d

FAILURE_ID_HASH: {a6eb3f60-a5c3-0bd6-051c-41bf4427925d}

Followup: MachineOwner
---------


INVALID_PROCESS_ATTACH_ATTEMPT (5)
Arguments:
Arg1: fffffa80042d09b0
Arg2: fffffa80075e8060
Arg3: 0000000000000000
Arg4: 0000000000000001

Debugging Details:
------------------

GetUlongPtrFromAddress: unable to read from fffff800032af300

KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 2

Key : Analysis.Elapsed.Sec
Value: 2

Key : Analysis.Memory.CommitPeak.Mb
Value: 62


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700

SYSTEM_MANUFACTURER: Hewlett-Packard

SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC

SYSTEM_SKU: J4T62EA#AB8

SYSTEM_VERSION: 0991100000000000000600087

BIOS_VENDOR: Insyde

BIOS_VERSION: F.43

BIOS_DATE: 12/19/2017

BASEBOARD_MANUFACTURER: Hewlett-Packard

BASEBOARD_PRODUCT: 2211

BASEBOARD_VERSION: 86.56

DUMP_TYPE: 2

BUGCHECK_P1: fffffa80042d09b0

BUGCHECK_P2: fffffa80075e8060

BUGCHECK_P3: 0

BUGCHECK_P4: 1

CPU_COUNT: 4

CPU_MHZ: 6a0

CPU_VENDOR: GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 45

CPU_STEPPING: 1

CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init)

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT

BUGCHECK_STR: 0x5

PROCESS_NAME: audiodg.exe

CURRENT_IRQL: 2

ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5

ANALYSIS_SESSION_TIME: 06-17-2019 20:48:52.0836

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

DPC_STACK_BASE: FFFFF8000441FFB0

LOCK_ADDRESS: fffff80003282240 -- (!locks fffff80003282240)
Cannot get _ERESOURCE type

Resource @ nt!PiEngineLock (0xfffff80003282240) Available
1 total locks

PNP_TRIAGE_DATA:
Lock address : 0xfffff80003282240
Thread Count : 0
Thread address: 0x0000000000000000
Thread wait : 0x0

LAST_CONTROL_TRANSFER: from fffff800030545f2 to fffff800030a5ba0

STACK_TEXT:
fffff800`0441ecc8 fffff800`030545f2 : 00000000`00000005 fffffa80`042d09b0 fffffa80`075e8060 00000000`00000000 : nt!KeBugCheckEx
fffff800`0441ecd0 fffff800`032fd127 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeStackAttachProcess+0x52
fffff800`0441ed50 fffff800`032fd4bf : 00000000`00000000 fffff8a0`00000000 fffff8a0`00001910 00000000`00000000 : nt!ObpDecrementHandleCount+0x177
fffff800`0441edd0 fffff800`032fd1e4 : 00000000`000007c8 fffffa80`075e8060 fffff8a0`00001910 00000000`000007c8 : nt!ObpCloseHandleTableEntry+0xaf
fffff800`0441ee60 fffff800`030b3bd3 : fffffa80`044dab50 fffff800`0441ef30 fffff800`03367200 fffff800`032f376a : nt!ObpCloseHandle+0x94
fffff800`0441eeb0 fffff800`030a93b0 : fffff800`03340d73 fffffa80`04ddc060 fffff800`03367200 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
fffff800`0441f048 fffff800`03340d73 : fffffa80`04ddc060 fffff800`03367200 00000000`00000000 00000000`00000000 : nt!KiServiceLinkage
fffff800`0441f050 fffff800`0334aa78 : fffffa80`04ddc060 00000000`00000001 fffffa80`04dd96e0 00000000`00000000 : nt!PiGetDeviceRegistryProperty+0xab
fffff800`0441f1b0 fffff800`0333fa90 : fffffa80`04ddc060 fffffa80`04ddc060 00000000`00000000 00000000`00000000 : nt!IoGetDeviceProperty+0xbc
fffff800`0441f290 fffff800`03350f51 : 00000000`ffff0000 fffffa80`05a69770 fffff880`014e7110 fffffa80`05ca3270 : nt!IopOpenOrCreateDeviceRegistryKey+0x14c
fffff800`0441f450 fffff880`0152c152 : fffffa80`071bfdc0 fffff800`0441f5e0 00000000`0000001f 00000000`000007ff : nt!IoOpenDeviceRegistryKey+0x11
fffff800`0441f490 fffff880`01497b34 : fffff800`0441f5e0 fffff800`0441f5b8 fffffa80`05c0a1a0 fffff880`0646eab0 : ndis!NdisOpenConfiguration+0xb2
fffff800`0441f4d0 fffff880`04f0c94f : fffffa80`00000000 fffff800`0441f5e0 fffff880`0511bc28 00000000`00000000 : ndis!NdisOpenConfigurationEx+0xa4
fffff800`0441f540 fffffa80`00000000 : fffff800`0441f5e0 fffff880`0511bc28 00000000`00000000 fffffa80`001801a9 : netr28x+0x4b94f
fffff800`0441f548 fffff800`0441f5e0 : fffff880`0511bc28 00000000`00000000 fffffa80`001801a9 fffffa80`05c0a1a0 : 0xfffffa80`00000000
fffff800`0441f550 fffff880`0511bc28 : 00000000`00000000 fffffa80`001801a9 fffffa80`05c0a1a0 00000000`00000000 : 0xfffff800`0441f5e0
fffff800`0441f558 00000000`00000000 : fffffa80`001801a9 fffffa80`05c0a1a0 00000000`00000000 fffff880`00e5028c : netr28x+0x25ac28


THREAD_SHA1_HASH_MOD_FUNC: 1764d353450a941fbc74295279ec02651c3d9814

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: bdc70d393af014c177e84e60c668cc911acaf71f

THREAD_SHA1_HASH_MOD: 9a9dca34541ae91666e3989df373f06b6e683623

FOLLOWUP_IP:
netr28x+4b94f
fffff880`04f0c94f ?? ???

SYMBOL_STACK_INDEX: d

SYMBOL_NAME: netr28x+4b94f

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: netr28x

IMAGE_NAME:  netr28x.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a

STACK_COMMAND: .thread ; .cxr ; kb

FAILURE_BUCKET_ID: X64_0x5_netr28x+4b94f

BUCKET_ID: X64_0x5_netr28x+4b94f

PRIMARY_PROBLEM_CLASS: X64_0x5_netr28x+4b94f

TARGET_TIME: 2019-04-11T15:07:27.000Z

OSBUILD: 7601

OSSERVICEPACK: 1000

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 7

OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2019-03-06 05:38:53

BUILDDATESTAMP_STR: 190305-1700

BUILDLAB_STR: win7sp1_ldr_escrow

BUILDOSVER_STR: 6.1.7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700

ANALYSIS_SESSION_ELAPSED_TIME: 8c6

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:x64_0x5_netr28x+4b94f

FAILURE_ID_HASH: {43753b0b-e234-1a01-8468-7eed644d41ea}

Followup:     MachineOwner


INVALID_PROCESS_ATTACH_ATTEMPT (5)
Arguments:
Arg1: fffffa80042b59b0
Arg2: fffffa8004c74b00
Arg3: 0000000000000001
Arg4: 0000000000000001

Debugging Details:
------------------

GetUlongPtrFromAddress: unable to read from fffff800030f3300

KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 2

Key : Analysis.Elapsed.Sec
Value: 2

Key : Analysis.Memory.CommitPeak.Mb
Value: 62


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700

SYSTEM_MANUFACTURER: Hewlett-Packard

SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC

SYSTEM_SKU: J4T62EA#AB8

SYSTEM_VERSION: 0991100000000000000600087

BIOS_VENDOR: Insyde

BIOS_VERSION: F.43

BIOS_DATE: 12/19/2017

BASEBOARD_MANUFACTURER: Hewlett-Packard

BASEBOARD_PRODUCT: 2211

BASEBOARD_VERSION: 86.56

DUMP_TYPE: 2

BUGCHECK_P1: fffffa80042b59b0

BUGCHECK_P2: fffffa8004c74b00

BUGCHECK_P3: 1

BUGCHECK_P4: 1

CPU_COUNT: 4

CPU_MHZ: 6a0

CPU_VENDOR: GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 45

CPU_STEPPING: 1

CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init)

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT

BUGCHECK_STR: 0x5

PROCESS_NAME: chrome.exe

CURRENT_IRQL: 2

ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5

ANALYSIS_SESSION_TIME: 06-17-2019 20:48:49.0152

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

DPC_STACK_BASE: FFFFF80000BA2FB0

LOCK_ADDRESS: fffff800030c6240 -- (!locks fffff800030c6240)
Cannot get _ERESOURCE type

Resource @ nt!PiEngineLock (0xfffff800030c6240) Available
1 total locks

PNP_TRIAGE_DATA:
Lock address : 0xfffff800030c6240
Thread Count : 0
Thread address: 0x0000000000000000
Thread wait : 0x0

LAST_CONTROL_TRANSFER: from fffff80002e985f2 to fffff80002ee9ba0

STACK_TEXT:
fffff800`00ba1cc8 fffff800`02e985f2 : 00000000`00000005 fffffa80`042b59b0 fffffa80`04c74b00 00000000`00000001 : nt!KeBugCheckEx
fffff800`00ba1cd0 fffff800`03141127 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeStackAttachProcess+0x52
fffff800`00ba1d50 fffff800`031414bf : 00000000`00000000 fffff8a0`00000000 fffff8a0`00001910 00000000`00000000 : nt!ObpDecrementHandleCount+0x177
fffff800`00ba1dd0 fffff800`031411e4 : 00000000`000008e4 fffffa80`04c74b00 fffff8a0`00001910 00000000`000008e4 : nt!ObpCloseHandleTableEntry+0xaf
fffff800`00ba1e60 fffff800`02ef7bd3 : fffffa80`076a6b50 fffff800`00ba1f30 fffff800`031ab200 fffff800`0313776a : nt!ObpCloseHandle+0x94
fffff800`00ba1eb0 fffff800`02eed3b0 : fffff800`03184d73 fffffa80`04e1e060 fffff800`031ab200 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
fffff800`00ba2048 fffff800`03184d73 : fffffa80`04e1e060 fffff800`031ab200 00000000`00000000 00000000`00000000 : nt!KiServiceLinkage
fffff800`00ba2050 fffff800`0318ea78 : fffffa80`04e1e060 00000000`00000001 fffffa80`04e1d6e0 00000000`00000000 : nt!PiGetDeviceRegistryProperty+0xab
fffff800`00ba21b0 fffff800`03183a90 : fffffa80`04e1e060 fffffa80`04e1e060 00000000`00000000 00000000`00000000 : nt!IoGetDeviceProperty+0xbc
fffff800`00ba2290 fffff800`03194f51 : 00000000`ffff0000 fffffa80`07df09f0 fffff880`01480110 fffffa80`05cfe910 : nt!IopOpenOrCreateDeviceRegistryKey+0x14c
fffff800`00ba2450 fffff880`014c5152 : fffffa80`080038e0 fffff800`00ba25e0 fffffa80`0700aa78 00000000`000007ff : nt!IoOpenDeviceRegistryKey+0x11
fffff800`00ba2490 fffff880`01430b34 : fffff800`00ba25e0 fffff800`00ba25b8 fffffa80`055e31a0 fffff880`014db21d : ndis!NdisOpenConfiguration+0xb2
fffff800`00ba24d0 fffff880`04e5194f : 00000000`00000000 fffff800`00ba25e0 fffff880`05060c28 00000000`00000000 : ndis!NdisOpenConfigurationEx+0xa4
fffff800`00ba2540 00000000`00000000 : fffff800`00ba25e0 fffff880`05060c28 00000000`00000000 fffffa80`001801a9 : netr28x+0x4b94f


THREAD_SHA1_HASH_MOD_FUNC: ae5746727567d6f3e980a5bab83b7524a5dc9ee8

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: a4491f04e0c588cecd320ea5c66c026862f569ea

THREAD_SHA1_HASH_MOD: 34d7ba38146ecb972065c22fa7203d72f73eccb4

FOLLOWUP_IP:
netr28x+4b94f
fffff880`04e5194f ?? ???

SYMBOL_STACK_INDEX: d

SYMBOL_NAME: netr28x+4b94f

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: netr28x

IMAGE_NAME:  netr28x.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a

STACK_COMMAND: .thread ; .cxr ; kb

FAILURE_BUCKET_ID: X64_0x5_netr28x+4b94f

BUCKET_ID: X64_0x5_netr28x+4b94f

PRIMARY_PROBLEM_CLASS: X64_0x5_netr28x+4b94f

TARGET_TIME: 2019-04-11T14:09:37.000Z

OSBUILD: 7601

OSSERVICEPACK: 1000

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 7

OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2019-03-06 05:38:53

BUILDDATESTAMP_STR: 190305-1700

BUILDLAB_STR: win7sp1_ldr_escrow

BUILDOSVER_STR: 6.1.7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700

ANALYSIS_SESSION_ELAPSED_TIME: 941

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:x64_0x5_netr28x+4b94f

FAILURE_ID_HASH: {43753b0b-e234-1a01-8468-7eed644d41ea}

Followup: MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff8a002085398, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80003ae56fd, address which referenced memory

Debugging Details:
------------------

GetUlongPtrFromAddress: unable to read from fffff80003ab1300

KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 1

Key : Analysis.Elapsed.Sec
Value: 1

Key : Analysis.Memory.CommitPeak.Mb
Value: 62


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700

SYSTEM_MANUFACTURER: Hewlett-Packard

SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC

SYSTEM_SKU: J4T62EA#AB8

SYSTEM_VERSION: 0991100000000000000600087

BIOS_VENDOR: Insyde

BIOS_VERSION: F.43

BIOS_DATE: 12/19/2017

BASEBOARD_MANUFACTURER: Hewlett-Packard

BASEBOARD_PRODUCT: 2211

BASEBOARD_VERSION: 86.56

DUMP_TYPE: 2

BUGCHECK_P1: fffff8a002085398

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff80003ae56fd

WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80003ab1100
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff80003ab12f0
GetUlongPtrFromAddress: unable to read from fffff80003ab14a8
GetPointerFromAddress: unable to read from fffff80003ab10d8
fffff8a002085398 Paged pool

CURRENT_IRQL: 2

FAULTING_IP:
nt!HvpDoAllocateCell+101
fffff800`03ae56fd 89443d00 mov dword ptr [rbp+rdi],eax

CPU_COUNT: 4

CPU_MHZ: 6a0

CPU_VENDOR: GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 45

CPU_STEPPING: 1

CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init)

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT

BUGCHECK_STR: 0xA

PROCESS_NAME: System

ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5

ANALYSIS_SESSION_TIME: 06-17-2019 20:48:46.0248

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

TRAP_FRAME:  fffff80004c1a950 -- (.trap 0xfffff80004c1a950)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000008 rbx=0000000000000000 rcx=0000000000000368
rdx=0000000000000002 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80003ae56fd rsp=fffff80004c1aae0 rbp=0000000000000030
r8=fffff8a000024010 r9=0000000000000005 r10=fffff8a002085000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!HvpDoAllocateCell+0x101:
fffff800`03ae56fd 89443d00 mov dword ptr [rbp+rdi],eax ss:0018:00000000`00000030=????????
Resetting default scope

LAST_CONTROL_TRANSFER: from fffff800038b5f69 to fffff800038a7ba0

STACK_TEXT:
fffff800`04c1a808 fffff800`038b5f69 : 00000000`0000000a fffff8a0`02085398 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff800`04c1a810 fffff800`038b3d88 : 00000000`00000001 fffff8a0`02085398 00000000`00000000 fffff8a0`00024010 : nt!KiBugCheckDispatch+0x69
fffff800`04c1a950 fffff800`03ae56fd : fffff8a0`00024010 fffff8a0`00024010 fffff8a0`0003b420 fffff800`00000000 : nt!KiPageFault+0x448
fffff800`04c1aae0 fffff800`03b27d1d : fffff8a0`00024010 00000000`00000000 00000000`00000000 00000000`ffffffff : nt!HvpDoAllocateCell+0x101
fffff800`04c1ab40 fffff800`03b27bad : 00000000`00000000 fffff8a0`018bcc30 00000000`00000008 fffff800`03b15d5c : nt!HvAllocateCell+0x55
fffff800`04c1ab70 fffff800`03ada4bf : fffff8a0`00024010 fffff8a0`00024010 fffff8a0`018ca640 fffff800`04c1ae18 : nt!CmpAddValueKeyNew+0x69
fffff800`04c1ac40 fffff800`03cc06e3 : 01d501ff`f5623883 fffff800`04c1aff0 fffff8a0`04468820 00000000`00000000 : nt!CmpSetValueKeyNew+0x77
fffff800`04c1ac90 fffff800`03ae5531 : fffff8a0`0506b140 fffff800`04c1ae18 fffffa80`00000004 fffff800`04c1b210 : nt!CmSetValueKey+0xba3
fffff800`04c1add0 fffff800`038b5bd3 : ffffffff`80000dc4 00000000`00000002 fffffa80`00000000 fffff800`00000004 : nt!NtSetValueKey+0x349
fffff800`04c1af00 fffff800`038ab3b0 : fffff800`03bfc2a2 fffff800`04c1b248 fffff880`01525152 fffffa80`00040001 : nt!KiSystemServiceCopyEnd+0x13
fffff800`04c1b108 fffff800`03bfc2a2 : fffff800`04c1b248 fffff880`01525152 fffffa80`00040001 fffff800`04c1b270 : nt!KiServiceLinkage
fffff800`04c1b110 fffff880`0152cd96 : 00000000`00000004 fffffa80`0449b4e0 fffff880`0525c030 00000000`000007ff : nt!RtlWriteRegistryValue+0x62
fffff800`04c1b170 fffff880`050b698d : fffff800`04c1b270 fffff880`052c5c28 00000000`00000000 00000000`00000000 : ndis!NdisWriteConfiguration+0x156
fffff800`04c1b1d0 fffff800`04c1b270 : fffff880`052c5c28 00000000`00000000 00000000`00000000 fffff800`001801a9 : netr28x+0x4b98d
fffff800`04c1b1d8 fffff880`052c5c28 : 00000000`00000000 00000000`00000000 fffff800`001801a9 fffffa80`05b7f1a0 : 0xfffff800`04c1b270
fffff800`04c1b1e0 00000000`00000000 : 00000000`00000000 fffff800`001801a9 fffffa80`05b7f1a0 fffff800`00000000 : netr28x+0x25ac28


THREAD_SHA1_HASH_MOD_FUNC: 80858fdf941bd645ff48b6997b30f63ac59926fb

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 394aafee51f76470053fa2102b9df0f0f7df42a3

THREAD_SHA1_HASH_MOD: 5d50876435db08b990ce5928fe5c90526c26b16c

FOLLOWUP_IP:
netr28x+4b98d
fffff880`050b698d ?? ???

