ceyhunyurt
Decapat
Daha fazla
- Cinsiyet
- Erkek
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff8a000d9e618, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff800033386fd, address which referenced memory
Debugging Details:
------------------
GetUlongPtrFromAddress: unable to read from fffff80003304300
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 1
Key : Analysis.Elapsed.Sec
Value: 1
Key : Analysis.Memory.CommitPeak.Mb
Value: 62
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700
SYSTEM_MANUFACTURER: Hewlett-Packard
SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC
SYSTEM_SKU: J4T62EA#AB8
SYSTEM_VERSION: 0991100000000000000600087
BIOS_VENDOR: Insyde
BIOS_VERSION: F.43
BIOS_DATE: 12/19/2017
BASEBOARD_MANUFACTURER: Hewlett-Packard
BASEBOARD_PRODUCT: 2211
BASEBOARD_VERSION: 86.56
DUMP_TYPE: 2
BUGCHECK_P1: fffff8a000d9e618
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff800033386fd
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80003304100
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff800033042f0
GetUlongPtrFromAddress: unable to read from fffff800033044a8
GetPointerFromAddress: unable to read from fffff800033040d8
fffff8a000d9e618 Paged pool
CURRENT_IRQL: 2
FAULTING_IP:
nt!HvpDoAllocateCell+101
fffff800`033386fd 89443d00 mov dword ptr [rbp+rdi],eax
CPU_COUNT: 4
CPU_MHZ: 6a0
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 45
CPU_STEPPING: 1
CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init)
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: System
ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5
ANALYSIS_SESSION_TIME: 06-17-2019 20:48:20.0473
ANALYSIS_VERSION: 10.0.18869.1002 amd64fre
TRAP_FRAME: fffff80004423950 -- (.trap 0xfffff80004423950)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000000039e8 rbx=0000000000000000 rcx=00000000000005e8
rdx=0000000000000008 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800033386fd rsp=fffff80004423ae0 rbp=0000000000000030
r8=fffff8a000024010 r9=0000000000000005 r10=fffff8a000d9e000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!HvpDoAllocateCell+0x101:
fffff800`033386fd 89443d00 mov dword ptr [rbp+rdi],eax ss:0018:00000000`00000030=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80003108f69 to fffff800030faba0
STACK_TEXT:
fffff800`04423808 fffff800`03108f69 : 00000000`0000000a fffff8a0`00d9e618 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff800`04423810 fffff800`03106d88 : 00000000`00000001 fffff8a0`00d9e618 00000000`00000000 fffff8a0`00024010 : nt!KiBugCheckDispatch+0x69
fffff800`04423950 fffff800`033386fd : fffff8a0`00024010 fffff8a0`00024010 fffff8a0`00053ae0 00000000`00000000 : nt!KiPageFault+0x448
fffff800`04423ae0 fffff800`0337ad0d : fffff8a0`00024010 00000000`00000000 00000000`00000000 00000000`ffffffff : nt!HvpDoAllocateCell+0x101
fffff800`04423b40 fffff800`0337ab9d : 00000000`00000000 fffff8a0`05585c30 00000000`00000008 fffff800`03368d5c : nt!HvAllocateCell+0x55
fffff800`04423b70 fffff800`0332d4bf : fffff8a0`00024010 fffff8a0`00024010 fffff8a0`05593640 fffff800`04423e18 : nt!CmpAddValueKeyNew+0x69
fffff800`04423c40 fffff800`035136a3 : 01d4f094`f66bc44b fffff800`04423ff0 fffff8a0`0085fa70 00000000`00000000 : nt!CmpSetValueKeyNew+0x77
fffff800`04423c90 fffff800`03338531 : fffff8a0`14bbfca0 fffff800`04423e18 fffffa80`00000004 fffff800`04424210 : nt!CmSetValueKey+0xba3
fffff800`04423dd0 fffff800`03108bd3 : ffffffff`80000bec 00000000`00000002 fffffa80`00000000 fffff800`00000004 : nt!NtSetValueKey+0x349
fffff800`04423f00 fffff800`030fe3b0 : fffff800`0344f272 fffff800`04424248 fffff880`014b9152 00000000`539f0000 : nt!KiSystemServiceCopyEnd+0x13
fffff800`04424108 fffff800`0344f272 : fffff800`04424248 fffff880`014b9152 00000000`539f0000 fffff800`04424270 : nt!KiServiceLinkage
fffff800`04424110 fffff880`014c0d96 : 00000000`00000004 fffffa80`071c5250 00000000`00000000 00000000`000007ff : nt!RtlWriteRegistryValue+0x62
fffff800`04424170 fffff880`04f2698d : fffff800`04424270 fffff880`05135c28 00000000`00000000 00000000`00000000 : ndis!NdisWriteConfiguration+0x156
fffff800`044241d0 fffff800`04424270 : fffff880`05135c28 00000000`00000000 00000000`00000000 fffff800`001801a9 : netr28x+0x4b98d
fffff800`044241d8 fffff880`05135c28 : 00000000`00000000 00000000`00000000 fffff800`001801a9 fffffa80`059cb1a0 : 0xfffff800`04424270
fffff800`044241e0 00000000`00000000 : 00000000`00000000 fffff800`001801a9 fffffa80`059cb1a0 fffff800`00000000 : netr28x+0x25ac28
THREAD_SHA1_HASH_MOD_FUNC: 80858fdf941bd645ff48b6997b30f63ac59926fb
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 394aafee51f76470053fa2102b9df0f0f7df42a3
THREAD_SHA1_HASH_MOD: 5d50876435db08b990ce5928fe5c90526c26b16c
FOLLOWUP_IP:
netr28x+4b98d
fffff880`04f2698d ?? ???
SYMBOL_STACK_INDEX: d
SYMBOL_NAME: netr28x+4b98d
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: netr28x
IMAGE_NAME: netr28x.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: X64_0xA_netr28x+4b98d
BUCKET_ID: X64_0xA_netr28x+4b98d
PRIMARY_PROBLEM_CLASS: X64_0xA_netr28x+4b98d
TARGET_TIME: 2019-04-11T18:32:48.000Z
OSBUILD: 7601
OSSERVICEPACK: 1000
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 7
OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2019-03-06 05:38:53
BUILDDATESTAMP_STR: 190305-1700
BUILDLAB_STR: win7sp1_ldr_escrow
BUILDOSVER_STR: 6.1.7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700
ANALYSIS_SESSION_ELAPSED_TIME: 7ae
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:x64_0xa_netr28x+4b98d
FAILURE_ID_HASH: {a6eb3f60-a5c3-0bd6-051c-41bf4427925d}
Followup: MachineOwner
---------
INVALID_PROCESS_ATTACH_ATTEMPT (5)
Arguments:
Arg1: fffffa80042b49b0
Arg2: fffffa80050a0160
Arg3: 0000000000000000
Arg4: 0000000000000001
Debugging Details:
------------------
GetUlongPtrFromAddress: unable to read from fffff800032a0300
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 2
Key : Analysis.Elapsed.Sec
Value: 2
Key : Analysis.Memory.CommitPeak.Mb
Value: 62
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700
SYSTEM_MANUFACTURER: Hewlett-Packard
SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC
SYSTEM_SKU: J4T62EA#AB8
SYSTEM_VERSION: 0991100000000000000600087
BIOS_VENDOR: Insyde
BIOS_VERSION: F.43
BIOS_DATE: 12/19/2017
BASEBOARD_MANUFACTURER: Hewlett-Packard
BASEBOARD_PRODUCT: 2211
BASEBOARD_VERSION: 86.56
DUMP_TYPE: 2
BUGCHECK_P1: fffffa80042b49b0
BUGCHECK_P2: fffffa80050a0160
BUGCHECK_P3: 0
BUGCHECK_P4: 1
CPU_COUNT: 4
CPU_MHZ: 6a0
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 45
CPU_STEPPING: 1
CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init)
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
BUGCHECK_STR: 0x5
PROCESS_NAME: PointBlank.exe
CURRENT_IRQL: 2
ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5
ANALYSIS_SESSION_TIME: 06-17-2019 20:57:04.0108
ANALYSIS_VERSION: 10.0.18869.1002 amd64fre
DPC_STACK_BASE: FFFFF80004428FB0
LOCK_ADDRESS: fffff80003273240 -- (!locks fffff80003273240)
Cannot get _ERESOURCE type
Resource @ nt!PiEngineLock (0xfffff80003273240) Available
1 total locks
PNP_TRIAGE_DATA:
Lock address : 0xfffff80003273240
Thread Count : 0
Thread address: 0x0000000000000000
Thread wait : 0x0
LAST_CONTROL_TRANSFER: from fffff80003045602 to fffff80003096ba0
STACK_TEXT:
fffff800`04427cc8 fffff800`03045602 : 00000000`00000005 fffffa80`042b49b0 fffffa80`050a0160 00000000`00000000 : nt!KeBugCheckEx
fffff800`04427cd0 fffff800`032ee127 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeStackAttachProcess+0x52
fffff800`04427d50 fffff800`032ee4bf : 00000000`00000000 fffff8a0`00000000 fffff8a0`00001910 00000000`00000000 : nt!ObpDecrementHandleCount+0x177
fffff800`04427dd0 fffff800`032ee1e4 : 00000000`00000d08 fffffa80`050a0160 fffff8a0`00001910 00000000`00000d08 : nt!ObpCloseHandleTableEntry+0xaf
fffff800`04427e60 fffff800`030a4bd3 : fffffa80`04b87b50 fffff800`04427f30 fffff800`03358230 fffff800`032e476a : nt!ObpCloseHandle+0x94
fffff800`04427eb0 fffff800`0309a3b0 : fffff800`03331da3 fffffa80`04ea4a10 fffff800`03358230 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
fffff800`04428048 fffff800`03331da3 : fffffa80`04ea4a10 fffff800`03358230 00000000`00000000 00000000`00000000 : nt!KiServiceLinkage
fffff800`04428050 fffff800`0333baa8 : fffffa80`04ea4a10 00000000`00000001 fffffa80`04ea2740 00000000`00000000 : nt!PiGetDeviceRegistryProperty+0xab
fffff800`044281b0 fffff800`03330ac0 : fffffa80`04ea4a10 fffffa80`04ea4a10 00000000`00000000 00000000`00000000 : nt!IoGetDeviceProperty+0xbc
fffff800`04428290 fffff800`03341f81 : 00000000`ffff0000 fffffa80`0802b150 fffff880`01553110 fffffa80`05bb6220 : nt!IopOpenOrCreateDeviceRegistryKey+0x14c
fffff800`04428450 fffff880`01598152 : 00000000`c0000001 fffff800`044285e0 00000000`00000000 00000000`000007ff : nt!IoOpenDeviceRegistryKey+0x11
fffff800`04428490 fffff880`01503b34 : fffff800`044285e0 fffff800`044285b8 fffffa80`05c461a0 fffff800`035e0000 : ndis!NdisOpenConfiguration+0xb2
fffff800`044284d0 fffff880`0508b94f : fffffa80`00000000 fffff800`044285e0 fffff880`0529ac28 00000000`00000000 : ndis!NdisOpenConfigurationEx+0xa4
fffff800`04428540 fffffa80`00000000 : fffff800`044285e0 fffff880`0529ac28 00000000`00000000 00000000`001801a9 : netr28x+0x4b94f
fffff800`04428548 fffff800`044285e0 : fffff880`0529ac28 00000000`00000000 00000000`001801a9 fffffa80`05c461a0 : 0xfffffa80`00000000
fffff800`04428550 fffff880`0529ac28 : 00000000`00000000 00000000`001801a9 fffffa80`05c461a0 00000000`00000000 : 0xfffff800`044285e0
fffff800`04428558 00000000`00000000 : 00000000`001801a9 fffffa80`05c461a0 00000000`00000000 fffffa80`0742b540 : netr28x+0x25ac28
THREAD_SHA1_HASH_MOD_FUNC: 1764d353450a941fbc74295279ec02651c3d9814
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: bdc70d393af014c177e84e60c668cc911acaf71f
THREAD_SHA1_HASH_MOD: 9a9dca34541ae91666e3989df373f06b6e683623
FOLLOWUP_IP:
netr28x+4b94f
fffff880`0508b94f ?? ???
SYMBOL_STACK_INDEX: d
SYMBOL_NAME: netr28x+4b94f
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: netr28x
IMAGE_NAME: netr28x.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: X64_0x5_netr28x+4b94f
BUCKET_ID: X64_0x5_netr28x+4b94f
PRIMARY_PROBLEM_CLASS: X64_0x5_netr28x+4b94f
TARGET_TIME: 2019-05-01T21:53:50.000Z
OSBUILD: 7601
OSSERVICEPACK: 1000
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 7
OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2019-03-21 04:38:47
BUILDDATESTAMP_STR: 190320-1700
BUILDLAB_STR: win7sp1_ldr_escrow
BUILDOSVER_STR: 6.1.7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700
ANALYSIS_SESSION_ELAPSED_TIME: 8cb
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:x64_0x5_netr28x+4b94f
FAILURE_ID_HASH: {43753b0b-e234-1a01-8468-7eed644d41ea}
Followup: MachineOwner
INVALID_PROCESS_ATTACH_ATTEMPT (5)
Arguments:
Arg1: fffffa80042ce9b0
Arg2: fffffa8005d11370
Arg3: 0000000000000000
Arg4: 0000000000000001
Debugging Details:
------------------
GetUlongPtrFromAddress: unable to read from fffff800032b3300
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 2
Key : Analysis.Elapsed.Sec
Value: 2
Key : Analysis.Memory.CommitPeak.Mb
Value: 62
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700
SYSTEM_MANUFACTURER: Hewlett-Packard
SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC
SYSTEM_SKU: J4T62EA#AB8
SYSTEM_VERSION: 0991100000000000000600087
BIOS_VENDOR: Insyde
BIOS_VERSION: F.43
BIOS_DATE: 12/19/2017
BASEBOARD_MANUFACTURER: Hewlett-Packard
BASEBOARD_PRODUCT: 2211
BASEBOARD_VERSION: 86.56
DUMP_TYPE: 2
BUGCHECK_P1: fffffa80042ce9b0
BUGCHECK_P2: fffffa8005d11370
BUGCHECK_P3: 0
BUGCHECK_P4: 1
CPU_COUNT: 4
CPU_MHZ: 6a0
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 45
CPU_STEPPING: 1
CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init)
CUSTOMER_CRASH_COUNT: 2
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
BUGCHECK_STR: 0x5
PROCESS_NAME: audiodg.exe
CURRENT_IRQL: 2
ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5
ANALYSIS_SESSION_TIME: 06-17-2019 20:49:02.0621
ANALYSIS_VERSION: 10.0.18869.1002 amd64fre
DPC_STACK_BASE: FFFFF80000BA2FB0
LOCK_ADDRESS: fffff80003286240 -- (!locks fffff80003286240)
Cannot get _ERESOURCE type
Resource @ nt!PiEngineLock (0xfffff80003286240) Available
1 total locks
PNP_TRIAGE_DATA:
Lock address : 0xfffff80003286240
Thread Count : 0
Thread address: 0x0000000000000000
Thread wait : 0x0
LAST_CONTROL_TRANSFER: from fffff80003058602 to fffff800030a9ba0
STACK_TEXT:
fffff800`00ba1cc8 fffff800`03058602 : 00000000`00000005 fffffa80`042ce9b0 fffffa80`05d11370 00000000`00000000 : nt!KeBugCheckEx
fffff800`00ba1cd0 fffff800`03301127 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeStackAttachProcess+0x52
fffff800`00ba1d50 fffff800`033014bf : 00000000`00000000 fffff8a0`00000000 fffff8a0`00001910 00000000`00000000 : nt!ObpDecrementHandleCount+0x177
fffff800`00ba1dd0 fffff800`033011e4 : 00000000`00000e48 fffffa80`05d11370 fffff8a0`00001910 00000000`00000e48 : nt!ObpCloseHandleTableEntry+0xaf
fffff800`00ba1e60 fffff800`030b7bd3 : fffffa80`05d7ba00 fffff800`00ba1f30 fffff800`0336b230 fffff800`032f776a : nt!ObpCloseHandle+0x94
fffff800`00ba1eb0 fffff800`030ad3b0 : fffff800`03344da3 fffffa80`04e9e060 fffff800`0336b230 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
fffff800`00ba2048 fffff800`03344da3 : fffffa80`04e9e060 fffff800`0336b230 00000000`00000000 00000000`00000000 : nt!KiServiceLinkage
fffff800`00ba2050 fffff800`0334eaa8 : fffffa80`04e9e060 00000000`00000001 fffffa80`04e9d6e0 00000000`00000000 : nt!PiGetDeviceRegistryProperty+0xab
fffff800`00ba21b0 fffff800`03343ac0 : fffffa80`04e9e060 fffffa80`04e9e060 00000000`00000000 00000000`00000000 : nt!IoGetDeviceProperty+0xbc
fffff800`00ba2290 fffff800`03354f81 : 00000000`ffff0000 fffffa80`05086440 fffff880`01482110 fffffa80`05b713f0 : nt!IopOpenOrCreateDeviceRegistryKey+0x14c
fffff800`00ba2450 fffff880`014c7152 : fffffa80`04a3fd50 fffff800`00ba25e0 fffffa80`05f48a78 00000000`000007ff : nt!IoOpenDeviceRegistryKey+0x11
fffff800`00ba2490 fffff880`01432b34 : fffff800`00ba25e0 fffff800`00ba25b8 fffffa80`05b6d1a0 fffff880`014dd21d : ndis!NdisOpenConfiguration+0xb2
fffff800`00ba24d0 fffff880`0512a94f : fffffa80`00000000 fffff800`00ba25e0 fffff880`05339c28 00000000`00000000 : ndis!NdisOpenConfigurationEx+0xa4
fffff800`00ba2540 fffffa80`00000000 : fffff800`00ba25e0 fffff880`05339c28 00000000`00000000 00000000`001801a9 : netr28x+0x4b94f
fffff800`00ba2548 fffff800`00ba25e0 : fffff880`05339c28 00000000`00000000 00000000`001801a9 fffffa80`05b6d1a0 : 0xfffffa80`00000000
fffff800`00ba2550 fffff880`05339c28 : 00000000`00000000 00000000`001801a9 fffffa80`05b6d1a0 fffffa80`00000000 : 0xfffff800`00ba25e0
fffff800`00ba2558 00000000`00000000 : 00000000`001801a9 fffffa80`05b6d1a0 fffffa80`00000000 fffff880`05136e2e : netr28x+0x25ac28
THREAD_SHA1_HASH_MOD_FUNC: 1764d353450a941fbc74295279ec02651c3d9814
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: bdc70d393af014c177e84e60c668cc911acaf71f
THREAD_SHA1_HASH_MOD: 9a9dca34541ae91666e3989df373f06b6e683623
FOLLOWUP_IP:
netr28x+4b94f
fffff880`0512a94f ?? ???
SYMBOL_STACK_INDEX: d
SYMBOL_NAME: netr28x+4b94f
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: netr28x
IMAGE_NAME: netr28x.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: X64_0x5_netr28x+4b94f
BUCKET_ID: X64_0x5_netr28x+4b94f
PRIMARY_PROBLEM_CLASS: X64_0x5_netr28x+4b94f
TARGET_TIME: 2019-04-27T20:53:09.000Z
OSBUILD: 7601
OSSERVICEPACK: 1000
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 7
OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2019-03-21 04:38:47
BUILDDATESTAMP_STR: 190320-1700
BUILDLAB_STR: win7sp1_ldr_escrow
BUILDOSVER_STR: 6.1.7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700
ANALYSIS_SESSION_ELAPSED_TIME: 89c
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:x64_0x5_netr28x+4b94f
FAILURE_ID_HASH: {43753b0b-e234-1a01-8468-7eed644d41ea}
Followup: MachineOwner
---------
INVALID_PROCESS_ATTACH_ATTEMPT (5)
Arguments:
Arg1: fffffa80042b49b0
Arg2: fffffa8004ee55f0
Arg3: 0000000000000000
Arg4: 0000000000000001
Debugging Details:
------------------
GetUlongPtrFromAddress: unable to read from fffff800032b0300
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 2
Key : Analysis.Elapsed.Sec
Value: 2
Key : Analysis.Memory.CommitPeak.Mb
Value: 62
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700
SYSTEM_MANUFACTURER: Hewlett-Packard
SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC
SYSTEM_SKU: J4T62EA#AB8
SYSTEM_VERSION: 0991100000000000000600087
BIOS_VENDOR: Insyde
BIOS_VERSION: F.43
BIOS_DATE: 12/19/2017
BASEBOARD_MANUFACTURER: Hewlett-Packard
BASEBOARD_PRODUCT: 2211
BASEBOARD_VERSION: 86.56
DUMP_TYPE: 2
BUGCHECK_P1: fffffa80042b49b0
BUGCHECK_P2: fffffa8004ee55f0
BUGCHECK_P3: 0
BUGCHECK_P4: 1
CPU_COUNT: 4
CPU_MHZ: 6a0
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 45
CPU_STEPPING: 1
CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init)
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
BUGCHECK_STR: 0x5
PROCESS_NAME: PointBlank.exe
CURRENT_IRQL: 2
ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5
ANALYSIS_SESSION_TIME: 06-17-2019 20:48:58.0829
ANALYSIS_VERSION: 10.0.18869.1002 amd64fre
DPC_STACK_BASE: FFFFF8000441FFB0
LOCK_ADDRESS: fffff80003283240 -- (!locks fffff80003283240)
Cannot get _ERESOURCE type
Resource @ nt!PiEngineLock (0xfffff80003283240) Available
1 total locks
PNP_TRIAGE_DATA:
Lock address : 0xfffff80003283240
Thread Count : 0
Thread address: 0x0000000000000000
Thread wait : 0x0
LAST_CONTROL_TRANSFER: from fffff80003055602 to fffff800030a6ba0
STACK_TEXT:
fffff800`0441ecc8 fffff800`03055602 : 00000000`00000005 fffffa80`042b49b0 fffffa80`04ee55f0 00000000`00000000 : nt!KeBugCheckEx
fffff800`0441ecd0 fffff800`032fe127 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeStackAttachProcess+0x52
fffff800`0441ed50 fffff800`032fe4bf : 00000000`00000000 fffff8a0`00000000 fffff8a0`00001910 00000000`00000000 : nt!ObpDecrementHandleCount+0x177
fffff800`0441edd0 fffff800`032fe1e4 : 00000000`00000a80 fffffa80`04ee55f0 fffff8a0`00001910 00000000`00000a80 : nt!ObpCloseHandleTableEntry+0xaf
fffff800`0441ee60 fffff800`030b4bd3 : fffffa80`0861e940 fffff800`0441ef30 fffff800`03368230 fffff800`032f476a : nt!ObpCloseHandle+0x94
fffff800`0441eeb0 fffff800`030aa3b0 : fffff800`03341da3 fffffa80`04d31a10 fffff800`03368230 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
fffff800`0441f048 fffff800`03341da3 : fffffa80`04d31a10 fffff800`03368230 00000000`00000000 00000000`00000000 : nt!KiServiceLinkage
fffff800`0441f050 fffff800`0334baa8 : fffffa80`04d31a10 00000000`00000001 fffffa80`04d2d740 00000000`00000000 : nt!PiGetDeviceRegistryProperty+0xab
fffff800`0441f1b0 fffff800`03340ac0 : fffffa80`04d31a10 fffffa80`04d31a10 00000000`00000000 00000000`00000000 : nt!IoGetDeviceProperty+0xbc
fffff800`0441f290 fffff800`03351f81 : 00000000`ffff0000 fffffa80`046a8bd0 fffff880`014c6110 fffffa80`05a70cf0 : nt!IopOpenOrCreateDeviceRegistryKey+0x14c
fffff800`0441f450 fffff880`0150b152 : fffffa80`07393890 fffff800`0441f5e0 00000000`0000001f 00000000`000007ff : nt!IoOpenDeviceRegistryKey+0x11
fffff800`0441f490 fffff880`01476b34 : fffff800`0441f5e0 fffff800`0441f5b8 fffffa80`05a6f1a0 fffff800`035f7be3 : ndis!NdisOpenConfiguration+0xb2
fffff800`0441f4d0 fffff880`04e7694f : fffffa80`00000000 fffff800`0441f5e0 fffff880`05085c28 00000000`00000000 : ndis!NdisOpenConfigurationEx+0xa4
fffff800`0441f540 fffffa80`00000000 : fffff800`0441f5e0 fffff880`05085c28 00000000`00000000 00000000`001801a9 : netr28x+0x4b94f
fffff800`0441f548 fffff800`0441f5e0 : fffff880`05085c28 00000000`00000000 00000000`001801a9 fffffa80`05a6f1a0 : 0xfffffa80`00000000
fffff800`0441f550 fffff880`05085c28 : 00000000`00000000 00000000`001801a9 fffffa80`05a6f1a0 00000000`00000000 : 0xfffff800`0441f5e0
fffff800`0441f558 00000000`00000000 : 00000000`001801a9 fffffa80`05a6f1a0 00000000`00000000 fffffa80`0452e670 : netr28x+0x25ac28
THREAD_SHA1_HASH_MOD_FUNC: 1764d353450a941fbc74295279ec02651c3d9814
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: bdc70d393af014c177e84e60c668cc911acaf71f
THREAD_SHA1_HASH_MOD: 9a9dca34541ae91666e3989df373f06b6e683623
FOLLOWUP_IP:
netr28x+4b94f
fffff880`04e7694f ?? ???
SYMBOL_STACK_INDEX: d
SYMBOL_NAME: netr28x+4b94f
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: netr28x
IMAGE_NAME: netr28x.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: X64_0x5_netr28x+4b94f
BUCKET_ID: X64_0x5_netr28x+4b94f
PRIMARY_PROBLEM_CLASS: X64_0x5_netr28x+4b94f
TARGET_TIME: 2019-04-21T09:57:22.000Z
OSBUILD: 7601
OSSERVICEPACK: 1000
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 7
OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2019-03-21 04:38:47
BUILDDATESTAMP_STR: 190320-1700
BUILDLAB_STR: win7sp1_ldr_escrow
BUILDOSVER_STR: 6.1.7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700
ANALYSIS_SESSION_ELAPSED_TIME: 8dc
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:x64_0x5_netr28x+4b94f
FAILURE_ID_HASH: {43753b0b-e234-1a01-8468-7eed644d41ea}
Followup: MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff8a000f95c5c, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8000334077c, address which referenced memory
Debugging Details:
------------------
GetUlongPtrFromAddress: unable to read from fffff800032f7300
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 1
Key : Analysis.Elapsed.Sec
Value: 2
Key : Analysis.Memory.CommitPeak.Mb
Value: 62
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700
SYSTEM_MANUFACTURER: Hewlett-Packard
SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC
SYSTEM_SKU: J4T62EA#AB8
SYSTEM_VERSION: 0991100000000000000600087
BIOS_VENDOR: Insyde
BIOS_VERSION: F.43
BIOS_DATE: 12/19/2017
BASEBOARD_MANUFACTURER: Hewlett-Packard
BASEBOARD_PRODUCT: 2211
BASEBOARD_VERSION: 86.56
DUMP_TYPE: 2
BUGCHECK_P1: fffff8a000f95c5c
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8000334077c
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800032f7100
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff800032f72f0
GetUlongPtrFromAddress: unable to read from fffff800032f74a8
GetPointerFromAddress: unable to read from fffff800032f70d8
fffff8a000f95c5c Paged pool
CURRENT_IRQL: 2
FAULTING_IP:
nt!CmpFindValueByNameFromCache+12c
fffff800`0334077c 41f6401001 test byte ptr [r8+10h],1
CPU_COUNT: 4
CPU_MHZ: 6a0
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 45
CPU_STEPPING: 1
CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init)
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: System
ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5
ANALYSIS_SESSION_TIME: 06-17-2019 20:48:55.0594
ANALYSIS_VERSION: 10.0.18869.1002 amd64fre
DPC_STACK_BASE: FFFFF80000BA2FB0
TRAP_FRAME: fffff80000ba1d00 -- (.trap 0xfffff80000ba1d00)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000c64c48 rbx=0000000000000000 rcx=fffff80000ba1fa1
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8000334077c rsp=fffff80000ba1e90 rbp=fffff80000ba2360
r8=fffff8a000f95c4c r9=000000000000ffff r10=fffffa8005aaacfc
r11=fffff8a0018b9b46 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!CmpFindValueByNameFromCache+0x12c:
fffff800`0334077c 41f6401001 test byte ptr [r8+10h],1 ds:fffff8a0`00f95c5c=01
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800030fbf69 to fffff800030edba0
STACK_TEXT:
fffff800`00ba1bb8 fffff800`030fbf69 : 00000000`0000000a fffff8a0`00f95c5c 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff800`00ba1bc0 fffff800`030f9d88 : 00000000`00000000 fffff8a0`00f95c5c fffffa80`05191000 fffff8a0`00024010 : nt!KiBugCheckDispatch+0x69
fffff800`00ba1d00 fffff800`0334077c : fffff8a0`00024010 fffff8a0`00024010 fffff8a0`00048c80 00000000`00000000 : nt!KiPageFault+0x448
fffff800`00ba1e90 fffff800`03323c38 : fffff8a0`15bf1de8 fffff800`00ba2188 fffff800`00ba1fd0 fffff800`00ba1fb8 : nt!CmpFindValueByNameFromCache+0x12c
fffff800`00ba1f60 fffff800`035061e7 : fffff8a0`15bf1de8 01d4f7b8`449491c9 fffff8a0`15bf1de8 00000000`00000000 : nt!CmpCompareNewValueDataAgainstKCBCache+0x78
fffff800`00ba2000 fffff800`0332b531 : fffff8a0`1f297040 fffff800`00ba2188 fffffa80`00000004 fffff800`00ba2580 : nt!CmSetValueKey+0x6a7
fffff800`00ba2140 fffff800`030fbbd3 : ffffffff`80000cc8 00000000`00000002 fffffa80`00000000 fffff800`00000004 : nt!NtSetValueKey+0x349
fffff800`00ba2270 fffff800`030f13b0 : fffff800`034422a2 fffff800`00ba25b8 fffff880`01514152 00000000`c0000001 : nt!KiSystemServiceCopyEnd+0x13
fffff800`00ba2478 fffff800`034422a2 : fffff800`00ba25b8 fffff880`01514152 00000000`c0000001 fffff800`00ba25e0 : nt!KiServiceLinkage
fffff800`00ba2480 fffff880`0151bd96 : 00000000`00000004 fffffa80`05aaacf0 00000100`00000000 00000000`000007ff : nt!RtlWriteRegistryValue+0x62
fffff800`00ba24e0 fffff880`0514a98d : fffff800`00ba25e0 fffff880`05359c28 00000000`00000000 00000000`00000000 : ndis!NdisWriteConfiguration+0x156
fffff800`00ba2540 fffff800`00ba25e0 : fffff880`05359c28 00000000`00000000 00000000`00000000 fffffa80`001801a9 : netr28x+0x4b98d
fffff800`00ba2548 fffff880`05359c28 : 00000000`00000000 00000000`00000000 fffffa80`001801a9 fffffa80`05b411a0 : 0xfffff800`00ba25e0
fffff800`00ba2550 00000000`00000000 : 00000000`00000000 fffffa80`001801a9 fffffa80`05b411a0 00000000`00000000 : netr28x+0x25ac28
THREAD_SHA1_HASH_MOD_FUNC: 935105e89958188e75032d802c31088ef212f1d5
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: d6275099b99a3ef75c037e31f081aba5025e8f89
THREAD_SHA1_HASH_MOD: 7921e317582c7f98a7f13cfbcd3c02a86fdcafec
FOLLOWUP_IP:
netr28x+4b98d
fffff880`0514a98d ?? ???
SYMBOL_STACK_INDEX: b
SYMBOL_NAME: netr28x+4b98d
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: netr28x
IMAGE_NAME: netr28x.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: X64_0xA_netr28x+4b98d
BUCKET_ID: X64_0xA_netr28x+4b98d
PRIMARY_PROBLEM_CLASS: X64_0xA_netr28x+4b98d
TARGET_TIME: 2019-04-20T20:33:09.000Z
OSBUILD: 7601
OSSERVICEPACK: 1000
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 7
OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2019-03-21 04:38:47
BUILDDATESTAMP_STR: 190320-1700
BUILDLAB_STR: win7sp1_ldr_escrow
BUILDOSVER_STR: 6.1.7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700
ANALYSIS_SESSION_ELAPSED_TIME: 7e6
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:x64_0xa_netr28x+4b98d
FAILURE_ID_HASH: {a6eb3f60-a5c3-0bd6-051c-41bf4427925d}
Followup: MachineOwner
---------
INVALID_PROCESS_ATTACH_ATTEMPT (5)
Arguments:
Arg1: fffffa80042d09b0
Arg2: fffffa80075e8060
Arg3: 0000000000000000
Arg4: 0000000000000001
Debugging Details:
------------------
GetUlongPtrFromAddress: unable to read from fffff800032af300
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 2
Key : Analysis.Elapsed.Sec
Value: 2
Key : Analysis.Memory.CommitPeak.Mb
Value: 62
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700
SYSTEM_MANUFACTURER: Hewlett-Packard
SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC
SYSTEM_SKU: J4T62EA#AB8
SYSTEM_VERSION: 0991100000000000000600087
BIOS_VENDOR: Insyde
BIOS_VERSION: F.43
BIOS_DATE: 12/19/2017
BASEBOARD_MANUFACTURER: Hewlett-Packard
BASEBOARD_PRODUCT: 2211
BASEBOARD_VERSION: 86.56
DUMP_TYPE: 2
BUGCHECK_P1: fffffa80042d09b0
BUGCHECK_P2: fffffa80075e8060
BUGCHECK_P3: 0
BUGCHECK_P4: 1
CPU_COUNT: 4
CPU_MHZ: 6a0
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 45
CPU_STEPPING: 1
CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init)
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
BUGCHECK_STR: 0x5
PROCESS_NAME: audiodg.exe
CURRENT_IRQL: 2
ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5
ANALYSIS_SESSION_TIME: 06-17-2019 20:48:52.0836
ANALYSIS_VERSION: 10.0.18869.1002 amd64fre
DPC_STACK_BASE: FFFFF8000441FFB0
LOCK_ADDRESS: fffff80003282240 -- (!locks fffff80003282240)
Cannot get _ERESOURCE type
Resource @ nt!PiEngineLock (0xfffff80003282240) Available
1 total locks
PNP_TRIAGE_DATA:
Lock address : 0xfffff80003282240
Thread Count : 0
Thread address: 0x0000000000000000
Thread wait : 0x0
LAST_CONTROL_TRANSFER: from fffff800030545f2 to fffff800030a5ba0
STACK_TEXT:
fffff800`0441ecc8 fffff800`030545f2 : 00000000`00000005 fffffa80`042d09b0 fffffa80`075e8060 00000000`00000000 : nt!KeBugCheckEx
fffff800`0441ecd0 fffff800`032fd127 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeStackAttachProcess+0x52
fffff800`0441ed50 fffff800`032fd4bf : 00000000`00000000 fffff8a0`00000000 fffff8a0`00001910 00000000`00000000 : nt!ObpDecrementHandleCount+0x177
fffff800`0441edd0 fffff800`032fd1e4 : 00000000`000007c8 fffffa80`075e8060 fffff8a0`00001910 00000000`000007c8 : nt!ObpCloseHandleTableEntry+0xaf
fffff800`0441ee60 fffff800`030b3bd3 : fffffa80`044dab50 fffff800`0441ef30 fffff800`03367200 fffff800`032f376a : nt!ObpCloseHandle+0x94
fffff800`0441eeb0 fffff800`030a93b0 : fffff800`03340d73 fffffa80`04ddc060 fffff800`03367200 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
fffff800`0441f048 fffff800`03340d73 : fffffa80`04ddc060 fffff800`03367200 00000000`00000000 00000000`00000000 : nt!KiServiceLinkage
fffff800`0441f050 fffff800`0334aa78 : fffffa80`04ddc060 00000000`00000001 fffffa80`04dd96e0 00000000`00000000 : nt!PiGetDeviceRegistryProperty+0xab
fffff800`0441f1b0 fffff800`0333fa90 : fffffa80`04ddc060 fffffa80`04ddc060 00000000`00000000 00000000`00000000 : nt!IoGetDeviceProperty+0xbc
fffff800`0441f290 fffff800`03350f51 : 00000000`ffff0000 fffffa80`05a69770 fffff880`014e7110 fffffa80`05ca3270 : nt!IopOpenOrCreateDeviceRegistryKey+0x14c
fffff800`0441f450 fffff880`0152c152 : fffffa80`071bfdc0 fffff800`0441f5e0 00000000`0000001f 00000000`000007ff : nt!IoOpenDeviceRegistryKey+0x11
fffff800`0441f490 fffff880`01497b34 : fffff800`0441f5e0 fffff800`0441f5b8 fffffa80`05c0a1a0 fffff880`0646eab0 : ndis!NdisOpenConfiguration+0xb2
fffff800`0441f4d0 fffff880`04f0c94f : fffffa80`00000000 fffff800`0441f5e0 fffff880`0511bc28 00000000`00000000 : ndis!NdisOpenConfigurationEx+0xa4
fffff800`0441f540 fffffa80`00000000 : fffff800`0441f5e0 fffff880`0511bc28 00000000`00000000 fffffa80`001801a9 : netr28x+0x4b94f
fffff800`0441f548 fffff800`0441f5e0 : fffff880`0511bc28 00000000`00000000 fffffa80`001801a9 fffffa80`05c0a1a0 : 0xfffffa80`00000000
fffff800`0441f550 fffff880`0511bc28 : 00000000`00000000 fffffa80`001801a9 fffffa80`05c0a1a0 00000000`00000000 : 0xfffff800`0441f5e0
fffff800`0441f558 00000000`00000000 : fffffa80`001801a9 fffffa80`05c0a1a0 00000000`00000000 fffff880`00e5028c : netr28x+0x25ac28
THREAD_SHA1_HASH_MOD_FUNC: 1764d353450a941fbc74295279ec02651c3d9814
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: bdc70d393af014c177e84e60c668cc911acaf71f
THREAD_SHA1_HASH_MOD: 9a9dca34541ae91666e3989df373f06b6e683623
FOLLOWUP_IP:
netr28x+4b94f
fffff880`04f0c94f ?? ???
SYMBOL_STACK_INDEX: d
SYMBOL_NAME: netr28x+4b94f
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: netr28x
IMAGE_NAME: netr28x.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: X64_0x5_netr28x+4b94f
BUCKET_ID: X64_0x5_netr28x+4b94f
PRIMARY_PROBLEM_CLASS: X64_0x5_netr28x+4b94f
TARGET_TIME: 2019-04-11T15:07:27.000Z
OSBUILD: 7601
OSSERVICEPACK: 1000
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 7
OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2019-03-06 05:38:53
BUILDDATESTAMP_STR: 190305-1700
BUILDLAB_STR: win7sp1_ldr_escrow
BUILDOSVER_STR: 6.1.7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700
ANALYSIS_SESSION_ELAPSED_TIME: 8c6
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:x64_0x5_netr28x+4b94f
FAILURE_ID_HASH: {43753b0b-e234-1a01-8468-7eed644d41ea}
Followup: MachineOwner
INVALID_PROCESS_ATTACH_ATTEMPT (5)
Arguments:
Arg1: fffffa80042b59b0
Arg2: fffffa8004c74b00
Arg3: 0000000000000001
Arg4: 0000000000000001
Debugging Details:
------------------
GetUlongPtrFromAddress: unable to read from fffff800030f3300
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 2
Key : Analysis.Elapsed.Sec
Value: 2
Key : Analysis.Memory.CommitPeak.Mb
Value: 62
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700
SYSTEM_MANUFACTURER: Hewlett-Packard
SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC
SYSTEM_SKU: J4T62EA#AB8
SYSTEM_VERSION: 0991100000000000000600087
BIOS_VENDOR: Insyde
BIOS_VERSION: F.43
BIOS_DATE: 12/19/2017
BASEBOARD_MANUFACTURER: Hewlett-Packard
BASEBOARD_PRODUCT: 2211
BASEBOARD_VERSION: 86.56
DUMP_TYPE: 2
BUGCHECK_P1: fffffa80042b59b0
BUGCHECK_P2: fffffa8004c74b00
BUGCHECK_P3: 1
BUGCHECK_P4: 1
CPU_COUNT: 4
CPU_MHZ: 6a0
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 45
CPU_STEPPING: 1
CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init)
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
BUGCHECK_STR: 0x5
PROCESS_NAME: chrome.exe
CURRENT_IRQL: 2
ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5
ANALYSIS_SESSION_TIME: 06-17-2019 20:48:49.0152
ANALYSIS_VERSION: 10.0.18869.1002 amd64fre
DPC_STACK_BASE: FFFFF80000BA2FB0
LOCK_ADDRESS: fffff800030c6240 -- (!locks fffff800030c6240)
Cannot get _ERESOURCE type
Resource @ nt!PiEngineLock (0xfffff800030c6240) Available
1 total locks
PNP_TRIAGE_DATA:
Lock address : 0xfffff800030c6240
Thread Count : 0
Thread address: 0x0000000000000000
Thread wait : 0x0
LAST_CONTROL_TRANSFER: from fffff80002e985f2 to fffff80002ee9ba0
STACK_TEXT:
fffff800`00ba1cc8 fffff800`02e985f2 : 00000000`00000005 fffffa80`042b59b0 fffffa80`04c74b00 00000000`00000001 : nt!KeBugCheckEx
fffff800`00ba1cd0 fffff800`03141127 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeStackAttachProcess+0x52
fffff800`00ba1d50 fffff800`031414bf : 00000000`00000000 fffff8a0`00000000 fffff8a0`00001910 00000000`00000000 : nt!ObpDecrementHandleCount+0x177
fffff800`00ba1dd0 fffff800`031411e4 : 00000000`000008e4 fffffa80`04c74b00 fffff8a0`00001910 00000000`000008e4 : nt!ObpCloseHandleTableEntry+0xaf
fffff800`00ba1e60 fffff800`02ef7bd3 : fffffa80`076a6b50 fffff800`00ba1f30 fffff800`031ab200 fffff800`0313776a : nt!ObpCloseHandle+0x94
fffff800`00ba1eb0 fffff800`02eed3b0 : fffff800`03184d73 fffffa80`04e1e060 fffff800`031ab200 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
fffff800`00ba2048 fffff800`03184d73 : fffffa80`04e1e060 fffff800`031ab200 00000000`00000000 00000000`00000000 : nt!KiServiceLinkage
fffff800`00ba2050 fffff800`0318ea78 : fffffa80`04e1e060 00000000`00000001 fffffa80`04e1d6e0 00000000`00000000 : nt!PiGetDeviceRegistryProperty+0xab
fffff800`00ba21b0 fffff800`03183a90 : fffffa80`04e1e060 fffffa80`04e1e060 00000000`00000000 00000000`00000000 : nt!IoGetDeviceProperty+0xbc
fffff800`00ba2290 fffff800`03194f51 : 00000000`ffff0000 fffffa80`07df09f0 fffff880`01480110 fffffa80`05cfe910 : nt!IopOpenOrCreateDeviceRegistryKey+0x14c
fffff800`00ba2450 fffff880`014c5152 : fffffa80`080038e0 fffff800`00ba25e0 fffffa80`0700aa78 00000000`000007ff : nt!IoOpenDeviceRegistryKey+0x11
fffff800`00ba2490 fffff880`01430b34 : fffff800`00ba25e0 fffff800`00ba25b8 fffffa80`055e31a0 fffff880`014db21d : ndis!NdisOpenConfiguration+0xb2
fffff800`00ba24d0 fffff880`04e5194f : 00000000`00000000 fffff800`00ba25e0 fffff880`05060c28 00000000`00000000 : ndis!NdisOpenConfigurationEx+0xa4
fffff800`00ba2540 00000000`00000000 : fffff800`00ba25e0 fffff880`05060c28 00000000`00000000 fffffa80`001801a9 : netr28x+0x4b94f
THREAD_SHA1_HASH_MOD_FUNC: ae5746727567d6f3e980a5bab83b7524a5dc9ee8
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: a4491f04e0c588cecd320ea5c66c026862f569ea
THREAD_SHA1_HASH_MOD: 34d7ba38146ecb972065c22fa7203d72f73eccb4
FOLLOWUP_IP:
netr28x+4b94f
fffff880`04e5194f ?? ???
SYMBOL_STACK_INDEX: d
SYMBOL_NAME: netr28x+4b94f
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: netr28x
IMAGE_NAME: netr28x.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: X64_0x5_netr28x+4b94f
BUCKET_ID: X64_0x5_netr28x+4b94f
PRIMARY_PROBLEM_CLASS: X64_0x5_netr28x+4b94f
TARGET_TIME: 2019-04-11T14:09:37.000Z
OSBUILD: 7601
OSSERVICEPACK: 1000
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 7
OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2019-03-06 05:38:53
BUILDDATESTAMP_STR: 190305-1700
BUILDLAB_STR: win7sp1_ldr_escrow
BUILDOSVER_STR: 6.1.7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700
ANALYSIS_SESSION_ELAPSED_TIME: 941
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:x64_0x5_netr28x+4b94f
FAILURE_ID_HASH: {43753b0b-e234-1a01-8468-7eed644d41ea}
Followup: MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff8a002085398, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80003ae56fd, address which referenced memory
Debugging Details:
------------------
GetUlongPtrFromAddress: unable to read from fffff80003ab1300
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 1
Key : Analysis.Elapsed.Sec
Value: 1
Key : Analysis.Memory.CommitPeak.Mb
Value: 62
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700
SYSTEM_MANUFACTURER: Hewlett-Packard
SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC
SYSTEM_SKU: J4T62EA#AB8
SYSTEM_VERSION: 0991100000000000000600087
BIOS_VENDOR: Insyde
BIOS_VERSION: F.43
BIOS_DATE: 12/19/2017
BASEBOARD_MANUFACTURER: Hewlett-Packard
BASEBOARD_PRODUCT: 2211
BASEBOARD_VERSION: 86.56
DUMP_TYPE: 2
BUGCHECK_P1: fffff8a002085398
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff80003ae56fd
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80003ab1100
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff80003ab12f0
GetUlongPtrFromAddress: unable to read from fffff80003ab14a8
GetPointerFromAddress: unable to read from fffff80003ab10d8
fffff8a002085398 Paged pool
CURRENT_IRQL: 2
FAULTING_IP:
nt!HvpDoAllocateCell+101
fffff800`03ae56fd 89443d00 mov dword ptr [rbp+rdi],eax
CPU_COUNT: 4
CPU_MHZ: 6a0
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 45
CPU_STEPPING: 1
CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init)
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: System
ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5
ANALYSIS_SESSION_TIME: 06-17-2019 20:48:46.0248
ANALYSIS_VERSION: 10.0.18869.1002 amd64fre
TRAP_FRAME: fffff80004c1a950 -- (.trap 0xfffff80004c1a950)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000008 rbx=0000000000000000 rcx=0000000000000368
rdx=0000000000000002 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80003ae56fd rsp=fffff80004c1aae0 rbp=0000000000000030
r8=fffff8a000024010 r9=0000000000000005 r10=fffff8a002085000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!HvpDoAllocateCell+0x101:
fffff800`03ae56fd 89443d00 mov dword ptr [rbp+rdi],eax ss:0018:00000000`00000030=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800038b5f69 to fffff800038a7ba0
STACK_TEXT:
fffff800`04c1a808 fffff800`038b5f69 : 00000000`0000000a fffff8a0`02085398 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff800`04c1a810 fffff800`038b3d88 : 00000000`00000001 fffff8a0`02085398 00000000`00000000 fffff8a0`00024010 : nt!KiBugCheckDispatch+0x69
fffff800`04c1a950 fffff800`03ae56fd : fffff8a0`00024010 fffff8a0`00024010 fffff8a0`0003b420 fffff800`00000000 : nt!KiPageFault+0x448
fffff800`04c1aae0 fffff800`03b27d1d : fffff8a0`00024010 00000000`00000000 00000000`00000000 00000000`ffffffff : nt!HvpDoAllocateCell+0x101
fffff800`04c1ab40 fffff800`03b27bad : 00000000`00000000 fffff8a0`018bcc30 00000000`00000008 fffff800`03b15d5c : nt!HvAllocateCell+0x55
fffff800`04c1ab70 fffff800`03ada4bf : fffff8a0`00024010 fffff8a0`00024010 fffff8a0`018ca640 fffff800`04c1ae18 : nt!CmpAddValueKeyNew+0x69
fffff800`04c1ac40 fffff800`03cc06e3 : 01d501ff`f5623883 fffff800`04c1aff0 fffff8a0`04468820 00000000`00000000 : nt!CmpSetValueKeyNew+0x77
fffff800`04c1ac90 fffff800`03ae5531 : fffff8a0`0506b140 fffff800`04c1ae18 fffffa80`00000004 fffff800`04c1b210 : nt!CmSetValueKey+0xba3
fffff800`04c1add0 fffff800`038b5bd3 : ffffffff`80000dc4 00000000`00000002 fffffa80`00000000 fffff800`00000004 : nt!NtSetValueKey+0x349
fffff800`04c1af00 fffff800`038ab3b0 : fffff800`03bfc2a2 fffff800`04c1b248 fffff880`01525152 fffffa80`00040001 : nt!KiSystemServiceCopyEnd+0x13
fffff800`04c1b108 fffff800`03bfc2a2 : fffff800`04c1b248 fffff880`01525152 fffffa80`00040001 fffff800`04c1b270 : nt!KiServiceLinkage
fffff800`04c1b110 fffff880`0152cd96 : 00000000`00000004 fffffa80`0449b4e0 fffff880`0525c030 00000000`000007ff : nt!RtlWriteRegistryValue+0x62
fffff800`04c1b170 fffff880`050b698d : fffff800`04c1b270 fffff880`052c5c28 00000000`00000000 00000000`00000000 : ndis!NdisWriteConfiguration+0x156
fffff800`04c1b1d0 fffff800`04c1b270 : fffff880`052c5c28 00000000`00000000 00000000`00000000 fffff800`001801a9 : netr28x+0x4b98d
fffff800`04c1b1d8 fffff880`052c5c28 : 00000000`00000000 00000000`00000000 fffff800`001801a9 fffffa80`05b7f1a0 : 0xfffff800`04c1b270
fffff800`04c1b1e0 00000000`00000000 : 00000000`00000000 fffff800`001801a9 fffffa80`05b7f1a0 fffff800`00000000 : netr28x+0x25ac28
THREAD_SHA1_HASH_MOD_FUNC: 80858fdf941bd645ff48b6997b30f63ac59926fb
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 394aafee51f76470053fa2102b9df0f0f7df42a3
THREAD_SHA1_HASH_MOD: 5d50876435db08b990ce5928fe5c90526c26b16c
FOLLOWUP_IP:
netr28x+4b98d
fffff880`050b698d ?? ???