SYMBOL_STACK_INDEX: d

SYMBOL_NAME: netr28x+4b98d

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: netr28x

IMAGE_NAME:  netr28x.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a

STACK_COMMAND: .thread ; .cxr ; kb

FAILURE_BUCKET_ID: X64_0xA_netr28x+4b98d

BUCKET_ID: X64_0xA_netr28x+4b98d

PRIMARY_PROBLEM_CLASS: X64_0xA_netr28x+4b98d

TARGET_TIME: 2019-05-03T22:31:32.000Z

OSBUILD: 7601

OSSERVICEPACK: 1000

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 7

OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2019-03-21 04:38:47

BUILDDATESTAMP_STR: 190320-1700

BUILDLAB_STR: win7sp1_ldr_escrow

BUILDOSVER_STR: 6.1.7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700

ANALYSIS_SESSION_ELAPSED_TIME: 7b0

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:x64_0xa_netr28x+4b98d

FAILURE_ID_HASH: {a6eb3f60-a5c3-0bd6-051c-41bf4427925d}

Followup: MachineOwner
---------

INVALID_PROCESS_ATTACH_ATTEMPT (5)
Arguments:
Arg1: fffffa80042cf9b0
Arg2: fffffa80045a46e0
Arg3: 0000000000000000
Arg4: 0000000000000001

Debugging Details:
------------------

GetUlongPtrFromAddress: unable to read from fffff800030fb300

KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 2

Key : Analysis.Elapsed.Sec
Value: 2

Key : Analysis.Memory.CommitPeak.Mb
Value: 62


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700

SYSTEM_MANUFACTURER: Hewlett-Packard

SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC

SYSTEM_SKU: J4T62EA#AB8

SYSTEM_VERSION: 0991100000000000000600087

BIOS_VENDOR: Insyde

BIOS_VERSION: F.43

BIOS_DATE: 12/19/2017

BASEBOARD_MANUFACTURER: Hewlett-Packard

BASEBOARD_PRODUCT: 2211

BASEBOARD_VERSION: 86.56

DUMP_TYPE: 2

BUGCHECK_P1: fffffa80042cf9b0

BUGCHECK_P2: fffffa80045a46e0

BUGCHECK_P3: 0

BUGCHECK_P4: 1

CPU_COUNT: 4

CPU_MHZ: 6a0

CPU_VENDOR: GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 45

CPU_STEPPING: 1

CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init)

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT

BUGCHECK_STR: 0x5

PROCESS_NAME: chrome.exe

CURRENT_IRQL: 2

ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5

ANALYSIS_SESSION_TIME: 06-17-2019 20:48:24.0070

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

DPC_STACK_BASE: FFFFF80000BA2FB0

LOCK_ADDRESS: fffff800030ce240 -- (!locks fffff800030ce240)
Cannot get _ERESOURCE type

Resource @ nt!PiEngineLock (0xfffff800030ce240) Available
1 total locks

PNP_TRIAGE_DATA:
Lock address : 0xfffff800030ce240
Thread Count : 0
Thread address: 0x0000000000000000
Thread wait : 0x0

LAST_CONTROL_TRANSFER: from fffff80002ea05f2 to fffff80002ef1ba0

STACK_TEXT:
fffff800`00ba1cc8 fffff800`02ea05f2 : 00000000`00000005 fffffa80`042cf9b0 fffffa80`045a46e0 00000000`00000000 : nt!KeBugCheckEx
fffff800`00ba1cd0 fffff800`03149127 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeStackAttachProcess+0x52
fffff800`00ba1d50 fffff800`031494bf : 00000000`00000000 fffff8a0`00000000 fffff8a0`00001910 00000000`00000000 : nt!ObpDecrementHandleCount+0x177
fffff800`00ba1dd0 fffff800`031491e4 : 00000000`00000b3c fffffa80`045a46e0 fffff8a0`00001910 00000000`00000b3c : nt!ObpCloseHandleTableEntry+0xaf
fffff800`00ba1e60 fffff800`02effbd3 : fffffa80`04502060 fffff800`00ba1f30 fffff800`031b3200 fffff800`0313f76a : nt!ObpCloseHandle+0x94
fffff800`00ba1eb0 fffff800`02ef53b0 : fffff800`0318cd73 fffffa80`04ebd060 fffff800`031b3200 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
fffff800`00ba2048 fffff800`0318cd73 : fffffa80`04ebd060 fffff800`031b3200 00000000`00000000 00000000`00000000 : nt!KiServiceLinkage
fffff800`00ba2050 fffff800`03196a78 : fffffa80`04ebd060 00000000`00000001 fffffa80`04eba6e0 00000000`00000000 : nt!PiGetDeviceRegistryProperty+0xab
fffff800`00ba21b0 fffff800`0318ba90 : fffffa80`04ebd060 fffffa80`04ebd060 00000000`00000000 00000000`00000000 : nt!IoGetDeviceProperty+0xbc
fffff800`00ba2290 fffff800`0319cf51 : 00000000`ffff0000 fffffa80`08470cb0 fffff880`0147f110 fffffa80`059fbe30 : nt!IopOpenOrCreateDeviceRegistryKey+0x14c
fffff800`00ba2450 fffff880`014c4152 : fffffa80`0681f000 fffff800`00ba25e0 00000000`00000005 00000000`000007ff : nt!IoOpenDeviceRegistryKey+0x11
fffff800`00ba2490 fffff880`0142fb34 : fffff800`00ba25e0 fffff800`00ba25b8 fffffa80`05bf61a0 fffff800`02e262ea : ndis!NdisOpenConfiguration+0xb2
fffff800`00ba24d0 fffff880`0511d94f : 00000000`00000000 fffff800`00ba25e0 fffff880`0532cc28 00000000`00000000 : ndis!NdisOpenConfigurationEx+0xa4
fffff800`00ba2540 00000000`00000000 : fffff800`00ba25e0 fffff880`0532cc28 00000000`00000000 fffffa80`001801a9 : netr28x+0x4b94f


THREAD_SHA1_HASH_MOD_FUNC: ae5746727567d6f3e980a5bab83b7524a5dc9ee8

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: a4491f04e0c588cecd320ea5c66c026862f569ea

THREAD_SHA1_HASH_MOD: 34d7ba38146ecb972065c22fa7203d72f73eccb4

FOLLOWUP_IP:
netr28x+4b94f
fffff880`0511d94f ?? ???

SYMBOL_STACK_INDEX: d

SYMBOL_NAME: netr28x+4b94f

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: netr28x

IMAGE_NAME:  netr28x.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a

STACK_COMMAND: .thread ; .cxr ; kb

FAILURE_BUCKET_ID: X64_0x5_netr28x+4b94f

BUCKET_ID: X64_0x5_netr28x+4b94f

PRIMARY_PROBLEM_CLASS: X64_0x5_netr28x+4b94f

TARGET_TIME: 2019-04-11T14:13:16.000Z

OSBUILD: 7601

OSSERVICEPACK: 1000

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 7

OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2019-03-06 05:38:53

BUILDDATESTAMP_STR: 190305-1700

BUILDLAB_STR: win7sp1_ldr_escrow

BUILDOSVER_STR: 6.1.7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700

ANALYSIS_SESSION_ELAPSED_TIME: 851

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:x64_0x5_netr28x+4b94f

FAILURE_ID_HASH: {43753b0b-e234-1a01-8468-7eed644d41ea}

Followup: MachineOwner
---------

INVALID_PROCESS_ATTACH_ATTEMPT (5)
Arguments:
Arg1: fffffa80042ce9b0
Arg2: fffffa800b053b00
Arg3: 0000000000000000
Arg4: 0000000000000001

Debugging Details:
------------------

GetUlongPtrFromAddress: unable to read from fffff800032ed300

KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 1

Key : Analysis.Elapsed.Sec
Value: 2

Key : Analysis.Memory.CommitPeak.Mb
Value: 62


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700

SYSTEM_MANUFACTURER: Hewlett-Packard

SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC

SYSTEM_SKU: J4T62EA#AB8

SYSTEM_VERSION: 0991100000000000000600087

BIOS_VENDOR: Insyde

BIOS_VERSION: F.43

BIOS_DATE: 12/19/2017

BASEBOARD_MANUFACTURER: Hewlett-Packard

BASEBOARD_PRODUCT: 2211

BASEBOARD_VERSION: 86.56

DUMP_TYPE: 2

BUGCHECK_P1: fffffa80042ce9b0

BUGCHECK_P2: fffffa800b053b00

BUGCHECK_P3: 0

BUGCHECK_P4: 1

CPU_COUNT: 4

CPU_MHZ: 6a0

CPU_VENDOR: GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 45

CPU_STEPPING: 1

CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init)

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT

BUGCHECK_STR: 0x5

PROCESS_NAME: mcbuilder.exe

CURRENT_IRQL: 2

ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5

ANALYSIS_SESSION_TIME: 06-17-2019 20:48:40.0990

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

DPC_STACK_BASE: FFFFF80000BA2FB0

LOCK_ADDRESS: fffff800032c0240 -- (!locks fffff800032c0240)
Cannot get _ERESOURCE type

Resource @ nt!PiEngineLock (0xfffff800032c0240) Available
1 total locks

PNP_TRIAGE_DATA:
Lock address : 0xfffff800032c0240
Thread Count : 0
Thread address: 0x0000000000000000
Thread wait : 0x0

LAST_CONTROL_TRANSFER: from fffff800030925f2 to fffff800030e3ba0

STACK_TEXT:
fffff800`00ba1cc8 fffff800`030925f2 : 00000000`00000005 fffffa80`042ce9b0 fffffa80`0b053b00 00000000`00000000 : nt!KeBugCheckEx
fffff800`00ba1cd0 fffff800`0333b127 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeStackAttachProcess+0x52
fffff800`00ba1d50 fffff800`0333b4bf : 00000000`00000000 fffff8a0`00000000 fffff8a0`00001910 00000000`00000000 : nt!ObpDecrementHandleCount+0x177
fffff800`00ba1dd0 fffff800`0333b1e4 : 00000000`00000d0c fffffa80`0b053b00 fffff8a0`00001910 00000000`00000d0c : nt!ObpCloseHandleTableEntry+0xaf
fffff800`00ba1e60 fffff800`030f1bd3 : fffffa80`0568b6e0 fffff800`00ba1f30 fffff800`033a5200 fffff800`0333176a : nt!ObpCloseHandle+0x94
fffff800`00ba1eb0 fffff800`030e73b0 : fffff800`0337ed73 fffffa80`04dc8060 fffff800`033a5200 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
fffff800`00ba2048 fffff800`0337ed73 : fffffa80`04dc8060 fffff800`033a5200 00000000`00000000 00000000`00000000 : nt!KiServiceLinkage
fffff800`00ba2050 fffff800`03388a78 : fffffa80`04dc8060 00000000`00000001 fffffa80`04dc36e0 00000000`00000000 : nt!PiGetDeviceRegistryProperty+0xab
fffff800`00ba21b0 fffff800`0337da90 : fffffa80`04dc8060 fffffa80`04dc8060 00000000`00000000 00000000`00000000 : nt!IoGetDeviceProperty+0xbc
fffff800`00ba2290 fffff800`0338ef51 : 00000000`ffff0000 fffffa80`09035950 fffff880`014a0110 fffffa80`05adbd80 : nt!IopOpenOrCreateDeviceRegistryKey+0x14c
fffff800`00ba2450 fffff880`014e5152 : fffffa80`00000000 fffff800`00ba25e0 00000000`00000000 00000000`000007ff : nt!IoOpenDeviceRegistryKey+0x11
fffff800`00ba2490 fffff880`01450b34 : fffff800`00ba25e0 fffff800`00ba25b8 fffffa80`05bc91a0 00000000`00000001 : ndis!NdisOpenConfiguration+0xb2
fffff800`00ba24d0 fffff880`056cc94f : 00000000`00000000 fffff800`00ba25e0 fffff880`058dbc28 00000000`00000000 : ndis!NdisOpenConfigurationEx+0xa4
fffff800`00ba2540 00000000`00000000 : fffff800`00ba25e0 fffff880`058dbc28 00000000`00000000 fffffa80`001801a9 : netr28x+0x4b94f


THREAD_SHA1_HASH_MOD_FUNC: ae5746727567d6f3e980a5bab83b7524a5dc9ee8

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: a4491f04e0c588cecd320ea5c66c026862f569ea

THREAD_SHA1_HASH_MOD: 34d7ba38146ecb972065c22fa7203d72f73eccb4

FOLLOWUP_IP:
netr28x+4b94f
fffff880`056cc94f ?? ???

SYMBOL_STACK_INDEX: d

SYMBOL_NAME: netr28x+4b94f

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: netr28x

IMAGE_NAME:  netr28x.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a

STACK_COMMAND: .thread ; .cxr ; kb

FAILURE_BUCKET_ID: X64_0x5_netr28x+4b94f

BUCKET_ID: X64_0x5_netr28x+4b94f

PRIMARY_PROBLEM_CLASS: X64_0x5_netr28x+4b94f

TARGET_TIME: 2019-04-11T17:47:48.000Z

OSBUILD: 7601

OSSERVICEPACK: 1000

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 7

OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2019-03-06 05:38:53

BUILDDATESTAMP_STR: 190305-1700

BUILDLAB_STR: win7sp1_ldr_escrow

BUILDOSVER_STR: 6.1.7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700

ANALYSIS_SESSION_ELAPSED_TIME: 7f5

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:x64_0x5_netr28x+4b94f

FAILURE_ID_HASH: {43753b0b-e234-1a01-8468-7eed644d41ea}

Followup: MachineOwner
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff8a006be8c34, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80003afb730, address which referenced memory

Debugging Details:
------------------

GetUlongPtrFromAddress: unable to read from fffff80003ab2300

KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 1

Key : Analysis.Elapsed.Sec
Value: 1

Key : Analysis.Memory.CommitPeak.Mb
Value: 62


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700

SYSTEM_MANUFACTURER: Hewlett-Packard

SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC

SYSTEM_SKU: J4T62EA#AB8

SYSTEM_VERSION: 0991100000000000000600087

BIOS_VENDOR: Insyde

BIOS_VERSION: F.43

BIOS_DATE: 12/19/2017

BASEBOARD_MANUFACTURER: Hewlett-Packard

BASEBOARD_PRODUCT: 2211

BASEBOARD_VERSION: 86.56

DUMP_TYPE: 2

BUGCHECK_P1: fffff8a006be8c34

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff80003afb730

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80003ab2100
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff80003ab22f0
GetUlongPtrFromAddress: unable to read from fffff80003ab24a8
GetPointerFromAddress: unable to read from fffff80003ab20d8
fffff8a006be8c34 Paged pool

CURRENT_IRQL: 2

FAULTING_IP:
nt!CmpFindValueByNameFromCache+e0
fffff800`03afb730 428b14b8 mov edx,dword ptr [rax+r15*4]

CPU_COUNT: 4

CPU_MHZ: 6a0

CPU_VENDOR: GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 45

CPU_STEPPING: 1

CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init)

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT

BUGCHECK_STR: 0xA

PROCESS_NAME: System

ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5

ANALYSIS_SESSION_TIME: 06-17-2019 20:48:30.0482

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

TRAP_FRAME:  fffff80004c21990 -- (.trap 0xfffff80004c21990)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8a006be8c34 rbx=0000000000000000 rcx=0000000000000000
rdx=00000000ffffffff rsi=0000000000000000 rdi=0000000000000000
rip=fffff80003afb730 rsp=fffff80004c21b20 rbp=fffff80004c21ff0
r8=fffff8a00004ad40 r9=000000000000ffff r10=0000000000000001
r11=fffff80004c21dc8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!CmpFindValueByNameFromCache+0xe0:
fffff800`03afb730 428b14b8 mov edx,dword ptr [rax+r15*4] ds:fffff8a0`06be8c34=????????
Resetting default scope

LAST_CONTROL_TRANSFER: from fffff800038b6f69 to fffff800038a8ba0

STACK_TEXT:
fffff800`04c21848 fffff800`038b6f69 : 00000000`0000000a fffff8a0`06be8c34 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff800`04c21850 fffff800`038b4d88 : 00000000`00000000 fffff8a0`06be8c34 fffffa80`0a1a6000 fffff8a0`00024010 : nt!KiBugCheckDispatch+0x69
fffff800`04c21990 fffff800`03afb730 : fffff8a0`00024010 00000000`00c6ac30 fffff8a0`0004ad40 00000000`00000000 : nt!KiPageFault+0x448
fffff800`04c21b20 fffff800`03adec38 : fffff8a0`0e0d74a8 fffff800`04c21e18 fffff800`04c21c60 fffff800`04c21c48 : nt!CmpFindValueByNameFromCache+0xe0
fffff800`04c21bf0 fffff800`03cc11e7 : fffff8a0`0e0d74a8 01d50684`f67b3cde fffff8a0`0e0d74a8 00000000`00000000 : nt!CmpCompareNewValueDataAgainstKCBCache+0x78
fffff800`04c21c90 fffff800`03ae6531 : fffff8a0`01c5f710 fffff800`04c21e18 fffffa80`00000004 fffff800`04c22210 : nt!CmSetValueKey+0x6a7
fffff800`04c21dd0 fffff800`038b6bd3 : ffffffff`80002788 00000000`00000002 fffffa80`00000000 fffff800`00000004 : nt!NtSetValueKey+0x349
fffff800`04c21f00 fffff800`038ac3b0 : fffff800`03bfd2a2 fffff800`04c22248 fffff880`017a5152 00000000`c0000001 : nt!KiSystemServiceCopyEnd+0x13
fffff800`04c22108 fffff800`03bfd2a2 : fffff800`04c22248 fffff880`017a5152 00000000`c0000001 fffff800`04c22270 : nt!KiServiceLinkage
fffff800`04c22110 fffff880`017acd96 : 00000000`00000004 fffffa80`09b31af0 00000100`00000000 00000000`000007ff : nt!RtlWriteRegistryValue+0x62
fffff800`04c22170 fffff880`056a498d : fffff800`04c22270 fffff880`058b3c28 00000000`00000000 00000000`00000000 : ndis!NdisWriteConfiguration+0x156
fffff800`04c221d0 fffff800`04c22270 : fffff880`058b3c28 00000000`00000000 00000000`00000000 00000000`001801a9 : netr28x+0x4b98d
fffff800`04c221d8 fffff880`058b3c28 : 00000000`00000000 00000000`00000000 00000000`001801a9 fffffa80`05b821a0 : 0xfffff800`04c22270
fffff800`04c221e0 00000000`00000000 : 00000000`00000000 00000000`001801a9 fffffa80`05b821a0 00000000`00000000 : netr28x+0x25ac28


THREAD_SHA1_HASH_MOD_FUNC: 935105e89958188e75032d802c31088ef212f1d5

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 050e790aab7ddac4bfe73c42f1350165ef3ea549

THREAD_SHA1_HASH_MOD: 7921e317582c7f98a7f13cfbcd3c02a86fdcafec

FOLLOWUP_IP:
netr28x+4b98d
fffff880`056a498d ?? ???

SYMBOL_STACK_INDEX: b

SYMBOL_NAME: netr28x+4b98d

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: netr28x

IMAGE_NAME:  netr28x.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a

STACK_COMMAND: .thread ; .cxr ; kb

FAILURE_BUCKET_ID: X64_0xA_netr28x+4b98d

BUCKET_ID: X64_0xA_netr28x+4b98d

PRIMARY_PROBLEM_CLASS: X64_0xA_netr28x+4b98d

TARGET_TIME: 2019-05-09T16:33:41.000Z

OSBUILD: 7601

OSSERVICEPACK: 1000

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 7

OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2019-03-21 04:38:47

BUILDDATESTAMP_STR: 190320-1700

BUILDLAB_STR: win7sp1_ldr_escrow

BUILDOSVER_STR: 6.1.7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700

ANALYSIS_SESSION_ELAPSED_TIME: 716

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:x64_0xa_netr28x+4b98d

FAILURE_ID_HASH: {a6eb3f60-a5c3-0bd6-051c-41bf4427925d}

Followup: MachineOwner
---------

INVALID_PROCESS_ATTACH_ATTEMPT (5)
Arguments:
Arg1: fffffa80042b59b0
Arg2: fffffa80048376b0
Arg3: 0000000000000000
Arg4: 0000000000000001

Debugging Details:
------------------

GetUlongPtrFromAddress: unable to read from fffff8000309f300

KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 1

Key : Analysis.Elapsed.Sec
Value: 1

Key : Analysis.Memory.CommitPeak.Mb
Value: 62


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700

SYSTEM_MANUFACTURER: Hewlett-Packard

SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC

SYSTEM_SKU: J4T62EA#AB8

SYSTEM_VERSION: 0991100000000000000600087

BIOS_VENDOR: Insyde

BIOS_VERSION: F.43

BIOS_DATE: 12/19/2017

BASEBOARD_MANUFACTURER: Hewlett-Packard

BASEBOARD_PRODUCT: 2211

BASEBOARD_VERSION: 86.56

DUMP_TYPE: 2

BUGCHECK_P1: fffffa80042b59b0

BUGCHECK_P2: fffffa80048376b0

BUGCHECK_P3: 0

BUGCHECK_P4: 1

CPU_COUNT: 4

CPU_MHZ: 6a0

CPU_VENDOR: GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 45

CPU_STEPPING: 1

CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init)

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT

BUGCHECK_STR: 0x5

PROCESS_NAME: PointBlank.exe

CURRENT_IRQL: 2

ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5

ANALYSIS_SESSION_TIME: 06-17-2019 21:16:16.0171

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

DPC_STACK_BASE: FFFFF80000BA2FB0

LOCK_ADDRESS: fffff80003072240 -- (!locks fffff80003072240)
Cannot get _ERESOURCE type

Resource @ nt!PiEngineLock (0xfffff80003072240) Available
1 total locks

PNP_TRIAGE_DATA:
Lock address : 0xfffff80003072240
Thread Count : 0
Thread address: 0x0000000000000000
Thread wait : 0x0

LAST_CONTROL_TRANSFER: from fffff80002e445f2 to fffff80002e95ba0

STACK_TEXT:
fffff800`00ba1cc8 fffff800`02e445f2 : 00000000`00000005 fffffa80`042b59b0 fffffa80`048376b0 00000000`00000000 : nt!KeBugCheckEx
fffff800`00ba1cd0 fffff800`030ed127 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeStackAttachProcess+0x52
fffff800`00ba1d50 fffff800`030ed4bf : 00000000`00000000 fffff8a0`00000000 fffff8a0`00001910 00000000`00000000 : nt!ObpDecrementHandleCount+0x177
fffff800`00ba1dd0 fffff800`030ed1e4 : 00000000`00000c9c fffffa80`048376b0 fffff8a0`00001910 00000000`00000c9c : nt!ObpCloseHandleTableEntry+0xaf
fffff800`00ba1e60 fffff800`02ea3bd3 : fffffa80`04988060 fffff800`00ba1f30 fffff800`03157200 fffff800`030e376a : nt!ObpCloseHandle+0x94
fffff800`00ba1eb0 fffff800`02e993b0 : fffff800`03130d73 fffffa80`04e7d060 fffff800`03157200 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
fffff800`00ba2048 fffff800`03130d73 : fffffa80`04e7d060 fffff800`03157200 00000000`00000000 00000000`00000000 : nt!KiServiceLinkage
fffff800`00ba2050 fffff800`0313aa78 : fffffa80`04e7d060 00000000`00000001 fffffa80`04e386e0 00000000`00000000 : nt!PiGetDeviceRegistryProperty+0xab
fffff800`00ba21b0 fffff800`0312fa90 : fffffa80`04e7d060 fffffa80`04e7d060 00000000`00000000 00000000`00000000 : nt!IoGetDeviceProperty+0xbc
fffff800`00ba2290 fffff800`03140f51 : 00000000`ffff0000 fffffa80`08033990 fffff880`014d7110 fffffa80`05bfaf70 : nt!IopOpenOrCreateDeviceRegistryKey+0x14c
fffff800`00ba2450 fffff880`0151c152 : fffffa80`049479f0 fffff800`00ba25e0 fffffa80`06f64a78 00000000`000007ff : nt!IoOpenDeviceRegistryKey+0x11
fffff800`00ba2490 fffff880`01487b34 : fffff800`00ba25e0 fffff800`00ba25b8 fffffa80`05bf91a0 fffff880`0153221d : ndis!NdisOpenConfiguration+0xb2
fffff800`00ba24d0 fffff880`04eff94f : fffffa80`00000000 fffff800`00ba25e0 fffff880`0510ec28 00000000`00000000 : ndis!NdisOpenConfigurationEx+0xa4
fffff800`00ba2540 fffffa80`00000000 : fffff800`00ba25e0 fffff880`0510ec28 00000000`00000000 00000000`001801a9 : netr28x+0x4b94f
fffff800`00ba2548 fffff800`00ba25e0 : fffff880`0510ec28 00000000`00000000 00000000`001801a9 fffffa80`05bf91a0 : 0xfffffa80`00000000
fffff800`00ba2550 fffff880`0510ec28 : 00000000`00000000 00000000`001801a9 fffffa80`05bf91a0 fffffa80`00000000 : 0xfffff800`00ba25e0
fffff800`00ba2558 00000000`00000000 : 00000000`001801a9 fffffa80`05bf91a0 fffffa80`00000000 fffff880`04f0be2e : netr28x+0x25ac28


THREAD_SHA1_HASH_MOD_FUNC: 1764d353450a941fbc74295279ec02651c3d9814

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: bdc70d393af014c177e84e60c668cc911acaf71f

THREAD_SHA1_HASH_MOD: 9a9dca34541ae91666e3989df373f06b6e683623

FOLLOWUP_IP:
netr28x+4b94f
fffff880`04eff94f ?? ???

SYMBOL_STACK_INDEX: d

SYMBOL_NAME: netr28x+4b94f

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: netr28x

IMAGE_NAME:  netr28x.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a

STACK_COMMAND: .thread ; .cxr ; kb

FAILURE_BUCKET_ID: X64_0x5_netr28x+4b94f

BUCKET_ID: X64_0x5_netr28x+4b94f

PRIMARY_PROBLEM_CLASS: X64_0x5_netr28x+4b94f

TARGET_TIME: 2019-04-11T14:53:19.000Z

OSBUILD: 7601

OSSERVICEPACK: 1000

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 7

OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2019-03-06 05:38:53

BUILDDATESTAMP_STR: 190305-1700

BUILDLAB_STR: win7sp1_ldr_escrow

BUILDOSVER_STR: 6.1.7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700

ANALYSIS_SESSION_ELAPSED_TIME: 7ca

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:x64_0x5_netr28x+4b94f

FAILURE_ID_HASH: {43753b0b-e234-1a01-8468-7eed644d41ea}

Followup: MachineOwner
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff8a000e8ee98, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff800032e66fd, address which referenced memory

Debugging Details:
------------------

GetUlongPtrFromAddress: unable to read from fffff800032b2300

KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 1

Key : Analysis.Elapsed.Sec
Value: 1

Key : Analysis.Memory.CommitPeak.Mb
Value: 62


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700

SYSTEM_MANUFACTURER: Hewlett-Packard

SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC

SYSTEM_SKU: J4T62EA#AB8

SYSTEM_VERSION: 0991100000000000000600087

BIOS_VENDOR: Insyde

BIOS_VERSION: F.43

BIOS_DATE: 12/19/2017

BASEBOARD_MANUFACTURER: Hewlett-Packard

BASEBOARD_PRODUCT: 2211

BASEBOARD_VERSION: 86.56

DUMP_TYPE: 2

BUGCHECK_P1: fffff8a000e8ee98

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff800032e66fd

WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800032b2100
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff800032b22f0
GetUlongPtrFromAddress: unable to read from fffff800032b24a8
GetPointerFromAddress: unable to read from fffff800032b20d8
fffff8a000e8ee98 Paged pool

CURRENT_IRQL: 2

FAULTING_IP:
nt!HvpDoAllocateCell+101
fffff800`032e66fd 89443d00 mov dword ptr [rbp+rdi],eax

CPU_COUNT: 4

CPU_MHZ: 6a0

CPU_VENDOR: GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 45

CPU_STEPPING: 1

CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init)

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT

BUGCHECK_STR: 0xA

PROCESS_NAME: System

ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5

ANALYSIS_SESSION_TIME: 06-17-2019 21:16:26.0291

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

TRAP_FRAME:  fffff80004418950 -- (.trap 0xfffff80004418950)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000020 rbx=0000000000000000 rcx=0000000000002e68
rdx=0000000000000006 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800032e66fd rsp=fffff80004418ae0 rbp=0000000000000030
r8=fffff8a000024010 r9=0000000000000005 r10=fffff8a000e8c000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!HvpDoAllocateCell+0x101:
fffff800`032e66fd 89443d00 mov dword ptr [rbp+rdi],eax ss:0018:00000000`00000030=????????
Resetting default scope

LAST_CONTROL_TRANSFER: from fffff800030b6f69 to fffff800030a8ba0

STACK_TEXT:
fffff800`04418808 fffff800`030b6f69 : 00000000`0000000a fffff8a0`00e8ee98 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff800`04418810 fffff800`030b4d88 : 00000000`00000001 fffff8a0`00e8ee98 00000000`00000000 fffff8a0`00024010 : nt!KiBugCheckDispatch+0x69
fffff800`04418950 fffff800`032e66fd : fffff8a0`00024010 fffff8a0`00024010 fffff8a0`0004b9a0 fffff800`00000000 : nt!KiPageFault+0x448
fffff800`04418ae0 fffff800`03328d1d : fffff8a0`00024010 00000000`00000000 00000000`00000000 00000000`ffffffff : nt!HvpDoAllocateCell+0x101
fffff800`04418b40 fffff800`03328bad : 00000000`00000000 fffff8a0`00ff0c30 00000000`00000008 fffff800`03316d5c : nt!HvAllocateCell+0x55
fffff800`04418b70 fffff800`032db4bf : fffff8a0`00024010 fffff8a0`00024010 fffff8a0`00ffe640 fffff800`04418e18 : nt!CmpAddValueKeyNew+0x69
fffff800`04418c40 fffff800`034c16e3 : 01d4fd21`140179ca fffff800`04418ff0 fffff8a0`050bd948 00000000`00000000 : nt!CmpSetValueKeyNew+0x77
fffff800`04418c90 fffff800`032e6531 : fffff8a0`0df75fa0 fffff800`04418e18 fffffa80`00000004 fffff800`04419210 : nt!CmSetValueKey+0xba3
fffff800`04418dd0 fffff800`030b6bd3 : ffffffff`80000ab0 00000000`00000002 fffffa80`00000000 fffff800`00000004 : nt!NtSetValueKey+0x349
fffff800`04418f00 fffff800`030ac3b0 : fffff800`033fd2a2 fffff800`04419248 fffff880`014a9152 fffffa80`051e12f0 : nt!KiSystemServiceCopyEnd+0x13
fffff800`04419108 fffff800`033fd2a2 : fffff800`04419248 fffff880`014a9152 fffffa80`051e12f0 fffff800`04419270 : nt!KiServiceLinkage
fffff800`04419110 fffff880`014b0d96 : 00000000`00000004 fffffa80`0855a220 00000000`ffffffff 00000000`000007ff : nt!RtlWriteRegistryValue+0x62
fffff800`04419170 fffff880`04eef98d : fffff800`04419270 fffff880`050fec28 00000000`00000000 00000000`00000000 : ndis!NdisWriteConfiguration+0x156
fffff800`044191d0 fffff800`04419270 : fffff880`050fec28 00000000`00000000 00000000`00000000 fffff800`001801a9 : netr28x+0x4b98d
fffff800`044191d8 fffff880`050fec28 : 00000000`00000000 00000000`00000000 fffff800`001801a9 fffffa80`05be11a0 : 0xfffff800`04419270
fffff800`044191e0 00000000`00000000 : 00000000`00000000 fffff800`001801a9 fffffa80`05be11a0 fffff800`00000000 : netr28x+0x25ac28


THREAD_SHA1_HASH_MOD_FUNC: 80858fdf941bd645ff48b6997b30f63ac59926fb

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 394aafee51f76470053fa2102b9df0f0f7df42a3

THREAD_SHA1_HASH_MOD: 5d50876435db08b990ce5928fe5c90526c26b16c

FOLLOWUP_IP:
netr28x+4b98d
fffff880`04eef98d ?? ???

SYMBOL_STACK_INDEX: d

SYMBOL_NAME: netr28x+4b98d

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: netr28x

IMAGE_NAME:  netr28x.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a

STACK_COMMAND: .thread ; .cxr ; kb

FAILURE_BUCKET_ID: X64_0xA_netr28x+4b98d

BUCKET_ID: X64_0xA_netr28x+4b98d

PRIMARY_PROBLEM_CLASS: X64_0xA_netr28x+4b98d

TARGET_TIME: 2019-04-27T17:46:01.000Z

OSBUILD: 7601

OSSERVICEPACK: 1000

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 7

OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2019-03-21 04:38:47

BUILDDATESTAMP_STR: 190320-1700

BUILDLAB_STR: win7sp1_ldr_escrow

BUILDOSVER_STR: 6.1.7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700

ANALYSIS_SESSION_ELAPSED_TIME: 720

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:x64_0xa_netr28x+4b98d

FAILURE_ID_HASH: {a6eb3f60-a5c3-0bd6-051c-41bf4427925d}

Followup: MachineOwner
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff8a000b0b260, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff800032d1738, address which referenced memory

Debugging Details:
------------------

GetUlongPtrFromAddress: unable to read from fffff8000329d300

KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 1

Key : Analysis.Elapsed.Sec
Value: 1

Key : Analysis.Memory.CommitPeak.Mb
Value: 62


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700

SYSTEM_MANUFACTURER: Hewlett-Packard

SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC

SYSTEM_SKU: J4T62EA#AB8

SYSTEM_VERSION: 0991100000000000000600087

BIOS_VENDOR: Insyde

BIOS_VERSION: F.43

BIOS_DATE: 12/19/2017

BASEBOARD_MANUFACTURER: Hewlett-Packard

BASEBOARD_PRODUCT: 2211

BASEBOARD_VERSION: 86.56

DUMP_TYPE: 2

BUGCHECK_P1: fffff8a000b0b260

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff800032d1738

WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff8000329d100
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff8000329d2f0
GetUlongPtrFromAddress: unable to read from fffff8000329d4a8
GetPointerFromAddress: unable to read from fffff8000329d0d8
fffff8a000b0b260 Paged pool

CURRENT_IRQL: 2

FAULTING_IP:
nt!HvpDoAllocateCell+13c
fffff800`032d1738 8907 mov dword ptr [rdi],eax

CPU_COUNT: 4

CPU_MHZ: 6a0

CPU_VENDOR: GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 45

CPU_STEPPING: 1

CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init)

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT

BUGCHECK_STR: 0xA

PROCESS_NAME: System

ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5

ANALYSIS_SESSION_TIME: 06-17-2019 21:16:23.0541

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

TRAP_FRAME:  fffff80000b9b950 -- (.trap 0xfffff80000b9b950)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000ffffffd0 rbx=0000000000000000 rcx=000000000000000c
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800032d1738 rsp=fffff80000b9bae0 rbp=0000000000000030
r8=fffff8a0000512e0 r9=0000000000000005 r10=000000000000023b
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe cy
nt!HvpDoAllocateCell+0x13c:
fffff800`032d1738 8907 mov dword ptr [rdi],eax ds:00000000`00000000=????????
Resetting default scope

LAST_CONTROL_TRANSFER: from fffff800030a1f69 to fffff80003093ba0

STACK_TEXT:
fffff800`00b9b808 fffff800`030a1f69 : 00000000`0000000a fffff8a0`00b0b260 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff800`00b9b810 fffff800`0309fd88 : 00000000`00000001 fffff8a0`00b0b260 00000000`00000000 fffff8a0`00024010 : nt!KiBugCheckDispatch+0x69
fffff800`00b9b950 fffff800`032d1738 : fffff8a0`00024010 fffff8a0`00024010 fffff8a0`000512e0 fffff800`00000000 : nt!KiPageFault+0x448
fffff800`00b9bae0 fffff800`03313d0d : fffff8a0`00024010 00000000`00000000 00000000`00000000 00000000`ffffffff : nt!HvpDoAllocateCell+0x13c
fffff800`00b9bb40 fffff800`03313b9d : 00000000`00000000 fffff8a0`00f38c30 00000000`00000008 fffff800`03301d5c : nt!HvAllocateCell+0x55
fffff800`00b9bb70 fffff800`032c64bf : fffff8a0`00024010 fffff8a0`00024010 fffff8a0`00f46640 fffff800`00b9be18 : nt!CmpAddValueKeyNew+0x69
fffff800`00b9bc40 fffff800`034ac6a3 : 01d4f07a`dd071b78 fffff800`00b9bff0 fffff8a0`04a444a8 00000000`00000000 : nt!CmpSetValueKeyNew+0x77
fffff800`00b9bc90 fffff800`032d1531 : fffff8a0`09c3f770 fffff800`00b9be18 fffffa80`00000004 fffff800`00b9c210 : nt!CmSetValueKey+0xba3
fffff800`00b9bdd0 fffff800`030a1bd3 : ffffffff`80000b54 00000000`00000002 fffffa80`00000000 fffff800`00000004 : nt!NtSetValueKey+0x349
fffff800`00b9bf00 fffff800`030973b0 : fffff800`033e8272 fffff800`00b9c248 fffff880`0151b152 fffffa80`074a45f0 : nt!KiSystemServiceCopyEnd+0x13
fffff800`00b9c108 fffff800`033e8272 : fffff800`00b9c248 fffff880`0151b152 fffffa80`074a45f0 fffff800`00b9c270 : nt!KiServiceLinkage
fffff800`00b9c110 fffff880`01522d96 : 00000000`00000004 fffffa80`05970b70 fffff800`03210800 00000000`000007ff : nt!RtlWriteRegistryValue+0x62
fffff800`00b9c170 fffff880`04eef98d : fffff800`00b9c270 fffff880`050fec28 00000000`00000000 00000000`00000000 : ndis!NdisWriteConfiguration+0x156
fffff800`00b9c1d0 fffff800`00b9c270 : fffff880`050fec28 00000000`00000000 00000000`00000000 fffffa80`001801a9 : netr28x+0x4b98d
fffff800`00b9c1d8 fffff880`050fec28 : 00000000`00000000 00000000`00000000 fffffa80`001801a9 fffffa80`05b741a0 : 0xfffff800`00b9c270
fffff800`00b9c1e0 00000000`00000000 : 00000000`00000000 fffffa80`001801a9 fffffa80`05b741a0 00000000`00000000 : netr28x+0x25ac28


THREAD_SHA1_HASH_MOD_FUNC: 80858fdf941bd645ff48b6997b30f63ac59926fb

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 60ef2d8b5c8aa9ab3d61fd3d0f87c6db127d6016

THREAD_SHA1_HASH_MOD: 5d50876435db08b990ce5928fe5c90526c26b16c

FOLLOWUP_IP:
netr28x+4b98d
fffff880`04eef98d ?? ???

SYMBOL_STACK_INDEX: d

SYMBOL_NAME: netr28x+4b98d

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: netr28x

IMAGE_NAME:  netr28x.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a

STACK_COMMAND: .thread ; .cxr ; kb

FAILURE_BUCKET_ID: X64_0xA_netr28x+4b98d

BUCKET_ID: X64_0xA_netr28x+4b98d

PRIMARY_PROBLEM_CLASS: X64_0xA_netr28x+4b98d

TARGET_TIME: 2019-04-11T15:25:58.000Z

OSBUILD: 7601

OSSERVICEPACK: 1000

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 7

OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2019-03-06 05:38:53

BUILDDATESTAMP_STR: 190305-1700

BUILDLAB_STR: win7sp1_ldr_escrow

BUILDOSVER_STR: 6.1.7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700

ANALYSIS_SESSION_ELAPSED_TIME: 7b6

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:x64_0xa_netr28x+4b98d

FAILURE_ID_HASH: {a6eb3f60-a5c3-0bd6-051c-41bf4427925d}

Followup: MachineOwner
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff8a0067d0004, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff800032dccfe, address which referenced memory

Debugging Details:
------------------

GetUlongPtrFromAddress: unable to read from fffff800032a8300

KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 1

Key : Analysis.Elapsed.Sec
Value: 1

Key : Analysis.Memory.CommitPeak.Mb
Value: 62


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700

SYSTEM_MANUFACTURER: Hewlett-Packard

SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC

SYSTEM_SKU: J4T62EA#AB8

SYSTEM_VERSION: 0991100000000000000600087

BIOS_VENDOR: Insyde

BIOS_VERSION: F.43

BIOS_DATE: 12/19/2017

BASEBOARD_MANUFACTURER: Hewlett-Packard

BASEBOARD_PRODUCT: 2211

BASEBOARD_VERSION: 86.56

DUMP_TYPE: 2

BUGCHECK_P1: fffff8a0067d0004

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff800032dccfe

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800032a8100
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff800032a82f0
GetUlongPtrFromAddress: unable to read from fffff800032a84a8
GetPointerFromAddress: unable to read from fffff800032a80d8
fffff8a0067d0004 Paged pool

CURRENT_IRQL: 2

FAULTING_IP:
nt!HvpScanForFreeCellInViewWindow+16a
fffff800`032dccfe 8b4804 mov ecx,dword ptr [rax+4]

CPU_COUNT: 4

CPU_MHZ: 6a0

CPU_VENDOR: GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 45

CPU_STEPPING: 1

CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init)

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT

BUGCHECK_STR: 0xA

PROCESS_NAME: System

ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5

ANALYSIS_SESSION_TIME: 06-17-2019 21:16:21.0060

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

TRAP_FRAME:  fffff80004421860 -- (.trap 0xfffff80004421860)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8a0067d0000 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000683000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800032dccfe rsp=fffff800044219f0 rbp=0000000000000683
r8=0000000000000083 r9=0000000000000000 r10=fffff8000300b000
r11=0000000000000006 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!HvpScanForFreeCellInViewWindow+0x16a:
fffff800`032dccfe 8b4804 mov ecx,dword ptr [rax+4] ds:fffff8a0`067d0004=00683000
Resetting default scope

LAST_CONTROL_TRANSFER: from fffff800030acf69 to fffff8000309eba0

STACK_TEXT:
fffff800`04421718 fffff800`030acf69 : 00000000`0000000a fffff8a0`067d0004 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff800`04421720 fffff800`030aad88 : 00000000`00000000 fffff8a0`067d0004 fffff800`031ff100 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff800`04421860 fffff800`032dccfe : 00000000`00000000 00000000`003fe000 00000000`00001000 00000000`00000000 : nt!KiPageFault+0x448
fffff800`044219f0 fffff800`032dcb0a : fffff800`00683000 fffff800`00000011 00000000`00000030 fffff800`00000000 : nt!HvpScanForFreeCellInViewWindow+0x16a
fffff800`04421a70 fffff800`032dc66e : 00000000`00000030 fffff800`00000005 ffffffff`00000030 fffff800`00000000 : nt!HvpFindFreeCell+0x1ba
fffff800`04421ae0 fffff800`0331ed1d : fffff8a0`00024010 00000000`00000000 00000000`00000000 00000000`ffffffff : nt!HvpDoAllocateCell+0x72
fffff800`04421b40 fffff800`0331ebad : 00000000`00000000 fffff8a0`061e8c30 00000000`00000008 fffff800`0330cd5c : nt!HvAllocateCell+0x55
fffff800`04421b70 fffff800`032d14bf : fffff8a0`00024010 fffff8a0`00024010 fffff8a0`061f6640 fffff800`04421e18 : nt!CmpAddValueKeyNew+0x69
fffff800`04421c40 fffff800`034b76e3 : 01d4f848`5814f677 fffff800`04421ff0 fffff8a0`02c84b98 00000000`00000000 : nt!CmpSetValueKeyNew+0x77
fffff800`04421c90 fffff800`032dc531 : fffff8a0`04cbac70 fffff800`04421e18 fffffa80`00000004 fffff800`04422210 : nt!CmSetValueKey+0xba3
fffff800`04421dd0 fffff800`030acbd3 : ffffffff`80000de8 00000000`00000002 fffffa80`00000000 fffff800`00000004 : nt!NtSetValueKey+0x349
fffff800`04421f00 fffff800`030a23b0 : fffff800`033f32a2 fffff800`04422248 fffff880`01725152 fffffa80`00000000 : nt!KiSystemServiceCopyEnd+0x13
fffff800`04422108 fffff800`033f32a2 : fffff800`04422248 fffff880`01725152 fffffa80`00000000 fffff800`04422270 : nt!KiServiceLinkage
fffff800`04422110 fffff880`0172cd96 : 00000000`00000004 fffffa80`05d89cd0 fffff800`04422200 00000000`000007ff : nt!RtlWriteRegistryValue+0x62
fffff800`04422170 fffff880`0510f98d : fffff800`04422270 fffff880`0531ec28 00000000`00000000 00000000`00000000 : ndis!NdisWriteConfiguration+0x156
fffff800`044221d0 fffff800`04422270 : fffff880`0531ec28 00000000`00000000 00000000`00000000 fffff880`001801a9 : netr28x+0x4b98d
fffff800`044221d8 fffff880`0531ec28 : 00000000`00000000 00000000`00000000 fffff880`001801a9 fffffa80`05b701a0 : 0xfffff800`04422270
fffff800`044221e0 00000000`00000000 : 00000000`00000000 fffff880`001801a9 fffffa80`05b701a0 0000000e`00000000 : netr28x+0x25ac28


THREAD_SHA1_HASH_MOD_FUNC: a2c5409ed52347576830e095aabe2e20325151e5

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: cf883ff24fbd42e0f8dd5b2bf40fd2071e6cd531

THREAD_SHA1_HASH_MOD: 56bd18a7fabf3c16adac1e3911e9aab0524685a1

FOLLOWUP_IP:
netr28x+4b98d
fffff880`0510f98d ?? ???