SYMBOL_STACK_INDEX: d
SYMBOL_NAME: netr28x+4b98d
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: netr28x
IMAGE_NAME: netr28x.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: X64_0xA_netr28x+4b98d
BUCKET_ID: X64_0xA_netr28x+4b98d
PRIMARY_PROBLEM_CLASS: X64_0xA_netr28x+4b98d
TARGET_TIME: 2019-05-03T22:31:32.000Z
OSBUILD: 7601
OSSERVICEPACK: 1000
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 7
OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2019-03-21 04:38:47
BUILDDATESTAMP_STR: 190320-1700
BUILDLAB_STR: win7sp1_ldr_escrow
BUILDOSVER_STR: 6.1.7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700
ANALYSIS_SESSION_ELAPSED_TIME: 7b0
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:x64_0xa_netr28x+4b98d
FAILURE_ID_HASH: {a6eb3f60-a5c3-0bd6-051c-41bf4427925d}
Followup: MachineOwner
---------
INVALID_PROCESS_ATTACH_ATTEMPT (5)
Arguments:
Arg1: fffffa80042cf9b0
Arg2: fffffa80045a46e0
Arg3: 0000000000000000
Arg4: 0000000000000001
Debugging Details:
------------------
GetUlongPtrFromAddress: unable to read from fffff800030fb300
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 2
Key : Analysis.Elapsed.Sec
Value: 2
Key : Analysis.Memory.CommitPeak.Mb
Value: 62
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700
SYSTEM_MANUFACTURER: Hewlett-Packard
SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC
SYSTEM_SKU: J4T62EA#AB8
SYSTEM_VERSION: 0991100000000000000600087
BIOS_VENDOR: Insyde
BIOS_VERSION: F.43
BIOS_DATE: 12/19/2017
BASEBOARD_MANUFACTURER: Hewlett-Packard
BASEBOARD_PRODUCT: 2211
BASEBOARD_VERSION: 86.56
DUMP_TYPE: 2
BUGCHECK_P1: fffffa80042cf9b0
BUGCHECK_P2: fffffa80045a46e0
BUGCHECK_P3: 0
BUGCHECK_P4: 1
CPU_COUNT: 4
CPU_MHZ: 6a0
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 45
CPU_STEPPING: 1
CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init)
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
BUGCHECK_STR: 0x5
PROCESS_NAME: chrome.exe
CURRENT_IRQL: 2
ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5
ANALYSIS_SESSION_TIME: 06-17-2019 20:48:24.0070
ANALYSIS_VERSION: 10.0.18869.1002 amd64fre
DPC_STACK_BASE: FFFFF80000BA2FB0
LOCK_ADDRESS: fffff800030ce240 -- (!locks fffff800030ce240)
Cannot get _ERESOURCE type
Resource @ nt!PiEngineLock (0xfffff800030ce240) Available
1 total locks
PNP_TRIAGE_DATA:
Lock address : 0xfffff800030ce240
Thread Count : 0
Thread address: 0x0000000000000000
Thread wait : 0x0
LAST_CONTROL_TRANSFER: from fffff80002ea05f2 to fffff80002ef1ba0
STACK_TEXT:
fffff800`00ba1cc8 fffff800`02ea05f2 : 00000000`00000005 fffffa80`042cf9b0 fffffa80`045a46e0 00000000`00000000 : nt!KeBugCheckEx
fffff800`00ba1cd0 fffff800`03149127 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeStackAttachProcess+0x52
fffff800`00ba1d50 fffff800`031494bf : 00000000`00000000 fffff8a0`00000000 fffff8a0`00001910 00000000`00000000 : nt!ObpDecrementHandleCount+0x177
fffff800`00ba1dd0 fffff800`031491e4 : 00000000`00000b3c fffffa80`045a46e0 fffff8a0`00001910 00000000`00000b3c : nt!ObpCloseHandleTableEntry+0xaf
fffff800`00ba1e60 fffff800`02effbd3 : fffffa80`04502060 fffff800`00ba1f30 fffff800`031b3200 fffff800`0313f76a : nt!ObpCloseHandle+0x94
fffff800`00ba1eb0 fffff800`02ef53b0 : fffff800`0318cd73 fffffa80`04ebd060 fffff800`031b3200 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
fffff800`00ba2048 fffff800`0318cd73 : fffffa80`04ebd060 fffff800`031b3200 00000000`00000000 00000000`00000000 : nt!KiServiceLinkage
fffff800`00ba2050 fffff800`03196a78 : fffffa80`04ebd060 00000000`00000001 fffffa80`04eba6e0 00000000`00000000 : nt!PiGetDeviceRegistryProperty+0xab
fffff800`00ba21b0 fffff800`0318ba90 : fffffa80`04ebd060 fffffa80`04ebd060 00000000`00000000 00000000`00000000 : nt!IoGetDeviceProperty+0xbc
fffff800`00ba2290 fffff800`0319cf51 : 00000000`ffff0000 fffffa80`08470cb0 fffff880`0147f110 fffffa80`059fbe30 : nt!IopOpenOrCreateDeviceRegistryKey+0x14c
fffff800`00ba2450 fffff880`014c4152 : fffffa80`0681f000 fffff800`00ba25e0 00000000`00000005 00000000`000007ff : nt!IoOpenDeviceRegistryKey+0x11
fffff800`00ba2490 fffff880`0142fb34 : fffff800`00ba25e0 fffff800`00ba25b8 fffffa80`05bf61a0 fffff800`02e262ea : ndis!NdisOpenConfiguration+0xb2
fffff800`00ba24d0 fffff880`0511d94f : 00000000`00000000 fffff800`00ba25e0 fffff880`0532cc28 00000000`00000000 : ndis!NdisOpenConfigurationEx+0xa4
fffff800`00ba2540 00000000`00000000 : fffff800`00ba25e0 fffff880`0532cc28 00000000`00000000 fffffa80`001801a9 : netr28x+0x4b94f
THREAD_SHA1_HASH_MOD_FUNC: ae5746727567d6f3e980a5bab83b7524a5dc9ee8
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: a4491f04e0c588cecd320ea5c66c026862f569ea
THREAD_SHA1_HASH_MOD: 34d7ba38146ecb972065c22fa7203d72f73eccb4
FOLLOWUP_IP:
netr28x+4b94f
fffff880`0511d94f ?? ???
SYMBOL_STACK_INDEX: d
SYMBOL_NAME: netr28x+4b94f
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: netr28x
IMAGE_NAME: netr28x.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: X64_0x5_netr28x+4b94f
BUCKET_ID: X64_0x5_netr28x+4b94f
PRIMARY_PROBLEM_CLASS: X64_0x5_netr28x+4b94f
TARGET_TIME: 2019-04-11T14:13:16.000Z
OSBUILD: 7601
OSSERVICEPACK: 1000
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 7
OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2019-03-06 05:38:53
BUILDDATESTAMP_STR: 190305-1700
BUILDLAB_STR: win7sp1_ldr_escrow
BUILDOSVER_STR: 6.1.7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700
ANALYSIS_SESSION_ELAPSED_TIME: 851
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:x64_0x5_netr28x+4b94f
FAILURE_ID_HASH: {43753b0b-e234-1a01-8468-7eed644d41ea}
Followup: MachineOwner
---------
INVALID_PROCESS_ATTACH_ATTEMPT (5)
Arguments:
Arg1: fffffa80042ce9b0
Arg2: fffffa800b053b00
Arg3: 0000000000000000
Arg4: 0000000000000001
Debugging Details:
------------------
GetUlongPtrFromAddress: unable to read from fffff800032ed300
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 1
Key : Analysis.Elapsed.Sec
Value: 2
Key : Analysis.Memory.CommitPeak.Mb
Value: 62
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700
SYSTEM_MANUFACTURER: Hewlett-Packard
SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC
SYSTEM_SKU: J4T62EA#AB8
SYSTEM_VERSION: 0991100000000000000600087
BIOS_VENDOR: Insyde
BIOS_VERSION: F.43
BIOS_DATE: 12/19/2017
BASEBOARD_MANUFACTURER: Hewlett-Packard
BASEBOARD_PRODUCT: 2211
BASEBOARD_VERSION: 86.56
DUMP_TYPE: 2
BUGCHECK_P1: fffffa80042ce9b0
BUGCHECK_P2: fffffa800b053b00
BUGCHECK_P3: 0
BUGCHECK_P4: 1
CPU_COUNT: 4
CPU_MHZ: 6a0
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 45
CPU_STEPPING: 1
CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init)
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
BUGCHECK_STR: 0x5
PROCESS_NAME: mcbuilder.exe
CURRENT_IRQL: 2
ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5
ANALYSIS_SESSION_TIME: 06-17-2019 20:48:40.0990
ANALYSIS_VERSION: 10.0.18869.1002 amd64fre
DPC_STACK_BASE: FFFFF80000BA2FB0
LOCK_ADDRESS: fffff800032c0240 -- (!locks fffff800032c0240)
Cannot get _ERESOURCE type
Resource @ nt!PiEngineLock (0xfffff800032c0240) Available
1 total locks
PNP_TRIAGE_DATA:
Lock address : 0xfffff800032c0240
Thread Count : 0
Thread address: 0x0000000000000000
Thread wait : 0x0
LAST_CONTROL_TRANSFER: from fffff800030925f2 to fffff800030e3ba0
STACK_TEXT:
fffff800`00ba1cc8 fffff800`030925f2 : 00000000`00000005 fffffa80`042ce9b0 fffffa80`0b053b00 00000000`00000000 : nt!KeBugCheckEx
fffff800`00ba1cd0 fffff800`0333b127 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeStackAttachProcess+0x52
fffff800`00ba1d50 fffff800`0333b4bf : 00000000`00000000 fffff8a0`00000000 fffff8a0`00001910 00000000`00000000 : nt!ObpDecrementHandleCount+0x177
fffff800`00ba1dd0 fffff800`0333b1e4 : 00000000`00000d0c fffffa80`0b053b00 fffff8a0`00001910 00000000`00000d0c : nt!ObpCloseHandleTableEntry+0xaf
fffff800`00ba1e60 fffff800`030f1bd3 : fffffa80`0568b6e0 fffff800`00ba1f30 fffff800`033a5200 fffff800`0333176a : nt!ObpCloseHandle+0x94
fffff800`00ba1eb0 fffff800`030e73b0 : fffff800`0337ed73 fffffa80`04dc8060 fffff800`033a5200 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
fffff800`00ba2048 fffff800`0337ed73 : fffffa80`04dc8060 fffff800`033a5200 00000000`00000000 00000000`00000000 : nt!KiServiceLinkage
fffff800`00ba2050 fffff800`03388a78 : fffffa80`04dc8060 00000000`00000001 fffffa80`04dc36e0 00000000`00000000 : nt!PiGetDeviceRegistryProperty+0xab
fffff800`00ba21b0 fffff800`0337da90 : fffffa80`04dc8060 fffffa80`04dc8060 00000000`00000000 00000000`00000000 : nt!IoGetDeviceProperty+0xbc
fffff800`00ba2290 fffff800`0338ef51 : 00000000`ffff0000 fffffa80`09035950 fffff880`014a0110 fffffa80`05adbd80 : nt!IopOpenOrCreateDeviceRegistryKey+0x14c
fffff800`00ba2450 fffff880`014e5152 : fffffa80`00000000 fffff800`00ba25e0 00000000`00000000 00000000`000007ff : nt!IoOpenDeviceRegistryKey+0x11
fffff800`00ba2490 fffff880`01450b34 : fffff800`00ba25e0 fffff800`00ba25b8 fffffa80`05bc91a0 00000000`00000001 : ndis!NdisOpenConfiguration+0xb2
fffff800`00ba24d0 fffff880`056cc94f : 00000000`00000000 fffff800`00ba25e0 fffff880`058dbc28 00000000`00000000 : ndis!NdisOpenConfigurationEx+0xa4
fffff800`00ba2540 00000000`00000000 : fffff800`00ba25e0 fffff880`058dbc28 00000000`00000000 fffffa80`001801a9 : netr28x+0x4b94f
THREAD_SHA1_HASH_MOD_FUNC: ae5746727567d6f3e980a5bab83b7524a5dc9ee8
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: a4491f04e0c588cecd320ea5c66c026862f569ea
THREAD_SHA1_HASH_MOD: 34d7ba38146ecb972065c22fa7203d72f73eccb4
FOLLOWUP_IP:
netr28x+4b94f
fffff880`056cc94f ?? ???
SYMBOL_STACK_INDEX: d
SYMBOL_NAME: netr28x+4b94f
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: netr28x
IMAGE_NAME: netr28x.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: X64_0x5_netr28x+4b94f
BUCKET_ID: X64_0x5_netr28x+4b94f
PRIMARY_PROBLEM_CLASS: X64_0x5_netr28x+4b94f
TARGET_TIME: 2019-04-11T17:47:48.000Z
OSBUILD: 7601
OSSERVICEPACK: 1000
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 7
OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2019-03-06 05:38:53
BUILDDATESTAMP_STR: 190305-1700
BUILDLAB_STR: win7sp1_ldr_escrow
BUILDOSVER_STR: 6.1.7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700
ANALYSIS_SESSION_ELAPSED_TIME: 7f5
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:x64_0x5_netr28x+4b94f
FAILURE_ID_HASH: {43753b0b-e234-1a01-8468-7eed644d41ea}
Followup: MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff8a006be8c34, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80003afb730, address which referenced memory
Debugging Details:
------------------
GetUlongPtrFromAddress: unable to read from fffff80003ab2300
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 1
Key : Analysis.Elapsed.Sec
Value: 1
Key : Analysis.Memory.CommitPeak.Mb
Value: 62
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700
SYSTEM_MANUFACTURER: Hewlett-Packard
SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC
SYSTEM_SKU: J4T62EA#AB8
SYSTEM_VERSION: 0991100000000000000600087
BIOS_VENDOR: Insyde
BIOS_VERSION: F.43
BIOS_DATE: 12/19/2017
BASEBOARD_MANUFACTURER: Hewlett-Packard
BASEBOARD_PRODUCT: 2211
BASEBOARD_VERSION: 86.56
DUMP_TYPE: 2
BUGCHECK_P1: fffff8a006be8c34
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff80003afb730
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80003ab2100
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff80003ab22f0
GetUlongPtrFromAddress: unable to read from fffff80003ab24a8
GetPointerFromAddress: unable to read from fffff80003ab20d8
fffff8a006be8c34 Paged pool
CURRENT_IRQL: 2
FAULTING_IP:
nt!CmpFindValueByNameFromCache+e0
fffff800`03afb730 428b14b8 mov edx,dword ptr [rax+r15*4]
CPU_COUNT: 4
CPU_MHZ: 6a0
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 45
CPU_STEPPING: 1
CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init)
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: System
ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5
ANALYSIS_SESSION_TIME: 06-17-2019 20:48:30.0482
ANALYSIS_VERSION: 10.0.18869.1002 amd64fre
TRAP_FRAME: fffff80004c21990 -- (.trap 0xfffff80004c21990)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8a006be8c34 rbx=0000000000000000 rcx=0000000000000000
rdx=00000000ffffffff rsi=0000000000000000 rdi=0000000000000000
rip=fffff80003afb730 rsp=fffff80004c21b20 rbp=fffff80004c21ff0
r8=fffff8a00004ad40 r9=000000000000ffff r10=0000000000000001
r11=fffff80004c21dc8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!CmpFindValueByNameFromCache+0xe0:
fffff800`03afb730 428b14b8 mov edx,dword ptr [rax+r15*4] ds:fffff8a0`06be8c34=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800038b6f69 to fffff800038a8ba0
STACK_TEXT:
fffff800`04c21848 fffff800`038b6f69 : 00000000`0000000a fffff8a0`06be8c34 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff800`04c21850 fffff800`038b4d88 : 00000000`00000000 fffff8a0`06be8c34 fffffa80`0a1a6000 fffff8a0`00024010 : nt!KiBugCheckDispatch+0x69
fffff800`04c21990 fffff800`03afb730 : fffff8a0`00024010 00000000`00c6ac30 fffff8a0`0004ad40 00000000`00000000 : nt!KiPageFault+0x448
fffff800`04c21b20 fffff800`03adec38 : fffff8a0`0e0d74a8 fffff800`04c21e18 fffff800`04c21c60 fffff800`04c21c48 : nt!CmpFindValueByNameFromCache+0xe0
fffff800`04c21bf0 fffff800`03cc11e7 : fffff8a0`0e0d74a8 01d50684`f67b3cde fffff8a0`0e0d74a8 00000000`00000000 : nt!CmpCompareNewValueDataAgainstKCBCache+0x78
fffff800`04c21c90 fffff800`03ae6531 : fffff8a0`01c5f710 fffff800`04c21e18 fffffa80`00000004 fffff800`04c22210 : nt!CmSetValueKey+0x6a7
fffff800`04c21dd0 fffff800`038b6bd3 : ffffffff`80002788 00000000`00000002 fffffa80`00000000 fffff800`00000004 : nt!NtSetValueKey+0x349
fffff800`04c21f00 fffff800`038ac3b0 : fffff800`03bfd2a2 fffff800`04c22248 fffff880`017a5152 00000000`c0000001 : nt!KiSystemServiceCopyEnd+0x13
fffff800`04c22108 fffff800`03bfd2a2 : fffff800`04c22248 fffff880`017a5152 00000000`c0000001 fffff800`04c22270 : nt!KiServiceLinkage
fffff800`04c22110 fffff880`017acd96 : 00000000`00000004 fffffa80`09b31af0 00000100`00000000 00000000`000007ff : nt!RtlWriteRegistryValue+0x62
fffff800`04c22170 fffff880`056a498d : fffff800`04c22270 fffff880`058b3c28 00000000`00000000 00000000`00000000 : ndis!NdisWriteConfiguration+0x156
fffff800`04c221d0 fffff800`04c22270 : fffff880`058b3c28 00000000`00000000 00000000`00000000 00000000`001801a9 : netr28x+0x4b98d
fffff800`04c221d8 fffff880`058b3c28 : 00000000`00000000 00000000`00000000 00000000`001801a9 fffffa80`05b821a0 : 0xfffff800`04c22270
fffff800`04c221e0 00000000`00000000 : 00000000`00000000 00000000`001801a9 fffffa80`05b821a0 00000000`00000000 : netr28x+0x25ac28
THREAD_SHA1_HASH_MOD_FUNC: 935105e89958188e75032d802c31088ef212f1d5
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 050e790aab7ddac4bfe73c42f1350165ef3ea549
THREAD_SHA1_HASH_MOD: 7921e317582c7f98a7f13cfbcd3c02a86fdcafec
FOLLOWUP_IP:
netr28x+4b98d
fffff880`056a498d ?? ???
SYMBOL_STACK_INDEX: b
SYMBOL_NAME: netr28x+4b98d
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: netr28x
IMAGE_NAME: netr28x.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: X64_0xA_netr28x+4b98d
BUCKET_ID: X64_0xA_netr28x+4b98d
PRIMARY_PROBLEM_CLASS: X64_0xA_netr28x+4b98d
TARGET_TIME: 2019-05-09T16:33:41.000Z
OSBUILD: 7601
OSSERVICEPACK: 1000
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 7
OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2019-03-21 04:38:47
BUILDDATESTAMP_STR: 190320-1700
BUILDLAB_STR: win7sp1_ldr_escrow
BUILDOSVER_STR: 6.1.7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700
ANALYSIS_SESSION_ELAPSED_TIME: 716
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:x64_0xa_netr28x+4b98d
FAILURE_ID_HASH: {a6eb3f60-a5c3-0bd6-051c-41bf4427925d}
Followup: MachineOwner
---------
INVALID_PROCESS_ATTACH_ATTEMPT (5)
Arguments:
Arg1: fffffa80042b59b0
Arg2: fffffa80048376b0
Arg3: 0000000000000000
Arg4: 0000000000000001
Debugging Details:
------------------
GetUlongPtrFromAddress: unable to read from fffff8000309f300
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 1
Key : Analysis.Elapsed.Sec
Value: 1
Key : Analysis.Memory.CommitPeak.Mb
Value: 62
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700
SYSTEM_MANUFACTURER: Hewlett-Packard
SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC
SYSTEM_SKU: J4T62EA#AB8
SYSTEM_VERSION: 0991100000000000000600087
BIOS_VENDOR: Insyde
BIOS_VERSION: F.43
BIOS_DATE: 12/19/2017
BASEBOARD_MANUFACTURER: Hewlett-Packard
BASEBOARD_PRODUCT: 2211
BASEBOARD_VERSION: 86.56
DUMP_TYPE: 2
BUGCHECK_P1: fffffa80042b59b0
BUGCHECK_P2: fffffa80048376b0
BUGCHECK_P3: 0
BUGCHECK_P4: 1
CPU_COUNT: 4
CPU_MHZ: 6a0
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 45
CPU_STEPPING: 1
CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init)
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
BUGCHECK_STR: 0x5
PROCESS_NAME: PointBlank.exe
CURRENT_IRQL: 2
ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5
ANALYSIS_SESSION_TIME: 06-17-2019 21:16:16.0171
ANALYSIS_VERSION: 10.0.18869.1002 amd64fre
DPC_STACK_BASE: FFFFF80000BA2FB0
LOCK_ADDRESS: fffff80003072240 -- (!locks fffff80003072240)
Cannot get _ERESOURCE type
Resource @ nt!PiEngineLock (0xfffff80003072240) Available
1 total locks
PNP_TRIAGE_DATA:
Lock address : 0xfffff80003072240
Thread Count : 0
Thread address: 0x0000000000000000
Thread wait : 0x0
LAST_CONTROL_TRANSFER: from fffff80002e445f2 to fffff80002e95ba0
STACK_TEXT:
fffff800`00ba1cc8 fffff800`02e445f2 : 00000000`00000005 fffffa80`042b59b0 fffffa80`048376b0 00000000`00000000 : nt!KeBugCheckEx
fffff800`00ba1cd0 fffff800`030ed127 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeStackAttachProcess+0x52
fffff800`00ba1d50 fffff800`030ed4bf : 00000000`00000000 fffff8a0`00000000 fffff8a0`00001910 00000000`00000000 : nt!ObpDecrementHandleCount+0x177
fffff800`00ba1dd0 fffff800`030ed1e4 : 00000000`00000c9c fffffa80`048376b0 fffff8a0`00001910 00000000`00000c9c : nt!ObpCloseHandleTableEntry+0xaf
fffff800`00ba1e60 fffff800`02ea3bd3 : fffffa80`04988060 fffff800`00ba1f30 fffff800`03157200 fffff800`030e376a : nt!ObpCloseHandle+0x94
fffff800`00ba1eb0 fffff800`02e993b0 : fffff800`03130d73 fffffa80`04e7d060 fffff800`03157200 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
fffff800`00ba2048 fffff800`03130d73 : fffffa80`04e7d060 fffff800`03157200 00000000`00000000 00000000`00000000 : nt!KiServiceLinkage
fffff800`00ba2050 fffff800`0313aa78 : fffffa80`04e7d060 00000000`00000001 fffffa80`04e386e0 00000000`00000000 : nt!PiGetDeviceRegistryProperty+0xab
fffff800`00ba21b0 fffff800`0312fa90 : fffffa80`04e7d060 fffffa80`04e7d060 00000000`00000000 00000000`00000000 : nt!IoGetDeviceProperty+0xbc
fffff800`00ba2290 fffff800`03140f51 : 00000000`ffff0000 fffffa80`08033990 fffff880`014d7110 fffffa80`05bfaf70 : nt!IopOpenOrCreateDeviceRegistryKey+0x14c
fffff800`00ba2450 fffff880`0151c152 : fffffa80`049479f0 fffff800`00ba25e0 fffffa80`06f64a78 00000000`000007ff : nt!IoOpenDeviceRegistryKey+0x11
fffff800`00ba2490 fffff880`01487b34 : fffff800`00ba25e0 fffff800`00ba25b8 fffffa80`05bf91a0 fffff880`0153221d : ndis!NdisOpenConfiguration+0xb2
fffff800`00ba24d0 fffff880`04eff94f : fffffa80`00000000 fffff800`00ba25e0 fffff880`0510ec28 00000000`00000000 : ndis!NdisOpenConfigurationEx+0xa4
fffff800`00ba2540 fffffa80`00000000 : fffff800`00ba25e0 fffff880`0510ec28 00000000`00000000 00000000`001801a9 : netr28x+0x4b94f
fffff800`00ba2548 fffff800`00ba25e0 : fffff880`0510ec28 00000000`00000000 00000000`001801a9 fffffa80`05bf91a0 : 0xfffffa80`00000000
fffff800`00ba2550 fffff880`0510ec28 : 00000000`00000000 00000000`001801a9 fffffa80`05bf91a0 fffffa80`00000000 : 0xfffff800`00ba25e0
fffff800`00ba2558 00000000`00000000 : 00000000`001801a9 fffffa80`05bf91a0 fffffa80`00000000 fffff880`04f0be2e : netr28x+0x25ac28
THREAD_SHA1_HASH_MOD_FUNC: 1764d353450a941fbc74295279ec02651c3d9814
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: bdc70d393af014c177e84e60c668cc911acaf71f
THREAD_SHA1_HASH_MOD: 9a9dca34541ae91666e3989df373f06b6e683623
FOLLOWUP_IP:
netr28x+4b94f
fffff880`04eff94f ?? ???
SYMBOL_STACK_INDEX: d
SYMBOL_NAME: netr28x+4b94f
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: netr28x
IMAGE_NAME: netr28x.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: X64_0x5_netr28x+4b94f
BUCKET_ID: X64_0x5_netr28x+4b94f
PRIMARY_PROBLEM_CLASS: X64_0x5_netr28x+4b94f
TARGET_TIME: 2019-04-11T14:53:19.000Z
OSBUILD: 7601
OSSERVICEPACK: 1000
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 7
OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2019-03-06 05:38:53
BUILDDATESTAMP_STR: 190305-1700
BUILDLAB_STR: win7sp1_ldr_escrow
BUILDOSVER_STR: 6.1.7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700
ANALYSIS_SESSION_ELAPSED_TIME: 7ca
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:x64_0x5_netr28x+4b94f
FAILURE_ID_HASH: {43753b0b-e234-1a01-8468-7eed644d41ea}
Followup: MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff8a000e8ee98, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff800032e66fd, address which referenced memory
Debugging Details:
------------------
GetUlongPtrFromAddress: unable to read from fffff800032b2300
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 1
Key : Analysis.Elapsed.Sec
Value: 1
Key : Analysis.Memory.CommitPeak.Mb
Value: 62
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700
SYSTEM_MANUFACTURER: Hewlett-Packard
SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC
SYSTEM_SKU: J4T62EA#AB8
SYSTEM_VERSION: 0991100000000000000600087
BIOS_VENDOR: Insyde
BIOS_VERSION: F.43
BIOS_DATE: 12/19/2017
BASEBOARD_MANUFACTURER: Hewlett-Packard
BASEBOARD_PRODUCT: 2211
BASEBOARD_VERSION: 86.56
DUMP_TYPE: 2
BUGCHECK_P1: fffff8a000e8ee98
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff800032e66fd
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800032b2100
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff800032b22f0
GetUlongPtrFromAddress: unable to read from fffff800032b24a8
GetPointerFromAddress: unable to read from fffff800032b20d8
fffff8a000e8ee98 Paged pool
CURRENT_IRQL: 2
FAULTING_IP:
nt!HvpDoAllocateCell+101
fffff800`032e66fd 89443d00 mov dword ptr [rbp+rdi],eax
CPU_COUNT: 4
CPU_MHZ: 6a0
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 45
CPU_STEPPING: 1
CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init)
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: System
ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5
ANALYSIS_SESSION_TIME: 06-17-2019 21:16:26.0291
ANALYSIS_VERSION: 10.0.18869.1002 amd64fre
TRAP_FRAME: fffff80004418950 -- (.trap 0xfffff80004418950)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000020 rbx=0000000000000000 rcx=0000000000002e68
rdx=0000000000000006 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800032e66fd rsp=fffff80004418ae0 rbp=0000000000000030
r8=fffff8a000024010 r9=0000000000000005 r10=fffff8a000e8c000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!HvpDoAllocateCell+0x101:
fffff800`032e66fd 89443d00 mov dword ptr [rbp+rdi],eax ss:0018:00000000`00000030=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800030b6f69 to fffff800030a8ba0
STACK_TEXT:
fffff800`04418808 fffff800`030b6f69 : 00000000`0000000a fffff8a0`00e8ee98 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff800`04418810 fffff800`030b4d88 : 00000000`00000001 fffff8a0`00e8ee98 00000000`00000000 fffff8a0`00024010 : nt!KiBugCheckDispatch+0x69
fffff800`04418950 fffff800`032e66fd : fffff8a0`00024010 fffff8a0`00024010 fffff8a0`0004b9a0 fffff800`00000000 : nt!KiPageFault+0x448
fffff800`04418ae0 fffff800`03328d1d : fffff8a0`00024010 00000000`00000000 00000000`00000000 00000000`ffffffff : nt!HvpDoAllocateCell+0x101
fffff800`04418b40 fffff800`03328bad : 00000000`00000000 fffff8a0`00ff0c30 00000000`00000008 fffff800`03316d5c : nt!HvAllocateCell+0x55
fffff800`04418b70 fffff800`032db4bf : fffff8a0`00024010 fffff8a0`00024010 fffff8a0`00ffe640 fffff800`04418e18 : nt!CmpAddValueKeyNew+0x69
fffff800`04418c40 fffff800`034c16e3 : 01d4fd21`140179ca fffff800`04418ff0 fffff8a0`050bd948 00000000`00000000 : nt!CmpSetValueKeyNew+0x77
fffff800`04418c90 fffff800`032e6531 : fffff8a0`0df75fa0 fffff800`04418e18 fffffa80`00000004 fffff800`04419210 : nt!CmSetValueKey+0xba3
fffff800`04418dd0 fffff800`030b6bd3 : ffffffff`80000ab0 00000000`00000002 fffffa80`00000000 fffff800`00000004 : nt!NtSetValueKey+0x349
fffff800`04418f00 fffff800`030ac3b0 : fffff800`033fd2a2 fffff800`04419248 fffff880`014a9152 fffffa80`051e12f0 : nt!KiSystemServiceCopyEnd+0x13
fffff800`04419108 fffff800`033fd2a2 : fffff800`04419248 fffff880`014a9152 fffffa80`051e12f0 fffff800`04419270 : nt!KiServiceLinkage
fffff800`04419110 fffff880`014b0d96 : 00000000`00000004 fffffa80`0855a220 00000000`ffffffff 00000000`000007ff : nt!RtlWriteRegistryValue+0x62
fffff800`04419170 fffff880`04eef98d : fffff800`04419270 fffff880`050fec28 00000000`00000000 00000000`00000000 : ndis!NdisWriteConfiguration+0x156
fffff800`044191d0 fffff800`04419270 : fffff880`050fec28 00000000`00000000 00000000`00000000 fffff800`001801a9 : netr28x+0x4b98d
fffff800`044191d8 fffff880`050fec28 : 00000000`00000000 00000000`00000000 fffff800`001801a9 fffffa80`05be11a0 : 0xfffff800`04419270
fffff800`044191e0 00000000`00000000 : 00000000`00000000 fffff800`001801a9 fffffa80`05be11a0 fffff800`00000000 : netr28x+0x25ac28
THREAD_SHA1_HASH_MOD_FUNC: 80858fdf941bd645ff48b6997b30f63ac59926fb
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 394aafee51f76470053fa2102b9df0f0f7df42a3
THREAD_SHA1_HASH_MOD: 5d50876435db08b990ce5928fe5c90526c26b16c
FOLLOWUP_IP:
netr28x+4b98d
fffff880`04eef98d ?? ???
SYMBOL_STACK_INDEX: d
SYMBOL_NAME: netr28x+4b98d
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: netr28x
IMAGE_NAME: netr28x.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: X64_0xA_netr28x+4b98d
BUCKET_ID: X64_0xA_netr28x+4b98d
PRIMARY_PROBLEM_CLASS: X64_0xA_netr28x+4b98d
TARGET_TIME: 2019-04-27T17:46:01.000Z
OSBUILD: 7601
OSSERVICEPACK: 1000
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 7
OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2019-03-21 04:38:47
BUILDDATESTAMP_STR: 190320-1700
BUILDLAB_STR: win7sp1_ldr_escrow
BUILDOSVER_STR: 6.1.7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700
ANALYSIS_SESSION_ELAPSED_TIME: 720
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:x64_0xa_netr28x+4b98d
FAILURE_ID_HASH: {a6eb3f60-a5c3-0bd6-051c-41bf4427925d}
Followup: MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff8a000b0b260, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff800032d1738, address which referenced memory
Debugging Details:
------------------
GetUlongPtrFromAddress: unable to read from fffff8000329d300
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 1
Key : Analysis.Elapsed.Sec
Value: 1
Key : Analysis.Memory.CommitPeak.Mb
Value: 62
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700
SYSTEM_MANUFACTURER: Hewlett-Packard
SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC
SYSTEM_SKU: J4T62EA#AB8
SYSTEM_VERSION: 0991100000000000000600087
BIOS_VENDOR: Insyde
BIOS_VERSION: F.43
BIOS_DATE: 12/19/2017
BASEBOARD_MANUFACTURER: Hewlett-Packard
BASEBOARD_PRODUCT: 2211
BASEBOARD_VERSION: 86.56
DUMP_TYPE: 2
BUGCHECK_P1: fffff8a000b0b260
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff800032d1738
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff8000329d100
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff8000329d2f0
GetUlongPtrFromAddress: unable to read from fffff8000329d4a8
GetPointerFromAddress: unable to read from fffff8000329d0d8
fffff8a000b0b260 Paged pool
CURRENT_IRQL: 2
FAULTING_IP:
nt!HvpDoAllocateCell+13c
fffff800`032d1738 8907 mov dword ptr [rdi],eax
CPU_COUNT: 4
CPU_MHZ: 6a0
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 45
CPU_STEPPING: 1
CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init)
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: System
ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5
ANALYSIS_SESSION_TIME: 06-17-2019 21:16:23.0541
ANALYSIS_VERSION: 10.0.18869.1002 amd64fre
TRAP_FRAME: fffff80000b9b950 -- (.trap 0xfffff80000b9b950)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000ffffffd0 rbx=0000000000000000 rcx=000000000000000c
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800032d1738 rsp=fffff80000b9bae0 rbp=0000000000000030
r8=fffff8a0000512e0 r9=0000000000000005 r10=000000000000023b
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe cy
nt!HvpDoAllocateCell+0x13c:
fffff800`032d1738 8907 mov dword ptr [rdi],eax ds:00000000`00000000=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800030a1f69 to fffff80003093ba0
STACK_TEXT:
fffff800`00b9b808 fffff800`030a1f69 : 00000000`0000000a fffff8a0`00b0b260 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff800`00b9b810 fffff800`0309fd88 : 00000000`00000001 fffff8a0`00b0b260 00000000`00000000 fffff8a0`00024010 : nt!KiBugCheckDispatch+0x69
fffff800`00b9b950 fffff800`032d1738 : fffff8a0`00024010 fffff8a0`00024010 fffff8a0`000512e0 fffff800`00000000 : nt!KiPageFault+0x448
fffff800`00b9bae0 fffff800`03313d0d : fffff8a0`00024010 00000000`00000000 00000000`00000000 00000000`ffffffff : nt!HvpDoAllocateCell+0x13c
fffff800`00b9bb40 fffff800`03313b9d : 00000000`00000000 fffff8a0`00f38c30 00000000`00000008 fffff800`03301d5c : nt!HvAllocateCell+0x55
fffff800`00b9bb70 fffff800`032c64bf : fffff8a0`00024010 fffff8a0`00024010 fffff8a0`00f46640 fffff800`00b9be18 : nt!CmpAddValueKeyNew+0x69
fffff800`00b9bc40 fffff800`034ac6a3 : 01d4f07a`dd071b78 fffff800`00b9bff0 fffff8a0`04a444a8 00000000`00000000 : nt!CmpSetValueKeyNew+0x77
fffff800`00b9bc90 fffff800`032d1531 : fffff8a0`09c3f770 fffff800`00b9be18 fffffa80`00000004 fffff800`00b9c210 : nt!CmSetValueKey+0xba3
fffff800`00b9bdd0 fffff800`030a1bd3 : ffffffff`80000b54 00000000`00000002 fffffa80`00000000 fffff800`00000004 : nt!NtSetValueKey+0x349
fffff800`00b9bf00 fffff800`030973b0 : fffff800`033e8272 fffff800`00b9c248 fffff880`0151b152 fffffa80`074a45f0 : nt!KiSystemServiceCopyEnd+0x13
fffff800`00b9c108 fffff800`033e8272 : fffff800`00b9c248 fffff880`0151b152 fffffa80`074a45f0 fffff800`00b9c270 : nt!KiServiceLinkage
fffff800`00b9c110 fffff880`01522d96 : 00000000`00000004 fffffa80`05970b70 fffff800`03210800 00000000`000007ff : nt!RtlWriteRegistryValue+0x62
fffff800`00b9c170 fffff880`04eef98d : fffff800`00b9c270 fffff880`050fec28 00000000`00000000 00000000`00000000 : ndis!NdisWriteConfiguration+0x156
fffff800`00b9c1d0 fffff800`00b9c270 : fffff880`050fec28 00000000`00000000 00000000`00000000 fffffa80`001801a9 : netr28x+0x4b98d
fffff800`00b9c1d8 fffff880`050fec28 : 00000000`00000000 00000000`00000000 fffffa80`001801a9 fffffa80`05b741a0 : 0xfffff800`00b9c270
fffff800`00b9c1e0 00000000`00000000 : 00000000`00000000 fffffa80`001801a9 fffffa80`05b741a0 00000000`00000000 : netr28x+0x25ac28
THREAD_SHA1_HASH_MOD_FUNC: 80858fdf941bd645ff48b6997b30f63ac59926fb
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 60ef2d8b5c8aa9ab3d61fd3d0f87c6db127d6016
THREAD_SHA1_HASH_MOD: 5d50876435db08b990ce5928fe5c90526c26b16c
FOLLOWUP_IP:
netr28x+4b98d
fffff880`04eef98d ?? ???
SYMBOL_STACK_INDEX: d
SYMBOL_NAME: netr28x+4b98d
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: netr28x
IMAGE_NAME: netr28x.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: X64_0xA_netr28x+4b98d
BUCKET_ID: X64_0xA_netr28x+4b98d
PRIMARY_PROBLEM_CLASS: X64_0xA_netr28x+4b98d
TARGET_TIME: 2019-04-11T15:25:58.000Z
OSBUILD: 7601
OSSERVICEPACK: 1000
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 7
OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2019-03-06 05:38:53
BUILDDATESTAMP_STR: 190305-1700
BUILDLAB_STR: win7sp1_ldr_escrow
BUILDOSVER_STR: 6.1.7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700
ANALYSIS_SESSION_ELAPSED_TIME: 7b6
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:x64_0xa_netr28x+4b98d
FAILURE_ID_HASH: {a6eb3f60-a5c3-0bd6-051c-41bf4427925d}
Followup: MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff8a0067d0004, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff800032dccfe, address which referenced memory
Debugging Details:
------------------
GetUlongPtrFromAddress: unable to read from fffff800032a8300
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 1
Key : Analysis.Elapsed.Sec
Value: 1
Key : Analysis.Memory.CommitPeak.Mb
Value: 62
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700
SYSTEM_MANUFACTURER: Hewlett-Packard
SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC
SYSTEM_SKU: J4T62EA#AB8
SYSTEM_VERSION: 0991100000000000000600087
BIOS_VENDOR: Insyde
BIOS_VERSION: F.43
BIOS_DATE: 12/19/2017
BASEBOARD_MANUFACTURER: Hewlett-Packard
BASEBOARD_PRODUCT: 2211
BASEBOARD_VERSION: 86.56
DUMP_TYPE: 2
BUGCHECK_P1: fffff8a0067d0004
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff800032dccfe
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800032a8100
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff800032a82f0
GetUlongPtrFromAddress: unable to read from fffff800032a84a8
GetPointerFromAddress: unable to read from fffff800032a80d8
fffff8a0067d0004 Paged pool
CURRENT_IRQL: 2
FAULTING_IP:
nt!HvpScanForFreeCellInViewWindow+16a
fffff800`032dccfe 8b4804 mov ecx,dword ptr [rax+4]
CPU_COUNT: 4
CPU_MHZ: 6a0
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 45
CPU_STEPPING: 1
CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init)
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: System
ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5
ANALYSIS_SESSION_TIME: 06-17-2019 21:16:21.0060
ANALYSIS_VERSION: 10.0.18869.1002 amd64fre
TRAP_FRAME: fffff80004421860 -- (.trap 0xfffff80004421860)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8a0067d0000 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000683000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800032dccfe rsp=fffff800044219f0 rbp=0000000000000683
r8=0000000000000083 r9=0000000000000000 r10=fffff8000300b000
r11=0000000000000006 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!HvpScanForFreeCellInViewWindow+0x16a:
fffff800`032dccfe 8b4804 mov ecx,dword ptr [rax+4] ds:fffff8a0`067d0004=00683000
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800030acf69 to fffff8000309eba0
STACK_TEXT:
fffff800`04421718 fffff800`030acf69 : 00000000`0000000a fffff8a0`067d0004 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff800`04421720 fffff800`030aad88 : 00000000`00000000 fffff8a0`067d0004 fffff800`031ff100 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff800`04421860 fffff800`032dccfe : 00000000`00000000 00000000`003fe000 00000000`00001000 00000000`00000000 : nt!KiPageFault+0x448
fffff800`044219f0 fffff800`032dcb0a : fffff800`00683000 fffff800`00000011 00000000`00000030 fffff800`00000000 : nt!HvpScanForFreeCellInViewWindow+0x16a
fffff800`04421a70 fffff800`032dc66e : 00000000`00000030 fffff800`00000005 ffffffff`00000030 fffff800`00000000 : nt!HvpFindFreeCell+0x1ba
fffff800`04421ae0 fffff800`0331ed1d : fffff8a0`00024010 00000000`00000000 00000000`00000000 00000000`ffffffff : nt!HvpDoAllocateCell+0x72
fffff800`04421b40 fffff800`0331ebad : 00000000`00000000 fffff8a0`061e8c30 00000000`00000008 fffff800`0330cd5c : nt!HvAllocateCell+0x55
fffff800`04421b70 fffff800`032d14bf : fffff8a0`00024010 fffff8a0`00024010 fffff8a0`061f6640 fffff800`04421e18 : nt!CmpAddValueKeyNew+0x69
fffff800`04421c40 fffff800`034b76e3 : 01d4f848`5814f677 fffff800`04421ff0 fffff8a0`02c84b98 00000000`00000000 : nt!CmpSetValueKeyNew+0x77
fffff800`04421c90 fffff800`032dc531 : fffff8a0`04cbac70 fffff800`04421e18 fffffa80`00000004 fffff800`04422210 : nt!CmSetValueKey+0xba3
fffff800`04421dd0 fffff800`030acbd3 : ffffffff`80000de8 00000000`00000002 fffffa80`00000000 fffff800`00000004 : nt!NtSetValueKey+0x349
fffff800`04421f00 fffff800`030a23b0 : fffff800`033f32a2 fffff800`04422248 fffff880`01725152 fffffa80`00000000 : nt!KiSystemServiceCopyEnd+0x13
fffff800`04422108 fffff800`033f32a2 : fffff800`04422248 fffff880`01725152 fffffa80`00000000 fffff800`04422270 : nt!KiServiceLinkage
fffff800`04422110 fffff880`0172cd96 : 00000000`00000004 fffffa80`05d89cd0 fffff800`04422200 00000000`000007ff : nt!RtlWriteRegistryValue+0x62
fffff800`04422170 fffff880`0510f98d : fffff800`04422270 fffff880`0531ec28 00000000`00000000 00000000`00000000 : ndis!NdisWriteConfiguration+0x156
fffff800`044221d0 fffff800`04422270 : fffff880`0531ec28 00000000`00000000 00000000`00000000 fffff880`001801a9 : netr28x+0x4b98d
fffff800`044221d8 fffff880`0531ec28 : 00000000`00000000 00000000`00000000 fffff880`001801a9 fffffa80`05b701a0 : 0xfffff800`04422270
fffff800`044221e0 00000000`00000000 : 00000000`00000000 fffff880`001801a9 fffffa80`05b701a0 0000000e`00000000 : netr28x+0x25ac28
THREAD_SHA1_HASH_MOD_FUNC: a2c5409ed52347576830e095aabe2e20325151e5
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: cf883ff24fbd42e0f8dd5b2bf40fd2071e6cd531
THREAD_SHA1_HASH_MOD: 56bd18a7fabf3c16adac1e3911e9aab0524685a1
FOLLOWUP_IP:
netr28x+4b98d
fffff880`0510f98d ?? ???
SYMBOL_STACK_INDEX: f
SYMBOL_NAME: netr28x+4b98d
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: netr28x
IMAGE_NAME: netr28x.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: X64_0xA_netr28x+4b98d
BUCKET_ID: X64_0xA_netr28x+4b98d
PRIMARY_PROBLEM_CLASS: X64_0xA_netr28x+4b98d
TARGET_TIME: 2019-04-21T13:44:29.000Z
OSBUILD: 7601
OSSERVICEPACK: 1000
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 7
OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2019-03-21 04:38:47
BUILDDATESTAMP_STR: 190320-1700
BUILDLAB_STR: win7sp1_ldr_escrow
BUILDOSVER_STR: 6.1.7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700
ANALYSIS_SESSION_ELAPSED_TIME: 704
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:x64_0xa_netr28x+4b98d
FAILURE_ID_HASH: {a6eb3f60-a5c3-0bd6-051c-41bf4427925d}
Followup: MachineOwner
---------
0: kd> lmvm netr28x
start end module name
fffff880`050c4000 fffff880`0532e000 netr28x T (no symbols)
Loaded symbol image file: netr28x.sys
Image path: \SystemRoot\system32\DRIVERS\netr28x.sys
Image name: netr28x.sys
Timestamp: Mon Apr 20 03:22:50 2015 (5534D37A)
CheckSum: 0026BF4B
ImageSize: 0026A000
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4
Information from resource tables:
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff8a000d9e618, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff800033386fd, address which referenced memory
Debugging Details:
------------------
GetUlongPtrFromAddress: unable to read from fffff80003304300
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 1
Key : Analysis.Elapsed.Sec
Value: 1
Key : Analysis.Memory.CommitPeak.Mb
Value: 62
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700
SYSTEM_MANUFACTURER: Hewlett-Packard
SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC
SYSTEM_SKU: J4T62EA#AB8
SYSTEM_VERSION: 0991100000000000000600087
BIOS_VENDOR: Insyde
BIOS_VERSION: F.43
BIOS_DATE: 12/19/2017
BASEBOARD_MANUFACTURER: Hewlett-Packard
BASEBOARD_PRODUCT: 2211
BASEBOARD_VERSION: 86.56
DUMP_TYPE: 2
BUGCHECK_P1: fffff8a000d9e618
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff800033386fd
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80003304100
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff800033042f0
GetUlongPtrFromAddress: unable to read from fffff800033044a8
GetPointerFromAddress: unable to read from fffff800033040d8
fffff8a000d9e618 Paged pool
CURRENT_IRQL: 2
FAULTING_IP:
nt!HvpDoAllocateCell+101
fffff800`033386fd 89443d00 mov dword ptr [rbp+rdi],eax
CPU_COUNT: 4
CPU_MHZ: 6a0
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 45
CPU_STEPPING: 1
CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init)
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: System
ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5
ANALYSIS_SESSION_TIME: 06-17-2019 20:48:20.0473
ANALYSIS_VERSION: 10.0.18869.1002 amd64fre
TRAP_FRAME: fffff80004423950 -- (.trap 0xfffff80004423950)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000000039e8 rbx=0000000000000000 rcx=00000000000005e8
rdx=0000000000000008 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800033386fd rsp=fffff80004423ae0 rbp=0000000000000030
r8=fffff8a000024010 r9=0000000000000005 r10=fffff8a000d9e000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!HvpDoAllocateCell+0x101:
fffff800`033386fd 89443d00 mov dword ptr [rbp+rdi],eax ss:0018:00000000`00000030=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80003108f69 to fffff800030faba0
STACK_TEXT:
fffff800`04423808 fffff800`03108f69 : 00000000`0000000a fffff8a0`00d9e618 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff800`04423810 fffff800`03106d88 : 00000000`00000001 fffff8a0`00d9e618 00000000`00000000 fffff8a0`00024010 : nt!KiBugCheckDispatch+0x69
fffff800`04423950 fffff800`033386fd : fffff8a0`00024010 fffff8a0`00024010 fffff8a0`00053ae0 00000000`00000000 : nt!KiPageFault+0x448
fffff800`04423ae0 fffff800`0337ad0d : fffff8a0`00024010 00000000`00000000 00000000`00000000 00000000`ffffffff : nt!HvpDoAllocateCell+0x101
fffff800`04423b40 fffff800`0337ab9d : 00000000`00000000 fffff8a0`05585c30 00000000`00000008 fffff800`03368d5c : nt!HvAllocateCell+0x55
fffff800`04423b70 fffff800`0332d4bf : fffff8a0`00024010 fffff8a0`00024010 fffff8a0`05593640 fffff800`04423e18 : nt!CmpAddValueKeyNew+0x69
fffff800`04423c40 fffff800`035136a3 : 01d4f094`f66bc44b fffff800`04423ff0 fffff8a0`0085fa70 00000000`00000000 : nt!CmpSetValueKeyNew+0x77
fffff800`04423c90 fffff800`03338531 : fffff8a0`14bbfca0 fffff800`04423e18 fffffa80`00000004 fffff800`04424210 : nt!CmSetValueKey+0xba3
fffff800`04423dd0 fffff800`03108bd3 : ffffffff`80000bec 00000000`00000002 fffffa80`00000000 fffff800`00000004 : nt!NtSetValueKey+0x349
fffff800`04423f00 fffff800`030fe3b0 : fffff800`0344f272 fffff800`04424248 fffff880`014b9152 00000000`539f0000 : nt!KiSystemServiceCopyEnd+0x13
fffff800`04424108 fffff800`0344f272 : fffff800`04424248 fffff880`014b9152 00000000`539f0000 fffff800`04424270 : nt!KiServiceLinkage
fffff800`04424110 fffff880`014c0d96 : 00000000`00000004 fffffa80`071c5250 00000000`00000000 00000000`000007ff : nt!RtlWriteRegistryValue+0x62
fffff800`04424170 fffff880`04f2698d : fffff800`04424270 fffff880`05135c28 00000000`00000000 00000000`00000000 : ndis!NdisWriteConfiguration+0x156
fffff800`044241d0 fffff800`04424270 : fffff880`05135c28 00000000`00000000 00000000`00000000 fffff800`001801a9 : netr28x+0x4b98d
fffff800`044241d8 fffff880`05135c28 : 00000000`00000000 00000000`00000000 fffff800`001801a9 fffffa80`059cb1a0 : 0xfffff800`04424270
fffff800`044241e0 00000000`00000000 : 00000000`00000000 fffff800`001801a9 fffffa80`059cb1a0 fffff800`00000000 : netr28x+0x25ac28
THREAD_SHA1_HASH_MOD_FUNC: 80858fdf941bd645ff48b6997b30f63ac59926fb
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 394aafee51f76470053fa2102b9df0f0f7df42a3
THREAD_SHA1_HASH_MOD: 5d50876435db08b990ce5928fe5c90526c26b16c
FOLLOWUP_IP:
netr28x+4b98d
fffff880`04f2698d ?? ???
SYMBOL_STACK_INDEX: d
SYMBOL_NAME: netr28x+4b98d
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: netr28x
IMAGE_NAME: netr28x.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: X64_0xA_netr28x+4b98d
BUCKET_ID: X64_0xA_netr28x+4b98d
PRIMARY_PROBLEM_CLASS: X64_0xA_netr28x+4b98d
TARGET_TIME: 2019-04-11T18:32:48.000Z
OSBUILD: 7601
OSSERVICEPACK: 1000
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 7
OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2019-03-06 05:38:53
BUILDDATESTAMP_STR: 190305-1700
BUILDLAB_STR: win7sp1_ldr_escrow
BUILDOSVER_STR: 6.1.7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700
ANALYSIS_SESSION_ELAPSED_TIME: 7ae
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:x64_0xa_netr28x+4b98d
FAILURE_ID_HASH: {a6eb3f60-a5c3-0bd6-051c-41bf4427925d}
Followup: MachineOwner
---------
INVALID_PROCESS_ATTACH_ATTEMPT (5)
Arguments:
Arg1: fffffa80042b49b0
Arg2: fffffa80050a0160
Arg3: 0000000000000000
Arg4: 0000000000000001
Debugging Details:
------------------
GetUlongPtrFromAddress: unable to read from fffff800032a0300
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 2
Key : Analysis.Elapsed.Sec
Value: 2
Key : Analysis.Memory.CommitPeak.Mb
Value: 62
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700
SYSTEM_MANUFACTURER: Hewlett-Packard
SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC
SYSTEM_SKU: J4T62EA#AB8
SYSTEM_VERSION: 0991100000000000000600087
BIOS_VENDOR: Insyde
BIOS_VERSION: F.43
BIOS_DATE: 12/19/2017
BASEBOARD_MANUFACTURER: Hewlett-Packard
BASEBOARD_PRODUCT: 2211
BASEBOARD_VERSION: 86.56
DUMP_TYPE: 2
BUGCHECK_P1: fffffa80042b49b0
BUGCHECK_P2: fffffa80050a0160
BUGCHECK_P3: 0
BUGCHECK_P4: 1
CPU_COUNT: 4
CPU_MHZ: 6a0
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 45
CPU_STEPPING: 1
CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init)
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
BUGCHECK_STR: 0x5
PROCESS_NAME: PointBlank.exe
CURRENT_IRQL: 2
ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5
ANALYSIS_SESSION_TIME: 06-17-2019 20:57:04.0108
ANALYSIS_VERSION: 10.0.18869.1002 amd64fre
DPC_STACK_BASE: FFFFF80004428FB0
LOCK_ADDRESS: fffff80003273240 -- (!locks fffff80003273240)
Cannot get _ERESOURCE type
Resource @ nt!PiEngineLock (0xfffff80003273240) Available
1 total locks
PNP_TRIAGE_DATA:
Lock address : 0xfffff80003273240
Thread Count : 0
Thread address: 0x0000000000000000
Thread wait : 0x0
LAST_CONTROL_TRANSFER: from fffff80003045602 to fffff80003096ba0
STACK_TEXT:
fffff800`04427cc8 fffff800`03045602 : 00000000`00000005 fffffa80`042b49b0 fffffa80`050a0160 00000000`00000000 : nt!KeBugCheckEx
fffff800`04427cd0 fffff800`032ee127 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeStackAttachProcess+0x52
fffff800`04427d50 fffff800`032ee4bf : 00000000`00000000 fffff8a0`00000000 fffff8a0`00001910 00000000`00000000 : nt!ObpDecrementHandleCount+0x177
fffff800`04427dd0 fffff800`032ee1e4 : 00000000`00000d08 fffffa80`050a0160 fffff8a0`00001910 00000000`00000d08 : nt!ObpCloseHandleTableEntry+0xaf
fffff800`04427e60 fffff800`030a4bd3 : fffffa80`04b87b50 fffff800`04427f30 fffff800`03358230 fffff800`032e476a : nt!ObpCloseHandle+0x94
fffff800`04427eb0 fffff800`0309a3b0 : fffff800`03331da3 fffffa80`04ea4a10 fffff800`03358230 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
fffff800`04428048 fffff800`03331da3 : fffffa80`04ea4a10 fffff800`03358230 00000000`00000000 00000000`00000000 : nt!KiServiceLinkage
fffff800`04428050 fffff800`0333baa8 : fffffa80`04ea4a10 00000000`00000001 fffffa80`04ea2740 00000000`00000000 : nt!PiGetDeviceRegistryProperty+0xab
fffff800`044281b0 fffff800`03330ac0 : fffffa80`04ea4a10 fffffa80`04ea4a10 00000000`00000000 00000000`00000000 : nt!IoGetDeviceProperty+0xbc
fffff800`04428290 fffff800`03341f81 : 00000000`ffff0000 fffffa80`0802b150 fffff880`01553110 fffffa80`05bb6220 : nt!IopOpenOrCreateDeviceRegistryKey+0x14c
fffff800`04428450 fffff880`01598152 : 00000000`c0000001 fffff800`044285e0 00000000`00000000 00000000`000007ff : nt!IoOpenDeviceRegistryKey+0x11
fffff800`04428490 fffff880`01503b34 : fffff800`044285e0 fffff800`044285b8 fffffa80`05c461a0 fffff800`035e0000 : ndis!NdisOpenConfiguration+0xb2
fffff800`044284d0 fffff880`0508b94f : fffffa80`00000000 fffff800`044285e0 fffff880`0529ac28 00000000`00000000 : ndis!NdisOpenConfigurationEx+0xa4
fffff800`04428540 fffffa80`00000000 : fffff800`044285e0 fffff880`0529ac28 00000000`00000000 00000000`001801a9 : netr28x+0x4b94f
fffff800`04428548 fffff800`044285e0 : fffff880`0529ac28 00000000`00000000 00000000`001801a9 fffffa80`05c461a0 : 0xfffffa80`00000000
fffff800`04428550 fffff880`0529ac28 : 00000000`00000000 00000000`001801a9 fffffa80`05c461a0 00000000`00000000 : 0xfffff800`044285e0
fffff800`04428558 00000000`00000000 : 00000000`001801a9 fffffa80`05c461a0 00000000`00000000 fffffa80`0742b540 : netr28x+0x25ac28
THREAD_SHA1_HASH_MOD_FUNC: 1764d353450a941fbc74295279ec02651c3d9814
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: bdc70d393af014c177e84e60c668cc911acaf71f
THREAD_SHA1_HASH_MOD: 9a9dca34541ae91666e3989df373f06b6e683623
FOLLOWUP_IP:
netr28x+4b94f
fffff880`0508b94f ?? ???
SYMBOL_STACK_INDEX: d
SYMBOL_NAME: netr28x+4b94f
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: netr28x
IMAGE_NAME: netr28x.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: X64_0x5_netr28x+4b94f
BUCKET_ID: X64_0x5_netr28x+4b94f
PRIMARY_PROBLEM_CLASS: X64_0x5_netr28x+4b94f
TARGET_TIME: 2019-05-01T21:53:50.000Z
OSBUILD: 7601
OSSERVICEPACK: 1000
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 7
OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2019-03-21 04:38:47
BUILDDATESTAMP_STR: 190320-1700
BUILDLAB_STR: win7sp1_ldr_escrow
BUILDOSVER_STR: 6.1.7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700
ANALYSIS_SESSION_ELAPSED_TIME: 8cb
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:x64_0x5_netr28x+4b94f
FAILURE_ID_HASH: {43753b0b-e234-1a01-8468-7eed644d41ea}
Followup: MachineOwner
INVALID_PROCESS_ATTACH_ATTEMPT (5)
Arguments:
Arg1: fffffa80042ce9b0
Arg2: fffffa8005d11370
Arg3: 0000000000000000
Arg4: 0000000000000001
Debugging Details:
------------------
GetUlongPtrFromAddress: unable to read from fffff800032b3300
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 2
Key : Analysis.Elapsed.Sec
Value: 2
Key : Analysis.Memory.CommitPeak.Mb
Value: 62
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700
SYSTEM_MANUFACTURER: Hewlett-Packard
SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC
SYSTEM_SKU: J4T62EA#AB8
SYSTEM_VERSION: 0991100000000000000600087
BIOS_VENDOR: Insyde
BIOS_VERSION: F.43
BIOS_DATE: 12/19/2017
BASEBOARD_MANUFACTURER: Hewlett-Packard
BASEBOARD_PRODUCT: 2211
BASEBOARD_VERSION: 86.56
DUMP_TYPE: 2
BUGCHECK_P1: fffffa80042ce9b0
BUGCHECK_P2: fffffa8005d11370
BUGCHECK_P3: 0
BUGCHECK_P4: 1
CPU_COUNT: 4
CPU_MHZ: 6a0
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 45
CPU_STEPPING: 1
CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init)
CUSTOMER_CRASH_COUNT: 2
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
BUGCHECK_STR: 0x5
PROCESS_NAME: audiodg.exe
CURRENT_IRQL: 2
ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5
ANALYSIS_SESSION_TIME: 06-17-2019 20:49:02.0621
ANALYSIS_VERSION: 10.0.18869.1002 amd64fre
DPC_STACK_BASE: FFFFF80000BA2FB0
LOCK_ADDRESS: fffff80003286240 -- (!locks fffff80003286240)
Cannot get _ERESOURCE type
Resource @ nt!PiEngineLock (0xfffff80003286240) Available
1 total locks
PNP_TRIAGE_DATA:
Lock address : 0xfffff80003286240
Thread Count : 0
Thread address: 0x0000000000000000
Thread wait : 0x0
LAST_CONTROL_TRANSFER: from fffff80003058602 to fffff800030a9ba0
STACK_TEXT:
fffff800`00ba1cc8 fffff800`03058602 : 00000000`00000005 fffffa80`042ce9b0 fffffa80`05d11370 00000000`00000000 : nt!KeBugCheckEx
fffff800`00ba1cd0 fffff800`03301127 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeStackAttachProcess+0x52
fffff800`00ba1d50 fffff800`033014bf : 00000000`00000000 fffff8a0`00000000 fffff8a0`00001910 00000000`00000000 : nt!ObpDecrementHandleCount+0x177
fffff800`00ba1dd0 fffff800`033011e4 : 00000000`00000e48 fffffa80`05d11370 fffff8a0`00001910 00000000`00000e48 : nt!ObpCloseHandleTableEntry+0xaf
fffff800`00ba1e60 fffff800`030b7bd3 : fffffa80`05d7ba00 fffff800`00ba1f30 fffff800`0336b230 fffff800`032f776a : nt!ObpCloseHandle+0x94
fffff800`00ba1eb0 fffff800`030ad3b0 : fffff800`03344da3 fffffa80`04e9e060 fffff800`0336b230 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
fffff800`00ba2048 fffff800`03344da3 : fffffa80`04e9e060 fffff800`0336b230 00000000`00000000 00000000`00000000 : nt!KiServiceLinkage
fffff800`00ba2050 fffff800`0334eaa8 : fffffa80`04e9e060 00000000`00000001 fffffa80`04e9d6e0 00000000`00000000 : nt!PiGetDeviceRegistryProperty+0xab
fffff800`00ba21b0 fffff800`03343ac0 : fffffa80`04e9e060 fffffa80`04e9e060 00000000`00000000 00000000`00000000 : nt!IoGetDeviceProperty+0xbc
fffff800`00ba2290 fffff800`03354f81 : 00000000`ffff0000 fffffa80`05086440 fffff880`01482110 fffffa80`05b713f0 : nt!IopOpenOrCreateDeviceRegistryKey+0x14c
fffff800`00ba2450 fffff880`014c7152 : fffffa80`04a3fd50 fffff800`00ba25e0 fffffa80`05f48a78 00000000`000007ff : nt!IoOpenDeviceRegistryKey+0x11
fffff800`00ba2490 fffff880`01432b34 : fffff800`00ba25e0 fffff800`00ba25b8 fffffa80`05b6d1a0 fffff880`014dd21d : ndis!NdisOpenConfiguration+0xb2
fffff800`00ba24d0 fffff880`0512a94f : fffffa80`00000000 fffff800`00ba25e0 fffff880`05339c28 00000000`00000000 : ndis!NdisOpenConfigurationEx+0xa4
fffff800`00ba2540 fffffa80`00000000 : fffff800`00ba25e0 fffff880`05339c28 00000000`00000000 00000000`001801a9 : netr28x+0x4b94f
fffff800`00ba2548 fffff800`00ba25e0 : fffff880`05339c28 00000000`00000000 00000000`001801a9 fffffa80`05b6d1a0 : 0xfffffa80`00000000
fffff800`00ba2550 fffff880`05339c28 : 00000000`00000000 00000000`001801a9 fffffa80`05b6d1a0 fffffa80`00000000 : 0xfffff800`00ba25e0
fffff800`00ba2558 00000000`00000000 : 00000000`001801a9 fffffa80`05b6d1a0 fffffa80`00000000 fffff880`05136e2e : netr28x+0x25ac28
THREAD_SHA1_HASH_MOD_FUNC: 1764d353450a941fbc74295279ec02651c3d9814
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: bdc70d393af014c177e84e60c668cc911acaf71f
THREAD_SHA1_HASH_MOD: 9a9dca34541ae91666e3989df373f06b6e683623
FOLLOWUP_IP:
netr28x+4b94f
fffff880`0512a94f ?? ???
SYMBOL_STACK_INDEX: d
SYMBOL_NAME: netr28x+4b94f
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: netr28x
IMAGE_NAME: netr28x.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: X64_0x5_netr28x+4b94f
BUCKET_ID: X64_0x5_netr28x+4b94f
PRIMARY_PROBLEM_CLASS: X64_0x5_netr28x+4b94f
TARGET_TIME: 2019-04-27T20:53:09.000Z
OSBUILD: 7601
OSSERVICEPACK: 1000
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 7
OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2019-03-21 04:38:47
BUILDDATESTAMP_STR: 190320-1700
BUILDLAB_STR: win7sp1_ldr_escrow
BUILDOSVER_STR: 6.1.7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700
ANALYSIS_SESSION_ELAPSED_TIME: 89c
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:x64_0x5_netr28x+4b94f
FAILURE_ID_HASH: {43753b0b-e234-1a01-8468-7eed644d41ea}
Followup: MachineOwner
---------
INVALID_PROCESS_ATTACH_ATTEMPT (5)
Arguments:
Arg1: fffffa80042b49b0
Arg2: fffffa8004ee55f0
Arg3: 0000000000000000
Arg4: 0000000000000001
Debugging Details:
------------------
GetUlongPtrFromAddress: unable to read from fffff800032b0300
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 2
Key : Analysis.Elapsed.Sec
Value: 2
Key : Analysis.Memory.CommitPeak.Mb
Value: 62
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700
SYSTEM_MANUFACTURER: Hewlett-Packard
SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC
SYSTEM_SKU: J4T62EA#AB8
SYSTEM_VERSION: 0991100000000000000600087
BIOS_VENDOR: Insyde
BIOS_VERSION: F.43
BIOS_DATE: 12/19/2017
BASEBOARD_MANUFACTURER: Hewlett-Packard
BASEBOARD_PRODUCT: 2211
BASEBOARD_VERSION: 86.56
DUMP_TYPE: 2
BUGCHECK_P1: fffffa80042b49b0
BUGCHECK_P2: fffffa8004ee55f0
BUGCHECK_P3: 0
BUGCHECK_P4: 1
CPU_COUNT: 4
CPU_MHZ: 6a0
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 45
CPU_STEPPING: 1
CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init)
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
BUGCHECK_STR: 0x5
PROCESS_NAME: PointBlank.exe
CURRENT_IRQL: 2
ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5
ANALYSIS_SESSION_TIME: 06-17-2019 20:48:58.0829
ANALYSIS_VERSION: 10.0.18869.1002 amd64fre
DPC_STACK_BASE: FFFFF8000441FFB0
LOCK_ADDRESS: fffff80003283240 -- (!locks fffff80003283240)
Cannot get _ERESOURCE type
Resource @ nt!PiEngineLock (0xfffff80003283240) Available
1 total locks
PNP_TRIAGE_DATA:
Lock address : 0xfffff80003283240
Thread Count : 0
Thread address: 0x0000000000000000
Thread wait : 0x0
LAST_CONTROL_TRANSFER: from fffff80003055602 to fffff800030a6ba0
STACK_TEXT:
fffff800`0441ecc8 fffff800`03055602 : 00000000`00000005 fffffa80`042b49b0 fffffa80`04ee55f0 00000000`00000000 : nt!KeBugCheckEx
fffff800`0441ecd0 fffff800`032fe127 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeStackAttachProcess+0x52
fffff800`0441ed50 fffff800`032fe4bf : 00000000`00000000 fffff8a0`00000000 fffff8a0`00001910 00000000`00000000 : nt!ObpDecrementHandleCount+0x177
fffff800`0441edd0 fffff800`032fe1e4 : 00000000`00000a80 fffffa80`04ee55f0 fffff8a0`00001910 00000000`00000a80 : nt!ObpCloseHandleTableEntry+0xaf
fffff800`0441ee60 fffff800`030b4bd3 : fffffa80`0861e940 fffff800`0441ef30 fffff800`03368230 fffff800`032f476a : nt!ObpCloseHandle+0x94
fffff800`0441eeb0 fffff800`030aa3b0 : fffff800`03341da3 fffffa80`04d31a10 fffff800`03368230 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
fffff800`0441f048 fffff800`03341da3 : fffffa80`04d31a10 fffff800`03368230 00000000`00000000 00000000`00000000 : nt!KiServiceLinkage
fffff800`0441f050 fffff800`0334baa8 : fffffa80`04d31a10 00000000`00000001 fffffa80`04d2d740 00000000`00000000 : nt!PiGetDeviceRegistryProperty+0xab
fffff800`0441f1b0 fffff800`03340ac0 : fffffa80`04d31a10 fffffa80`04d31a10 00000000`00000000 00000000`00000000 : nt!IoGetDeviceProperty+0xbc
fffff800`0441f290 fffff800`03351f81 : 00000000`ffff0000 fffffa80`046a8bd0 fffff880`014c6110 fffffa80`05a70cf0 : nt!IopOpenOrCreateDeviceRegistryKey+0x14c
fffff800`0441f450 fffff880`0150b152 : fffffa80`07393890 fffff800`0441f5e0 00000000`0000001f 00000000`000007ff : nt!IoOpenDeviceRegistryKey+0x11
fffff800`0441f490 fffff880`01476b34 : fffff800`0441f5e0 fffff800`0441f5b8 fffffa80`05a6f1a0 fffff800`035f7be3 : ndis!NdisOpenConfiguration+0xb2
fffff800`0441f4d0 fffff880`04e7694f : fffffa80`00000000 fffff800`0441f5e0 fffff880`05085c28 00000000`00000000 : ndis!NdisOpenConfigurationEx+0xa4
fffff800`0441f540 fffffa80`00000000 : fffff800`0441f5e0 fffff880`05085c28 00000000`00000000 00000000`001801a9 : netr28x+0x4b94f
fffff800`0441f548 fffff800`0441f5e0 : fffff880`05085c28 00000000`00000000 00000000`001801a9 fffffa80`05a6f1a0 : 0xfffffa80`00000000
fffff800`0441f550 fffff880`05085c28 : 00000000`00000000 00000000`001801a9 fffffa80`05a6f1a0 00000000`00000000 : 0xfffff800`0441f5e0
fffff800`0441f558 00000000`00000000 : 00000000`001801a9 fffffa80`05a6f1a0 00000000`00000000 fffffa80`0452e670 : netr28x+0x25ac28
THREAD_SHA1_HASH_MOD_FUNC: 1764d353450a941fbc74295279ec02651c3d9814
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: bdc70d393af014c177e84e60c668cc911acaf71f
THREAD_SHA1_HASH_MOD: 9a9dca34541ae91666e3989df373f06b6e683623
FOLLOWUP_IP:
netr28x+4b94f
fffff880`04e7694f ?? ???
SYMBOL_STACK_INDEX: d
SYMBOL_NAME: netr28x+4b94f
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: netr28x
IMAGE_NAME: netr28x.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: X64_0x5_netr28x+4b94f
BUCKET_ID: X64_0x5_netr28x+4b94f
PRIMARY_PROBLEM_CLASS: X64_0x5_netr28x+4b94f
TARGET_TIME: 2019-04-21T09:57:22.000Z
OSBUILD: 7601
OSSERVICEPACK: 1000
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 7
OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2019-03-21 04:38:47
BUILDDATESTAMP_STR: 190320-1700
BUILDLAB_STR: win7sp1_ldr_escrow
BUILDOSVER_STR: 6.1.7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700
ANALYSIS_SESSION_ELAPSED_TIME: 8dc
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:x64_0x5_netr28x+4b94f
FAILURE_ID_HASH: {43753b0b-e234-1a01-8468-7eed644d41ea}
Followup: MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff8a000f95c5c, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8000334077c, address which referenced memory
Debugging Details:
------------------
GetUlongPtrFromAddress: unable to read from fffff800032f7300
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 1
Key : Analysis.Elapsed.Sec
Value: 2
Key : Analysis.Memory.CommitPeak.Mb
Value: 62
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700
SYSTEM_MANUFACTURER: Hewlett-Packard
SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC
SYSTEM_SKU: J4T62EA#AB8
SYSTEM_VERSION: 0991100000000000000600087
BIOS_VENDOR: Insyde
BIOS_VERSION: F.43
BIOS_DATE: 12/19/2017
BASEBOARD_MANUFACTURER: Hewlett-Packard
BASEBOARD_PRODUCT: 2211
BASEBOARD_VERSION: 86.56
DUMP_TYPE: 2
BUGCHECK_P1: fffff8a000f95c5c
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8000334077c
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800032f7100
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff800032f72f0
GetUlongPtrFromAddress: unable to read from fffff800032f74a8
GetPointerFromAddress: unable to read from fffff800032f70d8
fffff8a000f95c5c Paged pool
CURRENT_IRQL: 2
FAULTING_IP:
nt!CmpFindValueByNameFromCache+12c
fffff800`0334077c 41f6401001 test byte ptr [r8+10h],1
CPU_COUNT: 4
CPU_MHZ: 6a0
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 45
CPU_STEPPING: 1
CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init)
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: System
ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5
ANALYSIS_SESSION_TIME: 06-17-2019 20:48:55.0594
ANALYSIS_VERSION: 10.0.18869.1002 amd64fre
DPC_STACK_BASE: FFFFF80000BA2FB0
TRAP_FRAME: fffff80000ba1d00 -- (.trap 0xfffff80000ba1d00)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000c64c48 rbx=0000000000000000 rcx=fffff80000ba1fa1
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8000334077c rsp=fffff80000ba1e90 rbp=fffff80000ba2360
r8=fffff8a000f95c4c r9=000000000000ffff r10=fffffa8005aaacfc
r11=fffff8a0018b9b46 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!CmpFindValueByNameFromCache+0x12c:
fffff800`0334077c 41f6401001 test byte ptr [r8+10h],1 ds:fffff8a0`00f95c5c=01
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800030fbf69 to fffff800030edba0
STACK_TEXT:
fffff800`00ba1bb8 fffff800`030fbf69 : 00000000`0000000a fffff8a0`00f95c5c 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff800`00ba1bc0 fffff800`030f9d88 : 00000000`00000000 fffff8a0`00f95c5c fffffa80`05191000 fffff8a0`00024010 : nt!KiBugCheckDispatch+0x69
fffff800`00ba1d00 fffff800`0334077c : fffff8a0`00024010 fffff8a0`00024010 fffff8a0`00048c80 00000000`00000000 : nt!KiPageFault+0x448
fffff800`00ba1e90 fffff800`03323c38 : fffff8a0`15bf1de8 fffff800`00ba2188 fffff800`00ba1fd0 fffff800`00ba1fb8 : nt!CmpFindValueByNameFromCache+0x12c
fffff800`00ba1f60 fffff800`035061e7 : fffff8a0`15bf1de8 01d4f7b8`449491c9 fffff8a0`15bf1de8 00000000`00000000 : nt!CmpCompareNewValueDataAgainstKCBCache+0x78
fffff800`00ba2000 fffff800`0332b531 : fffff8a0`1f297040 fffff800`00ba2188 fffffa80`00000004 fffff800`00ba2580 : nt!CmSetValueKey+0x6a7
fffff800`00ba2140 fffff800`030fbbd3 : ffffffff`80000cc8 00000000`00000002 fffffa80`00000000 fffff800`00000004 : nt!NtSetValueKey+0x349
fffff800`00ba2270 fffff800`030f13b0 : fffff800`034422a2 fffff800`00ba25b8 fffff880`01514152 00000000`c0000001 : nt!KiSystemServiceCopyEnd+0x13
fffff800`00ba2478 fffff800`034422a2 : fffff800`00ba25b8 fffff880`01514152 00000000`c0000001 fffff800`00ba25e0 : nt!KiServiceLinkage
fffff800`00ba2480 fffff880`0151bd96 : 00000000`00000004 fffffa80`05aaacf0 00000100`00000000 00000000`000007ff : nt!RtlWriteRegistryValue+0x62
fffff800`00ba24e0 fffff880`0514a98d : fffff800`00ba25e0 fffff880`05359c28 00000000`00000000 00000000`00000000 : ndis!NdisWriteConfiguration+0x156
fffff800`00ba2540 fffff800`00ba25e0 : fffff880`05359c28 00000000`00000000 00000000`00000000 fffffa80`001801a9 : netr28x+0x4b98d
fffff800`00ba2548 fffff880`05359c28 : 00000000`00000000 00000000`00000000 fffffa80`001801a9 fffffa80`05b411a0 : 0xfffff800`00ba25e0
fffff800`00ba2550 00000000`00000000 : 00000000`00000000 fffffa80`001801a9 fffffa80`05b411a0 00000000`00000000 : netr28x+0x25ac28
THREAD_SHA1_HASH_MOD_FUNC: 935105e89958188e75032d802c31088ef212f1d5
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: d6275099b99a3ef75c037e31f081aba5025e8f89
THREAD_SHA1_HASH_MOD: 7921e317582c7f98a7f13cfbcd3c02a86fdcafec
FOLLOWUP_IP:
netr28x+4b98d
fffff880`0514a98d ?? ???
SYMBOL_STACK_INDEX: b
SYMBOL_NAME: netr28x+4b98d
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: netr28x
IMAGE_NAME: netr28x.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: X64_0xA_netr28x+4b98d
BUCKET_ID: X64_0xA_netr28x+4b98d
PRIMARY_PROBLEM_CLASS: X64_0xA_netr28x+4b98d
TARGET_TIME: 2019-04-20T20:33:09.000Z
OSBUILD: 7601
OSSERVICEPACK: 1000
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 7
OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2019-03-21 04:38:47
BUILDDATESTAMP_STR: 190320-1700
BUILDLAB_STR: win7sp1_ldr_escrow
BUILDOSVER_STR: 6.1.7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700
ANALYSIS_SESSION_ELAPSED_TIME: 7e6
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:x64_0xa_netr28x+4b98d
FAILURE_ID_HASH: {a6eb3f60-a5c3-0bd6-051c-41bf4427925d}
Followup: MachineOwner
---------
INVALID_PROCESS_ATTACH_ATTEMPT (5)
Arguments:
Arg1: fffffa80042d09b0
Arg2: fffffa80075e8060
Arg3: 0000000000000000
Arg4: 0000000000000001
Debugging Details:
------------------
GetUlongPtrFromAddress: unable to read from fffff800032af300
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 2
Key : Analysis.Elapsed.Sec
Value: 2
Key : Analysis.Memory.CommitPeak.Mb
Value: 62
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700
SYSTEM_MANUFACTURER: Hewlett-Packard
SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC
SYSTEM_SKU: J4T62EA#AB8
SYSTEM_VERSION: 0991100000000000000600087
BIOS_VENDOR: Insyde
BIOS_VERSION: F.43
BIOS_DATE: 12/19/2017
BASEBOARD_MANUFACTURER: Hewlett-Packard
BASEBOARD_PRODUCT: 2211
BASEBOARD_VERSION: 86.56
DUMP_TYPE: 2
BUGCHECK_P1: fffffa80042d09b0
BUGCHECK_P2: fffffa80075e8060
BUGCHECK_P3: 0
BUGCHECK_P4: 1
CPU_COUNT: 4
CPU_MHZ: 6a0
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 45
CPU_STEPPING: 1
CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init)
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
BUGCHECK_STR: 0x5
PROCESS_NAME: audiodg.exe
CURRENT_IRQL: 2
ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5
ANALYSIS_SESSION_TIME: 06-17-2019 20:48:52.0836
ANALYSIS_VERSION: 10.0.18869.1002 amd64fre
DPC_STACK_BASE: FFFFF8000441FFB0
LOCK_ADDRESS: fffff80003282240 -- (!locks fffff80003282240)
Cannot get _ERESOURCE type
Resource @ nt!PiEngineLock (0xfffff80003282240) Available
1 total locks
PNP_TRIAGE_DATA:
Lock address : 0xfffff80003282240
Thread Count : 0
Thread address: 0x0000000000000000
Thread wait : 0x0
LAST_CONTROL_TRANSFER: from fffff800030545f2 to fffff800030a5ba0
STACK_TEXT:
fffff800`0441ecc8 fffff800`030545f2 : 00000000`00000005 fffffa80`042d09b0 fffffa80`075e8060 00000000`00000000 : nt!KeBugCheckEx
fffff800`0441ecd0 fffff800`032fd127 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeStackAttachProcess+0x52
fffff800`0441ed50 fffff800`032fd4bf : 00000000`00000000 fffff8a0`00000000 fffff8a0`00001910 00000000`00000000 : nt!ObpDecrementHandleCount+0x177
fffff800`0441edd0 fffff800`032fd1e4 : 00000000`000007c8 fffffa80`075e8060 fffff8a0`00001910 00000000`000007c8 : nt!ObpCloseHandleTableEntry+0xaf
fffff800`0441ee60 fffff800`030b3bd3 : fffffa80`044dab50 fffff800`0441ef30 fffff800`03367200 fffff800`032f376a : nt!ObpCloseHandle+0x94
fffff800`0441eeb0 fffff800`030a93b0 : fffff800`03340d73 fffffa80`04ddc060 fffff800`03367200 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
fffff800`0441f048 fffff800`03340d73 : fffffa80`04ddc060 fffff800`03367200 00000000`00000000 00000000`00000000 : nt!KiServiceLinkage
fffff800`0441f050 fffff800`0334aa78 : fffffa80`04ddc060 00000000`00000001 fffffa80`04dd96e0 00000000`00000000 : nt!PiGetDeviceRegistryProperty+0xab
fffff800`0441f1b0 fffff800`0333fa90 : fffffa80`04ddc060 fffffa80`04ddc060 00000000`00000000 00000000`00000000 : nt!IoGetDeviceProperty+0xbc
fffff800`0441f290 fffff800`03350f51 : 00000000`ffff0000 fffffa80`05a69770 fffff880`014e7110 fffffa80`05ca3270 : nt!IopOpenOrCreateDeviceRegistryKey+0x14c
fffff800`0441f450 fffff880`0152c152 : fffffa80`071bfdc0 fffff800`0441f5e0 00000000`0000001f 00000000`000007ff : nt!IoOpenDeviceRegistryKey+0x11
fffff800`0441f490 fffff880`01497b34 : fffff800`0441f5e0 fffff800`0441f5b8 fffffa80`05c0a1a0 fffff880`0646eab0 : ndis!NdisOpenConfiguration+0xb2
fffff800`0441f4d0 fffff880`04f0c94f : fffffa80`00000000 fffff800`0441f5e0 fffff880`0511bc28 00000000`00000000 : ndis!NdisOpenConfigurationEx+0xa4
fffff800`0441f540 fffffa80`00000000 : fffff800`0441f5e0 fffff880`0511bc28 00000000`00000000 fffffa80`001801a9 : netr28x+0x4b94f
fffff800`0441f548 fffff800`0441f5e0 : fffff880`0511bc28 00000000`00000000 fffffa80`001801a9 fffffa80`05c0a1a0 : 0xfffffa80`00000000
fffff800`0441f550 fffff880`0511bc28 : 00000000`00000000 fffffa80`001801a9 fffffa80`05c0a1a0 00000000`00000000 : 0xfffff800`0441f5e0
fffff800`0441f558 00000000`00000000 : fffffa80`001801a9 fffffa80`05c0a1a0 00000000`00000000 fffff880`00e5028c : netr28x+0x25ac28
THREAD_SHA1_HASH_MOD_FUNC: 1764d353450a941fbc74295279ec02651c3d9814
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: bdc70d393af014c177e84e60c668cc911acaf71f
THREAD_SHA1_HASH_MOD: 9a9dca34541ae91666e3989df373f06b6e683623
FOLLOWUP_IP:
netr28x+4b94f
fffff880`04f0c94f ?? ???
SYMBOL_STACK_INDEX: d
SYMBOL_NAME: netr28x+4b94f
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: netr28x
IMAGE_NAME: netr28x.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: X64_0x5_netr28x+4b94f
BUCKET_ID: X64_0x5_netr28x+4b94f
PRIMARY_PROBLEM_CLASS: X64_0x5_netr28x+4b94f
TARGET_TIME: 2019-04-11T15:07:27.000Z
OSBUILD: 7601
OSSERVICEPACK: 1000
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 7
OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2019-03-06 05:38:53
BUILDDATESTAMP_STR: 190305-1700
BUILDLAB_STR: win7sp1_ldr_escrow
BUILDOSVER_STR: 6.1.7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700
ANALYSIS_SESSION_ELAPSED_TIME: 8c6
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:x64_0x5_netr28x+4b94f
FAILURE_ID_HASH: {43753b0b-e234-1a01-8468-7eed644d41ea}
Followup: MachineOwner
INVALID_PROCESS_ATTACH_ATTEMPT (5)
Arguments:
Arg1: fffffa80042b59b0
Arg2: fffffa8004c74b00
Arg3: 0000000000000001
Arg4: 0000000000000001
Debugging Details:
------------------
GetUlongPtrFromAddress: unable to read from fffff800030f3300
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 2
Key : Analysis.Elapsed.Sec
Value: 2
Key : Analysis.Memory.CommitPeak.Mb
Value: 62
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700
SYSTEM_MANUFACTURER: Hewlett-Packard
SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC
SYSTEM_SKU: J4T62EA#AB8
SYSTEM_VERSION: 0991100000000000000600087
BIOS_VENDOR: Insyde
BIOS_VERSION: F.43
BIOS_DATE: 12/19/2017
BASEBOARD_MANUFACTURER: Hewlett-Packard
BASEBOARD_PRODUCT: 2211
BASEBOARD_VERSION: 86.56
DUMP_TYPE: 2
BUGCHECK_P1: fffffa80042b59b0
BUGCHECK_P2: fffffa8004c74b00
BUGCHECK_P3: 1
BUGCHECK_P4: 1
CPU_COUNT: 4
CPU_MHZ: 6a0
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 45
CPU_STEPPING: 1
CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init)
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
BUGCHECK_STR: 0x5
PROCESS_NAME: chrome.exe
CURRENT_IRQL: 2
ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5
ANALYSIS_SESSION_TIME: 06-17-2019 20:48:49.0152
ANALYSIS_VERSION: 10.0.18869.1002 amd64fre
DPC_STACK_BASE: FFFFF80000BA2FB0
LOCK_ADDRESS: fffff800030c6240 -- (!locks fffff800030c6240)
Cannot get _ERESOURCE type
Resource @ nt!PiEngineLock (0xfffff800030c6240) Available
1 total locks
PNP_TRIAGE_DATA:
Lock address : 0xfffff800030c6240
Thread Count : 0
Thread address: 0x0000000000000000
Thread wait : 0x0
LAST_CONTROL_TRANSFER: from fffff80002e985f2 to fffff80002ee9ba0
STACK_TEXT:
fffff800`00ba1cc8 fffff800`02e985f2 : 00000000`00000005 fffffa80`042b59b0 fffffa80`04c74b00 00000000`00000001 : nt!KeBugCheckEx
fffff800`00ba1cd0 fffff800`03141127 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeStackAttachProcess+0x52
fffff800`00ba1d50 fffff800`031414bf : 00000000`00000000 fffff8a0`00000000 fffff8a0`00001910 00000000`00000000 : nt!ObpDecrementHandleCount+0x177
fffff800`00ba1dd0 fffff800`031411e4 : 00000000`000008e4 fffffa80`04c74b00 fffff8a0`00001910 00000000`000008e4 : nt!ObpCloseHandleTableEntry+0xaf
fffff800`00ba1e60 fffff800`02ef7bd3 : fffffa80`076a6b50 fffff800`00ba1f30 fffff800`031ab200 fffff800`0313776a : nt!ObpCloseHandle+0x94
fffff800`00ba1eb0 fffff800`02eed3b0 : fffff800`03184d73 fffffa80`04e1e060 fffff800`031ab200 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
fffff800`00ba2048 fffff800`03184d73 : fffffa80`04e1e060 fffff800`031ab200 00000000`00000000 00000000`00000000 : nt!KiServiceLinkage
fffff800`00ba2050 fffff800`0318ea78 : fffffa80`04e1e060 00000000`00000001 fffffa80`04e1d6e0 00000000`00000000 : nt!PiGetDeviceRegistryProperty+0xab
fffff800`00ba21b0 fffff800`03183a90 : fffffa80`04e1e060 fffffa80`04e1e060 00000000`00000000 00000000`00000000 : nt!IoGetDeviceProperty+0xbc
fffff800`00ba2290 fffff800`03194f51 : 00000000`ffff0000 fffffa80`07df09f0 fffff880`01480110 fffffa80`05cfe910 : nt!IopOpenOrCreateDeviceRegistryKey+0x14c
fffff800`00ba2450 fffff880`014c5152 : fffffa80`080038e0 fffff800`00ba25e0 fffffa80`0700aa78 00000000`000007ff : nt!IoOpenDeviceRegistryKey+0x11
fffff800`00ba2490 fffff880`01430b34 : fffff800`00ba25e0 fffff800`00ba25b8 fffffa80`055e31a0 fffff880`014db21d : ndis!NdisOpenConfiguration+0xb2
fffff800`00ba24d0 fffff880`04e5194f : 00000000`00000000 fffff800`00ba25e0 fffff880`05060c28 00000000`00000000 : ndis!NdisOpenConfigurationEx+0xa4
fffff800`00ba2540 00000000`00000000 : fffff800`00ba25e0 fffff880`05060c28 00000000`00000000 fffffa80`001801a9 : netr28x+0x4b94f
THREAD_SHA1_HASH_MOD_FUNC: ae5746727567d6f3e980a5bab83b7524a5dc9ee8
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: a4491f04e0c588cecd320ea5c66c026862f569ea
THREAD_SHA1_HASH_MOD: 34d7ba38146ecb972065c22fa7203d72f73eccb4
FOLLOWUP_IP:
netr28x+4b94f
fffff880`04e5194f ?? ???
SYMBOL_STACK_INDEX: d
SYMBOL_NAME: netr28x+4b94f
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: netr28x
IMAGE_NAME: netr28x.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: X64_0x5_netr28x+4b94f
BUCKET_ID: X64_0x5_netr28x+4b94f
PRIMARY_PROBLEM_CLASS: X64_0x5_netr28x+4b94f
TARGET_TIME: 2019-04-11T14:09:37.000Z
OSBUILD: 7601
OSSERVICEPACK: 1000
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 7
OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2019-03-06 05:38:53
BUILDDATESTAMP_STR: 190305-1700
BUILDLAB_STR: win7sp1_ldr_escrow
BUILDOSVER_STR: 6.1.7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700
ANALYSIS_SESSION_ELAPSED_TIME: 941
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:x64_0x5_netr28x+4b94f
FAILURE_ID_HASH: {43753b0b-e234-1a01-8468-7eed644d41ea}
Followup: MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff8a002085398, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80003ae56fd, address which referenced memory
Debugging Details:
------------------
GetUlongPtrFromAddress: unable to read from fffff80003ab1300
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 1
Key : Analysis.Elapsed.Sec
Value: 1
Key : Analysis.Memory.CommitPeak.Mb
Value: 62
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700
SYSTEM_MANUFACTURER: Hewlett-Packard
SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC
SYSTEM_SKU: J4T62EA#AB8
SYSTEM_VERSION: 0991100000000000000600087
BIOS_VENDOR: Insyde
BIOS_VERSION: F.43
BIOS_DATE: 12/19/2017
BASEBOARD_MANUFACTURER: Hewlett-Packard
BASEBOARD_PRODUCT: 2211
BASEBOARD_VERSION: 86.56
DUMP_TYPE: 2
BUGCHECK_P1: fffff8a002085398
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff80003ae56fd
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80003ab1100
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff80003ab12f0
GetUlongPtrFromAddress: unable to read from fffff80003ab14a8
GetPointerFromAddress: unable to read from fffff80003ab10d8
fffff8a002085398 Paged pool
CURRENT_IRQL: 2
FAULTING_IP:
nt!HvpDoAllocateCell+101
fffff800`03ae56fd 89443d00 mov dword ptr [rbp+rdi],eax
CPU_COUNT: 4
CPU_MHZ: 6a0
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 45
CPU_STEPPING: 1
CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init)
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: System
ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5
ANALYSIS_SESSION_TIME: 06-17-2019 20:48:46.0248
ANALYSIS_VERSION: 10.0.18869.1002 amd64fre
TRAP_FRAME: fffff80004c1a950 -- (.trap 0xfffff80004c1a950)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000008 rbx=0000000000000000 rcx=0000000000000368
rdx=0000000000000002 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80003ae56fd rsp=fffff80004c1aae0 rbp=0000000000000030
r8=fffff8a000024010 r9=0000000000000005 r10=fffff8a002085000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!HvpDoAllocateCell+0x101:
fffff800`03ae56fd 89443d00 mov dword ptr [rbp+rdi],eax ss:0018:00000000`00000030=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800038b5f69 to fffff800038a7ba0
STACK_TEXT:
fffff800`04c1a808 fffff800`038b5f69 : 00000000`0000000a fffff8a0`02085398 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff800`04c1a810 fffff800`038b3d88 : 00000000`00000001 fffff8a0`02085398 00000000`00000000 fffff8a0`00024010 : nt!KiBugCheckDispatch+0x69
fffff800`04c1a950 fffff800`03ae56fd : fffff8a0`00024010 fffff8a0`00024010 fffff8a0`0003b420 fffff800`00000000 : nt!KiPageFault+0x448
fffff800`04c1aae0 fffff800`03b27d1d : fffff8a0`00024010 00000000`00000000 00000000`00000000 00000000`ffffffff : nt!HvpDoAllocateCell+0x101
fffff800`04c1ab40 fffff800`03b27bad : 00000000`00000000 fffff8a0`018bcc30 00000000`00000008 fffff800`03b15d5c : nt!HvAllocateCell+0x55
fffff800`04c1ab70 fffff800`03ada4bf : fffff8a0`00024010 fffff8a0`00024010 fffff8a0`018ca640 fffff800`04c1ae18 : nt!CmpAddValueKeyNew+0x69
fffff800`04c1ac40 fffff800`03cc06e3 : 01d501ff`f5623883 fffff800`04c1aff0 fffff8a0`04468820 00000000`00000000 : nt!CmpSetValueKeyNew+0x77
fffff800`04c1ac90 fffff800`03ae5531 : fffff8a0`0506b140 fffff800`04c1ae18 fffffa80`00000004 fffff800`04c1b210 : nt!CmSetValueKey+0xba3
fffff800`04c1add0 fffff800`038b5bd3 : ffffffff`80000dc4 00000000`00000002 fffffa80`00000000 fffff800`00000004 : nt!NtSetValueKey+0x349
fffff800`04c1af00 fffff800`038ab3b0 : fffff800`03bfc2a2 fffff800`04c1b248 fffff880`01525152 fffffa80`00040001 : nt!KiSystemServiceCopyEnd+0x13
fffff800`04c1b108 fffff800`03bfc2a2 : fffff800`04c1b248 fffff880`01525152 fffffa80`00040001 fffff800`04c1b270 : nt!KiServiceLinkage
fffff800`04c1b110 fffff880`0152cd96 : 00000000`00000004 fffffa80`0449b4e0 fffff880`0525c030 00000000`000007ff : nt!RtlWriteRegistryValue+0x62
fffff800`04c1b170 fffff880`050b698d : fffff800`04c1b270 fffff880`052c5c28 00000000`00000000 00000000`00000000 : ndis!NdisWriteConfiguration+0x156
fffff800`04c1b1d0 fffff800`04c1b270 : fffff880`052c5c28 00000000`00000000 00000000`00000000 fffff800`001801a9 : netr28x+0x4b98d
fffff800`04c1b1d8 fffff880`052c5c28 : 00000000`00000000 00000000`00000000 fffff800`001801a9 fffffa80`05b7f1a0 : 0xfffff800`04c1b270
fffff800`04c1b1e0 00000000`00000000 : 00000000`00000000 fffff800`001801a9 fffffa80`05b7f1a0 fffff800`00000000 : netr28x+0x25ac28
THREAD_SHA1_HASH_MOD_FUNC: 80858fdf941bd645ff48b6997b30f63ac59926fb
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 394aafee51f76470053fa2102b9df0f0f7df42a3
THREAD_SHA1_HASH_MOD: 5d50876435db08b990ce5928fe5c90526c26b16c
FOLLOWUP_IP:
netr28x+4b98d
fffff880`050b698d ?? ???
SYMBOL_STACK_INDEX: d
SYMBOL_NAME: netr28x+4b98d
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: netr28x
IMAGE_NAME: netr28x.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: X64_0xA_netr28x+4b98d
BUCKET_ID: X64_0xA_netr28x+4b98d
PRIMARY_PROBLEM_CLASS: X64_0xA_netr28x+4b98d
TARGET_TIME: 2019-05-03T22:31:32.000Z
OSBUILD: 7601
OSSERVICEPACK: 1000
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 7
OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2019-03-21 04:38:47
BUILDDATESTAMP_STR: 190320-1700
BUILDLAB_STR: win7sp1_ldr_escrow
BUILDOSVER_STR: 6.1.7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700
ANALYSIS_SESSION_ELAPSED_TIME: 7b0
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:x64_0xa_netr28x+4b98d
FAILURE_ID_HASH: {a6eb3f60-a5c3-0bd6-051c-41bf4427925d}
Followup: MachineOwner
---------
INVALID_PROCESS_ATTACH_ATTEMPT (5)
Arguments:
Arg1: fffffa80042cf9b0
Arg2: fffffa80045a46e0
Arg3: 0000000000000000
Arg4: 0000000000000001
Debugging Details:
------------------
GetUlongPtrFromAddress: unable to read from fffff800030fb300
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 2
Key : Analysis.Elapsed.Sec
Value: 2
Key : Analysis.Memory.CommitPeak.Mb
Value: 62
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700
SYSTEM_MANUFACTURER: Hewlett-Packard
SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC
SYSTEM_SKU: J4T62EA#AB8
SYSTEM_VERSION: 0991100000000000000600087
BIOS_VENDOR: Insyde
BIOS_VERSION: F.43
BIOS_DATE: 12/19/2017
BASEBOARD_MANUFACTURER: Hewlett-Packard
BASEBOARD_PRODUCT: 2211
BASEBOARD_VERSION: 86.56
DUMP_TYPE: 2
BUGCHECK_P1: fffffa80042cf9b0
BUGCHECK_P2: fffffa80045a46e0
BUGCHECK_P3: 0
BUGCHECK_P4: 1
CPU_COUNT: 4
CPU_MHZ: 6a0
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 45
CPU_STEPPING: 1
CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init)
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
BUGCHECK_STR: 0x5
PROCESS_NAME: chrome.exe
CURRENT_IRQL: 2
ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5
ANALYSIS_SESSION_TIME: 06-17-2019 20:48:24.0070
ANALYSIS_VERSION: 10.0.18869.1002 amd64fre
DPC_STACK_BASE: FFFFF80000BA2FB0
LOCK_ADDRESS: fffff800030ce240 -- (!locks fffff800030ce240)
Cannot get _ERESOURCE type
Resource @ nt!PiEngineLock (0xfffff800030ce240) Available
1 total locks
PNP_TRIAGE_DATA:
Lock address : 0xfffff800030ce240
Thread Count : 0
Thread address: 0x0000000000000000
Thread wait : 0x0
LAST_CONTROL_TRANSFER: from fffff80002ea05f2 to fffff80002ef1ba0
STACK_TEXT:
fffff800`00ba1cc8 fffff800`02ea05f2 : 00000000`00000005 fffffa80`042cf9b0 fffffa80`045a46e0 00000000`00000000 : nt!KeBugCheckEx
fffff800`00ba1cd0 fffff800`03149127 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeStackAttachProcess+0x52
fffff800`00ba1d50 fffff800`031494bf : 00000000`00000000 fffff8a0`00000000 fffff8a0`00001910 00000000`00000000 : nt!ObpDecrementHandleCount+0x177
fffff800`00ba1dd0 fffff800`031491e4 : 00000000`00000b3c fffffa80`045a46e0 fffff8a0`00001910 00000000`00000b3c : nt!ObpCloseHandleTableEntry+0xaf
fffff800`00ba1e60 fffff800`02effbd3 : fffffa80`04502060 fffff800`00ba1f30 fffff800`031b3200 fffff800`0313f76a : nt!ObpCloseHandle+0x94
fffff800`00ba1eb0 fffff800`02ef53b0 : fffff800`0318cd73 fffffa80`04ebd060 fffff800`031b3200 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
fffff800`00ba2048 fffff800`0318cd73 : fffffa80`04ebd060 fffff800`031b3200 00000000`00000000 00000000`00000000 : nt!KiServiceLinkage
fffff800`00ba2050 fffff800`03196a78 : fffffa80`04ebd060 00000000`00000001 fffffa80`04eba6e0 00000000`00000000 : nt!PiGetDeviceRegistryProperty+0xab
fffff800`00ba21b0 fffff800`0318ba90 : fffffa80`04ebd060 fffffa80`04ebd060 00000000`00000000 00000000`00000000 : nt!IoGetDeviceProperty+0xbc
fffff800`00ba2290 fffff800`0319cf51 : 00000000`ffff0000 fffffa80`08470cb0 fffff880`0147f110 fffffa80`059fbe30 : nt!IopOpenOrCreateDeviceRegistryKey+0x14c
fffff800`00ba2450 fffff880`014c4152 : fffffa80`0681f000 fffff800`00ba25e0 00000000`00000005 00000000`000007ff : nt!IoOpenDeviceRegistryKey+0x11
fffff800`00ba2490 fffff880`0142fb34 : fffff800`00ba25e0 fffff800`00ba25b8 fffffa80`05bf61a0 fffff800`02e262ea : ndis!NdisOpenConfiguration+0xb2
fffff800`00ba24d0 fffff880`0511d94f : 00000000`00000000 fffff800`00ba25e0 fffff880`0532cc28 00000000`00000000 : ndis!NdisOpenConfigurationEx+0xa4
fffff800`00ba2540 00000000`00000000 : fffff800`00ba25e0 fffff880`0532cc28 00000000`00000000 fffffa80`001801a9 : netr28x+0x4b94f
THREAD_SHA1_HASH_MOD_FUNC: ae5746727567d6f3e980a5bab83b7524a5dc9ee8
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: a4491f04e0c588cecd320ea5c66c026862f569ea
THREAD_SHA1_HASH_MOD: 34d7ba38146ecb972065c22fa7203d72f73eccb4
FOLLOWUP_IP:
netr28x+4b94f
fffff880`0511d94f ?? ???
SYMBOL_STACK_INDEX: d
SYMBOL_NAME: netr28x+4b94f
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: netr28x
IMAGE_NAME: netr28x.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: X64_0x5_netr28x+4b94f
BUCKET_ID: X64_0x5_netr28x+4b94f
PRIMARY_PROBLEM_CLASS: X64_0x5_netr28x+4b94f
TARGET_TIME: 2019-04-11T14:13:16.000Z
OSBUILD: 7601
OSSERVICEPACK: 1000
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 7
OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2019-03-06 05:38:53
BUILDDATESTAMP_STR: 190305-1700
BUILDLAB_STR: win7sp1_ldr_escrow
BUILDOSVER_STR: 6.1.7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700
ANALYSIS_SESSION_ELAPSED_TIME: 851
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:x64_0x5_netr28x+4b94f
FAILURE_ID_HASH: {43753b0b-e234-1a01-8468-7eed644d41ea}
Followup: MachineOwner
---------
INVALID_PROCESS_ATTACH_ATTEMPT (5)
Arguments:
Arg1: fffffa80042ce9b0
Arg2: fffffa800b053b00
Arg3: 0000000000000000
Arg4: 0000000000000001
Debugging Details:
------------------
GetUlongPtrFromAddress: unable to read from fffff800032ed300
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 1
Key : Analysis.Elapsed.Sec
Value: 2
Key : Analysis.Memory.CommitPeak.Mb
Value: 62
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700
SYSTEM_MANUFACTURER: Hewlett-Packard
SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC
SYSTEM_SKU: J4T62EA#AB8
SYSTEM_VERSION: 0991100000000000000600087
BIOS_VENDOR: Insyde
BIOS_VERSION: F.43
BIOS_DATE: 12/19/2017
BASEBOARD_MANUFACTURER: Hewlett-Packard
BASEBOARD_PRODUCT: 2211
BASEBOARD_VERSION: 86.56
DUMP_TYPE: 2
BUGCHECK_P1: fffffa80042ce9b0
BUGCHECK_P2: fffffa800b053b00
BUGCHECK_P3: 0
BUGCHECK_P4: 1
CPU_COUNT: 4
CPU_MHZ: 6a0
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 45
CPU_STEPPING: 1
CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init)
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
BUGCHECK_STR: 0x5
PROCESS_NAME: mcbuilder.exe
CURRENT_IRQL: 2
ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5
ANALYSIS_SESSION_TIME: 06-17-2019 20:48:40.0990
ANALYSIS_VERSION: 10.0.18869.1002 amd64fre
DPC_STACK_BASE: FFFFF80000BA2FB0
LOCK_ADDRESS: fffff800032c0240 -- (!locks fffff800032c0240)
Cannot get _ERESOURCE type
Resource @ nt!PiEngineLock (0xfffff800032c0240) Available
1 total locks
PNP_TRIAGE_DATA:
Lock address : 0xfffff800032c0240
Thread Count : 0
Thread address: 0x0000000000000000
Thread wait : 0x0
LAST_CONTROL_TRANSFER: from fffff800030925f2 to fffff800030e3ba0
STACK_TEXT:
fffff800`00ba1cc8 fffff800`030925f2 : 00000000`00000005 fffffa80`042ce9b0 fffffa80`0b053b00 00000000`00000000 : nt!KeBugCheckEx
fffff800`00ba1cd0 fffff800`0333b127 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeStackAttachProcess+0x52
fffff800`00ba1d50 fffff800`0333b4bf : 00000000`00000000 fffff8a0`00000000 fffff8a0`00001910 00000000`00000000 : nt!ObpDecrementHandleCount+0x177
fffff800`00ba1dd0 fffff800`0333b1e4 : 00000000`00000d0c fffffa80`0b053b00 fffff8a0`00001910 00000000`00000d0c : nt!ObpCloseHandleTableEntry+0xaf
fffff800`00ba1e60 fffff800`030f1bd3 : fffffa80`0568b6e0 fffff800`00ba1f30 fffff800`033a5200 fffff800`0333176a : nt!ObpCloseHandle+0x94
fffff800`00ba1eb0 fffff800`030e73b0 : fffff800`0337ed73 fffffa80`04dc8060 fffff800`033a5200 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
fffff800`00ba2048 fffff800`0337ed73 : fffffa80`04dc8060 fffff800`033a5200 00000000`00000000 00000000`00000000 : nt!KiServiceLinkage
fffff800`00ba2050 fffff800`03388a78 : fffffa80`04dc8060 00000000`00000001 fffffa80`04dc36e0 00000000`00000000 : nt!PiGetDeviceRegistryProperty+0xab
fffff800`00ba21b0 fffff800`0337da90 : fffffa80`04dc8060 fffffa80`04dc8060 00000000`00000000 00000000`00000000 : nt!IoGetDeviceProperty+0xbc
fffff800`00ba2290 fffff800`0338ef51 : 00000000`ffff0000 fffffa80`09035950 fffff880`014a0110 fffffa80`05adbd80 : nt!IopOpenOrCreateDeviceRegistryKey+0x14c
fffff800`00ba2450 fffff880`014e5152 : fffffa80`00000000 fffff800`00ba25e0 00000000`00000000 00000000`000007ff : nt!IoOpenDeviceRegistryKey+0x11
fffff800`00ba2490 fffff880`01450b34 : fffff800`00ba25e0 fffff800`00ba25b8 fffffa80`05bc91a0 00000000`00000001 : ndis!NdisOpenConfiguration+0xb2
fffff800`00ba24d0 fffff880`056cc94f : 00000000`00000000 fffff800`00ba25e0 fffff880`058dbc28 00000000`00000000 : ndis!NdisOpenConfigurationEx+0xa4
fffff800`00ba2540 00000000`00000000 : fffff800`00ba25e0 fffff880`058dbc28 00000000`00000000 fffffa80`001801a9 : netr28x+0x4b94f
THREAD_SHA1_HASH_MOD_FUNC: ae5746727567d6f3e980a5bab83b7524a5dc9ee8
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: a4491f04e0c588cecd320ea5c66c026862f569ea
THREAD_SHA1_HASH_MOD: 34d7ba38146ecb972065c22fa7203d72f73eccb4
FOLLOWUP_IP:
netr28x+4b94f
fffff880`056cc94f ?? ???