SYMBOL_STACK_INDEX: f

SYMBOL_NAME: netr28x+4b98d

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: netr28x

IMAGE_NAME:  netr28x.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a

STACK_COMMAND: .thread ; .cxr ; kb

FAILURE_BUCKET_ID: X64_0xA_netr28x+4b98d

BUCKET_ID: X64_0xA_netr28x+4b98d

PRIMARY_PROBLEM_CLASS: X64_0xA_netr28x+4b98d

TARGET_TIME: 2019-04-21T13:44:29.000Z

OSBUILD: 7601

OSSERVICEPACK: 1000

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 7

OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2019-03-21 04:38:47

BUILDDATESTAMP_STR: 190320-1700

BUILDLAB_STR: win7sp1_ldr_escrow

BUILDOSVER_STR: 6.1.7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700

ANALYSIS_SESSION_ELAPSED_TIME: 704

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:x64_0xa_netr28x+4b98d

FAILURE_ID_HASH: {a6eb3f60-a5c3-0bd6-051c-41bf4427925d}

Followup: MachineOwner
---------

0: kd> lmvm netr28x
start end module name
fffff880`050c4000 fffff880`0532e000 netr28x T (no symbols)
Loaded symbol image file: netr28x.sys
Image path: \SystemRoot\system32\DRIVERS\netr28x.sys
Image name: netr28x.sys
Timestamp: Mon Apr 20 03:22:50 2015 (5534D37A)
CheckSum: 0026BF4B
ImageSize: 0026A000
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4
    Information from resource tables:
Öncelikle Sağol Recep Abi Teşekkür Ederim Cevap Verdiğin İçin Ama Ben Bilgisayarımı windows 10fornat attun fakat kastı oynadıgım oyunda fln arkaplan uygulamalarına kadar kapatmama rağmen geri win7 atsam birşey olurmu birde temiz iso nerden indiririm
Soruna netr28x.sys sebep oluyor. Bu da Ralink 802.11 WiFi sürücüsüdür. Sürücüyü güncelle. Güncellemeyi bilmiyorsan Windows 10'a geç. 7 için destek vermiyoruz.

Kod:
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff8a000d9e618, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff800033386fd, address which referenced memory

Debugging Details:
------------------

GetUlongPtrFromAddress: unable to read from fffff80003304300

KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 1

Key : Analysis.Elapsed.Sec
Value: 1

Key : Analysis.Memory.CommitPeak.Mb
Value: 62


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700

SYSTEM_MANUFACTURER: Hewlett-Packard

SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC

SYSTEM_SKU: J4T62EA#AB8

SYSTEM_VERSION: 0991100000000000000600087

BIOS_VENDOR: Insyde

BIOS_VERSION: F.43

BIOS_DATE: 12/19/2017

BASEBOARD_MANUFACTURER: Hewlett-Packard

BASEBOARD_PRODUCT: 2211

BASEBOARD_VERSION: 86.56

DUMP_TYPE: 2

BUGCHECK_P1: fffff8a000d9e618

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff800033386fd

WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80003304100
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff800033042f0
GetUlongPtrFromAddress: unable to read from fffff800033044a8
GetPointerFromAddress: unable to read from fffff800033040d8
fffff8a000d9e618 Paged pool

CURRENT_IRQL: 2

FAULTING_IP:
nt!HvpDoAllocateCell+101
fffff800`033386fd 89443d00 mov dword ptr [rbp+rdi],eax

CPU_COUNT: 4

CPU_MHZ: 6a0

CPU_VENDOR: GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 45

CPU_STEPPING: 1

CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init)

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT

BUGCHECK_STR: 0xA

PROCESS_NAME: System

ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5

ANALYSIS_SESSION_TIME: 06-17-2019 20:48:20.0473

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

TRAP_FRAME:  fffff80004423950 -- (.trap 0xfffff80004423950)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000000039e8 rbx=0000000000000000 rcx=00000000000005e8
rdx=0000000000000008 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800033386fd rsp=fffff80004423ae0 rbp=0000000000000030
r8=fffff8a000024010 r9=0000000000000005 r10=fffff8a000d9e000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!HvpDoAllocateCell+0x101:
fffff800`033386fd 89443d00 mov dword ptr [rbp+rdi],eax ss:0018:00000000`00000030=????????
Resetting default scope

LAST_CONTROL_TRANSFER: from fffff80003108f69 to fffff800030faba0

STACK_TEXT:
fffff800`04423808 fffff800`03108f69 : 00000000`0000000a fffff8a0`00d9e618 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff800`04423810 fffff800`03106d88 : 00000000`00000001 fffff8a0`00d9e618 00000000`00000000 fffff8a0`00024010 : nt!KiBugCheckDispatch+0x69
fffff800`04423950 fffff800`033386fd : fffff8a0`00024010 fffff8a0`00024010 fffff8a0`00053ae0 00000000`00000000 : nt!KiPageFault+0x448
fffff800`04423ae0 fffff800`0337ad0d : fffff8a0`00024010 00000000`00000000 00000000`00000000 00000000`ffffffff : nt!HvpDoAllocateCell+0x101
fffff800`04423b40 fffff800`0337ab9d : 00000000`00000000 fffff8a0`05585c30 00000000`00000008 fffff800`03368d5c : nt!HvAllocateCell+0x55
fffff800`04423b70 fffff800`0332d4bf : fffff8a0`00024010 fffff8a0`00024010 fffff8a0`05593640 fffff800`04423e18 : nt!CmpAddValueKeyNew+0x69
fffff800`04423c40 fffff800`035136a3 : 01d4f094`f66bc44b fffff800`04423ff0 fffff8a0`0085fa70 00000000`00000000 : nt!CmpSetValueKeyNew+0x77
fffff800`04423c90 fffff800`03338531 : fffff8a0`14bbfca0 fffff800`04423e18 fffffa80`00000004 fffff800`04424210 : nt!CmSetValueKey+0xba3
fffff800`04423dd0 fffff800`03108bd3 : ffffffff`80000bec 00000000`00000002 fffffa80`00000000 fffff800`00000004 : nt!NtSetValueKey+0x349
fffff800`04423f00 fffff800`030fe3b0 : fffff800`0344f272 fffff800`04424248 fffff880`014b9152 00000000`539f0000 : nt!KiSystemServiceCopyEnd+0x13
fffff800`04424108 fffff800`0344f272 : fffff800`04424248 fffff880`014b9152 00000000`539f0000 fffff800`04424270 : nt!KiServiceLinkage
fffff800`04424110 fffff880`014c0d96 : 00000000`00000004 fffffa80`071c5250 00000000`00000000 00000000`000007ff : nt!RtlWriteRegistryValue+0x62
fffff800`04424170 fffff880`04f2698d : fffff800`04424270 fffff880`05135c28 00000000`00000000 00000000`00000000 : ndis!NdisWriteConfiguration+0x156
fffff800`044241d0 fffff800`04424270 : fffff880`05135c28 00000000`00000000 00000000`00000000 fffff800`001801a9 : netr28x+0x4b98d
fffff800`044241d8 fffff880`05135c28 : 00000000`00000000 00000000`00000000 fffff800`001801a9 fffffa80`059cb1a0 : 0xfffff800`04424270
fffff800`044241e0 00000000`00000000 : 00000000`00000000 fffff800`001801a9 fffffa80`059cb1a0 fffff800`00000000 : netr28x+0x25ac28


THREAD_SHA1_HASH_MOD_FUNC: 80858fdf941bd645ff48b6997b30f63ac59926fb

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 394aafee51f76470053fa2102b9df0f0f7df42a3

THREAD_SHA1_HASH_MOD: 5d50876435db08b990ce5928fe5c90526c26b16c

FOLLOWUP_IP:
netr28x+4b98d
fffff880`04f2698d ?? ???

SYMBOL_STACK_INDEX: d

SYMBOL_NAME: netr28x+4b98d

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: netr28x

IMAGE_NAME:  netr28x.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a

STACK_COMMAND: .thread ; .cxr ; kb

FAILURE_BUCKET_ID: X64_0xA_netr28x+4b98d

BUCKET_ID: X64_0xA_netr28x+4b98d

PRIMARY_PROBLEM_CLASS: X64_0xA_netr28x+4b98d

TARGET_TIME: 2019-04-11T18:32:48.000Z

OSBUILD: 7601

OSSERVICEPACK: 1000

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 7

OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2019-03-06 05:38:53

BUILDDATESTAMP_STR: 190305-1700

BUILDLAB_STR: win7sp1_ldr_escrow

BUILDOSVER_STR: 6.1.7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700

ANALYSIS_SESSION_ELAPSED_TIME: 7ae

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:x64_0xa_netr28x+4b98d

FAILURE_ID_HASH: {a6eb3f60-a5c3-0bd6-051c-41bf4427925d}

Followup: MachineOwner
---------


INVALID_PROCESS_ATTACH_ATTEMPT (5)
Arguments:
Arg1: fffffa80042b49b0
Arg2: fffffa80050a0160
Arg3: 0000000000000000
Arg4: 0000000000000001

Debugging Details:
------------------

GetUlongPtrFromAddress: unable to read from fffff800032a0300

KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 2

Key : Analysis.Elapsed.Sec
Value: 2

Key : Analysis.Memory.CommitPeak.Mb
Value: 62


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700

SYSTEM_MANUFACTURER: Hewlett-Packard

SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC

SYSTEM_SKU: J4T62EA#AB8

SYSTEM_VERSION: 0991100000000000000600087

BIOS_VENDOR: Insyde

BIOS_VERSION: F.43

BIOS_DATE: 12/19/2017

BASEBOARD_MANUFACTURER: Hewlett-Packard

BASEBOARD_PRODUCT: 2211

BASEBOARD_VERSION: 86.56

DUMP_TYPE: 2

BUGCHECK_P1: fffffa80042b49b0

BUGCHECK_P2: fffffa80050a0160

BUGCHECK_P3: 0

BUGCHECK_P4: 1

CPU_COUNT: 4

CPU_MHZ: 6a0

CPU_VENDOR: GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 45

CPU_STEPPING: 1

CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init)

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT

BUGCHECK_STR: 0x5

PROCESS_NAME: PointBlank.exe

CURRENT_IRQL: 2

ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5

ANALYSIS_SESSION_TIME: 06-17-2019 20:57:04.0108

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

DPC_STACK_BASE: FFFFF80004428FB0

LOCK_ADDRESS: fffff80003273240 -- (!locks fffff80003273240)
Cannot get _ERESOURCE type

Resource @ nt!PiEngineLock (0xfffff80003273240) Available
1 total locks

PNP_TRIAGE_DATA:
Lock address : 0xfffff80003273240
Thread Count : 0
Thread address: 0x0000000000000000
Thread wait : 0x0

LAST_CONTROL_TRANSFER: from fffff80003045602 to fffff80003096ba0

STACK_TEXT:
fffff800`04427cc8 fffff800`03045602 : 00000000`00000005 fffffa80`042b49b0 fffffa80`050a0160 00000000`00000000 : nt!KeBugCheckEx
fffff800`04427cd0 fffff800`032ee127 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeStackAttachProcess+0x52
fffff800`04427d50 fffff800`032ee4bf : 00000000`00000000 fffff8a0`00000000 fffff8a0`00001910 00000000`00000000 : nt!ObpDecrementHandleCount+0x177
fffff800`04427dd0 fffff800`032ee1e4 : 00000000`00000d08 fffffa80`050a0160 fffff8a0`00001910 00000000`00000d08 : nt!ObpCloseHandleTableEntry+0xaf
fffff800`04427e60 fffff800`030a4bd3 : fffffa80`04b87b50 fffff800`04427f30 fffff800`03358230 fffff800`032e476a : nt!ObpCloseHandle+0x94
fffff800`04427eb0 fffff800`0309a3b0 : fffff800`03331da3 fffffa80`04ea4a10 fffff800`03358230 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
fffff800`04428048 fffff800`03331da3 : fffffa80`04ea4a10 fffff800`03358230 00000000`00000000 00000000`00000000 : nt!KiServiceLinkage
fffff800`04428050 fffff800`0333baa8 : fffffa80`04ea4a10 00000000`00000001 fffffa80`04ea2740 00000000`00000000 : nt!PiGetDeviceRegistryProperty+0xab
fffff800`044281b0 fffff800`03330ac0 : fffffa80`04ea4a10 fffffa80`04ea4a10 00000000`00000000 00000000`00000000 : nt!IoGetDeviceProperty+0xbc
fffff800`04428290 fffff800`03341f81 : 00000000`ffff0000 fffffa80`0802b150 fffff880`01553110 fffffa80`05bb6220 : nt!IopOpenOrCreateDeviceRegistryKey+0x14c
fffff800`04428450 fffff880`01598152 : 00000000`c0000001 fffff800`044285e0 00000000`00000000 00000000`000007ff : nt!IoOpenDeviceRegistryKey+0x11
fffff800`04428490 fffff880`01503b34 : fffff800`044285e0 fffff800`044285b8 fffffa80`05c461a0 fffff800`035e0000 : ndis!NdisOpenConfiguration+0xb2
fffff800`044284d0 fffff880`0508b94f : fffffa80`00000000 fffff800`044285e0 fffff880`0529ac28 00000000`00000000 : ndis!NdisOpenConfigurationEx+0xa4
fffff800`04428540 fffffa80`00000000 : fffff800`044285e0 fffff880`0529ac28 00000000`00000000 00000000`001801a9 : netr28x+0x4b94f
fffff800`04428548 fffff800`044285e0 : fffff880`0529ac28 00000000`00000000 00000000`001801a9 fffffa80`05c461a0 : 0xfffffa80`00000000
fffff800`04428550 fffff880`0529ac28 : 00000000`00000000 00000000`001801a9 fffffa80`05c461a0 00000000`00000000 : 0xfffff800`044285e0
fffff800`04428558 00000000`00000000 : 00000000`001801a9 fffffa80`05c461a0 00000000`00000000 fffffa80`0742b540 : netr28x+0x25ac28


THREAD_SHA1_HASH_MOD_FUNC: 1764d353450a941fbc74295279ec02651c3d9814

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: bdc70d393af014c177e84e60c668cc911acaf71f

THREAD_SHA1_HASH_MOD: 9a9dca34541ae91666e3989df373f06b6e683623

FOLLOWUP_IP:
netr28x+4b94f
fffff880`0508b94f ?? ???

SYMBOL_STACK_INDEX: d

SYMBOL_NAME: netr28x+4b94f

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: netr28x

IMAGE_NAME:  netr28x.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a

STACK_COMMAND: .thread ; .cxr ; kb

FAILURE_BUCKET_ID: X64_0x5_netr28x+4b94f

BUCKET_ID: X64_0x5_netr28x+4b94f

PRIMARY_PROBLEM_CLASS: X64_0x5_netr28x+4b94f

TARGET_TIME: 2019-05-01T21:53:50.000Z

OSBUILD: 7601

OSSERVICEPACK: 1000

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 7

OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2019-03-21 04:38:47

BUILDDATESTAMP_STR: 190320-1700

BUILDLAB_STR: win7sp1_ldr_escrow

BUILDOSVER_STR: 6.1.7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700

ANALYSIS_SESSION_ELAPSED_TIME: 8cb

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:x64_0x5_netr28x+4b94f

FAILURE_ID_HASH: {43753b0b-e234-1a01-8468-7eed644d41ea}

Followup:     MachineOwner
INVALID_PROCESS_ATTACH_ATTEMPT (5)
Arguments:
Arg1: fffffa80042ce9b0
Arg2: fffffa8005d11370
Arg3: 0000000000000000
Arg4: 0000000000000001

Debugging Details:
------------------

GetUlongPtrFromAddress: unable to read from fffff800032b3300

KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 2

Key : Analysis.Elapsed.Sec
Value: 2

Key : Analysis.Memory.CommitPeak.Mb
Value: 62


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700

SYSTEM_MANUFACTURER: Hewlett-Packard

SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC

SYSTEM_SKU: J4T62EA#AB8

SYSTEM_VERSION: 0991100000000000000600087

BIOS_VENDOR: Insyde

BIOS_VERSION: F.43

BIOS_DATE: 12/19/2017

BASEBOARD_MANUFACTURER: Hewlett-Packard

BASEBOARD_PRODUCT: 2211

BASEBOARD_VERSION: 86.56

DUMP_TYPE: 2

BUGCHECK_P1: fffffa80042ce9b0

BUGCHECK_P2: fffffa8005d11370

BUGCHECK_P3: 0

BUGCHECK_P4: 1

CPU_COUNT: 4

CPU_MHZ: 6a0

CPU_VENDOR: GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 45

CPU_STEPPING: 1

CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init)

CUSTOMER_CRASH_COUNT: 2

DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT

BUGCHECK_STR: 0x5

PROCESS_NAME: audiodg.exe

CURRENT_IRQL: 2

ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5

ANALYSIS_SESSION_TIME: 06-17-2019 20:49:02.0621

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

DPC_STACK_BASE: FFFFF80000BA2FB0

LOCK_ADDRESS: fffff80003286240 -- (!locks fffff80003286240)
Cannot get _ERESOURCE type

Resource @ nt!PiEngineLock (0xfffff80003286240) Available
1 total locks

PNP_TRIAGE_DATA:
Lock address : 0xfffff80003286240
Thread Count : 0
Thread address: 0x0000000000000000
Thread wait : 0x0

LAST_CONTROL_TRANSFER: from fffff80003058602 to fffff800030a9ba0

STACK_TEXT:
fffff800`00ba1cc8 fffff800`03058602 : 00000000`00000005 fffffa80`042ce9b0 fffffa80`05d11370 00000000`00000000 : nt!KeBugCheckEx
fffff800`00ba1cd0 fffff800`03301127 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeStackAttachProcess+0x52
fffff800`00ba1d50 fffff800`033014bf : 00000000`00000000 fffff8a0`00000000 fffff8a0`00001910 00000000`00000000 : nt!ObpDecrementHandleCount+0x177
fffff800`00ba1dd0 fffff800`033011e4 : 00000000`00000e48 fffffa80`05d11370 fffff8a0`00001910 00000000`00000e48 : nt!ObpCloseHandleTableEntry+0xaf
fffff800`00ba1e60 fffff800`030b7bd3 : fffffa80`05d7ba00 fffff800`00ba1f30 fffff800`0336b230 fffff800`032f776a : nt!ObpCloseHandle+0x94
fffff800`00ba1eb0 fffff800`030ad3b0 : fffff800`03344da3 fffffa80`04e9e060 fffff800`0336b230 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
fffff800`00ba2048 fffff800`03344da3 : fffffa80`04e9e060 fffff800`0336b230 00000000`00000000 00000000`00000000 : nt!KiServiceLinkage
fffff800`00ba2050 fffff800`0334eaa8 : fffffa80`04e9e060 00000000`00000001 fffffa80`04e9d6e0 00000000`00000000 : nt!PiGetDeviceRegistryProperty+0xab
fffff800`00ba21b0 fffff800`03343ac0 : fffffa80`04e9e060 fffffa80`04e9e060 00000000`00000000 00000000`00000000 : nt!IoGetDeviceProperty+0xbc
fffff800`00ba2290 fffff800`03354f81 : 00000000`ffff0000 fffffa80`05086440 fffff880`01482110 fffffa80`05b713f0 : nt!IopOpenOrCreateDeviceRegistryKey+0x14c
fffff800`00ba2450 fffff880`014c7152 : fffffa80`04a3fd50 fffff800`00ba25e0 fffffa80`05f48a78 00000000`000007ff : nt!IoOpenDeviceRegistryKey+0x11
fffff800`00ba2490 fffff880`01432b34 : fffff800`00ba25e0 fffff800`00ba25b8 fffffa80`05b6d1a0 fffff880`014dd21d : ndis!NdisOpenConfiguration+0xb2
fffff800`00ba24d0 fffff880`0512a94f : fffffa80`00000000 fffff800`00ba25e0 fffff880`05339c28 00000000`00000000 : ndis!NdisOpenConfigurationEx+0xa4
fffff800`00ba2540 fffffa80`00000000 : fffff800`00ba25e0 fffff880`05339c28 00000000`00000000 00000000`001801a9 : netr28x+0x4b94f
fffff800`00ba2548 fffff800`00ba25e0 : fffff880`05339c28 00000000`00000000 00000000`001801a9 fffffa80`05b6d1a0 : 0xfffffa80`00000000
fffff800`00ba2550 fffff880`05339c28 : 00000000`00000000 00000000`001801a9 fffffa80`05b6d1a0 fffffa80`00000000 : 0xfffff800`00ba25e0
fffff800`00ba2558 00000000`00000000 : 00000000`001801a9 fffffa80`05b6d1a0 fffffa80`00000000 fffff880`05136e2e : netr28x+0x25ac28


THREAD_SHA1_HASH_MOD_FUNC: 1764d353450a941fbc74295279ec02651c3d9814

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: bdc70d393af014c177e84e60c668cc911acaf71f

THREAD_SHA1_HASH_MOD: 9a9dca34541ae91666e3989df373f06b6e683623

FOLLOWUP_IP:
netr28x+4b94f
fffff880`0512a94f ?? ???