SYMBOL_STACK_INDEX: d
SYMBOL_NAME: netr28x+4b94f
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: netr28x
IMAGE_NAME: netr28x.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: X64_0x5_netr28x+4b94f
BUCKET_ID: X64_0x5_netr28x+4b94f
PRIMARY_PROBLEM_CLASS: X64_0x5_netr28x+4b94f
TARGET_TIME: 2019-04-11T17:47:48.000Z
OSBUILD: 7601
OSSERVICEPACK: 1000
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 7
OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2019-03-06 05:38:53
BUILDDATESTAMP_STR: 190305-1700
BUILDLAB_STR: win7sp1_ldr_escrow
BUILDOSVER_STR: 6.1.7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700
ANALYSIS_SESSION_ELAPSED_TIME: 7f5
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:x64_0x5_netr28x+4b94f
FAILURE_ID_HASH: {43753b0b-e234-1a01-8468-7eed644d41ea}
Followup: MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff8a006be8c34, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80003afb730, address which referenced memory
Debugging Details:
------------------
GetUlongPtrFromAddress: unable to read from fffff80003ab2300
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 1
Key : Analysis.Elapsed.Sec
Value: 1
Key : Analysis.Memory.CommitPeak.Mb
Value: 62
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700
SYSTEM_MANUFACTURER: Hewlett-Packard
SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC
SYSTEM_SKU: J4T62EA#AB8
SYSTEM_VERSION: 0991100000000000000600087
BIOS_VENDOR: Insyde
BIOS_VERSION: F.43
BIOS_DATE: 12/19/2017
BASEBOARD_MANUFACTURER: Hewlett-Packard
BASEBOARD_PRODUCT: 2211
BASEBOARD_VERSION: 86.56
DUMP_TYPE: 2
BUGCHECK_P1: fffff8a006be8c34
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff80003afb730
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80003ab2100
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff80003ab22f0
GetUlongPtrFromAddress: unable to read from fffff80003ab24a8
GetPointerFromAddress: unable to read from fffff80003ab20d8
fffff8a006be8c34 Paged pool
CURRENT_IRQL: 2
FAULTING_IP:
nt!CmpFindValueByNameFromCache+e0
fffff800`03afb730 428b14b8 mov edx,dword ptr [rax+r15*4]
CPU_COUNT: 4
CPU_MHZ: 6a0
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 45
CPU_STEPPING: 1
CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init)
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: System
ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5
ANALYSIS_SESSION_TIME: 06-17-2019 20:48:30.0482
ANALYSIS_VERSION: 10.0.18869.1002 amd64fre
TRAP_FRAME: fffff80004c21990 -- (.trap 0xfffff80004c21990)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8a006be8c34 rbx=0000000000000000 rcx=0000000000000000
rdx=00000000ffffffff rsi=0000000000000000 rdi=0000000000000000
rip=fffff80003afb730 rsp=fffff80004c21b20 rbp=fffff80004c21ff0
r8=fffff8a00004ad40 r9=000000000000ffff r10=0000000000000001
r11=fffff80004c21dc8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!CmpFindValueByNameFromCache+0xe0:
fffff800`03afb730 428b14b8 mov edx,dword ptr [rax+r15*4] ds:fffff8a0`06be8c34=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800038b6f69 to fffff800038a8ba0
STACK_TEXT:
fffff800`04c21848 fffff800`038b6f69 : 00000000`0000000a fffff8a0`06be8c34 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff800`04c21850 fffff800`038b4d88 : 00000000`00000000 fffff8a0`06be8c34 fffffa80`0a1a6000 fffff8a0`00024010 : nt!KiBugCheckDispatch+0x69
fffff800`04c21990 fffff800`03afb730 : fffff8a0`00024010 00000000`00c6ac30 fffff8a0`0004ad40 00000000`00000000 : nt!KiPageFault+0x448
fffff800`04c21b20 fffff800`03adec38 : fffff8a0`0e0d74a8 fffff800`04c21e18 fffff800`04c21c60 fffff800`04c21c48 : nt!CmpFindValueByNameFromCache+0xe0
fffff800`04c21bf0 fffff800`03cc11e7 : fffff8a0`0e0d74a8 01d50684`f67b3cde fffff8a0`0e0d74a8 00000000`00000000 : nt!CmpCompareNewValueDataAgainstKCBCache+0x78
fffff800`04c21c90 fffff800`03ae6531 : fffff8a0`01c5f710 fffff800`04c21e18 fffffa80`00000004 fffff800`04c22210 : nt!CmSetValueKey+0x6a7
fffff800`04c21dd0 fffff800`038b6bd3 : ffffffff`80002788 00000000`00000002 fffffa80`00000000 fffff800`00000004 : nt!NtSetValueKey+0x349
fffff800`04c21f00 fffff800`038ac3b0 : fffff800`03bfd2a2 fffff800`04c22248 fffff880`017a5152 00000000`c0000001 : nt!KiSystemServiceCopyEnd+0x13
fffff800`04c22108 fffff800`03bfd2a2 : fffff800`04c22248 fffff880`017a5152 00000000`c0000001 fffff800`04c22270 : nt!KiServiceLinkage
fffff800`04c22110 fffff880`017acd96 : 00000000`00000004 fffffa80`09b31af0 00000100`00000000 00000000`000007ff : nt!RtlWriteRegistryValue+0x62
fffff800`04c22170 fffff880`056a498d : fffff800`04c22270 fffff880`058b3c28 00000000`00000000 00000000`00000000 : ndis!NdisWriteConfiguration+0x156
fffff800`04c221d0 fffff800`04c22270 : fffff880`058b3c28 00000000`00000000 00000000`00000000 00000000`001801a9 : netr28x+0x4b98d
fffff800`04c221d8 fffff880`058b3c28 : 00000000`00000000 00000000`00000000 00000000`001801a9 fffffa80`05b821a0 : 0xfffff800`04c22270
fffff800`04c221e0 00000000`00000000 : 00000000`00000000 00000000`001801a9 fffffa80`05b821a0 00000000`00000000 : netr28x+0x25ac28
THREAD_SHA1_HASH_MOD_FUNC: 935105e89958188e75032d802c31088ef212f1d5
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 050e790aab7ddac4bfe73c42f1350165ef3ea549
THREAD_SHA1_HASH_MOD: 7921e317582c7f98a7f13cfbcd3c02a86fdcafec
FOLLOWUP_IP:
netr28x+4b98d
fffff880`056a498d ?? ???
SYMBOL_STACK_INDEX: b
SYMBOL_NAME: netr28x+4b98d
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: netr28x
IMAGE_NAME: netr28x.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: X64_0xA_netr28x+4b98d
BUCKET_ID: X64_0xA_netr28x+4b98d
PRIMARY_PROBLEM_CLASS: X64_0xA_netr28x+4b98d
TARGET_TIME: 2019-05-09T16:33:41.000Z
OSBUILD: 7601
OSSERVICEPACK: 1000
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 7
OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2019-03-21 04:38:47
BUILDDATESTAMP_STR: 190320-1700
BUILDLAB_STR: win7sp1_ldr_escrow
BUILDOSVER_STR: 6.1.7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700
ANALYSIS_SESSION_ELAPSED_TIME: 716
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:x64_0xa_netr28x+4b98d
FAILURE_ID_HASH: {a6eb3f60-a5c3-0bd6-051c-41bf4427925d}
Followup: MachineOwner
---------
INVALID_PROCESS_ATTACH_ATTEMPT (5)
Arguments:
Arg1: fffffa80042b59b0
Arg2: fffffa80048376b0
Arg3: 0000000000000000
Arg4: 0000000000000001
Debugging Details:
------------------
GetUlongPtrFromAddress: unable to read from fffff8000309f300
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 1
Key : Analysis.Elapsed.Sec
Value: 1
Key : Analysis.Memory.CommitPeak.Mb
Value: 62
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700
SYSTEM_MANUFACTURER: Hewlett-Packard
SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC
SYSTEM_SKU: J4T62EA#AB8
SYSTEM_VERSION: 0991100000000000000600087
BIOS_VENDOR: Insyde
BIOS_VERSION: F.43
BIOS_DATE: 12/19/2017
BASEBOARD_MANUFACTURER: Hewlett-Packard
BASEBOARD_PRODUCT: 2211
BASEBOARD_VERSION: 86.56
DUMP_TYPE: 2
BUGCHECK_P1: fffffa80042b59b0
BUGCHECK_P2: fffffa80048376b0
BUGCHECK_P3: 0
BUGCHECK_P4: 1
CPU_COUNT: 4
CPU_MHZ: 6a0
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 45
CPU_STEPPING: 1
CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init)
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
BUGCHECK_STR: 0x5
PROCESS_NAME: PointBlank.exe
CURRENT_IRQL: 2
ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5
ANALYSIS_SESSION_TIME: 06-17-2019 21:16:16.0171
ANALYSIS_VERSION: 10.0.18869.1002 amd64fre
DPC_STACK_BASE: FFFFF80000BA2FB0
LOCK_ADDRESS: fffff80003072240 -- (!locks fffff80003072240)
Cannot get _ERESOURCE type
Resource @ nt!PiEngineLock (0xfffff80003072240) Available
1 total locks
PNP_TRIAGE_DATA:
Lock address : 0xfffff80003072240
Thread Count : 0
Thread address: 0x0000000000000000
Thread wait : 0x0
LAST_CONTROL_TRANSFER: from fffff80002e445f2 to fffff80002e95ba0
STACK_TEXT:
fffff800`00ba1cc8 fffff800`02e445f2 : 00000000`00000005 fffffa80`042b59b0 fffffa80`048376b0 00000000`00000000 : nt!KeBugCheckEx
fffff800`00ba1cd0 fffff800`030ed127 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeStackAttachProcess+0x52
fffff800`00ba1d50 fffff800`030ed4bf : 00000000`00000000 fffff8a0`00000000 fffff8a0`00001910 00000000`00000000 : nt!ObpDecrementHandleCount+0x177
fffff800`00ba1dd0 fffff800`030ed1e4 : 00000000`00000c9c fffffa80`048376b0 fffff8a0`00001910 00000000`00000c9c : nt!ObpCloseHandleTableEntry+0xaf
fffff800`00ba1e60 fffff800`02ea3bd3 : fffffa80`04988060 fffff800`00ba1f30 fffff800`03157200 fffff800`030e376a : nt!ObpCloseHandle+0x94
fffff800`00ba1eb0 fffff800`02e993b0 : fffff800`03130d73 fffffa80`04e7d060 fffff800`03157200 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
fffff800`00ba2048 fffff800`03130d73 : fffffa80`04e7d060 fffff800`03157200 00000000`00000000 00000000`00000000 : nt!KiServiceLinkage
fffff800`00ba2050 fffff800`0313aa78 : fffffa80`04e7d060 00000000`00000001 fffffa80`04e386e0 00000000`00000000 : nt!PiGetDeviceRegistryProperty+0xab
fffff800`00ba21b0 fffff800`0312fa90 : fffffa80`04e7d060 fffffa80`04e7d060 00000000`00000000 00000000`00000000 : nt!IoGetDeviceProperty+0xbc
fffff800`00ba2290 fffff800`03140f51 : 00000000`ffff0000 fffffa80`08033990 fffff880`014d7110 fffffa80`05bfaf70 : nt!IopOpenOrCreateDeviceRegistryKey+0x14c
fffff800`00ba2450 fffff880`0151c152 : fffffa80`049479f0 fffff800`00ba25e0 fffffa80`06f64a78 00000000`000007ff : nt!IoOpenDeviceRegistryKey+0x11
fffff800`00ba2490 fffff880`01487b34 : fffff800`00ba25e0 fffff800`00ba25b8 fffffa80`05bf91a0 fffff880`0153221d : ndis!NdisOpenConfiguration+0xb2
fffff800`00ba24d0 fffff880`04eff94f : fffffa80`00000000 fffff800`00ba25e0 fffff880`0510ec28 00000000`00000000 : ndis!NdisOpenConfigurationEx+0xa4
fffff800`00ba2540 fffffa80`00000000 : fffff800`00ba25e0 fffff880`0510ec28 00000000`00000000 00000000`001801a9 : netr28x+0x4b94f
fffff800`00ba2548 fffff800`00ba25e0 : fffff880`0510ec28 00000000`00000000 00000000`001801a9 fffffa80`05bf91a0 : 0xfffffa80`00000000
fffff800`00ba2550 fffff880`0510ec28 : 00000000`00000000 00000000`001801a9 fffffa80`05bf91a0 fffffa80`00000000 : 0xfffff800`00ba25e0
fffff800`00ba2558 00000000`00000000 : 00000000`001801a9 fffffa80`05bf91a0 fffffa80`00000000 fffff880`04f0be2e : netr28x+0x25ac28
THREAD_SHA1_HASH_MOD_FUNC: 1764d353450a941fbc74295279ec02651c3d9814
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: bdc70d393af014c177e84e60c668cc911acaf71f
THREAD_SHA1_HASH_MOD: 9a9dca34541ae91666e3989df373f06b6e683623
FOLLOWUP_IP:
netr28x+4b94f
fffff880`04eff94f ?? ???
SYMBOL_STACK_INDEX: d
SYMBOL_NAME: netr28x+4b94f
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: netr28x
IMAGE_NAME: netr28x.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: X64_0x5_netr28x+4b94f
BUCKET_ID: X64_0x5_netr28x+4b94f
PRIMARY_PROBLEM_CLASS: X64_0x5_netr28x+4b94f
TARGET_TIME: 2019-04-11T14:53:19.000Z
OSBUILD: 7601
OSSERVICEPACK: 1000
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 7
OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2019-03-06 05:38:53
BUILDDATESTAMP_STR: 190305-1700
BUILDLAB_STR: win7sp1_ldr_escrow
BUILDOSVER_STR: 6.1.7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700
ANALYSIS_SESSION_ELAPSED_TIME: 7ca
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:x64_0x5_netr28x+4b94f
FAILURE_ID_HASH: {43753b0b-e234-1a01-8468-7eed644d41ea}
Followup: MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff8a000e8ee98, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff800032e66fd, address which referenced memory
Debugging Details:
------------------
GetUlongPtrFromAddress: unable to read from fffff800032b2300
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 1
Key : Analysis.Elapsed.Sec
Value: 1
Key : Analysis.Memory.CommitPeak.Mb
Value: 62
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700
SYSTEM_MANUFACTURER: Hewlett-Packard
SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC
SYSTEM_SKU: J4T62EA#AB8
SYSTEM_VERSION: 0991100000000000000600087
BIOS_VENDOR: Insyde
BIOS_VERSION: F.43
BIOS_DATE: 12/19/2017
BASEBOARD_MANUFACTURER: Hewlett-Packard
BASEBOARD_PRODUCT: 2211
BASEBOARD_VERSION: 86.56
DUMP_TYPE: 2
BUGCHECK_P1: fffff8a000e8ee98
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff800032e66fd
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800032b2100
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff800032b22f0
GetUlongPtrFromAddress: unable to read from fffff800032b24a8
GetPointerFromAddress: unable to read from fffff800032b20d8
fffff8a000e8ee98 Paged pool
CURRENT_IRQL: 2
FAULTING_IP:
nt!HvpDoAllocateCell+101
fffff800`032e66fd 89443d00 mov dword ptr [rbp+rdi],eax
CPU_COUNT: 4
CPU_MHZ: 6a0
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 45
CPU_STEPPING: 1
CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init)
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: System
ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5
ANALYSIS_SESSION_TIME: 06-17-2019 21:16:26.0291
ANALYSIS_VERSION: 10.0.18869.1002 amd64fre
TRAP_FRAME: fffff80004418950 -- (.trap 0xfffff80004418950)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000020 rbx=0000000000000000 rcx=0000000000002e68
rdx=0000000000000006 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800032e66fd rsp=fffff80004418ae0 rbp=0000000000000030
r8=fffff8a000024010 r9=0000000000000005 r10=fffff8a000e8c000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!HvpDoAllocateCell+0x101:
fffff800`032e66fd 89443d00 mov dword ptr [rbp+rdi],eax ss:0018:00000000`00000030=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800030b6f69 to fffff800030a8ba0
STACK_TEXT:
fffff800`04418808 fffff800`030b6f69 : 00000000`0000000a fffff8a0`00e8ee98 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff800`04418810 fffff800`030b4d88 : 00000000`00000001 fffff8a0`00e8ee98 00000000`00000000 fffff8a0`00024010 : nt!KiBugCheckDispatch+0x69
fffff800`04418950 fffff800`032e66fd : fffff8a0`00024010 fffff8a0`00024010 fffff8a0`0004b9a0 fffff800`00000000 : nt!KiPageFault+0x448
fffff800`04418ae0 fffff800`03328d1d : fffff8a0`00024010 00000000`00000000 00000000`00000000 00000000`ffffffff : nt!HvpDoAllocateCell+0x101
fffff800`04418b40 fffff800`03328bad : 00000000`00000000 fffff8a0`00ff0c30 00000000`00000008 fffff800`03316d5c : nt!HvAllocateCell+0x55
fffff800`04418b70 fffff800`032db4bf : fffff8a0`00024010 fffff8a0`00024010 fffff8a0`00ffe640 fffff800`04418e18 : nt!CmpAddValueKeyNew+0x69
fffff800`04418c40 fffff800`034c16e3 : 01d4fd21`140179ca fffff800`04418ff0 fffff8a0`050bd948 00000000`00000000 : nt!CmpSetValueKeyNew+0x77
fffff800`04418c90 fffff800`032e6531 : fffff8a0`0df75fa0 fffff800`04418e18 fffffa80`00000004 fffff800`04419210 : nt!CmSetValueKey+0xba3
fffff800`04418dd0 fffff800`030b6bd3 : ffffffff`80000ab0 00000000`00000002 fffffa80`00000000 fffff800`00000004 : nt!NtSetValueKey+0x349
fffff800`04418f00 fffff800`030ac3b0 : fffff800`033fd2a2 fffff800`04419248 fffff880`014a9152 fffffa80`051e12f0 : nt!KiSystemServiceCopyEnd+0x13
fffff800`04419108 fffff800`033fd2a2 : fffff800`04419248 fffff880`014a9152 fffffa80`051e12f0 fffff800`04419270 : nt!KiServiceLinkage
fffff800`04419110 fffff880`014b0d96 : 00000000`00000004 fffffa80`0855a220 00000000`ffffffff 00000000`000007ff : nt!RtlWriteRegistryValue+0x62
fffff800`04419170 fffff880`04eef98d : fffff800`04419270 fffff880`050fec28 00000000`00000000 00000000`00000000 : ndis!NdisWriteConfiguration+0x156
fffff800`044191d0 fffff800`04419270 : fffff880`050fec28 00000000`00000000 00000000`00000000 fffff800`001801a9 : netr28x+0x4b98d
fffff800`044191d8 fffff880`050fec28 : 00000000`00000000 00000000`00000000 fffff800`001801a9 fffffa80`05be11a0 : 0xfffff800`04419270
fffff800`044191e0 00000000`00000000 : 00000000`00000000 fffff800`001801a9 fffffa80`05be11a0 fffff800`00000000 : netr28x+0x25ac28
THREAD_SHA1_HASH_MOD_FUNC: 80858fdf941bd645ff48b6997b30f63ac59926fb
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 394aafee51f76470053fa2102b9df0f0f7df42a3
THREAD_SHA1_HASH_MOD: 5d50876435db08b990ce5928fe5c90526c26b16c
FOLLOWUP_IP:
netr28x+4b98d
fffff880`04eef98d ?? ???
SYMBOL_STACK_INDEX: d
SYMBOL_NAME: netr28x+4b98d
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: netr28x
IMAGE_NAME: netr28x.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: X64_0xA_netr28x+4b98d
BUCKET_ID: X64_0xA_netr28x+4b98d
PRIMARY_PROBLEM_CLASS: X64_0xA_netr28x+4b98d
TARGET_TIME: 2019-04-27T17:46:01.000Z
OSBUILD: 7601
OSSERVICEPACK: 1000
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 7
OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2019-03-21 04:38:47
BUILDDATESTAMP_STR: 190320-1700
BUILDLAB_STR: win7sp1_ldr_escrow
BUILDOSVER_STR: 6.1.7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700
ANALYSIS_SESSION_ELAPSED_TIME: 720
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:x64_0xa_netr28x+4b98d
FAILURE_ID_HASH: {a6eb3f60-a5c3-0bd6-051c-41bf4427925d}
Followup: MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff8a000b0b260, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff800032d1738, address which referenced memory
Debugging Details:
------------------
GetUlongPtrFromAddress: unable to read from fffff8000329d300
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 1
Key : Analysis.Elapsed.Sec
Value: 1
Key : Analysis.Memory.CommitPeak.Mb
Value: 62
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700
SYSTEM_MANUFACTURER: Hewlett-Packard
SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC
SYSTEM_SKU: J4T62EA#AB8
SYSTEM_VERSION: 0991100000000000000600087
BIOS_VENDOR: Insyde
BIOS_VERSION: F.43
BIOS_DATE: 12/19/2017
BASEBOARD_MANUFACTURER: Hewlett-Packard
BASEBOARD_PRODUCT: 2211
BASEBOARD_VERSION: 86.56
DUMP_TYPE: 2
BUGCHECK_P1: fffff8a000b0b260
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff800032d1738
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff8000329d100
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff8000329d2f0
GetUlongPtrFromAddress: unable to read from fffff8000329d4a8
GetPointerFromAddress: unable to read from fffff8000329d0d8
fffff8a000b0b260 Paged pool
CURRENT_IRQL: 2
FAULTING_IP:
nt!HvpDoAllocateCell+13c
fffff800`032d1738 8907 mov dword ptr [rdi],eax
CPU_COUNT: 4
CPU_MHZ: 6a0
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 45
CPU_STEPPING: 1
CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init)
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: System
ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5
ANALYSIS_SESSION_TIME: 06-17-2019 21:16:23.0541
ANALYSIS_VERSION: 10.0.18869.1002 amd64fre
TRAP_FRAME: fffff80000b9b950 -- (.trap 0xfffff80000b9b950)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000ffffffd0 rbx=0000000000000000 rcx=000000000000000c
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800032d1738 rsp=fffff80000b9bae0 rbp=0000000000000030
r8=fffff8a0000512e0 r9=0000000000000005 r10=000000000000023b
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe cy
nt!HvpDoAllocateCell+0x13c:
fffff800`032d1738 8907 mov dword ptr [rdi],eax ds:00000000`00000000=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800030a1f69 to fffff80003093ba0
STACK_TEXT:
fffff800`00b9b808 fffff800`030a1f69 : 00000000`0000000a fffff8a0`00b0b260 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff800`00b9b810 fffff800`0309fd88 : 00000000`00000001 fffff8a0`00b0b260 00000000`00000000 fffff8a0`00024010 : nt!KiBugCheckDispatch+0x69
fffff800`00b9b950 fffff800`032d1738 : fffff8a0`00024010 fffff8a0`00024010 fffff8a0`000512e0 fffff800`00000000 : nt!KiPageFault+0x448
fffff800`00b9bae0 fffff800`03313d0d : fffff8a0`00024010 00000000`00000000 00000000`00000000 00000000`ffffffff : nt!HvpDoAllocateCell+0x13c
fffff800`00b9bb40 fffff800`03313b9d : 00000000`00000000 fffff8a0`00f38c30 00000000`00000008 fffff800`03301d5c : nt!HvAllocateCell+0x55
fffff800`00b9bb70 fffff800`032c64bf : fffff8a0`00024010 fffff8a0`00024010 fffff8a0`00f46640 fffff800`00b9be18 : nt!CmpAddValueKeyNew+0x69
fffff800`00b9bc40 fffff800`034ac6a3 : 01d4f07a`dd071b78 fffff800`00b9bff0 fffff8a0`04a444a8 00000000`00000000 : nt!CmpSetValueKeyNew+0x77
fffff800`00b9bc90 fffff800`032d1531 : fffff8a0`09c3f770 fffff800`00b9be18 fffffa80`00000004 fffff800`00b9c210 : nt!CmSetValueKey+0xba3
fffff800`00b9bdd0 fffff800`030a1bd3 : ffffffff`80000b54 00000000`00000002 fffffa80`00000000 fffff800`00000004 : nt!NtSetValueKey+0x349
fffff800`00b9bf00 fffff800`030973b0 : fffff800`033e8272 fffff800`00b9c248 fffff880`0151b152 fffffa80`074a45f0 : nt!KiSystemServiceCopyEnd+0x13
fffff800`00b9c108 fffff800`033e8272 : fffff800`00b9c248 fffff880`0151b152 fffffa80`074a45f0 fffff800`00b9c270 : nt!KiServiceLinkage
fffff800`00b9c110 fffff880`01522d96 : 00000000`00000004 fffffa80`05970b70 fffff800`03210800 00000000`000007ff : nt!RtlWriteRegistryValue+0x62
fffff800`00b9c170 fffff880`04eef98d : fffff800`00b9c270 fffff880`050fec28 00000000`00000000 00000000`00000000 : ndis!NdisWriteConfiguration+0x156
fffff800`00b9c1d0 fffff800`00b9c270 : fffff880`050fec28 00000000`00000000 00000000`00000000 fffffa80`001801a9 : netr28x+0x4b98d
fffff800`00b9c1d8 fffff880`050fec28 : 00000000`00000000 00000000`00000000 fffffa80`001801a9 fffffa80`05b741a0 : 0xfffff800`00b9c270
fffff800`00b9c1e0 00000000`00000000 : 00000000`00000000 fffffa80`001801a9 fffffa80`05b741a0 00000000`00000000 : netr28x+0x25ac28
THREAD_SHA1_HASH_MOD_FUNC: 80858fdf941bd645ff48b6997b30f63ac59926fb
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 60ef2d8b5c8aa9ab3d61fd3d0f87c6db127d6016
THREAD_SHA1_HASH_MOD: 5d50876435db08b990ce5928fe5c90526c26b16c
FOLLOWUP_IP:
netr28x+4b98d
fffff880`04eef98d ?? ???
SYMBOL_STACK_INDEX: d
SYMBOL_NAME: netr28x+4b98d
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: netr28x
IMAGE_NAME: netr28x.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: X64_0xA_netr28x+4b98d
BUCKET_ID: X64_0xA_netr28x+4b98d
PRIMARY_PROBLEM_CLASS: X64_0xA_netr28x+4b98d
TARGET_TIME: 2019-04-11T15:25:58.000Z
OSBUILD: 7601
OSSERVICEPACK: 1000
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 7
OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2019-03-06 05:38:53
BUILDDATESTAMP_STR: 190305-1700
BUILDLAB_STR: win7sp1_ldr_escrow
BUILDOSVER_STR: 6.1.7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700
ANALYSIS_SESSION_ELAPSED_TIME: 7b6
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:x64_0xa_netr28x+4b98d
FAILURE_ID_HASH: {a6eb3f60-a5c3-0bd6-051c-41bf4427925d}
Followup: MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff8a0067d0004, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff800032dccfe, address which referenced memory
Debugging Details:
------------------
GetUlongPtrFromAddress: unable to read from fffff800032a8300
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 1
Key : Analysis.Elapsed.Sec
Value: 1
Key : Analysis.Memory.CommitPeak.Mb
Value: 62
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700
SYSTEM_MANUFACTURER: Hewlett-Packard
SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC
SYSTEM_SKU: J4T62EA#AB8
SYSTEM_VERSION: 0991100000000000000600087
BIOS_VENDOR: Insyde
BIOS_VERSION: F.43
BIOS_DATE: 12/19/2017
BASEBOARD_MANUFACTURER: Hewlett-Packard
BASEBOARD_PRODUCT: 2211
BASEBOARD_VERSION: 86.56
DUMP_TYPE: 2
BUGCHECK_P1: fffff8a0067d0004
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff800032dccfe
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800032a8100
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff800032a82f0
GetUlongPtrFromAddress: unable to read from fffff800032a84a8
GetPointerFromAddress: unable to read from fffff800032a80d8
fffff8a0067d0004 Paged pool
CURRENT_IRQL: 2
FAULTING_IP:
nt!HvpScanForFreeCellInViewWindow+16a
fffff800`032dccfe 8b4804 mov ecx,dword ptr [rax+4]
CPU_COUNT: 4
CPU_MHZ: 6a0
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 45
CPU_STEPPING: 1
CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init)
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: System
ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5
ANALYSIS_SESSION_TIME: 06-17-2019 21:16:21.0060
ANALYSIS_VERSION: 10.0.18869.1002 amd64fre
TRAP_FRAME: fffff80004421860 -- (.trap 0xfffff80004421860)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8a0067d0000 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000683000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800032dccfe rsp=fffff800044219f0 rbp=0000000000000683
r8=0000000000000083 r9=0000000000000000 r10=fffff8000300b000
r11=0000000000000006 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!HvpScanForFreeCellInViewWindow+0x16a:
fffff800`032dccfe 8b4804 mov ecx,dword ptr [rax+4] ds:fffff8a0`067d0004=00683000
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800030acf69 to fffff8000309eba0
STACK_TEXT:
fffff800`04421718 fffff800`030acf69 : 00000000`0000000a fffff8a0`067d0004 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff800`04421720 fffff800`030aad88 : 00000000`00000000 fffff8a0`067d0004 fffff800`031ff100 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff800`04421860 fffff800`032dccfe : 00000000`00000000 00000000`003fe000 00000000`00001000 00000000`00000000 : nt!KiPageFault+0x448
fffff800`044219f0 fffff800`032dcb0a : fffff800`00683000 fffff800`00000011 00000000`00000030 fffff800`00000000 : nt!HvpScanForFreeCellInViewWindow+0x16a
fffff800`04421a70 fffff800`032dc66e : 00000000`00000030 fffff800`00000005 ffffffff`00000030 fffff800`00000000 : nt!HvpFindFreeCell+0x1ba
fffff800`04421ae0 fffff800`0331ed1d : fffff8a0`00024010 00000000`00000000 00000000`00000000 00000000`ffffffff : nt!HvpDoAllocateCell+0x72
fffff800`04421b40 fffff800`0331ebad : 00000000`00000000 fffff8a0`061e8c30 00000000`00000008 fffff800`0330cd5c : nt!HvAllocateCell+0x55
fffff800`04421b70 fffff800`032d14bf : fffff8a0`00024010 fffff8a0`00024010 fffff8a0`061f6640 fffff800`04421e18 : nt!CmpAddValueKeyNew+0x69
fffff800`04421c40 fffff800`034b76e3 : 01d4f848`5814f677 fffff800`04421ff0 fffff8a0`02c84b98 00000000`00000000 : nt!CmpSetValueKeyNew+0x77
fffff800`04421c90 fffff800`032dc531 : fffff8a0`04cbac70 fffff800`04421e18 fffffa80`00000004 fffff800`04422210 : nt!CmSetValueKey+0xba3
fffff800`04421dd0 fffff800`030acbd3 : ffffffff`80000de8 00000000`00000002 fffffa80`00000000 fffff800`00000004 : nt!NtSetValueKey+0x349
fffff800`04421f00 fffff800`030a23b0 : fffff800`033f32a2 fffff800`04422248 fffff880`01725152 fffffa80`00000000 : nt!KiSystemServiceCopyEnd+0x13
fffff800`04422108 fffff800`033f32a2 : fffff800`04422248 fffff880`01725152 fffffa80`00000000 fffff800`04422270 : nt!KiServiceLinkage
fffff800`04422110 fffff880`0172cd96 : 00000000`00000004 fffffa80`05d89cd0 fffff800`04422200 00000000`000007ff : nt!RtlWriteRegistryValue+0x62
fffff800`04422170 fffff880`0510f98d : fffff800`04422270 fffff880`0531ec28 00000000`00000000 00000000`00000000 : ndis!NdisWriteConfiguration+0x156
fffff800`044221d0 fffff800`04422270 : fffff880`0531ec28 00000000`00000000 00000000`00000000 fffff880`001801a9 : netr28x+0x4b98d
fffff800`044221d8 fffff880`0531ec28 : 00000000`00000000 00000000`00000000 fffff880`001801a9 fffffa80`05b701a0 : 0xfffff800`04422270
fffff800`044221e0 00000000`00000000 : 00000000`00000000 fffff880`001801a9 fffffa80`05b701a0 0000000e`00000000 : netr28x+0x25ac28
THREAD_SHA1_HASH_MOD_FUNC: a2c5409ed52347576830e095aabe2e20325151e5
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: cf883ff24fbd42e0f8dd5b2bf40fd2071e6cd531
THREAD_SHA1_HASH_MOD: 56bd18a7fabf3c16adac1e3911e9aab0524685a1
FOLLOWUP_IP:
netr28x+4b98d
fffff880`0510f98d ?? ???
SYMBOL_STACK_INDEX: f
SYMBOL_NAME: netr28x+4b98d
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: netr28x
IMAGE_NAME: netr28x.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: X64_0xA_netr28x+4b98d
BUCKET_ID: X64_0xA_netr28x+4b98d
PRIMARY_PROBLEM_CLASS: X64_0xA_netr28x+4b98d
TARGET_TIME: 2019-04-21T13:44:29.000Z
OSBUILD: 7601
OSSERVICEPACK: 1000
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 7
OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2019-03-21 04:38:47
BUILDDATESTAMP_STR: 190320-1700
BUILDLAB_STR: win7sp1_ldr_escrow
BUILDOSVER_STR: 6.1.7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700
ANALYSIS_SESSION_ELAPSED_TIME: 704
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:x64_0xa_netr28x+4b98d
FAILURE_ID_HASH: {a6eb3f60-a5c3-0bd6-051c-41bf4427925d}
Followup: MachineOwner
---------
0: kd> lmvm netr28x
start end module name
fffff880`050c4000 fffff880`0532e000 netr28x T (no symbols)
Loaded symbol image file: netr28x.sys
Image path: \SystemRoot\system32\DRIVERS\netr28x.sys
Image name: netr28x.sys
Timestamp: Mon Apr 20 03:22:50 2015 (5534D37A)
CheckSum: 0026BF4B
ImageSize: 0026A000
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4
Information from resource tables:
5Soruna netr28x.sys sebep oluyor. Bu da Ralink 802.11 WiFi sürücüsüdür. Sürücüyü güncelle. Güncellemeyi bilmiyorsan Windows 10'a geç. 7 için destek vermiyoruz.
Kod:IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: fffff8a000d9e618, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000001, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: fffff800033386fd, address which referenced memory Debugging Details: ------------------ GetUlongPtrFromAddress: unable to read from fffff80003304300 KEY_VALUES_STRING: 1 Key : Analysis.CPU.Sec Value: 1 Key : Analysis.Elapsed.Sec Value: 1 Key : Analysis.Memory.CommitPeak.Mb Value: 62 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700 SYSTEM_MANUFACTURER: Hewlett-Packard SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC SYSTEM_SKU: J4T62EA#AB8 SYSTEM_VERSION: 0991100000000000000600087 BIOS_VENDOR: Insyde BIOS_VERSION: F.43 BIOS_DATE: 12/19/2017 BASEBOARD_MANUFACTURER: Hewlett-Packard BASEBOARD_PRODUCT: 2211 BASEBOARD_VERSION: 86.56 DUMP_TYPE: 2 BUGCHECK_P1: fffff8a000d9e618 BUGCHECK_P2: 2 BUGCHECK_P3: 1 BUGCHECK_P4: fffff800033386fd WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80003304100 Unable to get MmSystemRangeStart GetUlongPtrFromAddress: unable to read from fffff800033042f0 GetUlongPtrFromAddress: unable to read from fffff800033044a8 GetPointerFromAddress: unable to read from fffff800033040d8 fffff8a000d9e618 Paged pool CURRENT_IRQL: 2 FAULTING_IP: nt!HvpDoAllocateCell+101 fffff800`033386fd 89443d00 mov dword ptr [rbp+rdi],eax CPU_COUNT: 4 CPU_MHZ: 6a0 CPU_VENDOR: GenuineIntel CPU_FAMILY: 6 CPU_MODEL: 45 CPU_STEPPING: 1 CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init) CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT BUGCHECK_STR: 0xA PROCESS_NAME: System ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5 ANALYSIS_SESSION_TIME: 06-17-2019 20:48:20.0473 ANALYSIS_VERSION: 10.0.18869.1002 amd64fre TRAP_FRAME: fffff80004423950 -- (.trap 0xfffff80004423950) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=00000000000039e8 rbx=0000000000000000 rcx=00000000000005e8 rdx=0000000000000008 rsi=0000000000000000 rdi=0000000000000000 rip=fffff800033386fd rsp=fffff80004423ae0 rbp=0000000000000030 r8=fffff8a000024010 r9=0000000000000005 r10=fffff8a000d9e000 r11=0000000000000000 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl nz na po nc nt!HvpDoAllocateCell+0x101: fffff800`033386fd 89443d00 mov dword ptr [rbp+rdi],eax ss:0018:00000000`00000030=???????? Resetting default scope LAST_CONTROL_TRANSFER: from fffff80003108f69 to fffff800030faba0 STACK_TEXT: fffff800`04423808 fffff800`03108f69 : 00000000`0000000a fffff8a0`00d9e618 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx fffff800`04423810 fffff800`03106d88 : 00000000`00000001 fffff8a0`00d9e618 00000000`00000000 fffff8a0`00024010 : nt!KiBugCheckDispatch+0x69 fffff800`04423950 fffff800`033386fd : fffff8a0`00024010 fffff8a0`00024010 fffff8a0`00053ae0 00000000`00000000 : nt!KiPageFault+0x448 fffff800`04423ae0 fffff800`0337ad0d : fffff8a0`00024010 00000000`00000000 00000000`00000000 00000000`ffffffff : nt!HvpDoAllocateCell+0x101 fffff800`04423b40 fffff800`0337ab9d : 00000000`00000000 fffff8a0`05585c30 00000000`00000008 fffff800`03368d5c : nt!HvAllocateCell+0x55 fffff800`04423b70 fffff800`0332d4bf : fffff8a0`00024010 fffff8a0`00024010 fffff8a0`05593640 fffff800`04423e18 : nt!CmpAddValueKeyNew+0x69 fffff800`04423c40 fffff800`035136a3 : 01d4f094`f66bc44b fffff800`04423ff0 fffff8a0`0085fa70 00000000`00000000 : nt!CmpSetValueKeyNew+0x77 fffff800`04423c90 fffff800`03338531 : fffff8a0`14bbfca0 fffff800`04423e18 fffffa80`00000004 fffff800`04424210 : nt!CmSetValueKey+0xba3 fffff800`04423dd0 fffff800`03108bd3 : ffffffff`80000bec 00000000`00000002 fffffa80`00000000 fffff800`00000004 : nt!NtSetValueKey+0x349 fffff800`04423f00 fffff800`030fe3b0 : fffff800`0344f272 fffff800`04424248 fffff880`014b9152 00000000`539f0000 : nt!KiSystemServiceCopyEnd+0x13 fffff800`04424108 fffff800`0344f272 : fffff800`04424248 fffff880`014b9152 00000000`539f0000 fffff800`04424270 : nt!KiServiceLinkage fffff800`04424110 fffff880`014c0d96 : 00000000`00000004 fffffa80`071c5250 00000000`00000000 00000000`000007ff : nt!RtlWriteRegistryValue+0x62 fffff800`04424170 fffff880`04f2698d : fffff800`04424270 fffff880`05135c28 00000000`00000000 00000000`00000000 : ndis!NdisWriteConfiguration+0x156 fffff800`044241d0 fffff800`04424270 : fffff880`05135c28 00000000`00000000 00000000`00000000 fffff800`001801a9 : netr28x+0x4b98d fffff800`044241d8 fffff880`05135c28 : 00000000`00000000 00000000`00000000 fffff800`001801a9 fffffa80`059cb1a0 : 0xfffff800`04424270 fffff800`044241e0 00000000`00000000 : 00000000`00000000 fffff800`001801a9 fffffa80`059cb1a0 fffff800`00000000 : netr28x+0x25ac28 THREAD_SHA1_HASH_MOD_FUNC: 80858fdf941bd645ff48b6997b30f63ac59926fb THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 394aafee51f76470053fa2102b9df0f0f7df42a3 THREAD_SHA1_HASH_MOD: 5d50876435db08b990ce5928fe5c90526c26b16c FOLLOWUP_IP: netr28x+4b98d fffff880`04f2698d ?? ??? SYMBOL_STACK_INDEX: d SYMBOL_NAME: netr28x+4b98d FOLLOWUP_NAME: MachineOwner MODULE_NAME: netr28x IMAGE_NAME: netr28x.sys DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a STACK_COMMAND: .thread ; .cxr ; kb FAILURE_BUCKET_ID: X64_0xA_netr28x+4b98d BUCKET_ID: X64_0xA_netr28x+4b98d PRIMARY_PROBLEM_CLASS: X64_0xA_netr28x+4b98d TARGET_TIME: 2019-04-11T18:32:48.000Z OSBUILD: 7601 OSSERVICEPACK: 1000 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 7 OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 2019-03-06 05:38:53 BUILDDATESTAMP_STR: 190305-1700 BUILDLAB_STR: win7sp1_ldr_escrow BUILDOSVER_STR: 6.1.7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700 ANALYSIS_SESSION_ELAPSED_TIME: 7ae ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:x64_0xa_netr28x+4b98d FAILURE_ID_HASH: {a6eb3f60-a5c3-0bd6-051c-41bf4427925d} Followup: MachineOwner --------- INVALID_PROCESS_ATTACH_ATTEMPT (5) Arguments: Arg1: fffffa80042b49b0 Arg2: fffffa80050a0160 Arg3: 0000000000000000 Arg4: 0000000000000001 Debugging Details: ------------------ GetUlongPtrFromAddress: unable to read from fffff800032a0300 KEY_VALUES_STRING: 1 Key : Analysis.CPU.Sec Value: 2 Key : Analysis.Elapsed.Sec Value: 2 Key : Analysis.Memory.CommitPeak.Mb Value: 62 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700 SYSTEM_MANUFACTURER: Hewlett-Packard SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC SYSTEM_SKU: J4T62EA#AB8 SYSTEM_VERSION: 0991100000000000000600087 BIOS_VENDOR: Insyde BIOS_VERSION: F.43 BIOS_DATE: 12/19/2017 BASEBOARD_MANUFACTURER: Hewlett-Packard BASEBOARD_PRODUCT: 2211 BASEBOARD_VERSION: 86.56 DUMP_TYPE: 2 BUGCHECK_P1: fffffa80042b49b0 BUGCHECK_P2: fffffa80050a0160 BUGCHECK_P3: 0 BUGCHECK_P4: 1 CPU_COUNT: 4 CPU_MHZ: 6a0 CPU_VENDOR: GenuineIntel CPU_FAMILY: 6 CPU_MODEL: 45 CPU_STEPPING: 1 CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init) CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT BUGCHECK_STR: 0x5 PROCESS_NAME: PointBlank.exe CURRENT_IRQL: 2 ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5 ANALYSIS_SESSION_TIME: 06-17-2019 20:57:04.0108 ANALYSIS_VERSION: 10.0.18869.1002 amd64fre DPC_STACK_BASE: FFFFF80004428FB0 LOCK_ADDRESS: fffff80003273240 -- (!locks fffff80003273240) Cannot get _ERESOURCE type Resource @ nt!PiEngineLock (0xfffff80003273240) Available 1 total locks PNP_TRIAGE_DATA: Lock address : 0xfffff80003273240 Thread Count : 0 Thread address: 0x0000000000000000 Thread wait : 0x0 LAST_CONTROL_TRANSFER: from fffff80003045602 to fffff80003096ba0 STACK_TEXT: fffff800`04427cc8 fffff800`03045602 : 00000000`00000005 fffffa80`042b49b0 fffffa80`050a0160 00000000`00000000 : nt!KeBugCheckEx fffff800`04427cd0 fffff800`032ee127 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeStackAttachProcess+0x52 fffff800`04427d50 fffff800`032ee4bf : 00000000`00000000 fffff8a0`00000000 fffff8a0`00001910 00000000`00000000 : nt!ObpDecrementHandleCount+0x177 fffff800`04427dd0 fffff800`032ee1e4 : 00000000`00000d08 fffffa80`050a0160 fffff8a0`00001910 00000000`00000d08 : nt!ObpCloseHandleTableEntry+0xaf fffff800`04427e60 fffff800`030a4bd3 : fffffa80`04b87b50 fffff800`04427f30 fffff800`03358230 fffff800`032e476a : nt!ObpCloseHandle+0x94 fffff800`04427eb0 fffff800`0309a3b0 : fffff800`03331da3 fffffa80`04ea4a10 fffff800`03358230 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 fffff800`04428048 fffff800`03331da3 : fffffa80`04ea4a10 fffff800`03358230 00000000`00000000 00000000`00000000 : nt!KiServiceLinkage fffff800`04428050 fffff800`0333baa8 : fffffa80`04ea4a10 00000000`00000001 fffffa80`04ea2740 00000000`00000000 : nt!PiGetDeviceRegistryProperty+0xab fffff800`044281b0 fffff800`03330ac0 : fffffa80`04ea4a10 fffffa80`04ea4a10 00000000`00000000 00000000`00000000 : nt!IoGetDeviceProperty+0xbc fffff800`04428290 fffff800`03341f81 : 00000000`ffff0000 fffffa80`0802b150 fffff880`01553110 fffffa80`05bb6220 : nt!IopOpenOrCreateDeviceRegistryKey+0x14c fffff800`04428450 fffff880`01598152 : 00000000`c0000001 fffff800`044285e0 00000000`00000000 00000000`000007ff : nt!IoOpenDeviceRegistryKey+0x11 fffff800`04428490 fffff880`01503b34 : fffff800`044285e0 fffff800`044285b8 fffffa80`05c461a0 fffff800`035e0000 : ndis!NdisOpenConfiguration+0xb2 fffff800`044284d0 fffff880`0508b94f : fffffa80`00000000 fffff800`044285e0 fffff880`0529ac28 00000000`00000000 : ndis!NdisOpenConfigurationEx+0xa4 fffff800`04428540 fffffa80`00000000 : fffff800`044285e0 fffff880`0529ac28 00000000`00000000 00000000`001801a9 : netr28x+0x4b94f fffff800`04428548 fffff800`044285e0 : fffff880`0529ac28 00000000`00000000 00000000`001801a9 fffffa80`05c461a0 : 0xfffffa80`00000000 fffff800`04428550 fffff880`0529ac28 : 00000000`00000000 00000000`001801a9 fffffa80`05c461a0 00000000`00000000 : 0xfffff800`044285e0 fffff800`04428558 00000000`00000000 : 00000000`001801a9 fffffa80`05c461a0 00000000`00000000 fffffa80`0742b540 : netr28x+0x25ac28 THREAD_SHA1_HASH_MOD_FUNC: 1764d353450a941fbc74295279ec02651c3d9814 THREAD_SHA1_HASH_MOD_FUNC_OFFSET: bdc70d393af014c177e84e60c668cc911acaf71f THREAD_SHA1_HASH_MOD: 9a9dca34541ae91666e3989df373f06b6e683623 FOLLOWUP_IP: netr28x+4b94f fffff880`0508b94f ?? ??? SYMBOL_STACK_INDEX: d SYMBOL_NAME: netr28x+4b94f FOLLOWUP_NAME: MachineOwner MODULE_NAME: netr28x IMAGE_NAME: netr28x.sys DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a STACK_COMMAND: .thread ; .cxr ; kb FAILURE_BUCKET_ID: X64_0x5_netr28x+4b94f BUCKET_ID: X64_0x5_netr28x+4b94f PRIMARY_PROBLEM_CLASS: X64_0x5_netr28x+4b94f TARGET_TIME: 2019-05-01T21:53:50.000Z OSBUILD: 7601 OSSERVICEPACK: 1000 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 7 OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 2019-03-21 04:38:47 BUILDDATESTAMP_STR: 190320-1700 BUILDLAB_STR: win7sp1_ldr_escrow BUILDOSVER_STR: 6.1.7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700 ANALYSIS_SESSION_ELAPSED_TIME: 8cb ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:x64_0x5_netr28x+4b94f FAILURE_ID_HASH: {43753b0b-e234-1a01-8468-7eed644d41ea} Followup: MachineOwner INVALID_PROCESS_ATTACH_ATTEMPT (5) Arguments: Arg1: fffffa80042ce9b0 Arg2: fffffa8005d11370 Arg3: 0000000000000000 Arg4: 0000000000000001 Debugging Details: ------------------ GetUlongPtrFromAddress: unable to read from fffff800032b3300 KEY_VALUES_STRING: 1 Key : Analysis.CPU.Sec Value: 2 Key : Analysis.Elapsed.Sec Value: 2 Key : Analysis.Memory.CommitPeak.Mb Value: 62 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700 SYSTEM_MANUFACTURER: Hewlett-Packard SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC SYSTEM_SKU: J4T62EA#AB8 SYSTEM_VERSION: 0991100000000000000600087 BIOS_VENDOR: Insyde BIOS_VERSION: F.43 BIOS_DATE: 12/19/2017 BASEBOARD_MANUFACTURER: Hewlett-Packard BASEBOARD_PRODUCT: 2211 BASEBOARD_VERSION: 86.56 DUMP_TYPE: 2 BUGCHECK_P1: fffffa80042ce9b0 BUGCHECK_P2: fffffa8005d11370 BUGCHECK_P3: 0 BUGCHECK_P4: 1 CPU_COUNT: 4 CPU_MHZ: 6a0 CPU_VENDOR: GenuineIntel CPU_FAMILY: 6 CPU_MODEL: 45 CPU_STEPPING: 1 CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init) CUSTOMER_CRASH_COUNT: 2 DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT BUGCHECK_STR: 0x5 PROCESS_NAME: audiodg.exe CURRENT_IRQL: 2 ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5 ANALYSIS_SESSION_TIME: 06-17-2019 20:49:02.0621 ANALYSIS_VERSION: 10.0.18869.1002 amd64fre DPC_STACK_BASE: FFFFF80000BA2FB0 LOCK_ADDRESS: fffff80003286240 -- (!locks fffff80003286240) Cannot get _ERESOURCE type Resource @ nt!PiEngineLock (0xfffff80003286240) Available 1 total locks PNP_TRIAGE_DATA: Lock address : 0xfffff80003286240 Thread Count : 0 Thread address: 0x0000000000000000 Thread wait : 0x0 LAST_CONTROL_TRANSFER: from fffff80003058602 to fffff800030a9ba0 STACK_TEXT: fffff800`00ba1cc8 fffff800`03058602 : 00000000`00000005 fffffa80`042ce9b0 fffffa80`05d11370 00000000`00000000 : nt!KeBugCheckEx fffff800`00ba1cd0 fffff800`03301127 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeStackAttachProcess+0x52 fffff800`00ba1d50 fffff800`033014bf : 00000000`00000000 fffff8a0`00000000 fffff8a0`00001910 00000000`00000000 : nt!ObpDecrementHandleCount+0x177 fffff800`00ba1dd0 fffff800`033011e4 : 00000000`00000e48 fffffa80`05d11370 fffff8a0`00001910 00000000`00000e48 : nt!ObpCloseHandleTableEntry+0xaf fffff800`00ba1e60 fffff800`030b7bd3 : fffffa80`05d7ba00 fffff800`00ba1f30 fffff800`0336b230 fffff800`032f776a : nt!ObpCloseHandle+0x94 fffff800`00ba1eb0 fffff800`030ad3b0 : fffff800`03344da3 fffffa80`04e9e060 fffff800`0336b230 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 fffff800`00ba2048 fffff800`03344da3 : fffffa80`04e9e060 fffff800`0336b230 00000000`00000000 00000000`00000000 : nt!KiServiceLinkage fffff800`00ba2050 fffff800`0334eaa8 : fffffa80`04e9e060 00000000`00000001 fffffa80`04e9d6e0 00000000`00000000 : nt!PiGetDeviceRegistryProperty+0xab fffff800`00ba21b0 fffff800`03343ac0 : fffffa80`04e9e060 fffffa80`04e9e060 00000000`00000000 00000000`00000000 : nt!IoGetDeviceProperty+0xbc fffff800`00ba2290 fffff800`03354f81 : 00000000`ffff0000 fffffa80`05086440 fffff880`01482110 fffffa80`05b713f0 : nt!IopOpenOrCreateDeviceRegistryKey+0x14c fffff800`00ba2450 fffff880`014c7152 : fffffa80`04a3fd50 fffff800`00ba25e0 fffffa80`05f48a78 00000000`000007ff : nt!IoOpenDeviceRegistryKey+0x11 fffff800`00ba2490 fffff880`01432b34 : fffff800`00ba25e0 fffff800`00ba25b8 fffffa80`05b6d1a0 fffff880`014dd21d : ndis!NdisOpenConfiguration+0xb2 fffff800`00ba24d0 fffff880`0512a94f : fffffa80`00000000 fffff800`00ba25e0 fffff880`05339c28 00000000`00000000 : ndis!NdisOpenConfigurationEx+0xa4 fffff800`00ba2540 fffffa80`00000000 : fffff800`00ba25e0 fffff880`05339c28 00000000`00000000 00000000`001801a9 : netr28x+0x4b94f fffff800`00ba2548 fffff800`00ba25e0 : fffff880`05339c28 00000000`00000000 00000000`001801a9 fffffa80`05b6d1a0 : 0xfffffa80`00000000 fffff800`00ba2550 fffff880`05339c28 : 00000000`00000000 00000000`001801a9 fffffa80`05b6d1a0 fffffa80`00000000 : 0xfffff800`00ba25e0 fffff800`00ba2558 00000000`00000000 : 00000000`001801a9 fffffa80`05b6d1a0 fffffa80`00000000 fffff880`05136e2e : netr28x+0x25ac28 THREAD_SHA1_HASH_MOD_FUNC: 1764d353450a941fbc74295279ec02651c3d9814 THREAD_SHA1_HASH_MOD_FUNC_OFFSET: bdc70d393af014c177e84e60c668cc911acaf71f THREAD_SHA1_HASH_MOD: 9a9dca34541ae91666e3989df373f06b6e683623 FOLLOWUP_IP: netr28x+4b94f fffff880`0512a94f ?? ??? SYMBOL_STACK_INDEX: d SYMBOL_NAME: netr28x+4b94f FOLLOWUP_NAME: MachineOwner MODULE_NAME: netr28x IMAGE_NAME: netr28x.sys DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a STACK_COMMAND: .thread ; .cxr ; kb FAILURE_BUCKET_ID: X64_0x5_netr28x+4b94f BUCKET_ID: X64_0x5_netr28x+4b94f PRIMARY_PROBLEM_CLASS: X64_0x5_netr28x+4b94f TARGET_TIME: 2019-04-27T20:53:09.000Z OSBUILD: 7601 OSSERVICEPACK: 1000 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 7 OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 2019-03-21 04:38:47 BUILDDATESTAMP_STR: 190320-1700 BUILDLAB_STR: win7sp1_ldr_escrow BUILDOSVER_STR: 6.1.7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700 ANALYSIS_SESSION_ELAPSED_TIME: 89c ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:x64_0x5_netr28x+4b94f FAILURE_ID_HASH: {43753b0b-e234-1a01-8468-7eed644d41ea} Followup: MachineOwner --------- INVALID_PROCESS_ATTACH_ATTEMPT (5) Arguments: Arg1: fffffa80042b49b0 Arg2: fffffa8004ee55f0 Arg3: 0000000000000000 Arg4: 0000000000000001 Debugging Details: ------------------ GetUlongPtrFromAddress: unable to read from fffff800032b0300 KEY_VALUES_STRING: 1 Key : Analysis.CPU.Sec Value: 2 Key : Analysis.Elapsed.Sec Value: 2 Key : Analysis.Memory.CommitPeak.Mb Value: 62 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700 SYSTEM_MANUFACTURER: Hewlett-Packard SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC SYSTEM_SKU: J4T62EA#AB8 SYSTEM_VERSION: 0991100000000000000600087 BIOS_VENDOR: Insyde BIOS_VERSION: F.43 BIOS_DATE: 12/19/2017 BASEBOARD_MANUFACTURER: Hewlett-Packard BASEBOARD_PRODUCT: 2211 BASEBOARD_VERSION: 86.56 DUMP_TYPE: 2 BUGCHECK_P1: fffffa80042b49b0 BUGCHECK_P2: fffffa8004ee55f0 BUGCHECK_P3: 0 BUGCHECK_P4: 1 CPU_COUNT: 4 CPU_MHZ: 6a0 CPU_VENDOR: GenuineIntel CPU_FAMILY: 6 CPU_MODEL: 45 CPU_STEPPING: 1 CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init) CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT BUGCHECK_STR: 0x5 PROCESS_NAME: PointBlank.exe CURRENT_IRQL: 2 ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5 ANALYSIS_SESSION_TIME: 06-17-2019 20:48:58.0829 ANALYSIS_VERSION: 10.0.18869.1002 amd64fre DPC_STACK_BASE: FFFFF8000441FFB0 LOCK_ADDRESS: fffff80003283240 -- (!locks fffff80003283240) Cannot get _ERESOURCE type Resource @ nt!PiEngineLock (0xfffff80003283240) Available 1 total locks PNP_TRIAGE_DATA: Lock address : 0xfffff80003283240 Thread Count : 0 Thread address: 0x0000000000000000 Thread wait : 0x0 LAST_CONTROL_TRANSFER: from fffff80003055602 to fffff800030a6ba0 STACK_TEXT: fffff800`0441ecc8 fffff800`03055602 : 00000000`00000005 fffffa80`042b49b0 fffffa80`04ee55f0 00000000`00000000 : nt!KeBugCheckEx fffff800`0441ecd0 fffff800`032fe127 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeStackAttachProcess+0x52 fffff800`0441ed50 fffff800`032fe4bf : 00000000`00000000 fffff8a0`00000000 fffff8a0`00001910 00000000`00000000 : nt!ObpDecrementHandleCount+0x177 fffff800`0441edd0 fffff800`032fe1e4 : 00000000`00000a80 fffffa80`04ee55f0 fffff8a0`00001910 00000000`00000a80 : nt!ObpCloseHandleTableEntry+0xaf fffff800`0441ee60 fffff800`030b4bd3 : fffffa80`0861e940 fffff800`0441ef30 fffff800`03368230 fffff800`032f476a : nt!ObpCloseHandle+0x94 fffff800`0441eeb0 fffff800`030aa3b0 : fffff800`03341da3 fffffa80`04d31a10 fffff800`03368230 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 fffff800`0441f048 fffff800`03341da3 : fffffa80`04d31a10 fffff800`03368230 00000000`00000000 00000000`00000000 : nt!KiServiceLinkage fffff800`0441f050 fffff800`0334baa8 : fffffa80`04d31a10 00000000`00000001 fffffa80`04d2d740 00000000`00000000 : nt!PiGetDeviceRegistryProperty+0xab fffff800`0441f1b0 fffff800`03340ac0 : fffffa80`04d31a10 fffffa80`04d31a10 00000000`00000000 00000000`00000000 : nt!IoGetDeviceProperty+0xbc fffff800`0441f290 fffff800`03351f81 : 00000000`ffff0000 fffffa80`046a8bd0 fffff880`014c6110 fffffa80`05a70cf0 : nt!IopOpenOrCreateDeviceRegistryKey+0x14c fffff800`0441f450 fffff880`0150b152 : fffffa80`07393890 fffff800`0441f5e0 00000000`0000001f 00000000`000007ff : nt!IoOpenDeviceRegistryKey+0x11 fffff800`0441f490 fffff880`01476b34 : fffff800`0441f5e0 fffff800`0441f5b8 fffffa80`05a6f1a0 fffff800`035f7be3 : ndis!NdisOpenConfiguration+0xb2 fffff800`0441f4d0 fffff880`04e7694f : fffffa80`00000000 fffff800`0441f5e0 fffff880`05085c28 00000000`00000000 : ndis!NdisOpenConfigurationEx+0xa4 fffff800`0441f540 fffffa80`00000000 : fffff800`0441f5e0 fffff880`05085c28 00000000`00000000 00000000`001801a9 : netr28x+0x4b94f fffff800`0441f548 fffff800`0441f5e0 : fffff880`05085c28 00000000`00000000 00000000`001801a9 fffffa80`05a6f1a0 : 0xfffffa80`00000000 fffff800`0441f550 fffff880`05085c28 : 00000000`00000000 00000000`001801a9 fffffa80`05a6f1a0 00000000`00000000 : 0xfffff800`0441f5e0 fffff800`0441f558 00000000`00000000 : 00000000`001801a9 fffffa80`05a6f1a0 00000000`00000000 fffffa80`0452e670 : netr28x+0x25ac28 THREAD_SHA1_HASH_MOD_FUNC: 1764d353450a941fbc74295279ec02651c3d9814 THREAD_SHA1_HASH_MOD_FUNC_OFFSET: bdc70d393af014c177e84e60c668cc911acaf71f THREAD_SHA1_HASH_MOD: 9a9dca34541ae91666e3989df373f06b6e683623 FOLLOWUP_IP: netr28x+4b94f fffff880`04e7694f ?? ??? SYMBOL_STACK_INDEX: d SYMBOL_NAME: netr28x+4b94f FOLLOWUP_NAME: MachineOwner MODULE_NAME: netr28x IMAGE_NAME: netr28x.sys DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a STACK_COMMAND: .thread ; .cxr ; kb FAILURE_BUCKET_ID: X64_0x5_netr28x+4b94f BUCKET_ID: X64_0x5_netr28x+4b94f PRIMARY_PROBLEM_CLASS: X64_0x5_netr28x+4b94f TARGET_TIME: 2019-04-21T09:57:22.000Z OSBUILD: 7601 OSSERVICEPACK: 1000 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 7 OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 2019-03-21 04:38:47 BUILDDATESTAMP_STR: 190320-1700 BUILDLAB_STR: win7sp1_ldr_escrow BUILDOSVER_STR: 6.1.7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700 ANALYSIS_SESSION_ELAPSED_TIME: 8dc ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:x64_0x5_netr28x+4b94f FAILURE_ID_HASH: {43753b0b-e234-1a01-8468-7eed644d41ea} Followup: MachineOwner --------- IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: fffff8a000f95c5c, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000000, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: fffff8000334077c, address which referenced memory Debugging Details: ------------------ GetUlongPtrFromAddress: unable to read from fffff800032f7300 KEY_VALUES_STRING: 1 Key : Analysis.CPU.Sec Value: 1 Key : Analysis.Elapsed.Sec Value: 2 Key : Analysis.Memory.CommitPeak.Mb Value: 62 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700 SYSTEM_MANUFACTURER: Hewlett-Packard SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC SYSTEM_SKU: J4T62EA#AB8 SYSTEM_VERSION: 0991100000000000000600087 BIOS_VENDOR: Insyde BIOS_VERSION: F.43 BIOS_DATE: 12/19/2017 BASEBOARD_MANUFACTURER: Hewlett-Packard BASEBOARD_PRODUCT: 2211 BASEBOARD_VERSION: 86.56 DUMP_TYPE: 2 BUGCHECK_P1: fffff8a000f95c5c BUGCHECK_P2: 2 BUGCHECK_P3: 0 BUGCHECK_P4: fffff8000334077c READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800032f7100 Unable to get MmSystemRangeStart GetUlongPtrFromAddress: unable to read from fffff800032f72f0 GetUlongPtrFromAddress: unable to read from fffff800032f74a8 GetPointerFromAddress: unable to read from fffff800032f70d8 fffff8a000f95c5c Paged pool CURRENT_IRQL: 2 FAULTING_IP: nt!CmpFindValueByNameFromCache+12c fffff800`0334077c 41f6401001 test byte ptr [r8+10h],1 CPU_COUNT: 4 CPU_MHZ: 6a0 CPU_VENDOR: GenuineIntel CPU_FAMILY: 6 CPU_MODEL: 45 CPU_STEPPING: 1 CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init) CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT BUGCHECK_STR: 0xA PROCESS_NAME: System ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5 ANALYSIS_SESSION_TIME: 06-17-2019 20:48:55.0594 ANALYSIS_VERSION: 10.0.18869.1002 amd64fre DPC_STACK_BASE: FFFFF80000BA2FB0 TRAP_FRAME: fffff80000ba1d00 -- (.trap 0xfffff80000ba1d00) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000c64c48 rbx=0000000000000000 rcx=fffff80000ba1fa1 rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000 rip=fffff8000334077c rsp=fffff80000ba1e90 rbp=fffff80000ba2360 r8=fffff8a000f95c4c r9=000000000000ffff r10=fffffa8005aaacfc r11=fffff8a0018b9b46 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl zr na po nc nt!CmpFindValueByNameFromCache+0x12c: fffff800`0334077c 41f6401001 test byte ptr [r8+10h],1 ds:fffff8a0`00f95c5c=01 Resetting default scope LAST_CONTROL_TRANSFER: from fffff800030fbf69 to fffff800030edba0 STACK_TEXT: fffff800`00ba1bb8 fffff800`030fbf69 : 00000000`0000000a fffff8a0`00f95c5c 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx fffff800`00ba1bc0 fffff800`030f9d88 : 00000000`00000000 fffff8a0`00f95c5c fffffa80`05191000 fffff8a0`00024010 : nt!KiBugCheckDispatch+0x69 fffff800`00ba1d00 fffff800`0334077c : fffff8a0`00024010 fffff8a0`00024010 fffff8a0`00048c80 00000000`00000000 : nt!KiPageFault+0x448 fffff800`00ba1e90 fffff800`03323c38 : fffff8a0`15bf1de8 fffff800`00ba2188 fffff800`00ba1fd0 fffff800`00ba1fb8 : nt!CmpFindValueByNameFromCache+0x12c fffff800`00ba1f60 fffff800`035061e7 : fffff8a0`15bf1de8 01d4f7b8`449491c9 fffff8a0`15bf1de8 00000000`00000000 : nt!CmpCompareNewValueDataAgainstKCBCache+0x78 fffff800`00ba2000 fffff800`0332b531 : fffff8a0`1f297040 fffff800`00ba2188 fffffa80`00000004 fffff800`00ba2580 : nt!CmSetValueKey+0x6a7 fffff800`00ba2140 fffff800`030fbbd3 : ffffffff`80000cc8 00000000`00000002 fffffa80`00000000 fffff800`00000004 : nt!NtSetValueKey+0x349 fffff800`00ba2270 fffff800`030f13b0 : fffff800`034422a2 fffff800`00ba25b8 fffff880`01514152 00000000`c0000001 : nt!KiSystemServiceCopyEnd+0x13 fffff800`00ba2478 fffff800`034422a2 : fffff800`00ba25b8 fffff880`01514152 00000000`c0000001 fffff800`00ba25e0 : nt!KiServiceLinkage fffff800`00ba2480 fffff880`0151bd96 : 00000000`00000004 fffffa80`05aaacf0 00000100`00000000 00000000`000007ff : nt!RtlWriteRegistryValue+0x62 fffff800`00ba24e0 fffff880`0514a98d : fffff800`00ba25e0 fffff880`05359c28 00000000`00000000 00000000`00000000 : ndis!NdisWriteConfiguration+0x156 fffff800`00ba2540 fffff800`00ba25e0 : fffff880`05359c28 00000000`00000000 00000000`00000000 fffffa80`001801a9 : netr28x+0x4b98d fffff800`00ba2548 fffff880`05359c28 : 00000000`00000000 00000000`00000000 fffffa80`001801a9 fffffa80`05b411a0 : 0xfffff800`00ba25e0 fffff800`00ba2550 00000000`00000000 : 00000000`00000000 fffffa80`001801a9 fffffa80`05b411a0 00000000`00000000 : netr28x+0x25ac28 THREAD_SHA1_HASH_MOD_FUNC: 935105e89958188e75032d802c31088ef212f1d5 THREAD_SHA1_HASH_MOD_FUNC_OFFSET: d6275099b99a3ef75c037e31f081aba5025e8f89 THREAD_SHA1_HASH_MOD: 7921e317582c7f98a7f13cfbcd3c02a86fdcafec FOLLOWUP_IP: netr28x+4b98d fffff880`0514a98d ?? ??? SYMBOL_STACK_INDEX: b SYMBOL_NAME: netr28x+4b98d FOLLOWUP_NAME: MachineOwner MODULE_NAME: netr28x IMAGE_NAME: netr28x.sys DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a STACK_COMMAND: .thread ; .cxr ; kb FAILURE_BUCKET_ID: X64_0xA_netr28x+4b98d BUCKET_ID: X64_0xA_netr28x+4b98d PRIMARY_PROBLEM_CLASS: X64_0xA_netr28x+4b98d TARGET_TIME: 2019-04-20T20:33:09.000Z OSBUILD: 7601 OSSERVICEPACK: 1000 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 7 OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 2019-03-21 04:38:47 BUILDDATESTAMP_STR: 190320-1700 BUILDLAB_STR: win7sp1_ldr_escrow BUILDOSVER_STR: 6.1.7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700 ANALYSIS_SESSION_ELAPSED_TIME: 7e6 ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:x64_0xa_netr28x+4b98d FAILURE_ID_HASH: {a6eb3f60-a5c3-0bd6-051c-41bf4427925d} Followup: MachineOwner --------- INVALID_PROCESS_ATTACH_ATTEMPT (5) Arguments: Arg1: fffffa80042d09b0 Arg2: fffffa80075e8060 Arg3: 0000000000000000 Arg4: 0000000000000001 Debugging Details: ------------------ GetUlongPtrFromAddress: unable to read from fffff800032af300 KEY_VALUES_STRING: 1 Key : Analysis.CPU.Sec Value: 2 Key : Analysis.Elapsed.Sec Value: 2 Key : Analysis.Memory.CommitPeak.Mb Value: 62 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700 SYSTEM_MANUFACTURER: Hewlett-Packard SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC SYSTEM_SKU: J4T62EA#AB8 SYSTEM_VERSION: 0991100000000000000600087 BIOS_VENDOR: Insyde BIOS_VERSION: F.43 BIOS_DATE: 12/19/2017 BASEBOARD_MANUFACTURER: Hewlett-Packard BASEBOARD_PRODUCT: 2211 BASEBOARD_VERSION: 86.56 DUMP_TYPE: 2 BUGCHECK_P1: fffffa80042d09b0 BUGCHECK_P2: fffffa80075e8060 BUGCHECK_P3: 0 BUGCHECK_P4: 1 CPU_COUNT: 4 CPU_MHZ: 6a0 CPU_VENDOR: GenuineIntel CPU_FAMILY: 6 CPU_MODEL: 45 CPU_STEPPING: 1 CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init) CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT BUGCHECK_STR: 0x5 PROCESS_NAME: audiodg.exe CURRENT_IRQL: 2 ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5 ANALYSIS_SESSION_TIME: 06-17-2019 20:48:52.0836 ANALYSIS_VERSION: 10.0.18869.1002 amd64fre DPC_STACK_BASE: FFFFF8000441FFB0 LOCK_ADDRESS: fffff80003282240 -- (!locks fffff80003282240) Cannot get _ERESOURCE type Resource @ nt!PiEngineLock (0xfffff80003282240) Available 1 total locks PNP_TRIAGE_DATA: Lock address : 0xfffff80003282240 Thread Count : 0 Thread address: 0x0000000000000000 Thread wait : 0x0 LAST_CONTROL_TRANSFER: from fffff800030545f2 to fffff800030a5ba0 STACK_TEXT: fffff800`0441ecc8 fffff800`030545f2 : 00000000`00000005 fffffa80`042d09b0 fffffa80`075e8060 00000000`00000000 : nt!KeBugCheckEx fffff800`0441ecd0 fffff800`032fd127 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeStackAttachProcess+0x52 fffff800`0441ed50 fffff800`032fd4bf : 00000000`00000000 fffff8a0`00000000 fffff8a0`00001910 00000000`00000000 : nt!ObpDecrementHandleCount+0x177 fffff800`0441edd0 fffff800`032fd1e4 : 00000000`000007c8 fffffa80`075e8060 fffff8a0`00001910 00000000`000007c8 : nt!ObpCloseHandleTableEntry+0xaf fffff800`0441ee60 fffff800`030b3bd3 : fffffa80`044dab50 fffff800`0441ef30 fffff800`03367200 fffff800`032f376a : nt!ObpCloseHandle+0x94 fffff800`0441eeb0 fffff800`030a93b0 : fffff800`03340d73 fffffa80`04ddc060 fffff800`03367200 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 fffff800`0441f048 fffff800`03340d73 : fffffa80`04ddc060 fffff800`03367200 00000000`00000000 00000000`00000000 : nt!KiServiceLinkage fffff800`0441f050 fffff800`0334aa78 : fffffa80`04ddc060 00000000`00000001 fffffa80`04dd96e0 00000000`00000000 : nt!PiGetDeviceRegistryProperty+0xab fffff800`0441f1b0 fffff800`0333fa90 : fffffa80`04ddc060 fffffa80`04ddc060 00000000`00000000 00000000`00000000 : nt!IoGetDeviceProperty+0xbc fffff800`0441f290 fffff800`03350f51 : 00000000`ffff0000 fffffa80`05a69770 fffff880`014e7110 fffffa80`05ca3270 : nt!IopOpenOrCreateDeviceRegistryKey+0x14c fffff800`0441f450 fffff880`0152c152 : fffffa80`071bfdc0 fffff800`0441f5e0 00000000`0000001f 00000000`000007ff : nt!IoOpenDeviceRegistryKey+0x11 fffff800`0441f490 fffff880`01497b34 : fffff800`0441f5e0 fffff800`0441f5b8 fffffa80`05c0a1a0 fffff880`0646eab0 : ndis!NdisOpenConfiguration+0xb2 fffff800`0441f4d0 fffff880`04f0c94f : fffffa80`00000000 fffff800`0441f5e0 fffff880`0511bc28 00000000`00000000 : ndis!NdisOpenConfigurationEx+0xa4 fffff800`0441f540 fffffa80`00000000 : fffff800`0441f5e0 fffff880`0511bc28 00000000`00000000 fffffa80`001801a9 : netr28x+0x4b94f fffff800`0441f548 fffff800`0441f5e0 : fffff880`0511bc28 00000000`00000000 fffffa80`001801a9 fffffa80`05c0a1a0 : 0xfffffa80`00000000 fffff800`0441f550 fffff880`0511bc28 : 00000000`00000000 fffffa80`001801a9 fffffa80`05c0a1a0 00000000`00000000 : 0xfffff800`0441f5e0 fffff800`0441f558 00000000`00000000 : fffffa80`001801a9 fffffa80`05c0a1a0 00000000`00000000 fffff880`00e5028c : netr28x+0x25ac28 THREAD_SHA1_HASH_MOD_FUNC: 1764d353450a941fbc74295279ec02651c3d9814 THREAD_SHA1_HASH_MOD_FUNC_OFFSET: bdc70d393af014c177e84e60c668cc911acaf71f THREAD_SHA1_HASH_MOD: 9a9dca34541ae91666e3989df373f06b6e683623 FOLLOWUP_IP: netr28x+4b94f fffff880`04f0c94f ?? ??? SYMBOL_STACK_INDEX: d SYMBOL_NAME: netr28x+4b94f FOLLOWUP_NAME: MachineOwner MODULE_NAME: netr28x IMAGE_NAME: netr28x.sys DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a STACK_COMMAND: .thread ; .cxr ; kb FAILURE_BUCKET_ID: X64_0x5_netr28x+4b94f BUCKET_ID: X64_0x5_netr28x+4b94f PRIMARY_PROBLEM_CLASS: X64_0x5_netr28x+4b94f TARGET_TIME: 2019-04-11T15:07:27.000Z OSBUILD: 7601 OSSERVICEPACK: 1000 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 7 OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 2019-03-06 05:38:53 BUILDDATESTAMP_STR: 190305-1700 BUILDLAB_STR: win7sp1_ldr_escrow BUILDOSVER_STR: 6.1.7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700 ANALYSIS_SESSION_ELAPSED_TIME: 8c6 ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:x64_0x5_netr28x+4b94f FAILURE_ID_HASH: {43753b0b-e234-1a01-8468-7eed644d41ea} Followup: MachineOwner INVALID_PROCESS_ATTACH_ATTEMPT (5) Arguments: Arg1: fffffa80042b59b0 Arg2: fffffa8004c74b00 Arg3: 0000000000000001 Arg4: 0000000000000001 Debugging Details: ------------------ GetUlongPtrFromAddress: unable to read from fffff800030f3300 KEY_VALUES_STRING: 1 Key : Analysis.CPU.Sec Value: 2 Key : Analysis.Elapsed.Sec Value: 2 Key : Analysis.Memory.CommitPeak.Mb Value: 62 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700 SYSTEM_MANUFACTURER: Hewlett-Packard SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC SYSTEM_SKU: J4T62EA#AB8 SYSTEM_VERSION: 0991100000000000000600087 BIOS_VENDOR: Insyde BIOS_VERSION: F.43 BIOS_DATE: 12/19/2017 BASEBOARD_MANUFACTURER: Hewlett-Packard BASEBOARD_PRODUCT: 2211 BASEBOARD_VERSION: 86.56 DUMP_TYPE: 2 BUGCHECK_P1: fffffa80042b59b0 BUGCHECK_P2: fffffa8004c74b00 BUGCHECK_P3: 1 BUGCHECK_P4: 1 CPU_COUNT: 4 CPU_MHZ: 6a0 CPU_VENDOR: GenuineIntel CPU_FAMILY: 6 CPU_MODEL: 45 CPU_STEPPING: 1 CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init) CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT BUGCHECK_STR: 0x5 PROCESS_NAME: chrome.exe CURRENT_IRQL: 2 ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5 ANALYSIS_SESSION_TIME: 06-17-2019 20:48:49.0152 ANALYSIS_VERSION: 10.0.18869.1002 amd64fre DPC_STACK_BASE: FFFFF80000BA2FB0 LOCK_ADDRESS: fffff800030c6240 -- (!locks fffff800030c6240) Cannot get _ERESOURCE type Resource @ nt!PiEngineLock (0xfffff800030c6240) Available 1 total locks PNP_TRIAGE_DATA: Lock address : 0xfffff800030c6240 Thread Count : 0 Thread address: 0x0000000000000000 Thread wait : 0x0 LAST_CONTROL_TRANSFER: from fffff80002e985f2 to fffff80002ee9ba0 STACK_TEXT: fffff800`00ba1cc8 fffff800`02e985f2 : 00000000`00000005 fffffa80`042b59b0 fffffa80`04c74b00 00000000`00000001 : nt!KeBugCheckEx fffff800`00ba1cd0 fffff800`03141127 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeStackAttachProcess+0x52 fffff800`00ba1d50 fffff800`031414bf : 00000000`00000000 fffff8a0`00000000 fffff8a0`00001910 00000000`00000000 : nt!ObpDecrementHandleCount+0x177 fffff800`00ba1dd0 fffff800`031411e4 : 00000000`000008e4 fffffa80`04c74b00 fffff8a0`00001910 00000000`000008e4 : nt!ObpCloseHandleTableEntry+0xaf fffff800`00ba1e60 fffff800`02ef7bd3 : fffffa80`076a6b50 fffff800`00ba1f30 fffff800`031ab200 fffff800`0313776a : nt!ObpCloseHandle+0x94 fffff800`00ba1eb0 fffff800`02eed3b0 : fffff800`03184d73 fffffa80`04e1e060 fffff800`031ab200 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 fffff800`00ba2048 fffff800`03184d73 : fffffa80`04e1e060 fffff800`031ab200 00000000`00000000 00000000`00000000 : nt!KiServiceLinkage fffff800`00ba2050 fffff800`0318ea78 : fffffa80`04e1e060 00000000`00000001 fffffa80`04e1d6e0 00000000`00000000 : nt!PiGetDeviceRegistryProperty+0xab fffff800`00ba21b0 fffff800`03183a90 : fffffa80`04e1e060 fffffa80`04e1e060 00000000`00000000 00000000`00000000 : nt!IoGetDeviceProperty+0xbc fffff800`00ba2290 fffff800`03194f51 : 00000000`ffff0000 fffffa80`07df09f0 fffff880`01480110 fffffa80`05cfe910 : nt!IopOpenOrCreateDeviceRegistryKey+0x14c fffff800`00ba2450 fffff880`014c5152 : fffffa80`080038e0 fffff800`00ba25e0 fffffa80`0700aa78 00000000`000007ff : nt!IoOpenDeviceRegistryKey+0x11 fffff800`00ba2490 fffff880`01430b34 : fffff800`00ba25e0 fffff800`00ba25b8 fffffa80`055e31a0 fffff880`014db21d : ndis!NdisOpenConfiguration+0xb2 fffff800`00ba24d0 fffff880`04e5194f : 00000000`00000000 fffff800`00ba25e0 fffff880`05060c28 00000000`00000000 : ndis!NdisOpenConfigurationEx+0xa4 fffff800`00ba2540 00000000`00000000 : fffff800`00ba25e0 fffff880`05060c28 00000000`00000000 fffffa80`001801a9 : netr28x+0x4b94f THREAD_SHA1_HASH_MOD_FUNC: ae5746727567d6f3e980a5bab83b7524a5dc9ee8 THREAD_SHA1_HASH_MOD_FUNC_OFFSET: a4491f04e0c588cecd320ea5c66c026862f569ea THREAD_SHA1_HASH_MOD: 34d7ba38146ecb972065c22fa7203d72f73eccb4 FOLLOWUP_IP: netr28x+4b94f fffff880`04e5194f ?? ??? SYMBOL_STACK_INDEX: d SYMBOL_NAME: netr28x+4b94f FOLLOWUP_NAME: MachineOwner MODULE_NAME: netr28x IMAGE_NAME: netr28x.sys DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a STACK_COMMAND: .thread ; .cxr ; kb FAILURE_BUCKET_ID: X64_0x5_netr28x+4b94f BUCKET_ID: X64_0x5_netr28x+4b94f PRIMARY_PROBLEM_CLASS: X64_0x5_netr28x+4b94f TARGET_TIME: 2019-04-11T14:09:37.000Z OSBUILD: 7601 OSSERVICEPACK: 1000 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 7 OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 2019-03-06 05:38:53 BUILDDATESTAMP_STR: 190305-1700 BUILDLAB_STR: win7sp1_ldr_escrow BUILDOSVER_STR: 6.1.7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700 ANALYSIS_SESSION_ELAPSED_TIME: 941 ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:x64_0x5_netr28x+4b94f FAILURE_ID_HASH: {43753b0b-e234-1a01-8468-7eed644d41ea} Followup: MachineOwner --------- IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: fffff8a002085398, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000001, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: fffff80003ae56fd, address which referenced memory Debugging Details: ------------------ GetUlongPtrFromAddress: unable to read from fffff80003ab1300 KEY_VALUES_STRING: 1 Key : Analysis.CPU.Sec Value: 1 Key : Analysis.Elapsed.Sec Value: 1 Key : Analysis.Memory.CommitPeak.Mb Value: 62 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700 SYSTEM_MANUFACTURER: Hewlett-Packard SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC SYSTEM_SKU: J4T62EA#AB8 SYSTEM_VERSION: 0991100000000000000600087 BIOS_VENDOR: Insyde BIOS_VERSION: F.43 BIOS_DATE: 12/19/2017 BASEBOARD_MANUFACTURER: Hewlett-Packard BASEBOARD_PRODUCT: 2211 BASEBOARD_VERSION: 86.56 DUMP_TYPE: 2 BUGCHECK_P1: fffff8a002085398 BUGCHECK_P2: 2 BUGCHECK_P3: 1 BUGCHECK_P4: fffff80003ae56fd WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80003ab1100 Unable to get MmSystemRangeStart GetUlongPtrFromAddress: unable to read from fffff80003ab12f0 GetUlongPtrFromAddress: unable to read from fffff80003ab14a8 GetPointerFromAddress: unable to read from fffff80003ab10d8 fffff8a002085398 Paged pool CURRENT_IRQL: 2 FAULTING_IP: nt!HvpDoAllocateCell+101 fffff800`03ae56fd 89443d00 mov dword ptr [rbp+rdi],eax CPU_COUNT: 4 CPU_MHZ: 6a0 CPU_VENDOR: GenuineIntel CPU_FAMILY: 6 CPU_MODEL: 45 CPU_STEPPING: 1 CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init) CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT BUGCHECK_STR: 0xA PROCESS_NAME: System ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5 ANALYSIS_SESSION_TIME: 06-17-2019 20:48:46.0248 ANALYSIS_VERSION: 10.0.18869.1002 amd64fre TRAP_FRAME: fffff80004c1a950 -- (.trap 0xfffff80004c1a950) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000008 rbx=0000000000000000 rcx=0000000000000368 rdx=0000000000000002 rsi=0000000000000000 rdi=0000000000000000 rip=fffff80003ae56fd rsp=fffff80004c1aae0 rbp=0000000000000030 r8=fffff8a000024010 r9=0000000000000005 r10=fffff8a002085000 r11=0000000000000000 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl nz na pe nc nt!HvpDoAllocateCell+0x101: fffff800`03ae56fd 89443d00 mov dword ptr [rbp+rdi],eax ss:0018:00000000`00000030=???????? Resetting default scope LAST_CONTROL_TRANSFER: from fffff800038b5f69 to fffff800038a7ba0 STACK_TEXT: fffff800`04c1a808 fffff800`038b5f69 : 00000000`0000000a fffff8a0`02085398 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx fffff800`04c1a810 fffff800`038b3d88 : 00000000`00000001 fffff8a0`02085398 00000000`00000000 fffff8a0`00024010 : nt!KiBugCheckDispatch+0x69 fffff800`04c1a950 fffff800`03ae56fd : fffff8a0`00024010 fffff8a0`00024010 fffff8a0`0003b420 fffff800`00000000 : nt!KiPageFault+0x448 fffff800`04c1aae0 fffff800`03b27d1d : fffff8a0`00024010 00000000`00000000 00000000`00000000 00000000`ffffffff : nt!HvpDoAllocateCell+0x101 fffff800`04c1ab40 fffff800`03b27bad : 00000000`00000000 fffff8a0`018bcc30 00000000`00000008 fffff800`03b15d5c : nt!HvAllocateCell+0x55 fffff800`04c1ab70 fffff800`03ada4bf : fffff8a0`00024010 fffff8a0`00024010 fffff8a0`018ca640 fffff800`04c1ae18 : nt!CmpAddValueKeyNew+0x69 fffff800`04c1ac40 fffff800`03cc06e3 : 01d501ff`f5623883 fffff800`04c1aff0 fffff8a0`04468820 00000000`00000000 : nt!CmpSetValueKeyNew+0x77 fffff800`04c1ac90 fffff800`03ae5531 : fffff8a0`0506b140 fffff800`04c1ae18 fffffa80`00000004 fffff800`04c1b210 : nt!CmSetValueKey+0xba3 fffff800`04c1add0 fffff800`038b5bd3 : ffffffff`80000dc4 00000000`00000002 fffffa80`00000000 fffff800`00000004 : nt!NtSetValueKey+0x349 fffff800`04c1af00 fffff800`038ab3b0 : fffff800`03bfc2a2 fffff800`04c1b248 fffff880`01525152 fffffa80`00040001 : nt!KiSystemServiceCopyEnd+0x13 fffff800`04c1b108 fffff800`03bfc2a2 : fffff800`04c1b248 fffff880`01525152 fffffa80`00040001 fffff800`04c1b270 : nt!KiServiceLinkage fffff800`04c1b110 fffff880`0152cd96 : 00000000`00000004 fffffa80`0449b4e0 fffff880`0525c030 00000000`000007ff : nt!RtlWriteRegistryValue+0x62 fffff800`04c1b170 fffff880`050b698d : fffff800`04c1b270 fffff880`052c5c28 00000000`00000000 00000000`00000000 : ndis!NdisWriteConfiguration+0x156 fffff800`04c1b1d0 fffff800`04c1b270 : fffff880`052c5c28 00000000`00000000 00000000`00000000 fffff800`001801a9 : netr28x+0x4b98d fffff800`04c1b1d8 fffff880`052c5c28 : 00000000`00000000 00000000`00000000 fffff800`001801a9 fffffa80`05b7f1a0 : 0xfffff800`04c1b270 fffff800`04c1b1e0 00000000`00000000 : 00000000`00000000 fffff800`001801a9 fffffa80`05b7f1a0 fffff800`00000000 : netr28x+0x25ac28 THREAD_SHA1_HASH_MOD_FUNC: 80858fdf941bd645ff48b6997b30f63ac59926fb THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 394aafee51f76470053fa2102b9df0f0f7df42a3 THREAD_SHA1_HASH_MOD: 5d50876435db08b990ce5928fe5c90526c26b16c FOLLOWUP_IP: netr28x+4b98d fffff880`050b698d ?? ??? SYMBOL_STACK_INDEX: d SYMBOL_NAME: netr28x+4b98d FOLLOWUP_NAME: MachineOwner MODULE_NAME: netr28x IMAGE_NAME: netr28x.sys DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a STACK_COMMAND: .thread ; .cxr ; kb FAILURE_BUCKET_ID: X64_0xA_netr28x+4b98d BUCKET_ID: X64_0xA_netr28x+4b98d PRIMARY_PROBLEM_CLASS: X64_0xA_netr28x+4b98d TARGET_TIME: 2019-05-03T22:31:32.000Z OSBUILD: 7601 OSSERVICEPACK: 1000 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 7 OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 2019-03-21 04:38:47 BUILDDATESTAMP_STR: 190320-1700 BUILDLAB_STR: win7sp1_ldr_escrow BUILDOSVER_STR: 6.1.7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700 ANALYSIS_SESSION_ELAPSED_TIME: 7b0 ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:x64_0xa_netr28x+4b98d FAILURE_ID_HASH: {a6eb3f60-a5c3-0bd6-051c-41bf4427925d} Followup: MachineOwner --------- INVALID_PROCESS_ATTACH_ATTEMPT (5) Arguments: Arg1: fffffa80042cf9b0 Arg2: fffffa80045a46e0 Arg3: 0000000000000000 Arg4: 0000000000000001 Debugging Details: ------------------ GetUlongPtrFromAddress: unable to read from fffff800030fb300 KEY_VALUES_STRING: 1 Key : Analysis.CPU.Sec Value: 2 Key : Analysis.Elapsed.Sec Value: 2 Key : Analysis.Memory.CommitPeak.Mb Value: 62 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700 SYSTEM_MANUFACTURER: Hewlett-Packard SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC SYSTEM_SKU: J4T62EA#AB8 SYSTEM_VERSION: 0991100000000000000600087 BIOS_VENDOR: Insyde BIOS_VERSION: F.43 BIOS_DATE: 12/19/2017 BASEBOARD_MANUFACTURER: Hewlett-Packard BASEBOARD_PRODUCT: 2211 BASEBOARD_VERSION: 86.56 DUMP_TYPE: 2 BUGCHECK_P1: fffffa80042cf9b0 BUGCHECK_P2: fffffa80045a46e0 BUGCHECK_P3: 0 BUGCHECK_P4: 1 CPU_COUNT: 4 CPU_MHZ: 6a0 CPU_VENDOR: GenuineIntel CPU_FAMILY: 6 CPU_MODEL: 45 CPU_STEPPING: 1 CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init) CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT BUGCHECK_STR: 0x5 PROCESS_NAME: chrome.exe CURRENT_IRQL: 2 ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5 ANALYSIS_SESSION_TIME: 06-17-2019 20:48:24.0070 ANALYSIS_VERSION: 10.0.18869.1002 amd64fre DPC_STACK_BASE: FFFFF80000BA2FB0 LOCK_ADDRESS: fffff800030ce240 -- (!locks fffff800030ce240) Cannot get _ERESOURCE type Resource @ nt!PiEngineLock (0xfffff800030ce240) Available 1 total locks PNP_TRIAGE_DATA: Lock address : 0xfffff800030ce240 Thread Count : 0 Thread address: 0x0000000000000000 Thread wait : 0x0 LAST_CONTROL_TRANSFER: from fffff80002ea05f2 to fffff80002ef1ba0 STACK_TEXT: fffff800`00ba1cc8 fffff800`02ea05f2 : 00000000`00000005 fffffa80`042cf9b0 fffffa80`045a46e0 00000000`00000000 : nt!KeBugCheckEx fffff800`00ba1cd0 fffff800`03149127 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeStackAttachProcess+0x52 fffff800`00ba1d50 fffff800`031494bf : 00000000`00000000 fffff8a0`00000000 fffff8a0`00001910 00000000`00000000 : nt!ObpDecrementHandleCount+0x177 fffff800`00ba1dd0 fffff800`031491e4 : 00000000`00000b3c fffffa80`045a46e0 fffff8a0`00001910 00000000`00000b3c : nt!ObpCloseHandleTableEntry+0xaf fffff800`00ba1e60 fffff800`02effbd3 : fffffa80`04502060 fffff800`00ba1f30 fffff800`031b3200 fffff800`0313f76a : nt!ObpCloseHandle+0x94 fffff800`00ba1eb0 fffff800`02ef53b0 : fffff800`0318cd73 fffffa80`04ebd060 fffff800`031b3200 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 fffff800`00ba2048 fffff800`0318cd73 : fffffa80`04ebd060 fffff800`031b3200 00000000`00000000 00000000`00000000 : nt!KiServiceLinkage fffff800`00ba2050 fffff800`03196a78 : fffffa80`04ebd060 00000000`00000001 fffffa80`04eba6e0 00000000`00000000 : nt!PiGetDeviceRegistryProperty+0xab fffff800`00ba21b0 fffff800`0318ba90 : fffffa80`04ebd060 fffffa80`04ebd060 00000000`00000000 00000000`00000000 : nt!IoGetDeviceProperty+0xbc fffff800`00ba2290 fffff800`0319cf51 : 00000000`ffff0000 fffffa80`08470cb0 fffff880`0147f110 fffffa80`059fbe30 : nt!IopOpenOrCreateDeviceRegistryKey+0x14c fffff800`00ba2450 fffff880`014c4152 : fffffa80`0681f000 fffff800`00ba25e0 00000000`00000005 00000000`000007ff : nt!IoOpenDeviceRegistryKey+0x11 fffff800`00ba2490 fffff880`0142fb34 : fffff800`00ba25e0 fffff800`00ba25b8 fffffa80`05bf61a0 fffff800`02e262ea : ndis!NdisOpenConfiguration+0xb2 fffff800`00ba24d0 fffff880`0511d94f : 00000000`00000000 fffff800`00ba25e0 fffff880`0532cc28 00000000`00000000 : ndis!NdisOpenConfigurationEx+0xa4 fffff800`00ba2540 00000000`00000000 : fffff800`00ba25e0 fffff880`0532cc28 00000000`00000000 fffffa80`001801a9 : netr28x+0x4b94f THREAD_SHA1_HASH_MOD_FUNC: ae5746727567d6f3e980a5bab83b7524a5dc9ee8 THREAD_SHA1_HASH_MOD_FUNC_OFFSET: a4491f04e0c588cecd320ea5c66c026862f569ea THREAD_SHA1_HASH_MOD: 34d7ba38146ecb972065c22fa7203d72f73eccb4 FOLLOWUP_IP: netr28x+4b94f fffff880`0511d94f ?? ??? SYMBOL_STACK_INDEX: d SYMBOL_NAME: netr28x+4b94f FOLLOWUP_NAME: MachineOwner MODULE_NAME: netr28x IMAGE_NAME: netr28x.sys DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a STACK_COMMAND: .thread ; .cxr ; kb FAILURE_BUCKET_ID: X64_0x5_netr28x+4b94f BUCKET_ID: X64_0x5_netr28x+4b94f PRIMARY_PROBLEM_CLASS: X64_0x5_netr28x+4b94f TARGET_TIME: 2019-04-11T14:13:16.000Z OSBUILD: 7601 OSSERVICEPACK: 1000 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 7 OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 2019-03-06 05:38:53 BUILDDATESTAMP_STR: 190305-1700 BUILDLAB_STR: win7sp1_ldr_escrow BUILDOSVER_STR: 6.1.7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700 ANALYSIS_SESSION_ELAPSED_TIME: 851 ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:x64_0x5_netr28x+4b94f FAILURE_ID_HASH: {43753b0b-e234-1a01-8468-7eed644d41ea} Followup: MachineOwner --------- INVALID_PROCESS_ATTACH_ATTEMPT (5) Arguments: Arg1: fffffa80042ce9b0 Arg2: fffffa800b053b00 Arg3: 0000000000000000 Arg4: 0000000000000001 Debugging Details: ------------------ GetUlongPtrFromAddress: unable to read from fffff800032ed300 KEY_VALUES_STRING: 1 Key : Analysis.CPU.Sec Value: 1 Key : Analysis.Elapsed.Sec Value: 2 Key : Analysis.Memory.CommitPeak.Mb Value: 62 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700 SYSTEM_MANUFACTURER: Hewlett-Packard SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC SYSTEM_SKU: J4T62EA#AB8 SYSTEM_VERSION: 0991100000000000000600087 BIOS_VENDOR: Insyde BIOS_VERSION: F.43 BIOS_DATE: 12/19/2017 BASEBOARD_MANUFACTURER: Hewlett-Packard BASEBOARD_PRODUCT: 2211 BASEBOARD_VERSION: 86.56 DUMP_TYPE: 2 BUGCHECK_P1: fffffa80042ce9b0 BUGCHECK_P2: fffffa800b053b00 BUGCHECK_P3: 0 BUGCHECK_P4: 1 CPU_COUNT: 4 CPU_MHZ: 6a0 CPU_VENDOR: GenuineIntel CPU_FAMILY: 6 CPU_MODEL: 45 CPU_STEPPING: 1 CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init) CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT BUGCHECK_STR: 0x5 PROCESS_NAME: mcbuilder.exe CURRENT_IRQL: 2 ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5 ANALYSIS_SESSION_TIME: 06-17-2019 20:48:40.0990 ANALYSIS_VERSION: 10.0.18869.1002 amd64fre DPC_STACK_BASE: FFFFF80000BA2FB0 LOCK_ADDRESS: fffff800032c0240 -- (!locks fffff800032c0240) Cannot get _ERESOURCE type Resource @ nt!PiEngineLock (0xfffff800032c0240) Available 1 total locks PNP_TRIAGE_DATA: Lock address : 0xfffff800032c0240 Thread Count : 0 Thread address: 0x0000000000000000 Thread wait : 0x0 LAST_CONTROL_TRANSFER: from fffff800030925f2 to fffff800030e3ba0 STACK_TEXT: fffff800`00ba1cc8 fffff800`030925f2 : 00000000`00000005 fffffa80`042ce9b0 fffffa80`0b053b00 00000000`00000000 : nt!KeBugCheckEx fffff800`00ba1cd0 fffff800`0333b127 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeStackAttachProcess+0x52 fffff800`00ba1d50 fffff800`0333b4bf : 00000000`00000000 fffff8a0`00000000 fffff8a0`00001910 00000000`00000000 : nt!ObpDecrementHandleCount+0x177 fffff800`00ba1dd0 fffff800`0333b1e4 : 00000000`00000d0c fffffa80`0b053b00 fffff8a0`00001910 00000000`00000d0c : nt!ObpCloseHandleTableEntry+0xaf fffff800`00ba1e60 fffff800`030f1bd3 : fffffa80`0568b6e0 fffff800`00ba1f30 fffff800`033a5200 fffff800`0333176a : nt!ObpCloseHandle+0x94 fffff800`00ba1eb0 fffff800`030e73b0 : fffff800`0337ed73 fffffa80`04dc8060 fffff800`033a5200 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 fffff800`00ba2048 fffff800`0337ed73 : fffffa80`04dc8060 fffff800`033a5200 00000000`00000000 00000000`00000000 : nt!KiServiceLinkage fffff800`00ba2050 fffff800`03388a78 : fffffa80`04dc8060 00000000`00000001 fffffa80`04dc36e0 00000000`00000000 : nt!PiGetDeviceRegistryProperty+0xab fffff800`00ba21b0 fffff800`0337da90 : fffffa80`04dc8060 fffffa80`04dc8060 00000000`00000000 00000000`00000000 : nt!IoGetDeviceProperty+0xbc fffff800`00ba2290 fffff800`0338ef51 : 00000000`ffff0000 fffffa80`09035950 fffff880`014a0110 fffffa80`05adbd80 : nt!IopOpenOrCreateDeviceRegistryKey+0x14c fffff800`00ba2450 fffff880`014e5152 : fffffa80`00000000 fffff800`00ba25e0 00000000`00000000 00000000`000007ff : nt!IoOpenDeviceRegistryKey+0x11 fffff800`00ba2490 fffff880`01450b34 : fffff800`00ba25e0 fffff800`00ba25b8 fffffa80`05bc91a0 00000000`00000001 : ndis!NdisOpenConfiguration+0xb2 fffff800`00ba24d0 fffff880`056cc94f : 00000000`00000000 fffff800`00ba25e0 fffff880`058dbc28 00000000`00000000 : ndis!NdisOpenConfigurationEx+0xa4 fffff800`00ba2540 00000000`00000000 : fffff800`00ba25e0 fffff880`058dbc28 00000000`00000000 fffffa80`001801a9 : netr28x+0x4b94f THREAD_SHA1_HASH_MOD_FUNC: ae5746727567d6f3e980a5bab83b7524a5dc9ee8 THREAD_SHA1_HASH_MOD_FUNC_OFFSET: a4491f04e0c588cecd320ea5c66c026862f569ea THREAD_SHA1_HASH_MOD: 34d7ba38146ecb972065c22fa7203d72f73eccb4 FOLLOWUP_IP: netr28x+4b94f fffff880`056cc94f ?? ??? SYMBOL_STACK_INDEX: d SYMBOL_NAME: netr28x+4b94f FOLLOWUP_NAME: MachineOwner MODULE_NAME: netr28x IMAGE_NAME: netr28x.sys DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a STACK_COMMAND: .thread ; .cxr ; kb FAILURE_BUCKET_ID: X64_0x5_netr28x+4b94f BUCKET_ID: X64_0x5_netr28x+4b94f PRIMARY_PROBLEM_CLASS: X64_0x5_netr28x+4b94f TARGET_TIME: 2019-04-11T17:47:48.000Z OSBUILD: 7601 OSSERVICEPACK: 1000 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 7 OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 2019-03-06 05:38:53 BUILDDATESTAMP_STR: 190305-1700 BUILDLAB_STR: win7sp1_ldr_escrow BUILDOSVER_STR: 6.1.7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700 ANALYSIS_SESSION_ELAPSED_TIME: 7f5 ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:x64_0x5_netr28x+4b94f FAILURE_ID_HASH: {43753b0b-e234-1a01-8468-7eed644d41ea} Followup: MachineOwner --------- IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: fffff8a006be8c34, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000000, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: fffff80003afb730, address which referenced memory Debugging Details: ------------------ GetUlongPtrFromAddress: unable to read from fffff80003ab2300 KEY_VALUES_STRING: 1 Key : Analysis.CPU.Sec Value: 1 Key : Analysis.Elapsed.Sec Value: 1 Key : Analysis.Memory.CommitPeak.Mb Value: 62 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700 SYSTEM_MANUFACTURER: Hewlett-Packard SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC SYSTEM_SKU: J4T62EA#AB8 SYSTEM_VERSION: 0991100000000000000600087 BIOS_VENDOR: Insyde BIOS_VERSION: F.43 BIOS_DATE: 12/19/2017 BASEBOARD_MANUFACTURER: Hewlett-Packard BASEBOARD_PRODUCT: 2211 BASEBOARD_VERSION: 86.56 DUMP_TYPE: 2 BUGCHECK_P1: fffff8a006be8c34 BUGCHECK_P2: 2 BUGCHECK_P3: 0 BUGCHECK_P4: fffff80003afb730 READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80003ab2100 Unable to get MmSystemRangeStart GetUlongPtrFromAddress: unable to read from fffff80003ab22f0 GetUlongPtrFromAddress: unable to read from fffff80003ab24a8 GetPointerFromAddress: unable to read from fffff80003ab20d8 fffff8a006be8c34 Paged pool CURRENT_IRQL: 2 FAULTING_IP: nt!CmpFindValueByNameFromCache+e0 fffff800`03afb730 428b14b8 mov edx,dword ptr [rax+r15*4] CPU_COUNT: 4 CPU_MHZ: 6a0 CPU_VENDOR: GenuineIntel CPU_FAMILY: 6 CPU_MODEL: 45 CPU_STEPPING: 1 CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init) CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT BUGCHECK_STR: 0xA PROCESS_NAME: System ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5 ANALYSIS_SESSION_TIME: 06-17-2019 20:48:30.0482 ANALYSIS_VERSION: 10.0.18869.1002 amd64fre TRAP_FRAME: fffff80004c21990 -- (.trap 0xfffff80004c21990) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=fffff8a006be8c34 rbx=0000000000000000 rcx=0000000000000000 rdx=00000000ffffffff rsi=0000000000000000 rdi=0000000000000000 rip=fffff80003afb730 rsp=fffff80004c21b20 rbp=fffff80004c21ff0 r8=fffff8a00004ad40 r9=000000000000ffff r10=0000000000000001 r11=fffff80004c21dc8 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl zr na po nc nt!CmpFindValueByNameFromCache+0xe0: fffff800`03afb730 428b14b8 mov edx,dword ptr [rax+r15*4] ds:fffff8a0`06be8c34=???????? Resetting default scope LAST_CONTROL_TRANSFER: from fffff800038b6f69 to fffff800038a8ba0 STACK_TEXT: fffff800`04c21848 fffff800`038b6f69 : 00000000`0000000a fffff8a0`06be8c34 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx fffff800`04c21850 fffff800`038b4d88 : 00000000`00000000 fffff8a0`06be8c34 fffffa80`0a1a6000 fffff8a0`00024010 : nt!KiBugCheckDispatch+0x69 fffff800`04c21990 fffff800`03afb730 : fffff8a0`00024010 00000000`00c6ac30 fffff8a0`0004ad40 00000000`00000000 : nt!KiPageFault+0x448 fffff800`04c21b20 fffff800`03adec38 : fffff8a0`0e0d74a8 fffff800`04c21e18 fffff800`04c21c60 fffff800`04c21c48 : nt!CmpFindValueByNameFromCache+0xe0 fffff800`04c21bf0 fffff800`03cc11e7 : fffff8a0`0e0d74a8 01d50684`f67b3cde fffff8a0`0e0d74a8 00000000`00000000 : nt!CmpCompareNewValueDataAgainstKCBCache+0x78 fffff800`04c21c90 fffff800`03ae6531 : fffff8a0`01c5f710 fffff800`04c21e18 fffffa80`00000004 fffff800`04c22210 : nt!CmSetValueKey+0x6a7 fffff800`04c21dd0 fffff800`038b6bd3 : ffffffff`80002788 00000000`00000002 fffffa80`00000000 fffff800`00000004 : nt!NtSetValueKey+0x349 fffff800`04c21f00 fffff800`038ac3b0 : fffff800`03bfd2a2 fffff800`04c22248 fffff880`017a5152 00000000`c0000001 : nt!KiSystemServiceCopyEnd+0x13 fffff800`04c22108 fffff800`03bfd2a2 : fffff800`04c22248 fffff880`017a5152 00000000`c0000001 fffff800`04c22270 : nt!KiServiceLinkage fffff800`04c22110 fffff880`017acd96 : 00000000`00000004 fffffa80`09b31af0 00000100`00000000 00000000`000007ff : nt!RtlWriteRegistryValue+0x62 fffff800`04c22170 fffff880`056a498d : fffff800`04c22270 fffff880`058b3c28 00000000`00000000 00000000`00000000 : ndis!NdisWriteConfiguration+0x156 fffff800`04c221d0 fffff800`04c22270 : fffff880`058b3c28 00000000`00000000 00000000`00000000 00000000`001801a9 : netr28x+0x4b98d fffff800`04c221d8 fffff880`058b3c28 : 00000000`00000000 00000000`00000000 00000000`001801a9 fffffa80`05b821a0 : 0xfffff800`04c22270 fffff800`04c221e0 00000000`00000000 : 00000000`00000000 00000000`001801a9 fffffa80`05b821a0 00000000`00000000 : netr28x+0x25ac28 THREAD_SHA1_HASH_MOD_FUNC: 935105e89958188e75032d802c31088ef212f1d5 THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 050e790aab7ddac4bfe73c42f1350165ef3ea549 THREAD_SHA1_HASH_MOD: 7921e317582c7f98a7f13cfbcd3c02a86fdcafec FOLLOWUP_IP: netr28x+4b98d fffff880`056a498d ?? ??? SYMBOL_STACK_INDEX: b SYMBOL_NAME: netr28x+4b98d FOLLOWUP_NAME: MachineOwner MODULE_NAME: netr28x IMAGE_NAME: netr28x.sys DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a STACK_COMMAND: .thread ; .cxr ; kb FAILURE_BUCKET_ID: X64_0xA_netr28x+4b98d BUCKET_ID: X64_0xA_netr28x+4b98d PRIMARY_PROBLEM_CLASS: X64_0xA_netr28x+4b98d TARGET_TIME: 2019-05-09T16:33:41.000Z OSBUILD: 7601 OSSERVICEPACK: 1000 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 7 OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 2019-03-21 04:38:47 BUILDDATESTAMP_STR: 190320-1700 BUILDLAB_STR: win7sp1_ldr_escrow BUILDOSVER_STR: 6.1.7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700 ANALYSIS_SESSION_ELAPSED_TIME: 716 ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:x64_0xa_netr28x+4b98d FAILURE_ID_HASH: {a6eb3f60-a5c3-0bd6-051c-41bf4427925d} Followup: MachineOwner --------- INVALID_PROCESS_ATTACH_ATTEMPT (5) Arguments: Arg1: fffffa80042b59b0 Arg2: fffffa80048376b0 Arg3: 0000000000000000 Arg4: 0000000000000001 Debugging Details: ------------------ GetUlongPtrFromAddress: unable to read from fffff8000309f300 KEY_VALUES_STRING: 1 Key : Analysis.CPU.Sec Value: 1 Key : Analysis.Elapsed.Sec Value: 1 Key : Analysis.Memory.CommitPeak.Mb Value: 62 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700 SYSTEM_MANUFACTURER: Hewlett-Packard SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC SYSTEM_SKU: J4T62EA#AB8 SYSTEM_VERSION: 0991100000000000000600087 BIOS_VENDOR: Insyde BIOS_VERSION: F.43 BIOS_DATE: 12/19/2017 BASEBOARD_MANUFACTURER: Hewlett-Packard BASEBOARD_PRODUCT: 2211 BASEBOARD_VERSION: 86.56 DUMP_TYPE: 2 BUGCHECK_P1: fffffa80042b59b0 BUGCHECK_P2: fffffa80048376b0 BUGCHECK_P3: 0 BUGCHECK_P4: 1 CPU_COUNT: 4 CPU_MHZ: 6a0 CPU_VENDOR: GenuineIntel CPU_FAMILY: 6 CPU_MODEL: 45 CPU_STEPPING: 1 CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init) CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT BUGCHECK_STR: 0x5 PROCESS_NAME: PointBlank.exe CURRENT_IRQL: 2 ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5 ANALYSIS_SESSION_TIME: 06-17-2019 21:16:16.0171 ANALYSIS_VERSION: 10.0.18869.1002 amd64fre DPC_STACK_BASE: FFFFF80000BA2FB0 LOCK_ADDRESS: fffff80003072240 -- (!locks fffff80003072240) Cannot get _ERESOURCE type Resource @ nt!PiEngineLock (0xfffff80003072240) Available 1 total locks PNP_TRIAGE_DATA: Lock address : 0xfffff80003072240 Thread Count : 0 Thread address: 0x0000000000000000 Thread wait : 0x0 LAST_CONTROL_TRANSFER: from fffff80002e445f2 to fffff80002e95ba0 STACK_TEXT: fffff800`00ba1cc8 fffff800`02e445f2 : 00000000`00000005 fffffa80`042b59b0 fffffa80`048376b0 00000000`00000000 : nt!KeBugCheckEx fffff800`00ba1cd0 fffff800`030ed127 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeStackAttachProcess+0x52 fffff800`00ba1d50 fffff800`030ed4bf : 00000000`00000000 fffff8a0`00000000 fffff8a0`00001910 00000000`00000000 : nt!ObpDecrementHandleCount+0x177 fffff800`00ba1dd0 fffff800`030ed1e4 : 00000000`00000c9c fffffa80`048376b0 fffff8a0`00001910 00000000`00000c9c : nt!ObpCloseHandleTableEntry+0xaf fffff800`00ba1e60 fffff800`02ea3bd3 : fffffa80`04988060 fffff800`00ba1f30 fffff800`03157200 fffff800`030e376a : nt!ObpCloseHandle+0x94 fffff800`00ba1eb0 fffff800`02e993b0 : fffff800`03130d73 fffffa80`04e7d060 fffff800`03157200 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 fffff800`00ba2048 fffff800`03130d73 : fffffa80`04e7d060 fffff800`03157200 00000000`00000000 00000000`00000000 : nt!KiServiceLinkage fffff800`00ba2050 fffff800`0313aa78 : fffffa80`04e7d060 00000000`00000001 fffffa80`04e386e0 00000000`00000000 : nt!PiGetDeviceRegistryProperty+0xab fffff800`00ba21b0 fffff800`0312fa90 : fffffa80`04e7d060 fffffa80`04e7d060 00000000`00000000 00000000`00000000 : nt!IoGetDeviceProperty+0xbc fffff800`00ba2290 fffff800`03140f51 : 00000000`ffff0000 fffffa80`08033990 fffff880`014d7110 fffffa80`05bfaf70 : nt!IopOpenOrCreateDeviceRegistryKey+0x14c fffff800`00ba2450 fffff880`0151c152 : fffffa80`049479f0 fffff800`00ba25e0 fffffa80`06f64a78 00000000`000007ff : nt!IoOpenDeviceRegistryKey+0x11 fffff800`00ba2490 fffff880`01487b34 : fffff800`00ba25e0 fffff800`00ba25b8 fffffa80`05bf91a0 fffff880`0153221d : ndis!NdisOpenConfiguration+0xb2 fffff800`00ba24d0 fffff880`04eff94f : fffffa80`00000000 fffff800`00ba25e0 fffff880`0510ec28 00000000`00000000 : ndis!NdisOpenConfigurationEx+0xa4 fffff800`00ba2540 fffffa80`00000000 : fffff800`00ba25e0 fffff880`0510ec28 00000000`00000000 00000000`001801a9 : netr28x+0x4b94f fffff800`00ba2548 fffff800`00ba25e0 : fffff880`0510ec28 00000000`00000000 00000000`001801a9 fffffa80`05bf91a0 : 0xfffffa80`00000000 fffff800`00ba2550 fffff880`0510ec28 : 00000000`00000000 00000000`001801a9 fffffa80`05bf91a0 fffffa80`00000000 : 0xfffff800`00ba25e0 fffff800`00ba2558 00000000`00000000 : 00000000`001801a9 fffffa80`05bf91a0 fffffa80`00000000 fffff880`04f0be2e : netr28x+0x25ac28 THREAD_SHA1_HASH_MOD_FUNC: 1764d353450a941fbc74295279ec02651c3d9814 THREAD_SHA1_HASH_MOD_FUNC_OFFSET: bdc70d393af014c177e84e60c668cc911acaf71f THREAD_SHA1_HASH_MOD: 9a9dca34541ae91666e3989df373f06b6e683623 FOLLOWUP_IP: netr28x+4b94f fffff880`04eff94f ?? ??? SYMBOL_STACK_INDEX: d SYMBOL_NAME: netr28x+4b94f FOLLOWUP_NAME: MachineOwner MODULE_NAME: netr28x IMAGE_NAME: netr28x.sys DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a STACK_COMMAND: .thread ; .cxr ; kb FAILURE_BUCKET_ID: X64_0x5_netr28x+4b94f BUCKET_ID: X64_0x5_netr28x+4b94f PRIMARY_PROBLEM_CLASS: X64_0x5_netr28x+4b94f TARGET_TIME: 2019-04-11T14:53:19.000Z OSBUILD: 7601 OSSERVICEPACK: 1000 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 7 OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 2019-03-06 05:38:53 BUILDDATESTAMP_STR: 190305-1700 BUILDLAB_STR: win7sp1_ldr_escrow BUILDOSVER_STR: 6.1.7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700 ANALYSIS_SESSION_ELAPSED_TIME: 7ca ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:x64_0x5_netr28x+4b94f FAILURE_ID_HASH: {43753b0b-e234-1a01-8468-7eed644d41ea} Followup: MachineOwner --------- IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: fffff8a000e8ee98, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000001, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: fffff800032e66fd, address which referenced memory Debugging Details: ------------------ GetUlongPtrFromAddress: unable to read from fffff800032b2300 KEY_VALUES_STRING: 1 Key : Analysis.CPU.Sec Value: 1 Key : Analysis.Elapsed.Sec Value: 1 Key : Analysis.Memory.CommitPeak.Mb Value: 62 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700 SYSTEM_MANUFACTURER: Hewlett-Packard SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC SYSTEM_SKU: J4T62EA#AB8 SYSTEM_VERSION: 0991100000000000000600087 BIOS_VENDOR: Insyde BIOS_VERSION: F.43 BIOS_DATE: 12/19/2017 BASEBOARD_MANUFACTURER: Hewlett-Packard BASEBOARD_PRODUCT: 2211 BASEBOARD_VERSION: 86.56 DUMP_TYPE: 2 BUGCHECK_P1: fffff8a000e8ee98 BUGCHECK_P2: 2 BUGCHECK_P3: 1 BUGCHECK_P4: fffff800032e66fd WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800032b2100 Unable to get MmSystemRangeStart GetUlongPtrFromAddress: unable to read from fffff800032b22f0 GetUlongPtrFromAddress: unable to read from fffff800032b24a8 GetPointerFromAddress: unable to read from fffff800032b20d8 fffff8a000e8ee98 Paged pool CURRENT_IRQL: 2 FAULTING_IP: nt!HvpDoAllocateCell+101 fffff800`032e66fd 89443d00 mov dword ptr [rbp+rdi],eax CPU_COUNT: 4 CPU_MHZ: 6a0 CPU_VENDOR: GenuineIntel CPU_FAMILY: 6 CPU_MODEL: 45 CPU_STEPPING: 1 CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init) CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT BUGCHECK_STR: 0xA PROCESS_NAME: System ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5 ANALYSIS_SESSION_TIME: 06-17-2019 21:16:26.0291 ANALYSIS_VERSION: 10.0.18869.1002 amd64fre TRAP_FRAME: fffff80004418950 -- (.trap 0xfffff80004418950) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000020 rbx=0000000000000000 rcx=0000000000002e68 rdx=0000000000000006 rsi=0000000000000000 rdi=0000000000000000 rip=fffff800032e66fd rsp=fffff80004418ae0 rbp=0000000000000030 r8=fffff8a000024010 r9=0000000000000005 r10=fffff8a000e8c000 r11=0000000000000000 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl nz na pe nc nt!HvpDoAllocateCell+0x101: fffff800`032e66fd 89443d00 mov dword ptr [rbp+rdi],eax ss:0018:00000000`00000030=???????? Resetting default scope LAST_CONTROL_TRANSFER: from fffff800030b6f69 to fffff800030a8ba0 STACK_TEXT: fffff800`04418808 fffff800`030b6f69 : 00000000`0000000a fffff8a0`00e8ee98 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx fffff800`04418810 fffff800`030b4d88 : 00000000`00000001 fffff8a0`00e8ee98 00000000`00000000 fffff8a0`00024010 : nt!KiBugCheckDispatch+0x69 fffff800`04418950 fffff800`032e66fd : fffff8a0`00024010 fffff8a0`00024010 fffff8a0`0004b9a0 fffff800`00000000 : nt!KiPageFault+0x448 fffff800`04418ae0 fffff800`03328d1d : fffff8a0`00024010 00000000`00000000 00000000`00000000 00000000`ffffffff : nt!HvpDoAllocateCell+0x101 fffff800`04418b40 fffff800`03328bad : 00000000`00000000 fffff8a0`00ff0c30 00000000`00000008 fffff800`03316d5c : nt!HvAllocateCell+0x55 fffff800`04418b70 fffff800`032db4bf : fffff8a0`00024010 fffff8a0`00024010 fffff8a0`00ffe640 fffff800`04418e18 : nt!CmpAddValueKeyNew+0x69 fffff800`04418c40 fffff800`034c16e3 : 01d4fd21`140179ca fffff800`04418ff0 fffff8a0`050bd948 00000000`00000000 : nt!CmpSetValueKeyNew+0x77 fffff800`04418c90 fffff800`032e6531 : fffff8a0`0df75fa0 fffff800`04418e18 fffffa80`00000004 fffff800`04419210 : nt!CmSetValueKey+0xba3 fffff800`04418dd0 fffff800`030b6bd3 : ffffffff`80000ab0 00000000`00000002 fffffa80`00000000 fffff800`00000004 : nt!NtSetValueKey+0x349 fffff800`04418f00 fffff800`030ac3b0 : fffff800`033fd2a2 fffff800`04419248 fffff880`014a9152 fffffa80`051e12f0 : nt!KiSystemServiceCopyEnd+0x13 fffff800`04419108 fffff800`033fd2a2 : fffff800`04419248 fffff880`014a9152 fffffa80`051e12f0 fffff800`04419270 : nt!KiServiceLinkage fffff800`04419110 fffff880`014b0d96 : 00000000`00000004 fffffa80`0855a220 00000000`ffffffff 00000000`000007ff : nt!RtlWriteRegistryValue+0x62 fffff800`04419170 fffff880`04eef98d : fffff800`04419270 fffff880`050fec28 00000000`00000000 00000000`00000000 : ndis!NdisWriteConfiguration+0x156 fffff800`044191d0 fffff800`04419270 : fffff880`050fec28 00000000`00000000 00000000`00000000 fffff800`001801a9 : netr28x+0x4b98d fffff800`044191d8 fffff880`050fec28 : 00000000`00000000 00000000`00000000 fffff800`001801a9 fffffa80`05be11a0 : 0xfffff800`04419270 fffff800`044191e0 00000000`00000000 : 00000000`00000000 fffff800`001801a9 fffffa80`05be11a0 fffff800`00000000 : netr28x+0x25ac28 THREAD_SHA1_HASH_MOD_FUNC: 80858fdf941bd645ff48b6997b30f63ac59926fb THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 394aafee51f76470053fa2102b9df0f0f7df42a3 THREAD_SHA1_HASH_MOD: 5d50876435db08b990ce5928fe5c90526c26b16c FOLLOWUP_IP: netr28x+4b98d fffff880`04eef98d ?? ??? SYMBOL_STACK_INDEX: d SYMBOL_NAME: netr28x+4b98d FOLLOWUP_NAME: MachineOwner MODULE_NAME: netr28x IMAGE_NAME: netr28x.sys DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a STACK_COMMAND: .thread ; .cxr ; kb FAILURE_BUCKET_ID: X64_0xA_netr28x+4b98d BUCKET_ID: X64_0xA_netr28x+4b98d PRIMARY_PROBLEM_CLASS: X64_0xA_netr28x+4b98d TARGET_TIME: 2019-04-27T17:46:01.000Z OSBUILD: 7601 OSSERVICEPACK: 1000 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 7 OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 2019-03-21 04:38:47 BUILDDATESTAMP_STR: 190320-1700 BUILDLAB_STR: win7sp1_ldr_escrow BUILDOSVER_STR: 6.1.7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700 ANALYSIS_SESSION_ELAPSED_TIME: 720 ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:x64_0xa_netr28x+4b98d FAILURE_ID_HASH: {a6eb3f60-a5c3-0bd6-051c-41bf4427925d} Followup: MachineOwner --------- IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: fffff8a000b0b260, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000001, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: fffff800032d1738, address which referenced memory Debugging Details: ------------------ GetUlongPtrFromAddress: unable to read from fffff8000329d300 KEY_VALUES_STRING: 1 Key : Analysis.CPU.Sec Value: 1 Key : Analysis.Elapsed.Sec Value: 1 Key : Analysis.Memory.CommitPeak.Mb Value: 62 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700 SYSTEM_MANUFACTURER: Hewlett-Packard SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC SYSTEM_SKU: J4T62EA#AB8 SYSTEM_VERSION: 0991100000000000000600087 BIOS_VENDOR: Insyde BIOS_VERSION: F.43 BIOS_DATE: 12/19/2017 BASEBOARD_MANUFACTURER: Hewlett-Packard BASEBOARD_PRODUCT: 2211 BASEBOARD_VERSION: 86.56 DUMP_TYPE: 2 BUGCHECK_P1: fffff8a000b0b260 BUGCHECK_P2: 2 BUGCHECK_P3: 1 BUGCHECK_P4: fffff800032d1738 WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff8000329d100 Unable to get MmSystemRangeStart GetUlongPtrFromAddress: unable to read from fffff8000329d2f0 GetUlongPtrFromAddress: unable to read from fffff8000329d4a8 GetPointerFromAddress: unable to read from fffff8000329d0d8 fffff8a000b0b260 Paged pool CURRENT_IRQL: 2 FAULTING_IP: nt!HvpDoAllocateCell+13c fffff800`032d1738 8907 mov dword ptr [rdi],eax CPU_COUNT: 4 CPU_MHZ: 6a0 CPU_VENDOR: GenuineIntel CPU_FAMILY: 6 CPU_MODEL: 45 CPU_STEPPING: 1 CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init) CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT BUGCHECK_STR: 0xA PROCESS_NAME: System ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5 ANALYSIS_SESSION_TIME: 06-17-2019 21:16:23.0541 ANALYSIS_VERSION: 10.0.18869.1002 amd64fre TRAP_FRAME: fffff80000b9b950 -- (.trap 0xfffff80000b9b950) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=00000000ffffffd0 rbx=0000000000000000 rcx=000000000000000c rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000 rip=fffff800032d1738 rsp=fffff80000b9bae0 rbp=0000000000000030 r8=fffff8a0000512e0 r9=0000000000000005 r10=000000000000023b r11=0000000000000000 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na pe cy nt!HvpDoAllocateCell+0x13c: fffff800`032d1738 8907 mov dword ptr [rdi],eax ds:00000000`00000000=???????? Resetting default scope LAST_CONTROL_TRANSFER: from fffff800030a1f69 to fffff80003093ba0 STACK_TEXT: fffff800`00b9b808 fffff800`030a1f69 : 00000000`0000000a fffff8a0`00b0b260 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx fffff800`00b9b810 fffff800`0309fd88 : 00000000`00000001 fffff8a0`00b0b260 00000000`00000000 fffff8a0`00024010 : nt!KiBugCheckDispatch+0x69 fffff800`00b9b950 fffff800`032d1738 : fffff8a0`00024010 fffff8a0`00024010 fffff8a0`000512e0 fffff800`00000000 : nt!KiPageFault+0x448 fffff800`00b9bae0 fffff800`03313d0d : fffff8a0`00024010 00000000`00000000 00000000`00000000 00000000`ffffffff : nt!HvpDoAllocateCell+0x13c fffff800`00b9bb40 fffff800`03313b9d : 00000000`00000000 fffff8a0`00f38c30 00000000`00000008 fffff800`03301d5c : nt!HvAllocateCell+0x55 fffff800`00b9bb70 fffff800`032c64bf : fffff8a0`00024010 fffff8a0`00024010 fffff8a0`00f46640 fffff800`00b9be18 : nt!CmpAddValueKeyNew+0x69 fffff800`00b9bc40 fffff800`034ac6a3 : 01d4f07a`dd071b78 fffff800`00b9bff0 fffff8a0`04a444a8 00000000`00000000 : nt!CmpSetValueKeyNew+0x77 fffff800`00b9bc90 fffff800`032d1531 : fffff8a0`09c3f770 fffff800`00b9be18 fffffa80`00000004 fffff800`00b9c210 : nt!CmSetValueKey+0xba3 fffff800`00b9bdd0 fffff800`030a1bd3 : ffffffff`80000b54 00000000`00000002 fffffa80`00000000 fffff800`00000004 : nt!NtSetValueKey+0x349 fffff800`00b9bf00 fffff800`030973b0 : fffff800`033e8272 fffff800`00b9c248 fffff880`0151b152 fffffa80`074a45f0 : nt!KiSystemServiceCopyEnd+0x13 fffff800`00b9c108 fffff800`033e8272 : fffff800`00b9c248 fffff880`0151b152 fffffa80`074a45f0 fffff800`00b9c270 : nt!KiServiceLinkage fffff800`00b9c110 fffff880`01522d96 : 00000000`00000004 fffffa80`05970b70 fffff800`03210800 00000000`000007ff : nt!RtlWriteRegistryValue+0x62 fffff800`00b9c170 fffff880`04eef98d : fffff800`00b9c270 fffff880`050fec28 00000000`00000000 00000000`00000000 : ndis!NdisWriteConfiguration+0x156 fffff800`00b9c1d0 fffff800`00b9c270 : fffff880`050fec28 00000000`00000000 00000000`00000000 fffffa80`001801a9 : netr28x+0x4b98d fffff800`00b9c1d8 fffff880`050fec28 : 00000000`00000000 00000000`00000000 fffffa80`001801a9 fffffa80`05b741a0 : 0xfffff800`00b9c270 fffff800`00b9c1e0 00000000`00000000 : 00000000`00000000 fffffa80`001801a9 fffffa80`05b741a0 00000000`00000000 : netr28x+0x25ac28 THREAD_SHA1_HASH_MOD_FUNC: 80858fdf941bd645ff48b6997b30f63ac59926fb THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 60ef2d8b5c8aa9ab3d61fd3d0f87c6db127d6016 THREAD_SHA1_HASH_MOD: 5d50876435db08b990ce5928fe5c90526c26b16c FOLLOWUP_IP: netr28x+4b98d fffff880`04eef98d ?? ??? SYMBOL_STACK_INDEX: d SYMBOL_NAME: netr28x+4b98d FOLLOWUP_NAME: MachineOwner MODULE_NAME: netr28x IMAGE_NAME: netr28x.sys DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a STACK_COMMAND: .thread ; .cxr ; kb FAILURE_BUCKET_ID: X64_0xA_netr28x+4b98d BUCKET_ID: X64_0xA_netr28x+4b98d PRIMARY_PROBLEM_CLASS: X64_0xA_netr28x+4b98d TARGET_TIME: 2019-04-11T15:25:58.000Z OSBUILD: 7601 OSSERVICEPACK: 1000 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 7 OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 2019-03-06 05:38:53 BUILDDATESTAMP_STR: 190305-1700 BUILDLAB_STR: win7sp1_ldr_escrow BUILDOSVER_STR: 6.1.7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700 ANALYSIS_SESSION_ELAPSED_TIME: 7b6 ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:x64_0xa_netr28x+4b98d FAILURE_ID_HASH: {a6eb3f60-a5c3-0bd6-051c-41bf4427925d} Followup: MachineOwner --------- IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: fffff8a0067d0004, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000000, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: fffff800032dccfe, address which referenced memory Debugging Details: ------------------ GetUlongPtrFromAddress: unable to read from fffff800032a8300 KEY_VALUES_STRING: 1 Key : Analysis.CPU.Sec Value: 1 Key : Analysis.Elapsed.Sec Value: 1 Key : Analysis.Memory.CommitPeak.Mb Value: 62 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700 SYSTEM_MANUFACTURER: Hewlett-Packard SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC SYSTEM_SKU: J4T62EA#AB8 SYSTEM_VERSION: 0991100000000000000600087 BIOS_VENDOR: Insyde BIOS_VERSION: F.43 BIOS_DATE: 12/19/2017 BASEBOARD_MANUFACTURER: Hewlett-Packard BASEBOARD_PRODUCT: 2211 BASEBOARD_VERSION: 86.56 DUMP_TYPE: 2 BUGCHECK_P1: fffff8a0067d0004 BUGCHECK_P2: 2 BUGCHECK_P3: 0 BUGCHECK_P4: fffff800032dccfe READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800032a8100 Unable to get MmSystemRangeStart GetUlongPtrFromAddress: unable to read from fffff800032a82f0 GetUlongPtrFromAddress: unable to read from fffff800032a84a8 GetPointerFromAddress: unable to read from fffff800032a80d8 fffff8a0067d0004 Paged pool CURRENT_IRQL: 2 FAULTING_IP: nt!HvpScanForFreeCellInViewWindow+16a fffff800`032dccfe 8b4804 mov ecx,dword ptr [rax+4] CPU_COUNT: 4 CPU_MHZ: 6a0 CPU_VENDOR: GenuineIntel CPU_FAMILY: 6 CPU_MODEL: 45 CPU_STEPPING: 1 CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init) CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT BUGCHECK_STR: 0xA PROCESS_NAME: System ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5 ANALYSIS_SESSION_TIME: 06-17-2019 21:16:21.0060 ANALYSIS_VERSION: 10.0.18869.1002 amd64fre TRAP_FRAME: fffff80004421860 -- (.trap 0xfffff80004421860) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=fffff8a0067d0000 rbx=0000000000000000 rcx=0000000000000000 rdx=0000000000683000 rsi=0000000000000000 rdi=0000000000000000 rip=fffff800032dccfe rsp=fffff800044219f0 rbp=0000000000000683 r8=0000000000000083 r9=0000000000000000 r10=fffff8000300b000 r11=0000000000000006 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na po nc nt!HvpScanForFreeCellInViewWindow+0x16a: fffff800`032dccfe 8b4804 mov ecx,dword ptr [rax+4] ds:fffff8a0`067d0004=00683000 Resetting default scope LAST_CONTROL_TRANSFER: from fffff800030acf69 to fffff8000309eba0 STACK_TEXT: fffff800`04421718 fffff800`030acf69 : 00000000`0000000a fffff8a0`067d0004 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx fffff800`04421720 fffff800`030aad88 : 00000000`00000000 fffff8a0`067d0004 fffff800`031ff100 00000000`00000000 : nt!KiBugCheckDispatch+0x69 fffff800`04421860 fffff800`032dccfe : 00000000`00000000 00000000`003fe000 00000000`00001000 00000000`00000000 : nt!KiPageFault+0x448 fffff800`044219f0 fffff800`032dcb0a : fffff800`00683000 fffff800`00000011 00000000`00000030 fffff800`00000000 : nt!HvpScanForFreeCellInViewWindow+0x16a fffff800`04421a70 fffff800`032dc66e : 00000000`00000030 fffff800`00000005 ffffffff`00000030 fffff800`00000000 : nt!HvpFindFreeCell+0x1ba fffff800`04421ae0 fffff800`0331ed1d : fffff8a0`00024010 00000000`00000000 00000000`00000000 00000000`ffffffff : nt!HvpDoAllocateCell+0x72 fffff800`04421b40 fffff800`0331ebad : 00000000`00000000 fffff8a0`061e8c30 00000000`00000008 fffff800`0330cd5c : nt!HvAllocateCell+0x55 fffff800`04421b70 fffff800`032d14bf : fffff8a0`00024010 fffff8a0`00024010 fffff8a0`061f6640 fffff800`04421e18 : nt!CmpAddValueKeyNew+0x69 fffff800`04421c40 fffff800`034b76e3 : 01d4f848`5814f677 fffff800`04421ff0 fffff8a0`02c84b98 00000000`00000000 : nt!CmpSetValueKeyNew+0x77 fffff800`04421c90 fffff800`032dc531 : fffff8a0`04cbac70 fffff800`04421e18 fffffa80`00000004 fffff800`04422210 : nt!CmSetValueKey+0xba3 fffff800`04421dd0 fffff800`030acbd3 : ffffffff`80000de8 00000000`00000002 fffffa80`00000000 fffff800`00000004 : nt!NtSetValueKey+0x349 fffff800`04421f00 fffff800`030a23b0 : fffff800`033f32a2 fffff800`04422248 fffff880`01725152 fffffa80`00000000 : nt!KiSystemServiceCopyEnd+0x13 fffff800`04422108 fffff800`033f32a2 : fffff800`04422248 fffff880`01725152 fffffa80`00000000 fffff800`04422270 : nt!KiServiceLinkage fffff800`04422110 fffff880`0172cd96 : 00000000`00000004 fffffa80`05d89cd0 fffff800`04422200 00000000`000007ff : nt!RtlWriteRegistryValue+0x62 fffff800`04422170 fffff880`0510f98d : fffff800`04422270 fffff880`0531ec28 00000000`00000000 00000000`00000000 : ndis!NdisWriteConfiguration+0x156 fffff800`044221d0 fffff800`04422270 : fffff880`0531ec28 00000000`00000000 00000000`00000000 fffff880`001801a9 : netr28x+0x4b98d fffff800`044221d8 fffff880`0531ec28 : 00000000`00000000 00000000`00000000 fffff880`001801a9 fffffa80`05b701a0 : 0xfffff800`04422270 fffff800`044221e0 00000000`00000000 : 00000000`00000000 fffff880`001801a9 fffffa80`05b701a0 0000000e`00000000 : netr28x+0x25ac28 THREAD_SHA1_HASH_MOD_FUNC: a2c5409ed52347576830e095aabe2e20325151e5 THREAD_SHA1_HASH_MOD_FUNC_OFFSET: cf883ff24fbd42e0f8dd5b2bf40fd2071e6cd531 THREAD_SHA1_HASH_MOD: 56bd18a7fabf3c16adac1e3911e9aab0524685a1 FOLLOWUP_IP: netr28x+4b98d fffff880`0510f98d ?? ??? SYMBOL_STACK_INDEX: f SYMBOL_NAME: netr28x+4b98d FOLLOWUP_NAME: MachineOwner MODULE_NAME: netr28x IMAGE_NAME: netr28x.sys DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a STACK_COMMAND: .thread ; .cxr ; kb FAILURE_BUCKET_ID: X64_0xA_netr28x+4b98d BUCKET_ID: X64_0xA_netr28x+4b98d PRIMARY_PROBLEM_CLASS: X64_0xA_netr28x+4b98d TARGET_TIME: 2019-04-21T13:44:29.000Z OSBUILD: 7601 OSSERVICEPACK: 1000 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 7 OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 2019-03-21 04:38:47 BUILDDATESTAMP_STR: 190320-1700 BUILDLAB_STR: win7sp1_ldr_escrow BUILDOSVER_STR: 6.1.7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700 ANALYSIS_SESSION_ELAPSED_TIME: 704 ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:x64_0xa_netr28x+4b98d FAILURE_ID_HASH: {a6eb3f60-a5c3-0bd6-051c-41bf4427925d} Followup: MachineOwner --------- 0: kd> lmvm netr28x start end module name fffff880`050c4000 fffff880`0532e000 netr28x T (no symbols) Loaded symbol image file: netr28x.sys Image path: \SystemRoot\system32\DRIVERS\netr28x.sys Image name: netr28x.sys Timestamp: Mon Apr 20 03:22:50 2015 (5534D37A) CheckSum: 0026BF4B ImageSize: 0026A000 Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4 Information from resource tables:
Öncelikle Sağol Recep Abi Teşekkür Ederim Cevap Verdiğin İçin Ama Ben Bilgisayarımı windows 10fornat attun fakat kastı oynadıgım oyunda fln arkaplan uygulamalarına kadar kapatmama rağmen geri win7 atsam birşey olurmu birde temiz iso nerden indiririmSoruna netr28x.sys sebep oluyor. Bu da Ralink 802.11 WiFi sürücüsüdür. Sürücüyü güncelle. Güncellemeyi bilmiyorsan Windows 10'a geç. 7 için destek vermiyoruz.