SYMBOL_STACK_INDEX: d

SYMBOL_NAME: netr28x+4b94f

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: netr28x

IMAGE_NAME:  netr28x.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a

STACK_COMMAND: .thread ; .cxr ; kb

FAILURE_BUCKET_ID: X64_0x5_netr28x+4b94f

BUCKET_ID: X64_0x5_netr28x+4b94f

PRIMARY_PROBLEM_CLASS: X64_0x5_netr28x+4b94f

TARGET_TIME: 2019-04-27T20:53:09.000Z

OSBUILD: 7601

OSSERVICEPACK: 1000

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 7

OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2019-03-21 04:38:47

BUILDDATESTAMP_STR: 190320-1700

BUILDLAB_STR: win7sp1_ldr_escrow

BUILDOSVER_STR: 6.1.7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700

ANALYSIS_SESSION_ELAPSED_TIME: 89c

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:x64_0x5_netr28x+4b94f

FAILURE_ID_HASH: {43753b0b-e234-1a01-8468-7eed644d41ea}

Followup: MachineOwner
---------

INVALID_PROCESS_ATTACH_ATTEMPT (5)
Arguments:
Arg1: fffffa80042b49b0
Arg2: fffffa8004ee55f0
Arg3: 0000000000000000
Arg4: 0000000000000001

Debugging Details:
------------------

GetUlongPtrFromAddress: unable to read from fffff800032b0300

KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 2

Key : Analysis.Elapsed.Sec
Value: 2

Key : Analysis.Memory.CommitPeak.Mb
Value: 62


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700

SYSTEM_MANUFACTURER: Hewlett-Packard

SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC

SYSTEM_SKU: J4T62EA#AB8

SYSTEM_VERSION: 0991100000000000000600087

BIOS_VENDOR: Insyde

BIOS_VERSION: F.43

BIOS_DATE: 12/19/2017

BASEBOARD_MANUFACTURER: Hewlett-Packard

BASEBOARD_PRODUCT: 2211

BASEBOARD_VERSION: 86.56

DUMP_TYPE: 2

BUGCHECK_P1: fffffa80042b49b0

BUGCHECK_P2: fffffa8004ee55f0

BUGCHECK_P3: 0

BUGCHECK_P4: 1

CPU_COUNT: 4

CPU_MHZ: 6a0

CPU_VENDOR: GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 45

CPU_STEPPING: 1

CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init)

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT

BUGCHECK_STR: 0x5

PROCESS_NAME: PointBlank.exe

CURRENT_IRQL: 2

ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5

ANALYSIS_SESSION_TIME: 06-17-2019 20:48:58.0829

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

DPC_STACK_BASE: FFFFF8000441FFB0

LOCK_ADDRESS: fffff80003283240 -- (!locks fffff80003283240)
Cannot get _ERESOURCE type

Resource @ nt!PiEngineLock (0xfffff80003283240) Available
1 total locks

PNP_TRIAGE_DATA:
Lock address : 0xfffff80003283240
Thread Count : 0
Thread address: 0x0000000000000000
Thread wait : 0x0

LAST_CONTROL_TRANSFER: from fffff80003055602 to fffff800030a6ba0

STACK_TEXT:
fffff800`0441ecc8 fffff800`03055602 : 00000000`00000005 fffffa80`042b49b0 fffffa80`04ee55f0 00000000`00000000 : nt!KeBugCheckEx
fffff800`0441ecd0 fffff800`032fe127 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeStackAttachProcess+0x52
fffff800`0441ed50 fffff800`032fe4bf : 00000000`00000000 fffff8a0`00000000 fffff8a0`00001910 00000000`00000000 : nt!ObpDecrementHandleCount+0x177
fffff800`0441edd0 fffff800`032fe1e4 : 00000000`00000a80 fffffa80`04ee55f0 fffff8a0`00001910 00000000`00000a80 : nt!ObpCloseHandleTableEntry+0xaf
fffff800`0441ee60 fffff800`030b4bd3 : fffffa80`0861e940 fffff800`0441ef30 fffff800`03368230 fffff800`032f476a : nt!ObpCloseHandle+0x94
fffff800`0441eeb0 fffff800`030aa3b0 : fffff800`03341da3 fffffa80`04d31a10 fffff800`03368230 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
fffff800`0441f048 fffff800`03341da3 : fffffa80`04d31a10 fffff800`03368230 00000000`00000000 00000000`00000000 : nt!KiServiceLinkage
fffff800`0441f050 fffff800`0334baa8 : fffffa80`04d31a10 00000000`00000001 fffffa80`04d2d740 00000000`00000000 : nt!PiGetDeviceRegistryProperty+0xab
fffff800`0441f1b0 fffff800`03340ac0 : fffffa80`04d31a10 fffffa80`04d31a10 00000000`00000000 00000000`00000000 : nt!IoGetDeviceProperty+0xbc
fffff800`0441f290 fffff800`03351f81 : 00000000`ffff0000 fffffa80`046a8bd0 fffff880`014c6110 fffffa80`05a70cf0 : nt!IopOpenOrCreateDeviceRegistryKey+0x14c
fffff800`0441f450 fffff880`0150b152 : fffffa80`07393890 fffff800`0441f5e0 00000000`0000001f 00000000`000007ff : nt!IoOpenDeviceRegistryKey+0x11
fffff800`0441f490 fffff880`01476b34 : fffff800`0441f5e0 fffff800`0441f5b8 fffffa80`05a6f1a0 fffff800`035f7be3 : ndis!NdisOpenConfiguration+0xb2
fffff800`0441f4d0 fffff880`04e7694f : fffffa80`00000000 fffff800`0441f5e0 fffff880`05085c28 00000000`00000000 : ndis!NdisOpenConfigurationEx+0xa4
fffff800`0441f540 fffffa80`00000000 : fffff800`0441f5e0 fffff880`05085c28 00000000`00000000 00000000`001801a9 : netr28x+0x4b94f
fffff800`0441f548 fffff800`0441f5e0 : fffff880`05085c28 00000000`00000000 00000000`001801a9 fffffa80`05a6f1a0 : 0xfffffa80`00000000
fffff800`0441f550 fffff880`05085c28 : 00000000`00000000 00000000`001801a9 fffffa80`05a6f1a0 00000000`00000000 : 0xfffff800`0441f5e0
fffff800`0441f558 00000000`00000000 : 00000000`001801a9 fffffa80`05a6f1a0 00000000`00000000 fffffa80`0452e670 : netr28x+0x25ac28


THREAD_SHA1_HASH_MOD_FUNC: 1764d353450a941fbc74295279ec02651c3d9814

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: bdc70d393af014c177e84e60c668cc911acaf71f

THREAD_SHA1_HASH_MOD: 9a9dca34541ae91666e3989df373f06b6e683623

FOLLOWUP_IP:
netr28x+4b94f
fffff880`04e7694f ?? ???

SYMBOL_STACK_INDEX: d

SYMBOL_NAME: netr28x+4b94f

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: netr28x

IMAGE_NAME:  netr28x.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a

STACK_COMMAND: .thread ; .cxr ; kb

FAILURE_BUCKET_ID: X64_0x5_netr28x+4b94f

BUCKET_ID: X64_0x5_netr28x+4b94f

PRIMARY_PROBLEM_CLASS: X64_0x5_netr28x+4b94f

TARGET_TIME: 2019-04-21T09:57:22.000Z

OSBUILD: 7601

OSSERVICEPACK: 1000

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 7

OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2019-03-21 04:38:47

BUILDDATESTAMP_STR: 190320-1700

BUILDLAB_STR: win7sp1_ldr_escrow

BUILDOSVER_STR: 6.1.7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700

ANALYSIS_SESSION_ELAPSED_TIME: 8dc

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:x64_0x5_netr28x+4b94f

FAILURE_ID_HASH: {43753b0b-e234-1a01-8468-7eed644d41ea}

Followup: MachineOwner
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff8a000f95c5c, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8000334077c, address which referenced memory

Debugging Details:
------------------

GetUlongPtrFromAddress: unable to read from fffff800032f7300

KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 1

Key : Analysis.Elapsed.Sec
Value: 2

Key : Analysis.Memory.CommitPeak.Mb
Value: 62


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700

SYSTEM_MANUFACTURER: Hewlett-Packard

SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC

SYSTEM_SKU: J4T62EA#AB8

SYSTEM_VERSION: 0991100000000000000600087

BIOS_VENDOR: Insyde

BIOS_VERSION: F.43

BIOS_DATE: 12/19/2017

BASEBOARD_MANUFACTURER: Hewlett-Packard

BASEBOARD_PRODUCT: 2211

BASEBOARD_VERSION: 86.56

DUMP_TYPE: 2

BUGCHECK_P1: fffff8a000f95c5c

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8000334077c

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800032f7100
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff800032f72f0
GetUlongPtrFromAddress: unable to read from fffff800032f74a8
GetPointerFromAddress: unable to read from fffff800032f70d8
fffff8a000f95c5c Paged pool

CURRENT_IRQL: 2

FAULTING_IP:
nt!CmpFindValueByNameFromCache+12c
fffff800`0334077c 41f6401001 test byte ptr [r8+10h],1

CPU_COUNT: 4

CPU_MHZ: 6a0

CPU_VENDOR: GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 45

CPU_STEPPING: 1

CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init)

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT

BUGCHECK_STR: 0xA

PROCESS_NAME: System

ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5

ANALYSIS_SESSION_TIME: 06-17-2019 20:48:55.0594

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

DPC_STACK_BASE: FFFFF80000BA2FB0

TRAP_FRAME:  fffff80000ba1d00 -- (.trap 0xfffff80000ba1d00)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000c64c48 rbx=0000000000000000 rcx=fffff80000ba1fa1
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8000334077c rsp=fffff80000ba1e90 rbp=fffff80000ba2360
r8=fffff8a000f95c4c r9=000000000000ffff r10=fffffa8005aaacfc
r11=fffff8a0018b9b46 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!CmpFindValueByNameFromCache+0x12c:
fffff800`0334077c 41f6401001 test byte ptr [r8+10h],1 ds:fffff8a0`00f95c5c=01
Resetting default scope

LAST_CONTROL_TRANSFER: from fffff800030fbf69 to fffff800030edba0

STACK_TEXT:
fffff800`00ba1bb8 fffff800`030fbf69 : 00000000`0000000a fffff8a0`00f95c5c 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff800`00ba1bc0 fffff800`030f9d88 : 00000000`00000000 fffff8a0`00f95c5c fffffa80`05191000 fffff8a0`00024010 : nt!KiBugCheckDispatch+0x69
fffff800`00ba1d00 fffff800`0334077c : fffff8a0`00024010 fffff8a0`00024010 fffff8a0`00048c80 00000000`00000000 : nt!KiPageFault+0x448
fffff800`00ba1e90 fffff800`03323c38 : fffff8a0`15bf1de8 fffff800`00ba2188 fffff800`00ba1fd0 fffff800`00ba1fb8 : nt!CmpFindValueByNameFromCache+0x12c
fffff800`00ba1f60 fffff800`035061e7 : fffff8a0`15bf1de8 01d4f7b8`449491c9 fffff8a0`15bf1de8 00000000`00000000 : nt!CmpCompareNewValueDataAgainstKCBCache+0x78
fffff800`00ba2000 fffff800`0332b531 : fffff8a0`1f297040 fffff800`00ba2188 fffffa80`00000004 fffff800`00ba2580 : nt!CmSetValueKey+0x6a7
fffff800`00ba2140 fffff800`030fbbd3 : ffffffff`80000cc8 00000000`00000002 fffffa80`00000000 fffff800`00000004 : nt!NtSetValueKey+0x349
fffff800`00ba2270 fffff800`030f13b0 : fffff800`034422a2 fffff800`00ba25b8 fffff880`01514152 00000000`c0000001 : nt!KiSystemServiceCopyEnd+0x13
fffff800`00ba2478 fffff800`034422a2 : fffff800`00ba25b8 fffff880`01514152 00000000`c0000001 fffff800`00ba25e0 : nt!KiServiceLinkage
fffff800`00ba2480 fffff880`0151bd96 : 00000000`00000004 fffffa80`05aaacf0 00000100`00000000 00000000`000007ff : nt!RtlWriteRegistryValue+0x62
fffff800`00ba24e0 fffff880`0514a98d : fffff800`00ba25e0 fffff880`05359c28 00000000`00000000 00000000`00000000 : ndis!NdisWriteConfiguration+0x156
fffff800`00ba2540 fffff800`00ba25e0 : fffff880`05359c28 00000000`00000000 00000000`00000000 fffffa80`001801a9 : netr28x+0x4b98d
fffff800`00ba2548 fffff880`05359c28 : 00000000`00000000 00000000`00000000 fffffa80`001801a9 fffffa80`05b411a0 : 0xfffff800`00ba25e0
fffff800`00ba2550 00000000`00000000 : 00000000`00000000 fffffa80`001801a9 fffffa80`05b411a0 00000000`00000000 : netr28x+0x25ac28


THREAD_SHA1_HASH_MOD_FUNC: 935105e89958188e75032d802c31088ef212f1d5

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: d6275099b99a3ef75c037e31f081aba5025e8f89

THREAD_SHA1_HASH_MOD: 7921e317582c7f98a7f13cfbcd3c02a86fdcafec

FOLLOWUP_IP:
netr28x+4b98d
fffff880`0514a98d ?? ???

SYMBOL_STACK_INDEX: b

SYMBOL_NAME: netr28x+4b98d

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: netr28x

IMAGE_NAME:  netr28x.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a

STACK_COMMAND: .thread ; .cxr ; kb

FAILURE_BUCKET_ID: X64_0xA_netr28x+4b98d

BUCKET_ID: X64_0xA_netr28x+4b98d

PRIMARY_PROBLEM_CLASS: X64_0xA_netr28x+4b98d

TARGET_TIME: 2019-04-20T20:33:09.000Z

OSBUILD: 7601

OSSERVICEPACK: 1000

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 7

OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2019-03-21 04:38:47

BUILDDATESTAMP_STR: 190320-1700

BUILDLAB_STR: win7sp1_ldr_escrow

BUILDOSVER_STR: 6.1.7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700

ANALYSIS_SESSION_ELAPSED_TIME: 7e6

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:x64_0xa_netr28x+4b98d

FAILURE_ID_HASH: {a6eb3f60-a5c3-0bd6-051c-41bf4427925d}

Followup: MachineOwner
---------


INVALID_PROCESS_ATTACH_ATTEMPT (5)
Arguments:
Arg1: fffffa80042d09b0
Arg2: fffffa80075e8060
Arg3: 0000000000000000
Arg4: 0000000000000001

Debugging Details:
------------------

GetUlongPtrFromAddress: unable to read from fffff800032af300

KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 2

Key : Analysis.Elapsed.Sec
Value: 2

Key : Analysis.Memory.CommitPeak.Mb
Value: 62


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700

SYSTEM_MANUFACTURER: Hewlett-Packard

SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC

SYSTEM_SKU: J4T62EA#AB8

SYSTEM_VERSION: 0991100000000000000600087

BIOS_VENDOR: Insyde

BIOS_VERSION: F.43

BIOS_DATE: 12/19/2017

BASEBOARD_MANUFACTURER: Hewlett-Packard

BASEBOARD_PRODUCT: 2211

BASEBOARD_VERSION: 86.56

DUMP_TYPE: 2

BUGCHECK_P1: fffffa80042d09b0

BUGCHECK_P2: fffffa80075e8060

BUGCHECK_P3: 0

BUGCHECK_P4: 1

CPU_COUNT: 4

CPU_MHZ: 6a0

CPU_VENDOR: GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 45

CPU_STEPPING: 1

CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init)

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT

BUGCHECK_STR: 0x5

PROCESS_NAME: audiodg.exe

CURRENT_IRQL: 2

ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5

ANALYSIS_SESSION_TIME: 06-17-2019 20:48:52.0836

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

DPC_STACK_BASE: FFFFF8000441FFB0

LOCK_ADDRESS: fffff80003282240 -- (!locks fffff80003282240)
Cannot get _ERESOURCE type

Resource @ nt!PiEngineLock (0xfffff80003282240) Available
1 total locks

PNP_TRIAGE_DATA:
Lock address : 0xfffff80003282240
Thread Count : 0
Thread address: 0x0000000000000000
Thread wait : 0x0

LAST_CONTROL_TRANSFER: from fffff800030545f2 to fffff800030a5ba0

STACK_TEXT:
fffff800`0441ecc8 fffff800`030545f2 : 00000000`00000005 fffffa80`042d09b0 fffffa80`075e8060 00000000`00000000 : nt!KeBugCheckEx
fffff800`0441ecd0 fffff800`032fd127 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeStackAttachProcess+0x52
fffff800`0441ed50 fffff800`032fd4bf : 00000000`00000000 fffff8a0`00000000 fffff8a0`00001910 00000000`00000000 : nt!ObpDecrementHandleCount+0x177
fffff800`0441edd0 fffff800`032fd1e4 : 00000000`000007c8 fffffa80`075e8060 fffff8a0`00001910 00000000`000007c8 : nt!ObpCloseHandleTableEntry+0xaf
fffff800`0441ee60 fffff800`030b3bd3 : fffffa80`044dab50 fffff800`0441ef30 fffff800`03367200 fffff800`032f376a : nt!ObpCloseHandle+0x94
fffff800`0441eeb0 fffff800`030a93b0 : fffff800`03340d73 fffffa80`04ddc060 fffff800`03367200 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
fffff800`0441f048 fffff800`03340d73 : fffffa80`04ddc060 fffff800`03367200 00000000`00000000 00000000`00000000 : nt!KiServiceLinkage
fffff800`0441f050 fffff800`0334aa78 : fffffa80`04ddc060 00000000`00000001 fffffa80`04dd96e0 00000000`00000000 : nt!PiGetDeviceRegistryProperty+0xab
fffff800`0441f1b0 fffff800`0333fa90 : fffffa80`04ddc060 fffffa80`04ddc060 00000000`00000000 00000000`00000000 : nt!IoGetDeviceProperty+0xbc
fffff800`0441f290 fffff800`03350f51 : 00000000`ffff0000 fffffa80`05a69770 fffff880`014e7110 fffffa80`05ca3270 : nt!IopOpenOrCreateDeviceRegistryKey+0x14c
fffff800`0441f450 fffff880`0152c152 : fffffa80`071bfdc0 fffff800`0441f5e0 00000000`0000001f 00000000`000007ff : nt!IoOpenDeviceRegistryKey+0x11
fffff800`0441f490 fffff880`01497b34 : fffff800`0441f5e0 fffff800`0441f5b8 fffffa80`05c0a1a0 fffff880`0646eab0 : ndis!NdisOpenConfiguration+0xb2
fffff800`0441f4d0 fffff880`04f0c94f : fffffa80`00000000 fffff800`0441f5e0 fffff880`0511bc28 00000000`00000000 : ndis!NdisOpenConfigurationEx+0xa4
fffff800`0441f540 fffffa80`00000000 : fffff800`0441f5e0 fffff880`0511bc28 00000000`00000000 fffffa80`001801a9 : netr28x+0x4b94f
fffff800`0441f548 fffff800`0441f5e0 : fffff880`0511bc28 00000000`00000000 fffffa80`001801a9 fffffa80`05c0a1a0 : 0xfffffa80`00000000
fffff800`0441f550 fffff880`0511bc28 : 00000000`00000000 fffffa80`001801a9 fffffa80`05c0a1a0 00000000`00000000 : 0xfffff800`0441f5e0
fffff800`0441f558 00000000`00000000 : fffffa80`001801a9 fffffa80`05c0a1a0 00000000`00000000 fffff880`00e5028c : netr28x+0x25ac28


THREAD_SHA1_HASH_MOD_FUNC: 1764d353450a941fbc74295279ec02651c3d9814

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: bdc70d393af014c177e84e60c668cc911acaf71f

THREAD_SHA1_HASH_MOD: 9a9dca34541ae91666e3989df373f06b6e683623

FOLLOWUP_IP:
netr28x+4b94f
fffff880`04f0c94f ?? ???

SYMBOL_STACK_INDEX: d

SYMBOL_NAME: netr28x+4b94f

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: netr28x

IMAGE_NAME:  netr28x.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a

STACK_COMMAND: .thread ; .cxr ; kb

FAILURE_BUCKET_ID: X64_0x5_netr28x+4b94f

BUCKET_ID: X64_0x5_netr28x+4b94f

PRIMARY_PROBLEM_CLASS: X64_0x5_netr28x+4b94f

TARGET_TIME: 2019-04-11T15:07:27.000Z

OSBUILD: 7601

OSSERVICEPACK: 1000

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 7

OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2019-03-06 05:38:53

BUILDDATESTAMP_STR: 190305-1700

BUILDLAB_STR: win7sp1_ldr_escrow

BUILDOSVER_STR: 6.1.7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700

ANALYSIS_SESSION_ELAPSED_TIME: 8c6

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:x64_0x5_netr28x+4b94f

FAILURE_ID_HASH: {43753b0b-e234-1a01-8468-7eed644d41ea}

Followup:     MachineOwner


INVALID_PROCESS_ATTACH_ATTEMPT (5)
Arguments:
Arg1: fffffa80042b59b0
Arg2: fffffa8004c74b00
Arg3: 0000000000000001
Arg4: 0000000000000001

Debugging Details:
------------------

GetUlongPtrFromAddress: unable to read from fffff800030f3300

KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 2

Key : Analysis.Elapsed.Sec
Value: 2

Key : Analysis.Memory.CommitPeak.Mb
Value: 62


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700

SYSTEM_MANUFACTURER: Hewlett-Packard

SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC

SYSTEM_SKU: J4T62EA#AB8

SYSTEM_VERSION: 0991100000000000000600087

BIOS_VENDOR: Insyde

BIOS_VERSION: F.43

BIOS_DATE: 12/19/2017

BASEBOARD_MANUFACTURER: Hewlett-Packard

BASEBOARD_PRODUCT: 2211

BASEBOARD_VERSION: 86.56

DUMP_TYPE: 2

BUGCHECK_P1: fffffa80042b59b0

BUGCHECK_P2: fffffa8004c74b00

BUGCHECK_P3: 1

BUGCHECK_P4: 1

CPU_COUNT: 4

CPU_MHZ: 6a0

CPU_VENDOR: GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 45

CPU_STEPPING: 1

CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init)

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT

BUGCHECK_STR: 0x5

PROCESS_NAME: chrome.exe

CURRENT_IRQL: 2

ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5

ANALYSIS_SESSION_TIME: 06-17-2019 20:48:49.0152

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

DPC_STACK_BASE: FFFFF80000BA2FB0

LOCK_ADDRESS: fffff800030c6240 -- (!locks fffff800030c6240)
Cannot get _ERESOURCE type

Resource @ nt!PiEngineLock (0xfffff800030c6240) Available
1 total locks

PNP_TRIAGE_DATA:
Lock address : 0xfffff800030c6240
Thread Count : 0
Thread address: 0x0000000000000000
Thread wait : 0x0

LAST_CONTROL_TRANSFER: from fffff80002e985f2 to fffff80002ee9ba0

STACK_TEXT:
fffff800`00ba1cc8 fffff800`02e985f2 : 00000000`00000005 fffffa80`042b59b0 fffffa80`04c74b00 00000000`00000001 : nt!KeBugCheckEx
fffff800`00ba1cd0 fffff800`03141127 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeStackAttachProcess+0x52
fffff800`00ba1d50 fffff800`031414bf : 00000000`00000000 fffff8a0`00000000 fffff8a0`00001910 00000000`00000000 : nt!ObpDecrementHandleCount+0x177
fffff800`00ba1dd0 fffff800`031411e4 : 00000000`000008e4 fffffa80`04c74b00 fffff8a0`00001910 00000000`000008e4 : nt!ObpCloseHandleTableEntry+0xaf
fffff800`00ba1e60 fffff800`02ef7bd3 : fffffa80`076a6b50 fffff800`00ba1f30 fffff800`031ab200 fffff800`0313776a : nt!ObpCloseHandle+0x94
fffff800`00ba1eb0 fffff800`02eed3b0 : fffff800`03184d73 fffffa80`04e1e060 fffff800`031ab200 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
fffff800`00ba2048 fffff800`03184d73 : fffffa80`04e1e060 fffff800`031ab200 00000000`00000000 00000000`00000000 : nt!KiServiceLinkage
fffff800`00ba2050 fffff800`0318ea78 : fffffa80`04e1e060 00000000`00000001 fffffa80`04e1d6e0 00000000`00000000 : nt!PiGetDeviceRegistryProperty+0xab
fffff800`00ba21b0 fffff800`03183a90 : fffffa80`04e1e060 fffffa80`04e1e060 00000000`00000000 00000000`00000000 : nt!IoGetDeviceProperty+0xbc
fffff800`00ba2290 fffff800`03194f51 : 00000000`ffff0000 fffffa80`07df09f0 fffff880`01480110 fffffa80`05cfe910 : nt!IopOpenOrCreateDeviceRegistryKey+0x14c
fffff800`00ba2450 fffff880`014c5152 : fffffa80`080038e0 fffff800`00ba25e0 fffffa80`0700aa78 00000000`000007ff : nt!IoOpenDeviceRegistryKey+0x11
fffff800`00ba2490 fffff880`01430b34 : fffff800`00ba25e0 fffff800`00ba25b8 fffffa80`055e31a0 fffff880`014db21d : ndis!NdisOpenConfiguration+0xb2
fffff800`00ba24d0 fffff880`04e5194f : 00000000`00000000 fffff800`00ba25e0 fffff880`05060c28 00000000`00000000 : ndis!NdisOpenConfigurationEx+0xa4
fffff800`00ba2540 00000000`00000000 : fffff800`00ba25e0 fffff880`05060c28 00000000`00000000 fffffa80`001801a9 : netr28x+0x4b94f


THREAD_SHA1_HASH_MOD_FUNC: ae5746727567d6f3e980a5bab83b7524a5dc9ee8

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: a4491f04e0c588cecd320ea5c66c026862f569ea

THREAD_SHA1_HASH_MOD: 34d7ba38146ecb972065c22fa7203d72f73eccb4

FOLLOWUP_IP:
netr28x+4b94f
fffff880`04e5194f ?? ???

SYMBOL_STACK_INDEX: d

SYMBOL_NAME: netr28x+4b94f

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: netr28x

IMAGE_NAME:  netr28x.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a

STACK_COMMAND: .thread ; .cxr ; kb

FAILURE_BUCKET_ID: X64_0x5_netr28x+4b94f

BUCKET_ID: X64_0x5_netr28x+4b94f

PRIMARY_PROBLEM_CLASS: X64_0x5_netr28x+4b94f

TARGET_TIME: 2019-04-11T14:09:37.000Z

OSBUILD: 7601

OSSERVICEPACK: 1000

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 7

OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2019-03-06 05:38:53

BUILDDATESTAMP_STR: 190305-1700

BUILDLAB_STR: win7sp1_ldr_escrow

BUILDOSVER_STR: 6.1.7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700

ANALYSIS_SESSION_ELAPSED_TIME: 941

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:x64_0x5_netr28x+4b94f

FAILURE_ID_HASH: {43753b0b-e234-1a01-8468-7eed644d41ea}

Followup: MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff8a002085398, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80003ae56fd, address which referenced memory

Debugging Details:
------------------

GetUlongPtrFromAddress: unable to read from fffff80003ab1300

KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 1

Key : Analysis.Elapsed.Sec
Value: 1

Key : Analysis.Memory.CommitPeak.Mb
Value: 62


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700

SYSTEM_MANUFACTURER: Hewlett-Packard

SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC

SYSTEM_SKU: J4T62EA#AB8

SYSTEM_VERSION: 0991100000000000000600087

BIOS_VENDOR: Insyde

BIOS_VERSION: F.43

BIOS_DATE: 12/19/2017

BASEBOARD_MANUFACTURER: Hewlett-Packard

BASEBOARD_PRODUCT: 2211

BASEBOARD_VERSION: 86.56

DUMP_TYPE: 2

BUGCHECK_P1: fffff8a002085398

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff80003ae56fd

WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80003ab1100
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff80003ab12f0
GetUlongPtrFromAddress: unable to read from fffff80003ab14a8
GetPointerFromAddress: unable to read from fffff80003ab10d8
fffff8a002085398 Paged pool

CURRENT_IRQL: 2

FAULTING_IP:
nt!HvpDoAllocateCell+101
fffff800`03ae56fd 89443d00 mov dword ptr [rbp+rdi],eax

CPU_COUNT: 4

CPU_MHZ: 6a0

CPU_VENDOR: GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 45

CPU_STEPPING: 1

CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init)

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT

BUGCHECK_STR: 0xA

PROCESS_NAME: System

ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5

ANALYSIS_SESSION_TIME: 06-17-2019 20:48:46.0248

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

TRAP_FRAME:  fffff80004c1a950 -- (.trap 0xfffff80004c1a950)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000008 rbx=0000000000000000 rcx=0000000000000368
rdx=0000000000000002 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80003ae56fd rsp=fffff80004c1aae0 rbp=0000000000000030
r8=fffff8a000024010 r9=0000000000000005 r10=fffff8a002085000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!HvpDoAllocateCell+0x101:
fffff800`03ae56fd 89443d00 mov dword ptr [rbp+rdi],eax ss:0018:00000000`00000030=????????
Resetting default scope

LAST_CONTROL_TRANSFER: from fffff800038b5f69 to fffff800038a7ba0

STACK_TEXT:
fffff800`04c1a808 fffff800`038b5f69 : 00000000`0000000a fffff8a0`02085398 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff800`04c1a810 fffff800`038b3d88 : 00000000`00000001 fffff8a0`02085398 00000000`00000000 fffff8a0`00024010 : nt!KiBugCheckDispatch+0x69
fffff800`04c1a950 fffff800`03ae56fd : fffff8a0`00024010 fffff8a0`00024010 fffff8a0`0003b420 fffff800`00000000 : nt!KiPageFault+0x448
fffff800`04c1aae0 fffff800`03b27d1d : fffff8a0`00024010 00000000`00000000 00000000`00000000 00000000`ffffffff : nt!HvpDoAllocateCell+0x101
fffff800`04c1ab40 fffff800`03b27bad : 00000000`00000000 fffff8a0`018bcc30 00000000`00000008 fffff800`03b15d5c : nt!HvAllocateCell+0x55
fffff800`04c1ab70 fffff800`03ada4bf : fffff8a0`00024010 fffff8a0`00024010 fffff8a0`018ca640 fffff800`04c1ae18 : nt!CmpAddValueKeyNew+0x69
fffff800`04c1ac40 fffff800`03cc06e3 : 01d501ff`f5623883 fffff800`04c1aff0 fffff8a0`04468820 00000000`00000000 : nt!CmpSetValueKeyNew+0x77
fffff800`04c1ac90 fffff800`03ae5531 : fffff8a0`0506b140 fffff800`04c1ae18 fffffa80`00000004 fffff800`04c1b210 : nt!CmSetValueKey+0xba3
fffff800`04c1add0 fffff800`038b5bd3 : ffffffff`80000dc4 00000000`00000002 fffffa80`00000000 fffff800`00000004 : nt!NtSetValueKey+0x349
fffff800`04c1af00 fffff800`038ab3b0 : fffff800`03bfc2a2 fffff800`04c1b248 fffff880`01525152 fffffa80`00040001 : nt!KiSystemServiceCopyEnd+0x13
fffff800`04c1b108 fffff800`03bfc2a2 : fffff800`04c1b248 fffff880`01525152 fffffa80`00040001 fffff800`04c1b270 : nt!KiServiceLinkage
fffff800`04c1b110 fffff880`0152cd96 : 00000000`00000004 fffffa80`0449b4e0 fffff880`0525c030 00000000`000007ff : nt!RtlWriteRegistryValue+0x62
fffff800`04c1b170 fffff880`050b698d : fffff800`04c1b270 fffff880`052c5c28 00000000`00000000 00000000`00000000 : ndis!NdisWriteConfiguration+0x156
fffff800`04c1b1d0 fffff800`04c1b270 : fffff880`052c5c28 00000000`00000000 00000000`00000000 fffff800`001801a9 : netr28x+0x4b98d
fffff800`04c1b1d8 fffff880`052c5c28 : 00000000`00000000 00000000`00000000 fffff800`001801a9 fffffa80`05b7f1a0 : 0xfffff800`04c1b270
fffff800`04c1b1e0 00000000`00000000 : 00000000`00000000 fffff800`001801a9 fffffa80`05b7f1a0 fffff800`00000000 : netr28x+0x25ac28


THREAD_SHA1_HASH_MOD_FUNC: 80858fdf941bd645ff48b6997b30f63ac59926fb

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 394aafee51f76470053fa2102b9df0f0f7df42a3

THREAD_SHA1_HASH_MOD: 5d50876435db08b990ce5928fe5c90526c26b16c

FOLLOWUP_IP:
netr28x+4b98d
fffff880`050b698d ?? ???

SYMBOL_STACK_INDEX: d

SYMBOL_NAME: netr28x+4b98d

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: netr28x

IMAGE_NAME:  netr28x.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a

STACK_COMMAND: .thread ; .cxr ; kb

FAILURE_BUCKET_ID: X64_0xA_netr28x+4b98d

BUCKET_ID: X64_0xA_netr28x+4b98d

PRIMARY_PROBLEM_CLASS: X64_0xA_netr28x+4b98d

TARGET_TIME: 2019-05-03T22:31:32.000Z

OSBUILD: 7601

OSSERVICEPACK: 1000

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 7

OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2019-03-21 04:38:47

BUILDDATESTAMP_STR: 190320-1700

BUILDLAB_STR: win7sp1_ldr_escrow

BUILDOSVER_STR: 6.1.7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700

ANALYSIS_SESSION_ELAPSED_TIME: 7b0

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:x64_0xa_netr28x+4b98d

FAILURE_ID_HASH: {a6eb3f60-a5c3-0bd6-051c-41bf4427925d}

Followup: MachineOwner
---------

INVALID_PROCESS_ATTACH_ATTEMPT (5)
Arguments:
Arg1: fffffa80042cf9b0
Arg2: fffffa80045a46e0
Arg3: 0000000000000000
Arg4: 0000000000000001

Debugging Details:
------------------

GetUlongPtrFromAddress: unable to read from fffff800030fb300

KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 2

Key : Analysis.Elapsed.Sec
Value: 2

Key : Analysis.Memory.CommitPeak.Mb
Value: 62


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700

SYSTEM_MANUFACTURER: Hewlett-Packard

SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC

SYSTEM_SKU: J4T62EA#AB8

SYSTEM_VERSION: 0991100000000000000600087

BIOS_VENDOR: Insyde

BIOS_VERSION: F.43

BIOS_DATE: 12/19/2017

BASEBOARD_MANUFACTURER: Hewlett-Packard

BASEBOARD_PRODUCT: 2211

BASEBOARD_VERSION: 86.56

DUMP_TYPE: 2

BUGCHECK_P1: fffffa80042cf9b0

BUGCHECK_P2: fffffa80045a46e0

BUGCHECK_P3: 0

BUGCHECK_P4: 1

CPU_COUNT: 4

CPU_MHZ: 6a0

CPU_VENDOR: GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 45

CPU_STEPPING: 1

CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init)

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT

BUGCHECK_STR: 0x5

PROCESS_NAME: chrome.exe

CURRENT_IRQL: 2

ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5

ANALYSIS_SESSION_TIME: 06-17-2019 20:48:24.0070

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

DPC_STACK_BASE: FFFFF80000BA2FB0

LOCK_ADDRESS: fffff800030ce240 -- (!locks fffff800030ce240)
Cannot get _ERESOURCE type

Resource @ nt!PiEngineLock (0xfffff800030ce240) Available
1 total locks

PNP_TRIAGE_DATA:
Lock address : 0xfffff800030ce240
Thread Count : 0
Thread address: 0x0000000000000000
Thread wait : 0x0

LAST_CONTROL_TRANSFER: from fffff80002ea05f2 to fffff80002ef1ba0

STACK_TEXT:
fffff800`00ba1cc8 fffff800`02ea05f2 : 00000000`00000005 fffffa80`042cf9b0 fffffa80`045a46e0 00000000`00000000 : nt!KeBugCheckEx
fffff800`00ba1cd0 fffff800`03149127 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeStackAttachProcess+0x52
fffff800`00ba1d50 fffff800`031494bf : 00000000`00000000 fffff8a0`00000000 fffff8a0`00001910 00000000`00000000 : nt!ObpDecrementHandleCount+0x177
fffff800`00ba1dd0 fffff800`031491e4 : 00000000`00000b3c fffffa80`045a46e0 fffff8a0`00001910 00000000`00000b3c : nt!ObpCloseHandleTableEntry+0xaf
fffff800`00ba1e60 fffff800`02effbd3 : fffffa80`04502060 fffff800`00ba1f30 fffff800`031b3200 fffff800`0313f76a : nt!ObpCloseHandle+0x94
fffff800`00ba1eb0 fffff800`02ef53b0 : fffff800`0318cd73 fffffa80`04ebd060 fffff800`031b3200 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
fffff800`00ba2048 fffff800`0318cd73 : fffffa80`04ebd060 fffff800`031b3200 00000000`00000000 00000000`00000000 : nt!KiServiceLinkage
fffff800`00ba2050 fffff800`03196a78 : fffffa80`04ebd060 00000000`00000001 fffffa80`04eba6e0 00000000`00000000 : nt!PiGetDeviceRegistryProperty+0xab
fffff800`00ba21b0 fffff800`0318ba90 : fffffa80`04ebd060 fffffa80`04ebd060 00000000`00000000 00000000`00000000 : nt!IoGetDeviceProperty+0xbc
fffff800`00ba2290 fffff800`0319cf51 : 00000000`ffff0000 fffffa80`08470cb0 fffff880`0147f110 fffffa80`059fbe30 : nt!IopOpenOrCreateDeviceRegistryKey+0x14c
fffff800`00ba2450 fffff880`014c4152 : fffffa80`0681f000 fffff800`00ba25e0 00000000`00000005 00000000`000007ff : nt!IoOpenDeviceRegistryKey+0x11
fffff800`00ba2490 fffff880`0142fb34 : fffff800`00ba25e0 fffff800`00ba25b8 fffffa80`05bf61a0 fffff800`02e262ea : ndis!NdisOpenConfiguration+0xb2
fffff800`00ba24d0 fffff880`0511d94f : 00000000`00000000 fffff800`00ba25e0 fffff880`0532cc28 00000000`00000000 : ndis!NdisOpenConfigurationEx+0xa4
fffff800`00ba2540 00000000`00000000 : fffff800`00ba25e0 fffff880`0532cc28 00000000`00000000 fffffa80`001801a9 : netr28x+0x4b94f


THREAD_SHA1_HASH_MOD_FUNC: ae5746727567d6f3e980a5bab83b7524a5dc9ee8

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: a4491f04e0c588cecd320ea5c66c026862f569ea

THREAD_SHA1_HASH_MOD: 34d7ba38146ecb972065c22fa7203d72f73eccb4

FOLLOWUP_IP:
netr28x+4b94f
fffff880`0511d94f ?? ???