Kod:IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: fffff8a000d9e618, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000001, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: fffff800033386fd, address which referenced memory Debugging Details: ------------------ GetUlongPtrFromAddress: unable to read from fffff80003304300 KEY_VALUES_STRING: 1 Key : Analysis.CPU.Sec Value: 1 Key : Analysis.Elapsed.Sec Value: 1 Key : Analysis.Memory.CommitPeak.Mb Value: 62 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700 SYSTEM_MANUFACTURER: Hewlett-Packard SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC SYSTEM_SKU: J4T62EA#AB8 SYSTEM_VERSION: 0991100000000000000600087 BIOS_VENDOR: Insyde BIOS_VERSION: F.43 BIOS_DATE: 12/19/2017 BASEBOARD_MANUFACTURER: Hewlett-Packard BASEBOARD_PRODUCT: 2211 BASEBOARD_VERSION: 86.56 DUMP_TYPE: 2 BUGCHECK_P1: fffff8a000d9e618 BUGCHECK_P2: 2 BUGCHECK_P3: 1 BUGCHECK_P4: fffff800033386fd WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80003304100 Unable to get MmSystemRangeStart GetUlongPtrFromAddress: unable to read from fffff800033042f0 GetUlongPtrFromAddress: unable to read from fffff800033044a8 GetPointerFromAddress: unable to read from fffff800033040d8 fffff8a000d9e618 Paged pool CURRENT_IRQL: 2 FAULTING_IP: nt!HvpDoAllocateCell+101 fffff800`033386fd 89443d00 mov dword ptr [rbp+rdi],eax CPU_COUNT: 4 CPU_MHZ: 6a0 CPU_VENDOR: GenuineIntel CPU_FAMILY: 6 CPU_MODEL: 45 CPU_STEPPING: 1 CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init) CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT BUGCHECK_STR: 0xA PROCESS_NAME: System ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5 ANALYSIS_SESSION_TIME: 06-17-2019 20:48:20.0473 ANALYSIS_VERSION: 10.0.18869.1002 amd64fre TRAP_FRAME: fffff80004423950 -- (.trap 0xfffff80004423950) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=00000000000039e8 rbx=0000000000000000 rcx=00000000000005e8 rdx=0000000000000008 rsi=0000000000000000 rdi=0000000000000000 rip=fffff800033386fd rsp=fffff80004423ae0 rbp=0000000000000030 r8=fffff8a000024010 r9=0000000000000005 r10=fffff8a000d9e000 r11=0000000000000000 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl nz na po nc nt!HvpDoAllocateCell+0x101: fffff800`033386fd 89443d00 mov dword ptr [rbp+rdi],eax ss:0018:00000000`00000030=???????? Resetting default scope LAST_CONTROL_TRANSFER: from fffff80003108f69 to fffff800030faba0 STACK_TEXT: fffff800`04423808 fffff800`03108f69 : 00000000`0000000a fffff8a0`00d9e618 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx fffff800`04423810 fffff800`03106d88 : 00000000`00000001 fffff8a0`00d9e618 00000000`00000000 fffff8a0`00024010 : nt!KiBugCheckDispatch+0x69 fffff800`04423950 fffff800`033386fd : fffff8a0`00024010 fffff8a0`00024010 fffff8a0`00053ae0 00000000`00000000 : nt!KiPageFault+0x448 fffff800`04423ae0 fffff800`0337ad0d : fffff8a0`00024010 00000000`00000000 00000000`00000000 00000000`ffffffff : nt!HvpDoAllocateCell+0x101 fffff800`04423b40 fffff800`0337ab9d : 00000000`00000000 fffff8a0`05585c30 00000000`00000008 fffff800`03368d5c : nt!HvAllocateCell+0x55 fffff800`04423b70 fffff800`0332d4bf : fffff8a0`00024010 fffff8a0`00024010 fffff8a0`05593640 fffff800`04423e18 : nt!CmpAddValueKeyNew+0x69 fffff800`04423c40 fffff800`035136a3 : 01d4f094`f66bc44b fffff800`04423ff0 fffff8a0`0085fa70 00000000`00000000 : nt!CmpSetValueKeyNew+0x77 fffff800`04423c90 fffff800`03338531 : fffff8a0`14bbfca0 fffff800`04423e18 fffffa80`00000004 fffff800`04424210 : nt!CmSetValueKey+0xba3 fffff800`04423dd0 fffff800`03108bd3 : ffffffff`80000bec 00000000`00000002 fffffa80`00000000 fffff800`00000004 : nt!NtSetValueKey+0x349 fffff800`04423f00 fffff800`030fe3b0 : fffff800`0344f272 fffff800`04424248 fffff880`014b9152 00000000`539f0000 : nt!KiSystemServiceCopyEnd+0x13 fffff800`04424108 fffff800`0344f272 : fffff800`04424248 fffff880`014b9152 00000000`539f0000 fffff800`04424270 : nt!KiServiceLinkage fffff800`04424110 fffff880`014c0d96 : 00000000`00000004 fffffa80`071c5250 00000000`00000000 00000000`000007ff : nt!RtlWriteRegistryValue+0x62 fffff800`04424170 fffff880`04f2698d : fffff800`04424270 fffff880`05135c28 00000000`00000000 00000000`00000000 : ndis!NdisWriteConfiguration+0x156 fffff800`044241d0 fffff800`04424270 : fffff880`05135c28 00000000`00000000 00000000`00000000 fffff800`001801a9 : netr28x+0x4b98d fffff800`044241d8 fffff880`05135c28 : 00000000`00000000 00000000`00000000 fffff800`001801a9 fffffa80`059cb1a0 : 0xfffff800`04424270 fffff800`044241e0 00000000`00000000 : 00000000`00000000 fffff800`001801a9 fffffa80`059cb1a0 fffff800`00000000 : netr28x+0x25ac28 THREAD_SHA1_HASH_MOD_FUNC: 80858fdf941bd645ff48b6997b30f63ac59926fb THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 394aafee51f76470053fa2102b9df0f0f7df42a3 THREAD_SHA1_HASH_MOD: 5d50876435db08b990ce5928fe5c90526c26b16c FOLLOWUP_IP: netr28x+4b98d fffff880`04f2698d ?? ??? SYMBOL_STACK_INDEX: d SYMBOL_NAME: netr28x+4b98d FOLLOWUP_NAME: MachineOwner MODULE_NAME: netr28x IMAGE_NAME: netr28x.sys DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a STACK_COMMAND: .thread ; .cxr ; kb FAILURE_BUCKET_ID: X64_0xA_netr28x+4b98d BUCKET_ID: X64_0xA_netr28x+4b98d PRIMARY_PROBLEM_CLASS: X64_0xA_netr28x+4b98d TARGET_TIME: 2019-04-11T18:32:48.000Z OSBUILD: 7601 OSSERVICEPACK: 1000 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 7 OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 2019-03-06 05:38:53 BUILDDATESTAMP_STR: 190305-1700 BUILDLAB_STR: win7sp1_ldr_escrow BUILDOSVER_STR: 6.1.7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700 ANALYSIS_SESSION_ELAPSED_TIME: 7ae ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:x64_0xa_netr28x+4b98d FAILURE_ID_HASH: {a6eb3f60-a5c3-0bd6-051c-41bf4427925d} Followup: MachineOwner --------- INVALID_PROCESS_ATTACH_ATTEMPT (5) Arguments: Arg1: fffffa80042b49b0 Arg2: fffffa80050a0160 Arg3: 0000000000000000 Arg4: 0000000000000001 Debugging Details: ------------------ GetUlongPtrFromAddress: unable to read from fffff800032a0300 KEY_VALUES_STRING: 1 Key : Analysis.CPU.Sec Value: 2 Key : Analysis.Elapsed.Sec Value: 2 Key : Analysis.Memory.CommitPeak.Mb Value: 62 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700 SYSTEM_MANUFACTURER: Hewlett-Packard SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC SYSTEM_SKU: J4T62EA#AB8 SYSTEM_VERSION: 0991100000000000000600087 BIOS_VENDOR: Insyde BIOS_VERSION: F.43 BIOS_DATE: 12/19/2017 BASEBOARD_MANUFACTURER: Hewlett-Packard BASEBOARD_PRODUCT: 2211 BASEBOARD_VERSION: 86.56 DUMP_TYPE: 2 BUGCHECK_P1: fffffa80042b49b0 BUGCHECK_P2: fffffa80050a0160 BUGCHECK_P3: 0 BUGCHECK_P4: 1 CPU_COUNT: 4 CPU_MHZ: 6a0 CPU_VENDOR: GenuineIntel CPU_FAMILY: 6 CPU_MODEL: 45 CPU_STEPPING: 1 CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init) CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT BUGCHECK_STR: 0x5 PROCESS_NAME: PointBlank.exe CURRENT_IRQL: 2 ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5 ANALYSIS_SESSION_TIME: 06-17-2019 20:57:04.0108 ANALYSIS_VERSION: 10.0.18869.1002 amd64fre DPC_STACK_BASE: FFFFF80004428FB0 LOCK_ADDRESS: fffff80003273240 -- (!locks fffff80003273240) Cannot get _ERESOURCE type Resource @ nt!PiEngineLock (0xfffff80003273240) Available 1 total locks PNP_TRIAGE_DATA: Lock address : 0xfffff80003273240 Thread Count : 0 Thread address: 0x0000000000000000 Thread wait : 0x0 LAST_CONTROL_TRANSFER: from fffff80003045602 to fffff80003096ba0 STACK_TEXT: fffff800`04427cc8 fffff800`03045602 : 00000000`00000005 fffffa80`042b49b0 fffffa80`050a0160 00000000`00000000 : nt!KeBugCheckEx fffff800`04427cd0 fffff800`032ee127 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeStackAttachProcess+0x52 fffff800`04427d50 fffff800`032ee4bf : 00000000`00000000 fffff8a0`00000000 fffff8a0`00001910 00000000`00000000 : nt!ObpDecrementHandleCount+0x177 fffff800`04427dd0 fffff800`032ee1e4 : 00000000`00000d08 fffffa80`050a0160 fffff8a0`00001910 00000000`00000d08 : nt!ObpCloseHandleTableEntry+0xaf fffff800`04427e60 fffff800`030a4bd3 : fffffa80`04b87b50 fffff800`04427f30 fffff800`03358230 fffff800`032e476a : nt!ObpCloseHandle+0x94 fffff800`04427eb0 fffff800`0309a3b0 : fffff800`03331da3 fffffa80`04ea4a10 fffff800`03358230 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 fffff800`04428048 fffff800`03331da3 : fffffa80`04ea4a10 fffff800`03358230 00000000`00000000 00000000`00000000 : nt!KiServiceLinkage fffff800`04428050 fffff800`0333baa8 : fffffa80`04ea4a10 00000000`00000001 fffffa80`04ea2740 00000000`00000000 : nt!PiGetDeviceRegistryProperty+0xab fffff800`044281b0 fffff800`03330ac0 : fffffa80`04ea4a10 fffffa80`04ea4a10 00000000`00000000 00000000`00000000 : nt!IoGetDeviceProperty+0xbc fffff800`04428290 fffff800`03341f81 : 00000000`ffff0000 fffffa80`0802b150 fffff880`01553110 fffffa80`05bb6220 : nt!IopOpenOrCreateDeviceRegistryKey+0x14c fffff800`04428450 fffff880`01598152 : 00000000`c0000001 fffff800`044285e0 00000000`00000000 00000000`000007ff : nt!IoOpenDeviceRegistryKey+0x11 fffff800`04428490 fffff880`01503b34 : fffff800`044285e0 fffff800`044285b8 fffffa80`05c461a0 fffff800`035e0000 : ndis!NdisOpenConfiguration+0xb2 fffff800`044284d0 fffff880`0508b94f : fffffa80`00000000 fffff800`044285e0 fffff880`0529ac28 00000000`00000000 : ndis!NdisOpenConfigurationEx+0xa4 fffff800`04428540 fffffa80`00000000 : fffff800`044285e0 fffff880`0529ac28 00000000`00000000 00000000`001801a9 : netr28x+0x4b94f fffff800`04428548 fffff800`044285e0 : fffff880`0529ac28 00000000`00000000 00000000`001801a9 fffffa80`05c461a0 : 0xfffffa80`00000000 fffff800`04428550 fffff880`0529ac28 : 00000000`00000000 00000000`001801a9 fffffa80`05c461a0 00000000`00000000 : 0xfffff800`044285e0 fffff800`04428558 00000000`00000000 : 00000000`001801a9 fffffa80`05c461a0 00000000`00000000 fffffa80`0742b540 : netr28x+0x25ac28 THREAD_SHA1_HASH_MOD_FUNC: 1764d353450a941fbc74295279ec02651c3d9814 THREAD_SHA1_HASH_MOD_FUNC_OFFSET: bdc70d393af014c177e84e60c668cc911acaf71f THREAD_SHA1_HASH_MOD: 9a9dca34541ae91666e3989df373f06b6e683623 FOLLOWUP_IP: netr28x+4b94f fffff880`0508b94f ?? ??? SYMBOL_STACK_INDEX: d SYMBOL_NAME: netr28x+4b94f FOLLOWUP_NAME: MachineOwner MODULE_NAME: netr28x IMAGE_NAME: netr28x.sys DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a STACK_COMMAND: .thread ; .cxr ; kb FAILURE_BUCKET_ID: X64_0x5_netr28x+4b94f BUCKET_ID: X64_0x5_netr28x+4b94f PRIMARY_PROBLEM_CLASS: X64_0x5_netr28x+4b94f TARGET_TIME: 2019-05-01T21:53:50.000Z OSBUILD: 7601 OSSERVICEPACK: 1000 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 7 OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 2019-03-21 04:38:47 BUILDDATESTAMP_STR: 190320-1700 BUILDLAB_STR: win7sp1_ldr_escrow BUILDOSVER_STR: 6.1.7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700 ANALYSIS_SESSION_ELAPSED_TIME: 8cb ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:x64_0x5_netr28x+4b94f FAILURE_ID_HASH: {43753b0b-e234-1a01-8468-7eed644d41ea} Followup: MachineOwner INVALID_PROCESS_ATTACH_ATTEMPT (5) Arguments: Arg1: fffffa80042ce9b0 Arg2: fffffa8005d11370 Arg3: 0000000000000000 Arg4: 0000000000000001 Debugging Details: ------------------ GetUlongPtrFromAddress: unable to read from fffff800032b3300 KEY_VALUES_STRING: 1 Key : Analysis.CPU.Sec Value: 2 Key : Analysis.Elapsed.Sec Value: 2 Key : Analysis.Memory.CommitPeak.Mb Value: 62 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700 SYSTEM_MANUFACTURER: Hewlett-Packard SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC SYSTEM_SKU: J4T62EA#AB8 SYSTEM_VERSION: 0991100000000000000600087 BIOS_VENDOR: Insyde BIOS_VERSION: F.43 BIOS_DATE: 12/19/2017 BASEBOARD_MANUFACTURER: Hewlett-Packard BASEBOARD_PRODUCT: 2211 BASEBOARD_VERSION: 86.56 DUMP_TYPE: 2 BUGCHECK_P1: fffffa80042ce9b0 BUGCHECK_P2: fffffa8005d11370 BUGCHECK_P3: 0 BUGCHECK_P4: 1 CPU_COUNT: 4 CPU_MHZ: 6a0 CPU_VENDOR: GenuineIntel CPU_FAMILY: 6 CPU_MODEL: 45 CPU_STEPPING: 1 CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init) CUSTOMER_CRASH_COUNT: 2 DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT BUGCHECK_STR: 0x5 PROCESS_NAME: audiodg.exe CURRENT_IRQL: 2 ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5 ANALYSIS_SESSION_TIME: 06-17-2019 20:49:02.0621 ANALYSIS_VERSION: 10.0.18869.1002 amd64fre DPC_STACK_BASE: FFFFF80000BA2FB0 LOCK_ADDRESS: fffff80003286240 -- (!locks fffff80003286240) Cannot get _ERESOURCE type Resource @ nt!PiEngineLock (0xfffff80003286240) Available 1 total locks PNP_TRIAGE_DATA: Lock address : 0xfffff80003286240 Thread Count : 0 Thread address: 0x0000000000000000 Thread wait : 0x0 LAST_CONTROL_TRANSFER: from fffff80003058602 to fffff800030a9ba0 STACK_TEXT: fffff800`00ba1cc8 fffff800`03058602 : 00000000`00000005 fffffa80`042ce9b0 fffffa80`05d11370 00000000`00000000 : nt!KeBugCheckEx fffff800`00ba1cd0 fffff800`03301127 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeStackAttachProcess+0x52 fffff800`00ba1d50 fffff800`033014bf : 00000000`00000000 fffff8a0`00000000 fffff8a0`00001910 00000000`00000000 : nt!ObpDecrementHandleCount+0x177 fffff800`00ba1dd0 fffff800`033011e4 : 00000000`00000e48 fffffa80`05d11370 fffff8a0`00001910 00000000`00000e48 : nt!ObpCloseHandleTableEntry+0xaf fffff800`00ba1e60 fffff800`030b7bd3 : fffffa80`05d7ba00 fffff800`00ba1f30 fffff800`0336b230 fffff800`032f776a : nt!ObpCloseHandle+0x94 fffff800`00ba1eb0 fffff800`030ad3b0 : fffff800`03344da3 fffffa80`04e9e060 fffff800`0336b230 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 fffff800`00ba2048 fffff800`03344da3 : fffffa80`04e9e060 fffff800`0336b230 00000000`00000000 00000000`00000000 : nt!KiServiceLinkage fffff800`00ba2050 fffff800`0334eaa8 : fffffa80`04e9e060 00000000`00000001 fffffa80`04e9d6e0 00000000`00000000 : nt!PiGetDeviceRegistryProperty+0xab fffff800`00ba21b0 fffff800`03343ac0 : fffffa80`04e9e060 fffffa80`04e9e060 00000000`00000000 00000000`00000000 : nt!IoGetDeviceProperty+0xbc fffff800`00ba2290 fffff800`03354f81 : 00000000`ffff0000 fffffa80`05086440 fffff880`01482110 fffffa80`05b713f0 : nt!IopOpenOrCreateDeviceRegistryKey+0x14c fffff800`00ba2450 fffff880`014c7152 : fffffa80`04a3fd50 fffff800`00ba25e0 fffffa80`05f48a78 00000000`000007ff : nt!IoOpenDeviceRegistryKey+0x11 fffff800`00ba2490 fffff880`01432b34 : fffff800`00ba25e0 fffff800`00ba25b8 fffffa80`05b6d1a0 fffff880`014dd21d : ndis!NdisOpenConfiguration+0xb2 fffff800`00ba24d0 fffff880`0512a94f : fffffa80`00000000 fffff800`00ba25e0 fffff880`05339c28 00000000`00000000 : ndis!NdisOpenConfigurationEx+0xa4 fffff800`00ba2540 fffffa80`00000000 : fffff800`00ba25e0 fffff880`05339c28 00000000`00000000 00000000`001801a9 : netr28x+0x4b94f fffff800`00ba2548 fffff800`00ba25e0 : fffff880`05339c28 00000000`00000000 00000000`001801a9 fffffa80`05b6d1a0 : 0xfffffa80`00000000 fffff800`00ba2550 fffff880`05339c28 : 00000000`00000000 00000000`001801a9 fffffa80`05b6d1a0 fffffa80`00000000 : 0xfffff800`00ba25e0 fffff800`00ba2558 00000000`00000000 : 00000000`001801a9 fffffa80`05b6d1a0 fffffa80`00000000 fffff880`05136e2e : netr28x+0x25ac28 THREAD_SHA1_HASH_MOD_FUNC: 1764d353450a941fbc74295279ec02651c3d9814 THREAD_SHA1_HASH_MOD_FUNC_OFFSET: bdc70d393af014c177e84e60c668cc911acaf71f THREAD_SHA1_HASH_MOD: 9a9dca34541ae91666e3989df373f06b6e683623 FOLLOWUP_IP: netr28x+4b94f fffff880`0512a94f ?? ??? SYMBOL_STACK_INDEX: d SYMBOL_NAME: netr28x+4b94f FOLLOWUP_NAME: MachineOwner MODULE_NAME: netr28x IMAGE_NAME: netr28x.sys DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a STACK_COMMAND: .thread ; .cxr ; kb FAILURE_BUCKET_ID: X64_0x5_netr28x+4b94f BUCKET_ID: X64_0x5_netr28x+4b94f PRIMARY_PROBLEM_CLASS: X64_0x5_netr28x+4b94f TARGET_TIME: 2019-04-27T20:53:09.000Z OSBUILD: 7601 OSSERVICEPACK: 1000 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 7 OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 2019-03-21 04:38:47 BUILDDATESTAMP_STR: 190320-1700 BUILDLAB_STR: win7sp1_ldr_escrow BUILDOSVER_STR: 6.1.7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700 ANALYSIS_SESSION_ELAPSED_TIME: 89c ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:x64_0x5_netr28x+4b94f FAILURE_ID_HASH: {43753b0b-e234-1a01-8468-7eed644d41ea} Followup: MachineOwner --------- INVALID_PROCESS_ATTACH_ATTEMPT (5) Arguments: Arg1: fffffa80042b49b0 Arg2: fffffa8004ee55f0 Arg3: 0000000000000000 Arg4: 0000000000000001 Debugging Details: ------------------ GetUlongPtrFromAddress: unable to read from fffff800032b0300 KEY_VALUES_STRING: 1 Key : Analysis.CPU.Sec Value: 2 Key : Analysis.Elapsed.Sec Value: 2 Key : Analysis.Memory.CommitPeak.Mb Value: 62 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700 SYSTEM_MANUFACTURER: Hewlett-Packard SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC SYSTEM_SKU: J4T62EA#AB8 SYSTEM_VERSION: 0991100000000000000600087 BIOS_VENDOR: Insyde BIOS_VERSION: F.43 BIOS_DATE: 12/19/2017 BASEBOARD_MANUFACTURER: Hewlett-Packard BASEBOARD_PRODUCT: 2211 BASEBOARD_VERSION: 86.56 DUMP_TYPE: 2 BUGCHECK_P1: fffffa80042b49b0 BUGCHECK_P2: fffffa8004ee55f0 BUGCHECK_P3: 0 BUGCHECK_P4: 1 CPU_COUNT: 4 CPU_MHZ: 6a0 CPU_VENDOR: GenuineIntel CPU_FAMILY: 6 CPU_MODEL: 45 CPU_STEPPING: 1 CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init) CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT BUGCHECK_STR: 0x5 PROCESS_NAME: PointBlank.exe CURRENT_IRQL: 2 ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5 ANALYSIS_SESSION_TIME: 06-17-2019 20:48:58.0829 ANALYSIS_VERSION: 10.0.18869.1002 amd64fre DPC_STACK_BASE: FFFFF8000441FFB0 LOCK_ADDRESS: fffff80003283240 -- (!locks fffff80003283240) Cannot get _ERESOURCE type Resource @ nt!PiEngineLock (0xfffff80003283240) Available 1 total locks PNP_TRIAGE_DATA: Lock address : 0xfffff80003283240 Thread Count : 0 Thread address: 0x0000000000000000 Thread wait : 0x0 LAST_CONTROL_TRANSFER: from fffff80003055602 to fffff800030a6ba0 STACK_TEXT: fffff800`0441ecc8 fffff800`03055602 : 00000000`00000005 fffffa80`042b49b0 fffffa80`04ee55f0 00000000`00000000 : nt!KeBugCheckEx fffff800`0441ecd0 fffff800`032fe127 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeStackAttachProcess+0x52 fffff800`0441ed50 fffff800`032fe4bf : 00000000`00000000 fffff8a0`00000000 fffff8a0`00001910 00000000`00000000 : nt!ObpDecrementHandleCount+0x177 fffff800`0441edd0 fffff800`032fe1e4 : 00000000`00000a80 fffffa80`04ee55f0 fffff8a0`00001910 00000000`00000a80 : nt!ObpCloseHandleTableEntry+0xaf fffff800`0441ee60 fffff800`030b4bd3 : fffffa80`0861e940 fffff800`0441ef30 fffff800`03368230 fffff800`032f476a : nt!ObpCloseHandle+0x94 fffff800`0441eeb0 fffff800`030aa3b0 : fffff800`03341da3 fffffa80`04d31a10 fffff800`03368230 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 fffff800`0441f048 fffff800`03341da3 : fffffa80`04d31a10 fffff800`03368230 00000000`00000000 00000000`00000000 : nt!KiServiceLinkage fffff800`0441f050 fffff800`0334baa8 : fffffa80`04d31a10 00000000`00000001 fffffa80`04d2d740 00000000`00000000 : nt!PiGetDeviceRegistryProperty+0xab fffff800`0441f1b0 fffff800`03340ac0 : fffffa80`04d31a10 fffffa80`04d31a10 00000000`00000000 00000000`00000000 : nt!IoGetDeviceProperty+0xbc fffff800`0441f290 fffff800`03351f81 : 00000000`ffff0000 fffffa80`046a8bd0 fffff880`014c6110 fffffa80`05a70cf0 : nt!IopOpenOrCreateDeviceRegistryKey+0x14c fffff800`0441f450 fffff880`0150b152 : fffffa80`07393890 fffff800`0441f5e0 00000000`0000001f 00000000`000007ff : nt!IoOpenDeviceRegistryKey+0x11 fffff800`0441f490 fffff880`01476b34 : fffff800`0441f5e0 fffff800`0441f5b8 fffffa80`05a6f1a0 fffff800`035f7be3 : ndis!NdisOpenConfiguration+0xb2 fffff800`0441f4d0 fffff880`04e7694f : fffffa80`00000000 fffff800`0441f5e0 fffff880`05085c28 00000000`00000000 : ndis!NdisOpenConfigurationEx+0xa4 fffff800`0441f540 fffffa80`00000000 : fffff800`0441f5e0 fffff880`05085c28 00000000`00000000 00000000`001801a9 : netr28x+0x4b94f fffff800`0441f548 fffff800`0441f5e0 : fffff880`05085c28 00000000`00000000 00000000`001801a9 fffffa80`05a6f1a0 : 0xfffffa80`00000000 fffff800`0441f550 fffff880`05085c28 : 00000000`00000000 00000000`001801a9 fffffa80`05a6f1a0 00000000`00000000 : 0xfffff800`0441f5e0 fffff800`0441f558 00000000`00000000 : 00000000`001801a9 fffffa80`05a6f1a0 00000000`00000000 fffffa80`0452e670 : netr28x+0x25ac28 THREAD_SHA1_HASH_MOD_FUNC: 1764d353450a941fbc74295279ec02651c3d9814 THREAD_SHA1_HASH_MOD_FUNC_OFFSET: bdc70d393af014c177e84e60c668cc911acaf71f THREAD_SHA1_HASH_MOD: 9a9dca34541ae91666e3989df373f06b6e683623 FOLLOWUP_IP: netr28x+4b94f fffff880`04e7694f ?? ??? SYMBOL_STACK_INDEX: d SYMBOL_NAME: netr28x+4b94f FOLLOWUP_NAME: MachineOwner MODULE_NAME: netr28x IMAGE_NAME: netr28x.sys DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a STACK_COMMAND: .thread ; .cxr ; kb FAILURE_BUCKET_ID: X64_0x5_netr28x+4b94f BUCKET_ID: X64_0x5_netr28x+4b94f PRIMARY_PROBLEM_CLASS: X64_0x5_netr28x+4b94f TARGET_TIME: 2019-04-21T09:57:22.000Z OSBUILD: 7601 OSSERVICEPACK: 1000 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 7 OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 2019-03-21 04:38:47 BUILDDATESTAMP_STR: 190320-1700 BUILDLAB_STR: win7sp1_ldr_escrow BUILDOSVER_STR: 6.1.7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700 ANALYSIS_SESSION_ELAPSED_TIME: 8dc ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:x64_0x5_netr28x+4b94f FAILURE_ID_HASH: {43753b0b-e234-1a01-8468-7eed644d41ea} Followup: MachineOwner --------- IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: fffff8a000f95c5c, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000000, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: fffff8000334077c, address which referenced memory Debugging Details: ------------------ GetUlongPtrFromAddress: unable to read from fffff800032f7300 KEY_VALUES_STRING: 1 Key : Analysis.CPU.Sec Value: 1 Key : Analysis.Elapsed.Sec Value: 2 Key : Analysis.Memory.CommitPeak.Mb Value: 62 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700 SYSTEM_MANUFACTURER: Hewlett-Packard SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC SYSTEM_SKU: J4T62EA#AB8 SYSTEM_VERSION: 0991100000000000000600087 BIOS_VENDOR: Insyde BIOS_VERSION: F.43 BIOS_DATE: 12/19/2017 BASEBOARD_MANUFACTURER: Hewlett-Packard BASEBOARD_PRODUCT: 2211 BASEBOARD_VERSION: 86.56 DUMP_TYPE: 2 BUGCHECK_P1: fffff8a000f95c5c BUGCHECK_P2: 2 BUGCHECK_P3: 0 BUGCHECK_P4: fffff8000334077c READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800032f7100 Unable to get MmSystemRangeStart GetUlongPtrFromAddress: unable to read from fffff800032f72f0 GetUlongPtrFromAddress: unable to read from fffff800032f74a8 GetPointerFromAddress: unable to read from fffff800032f70d8 fffff8a000f95c5c Paged pool CURRENT_IRQL: 2 FAULTING_IP: nt!CmpFindValueByNameFromCache+12c fffff800`0334077c 41f6401001 test byte ptr [r8+10h],1 CPU_COUNT: 4 CPU_MHZ: 6a0 CPU_VENDOR: GenuineIntel CPU_FAMILY: 6 CPU_MODEL: 45 CPU_STEPPING: 1 CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init) CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT BUGCHECK_STR: 0xA PROCESS_NAME: System ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5 ANALYSIS_SESSION_TIME: 06-17-2019 20:48:55.0594 ANALYSIS_VERSION: 10.0.18869.1002 amd64fre DPC_STACK_BASE: FFFFF80000BA2FB0 TRAP_FRAME: fffff80000ba1d00 -- (.trap 0xfffff80000ba1d00) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000c64c48 rbx=0000000000000000 rcx=fffff80000ba1fa1 rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000 rip=fffff8000334077c rsp=fffff80000ba1e90 rbp=fffff80000ba2360 r8=fffff8a000f95c4c r9=000000000000ffff r10=fffffa8005aaacfc r11=fffff8a0018b9b46 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl zr na po nc nt!CmpFindValueByNameFromCache+0x12c: fffff800`0334077c 41f6401001 test byte ptr [r8+10h],1 ds:fffff8a0`00f95c5c=01 Resetting default scope LAST_CONTROL_TRANSFER: from fffff800030fbf69 to fffff800030edba0 STACK_TEXT: fffff800`00ba1bb8 fffff800`030fbf69 : 00000000`0000000a fffff8a0`00f95c5c 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx fffff800`00ba1bc0 fffff800`030f9d88 : 00000000`00000000 fffff8a0`00f95c5c fffffa80`05191000 fffff8a0`00024010 : nt!KiBugCheckDispatch+0x69 fffff800`00ba1d00 fffff800`0334077c : fffff8a0`00024010 fffff8a0`00024010 fffff8a0`00048c80 00000000`00000000 : nt!KiPageFault+0x448 fffff800`00ba1e90 fffff800`03323c38 : fffff8a0`15bf1de8 fffff800`00ba2188 fffff800`00ba1fd0 fffff800`00ba1fb8 : nt!CmpFindValueByNameFromCache+0x12c fffff800`00ba1f60 fffff800`035061e7 : fffff8a0`15bf1de8 01d4f7b8`449491c9 fffff8a0`15bf1de8 00000000`00000000 : nt!CmpCompareNewValueDataAgainstKCBCache+0x78 fffff800`00ba2000 fffff800`0332b531 : fffff8a0`1f297040 fffff800`00ba2188 fffffa80`00000004 fffff800`00ba2580 : nt!CmSetValueKey+0x6a7 fffff800`00ba2140 fffff800`030fbbd3 : ffffffff`80000cc8 00000000`00000002 fffffa80`00000000 fffff800`00000004 : nt!NtSetValueKey+0x349 fffff800`00ba2270 fffff800`030f13b0 : fffff800`034422a2 fffff800`00ba25b8 fffff880`01514152 00000000`c0000001 : nt!KiSystemServiceCopyEnd+0x13 fffff800`00ba2478 fffff800`034422a2 : fffff800`00ba25b8 fffff880`01514152 00000000`c0000001 fffff800`00ba25e0 : nt!KiServiceLinkage fffff800`00ba2480 fffff880`0151bd96 : 00000000`00000004 fffffa80`05aaacf0 00000100`00000000 00000000`000007ff : nt!RtlWriteRegistryValue+0x62 fffff800`00ba24e0 fffff880`0514a98d : fffff800`00ba25e0 fffff880`05359c28 00000000`00000000 00000000`00000000 : ndis!NdisWriteConfiguration+0x156 fffff800`00ba2540 fffff800`00ba25e0 : fffff880`05359c28 00000000`00000000 00000000`00000000 fffffa80`001801a9 : netr28x+0x4b98d fffff800`00ba2548 fffff880`05359c28 : 00000000`00000000 00000000`00000000 fffffa80`001801a9 fffffa80`05b411a0 : 0xfffff800`00ba25e0 fffff800`00ba2550 00000000`00000000 : 00000000`00000000 fffffa80`001801a9 fffffa80`05b411a0 00000000`00000000 : netr28x+0x25ac28 THREAD_SHA1_HASH_MOD_FUNC: 935105e89958188e75032d802c31088ef212f1d5 THREAD_SHA1_HASH_MOD_FUNC_OFFSET: d6275099b99a3ef75c037e31f081aba5025e8f89 THREAD_SHA1_HASH_MOD: 7921e317582c7f98a7f13cfbcd3c02a86fdcafec FOLLOWUP_IP: netr28x+4b98d fffff880`0514a98d ?? ??? SYMBOL_STACK_INDEX: b SYMBOL_NAME: netr28x+4b98d FOLLOWUP_NAME: MachineOwner MODULE_NAME: netr28x IMAGE_NAME: netr28x.sys DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a STACK_COMMAND: .thread ; .cxr ; kb FAILURE_BUCKET_ID: X64_0xA_netr28x+4b98d BUCKET_ID: X64_0xA_netr28x+4b98d PRIMARY_PROBLEM_CLASS: X64_0xA_netr28x+4b98d TARGET_TIME: 2019-04-20T20:33:09.000Z OSBUILD: 7601 OSSERVICEPACK: 1000 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 7 OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 2019-03-21 04:38:47 BUILDDATESTAMP_STR: 190320-1700 BUILDLAB_STR: win7sp1_ldr_escrow BUILDOSVER_STR: 6.1.7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700 ANALYSIS_SESSION_ELAPSED_TIME: 7e6 ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:x64_0xa_netr28x+4b98d FAILURE_ID_HASH: {a6eb3f60-a5c3-0bd6-051c-41bf4427925d} Followup: MachineOwner --------- INVALID_PROCESS_ATTACH_ATTEMPT (5) Arguments: Arg1: fffffa80042d09b0 Arg2: fffffa80075e8060 Arg3: 0000000000000000 Arg4: 0000000000000001 Debugging Details: ------------------ GetUlongPtrFromAddress: unable to read from fffff800032af300 KEY_VALUES_STRING: 1 Key : Analysis.CPU.Sec Value: 2 Key : Analysis.Elapsed.Sec Value: 2 Key : Analysis.Memory.CommitPeak.Mb Value: 62 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700 SYSTEM_MANUFACTURER: Hewlett-Packard SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC SYSTEM_SKU: J4T62EA#AB8 SYSTEM_VERSION: 0991100000000000000600087 BIOS_VENDOR: Insyde BIOS_VERSION: F.43 BIOS_DATE: 12/19/2017 BASEBOARD_MANUFACTURER: Hewlett-Packard BASEBOARD_PRODUCT: 2211 BASEBOARD_VERSION: 86.56 DUMP_TYPE: 2 BUGCHECK_P1: fffffa80042d09b0 BUGCHECK_P2: fffffa80075e8060 BUGCHECK_P3: 0 BUGCHECK_P4: 1 CPU_COUNT: 4 CPU_MHZ: 6a0 CPU_VENDOR: GenuineIntel CPU_FAMILY: 6 CPU_MODEL: 45 CPU_STEPPING: 1 CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init) CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT BUGCHECK_STR: 0x5 PROCESS_NAME: audiodg.exe CURRENT_IRQL: 2 ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5 ANALYSIS_SESSION_TIME: 06-17-2019 20:48:52.0836 ANALYSIS_VERSION: 10.0.18869.1002 amd64fre DPC_STACK_BASE: FFFFF8000441FFB0 LOCK_ADDRESS: fffff80003282240 -- (!locks fffff80003282240) Cannot get _ERESOURCE type Resource @ nt!PiEngineLock (0xfffff80003282240) Available 1 total locks PNP_TRIAGE_DATA: Lock address : 0xfffff80003282240 Thread Count : 0 Thread address: 0x0000000000000000 Thread wait : 0x0 LAST_CONTROL_TRANSFER: from fffff800030545f2 to fffff800030a5ba0 STACK_TEXT: fffff800`0441ecc8 fffff800`030545f2 : 00000000`00000005 fffffa80`042d09b0 fffffa80`075e8060 00000000`00000000 : nt!KeBugCheckEx fffff800`0441ecd0 fffff800`032fd127 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeStackAttachProcess+0x52 fffff800`0441ed50 fffff800`032fd4bf : 00000000`00000000 fffff8a0`00000000 fffff8a0`00001910 00000000`00000000 : nt!ObpDecrementHandleCount+0x177 fffff800`0441edd0 fffff800`032fd1e4 : 00000000`000007c8 fffffa80`075e8060 fffff8a0`00001910 00000000`000007c8 : nt!ObpCloseHandleTableEntry+0xaf fffff800`0441ee60 fffff800`030b3bd3 : fffffa80`044dab50 fffff800`0441ef30 fffff800`03367200 fffff800`032f376a : nt!ObpCloseHandle+0x94 fffff800`0441eeb0 fffff800`030a93b0 : fffff800`03340d73 fffffa80`04ddc060 fffff800`03367200 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 fffff800`0441f048 fffff800`03340d73 : fffffa80`04ddc060 fffff800`03367200 00000000`00000000 00000000`00000000 : nt!KiServiceLinkage fffff800`0441f050 fffff800`0334aa78 : fffffa80`04ddc060 00000000`00000001 fffffa80`04dd96e0 00000000`00000000 : nt!PiGetDeviceRegistryProperty+0xab fffff800`0441f1b0 fffff800`0333fa90 : fffffa80`04ddc060 fffffa80`04ddc060 00000000`00000000 00000000`00000000 : nt!IoGetDeviceProperty+0xbc fffff800`0441f290 fffff800`03350f51 : 00000000`ffff0000 fffffa80`05a69770 fffff880`014e7110 fffffa80`05ca3270 : nt!IopOpenOrCreateDeviceRegistryKey+0x14c fffff800`0441f450 fffff880`0152c152 : fffffa80`071bfdc0 fffff800`0441f5e0 00000000`0000001f 00000000`000007ff : nt!IoOpenDeviceRegistryKey+0x11 fffff800`0441f490 fffff880`01497b34 : fffff800`0441f5e0 fffff800`0441f5b8 fffffa80`05c0a1a0 fffff880`0646eab0 : ndis!NdisOpenConfiguration+0xb2 fffff800`0441f4d0 fffff880`04f0c94f : fffffa80`00000000 fffff800`0441f5e0 fffff880`0511bc28 00000000`00000000 : ndis!NdisOpenConfigurationEx+0xa4 fffff800`0441f540 fffffa80`00000000 : fffff800`0441f5e0 fffff880`0511bc28 00000000`00000000 fffffa80`001801a9 : netr28x+0x4b94f fffff800`0441f548 fffff800`0441f5e0 : fffff880`0511bc28 00000000`00000000 fffffa80`001801a9 fffffa80`05c0a1a0 : 0xfffffa80`00000000 fffff800`0441f550 fffff880`0511bc28 : 00000000`00000000 fffffa80`001801a9 fffffa80`05c0a1a0 00000000`00000000 : 0xfffff800`0441f5e0 fffff800`0441f558 00000000`00000000 : fffffa80`001801a9 fffffa80`05c0a1a0 00000000`00000000 fffff880`00e5028c : netr28x+0x25ac28 THREAD_SHA1_HASH_MOD_FUNC: 1764d353450a941fbc74295279ec02651c3d9814 THREAD_SHA1_HASH_MOD_FUNC_OFFSET: bdc70d393af014c177e84e60c668cc911acaf71f THREAD_SHA1_HASH_MOD: 9a9dca34541ae91666e3989df373f06b6e683623 FOLLOWUP_IP: netr28x+4b94f fffff880`04f0c94f ?? ??? SYMBOL_STACK_INDEX: d SYMBOL_NAME: netr28x+4b94f FOLLOWUP_NAME: MachineOwner MODULE_NAME: netr28x IMAGE_NAME: netr28x.sys DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a STACK_COMMAND: .thread ; .cxr ; kb FAILURE_BUCKET_ID: X64_0x5_netr28x+4b94f BUCKET_ID: X64_0x5_netr28x+4b94f PRIMARY_PROBLEM_CLASS: X64_0x5_netr28x+4b94f TARGET_TIME: 2019-04-11T15:07:27.000Z OSBUILD: 7601 OSSERVICEPACK: 1000 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 7 OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 2019-03-06 05:38:53 BUILDDATESTAMP_STR: 190305-1700 BUILDLAB_STR: win7sp1_ldr_escrow BUILDOSVER_STR: 6.1.7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700 ANALYSIS_SESSION_ELAPSED_TIME: 8c6 ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:x64_0x5_netr28x+4b94f FAILURE_ID_HASH: {43753b0b-e234-1a01-8468-7eed644d41ea} Followup: MachineOwner INVALID_PROCESS_ATTACH_ATTEMPT (5) Arguments: Arg1: fffffa80042b59b0 Arg2: fffffa8004c74b00 Arg3: 0000000000000001 Arg4: 0000000000000001 Debugging Details: ------------------ GetUlongPtrFromAddress: unable to read from fffff800030f3300 KEY_VALUES_STRING: 1 Key : Analysis.CPU.Sec Value: 2 Key : Analysis.Elapsed.Sec Value: 2 Key : Analysis.Memory.CommitPeak.Mb Value: 62 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700 SYSTEM_MANUFACTURER: Hewlett-Packard SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC SYSTEM_SKU: J4T62EA#AB8 SYSTEM_VERSION: 0991100000000000000600087 BIOS_VENDOR: Insyde BIOS_VERSION: F.43 BIOS_DATE: 12/19/2017 BASEBOARD_MANUFACTURER: Hewlett-Packard BASEBOARD_PRODUCT: 2211 BASEBOARD_VERSION: 86.56 DUMP_TYPE: 2 BUGCHECK_P1: fffffa80042b59b0 BUGCHECK_P2: fffffa8004c74b00 BUGCHECK_P3: 1 BUGCHECK_P4: 1 CPU_COUNT: 4 CPU_MHZ: 6a0 CPU_VENDOR: GenuineIntel CPU_FAMILY: 6 CPU_MODEL: 45 CPU_STEPPING: 1 CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init) CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT BUGCHECK_STR: 0x5 PROCESS_NAME: chrome.exe CURRENT_IRQL: 2 ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5 ANALYSIS_SESSION_TIME: 06-17-2019 20:48:49.0152 ANALYSIS_VERSION: 10.0.18869.1002 amd64fre DPC_STACK_BASE: FFFFF80000BA2FB0 LOCK_ADDRESS: fffff800030c6240 -- (!locks fffff800030c6240) Cannot get _ERESOURCE type Resource @ nt!PiEngineLock (0xfffff800030c6240) Available 1 total locks PNP_TRIAGE_DATA: Lock address : 0xfffff800030c6240 Thread Count : 0 Thread address: 0x0000000000000000 Thread wait : 0x0 LAST_CONTROL_TRANSFER: from fffff80002e985f2 to fffff80002ee9ba0 STACK_TEXT: fffff800`00ba1cc8 fffff800`02e985f2 : 00000000`00000005 fffffa80`042b59b0 fffffa80`04c74b00 00000000`00000001 : nt!KeBugCheckEx fffff800`00ba1cd0 fffff800`03141127 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeStackAttachProcess+0x52 fffff800`00ba1d50 fffff800`031414bf : 00000000`00000000 fffff8a0`00000000 fffff8a0`00001910 00000000`00000000 : nt!ObpDecrementHandleCount+0x177 fffff800`00ba1dd0 fffff800`031411e4 : 00000000`000008e4 fffffa80`04c74b00 fffff8a0`00001910 00000000`000008e4 : nt!ObpCloseHandleTableEntry+0xaf fffff800`00ba1e60 fffff800`02ef7bd3 : fffffa80`076a6b50 fffff800`00ba1f30 fffff800`031ab200 fffff800`0313776a : nt!ObpCloseHandle+0x94 fffff800`00ba1eb0 fffff800`02eed3b0 : fffff800`03184d73 fffffa80`04e1e060 fffff800`031ab200 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 fffff800`00ba2048 fffff800`03184d73 : fffffa80`04e1e060 fffff800`031ab200 00000000`00000000 00000000`00000000 : nt!KiServiceLinkage fffff800`00ba2050 fffff800`0318ea78 : fffffa80`04e1e060 00000000`00000001 fffffa80`04e1d6e0 00000000`00000000 : nt!PiGetDeviceRegistryProperty+0xab fffff800`00ba21b0 fffff800`03183a90 : fffffa80`04e1e060 fffffa80`04e1e060 00000000`00000000 00000000`00000000 : nt!IoGetDeviceProperty+0xbc fffff800`00ba2290 fffff800`03194f51 : 00000000`ffff0000 fffffa80`07df09f0 fffff880`01480110 fffffa80`05cfe910 : nt!IopOpenOrCreateDeviceRegistryKey+0x14c fffff800`00ba2450 fffff880`014c5152 : fffffa80`080038e0 fffff800`00ba25e0 fffffa80`0700aa78 00000000`000007ff : nt!IoOpenDeviceRegistryKey+0x11 fffff800`00ba2490 fffff880`01430b34 : fffff800`00ba25e0 fffff800`00ba25b8 fffffa80`055e31a0 fffff880`014db21d : ndis!NdisOpenConfiguration+0xb2 fffff800`00ba24d0 fffff880`04e5194f : 00000000`00000000 fffff800`00ba25e0 fffff880`05060c28 00000000`00000000 : ndis!NdisOpenConfigurationEx+0xa4 fffff800`00ba2540 00000000`00000000 : fffff800`00ba25e0 fffff880`05060c28 00000000`00000000 fffffa80`001801a9 : netr28x+0x4b94f THREAD_SHA1_HASH_MOD_FUNC: ae5746727567d6f3e980a5bab83b7524a5dc9ee8 THREAD_SHA1_HASH_MOD_FUNC_OFFSET: a4491f04e0c588cecd320ea5c66c026862f569ea THREAD_SHA1_HASH_MOD: 34d7ba38146ecb972065c22fa7203d72f73eccb4 FOLLOWUP_IP: netr28x+4b94f fffff880`04e5194f ?? ??? SYMBOL_STACK_INDEX: d SYMBOL_NAME: netr28x+4b94f FOLLOWUP_NAME: MachineOwner MODULE_NAME: netr28x IMAGE_NAME: netr28x.sys DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a STACK_COMMAND: .thread ; .cxr ; kb FAILURE_BUCKET_ID: X64_0x5_netr28x+4b94f BUCKET_ID: X64_0x5_netr28x+4b94f PRIMARY_PROBLEM_CLASS: X64_0x5_netr28x+4b94f TARGET_TIME: 2019-04-11T14:09:37.000Z OSBUILD: 7601 OSSERVICEPACK: 1000 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 7 OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 2019-03-06 05:38:53 BUILDDATESTAMP_STR: 190305-1700 BUILDLAB_STR: win7sp1_ldr_escrow BUILDOSVER_STR: 6.1.7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700 ANALYSIS_SESSION_ELAPSED_TIME: 941 ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:x64_0x5_netr28x+4b94f FAILURE_ID_HASH: {43753b0b-e234-1a01-8468-7eed644d41ea} Followup: MachineOwner --------- IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: fffff8a002085398, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000001, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: fffff80003ae56fd, address which referenced memory Debugging Details: ------------------ GetUlongPtrFromAddress: unable to read from fffff80003ab1300 KEY_VALUES_STRING: 1 Key : Analysis.CPU.Sec Value: 1 Key : Analysis.Elapsed.Sec Value: 1 Key : Analysis.Memory.CommitPeak.Mb Value: 62 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700 SYSTEM_MANUFACTURER: Hewlett-Packard SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC SYSTEM_SKU: J4T62EA#AB8 SYSTEM_VERSION: 0991100000000000000600087 BIOS_VENDOR: Insyde BIOS_VERSION: F.43 BIOS_DATE: 12/19/2017 BASEBOARD_MANUFACTURER: Hewlett-Packard BASEBOARD_PRODUCT: 2211 BASEBOARD_VERSION: 86.56 DUMP_TYPE: 2 BUGCHECK_P1: fffff8a002085398 BUGCHECK_P2: 2 BUGCHECK_P3: 1 BUGCHECK_P4: fffff80003ae56fd WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80003ab1100 Unable to get MmSystemRangeStart GetUlongPtrFromAddress: unable to read from fffff80003ab12f0 GetUlongPtrFromAddress: unable to read from fffff80003ab14a8 GetPointerFromAddress: unable to read from fffff80003ab10d8 fffff8a002085398 Paged pool CURRENT_IRQL: 2 FAULTING_IP: nt!HvpDoAllocateCell+101 fffff800`03ae56fd 89443d00 mov dword ptr [rbp+rdi],eax CPU_COUNT: 4 CPU_MHZ: 6a0 CPU_VENDOR: GenuineIntel CPU_FAMILY: 6 CPU_MODEL: 45 CPU_STEPPING: 1 CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init) CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT BUGCHECK_STR: 0xA PROCESS_NAME: System ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5 ANALYSIS_SESSION_TIME: 06-17-2019 20:48:46.0248 ANALYSIS_VERSION: 10.0.18869.1002 amd64fre TRAP_FRAME: fffff80004c1a950 -- (.trap 0xfffff80004c1a950) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000008 rbx=0000000000000000 rcx=0000000000000368 rdx=0000000000000002 rsi=0000000000000000 rdi=0000000000000000 rip=fffff80003ae56fd rsp=fffff80004c1aae0 rbp=0000000000000030 r8=fffff8a000024010 r9=0000000000000005 r10=fffff8a002085000 r11=0000000000000000 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl nz na pe nc nt!HvpDoAllocateCell+0x101: fffff800`03ae56fd 89443d00 mov dword ptr [rbp+rdi],eax ss:0018:00000000`00000030=???????? Resetting default scope LAST_CONTROL_TRANSFER: from fffff800038b5f69 to fffff800038a7ba0 STACK_TEXT: fffff800`04c1a808 fffff800`038b5f69 : 00000000`0000000a fffff8a0`02085398 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx fffff800`04c1a810 fffff800`038b3d88 : 00000000`00000001 fffff8a0`02085398 00000000`00000000 fffff8a0`00024010 : nt!KiBugCheckDispatch+0x69 fffff800`04c1a950 fffff800`03ae56fd : fffff8a0`00024010 fffff8a0`00024010 fffff8a0`0003b420 fffff800`00000000 : nt!KiPageFault+0x448 fffff800`04c1aae0 fffff800`03b27d1d : fffff8a0`00024010 00000000`00000000 00000000`00000000 00000000`ffffffff : nt!HvpDoAllocateCell+0x101 fffff800`04c1ab40 fffff800`03b27bad : 00000000`00000000 fffff8a0`018bcc30 00000000`00000008 fffff800`03b15d5c : nt!HvAllocateCell+0x55 fffff800`04c1ab70 fffff800`03ada4bf : fffff8a0`00024010 fffff8a0`00024010 fffff8a0`018ca640 fffff800`04c1ae18 : nt!CmpAddValueKeyNew+0x69 fffff800`04c1ac40 fffff800`03cc06e3 : 01d501ff`f5623883 fffff800`04c1aff0 fffff8a0`04468820 00000000`00000000 : nt!CmpSetValueKeyNew+0x77 fffff800`04c1ac90 fffff800`03ae5531 : fffff8a0`0506b140 fffff800`04c1ae18 fffffa80`00000004 fffff800`04c1b210 : nt!CmSetValueKey+0xba3 fffff800`04c1add0 fffff800`038b5bd3 : ffffffff`80000dc4 00000000`00000002 fffffa80`00000000 fffff800`00000004 : nt!NtSetValueKey+0x349 fffff800`04c1af00 fffff800`038ab3b0 : fffff800`03bfc2a2 fffff800`04c1b248 fffff880`01525152 fffffa80`00040001 : nt!KiSystemServiceCopyEnd+0x13 fffff800`04c1b108 fffff800`03bfc2a2 : fffff800`04c1b248 fffff880`01525152 fffffa80`00040001 fffff800`04c1b270 : nt!KiServiceLinkage fffff800`04c1b110 fffff880`0152cd96 : 00000000`00000004 fffffa80`0449b4e0 fffff880`0525c030 00000000`000007ff : nt!RtlWriteRegistryValue+0x62 fffff800`04c1b170 fffff880`050b698d : fffff800`04c1b270 fffff880`052c5c28 00000000`00000000 00000000`00000000 : ndis!NdisWriteConfiguration+0x156 fffff800`04c1b1d0 fffff800`04c1b270 : fffff880`052c5c28 00000000`00000000 00000000`00000000 fffff800`001801a9 : netr28x+0x4b98d fffff800`04c1b1d8 fffff880`052c5c28 : 00000000`00000000 00000000`00000000 fffff800`001801a9 fffffa80`05b7f1a0 : 0xfffff800`04c1b270 fffff800`04c1b1e0 00000000`00000000 : 00000000`00000000 fffff800`001801a9 fffffa80`05b7f1a0 fffff800`00000000 : netr28x+0x25ac28 THREAD_SHA1_HASH_MOD_FUNC: 80858fdf941bd645ff48b6997b30f63ac59926fb THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 394aafee51f76470053fa2102b9df0f0f7df42a3 THREAD_SHA1_HASH_MOD: 5d50876435db08b990ce5928fe5c90526c26b16c FOLLOWUP_IP: netr28x+4b98d fffff880`050b698d ?? ??? SYMBOL_STACK_INDEX: d SYMBOL_NAME: netr28x+4b98d FOLLOWUP_NAME: MachineOwner MODULE_NAME: netr28x IMAGE_NAME: netr28x.sys DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a STACK_COMMAND: .thread ; .cxr ; kb FAILURE_BUCKET_ID: X64_0xA_netr28x+4b98d BUCKET_ID: X64_0xA_netr28x+4b98d PRIMARY_PROBLEM_CLASS: X64_0xA_netr28x+4b98d TARGET_TIME: 2019-05-03T22:31:32.000Z OSBUILD: 7601 OSSERVICEPACK: 1000 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 7 OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 2019-03-21 04:38:47 BUILDDATESTAMP_STR: 190320-1700 BUILDLAB_STR: win7sp1_ldr_escrow BUILDOSVER_STR: 6.1.7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700 ANALYSIS_SESSION_ELAPSED_TIME: 7b0 ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:x64_0xa_netr28x+4b98d FAILURE_ID_HASH: {a6eb3f60-a5c3-0bd6-051c-41bf4427925d} Followup: MachineOwner --------- INVALID_PROCESS_ATTACH_ATTEMPT (5) Arguments: Arg1: fffffa80042cf9b0 Arg2: fffffa80045a46e0 Arg3: 0000000000000000 Arg4: 0000000000000001 Debugging Details: ------------------ GetUlongPtrFromAddress: unable to read from fffff800030fb300 KEY_VALUES_STRING: 1 Key : Analysis.CPU.Sec Value: 2 Key : Analysis.Elapsed.Sec Value: 2 Key : Analysis.Memory.CommitPeak.Mb Value: 62 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700 SYSTEM_MANUFACTURER: Hewlett-Packard SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC SYSTEM_SKU: J4T62EA#AB8 SYSTEM_VERSION: 0991100000000000000600087 BIOS_VENDOR: Insyde BIOS_VERSION: F.43 BIOS_DATE: 12/19/2017 BASEBOARD_MANUFACTURER: Hewlett-Packard BASEBOARD_PRODUCT: 2211 BASEBOARD_VERSION: 86.56 DUMP_TYPE: 2 BUGCHECK_P1: fffffa80042cf9b0 BUGCHECK_P2: fffffa80045a46e0 BUGCHECK_P3: 0 BUGCHECK_P4: 1 CPU_COUNT: 4 CPU_MHZ: 6a0 CPU_VENDOR: GenuineIntel CPU_FAMILY: 6 CPU_MODEL: 45 CPU_STEPPING: 1 CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init) CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT BUGCHECK_STR: 0x5 PROCESS_NAME: chrome.exe CURRENT_IRQL: 2 ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5 ANALYSIS_SESSION_TIME: 06-17-2019 20:48:24.0070 ANALYSIS_VERSION: 10.0.18869.1002 amd64fre DPC_STACK_BASE: FFFFF80000BA2FB0 LOCK_ADDRESS: fffff800030ce240 -- (!locks fffff800030ce240) Cannot get _ERESOURCE type Resource @ nt!PiEngineLock (0xfffff800030ce240) Available 1 total locks PNP_TRIAGE_DATA: Lock address : 0xfffff800030ce240 Thread Count : 0 Thread address: 0x0000000000000000 Thread wait : 0x0 LAST_CONTROL_TRANSFER: from fffff80002ea05f2 to fffff80002ef1ba0 STACK_TEXT: fffff800`00ba1cc8 fffff800`02ea05f2 : 00000000`00000005 fffffa80`042cf9b0 fffffa80`045a46e0 00000000`00000000 : nt!KeBugCheckEx fffff800`00ba1cd0 fffff800`03149127 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeStackAttachProcess+0x52 fffff800`00ba1d50 fffff800`031494bf : 00000000`00000000 fffff8a0`00000000 fffff8a0`00001910 00000000`00000000 : nt!ObpDecrementHandleCount+0x177 fffff800`00ba1dd0 fffff800`031491e4 : 00000000`00000b3c fffffa80`045a46e0 fffff8a0`00001910 00000000`00000b3c : nt!ObpCloseHandleTableEntry+0xaf fffff800`00ba1e60 fffff800`02effbd3 : fffffa80`04502060 fffff800`00ba1f30 fffff800`031b3200 fffff800`0313f76a : nt!ObpCloseHandle+0x94 fffff800`00ba1eb0 fffff800`02ef53b0 : fffff800`0318cd73 fffffa80`04ebd060 fffff800`031b3200 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 fffff800`00ba2048 fffff800`0318cd73 : fffffa80`04ebd060 fffff800`031b3200 00000000`00000000 00000000`00000000 : nt!KiServiceLinkage fffff800`00ba2050 fffff800`03196a78 : fffffa80`04ebd060 00000000`00000001 fffffa80`04eba6e0 00000000`00000000 : nt!PiGetDeviceRegistryProperty+0xab fffff800`00ba21b0 fffff800`0318ba90 : fffffa80`04ebd060 fffffa80`04ebd060 00000000`00000000 00000000`00000000 : nt!IoGetDeviceProperty+0xbc fffff800`00ba2290 fffff800`0319cf51 : 00000000`ffff0000 fffffa80`08470cb0 fffff880`0147f110 fffffa80`059fbe30 : nt!IopOpenOrCreateDeviceRegistryKey+0x14c fffff800`00ba2450 fffff880`014c4152 : fffffa80`0681f000 fffff800`00ba25e0 00000000`00000005 00000000`000007ff : nt!IoOpenDeviceRegistryKey+0x11 fffff800`00ba2490 fffff880`0142fb34 : fffff800`00ba25e0 fffff800`00ba25b8 fffffa80`05bf61a0 fffff800`02e262ea : ndis!NdisOpenConfiguration+0xb2 fffff800`00ba24d0 fffff880`0511d94f : 00000000`00000000 fffff800`00ba25e0 fffff880`0532cc28 00000000`00000000 : ndis!NdisOpenConfigurationEx+0xa4 fffff800`00ba2540 00000000`00000000 : fffff800`00ba25e0 fffff880`0532cc28 00000000`00000000 fffffa80`001801a9 : netr28x+0x4b94f THREAD_SHA1_HASH_MOD_FUNC: ae5746727567d6f3e980a5bab83b7524a5dc9ee8 THREAD_SHA1_HASH_MOD_FUNC_OFFSET: a4491f04e0c588cecd320ea5c66c026862f569ea THREAD_SHA1_HASH_MOD: 34d7ba38146ecb972065c22fa7203d72f73eccb4 FOLLOWUP_IP: netr28x+4b94f fffff880`0511d94f ?? ??? SYMBOL_STACK_INDEX: d SYMBOL_NAME: netr28x+4b94f FOLLOWUP_NAME: MachineOwner MODULE_NAME: netr28x IMAGE_NAME: netr28x.sys DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a