SYMBOL_STACK_INDEX: d

SYMBOL_NAME: netr28x+4b94f

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: netr28x

IMAGE_NAME:  netr28x.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a

STACK_COMMAND: .thread ; .cxr ; kb

FAILURE_BUCKET_ID: X64_0x5_netr28x+4b94f

BUCKET_ID: X64_0x5_netr28x+4b94f

PRIMARY_PROBLEM_CLASS: X64_0x5_netr28x+4b94f

TARGET_TIME: 2019-04-11T14:13:16.000Z

OSBUILD: 7601

OSSERVICEPACK: 1000

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 7

OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2019-03-06 05:38:53

BUILDDATESTAMP_STR: 190305-1700

BUILDLAB_STR: win7sp1_ldr_escrow

BUILDOSVER_STR: 6.1.7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700

ANALYSIS_SESSION_ELAPSED_TIME: 851

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:x64_0x5_netr28x+4b94f

FAILURE_ID_HASH: {43753b0b-e234-1a01-8468-7eed644d41ea}

Followup: MachineOwner
---------

INVALID_PROCESS_ATTACH_ATTEMPT (5)
Arguments:
Arg1: fffffa80042ce9b0
Arg2: fffffa800b053b00
Arg3: 0000000000000000
Arg4: 0000000000000001

Debugging Details:
------------------

GetUlongPtrFromAddress: unable to read from fffff800032ed300

KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 1

Key : Analysis.Elapsed.Sec
Value: 2

Key : Analysis.Memory.CommitPeak.Mb
Value: 62


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700

SYSTEM_MANUFACTURER: Hewlett-Packard

SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC

SYSTEM_SKU: J4T62EA#AB8

SYSTEM_VERSION: 0991100000000000000600087

BIOS_VENDOR: Insyde

BIOS_VERSION: F.43

BIOS_DATE: 12/19/2017

BASEBOARD_MANUFACTURER: Hewlett-Packard

BASEBOARD_PRODUCT: 2211

BASEBOARD_VERSION: 86.56

DUMP_TYPE: 2

BUGCHECK_P1: fffffa80042ce9b0

BUGCHECK_P2: fffffa800b053b00

BUGCHECK_P3: 0

BUGCHECK_P4: 1

CPU_COUNT: 4

CPU_MHZ: 6a0

CPU_VENDOR: GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 45

CPU_STEPPING: 1

CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init)

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT

BUGCHECK_STR: 0x5

PROCESS_NAME: mcbuilder.exe

CURRENT_IRQL: 2

ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5

ANALYSIS_SESSION_TIME: 06-17-2019 20:48:40.0990

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

DPC_STACK_BASE: FFFFF80000BA2FB0

LOCK_ADDRESS: fffff800032c0240 -- (!locks fffff800032c0240)
Cannot get _ERESOURCE type

Resource @ nt!PiEngineLock (0xfffff800032c0240) Available
1 total locks

PNP_TRIAGE_DATA:
Lock address : 0xfffff800032c0240
Thread Count : 0
Thread address: 0x0000000000000000
Thread wait : 0x0

LAST_CONTROL_TRANSFER: from fffff800030925f2 to fffff800030e3ba0

STACK_TEXT:
fffff800`00ba1cc8 fffff800`030925f2 : 00000000`00000005 fffffa80`042ce9b0 fffffa80`0b053b00 00000000`00000000 : nt!KeBugCheckEx
fffff800`00ba1cd0 fffff800`0333b127 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeStackAttachProcess+0x52
fffff800`00ba1d50 fffff800`0333b4bf : 00000000`00000000 fffff8a0`00000000 fffff8a0`00001910 00000000`00000000 : nt!ObpDecrementHandleCount+0x177
fffff800`00ba1dd0 fffff800`0333b1e4 : 00000000`00000d0c fffffa80`0b053b00 fffff8a0`00001910 00000000`00000d0c : nt!ObpCloseHandleTableEntry+0xaf
fffff800`00ba1e60 fffff800`030f1bd3 : fffffa80`0568b6e0 fffff800`00ba1f30 fffff800`033a5200 fffff800`0333176a : nt!ObpCloseHandle+0x94
fffff800`00ba1eb0 fffff800`030e73b0 : fffff800`0337ed73 fffffa80`04dc8060 fffff800`033a5200 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
fffff800`00ba2048 fffff800`0337ed73 : fffffa80`04dc8060 fffff800`033a5200 00000000`00000000 00000000`00000000 : nt!KiServiceLinkage
fffff800`00ba2050 fffff800`03388a78 : fffffa80`04dc8060 00000000`00000001 fffffa80`04dc36e0 00000000`00000000 : nt!PiGetDeviceRegistryProperty+0xab
fffff800`00ba21b0 fffff800`0337da90 : fffffa80`04dc8060 fffffa80`04dc8060 00000000`00000000 00000000`00000000 : nt!IoGetDeviceProperty+0xbc
fffff800`00ba2290 fffff800`0338ef51 : 00000000`ffff0000 fffffa80`09035950 fffff880`014a0110 fffffa80`05adbd80 : nt!IopOpenOrCreateDeviceRegistryKey+0x14c
fffff800`00ba2450 fffff880`014e5152 : fffffa80`00000000 fffff800`00ba25e0 00000000`00000000 00000000`000007ff : nt!IoOpenDeviceRegistryKey+0x11
fffff800`00ba2490 fffff880`01450b34 : fffff800`00ba25e0 fffff800`00ba25b8 fffffa80`05bc91a0 00000000`00000001 : ndis!NdisOpenConfiguration+0xb2
fffff800`00ba24d0 fffff880`056cc94f : 00000000`00000000 fffff800`00ba25e0 fffff880`058dbc28 00000000`00000000 : ndis!NdisOpenConfigurationEx+0xa4
fffff800`00ba2540 00000000`00000000 : fffff800`00ba25e0 fffff880`058dbc28 00000000`00000000 fffffa80`001801a9 : netr28x+0x4b94f


THREAD_SHA1_HASH_MOD_FUNC: ae5746727567d6f3e980a5bab83b7524a5dc9ee8

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: a4491f04e0c588cecd320ea5c66c026862f569ea

THREAD_SHA1_HASH_MOD: 34d7ba38146ecb972065c22fa7203d72f73eccb4

FOLLOWUP_IP:
netr28x+4b94f
fffff880`056cc94f ?? ???

SYMBOL_STACK_INDEX: d

SYMBOL_NAME: netr28x+4b94f

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: netr28x

IMAGE_NAME:  netr28x.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a

STACK_COMMAND: .thread ; .cxr ; kb

FAILURE_BUCKET_ID: X64_0x5_netr28x+4b94f

BUCKET_ID: X64_0x5_netr28x+4b94f

PRIMARY_PROBLEM_CLASS: X64_0x5_netr28x+4b94f

TARGET_TIME: 2019-04-11T17:47:48.000Z

OSBUILD: 7601

OSSERVICEPACK: 1000

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 7

OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2019-03-06 05:38:53

BUILDDATESTAMP_STR: 190305-1700

BUILDLAB_STR: win7sp1_ldr_escrow

BUILDOSVER_STR: 6.1.7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700

ANALYSIS_SESSION_ELAPSED_TIME: 7f5

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:x64_0x5_netr28x+4b94f

FAILURE_ID_HASH: {43753b0b-e234-1a01-8468-7eed644d41ea}

Followup: MachineOwner
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff8a006be8c34, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80003afb730, address which referenced memory

Debugging Details:
------------------

GetUlongPtrFromAddress: unable to read from fffff80003ab2300

KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 1

Key : Analysis.Elapsed.Sec
Value: 1

Key : Analysis.Memory.CommitPeak.Mb
Value: 62


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700

SYSTEM_MANUFACTURER: Hewlett-Packard

SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC

SYSTEM_SKU: J4T62EA#AB8

SYSTEM_VERSION: 0991100000000000000600087

BIOS_VENDOR: Insyde

BIOS_VERSION: F.43

BIOS_DATE: 12/19/2017

BASEBOARD_MANUFACTURER: Hewlett-Packard

BASEBOARD_PRODUCT: 2211

BASEBOARD_VERSION: 86.56

DUMP_TYPE: 2

BUGCHECK_P1: fffff8a006be8c34

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff80003afb730

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80003ab2100
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff80003ab22f0
GetUlongPtrFromAddress: unable to read from fffff80003ab24a8
GetPointerFromAddress: unable to read from fffff80003ab20d8
fffff8a006be8c34 Paged pool

CURRENT_IRQL: 2

FAULTING_IP:
nt!CmpFindValueByNameFromCache+e0
fffff800`03afb730 428b14b8 mov edx,dword ptr [rax+r15*4]

CPU_COUNT: 4

CPU_MHZ: 6a0

CPU_VENDOR: GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 45

CPU_STEPPING: 1

CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init)

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT

BUGCHECK_STR: 0xA

PROCESS_NAME: System

ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5

ANALYSIS_SESSION_TIME: 06-17-2019 20:48:30.0482

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

TRAP_FRAME:  fffff80004c21990 -- (.trap 0xfffff80004c21990)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8a006be8c34 rbx=0000000000000000 rcx=0000000000000000
rdx=00000000ffffffff rsi=0000000000000000 rdi=0000000000000000
rip=fffff80003afb730 rsp=fffff80004c21b20 rbp=fffff80004c21ff0
r8=fffff8a00004ad40 r9=000000000000ffff r10=0000000000000001
r11=fffff80004c21dc8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!CmpFindValueByNameFromCache+0xe0:
fffff800`03afb730 428b14b8 mov edx,dword ptr [rax+r15*4] ds:fffff8a0`06be8c34=????????
Resetting default scope

LAST_CONTROL_TRANSFER: from fffff800038b6f69 to fffff800038a8ba0

STACK_TEXT:
fffff800`04c21848 fffff800`038b6f69 : 00000000`0000000a fffff8a0`06be8c34 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff800`04c21850 fffff800`038b4d88 : 00000000`00000000 fffff8a0`06be8c34 fffffa80`0a1a6000 fffff8a0`00024010 : nt!KiBugCheckDispatch+0x69
fffff800`04c21990 fffff800`03afb730 : fffff8a0`00024010 00000000`00c6ac30 fffff8a0`0004ad40 00000000`00000000 : nt!KiPageFault+0x448
fffff800`04c21b20 fffff800`03adec38 : fffff8a0`0e0d74a8 fffff800`04c21e18 fffff800`04c21c60 fffff800`04c21c48 : nt!CmpFindValueByNameFromCache+0xe0
fffff800`04c21bf0 fffff800`03cc11e7 : fffff8a0`0e0d74a8 01d50684`f67b3cde fffff8a0`0e0d74a8 00000000`00000000 : nt!CmpCompareNewValueDataAgainstKCBCache+0x78
fffff800`04c21c90 fffff800`03ae6531 : fffff8a0`01c5f710 fffff800`04c21e18 fffffa80`00000004 fffff800`04c22210 : nt!CmSetValueKey+0x6a7
fffff800`04c21dd0 fffff800`038b6bd3 : ffffffff`80002788 00000000`00000002 fffffa80`00000000 fffff800`00000004 : nt!NtSetValueKey+0x349
fffff800`04c21f00 fffff800`038ac3b0 : fffff800`03bfd2a2 fffff800`04c22248 fffff880`017a5152 00000000`c0000001 : nt!KiSystemServiceCopyEnd+0x13
fffff800`04c22108 fffff800`03bfd2a2 : fffff800`04c22248 fffff880`017a5152 00000000`c0000001 fffff800`04c22270 : nt!KiServiceLinkage
fffff800`04c22110 fffff880`017acd96 : 00000000`00000004 fffffa80`09b31af0 00000100`00000000 00000000`000007ff : nt!RtlWriteRegistryValue+0x62
fffff800`04c22170 fffff880`056a498d : fffff800`04c22270 fffff880`058b3c28 00000000`00000000 00000000`00000000 : ndis!NdisWriteConfiguration+0x156
fffff800`04c221d0 fffff800`04c22270 : fffff880`058b3c28 00000000`00000000 00000000`00000000 00000000`001801a9 : netr28x+0x4b98d
fffff800`04c221d8 fffff880`058b3c28 : 00000000`00000000 00000000`00000000 00000000`001801a9 fffffa80`05b821a0 : 0xfffff800`04c22270
fffff800`04c221e0 00000000`00000000 : 00000000`00000000 00000000`001801a9 fffffa80`05b821a0 00000000`00000000 : netr28x+0x25ac28


THREAD_SHA1_HASH_MOD_FUNC: 935105e89958188e75032d802c31088ef212f1d5

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 050e790aab7ddac4bfe73c42f1350165ef3ea549

THREAD_SHA1_HASH_MOD: 7921e317582c7f98a7f13cfbcd3c02a86fdcafec

FOLLOWUP_IP:
netr28x+4b98d
fffff880`056a498d ?? ???

SYMBOL_STACK_INDEX: b

SYMBOL_NAME: netr28x+4b98d

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: netr28x

IMAGE_NAME:  netr28x.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a

STACK_COMMAND: .thread ; .cxr ; kb

FAILURE_BUCKET_ID: X64_0xA_netr28x+4b98d

BUCKET_ID: X64_0xA_netr28x+4b98d

PRIMARY_PROBLEM_CLASS: X64_0xA_netr28x+4b98d

TARGET_TIME: 2019-05-09T16:33:41.000Z

OSBUILD: 7601

OSSERVICEPACK: 1000

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 7

OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2019-03-21 04:38:47

BUILDDATESTAMP_STR: 190320-1700

BUILDLAB_STR: win7sp1_ldr_escrow

BUILDOSVER_STR: 6.1.7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700

ANALYSIS_SESSION_ELAPSED_TIME: 716

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:x64_0xa_netr28x+4b98d

FAILURE_ID_HASH: {a6eb3f60-a5c3-0bd6-051c-41bf4427925d}

Followup: MachineOwner
---------

INVALID_PROCESS_ATTACH_ATTEMPT (5)
Arguments:
Arg1: fffffa80042b59b0
Arg2: fffffa80048376b0
Arg3: 0000000000000000
Arg4: 0000000000000001

Debugging Details:
------------------

GetUlongPtrFromAddress: unable to read from fffff8000309f300

KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 1

Key : Analysis.Elapsed.Sec
Value: 1

Key : Analysis.Memory.CommitPeak.Mb
Value: 62


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700

SYSTEM_MANUFACTURER: Hewlett-Packard

SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC

SYSTEM_SKU: J4T62EA#AB8

SYSTEM_VERSION: 0991100000000000000600087

BIOS_VENDOR: Insyde

BIOS_VERSION: F.43

BIOS_DATE: 12/19/2017

BASEBOARD_MANUFACTURER: Hewlett-Packard

BASEBOARD_PRODUCT: 2211

BASEBOARD_VERSION: 86.56

DUMP_TYPE: 2

BUGCHECK_P1: fffffa80042b59b0

BUGCHECK_P2: fffffa80048376b0

BUGCHECK_P3: 0

BUGCHECK_P4: 1

CPU_COUNT: 4

CPU_MHZ: 6a0

CPU_VENDOR: GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 45

CPU_STEPPING: 1

CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init)

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT

BUGCHECK_STR: 0x5

PROCESS_NAME: PointBlank.exe

CURRENT_IRQL: 2

ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5

ANALYSIS_SESSION_TIME: 06-17-2019 21:16:16.0171

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

DPC_STACK_BASE: FFFFF80000BA2FB0

LOCK_ADDRESS: fffff80003072240 -- (!locks fffff80003072240)
Cannot get _ERESOURCE type

Resource @ nt!PiEngineLock (0xfffff80003072240) Available
1 total locks

PNP_TRIAGE_DATA:
Lock address : 0xfffff80003072240
Thread Count : 0
Thread address: 0x0000000000000000
Thread wait : 0x0

LAST_CONTROL_TRANSFER: from fffff80002e445f2 to fffff80002e95ba0

STACK_TEXT:
fffff800`00ba1cc8 fffff800`02e445f2 : 00000000`00000005 fffffa80`042b59b0 fffffa80`048376b0 00000000`00000000 : nt!KeBugCheckEx
fffff800`00ba1cd0 fffff800`030ed127 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeStackAttachProcess+0x52
fffff800`00ba1d50 fffff800`030ed4bf : 00000000`00000000 fffff8a0`00000000 fffff8a0`00001910 00000000`00000000 : nt!ObpDecrementHandleCount+0x177
fffff800`00ba1dd0 fffff800`030ed1e4 : 00000000`00000c9c fffffa80`048376b0 fffff8a0`00001910 00000000`00000c9c : nt!ObpCloseHandleTableEntry+0xaf
fffff800`00ba1e60 fffff800`02ea3bd3 : fffffa80`04988060 fffff800`00ba1f30 fffff800`03157200 fffff800`030e376a : nt!ObpCloseHandle+0x94
fffff800`00ba1eb0 fffff800`02e993b0 : fffff800`03130d73 fffffa80`04e7d060 fffff800`03157200 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
fffff800`00ba2048 fffff800`03130d73 : fffffa80`04e7d060 fffff800`03157200 00000000`00000000 00000000`00000000 : nt!KiServiceLinkage
fffff800`00ba2050 fffff800`0313aa78 : fffffa80`04e7d060 00000000`00000001 fffffa80`04e386e0 00000000`00000000 : nt!PiGetDeviceRegistryProperty+0xab
fffff800`00ba21b0 fffff800`0312fa90 : fffffa80`04e7d060 fffffa80`04e7d060 00000000`00000000 00000000`00000000 : nt!IoGetDeviceProperty+0xbc
fffff800`00ba2290 fffff800`03140f51 : 00000000`ffff0000 fffffa80`08033990 fffff880`014d7110 fffffa80`05bfaf70 : nt!IopOpenOrCreateDeviceRegistryKey+0x14c
fffff800`00ba2450 fffff880`0151c152 : fffffa80`049479f0 fffff800`00ba25e0 fffffa80`06f64a78 00000000`000007ff : nt!IoOpenDeviceRegistryKey+0x11
fffff800`00ba2490 fffff880`01487b34 : fffff800`00ba25e0 fffff800`00ba25b8 fffffa80`05bf91a0 fffff880`0153221d : ndis!NdisOpenConfiguration+0xb2
fffff800`00ba24d0 fffff880`04eff94f : fffffa80`00000000 fffff800`00ba25e0 fffff880`0510ec28 00000000`00000000 : ndis!NdisOpenConfigurationEx+0xa4
fffff800`00ba2540 fffffa80`00000000 : fffff800`00ba25e0 fffff880`0510ec28 00000000`00000000 00000000`001801a9 : netr28x+0x4b94f
fffff800`00ba2548 fffff800`00ba25e0 : fffff880`0510ec28 00000000`00000000 00000000`001801a9 fffffa80`05bf91a0 : 0xfffffa80`00000000
fffff800`00ba2550 fffff880`0510ec28 : 00000000`00000000 00000000`001801a9 fffffa80`05bf91a0 fffffa80`00000000 : 0xfffff800`00ba25e0
fffff800`00ba2558 00000000`00000000 : 00000000`001801a9 fffffa80`05bf91a0 fffffa80`00000000 fffff880`04f0be2e : netr28x+0x25ac28


THREAD_SHA1_HASH_MOD_FUNC: 1764d353450a941fbc74295279ec02651c3d9814

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: bdc70d393af014c177e84e60c668cc911acaf71f

THREAD_SHA1_HASH_MOD: 9a9dca34541ae91666e3989df373f06b6e683623

FOLLOWUP_IP:
netr28x+4b94f
fffff880`04eff94f ?? ???

SYMBOL_STACK_INDEX: d

SYMBOL_NAME: netr28x+4b94f

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: netr28x

IMAGE_NAME:  netr28x.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a

STACK_COMMAND: .thread ; .cxr ; kb

FAILURE_BUCKET_ID: X64_0x5_netr28x+4b94f

BUCKET_ID: X64_0x5_netr28x+4b94f

PRIMARY_PROBLEM_CLASS: X64_0x5_netr28x+4b94f

TARGET_TIME: 2019-04-11T14:53:19.000Z

OSBUILD: 7601

OSSERVICEPACK: 1000

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 7

OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2019-03-06 05:38:53

BUILDDATESTAMP_STR: 190305-1700

BUILDLAB_STR: win7sp1_ldr_escrow

BUILDOSVER_STR: 6.1.7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700

ANALYSIS_SESSION_ELAPSED_TIME: 7ca

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:x64_0x5_netr28x+4b94f

FAILURE_ID_HASH: {43753b0b-e234-1a01-8468-7eed644d41ea}

Followup: MachineOwner
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff8a000e8ee98, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff800032e66fd, address which referenced memory

Debugging Details:
------------------

GetUlongPtrFromAddress: unable to read from fffff800032b2300

KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 1

Key : Analysis.Elapsed.Sec
Value: 1

Key : Analysis.Memory.CommitPeak.Mb
Value: 62


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700

SYSTEM_MANUFACTURER: Hewlett-Packard

SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC

SYSTEM_SKU: J4T62EA#AB8

SYSTEM_VERSION: 0991100000000000000600087

BIOS_VENDOR: Insyde

BIOS_VERSION: F.43

BIOS_DATE: 12/19/2017

BASEBOARD_MANUFACTURER: Hewlett-Packard

BASEBOARD_PRODUCT: 2211

BASEBOARD_VERSION: 86.56

DUMP_TYPE: 2

BUGCHECK_P1: fffff8a000e8ee98

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff800032e66fd

WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800032b2100
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff800032b22f0
GetUlongPtrFromAddress: unable to read from fffff800032b24a8
GetPointerFromAddress: unable to read from fffff800032b20d8
fffff8a000e8ee98 Paged pool

CURRENT_IRQL: 2

FAULTING_IP:
nt!HvpDoAllocateCell+101
fffff800`032e66fd 89443d00 mov dword ptr [rbp+rdi],eax

CPU_COUNT: 4

CPU_MHZ: 6a0

CPU_VENDOR: GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 45

CPU_STEPPING: 1

CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init)

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT

BUGCHECK_STR: 0xA

PROCESS_NAME: System

ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5

ANALYSIS_SESSION_TIME: 06-17-2019 21:16:26.0291

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

TRAP_FRAME:  fffff80004418950 -- (.trap 0xfffff80004418950)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000020 rbx=0000000000000000 rcx=0000000000002e68
rdx=0000000000000006 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800032e66fd rsp=fffff80004418ae0 rbp=0000000000000030
r8=fffff8a000024010 r9=0000000000000005 r10=fffff8a000e8c000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!HvpDoAllocateCell+0x101:
fffff800`032e66fd 89443d00 mov dword ptr [rbp+rdi],eax ss:0018:00000000`00000030=????????
Resetting default scope

LAST_CONTROL_TRANSFER: from fffff800030b6f69 to fffff800030a8ba0

STACK_TEXT:
fffff800`04418808 fffff800`030b6f69 : 00000000`0000000a fffff8a0`00e8ee98 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff800`04418810 fffff800`030b4d88 : 00000000`00000001 fffff8a0`00e8ee98 00000000`00000000 fffff8a0`00024010 : nt!KiBugCheckDispatch+0x69
fffff800`04418950 fffff800`032e66fd : fffff8a0`00024010 fffff8a0`00024010 fffff8a0`0004b9a0 fffff800`00000000 : nt!KiPageFault+0x448
fffff800`04418ae0 fffff800`03328d1d : fffff8a0`00024010 00000000`00000000 00000000`00000000 00000000`ffffffff : nt!HvpDoAllocateCell+0x101
fffff800`04418b40 fffff800`03328bad : 00000000`00000000 fffff8a0`00ff0c30 00000000`00000008 fffff800`03316d5c : nt!HvAllocateCell+0x55
fffff800`04418b70 fffff800`032db4bf : fffff8a0`00024010 fffff8a0`00024010 fffff8a0`00ffe640 fffff800`04418e18 : nt!CmpAddValueKeyNew+0x69
fffff800`04418c40 fffff800`034c16e3 : 01d4fd21`140179ca fffff800`04418ff0 fffff8a0`050bd948 00000000`00000000 : nt!CmpSetValueKeyNew+0x77
fffff800`04418c90 fffff800`032e6531 : fffff8a0`0df75fa0 fffff800`04418e18 fffffa80`00000004 fffff800`04419210 : nt!CmSetValueKey+0xba3
fffff800`04418dd0 fffff800`030b6bd3 : ffffffff`80000ab0 00000000`00000002 fffffa80`00000000 fffff800`00000004 : nt!NtSetValueKey+0x349
fffff800`04418f00 fffff800`030ac3b0 : fffff800`033fd2a2 fffff800`04419248 fffff880`014a9152 fffffa80`051e12f0 : nt!KiSystemServiceCopyEnd+0x13
fffff800`04419108 fffff800`033fd2a2 : fffff800`04419248 fffff880`014a9152 fffffa80`051e12f0 fffff800`04419270 : nt!KiServiceLinkage
fffff800`04419110 fffff880`014b0d96 : 00000000`00000004 fffffa80`0855a220 00000000`ffffffff 00000000`000007ff : nt!RtlWriteRegistryValue+0x62
fffff800`04419170 fffff880`04eef98d : fffff800`04419270 fffff880`050fec28 00000000`00000000 00000000`00000000 : ndis!NdisWriteConfiguration+0x156
fffff800`044191d0 fffff800`04419270 : fffff880`050fec28 00000000`00000000 00000000`00000000 fffff800`001801a9 : netr28x+0x4b98d
fffff800`044191d8 fffff880`050fec28 : 00000000`00000000 00000000`00000000 fffff800`001801a9 fffffa80`05be11a0 : 0xfffff800`04419270
fffff800`044191e0 00000000`00000000 : 00000000`00000000 fffff800`001801a9 fffffa80`05be11a0 fffff800`00000000 : netr28x+0x25ac28


THREAD_SHA1_HASH_MOD_FUNC: 80858fdf941bd645ff48b6997b30f63ac59926fb

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 394aafee51f76470053fa2102b9df0f0f7df42a3

THREAD_SHA1_HASH_MOD: 5d50876435db08b990ce5928fe5c90526c26b16c

FOLLOWUP_IP:
netr28x+4b98d
fffff880`04eef98d ?? ???

SYMBOL_STACK_INDEX: d

SYMBOL_NAME: netr28x+4b98d

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: netr28x

IMAGE_NAME:  netr28x.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a

STACK_COMMAND: .thread ; .cxr ; kb

FAILURE_BUCKET_ID: X64_0xA_netr28x+4b98d

BUCKET_ID: X64_0xA_netr28x+4b98d

PRIMARY_PROBLEM_CLASS: X64_0xA_netr28x+4b98d

TARGET_TIME: 2019-04-27T17:46:01.000Z

OSBUILD: 7601

OSSERVICEPACK: 1000

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 7

OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2019-03-21 04:38:47

BUILDDATESTAMP_STR: 190320-1700

BUILDLAB_STR: win7sp1_ldr_escrow

BUILDOSVER_STR: 6.1.7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700

ANALYSIS_SESSION_ELAPSED_TIME: 720

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:x64_0xa_netr28x+4b98d

FAILURE_ID_HASH: {a6eb3f60-a5c3-0bd6-051c-41bf4427925d}

Followup: MachineOwner
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff8a000b0b260, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff800032d1738, address which referenced memory

Debugging Details:
------------------

GetUlongPtrFromAddress: unable to read from fffff8000329d300

KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 1

Key : Analysis.Elapsed.Sec
Value: 1

Key : Analysis.Memory.CommitPeak.Mb
Value: 62


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700

SYSTEM_MANUFACTURER: Hewlett-Packard

SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC

SYSTEM_SKU: J4T62EA#AB8

SYSTEM_VERSION: 0991100000000000000600087

BIOS_VENDOR: Insyde

BIOS_VERSION: F.43

BIOS_DATE: 12/19/2017

BASEBOARD_MANUFACTURER: Hewlett-Packard

BASEBOARD_PRODUCT: 2211

BASEBOARD_VERSION: 86.56

DUMP_TYPE: 2

BUGCHECK_P1: fffff8a000b0b260

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff800032d1738

WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff8000329d100
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff8000329d2f0
GetUlongPtrFromAddress: unable to read from fffff8000329d4a8
GetPointerFromAddress: unable to read from fffff8000329d0d8
fffff8a000b0b260 Paged pool

CURRENT_IRQL: 2

FAULTING_IP:
nt!HvpDoAllocateCell+13c
fffff800`032d1738 8907 mov dword ptr [rdi],eax

CPU_COUNT: 4

CPU_MHZ: 6a0

CPU_VENDOR: GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 45

CPU_STEPPING: 1

CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init)

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT

BUGCHECK_STR: 0xA

PROCESS_NAME: System

ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5

ANALYSIS_SESSION_TIME: 06-17-2019 21:16:23.0541

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

TRAP_FRAME:  fffff80000b9b950 -- (.trap 0xfffff80000b9b950)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000ffffffd0 rbx=0000000000000000 rcx=000000000000000c
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800032d1738 rsp=fffff80000b9bae0 rbp=0000000000000030
r8=fffff8a0000512e0 r9=0000000000000005 r10=000000000000023b
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe cy
nt!HvpDoAllocateCell+0x13c:
fffff800`032d1738 8907 mov dword ptr [rdi],eax ds:00000000`00000000=????????
Resetting default scope

LAST_CONTROL_TRANSFER: from fffff800030a1f69 to fffff80003093ba0

STACK_TEXT:
fffff800`00b9b808 fffff800`030a1f69 : 00000000`0000000a fffff8a0`00b0b260 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff800`00b9b810 fffff800`0309fd88 : 00000000`00000001 fffff8a0`00b0b260 00000000`00000000 fffff8a0`00024010 : nt!KiBugCheckDispatch+0x69
fffff800`00b9b950 fffff800`032d1738 : fffff8a0`00024010 fffff8a0`00024010 fffff8a0`000512e0 fffff800`00000000 : nt!KiPageFault+0x448
fffff800`00b9bae0 fffff800`03313d0d : fffff8a0`00024010 00000000`00000000 00000000`00000000 00000000`ffffffff : nt!HvpDoAllocateCell+0x13c
fffff800`00b9bb40 fffff800`03313b9d : 00000000`00000000 fffff8a0`00f38c30 00000000`00000008 fffff800`03301d5c : nt!HvAllocateCell+0x55
fffff800`00b9bb70 fffff800`032c64bf : fffff8a0`00024010 fffff8a0`00024010 fffff8a0`00f46640 fffff800`00b9be18 : nt!CmpAddValueKeyNew+0x69
fffff800`00b9bc40 fffff800`034ac6a3 : 01d4f07a`dd071b78 fffff800`00b9bff0 fffff8a0`04a444a8 00000000`00000000 : nt!CmpSetValueKeyNew+0x77
fffff800`00b9bc90 fffff800`032d1531 : fffff8a0`09c3f770 fffff800`00b9be18 fffffa80`00000004 fffff800`00b9c210 : nt!CmSetValueKey+0xba3
fffff800`00b9bdd0 fffff800`030a1bd3 : ffffffff`80000b54 00000000`00000002 fffffa80`00000000 fffff800`00000004 : nt!NtSetValueKey+0x349
fffff800`00b9bf00 fffff800`030973b0 : fffff800`033e8272 fffff800`00b9c248 fffff880`0151b152 fffffa80`074a45f0 : nt!KiSystemServiceCopyEnd+0x13
fffff800`00b9c108 fffff800`033e8272 : fffff800`00b9c248 fffff880`0151b152 fffffa80`074a45f0 fffff800`00b9c270 : nt!KiServiceLinkage
fffff800`00b9c110 fffff880`01522d96 : 00000000`00000004 fffffa80`05970b70 fffff800`03210800 00000000`000007ff : nt!RtlWriteRegistryValue+0x62
fffff800`00b9c170 fffff880`04eef98d : fffff800`00b9c270 fffff880`050fec28 00000000`00000000 00000000`00000000 : ndis!NdisWriteConfiguration+0x156
fffff800`00b9c1d0 fffff800`00b9c270 : fffff880`050fec28 00000000`00000000 00000000`00000000 fffffa80`001801a9 : netr28x+0x4b98d
fffff800`00b9c1d8 fffff880`050fec28 : 00000000`00000000 00000000`00000000 fffffa80`001801a9 fffffa80`05b741a0 : 0xfffff800`00b9c270
fffff800`00b9c1e0 00000000`00000000 : 00000000`00000000 fffffa80`001801a9 fffffa80`05b741a0 00000000`00000000 : netr28x+0x25ac28


THREAD_SHA1_HASH_MOD_FUNC: 80858fdf941bd645ff48b6997b30f63ac59926fb

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 60ef2d8b5c8aa9ab3d61fd3d0f87c6db127d6016

THREAD_SHA1_HASH_MOD: 5d50876435db08b990ce5928fe5c90526c26b16c

FOLLOWUP_IP:
netr28x+4b98d
fffff880`04eef98d ?? ???

SYMBOL_STACK_INDEX: d

SYMBOL_NAME: netr28x+4b98d

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: netr28x

IMAGE_NAME:  netr28x.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a

STACK_COMMAND: .thread ; .cxr ; kb

FAILURE_BUCKET_ID: X64_0xA_netr28x+4b98d

BUCKET_ID: X64_0xA_netr28x+4b98d

PRIMARY_PROBLEM_CLASS: X64_0xA_netr28x+4b98d

TARGET_TIME: 2019-04-11T15:25:58.000Z

OSBUILD: 7601

OSSERVICEPACK: 1000

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 7

OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2019-03-06 05:38:53

BUILDDATESTAMP_STR: 190305-1700

BUILDLAB_STR: win7sp1_ldr_escrow

BUILDOSVER_STR: 6.1.7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700

ANALYSIS_SESSION_ELAPSED_TIME: 7b6

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:x64_0xa_netr28x+4b98d

FAILURE_ID_HASH: {a6eb3f60-a5c3-0bd6-051c-41bf4427925d}

Followup: MachineOwner
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff8a0067d0004, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff800032dccfe, address which referenced memory

Debugging Details:
------------------

GetUlongPtrFromAddress: unable to read from fffff800032a8300

KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 1

Key : Analysis.Elapsed.Sec
Value: 1

Key : Analysis.Memory.CommitPeak.Mb
Value: 62


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700

SYSTEM_MANUFACTURER: Hewlett-Packard

SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC

SYSTEM_SKU: J4T62EA#AB8

SYSTEM_VERSION: 0991100000000000000600087

BIOS_VENDOR: Insyde

BIOS_VERSION: F.43

BIOS_DATE: 12/19/2017

BASEBOARD_MANUFACTURER: Hewlett-Packard

BASEBOARD_PRODUCT: 2211

BASEBOARD_VERSION: 86.56

DUMP_TYPE: 2

BUGCHECK_P1: fffff8a0067d0004

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff800032dccfe

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800032a8100
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff800032a82f0
GetUlongPtrFromAddress: unable to read from fffff800032a84a8
GetPointerFromAddress: unable to read from fffff800032a80d8
fffff8a0067d0004 Paged pool

CURRENT_IRQL: 2

FAULTING_IP:
nt!HvpScanForFreeCellInViewWindow+16a
fffff800`032dccfe 8b4804 mov ecx,dword ptr [rax+4]

CPU_COUNT: 4

CPU_MHZ: 6a0

CPU_VENDOR: GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 45

CPU_STEPPING: 1

CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init)

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT

BUGCHECK_STR: 0xA

PROCESS_NAME: System

ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5

ANALYSIS_SESSION_TIME: 06-17-2019 21:16:21.0060

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

TRAP_FRAME:  fffff80004421860 -- (.trap 0xfffff80004421860)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8a0067d0000 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000683000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800032dccfe rsp=fffff800044219f0 rbp=0000000000000683
r8=0000000000000083 r9=0000000000000000 r10=fffff8000300b000
r11=0000000000000006 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!HvpScanForFreeCellInViewWindow+0x16a:
fffff800`032dccfe 8b4804 mov ecx,dword ptr [rax+4] ds:fffff8a0`067d0004=00683000
Resetting default scope

LAST_CONTROL_TRANSFER: from fffff800030acf69 to fffff8000309eba0

STACK_TEXT:
fffff800`04421718 fffff800`030acf69 : 00000000`0000000a fffff8a0`067d0004 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff800`04421720 fffff800`030aad88 : 00000000`00000000 fffff8a0`067d0004 fffff800`031ff100 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff800`04421860 fffff800`032dccfe : 00000000`00000000 00000000`003fe000 00000000`00001000 00000000`00000000 : nt!KiPageFault+0x448
fffff800`044219f0 fffff800`032dcb0a : fffff800`00683000 fffff800`00000011 00000000`00000030 fffff800`00000000 : nt!HvpScanForFreeCellInViewWindow+0x16a
fffff800`04421a70 fffff800`032dc66e : 00000000`00000030 fffff800`00000005 ffffffff`00000030 fffff800`00000000 : nt!HvpFindFreeCell+0x1ba
fffff800`04421ae0 fffff800`0331ed1d : fffff8a0`00024010 00000000`00000000 00000000`00000000 00000000`ffffffff : nt!HvpDoAllocateCell+0x72
fffff800`04421b40 fffff800`0331ebad : 00000000`00000000 fffff8a0`061e8c30 00000000`00000008 fffff800`0330cd5c : nt!HvAllocateCell+0x55
fffff800`04421b70 fffff800`032d14bf : fffff8a0`00024010 fffff8a0`00024010 fffff8a0`061f6640 fffff800`04421e18 : nt!CmpAddValueKeyNew+0x69
fffff800`04421c40 fffff800`034b76e3 : 01d4f848`5814f677 fffff800`04421ff0 fffff8a0`02c84b98 00000000`00000000 : nt!CmpSetValueKeyNew+0x77
fffff800`04421c90 fffff800`032dc531 : fffff8a0`04cbac70 fffff800`04421e18 fffffa80`00000004 fffff800`04422210 : nt!CmSetValueKey+0xba3
fffff800`04421dd0 fffff800`030acbd3 : ffffffff`80000de8 00000000`00000002 fffffa80`00000000 fffff800`00000004 : nt!NtSetValueKey+0x349
fffff800`04421f00 fffff800`030a23b0 : fffff800`033f32a2 fffff800`04422248 fffff880`01725152 fffffa80`00000000 : nt!KiSystemServiceCopyEnd+0x13
fffff800`04422108 fffff800`033f32a2 : fffff800`04422248 fffff880`01725152 fffffa80`00000000 fffff800`04422270 : nt!KiServiceLinkage
fffff800`04422110 fffff880`0172cd96 : 00000000`00000004 fffffa80`05d89cd0 fffff800`04422200 00000000`000007ff : nt!RtlWriteRegistryValue+0x62
fffff800`04422170 fffff880`0510f98d : fffff800`04422270 fffff880`0531ec28 00000000`00000000 00000000`00000000 : ndis!NdisWriteConfiguration+0x156
fffff800`044221d0 fffff800`04422270 : fffff880`0531ec28 00000000`00000000 00000000`00000000 fffff880`001801a9 : netr28x+0x4b98d
fffff800`044221d8 fffff880`0531ec28 : 00000000`00000000 00000000`00000000 fffff880`001801a9 fffffa80`05b701a0 : 0xfffff800`04422270
fffff800`044221e0 00000000`00000000 : 00000000`00000000 fffff880`001801a9 fffffa80`05b701a0 0000000e`00000000 : netr28x+0x25ac28


THREAD_SHA1_HASH_MOD_FUNC: a2c5409ed52347576830e095aabe2e20325151e5

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: cf883ff24fbd42e0f8dd5b2bf40fd2071e6cd531

THREAD_SHA1_HASH_MOD: 56bd18a7fabf3c16adac1e3911e9aab0524685a1

FOLLOWUP_IP:
netr28x+4b98d
fffff880`0510f98d ?? ???

SYMBOL_STACK_INDEX: f

SYMBOL_NAME: netr28x+4b98d

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: netr28x

IMAGE_NAME:  netr28x.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a

STACK_COMMAND: .thread ; .cxr ; kb

FAILURE_BUCKET_ID: X64_0xA_netr28x+4b98d

BUCKET_ID: X64_0xA_netr28x+4b98d

PRIMARY_PROBLEM_CLASS: X64_0xA_netr28x+4b98d

TARGET_TIME: 2019-04-21T13:44:29.000Z

OSBUILD: 7601

OSSERVICEPACK: 1000

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 7

OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2019-03-21 04:38:47

BUILDDATESTAMP_STR: 190320-1700

BUILDLAB_STR: win7sp1_ldr_escrow

BUILDOSVER_STR: 6.1.7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700

ANALYSIS_SESSION_ELAPSED_TIME: 704

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:x64_0xa_netr28x+4b98d

FAILURE_ID_HASH: {a6eb3f60-a5c3-0bd6-051c-41bf4427925d}

Followup: MachineOwner
---------

0: kd> lmvm netr28x
start end module name
fffff880`050c4000 fffff880`0532e000 netr28x T (no symbols)
Loaded symbol image file: netr28x.sys
Image path: \SystemRoot\system32\DRIVERS\netr28x.sys
Image name: netr28x.sys
Timestamp: Mon Apr 20 03:22:50 2015 (5534D37A)
CheckSum: 0026BF4B
ImageSize: 0026A000
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4
    Information from resource tables:
Nihayet Windows 7 Kurulumunu Bitirdim Home Premium SP1 ENGLİSH Kurulum Yaptım Sonradan CMD Den 1 2 Birşey Birde Bir Dosya İle Türkçe Yama Yaptım Ama Bazı Yerler İngilizce Şuana Kadar Keşfettiğim İngilizce Yerler 1.İntel Ekran Kartı Menüsü 2.Windows Update Menüsü Ne Yapabilirim Bunları Düzeltmek İçin Update Olmasada İntel Nasıl Düzelir Üst Yorumda Biraz Karıştırmışım Yeni Oldugum İçin 2 Kere Cevaplamışım Kusura Bakmayın
 
Son düzenleme:
Uyarı! Bu konu 5 yıl önce açıldı.
Muhtemelen daha fazla tartışma gerekli değildir ki bu durumda yeni bir konu başlatmayı öneririz. Eğer yine de cevabınızın gerekli olduğunu düşünüyorsanız buna rağmen cevap verebilirsiniz.

Geri
Yukarı