STACK_COMMAND: .thread ; .cxr ; kb FAILURE_BUCKET_ID: X64_0x5_netr28x+4b94f BUCKET_ID: X64_0x5_netr28x+4b94f PRIMARY_PROBLEM_CLASS: X64_0x5_netr28x+4b94f TARGET_TIME: 2019-04-11T14:13:16.000Z OSBUILD: 7601 OSSERVICEPACK: 1000 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 7 OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 2019-03-06 05:38:53 BUILDDATESTAMP_STR: 190305-1700 BUILDLAB_STR: win7sp1_ldr_escrow BUILDOSVER_STR: 6.1.7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700 ANALYSIS_SESSION_ELAPSED_TIME: 851 ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:x64_0x5_netr28x+4b94f FAILURE_ID_HASH: {43753b0b-e234-1a01-8468-7eed644d41ea} Followup: MachineOwner --------- INVALID_PROCESS_ATTACH_ATTEMPT (5) Arguments: Arg1: fffffa80042ce9b0 Arg2: fffffa800b053b00 Arg3: 0000000000000000 Arg4: 0000000000000001 Debugging Details: ------------------ GetUlongPtrFromAddress: unable to read from fffff800032ed300 KEY_VALUES_STRING: 1 Key : Analysis.CPU.Sec Value: 1 Key : Analysis.Elapsed.Sec Value: 2 Key : Analysis.Memory.CommitPeak.Mb Value: 62 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700 SYSTEM_MANUFACTURER: Hewlett-Packard SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC SYSTEM_SKU: J4T62EA#AB8 SYSTEM_VERSION: 0991100000000000000600087 BIOS_VENDOR: Insyde BIOS_VERSION: F.43 BIOS_DATE: 12/19/2017 BASEBOARD_MANUFACTURER: Hewlett-Packard BASEBOARD_PRODUCT: 2211 BASEBOARD_VERSION: 86.56 DUMP_TYPE: 2 BUGCHECK_P1: fffffa80042ce9b0 BUGCHECK_P2: fffffa800b053b00 BUGCHECK_P3: 0 BUGCHECK_P4: 1 CPU_COUNT: 4 CPU_MHZ: 6a0 CPU_VENDOR: GenuineIntel CPU_FAMILY: 6 CPU_MODEL: 45 CPU_STEPPING: 1 CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init) CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT BUGCHECK_STR: 0x5 PROCESS_NAME: mcbuilder.exe CURRENT_IRQL: 2 ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5 ANALYSIS_SESSION_TIME: 06-17-2019 20:48:40.0990 ANALYSIS_VERSION: 10.0.18869.1002 amd64fre DPC_STACK_BASE: FFFFF80000BA2FB0 LOCK_ADDRESS: fffff800032c0240 -- (!locks fffff800032c0240) Cannot get _ERESOURCE type Resource @ nt!PiEngineLock (0xfffff800032c0240) Available 1 total locks PNP_TRIAGE_DATA: Lock address : 0xfffff800032c0240 Thread Count : 0 Thread address: 0x0000000000000000 Thread wait : 0x0 LAST_CONTROL_TRANSFER: from fffff800030925f2 to fffff800030e3ba0 STACK_TEXT: fffff800`00ba1cc8 fffff800`030925f2 : 00000000`00000005 fffffa80`042ce9b0 fffffa80`0b053b00 00000000`00000000 : nt!KeBugCheckEx fffff800`00ba1cd0 fffff800`0333b127 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeStackAttachProcess+0x52 fffff800`00ba1d50 fffff800`0333b4bf : 00000000`00000000 fffff8a0`00000000 fffff8a0`00001910 00000000`00000000 : nt!ObpDecrementHandleCount+0x177 fffff800`00ba1dd0 fffff800`0333b1e4 : 00000000`00000d0c fffffa80`0b053b00 fffff8a0`00001910 00000000`00000d0c : nt!ObpCloseHandleTableEntry+0xaf fffff800`00ba1e60 fffff800`030f1bd3 : fffffa80`0568b6e0 fffff800`00ba1f30 fffff800`033a5200 fffff800`0333176a : nt!ObpCloseHandle+0x94 fffff800`00ba1eb0 fffff800`030e73b0 : fffff800`0337ed73 fffffa80`04dc8060 fffff800`033a5200 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 fffff800`00ba2048 fffff800`0337ed73 : fffffa80`04dc8060 fffff800`033a5200 00000000`00000000 00000000`00000000 : nt!KiServiceLinkage fffff800`00ba2050 fffff800`03388a78 : fffffa80`04dc8060 00000000`00000001 fffffa80`04dc36e0 00000000`00000000 : nt!PiGetDeviceRegistryProperty+0xab fffff800`00ba21b0 fffff800`0337da90 : fffffa80`04dc8060 fffffa80`04dc8060 00000000`00000000 00000000`00000000 : nt!IoGetDeviceProperty+0xbc fffff800`00ba2290 fffff800`0338ef51 : 00000000`ffff0000 fffffa80`09035950 fffff880`014a0110 fffffa80`05adbd80 : nt!IopOpenOrCreateDeviceRegistryKey+0x14c fffff800`00ba2450 fffff880`014e5152 : fffffa80`00000000 fffff800`00ba25e0 00000000`00000000 00000000`000007ff : nt!IoOpenDeviceRegistryKey+0x11 fffff800`00ba2490 fffff880`01450b34 : fffff800`00ba25e0 fffff800`00ba25b8 fffffa80`05bc91a0 00000000`00000001 : ndis!NdisOpenConfiguration+0xb2 fffff800`00ba24d0 fffff880`056cc94f : 00000000`00000000 fffff800`00ba25e0 fffff880`058dbc28 00000000`00000000 : ndis!NdisOpenConfigurationEx+0xa4 fffff800`00ba2540 00000000`00000000 : fffff800`00ba25e0 fffff880`058dbc28 00000000`00000000 fffffa80`001801a9 : netr28x+0x4b94f THREAD_SHA1_HASH_MOD_FUNC: ae5746727567d6f3e980a5bab83b7524a5dc9ee8 THREAD_SHA1_HASH_MOD_FUNC_OFFSET: a4491f04e0c588cecd320ea5c66c026862f569ea THREAD_SHA1_HASH_MOD: 34d7ba38146ecb972065c22fa7203d72f73eccb4 FOLLOWUP_IP: netr28x+4b94f fffff880`056cc94f ?? ??? SYMBOL_STACK_INDEX: d SYMBOL_NAME: netr28x+4b94f FOLLOWUP_NAME: MachineOwner MODULE_NAME: netr28x IMAGE_NAME: netr28x.sys DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a STACK_COMMAND: .thread ; .cxr ; kb FAILURE_BUCKET_ID: X64_0x5_netr28x+4b94f BUCKET_ID: X64_0x5_netr28x+4b94f PRIMARY_PROBLEM_CLASS: X64_0x5_netr28x+4b94f TARGET_TIME: 2019-04-11T17:47:48.000Z OSBUILD: 7601 OSSERVICEPACK: 1000 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 7 OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 2019-03-06 05:38:53 BUILDDATESTAMP_STR: 190305-1700 BUILDLAB_STR: win7sp1_ldr_escrow BUILDOSVER_STR: 6.1.7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700 ANALYSIS_SESSION_ELAPSED_TIME: 7f5 ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:x64_0x5_netr28x+4b94f FAILURE_ID_HASH: {43753b0b-e234-1a01-8468-7eed644d41ea} Followup: MachineOwner --------- IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: fffff8a006be8c34, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000000, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: fffff80003afb730, address which referenced memory Debugging Details: ------------------ GetUlongPtrFromAddress: unable to read from fffff80003ab2300 KEY_VALUES_STRING: 1 Key : Analysis.CPU.Sec Value: 1 Key : Analysis.Elapsed.Sec Value: 1 Key : Analysis.Memory.CommitPeak.Mb Value: 62 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700 SYSTEM_MANUFACTURER: Hewlett-Packard SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC SYSTEM_SKU: J4T62EA#AB8 SYSTEM_VERSION: 0991100000000000000600087 BIOS_VENDOR: Insyde BIOS_VERSION: F.43 BIOS_DATE: 12/19/2017 BASEBOARD_MANUFACTURER: Hewlett-Packard BASEBOARD_PRODUCT: 2211 BASEBOARD_VERSION: 86.56 DUMP_TYPE: 2 BUGCHECK_P1: fffff8a006be8c34 BUGCHECK_P2: 2 BUGCHECK_P3: 0 BUGCHECK_P4: fffff80003afb730 READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80003ab2100 Unable to get MmSystemRangeStart GetUlongPtrFromAddress: unable to read from fffff80003ab22f0 GetUlongPtrFromAddress: unable to read from fffff80003ab24a8 GetPointerFromAddress: unable to read from fffff80003ab20d8 fffff8a006be8c34 Paged pool CURRENT_IRQL: 2 FAULTING_IP: nt!CmpFindValueByNameFromCache+e0 fffff800`03afb730 428b14b8 mov edx,dword ptr [rax+r15*4] CPU_COUNT: 4 CPU_MHZ: 6a0 CPU_VENDOR: GenuineIntel CPU_FAMILY: 6 CPU_MODEL: 45 CPU_STEPPING: 1 CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init) CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT BUGCHECK_STR: 0xA PROCESS_NAME: System ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5 ANALYSIS_SESSION_TIME: 06-17-2019 20:48:30.0482 ANALYSIS_VERSION: 10.0.18869.1002 amd64fre TRAP_FRAME: fffff80004c21990 -- (.trap 0xfffff80004c21990) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=fffff8a006be8c34 rbx=0000000000000000 rcx=0000000000000000 rdx=00000000ffffffff rsi=0000000000000000 rdi=0000000000000000 rip=fffff80003afb730 rsp=fffff80004c21b20 rbp=fffff80004c21ff0 r8=fffff8a00004ad40 r9=000000000000ffff r10=0000000000000001 r11=fffff80004c21dc8 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl zr na po nc nt!CmpFindValueByNameFromCache+0xe0: fffff800`03afb730 428b14b8 mov edx,dword ptr [rax+r15*4] ds:fffff8a0`06be8c34=???????? Resetting default scope LAST_CONTROL_TRANSFER: from fffff800038b6f69 to fffff800038a8ba0 STACK_TEXT: fffff800`04c21848 fffff800`038b6f69 : 00000000`0000000a fffff8a0`06be8c34 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx fffff800`04c21850 fffff800`038b4d88 : 00000000`00000000 fffff8a0`06be8c34 fffffa80`0a1a6000 fffff8a0`00024010 : nt!KiBugCheckDispatch+0x69 fffff800`04c21990 fffff800`03afb730 : fffff8a0`00024010 00000000`00c6ac30 fffff8a0`0004ad40 00000000`00000000 : nt!KiPageFault+0x448 fffff800`04c21b20 fffff800`03adec38 : fffff8a0`0e0d74a8 fffff800`04c21e18 fffff800`04c21c60 fffff800`04c21c48 : nt!CmpFindValueByNameFromCache+0xe0 fffff800`04c21bf0 fffff800`03cc11e7 : fffff8a0`0e0d74a8 01d50684`f67b3cde fffff8a0`0e0d74a8 00000000`00000000 : nt!CmpCompareNewValueDataAgainstKCBCache+0x78 fffff800`04c21c90 fffff800`03ae6531 : fffff8a0`01c5f710 fffff800`04c21e18 fffffa80`00000004 fffff800`04c22210 : nt!CmSetValueKey+0x6a7 fffff800`04c21dd0 fffff800`038b6bd3 : ffffffff`80002788 00000000`00000002 fffffa80`00000000 fffff800`00000004 : nt!NtSetValueKey+0x349 fffff800`04c21f00 fffff800`038ac3b0 : fffff800`03bfd2a2 fffff800`04c22248 fffff880`017a5152 00000000`c0000001 : nt!KiSystemServiceCopyEnd+0x13 fffff800`04c22108 fffff800`03bfd2a2 : fffff800`04c22248 fffff880`017a5152 00000000`c0000001 fffff800`04c22270 : nt!KiServiceLinkage fffff800`04c22110 fffff880`017acd96 : 00000000`00000004 fffffa80`09b31af0 00000100`00000000 00000000`000007ff : nt!RtlWriteRegistryValue+0x62 fffff800`04c22170 fffff880`056a498d : fffff800`04c22270 fffff880`058b3c28 00000000`00000000 00000000`00000000 : ndis!NdisWriteConfiguration+0x156 fffff800`04c221d0 fffff800`04c22270 : fffff880`058b3c28 00000000`00000000 00000000`00000000 00000000`001801a9 : netr28x+0x4b98d fffff800`04c221d8 fffff880`058b3c28 : 00000000`00000000 00000000`00000000 00000000`001801a9 fffffa80`05b821a0 : 0xfffff800`04c22270 fffff800`04c221e0 00000000`00000000 : 00000000`00000000 00000000`001801a9 fffffa80`05b821a0 00000000`00000000 : netr28x+0x25ac28 THREAD_SHA1_HASH_MOD_FUNC: 935105e89958188e75032d802c31088ef212f1d5 THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 050e790aab7ddac4bfe73c42f1350165ef3ea549 THREAD_SHA1_HASH_MOD: 7921e317582c7f98a7f13cfbcd3c02a86fdcafec FOLLOWUP_IP: netr28x+4b98d fffff880`056a498d ?? ??? SYMBOL_STACK_INDEX: b SYMBOL_NAME: netr28x+4b98d FOLLOWUP_NAME: MachineOwner MODULE_NAME: netr28x IMAGE_NAME: netr28x.sys DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a STACK_COMMAND: .thread ; .cxr ; kb FAILURE_BUCKET_ID: X64_0xA_netr28x+4b98d BUCKET_ID: X64_0xA_netr28x+4b98d PRIMARY_PROBLEM_CLASS: X64_0xA_netr28x+4b98d TARGET_TIME: 2019-05-09T16:33:41.000Z OSBUILD: 7601 OSSERVICEPACK: 1000 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 7 OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 2019-03-21 04:38:47 BUILDDATESTAMP_STR: 190320-1700 BUILDLAB_STR: win7sp1_ldr_escrow BUILDOSVER_STR: 6.1.7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700 ANALYSIS_SESSION_ELAPSED_TIME: 716 ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:x64_0xa_netr28x+4b98d FAILURE_ID_HASH: {a6eb3f60-a5c3-0bd6-051c-41bf4427925d} Followup: MachineOwner --------- INVALID_PROCESS_ATTACH_ATTEMPT (5) Arguments: Arg1: fffffa80042b59b0 Arg2: fffffa80048376b0 Arg3: 0000000000000000 Arg4: 0000000000000001 Debugging Details: ------------------ GetUlongPtrFromAddress: unable to read from fffff8000309f300 KEY_VALUES_STRING: 1 Key : Analysis.CPU.Sec Value: 1 Key : Analysis.Elapsed.Sec Value: 1 Key : Analysis.Memory.CommitPeak.Mb Value: 62 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700 SYSTEM_MANUFACTURER: Hewlett-Packard SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC SYSTEM_SKU: J4T62EA#AB8 SYSTEM_VERSION: 0991100000000000000600087 BIOS_VENDOR: Insyde BIOS_VERSION: F.43 BIOS_DATE: 12/19/2017 BASEBOARD_MANUFACTURER: Hewlett-Packard BASEBOARD_PRODUCT: 2211 BASEBOARD_VERSION: 86.56 DUMP_TYPE: 2 BUGCHECK_P1: fffffa80042b59b0 BUGCHECK_P2: fffffa80048376b0 BUGCHECK_P3: 0 BUGCHECK_P4: 1 CPU_COUNT: 4 CPU_MHZ: 6a0 CPU_VENDOR: GenuineIntel CPU_FAMILY: 6 CPU_MODEL: 45 CPU_STEPPING: 1 CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init) CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT BUGCHECK_STR: 0x5 PROCESS_NAME: PointBlank.exe CURRENT_IRQL: 2 ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5 ANALYSIS_SESSION_TIME: 06-17-2019 21:16:16.0171 ANALYSIS_VERSION: 10.0.18869.1002 amd64fre DPC_STACK_BASE: FFFFF80000BA2FB0 LOCK_ADDRESS: fffff80003072240 -- (!locks fffff80003072240) Cannot get _ERESOURCE type Resource @ nt!PiEngineLock (0xfffff80003072240) Available 1 total locks PNP_TRIAGE_DATA: Lock address : 0xfffff80003072240 Thread Count : 0 Thread address: 0x0000000000000000 Thread wait : 0x0 LAST_CONTROL_TRANSFER: from fffff80002e445f2 to fffff80002e95ba0 STACK_TEXT: fffff800`00ba1cc8 fffff800`02e445f2 : 00000000`00000005 fffffa80`042b59b0 fffffa80`048376b0 00000000`00000000 : nt!KeBugCheckEx fffff800`00ba1cd0 fffff800`030ed127 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeStackAttachProcess+0x52 fffff800`00ba1d50 fffff800`030ed4bf : 00000000`00000000 fffff8a0`00000000 fffff8a0`00001910 00000000`00000000 : nt!ObpDecrementHandleCount+0x177 fffff800`00ba1dd0 fffff800`030ed1e4 : 00000000`00000c9c fffffa80`048376b0 fffff8a0`00001910 00000000`00000c9c : nt!ObpCloseHandleTableEntry+0xaf fffff800`00ba1e60 fffff800`02ea3bd3 : fffffa80`04988060 fffff800`00ba1f30 fffff800`03157200 fffff800`030e376a : nt!ObpCloseHandle+0x94 fffff800`00ba1eb0 fffff800`02e993b0 : fffff800`03130d73 fffffa80`04e7d060 fffff800`03157200 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 fffff800`00ba2048 fffff800`03130d73 : fffffa80`04e7d060 fffff800`03157200 00000000`00000000 00000000`00000000 : nt!KiServiceLinkage fffff800`00ba2050 fffff800`0313aa78 : fffffa80`04e7d060 00000000`00000001 fffffa80`04e386e0 00000000`00000000 : nt!PiGetDeviceRegistryProperty+0xab fffff800`00ba21b0 fffff800`0312fa90 : fffffa80`04e7d060 fffffa80`04e7d060 00000000`00000000 00000000`00000000 : nt!IoGetDeviceProperty+0xbc fffff800`00ba2290 fffff800`03140f51 : 00000000`ffff0000 fffffa80`08033990 fffff880`014d7110 fffffa80`05bfaf70 : nt!IopOpenOrCreateDeviceRegistryKey+0x14c fffff800`00ba2450 fffff880`0151c152 : fffffa80`049479f0 fffff800`00ba25e0 fffffa80`06f64a78 00000000`000007ff : nt!IoOpenDeviceRegistryKey+0x11 fffff800`00ba2490 fffff880`01487b34 : fffff800`00ba25e0 fffff800`00ba25b8 fffffa80`05bf91a0 fffff880`0153221d : ndis!NdisOpenConfiguration+0xb2 fffff800`00ba24d0 fffff880`04eff94f : fffffa80`00000000 fffff800`00ba25e0 fffff880`0510ec28 00000000`00000000 : ndis!NdisOpenConfigurationEx+0xa4 fffff800`00ba2540 fffffa80`00000000 : fffff800`00ba25e0 fffff880`0510ec28 00000000`00000000 00000000`001801a9 : netr28x+0x4b94f fffff800`00ba2548 fffff800`00ba25e0 : fffff880`0510ec28 00000000`00000000 00000000`001801a9 fffffa80`05bf91a0 : 0xfffffa80`00000000 fffff800`00ba2550 fffff880`0510ec28 : 00000000`00000000 00000000`001801a9 fffffa80`05bf91a0 fffffa80`00000000 : 0xfffff800`00ba25e0 fffff800`00ba2558 00000000`00000000 : 00000000`001801a9 fffffa80`05bf91a0 fffffa80`00000000 fffff880`04f0be2e : netr28x+0x25ac28 THREAD_SHA1_HASH_MOD_FUNC: 1764d353450a941fbc74295279ec02651c3d9814 THREAD_SHA1_HASH_MOD_FUNC_OFFSET: bdc70d393af014c177e84e60c668cc911acaf71f THREAD_SHA1_HASH_MOD: 9a9dca34541ae91666e3989df373f06b6e683623 FOLLOWUP_IP: netr28x+4b94f fffff880`04eff94f ?? ??? SYMBOL_STACK_INDEX: d SYMBOL_NAME: netr28x+4b94f FOLLOWUP_NAME: MachineOwner MODULE_NAME: netr28x IMAGE_NAME: netr28x.sys DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a STACK_COMMAND: .thread ; .cxr ; kb FAILURE_BUCKET_ID: X64_0x5_netr28x+4b94f BUCKET_ID: X64_0x5_netr28x+4b94f PRIMARY_PROBLEM_CLASS: X64_0x5_netr28x+4b94f TARGET_TIME: 2019-04-11T14:53:19.000Z OSBUILD: 7601 OSSERVICEPACK: 1000 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 7 OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 2019-03-06 05:38:53 BUILDDATESTAMP_STR: 190305-1700 BUILDLAB_STR: win7sp1_ldr_escrow BUILDOSVER_STR: 6.1.7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700 ANALYSIS_SESSION_ELAPSED_TIME: 7ca ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:x64_0x5_netr28x+4b94f FAILURE_ID_HASH: {43753b0b-e234-1a01-8468-7eed644d41ea} Followup: MachineOwner --------- IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: fffff8a000e8ee98, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000001, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: fffff800032e66fd, address which referenced memory Debugging Details: ------------------ GetUlongPtrFromAddress: unable to read from fffff800032b2300 KEY_VALUES_STRING: 1 Key : Analysis.CPU.Sec Value: 1 Key : Analysis.Elapsed.Sec Value: 1 Key : Analysis.Memory.CommitPeak.Mb Value: 62 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700 SYSTEM_MANUFACTURER: Hewlett-Packard SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC SYSTEM_SKU: J4T62EA#AB8 SYSTEM_VERSION: 0991100000000000000600087 BIOS_VENDOR: Insyde BIOS_VERSION: F.43 BIOS_DATE: 12/19/2017 BASEBOARD_MANUFACTURER: Hewlett-Packard BASEBOARD_PRODUCT: 2211 BASEBOARD_VERSION: 86.56 DUMP_TYPE: 2 BUGCHECK_P1: fffff8a000e8ee98 BUGCHECK_P2: 2 BUGCHECK_P3: 1 BUGCHECK_P4: fffff800032e66fd WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800032b2100 Unable to get MmSystemRangeStart GetUlongPtrFromAddress: unable to read from fffff800032b22f0 GetUlongPtrFromAddress: unable to read from fffff800032b24a8 GetPointerFromAddress: unable to read from fffff800032b20d8 fffff8a000e8ee98 Paged pool CURRENT_IRQL: 2 FAULTING_IP: nt!HvpDoAllocateCell+101 fffff800`032e66fd 89443d00 mov dword ptr [rbp+rdi],eax CPU_COUNT: 4 CPU_MHZ: 6a0 CPU_VENDOR: GenuineIntel CPU_FAMILY: 6 CPU_MODEL: 45 CPU_STEPPING: 1 CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init) CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT BUGCHECK_STR: 0xA PROCESS_NAME: System ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5 ANALYSIS_SESSION_TIME: 06-17-2019 21:16:26.0291 ANALYSIS_VERSION: 10.0.18869.1002 amd64fre TRAP_FRAME: fffff80004418950 -- (.trap 0xfffff80004418950) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000020 rbx=0000000000000000 rcx=0000000000002e68 rdx=0000000000000006 rsi=0000000000000000 rdi=0000000000000000 rip=fffff800032e66fd rsp=fffff80004418ae0 rbp=0000000000000030 r8=fffff8a000024010 r9=0000000000000005 r10=fffff8a000e8c000 r11=0000000000000000 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl nz na pe nc nt!HvpDoAllocateCell+0x101: fffff800`032e66fd 89443d00 mov dword ptr [rbp+rdi],eax ss:0018:00000000`00000030=???????? Resetting default scope LAST_CONTROL_TRANSFER: from fffff800030b6f69 to fffff800030a8ba0 STACK_TEXT: fffff800`04418808 fffff800`030b6f69 : 00000000`0000000a fffff8a0`00e8ee98 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx fffff800`04418810 fffff800`030b4d88 : 00000000`00000001 fffff8a0`00e8ee98 00000000`00000000 fffff8a0`00024010 : nt!KiBugCheckDispatch+0x69 fffff800`04418950 fffff800`032e66fd : fffff8a0`00024010 fffff8a0`00024010 fffff8a0`0004b9a0 fffff800`00000000 : nt!KiPageFault+0x448 fffff800`04418ae0 fffff800`03328d1d : fffff8a0`00024010 00000000`00000000 00000000`00000000 00000000`ffffffff : nt!HvpDoAllocateCell+0x101 fffff800`04418b40 fffff800`03328bad : 00000000`00000000 fffff8a0`00ff0c30 00000000`00000008 fffff800`03316d5c : nt!HvAllocateCell+0x55 fffff800`04418b70 fffff800`032db4bf : fffff8a0`00024010 fffff8a0`00024010 fffff8a0`00ffe640 fffff800`04418e18 : nt!CmpAddValueKeyNew+0x69 fffff800`04418c40 fffff800`034c16e3 : 01d4fd21`140179ca fffff800`04418ff0 fffff8a0`050bd948 00000000`00000000 : nt!CmpSetValueKeyNew+0x77 fffff800`04418c90 fffff800`032e6531 : fffff8a0`0df75fa0 fffff800`04418e18 fffffa80`00000004 fffff800`04419210 : nt!CmSetValueKey+0xba3 fffff800`04418dd0 fffff800`030b6bd3 : ffffffff`80000ab0 00000000`00000002 fffffa80`00000000 fffff800`00000004 : nt!NtSetValueKey+0x349 fffff800`04418f00 fffff800`030ac3b0 : fffff800`033fd2a2 fffff800`04419248 fffff880`014a9152 fffffa80`051e12f0 : nt!KiSystemServiceCopyEnd+0x13 fffff800`04419108 fffff800`033fd2a2 : fffff800`04419248 fffff880`014a9152 fffffa80`051e12f0 fffff800`04419270 : nt!KiServiceLinkage fffff800`04419110 fffff880`014b0d96 : 00000000`00000004 fffffa80`0855a220 00000000`ffffffff 00000000`000007ff : nt!RtlWriteRegistryValue+0x62 fffff800`04419170 fffff880`04eef98d : fffff800`04419270 fffff880`050fec28 00000000`00000000 00000000`00000000 : ndis!NdisWriteConfiguration+0x156 fffff800`044191d0 fffff800`04419270 : fffff880`050fec28 00000000`00000000 00000000`00000000 fffff800`001801a9 : netr28x+0x4b98d fffff800`044191d8 fffff880`050fec28 : 00000000`00000000 00000000`00000000 fffff800`001801a9 fffffa80`05be11a0 : 0xfffff800`04419270 fffff800`044191e0 00000000`00000000 : 00000000`00000000 fffff800`001801a9 fffffa80`05be11a0 fffff800`00000000 : netr28x+0x25ac28 THREAD_SHA1_HASH_MOD_FUNC: 80858fdf941bd645ff48b6997b30f63ac59926fb THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 394aafee51f76470053fa2102b9df0f0f7df42a3 THREAD_SHA1_HASH_MOD: 5d50876435db08b990ce5928fe5c90526c26b16c FOLLOWUP_IP: netr28x+4b98d fffff880`04eef98d ?? ??? SYMBOL_STACK_INDEX: d SYMBOL_NAME: netr28x+4b98d FOLLOWUP_NAME: MachineOwner MODULE_NAME: netr28x IMAGE_NAME: netr28x.sys DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a STACK_COMMAND: .thread ; .cxr ; kb FAILURE_BUCKET_ID: X64_0xA_netr28x+4b98d BUCKET_ID: X64_0xA_netr28x+4b98d PRIMARY_PROBLEM_CLASS: X64_0xA_netr28x+4b98d TARGET_TIME: 2019-04-27T17:46:01.000Z OSBUILD: 7601 OSSERVICEPACK: 1000 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 7 OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 2019-03-21 04:38:47 BUILDDATESTAMP_STR: 190320-1700 BUILDLAB_STR: win7sp1_ldr_escrow BUILDOSVER_STR: 6.1.7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700 ANALYSIS_SESSION_ELAPSED_TIME: 720 ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:x64_0xa_netr28x+4b98d FAILURE_ID_HASH: {a6eb3f60-a5c3-0bd6-051c-41bf4427925d} Followup: MachineOwner --------- IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: fffff8a000b0b260, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000001, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: fffff800032d1738, address which referenced memory Debugging Details: ------------------ GetUlongPtrFromAddress: unable to read from fffff8000329d300 KEY_VALUES_STRING: 1 Key : Analysis.CPU.Sec Value: 1 Key : Analysis.Elapsed.Sec Value: 1 Key : Analysis.Memory.CommitPeak.Mb Value: 62 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700 SYSTEM_MANUFACTURER: Hewlett-Packard SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC SYSTEM_SKU: J4T62EA#AB8 SYSTEM_VERSION: 0991100000000000000600087 BIOS_VENDOR: Insyde BIOS_VERSION: F.43 BIOS_DATE: 12/19/2017 BASEBOARD_MANUFACTURER: Hewlett-Packard BASEBOARD_PRODUCT: 2211 BASEBOARD_VERSION: 86.56 DUMP_TYPE: 2 BUGCHECK_P1: fffff8a000b0b260 BUGCHECK_P2: 2 BUGCHECK_P3: 1 BUGCHECK_P4: fffff800032d1738 WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff8000329d100 Unable to get MmSystemRangeStart GetUlongPtrFromAddress: unable to read from fffff8000329d2f0 GetUlongPtrFromAddress: unable to read from fffff8000329d4a8 GetPointerFromAddress: unable to read from fffff8000329d0d8 fffff8a000b0b260 Paged pool CURRENT_IRQL: 2 FAULTING_IP: nt!HvpDoAllocateCell+13c fffff800`032d1738 8907 mov dword ptr [rdi],eax CPU_COUNT: 4 CPU_MHZ: 6a0 CPU_VENDOR: GenuineIntel CPU_FAMILY: 6 CPU_MODEL: 45 CPU_STEPPING: 1 CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init) CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT BUGCHECK_STR: 0xA PROCESS_NAME: System ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5 ANALYSIS_SESSION_TIME: 06-17-2019 21:16:23.0541 ANALYSIS_VERSION: 10.0.18869.1002 amd64fre TRAP_FRAME: fffff80000b9b950 -- (.trap 0xfffff80000b9b950) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=00000000ffffffd0 rbx=0000000000000000 rcx=000000000000000c rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000 rip=fffff800032d1738 rsp=fffff80000b9bae0 rbp=0000000000000030 r8=fffff8a0000512e0 r9=0000000000000005 r10=000000000000023b r11=0000000000000000 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na pe cy nt!HvpDoAllocateCell+0x13c: fffff800`032d1738 8907 mov dword ptr [rdi],eax ds:00000000`00000000=???????? Resetting default scope LAST_CONTROL_TRANSFER: from fffff800030a1f69 to fffff80003093ba0 STACK_TEXT: fffff800`00b9b808 fffff800`030a1f69 : 00000000`0000000a fffff8a0`00b0b260 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx fffff800`00b9b810 fffff800`0309fd88 : 00000000`00000001 fffff8a0`00b0b260 00000000`00000000 fffff8a0`00024010 : nt!KiBugCheckDispatch+0x69 fffff800`00b9b950 fffff800`032d1738 : fffff8a0`00024010 fffff8a0`00024010 fffff8a0`000512e0 fffff800`00000000 : nt!KiPageFault+0x448 fffff800`00b9bae0 fffff800`03313d0d : fffff8a0`00024010 00000000`00000000 00000000`00000000 00000000`ffffffff : nt!HvpDoAllocateCell+0x13c fffff800`00b9bb40 fffff800`03313b9d : 00000000`00000000 fffff8a0`00f38c30 00000000`00000008 fffff800`03301d5c : nt!HvAllocateCell+0x55 fffff800`00b9bb70 fffff800`032c64bf : fffff8a0`00024010 fffff8a0`00024010 fffff8a0`00f46640 fffff800`00b9be18 : nt!CmpAddValueKeyNew+0x69 fffff800`00b9bc40 fffff800`034ac6a3 : 01d4f07a`dd071b78 fffff800`00b9bff0 fffff8a0`04a444a8 00000000`00000000 : nt!CmpSetValueKeyNew+0x77 fffff800`00b9bc90 fffff800`032d1531 : fffff8a0`09c3f770 fffff800`00b9be18 fffffa80`00000004 fffff800`00b9c210 : nt!CmSetValueKey+0xba3 fffff800`00b9bdd0 fffff800`030a1bd3 : ffffffff`80000b54 00000000`00000002 fffffa80`00000000 fffff800`00000004 : nt!NtSetValueKey+0x349 fffff800`00b9bf00 fffff800`030973b0 : fffff800`033e8272 fffff800`00b9c248 fffff880`0151b152 fffffa80`074a45f0 : nt!KiSystemServiceCopyEnd+0x13 fffff800`00b9c108 fffff800`033e8272 : fffff800`00b9c248 fffff880`0151b152 fffffa80`074a45f0 fffff800`00b9c270 : nt!KiServiceLinkage fffff800`00b9c110 fffff880`01522d96 : 00000000`00000004 fffffa80`05970b70 fffff800`03210800 00000000`000007ff : nt!RtlWriteRegistryValue+0x62 fffff800`00b9c170 fffff880`04eef98d : fffff800`00b9c270 fffff880`050fec28 00000000`00000000 00000000`00000000 : ndis!NdisWriteConfiguration+0x156 fffff800`00b9c1d0 fffff800`00b9c270 : fffff880`050fec28 00000000`00000000 00000000`00000000 fffffa80`001801a9 : netr28x+0x4b98d fffff800`00b9c1d8 fffff880`050fec28 : 00000000`00000000 00000000`00000000 fffffa80`001801a9 fffffa80`05b741a0 : 0xfffff800`00b9c270 fffff800`00b9c1e0 00000000`00000000 : 00000000`00000000 fffffa80`001801a9 fffffa80`05b741a0 00000000`00000000 : netr28x+0x25ac28 THREAD_SHA1_HASH_MOD_FUNC: 80858fdf941bd645ff48b6997b30f63ac59926fb THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 60ef2d8b5c8aa9ab3d61fd3d0f87c6db127d6016 THREAD_SHA1_HASH_MOD: 5d50876435db08b990ce5928fe5c90526c26b16c FOLLOWUP_IP: netr28x+4b98d fffff880`04eef98d ?? ??? SYMBOL_STACK_INDEX: d SYMBOL_NAME: netr28x+4b98d FOLLOWUP_NAME: MachineOwner MODULE_NAME: netr28x IMAGE_NAME: netr28x.sys DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a STACK_COMMAND: .thread ; .cxr ; kb FAILURE_BUCKET_ID: X64_0xA_netr28x+4b98d BUCKET_ID: X64_0xA_netr28x+4b98d PRIMARY_PROBLEM_CLASS: X64_0xA_netr28x+4b98d TARGET_TIME: 2019-04-11T15:25:58.000Z OSBUILD: 7601 OSSERVICEPACK: 1000 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 7 OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 2019-03-06 05:38:53 BUILDDATESTAMP_STR: 190305-1700 BUILDLAB_STR: win7sp1_ldr_escrow BUILDOSVER_STR: 6.1.7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700 ANALYSIS_SESSION_ELAPSED_TIME: 7b6 ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:x64_0xa_netr28x+4b98d FAILURE_ID_HASH: {a6eb3f60-a5c3-0bd6-051c-41bf4427925d} Followup: MachineOwner --------- IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: fffff8a0067d0004, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000000, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: fffff800032dccfe, address which referenced memory Debugging Details: ------------------ GetUlongPtrFromAddress: unable to read from fffff800032a8300 KEY_VALUES_STRING: 1 Key : Analysis.CPU.Sec Value: 1 Key : Analysis.Elapsed.Sec Value: 1 Key : Analysis.Memory.CommitPeak.Mb Value: 62 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700 SYSTEM_MANUFACTURER: Hewlett-Packard SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC SYSTEM_SKU: J4T62EA#AB8 SYSTEM_VERSION: 0991100000000000000600087 BIOS_VENDOR: Insyde BIOS_VERSION: F.43 BIOS_DATE: 12/19/2017 BASEBOARD_MANUFACTURER: Hewlett-Packard BASEBOARD_PRODUCT: 2211 BASEBOARD_VERSION: 86.56 DUMP_TYPE: 2 BUGCHECK_P1: fffff8a0067d0004 BUGCHECK_P2: 2 BUGCHECK_P3: 0 BUGCHECK_P4: fffff800032dccfe READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800032a8100 Unable to get MmSystemRangeStart GetUlongPtrFromAddress: unable to read from fffff800032a82f0 GetUlongPtrFromAddress: unable to read from fffff800032a84a8 GetPointerFromAddress: unable to read from fffff800032a80d8 fffff8a0067d0004 Paged pool CURRENT_IRQL: 2 FAULTING_IP: nt!HvpScanForFreeCellInViewWindow+16a fffff800`032dccfe 8b4804 mov ecx,dword ptr [rax+4] CPU_COUNT: 4 CPU_MHZ: 6a0 CPU_VENDOR: GenuineIntel CPU_FAMILY: 6 CPU_MODEL: 45 CPU_STEPPING: 1 CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init) CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT BUGCHECK_STR: 0xA PROCESS_NAME: System ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5 ANALYSIS_SESSION_TIME: 06-17-2019 21:16:21.0060 ANALYSIS_VERSION: 10.0.18869.1002 amd64fre TRAP_FRAME: fffff80004421860 -- (.trap 0xfffff80004421860) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=fffff8a0067d0000 rbx=0000000000000000 rcx=0000000000000000 rdx=0000000000683000 rsi=0000000000000000 rdi=0000000000000000 rip=fffff800032dccfe rsp=fffff800044219f0 rbp=0000000000000683 r8=0000000000000083 r9=0000000000000000 r10=fffff8000300b000 r11=0000000000000006 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na po nc nt!HvpScanForFreeCellInViewWindow+0x16a: fffff800`032dccfe 8b4804 mov ecx,dword ptr [rax+4] ds:fffff8a0`067d0004=00683000 Resetting default scope LAST_CONTROL_TRANSFER: from fffff800030acf69 to fffff8000309eba0 STACK_TEXT: fffff800`04421718 fffff800`030acf69 : 00000000`0000000a fffff8a0`067d0004 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx fffff800`04421720 fffff800`030aad88 : 00000000`00000000 fffff8a0`067d0004 fffff800`031ff100 00000000`00000000 : nt!KiBugCheckDispatch+0x69 fffff800`04421860 fffff800`032dccfe : 00000000`00000000 00000000`003fe000 00000000`00001000 00000000`00000000 : nt!KiPageFault+0x448 fffff800`044219f0 fffff800`032dcb0a : fffff800`00683000 fffff800`00000011 00000000`00000030 fffff800`00000000 : nt!HvpScanForFreeCellInViewWindow+0x16a fffff800`04421a70 fffff800`032dc66e : 00000000`00000030 fffff800`00000005 ffffffff`00000030 fffff800`00000000 : nt!HvpFindFreeCell+0x1ba fffff800`04421ae0 fffff800`0331ed1d : fffff8a0`00024010 00000000`00000000 00000000`00000000 00000000`ffffffff : nt!HvpDoAllocateCell+0x72 fffff800`04421b40 fffff800`0331ebad : 00000000`00000000 fffff8a0`061e8c30 00000000`00000008 fffff800`0330cd5c : nt!HvAllocateCell+0x55 fffff800`04421b70 fffff800`032d14bf : fffff8a0`00024010 fffff8a0`00024010 fffff8a0`061f6640 fffff800`04421e18 : nt!CmpAddValueKeyNew+0x69 fffff800`04421c40 fffff800`034b76e3 : 01d4f848`5814f677 fffff800`04421ff0 fffff8a0`02c84b98 00000000`00000000 : nt!CmpSetValueKeyNew+0x77 fffff800`04421c90 fffff800`032dc531 : fffff8a0`04cbac70 fffff800`04421e18 fffffa80`00000004 fffff800`04422210 : nt!CmSetValueKey+0xba3 fffff800`04421dd0 fffff800`030acbd3 : ffffffff`80000de8 00000000`00000002 fffffa80`00000000 fffff800`00000004 : nt!NtSetValueKey+0x349 fffff800`04421f00 fffff800`030a23b0 : fffff800`033f32a2 fffff800`04422248 fffff880`01725152 fffffa80`00000000 : nt!KiSystemServiceCopyEnd+0x13 fffff800`04422108 fffff800`033f32a2 : fffff800`04422248 fffff880`01725152 fffffa80`00000000 fffff800`04422270 : nt!KiServiceLinkage fffff800`04422110 fffff880`0172cd96 : 00000000`00000004 fffffa80`05d89cd0 fffff800`04422200 00000000`000007ff : nt!RtlWriteRegistryValue+0x62 fffff800`04422170 fffff880`0510f98d : fffff800`04422270 fffff880`0531ec28 00000000`00000000 00000000`00000000 : ndis!NdisWriteConfiguration+0x156 fffff800`044221d0 fffff800`04422270 : fffff880`0531ec28 00000000`00000000 00000000`00000000 fffff880`001801a9 : netr28x+0x4b98d fffff800`044221d8 fffff880`0531ec28 : 00000000`00000000 00000000`00000000 fffff880`001801a9 fffffa80`05b701a0 : 0xfffff800`04422270 fffff800`044221e0 00000000`00000000 : 00000000`00000000 fffff880`001801a9 fffffa80`05b701a0 0000000e`00000000 : netr28x+0x25ac28 THREAD_SHA1_HASH_MOD_FUNC: a2c5409ed52347576830e095aabe2e20325151e5 THREAD_SHA1_HASH_MOD_FUNC_OFFSET: cf883ff24fbd42e0f8dd5b2bf40fd2071e6cd531 THREAD_SHA1_HASH_MOD: 56bd18a7fabf3c16adac1e3911e9aab0524685a1 FOLLOWUP_IP: netr28x+4b98d fffff880`0510f98d ?? ??? SYMBOL_STACK_INDEX: f SYMBOL_NAME: netr28x+4b98d FOLLOWUP_NAME: MachineOwner MODULE_NAME: netr28x IMAGE_NAME: netr28x.sys DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a STACK_COMMAND: .thread ; .cxr ; kb FAILURE_BUCKET_ID: X64_0xA_netr28x+4b98d BUCKET_ID: X64_0xA_netr28x+4b98d PRIMARY_PROBLEM_CLASS: X64_0xA_netr28x+4b98d TARGET_TIME: 2019-04-21T13:44:29.000Z OSBUILD: 7601 OSSERVICEPACK: 1000 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 7 OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 2019-03-21 04:38:47 BUILDDATESTAMP_STR: 190320-1700 BUILDLAB_STR: win7sp1_ldr_escrow BUILDOSVER_STR: 6.1.7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700 ANALYSIS_SESSION_ELAPSED_TIME: 704 ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:x64_0xa_netr28x+4b98d FAILURE_ID_HASH: {a6eb3f60-a5c3-0bd6-051c-41bf4427925d} Followup: MachineOwner --------- 0: kd> lmvm netr28x start end module name fffff880`050c4000 fffff880`0532e000 netr28x T (no symbols) Loaded symbol image file: netr28x.sys Image path: \SystemRoot\system32\DRIVERS\netr28x.sys Image name: netr28x.sys Timestamp: Mon Apr 20 03:22:50 2015 (5534D37A) CheckSum: 0026BF4B ImageSize: 0026A000 Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4 Information from resource tables:
Nihayet Windows 7 Kurulumunu Bitirdim Home Premium SP1 ENGLİSH Kurulum Yaptım Sonradan CMD Den 1 2 Birşey Birde Bir Dosya İle Türkçe Yama Yaptım Ama Bazı Yerler İngilizce Şuana Kadar Keşfettiğim İngilizce Yerler 1.İntel Ekran Kartı Menüsü 2.Windows Update Menüsü Ne Yapabilirim Bunları Düzeltmek İçin Update Olmasada İntel Nasıl Düzelir Üst Yorumda Biraz Karıştırmışım Yeni Oldugum İçin 2 Kere Cevaplamışım Kusura BakmayınSoruna netr28x.sys sebep oluyor. Bu da Ralink 802.11 WiFi sürücüsüdür. Sürücüyü güncelle. Güncellemeyi bilmiyorsan Windows 10'a geç. 7 için destek vermiyoruz.
Kod:IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: fffff8a000d9e618, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000001, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: fffff800033386fd, address which referenced memory Debugging Details: ------------------ GetUlongPtrFromAddress: unable to read from fffff80003304300 KEY_VALUES_STRING: 1 Key : Analysis.CPU.Sec Value: 1 Key : Analysis.Elapsed.Sec Value: 1 Key : Analysis.Memory.CommitPeak.Mb Value: 62 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700 SYSTEM_MANUFACTURER: Hewlett-Packard SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC SYSTEM_SKU: J4T62EA#AB8 SYSTEM_VERSION: 0991100000000000000600087 BIOS_VENDOR: Insyde BIOS_VERSION: F.43 BIOS_DATE: 12/19/2017 BASEBOARD_MANUFACTURER: Hewlett-Packard BASEBOARD_PRODUCT: 2211 BASEBOARD_VERSION: 86.56 DUMP_TYPE: 2 BUGCHECK_P1: fffff8a000d9e618 BUGCHECK_P2: 2 BUGCHECK_P3: 1 BUGCHECK_P4: fffff800033386fd WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80003304100 Unable to get MmSystemRangeStart GetUlongPtrFromAddress: unable to read from fffff800033042f0 GetUlongPtrFromAddress: unable to read from fffff800033044a8 GetPointerFromAddress: unable to read from fffff800033040d8 fffff8a000d9e618 Paged pool CURRENT_IRQL: 2 FAULTING_IP: nt!HvpDoAllocateCell+101 fffff800`033386fd 89443d00 mov dword ptr [rbp+rdi],eax CPU_COUNT: 4 CPU_MHZ: 6a0 CPU_VENDOR: GenuineIntel CPU_FAMILY: 6 CPU_MODEL: 45 CPU_STEPPING: 1 CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init) CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT BUGCHECK_STR: 0xA PROCESS_NAME: System ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5 ANALYSIS_SESSION_TIME: 06-17-2019 20:48:20.0473 ANALYSIS_VERSION: 10.0.18869.1002 amd64fre TRAP_FRAME: fffff80004423950 -- (.trap 0xfffff80004423950) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=00000000000039e8 rbx=0000000000000000 rcx=00000000000005e8 rdx=0000000000000008 rsi=0000000000000000 rdi=0000000000000000 rip=fffff800033386fd rsp=fffff80004423ae0 rbp=0000000000000030 r8=fffff8a000024010 r9=0000000000000005 r10=fffff8a000d9e000 r11=0000000000000000 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl nz na po nc nt!HvpDoAllocateCell+0x101: fffff800`033386fd 89443d00 mov dword ptr [rbp+rdi],eax ss:0018:00000000`00000030=???????? Resetting default scope LAST_CONTROL_TRANSFER: from fffff80003108f69 to fffff800030faba0 STACK_TEXT: fffff800`04423808 fffff800`03108f69 : 00000000`0000000a fffff8a0`00d9e618 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx fffff800`04423810 fffff800`03106d88 : 00000000`00000001 fffff8a0`00d9e618 00000000`00000000 fffff8a0`00024010 : nt!KiBugCheckDispatch+0x69 fffff800`04423950 fffff800`033386fd : fffff8a0`00024010 fffff8a0`00024010 fffff8a0`00053ae0 00000000`00000000 : nt!KiPageFault+0x448 fffff800`04423ae0 fffff800`0337ad0d : fffff8a0`00024010 00000000`00000000 00000000`00000000 00000000`ffffffff : nt!HvpDoAllocateCell+0x101 fffff800`04423b40 fffff800`0337ab9d : 00000000`00000000 fffff8a0`05585c30 00000000`00000008 fffff800`03368d5c : nt!HvAllocateCell+0x55 fffff800`04423b70 fffff800`0332d4bf : fffff8a0`00024010 fffff8a0`00024010 fffff8a0`05593640 fffff800`04423e18 : nt!CmpAddValueKeyNew+0x69 fffff800`04423c40 fffff800`035136a3 : 01d4f094`f66bc44b fffff800`04423ff0 fffff8a0`0085fa70 00000000`00000000 : nt!CmpSetValueKeyNew+0x77 fffff800`04423c90 fffff800`03338531 : fffff8a0`14bbfca0 fffff800`04423e18 fffffa80`00000004 fffff800`04424210 : nt!CmSetValueKey+0xba3 fffff800`04423dd0 fffff800`03108bd3 : ffffffff`80000bec 00000000`00000002 fffffa80`00000000 fffff800`00000004 : nt!NtSetValueKey+0x349 fffff800`04423f00 fffff800`030fe3b0 : fffff800`0344f272 fffff800`04424248 fffff880`014b9152 00000000`539f0000 : nt!KiSystemServiceCopyEnd+0x13 fffff800`04424108 fffff800`0344f272 : fffff800`04424248 fffff880`014b9152 00000000`539f0000 fffff800`04424270 : nt!KiServiceLinkage fffff800`04424110 fffff880`014c0d96 : 00000000`00000004 fffffa80`071c5250 00000000`00000000 00000000`000007ff : nt!RtlWriteRegistryValue+0x62 fffff800`04424170 fffff880`04f2698d : fffff800`04424270 fffff880`05135c28 00000000`00000000 00000000`00000000 : ndis!NdisWriteConfiguration+0x156 fffff800`044241d0 fffff800`04424270 : fffff880`05135c28 00000000`00000000 00000000`00000000 fffff800`001801a9 : netr28x+0x4b98d fffff800`044241d8 fffff880`05135c28 : 00000000`00000000 00000000`00000000 fffff800`001801a9 fffffa80`059cb1a0 : 0xfffff800`04424270 fffff800`044241e0 00000000`00000000 : 00000000`00000000 fffff800`001801a9 fffffa80`059cb1a0 fffff800`00000000 : netr28x+0x25ac28 THREAD_SHA1_HASH_MOD_FUNC: 80858fdf941bd645ff48b6997b30f63ac59926fb THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 394aafee51f76470053fa2102b9df0f0f7df42a3 THREAD_SHA1_HASH_MOD: 5d50876435db08b990ce5928fe5c90526c26b16c FOLLOWUP_IP: netr28x+4b98d fffff880`04f2698d ?? ??? SYMBOL_STACK_INDEX: d SYMBOL_NAME: netr28x+4b98d FOLLOWUP_NAME: MachineOwner MODULE_NAME: netr28x IMAGE_NAME: netr28x.sys DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a STACK_COMMAND: .thread ; .cxr ; kb FAILURE_BUCKET_ID: X64_0xA_netr28x+4b98d BUCKET_ID: X64_0xA_netr28x+4b98d PRIMARY_PROBLEM_CLASS: X64_0xA_netr28x+4b98d TARGET_TIME: 2019-04-11T18:32:48.000Z OSBUILD: 7601 OSSERVICEPACK: 1000 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 7 OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 2019-03-06 05:38:53 BUILDDATESTAMP_STR: 190305-1700 BUILDLAB_STR: win7sp1_ldr_escrow BUILDOSVER_STR: 6.1.7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700 ANALYSIS_SESSION_ELAPSED_TIME: 7ae ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:x64_0xa_netr28x+4b98d FAILURE_ID_HASH: {a6eb3f60-a5c3-0bd6-051c-41bf4427925d} Followup: MachineOwner --------- INVALID_PROCESS_ATTACH_ATTEMPT (5) Arguments: Arg1: fffffa80042b49b0 Arg2: fffffa80050a0160 Arg3: 0000000000000000 Arg4: 0000000000000001 Debugging Details: ------------------ GetUlongPtrFromAddress: unable to read from fffff800032a0300 KEY_VALUES_STRING: 1 Key : Analysis.CPU.Sec Value: 2 Key : Analysis.Elapsed.Sec Value: 2 Key : Analysis.Memory.CommitPeak.Mb Value: 62 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700 SYSTEM_MANUFACTURER: Hewlett-Packard SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC SYSTEM_SKU: J4T62EA#AB8 SYSTEM_VERSION: 0991100000000000000600087 BIOS_VENDOR: Insyde BIOS_VERSION: F.43 BIOS_DATE: 12/19/2017 BASEBOARD_MANUFACTURER: Hewlett-Packard BASEBOARD_PRODUCT: 2211 BASEBOARD_VERSION: 86.56 DUMP_TYPE: 2 BUGCHECK_P1: fffffa80042b49b0 BUGCHECK_P2: fffffa80050a0160 BUGCHECK_P3: 0 BUGCHECK_P4: 1 CPU_COUNT: 4 CPU_MHZ: 6a0 CPU_VENDOR: GenuineIntel CPU_FAMILY: 6 CPU_MODEL: 45 CPU_STEPPING: 1 CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init) CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT BUGCHECK_STR: 0x5 PROCESS_NAME: PointBlank.exe CURRENT_IRQL: 2 ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5 ANALYSIS_SESSION_TIME: 06-17-2019 20:57:04.0108 ANALYSIS_VERSION: 10.0.18869.1002 amd64fre DPC_STACK_BASE: FFFFF80004428FB0 LOCK_ADDRESS: fffff80003273240 -- (!locks fffff80003273240) Cannot get _ERESOURCE type Resource @ nt!PiEngineLock (0xfffff80003273240) Available 1 total locks PNP_TRIAGE_DATA: Lock address : 0xfffff80003273240 Thread Count : 0 Thread address: 0x0000000000000000 Thread wait : 0x0 LAST_CONTROL_TRANSFER: from fffff80003045602 to fffff80003096ba0 STACK_TEXT: fffff800`04427cc8 fffff800`03045602 : 00000000`00000005 fffffa80`042b49b0 fffffa80`050a0160 00000000`00000000 : nt!KeBugCheckEx fffff800`04427cd0 fffff800`032ee127 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeStackAttachProcess+0x52 fffff800`04427d50 fffff800`032ee4bf : 00000000`00000000 fffff8a0`00000000 fffff8a0`00001910 00000000`00000000 : nt!ObpDecrementHandleCount+0x177 fffff800`04427dd0 fffff800`032ee1e4 : 00000000`00000d08 fffffa80`050a0160 fffff8a0`00001910 00000000`00000d08 : nt!ObpCloseHandleTableEntry+0xaf fffff800`04427e60 fffff800`030a4bd3 : fffffa80`04b87b50 fffff800`04427f30 fffff800`03358230 fffff800`032e476a : nt!ObpCloseHandle+0x94 fffff800`04427eb0 fffff800`0309a3b0 : fffff800`03331da3 fffffa80`04ea4a10 fffff800`03358230 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 fffff800`04428048 fffff800`03331da3 : fffffa80`04ea4a10 fffff800`03358230 00000000`00000000 00000000`00000000 : nt!KiServiceLinkage fffff800`04428050 fffff800`0333baa8 : fffffa80`04ea4a10 00000000`00000001 fffffa80`04ea2740 00000000`00000000 : nt!PiGetDeviceRegistryProperty+0xab fffff800`044281b0 fffff800`03330ac0 : fffffa80`04ea4a10 fffffa80`04ea4a10 00000000`00000000 00000000`00000000 : nt!IoGetDeviceProperty+0xbc fffff800`04428290 fffff800`03341f81 : 00000000`ffff0000 fffffa80`0802b150 fffff880`01553110 fffffa80`05bb6220 : nt!IopOpenOrCreateDeviceRegistryKey+0x14c fffff800`04428450 fffff880`01598152 : 00000000`c0000001 fffff800`044285e0 00000000`00000000 00000000`000007ff : nt!IoOpenDeviceRegistryKey+0x11 fffff800`04428490 fffff880`01503b34 : fffff800`044285e0 fffff800`044285b8 fffffa80`05c461a0 fffff800`035e0000 : ndis!NdisOpenConfiguration+0xb2 fffff800`044284d0 fffff880`0508b94f : fffffa80`00000000 fffff800`044285e0 fffff880`0529ac28 00000000`00000000 : ndis!NdisOpenConfigurationEx+0xa4 fffff800`04428540 fffffa80`00000000 : fffff800`044285e0 fffff880`0529ac28 00000000`00000000 00000000`001801a9 : netr28x+0x4b94f fffff800`04428548 fffff800`044285e0 : fffff880`0529ac28 00000000`00000000 00000000`001801a9 fffffa80`05c461a0 : 0xfffffa80`00000000 fffff800`04428550 fffff880`0529ac28 : 00000000`00000000 00000000`001801a9 fffffa80`05c461a0 00000000`00000000 : 0xfffff800`044285e0 fffff800`04428558 00000000`00000000 : 00000000`001801a9 fffffa80`05c461a0 00000000`00000000 fffffa80`0742b540 : netr28x+0x25ac28 THREAD_SHA1_HASH_MOD_FUNC: 1764d353450a941fbc74295279ec02651c3d9814 THREAD_SHA1_HASH_MOD_FUNC_OFFSET: bdc70d393af014c177e84e60c668cc911acaf71f THREAD_SHA1_HASH_MOD: 9a9dca34541ae91666e3989df373f06b6e683623 FOLLOWUP_IP: netr28x+4b94f fffff880`0508b94f ?? ??? SYMBOL_STACK_INDEX: d SYMBOL_NAME: netr28x+4b94f FOLLOWUP_NAME: MachineOwner MODULE_NAME: netr28x IMAGE_NAME: netr28x.sys DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a STACK_COMMAND: .thread ; .cxr ; kb FAILURE_BUCKET_ID: X64_0x5_netr28x+4b94f BUCKET_ID: X64_0x5_netr28x+4b94f PRIMARY_PROBLEM_CLASS: X64_0x5_netr28x+4b94f TARGET_TIME: 2019-05-01T21:53:50.000Z OSBUILD: 7601 OSSERVICEPACK: 1000 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 7 OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 2019-03-21 04:38:47 BUILDDATESTAMP_STR: 190320-1700 BUILDLAB_STR: win7sp1_ldr_escrow BUILDOSVER_STR: 6.1.7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700 ANALYSIS_SESSION_ELAPSED_TIME: 8cb ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:x64_0x5_netr28x+4b94f FAILURE_ID_HASH: {43753b0b-e234-1a01-8468-7eed644d41ea} Followup: MachineOwner INVALID_PROCESS_ATTACH_ATTEMPT (5) Arguments: Arg1: fffffa80042ce9b0 Arg2: fffffa8005d11370 Arg3: 0000000000000000 Arg4: 0000000000000001 Debugging Details: ------------------ GetUlongPtrFromAddress: unable to read from fffff800032b3300 KEY_VALUES_STRING: 1 Key : Analysis.CPU.Sec Value: 2 Key : Analysis.Elapsed.Sec Value: 2 Key : Analysis.Memory.CommitPeak.Mb Value: 62 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700 SYSTEM_MANUFACTURER: Hewlett-Packard SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC SYSTEM_SKU: J4T62EA#AB8 SYSTEM_VERSION: 0991100000000000000600087 BIOS_VENDOR: Insyde BIOS_VERSION: F.43 BIOS_DATE: 12/19/2017 BASEBOARD_MANUFACTURER: Hewlett-Packard BASEBOARD_PRODUCT: 2211 BASEBOARD_VERSION: 86.56 DUMP_TYPE: 2 BUGCHECK_P1: fffffa80042ce9b0 BUGCHECK_P2: fffffa8005d11370 BUGCHECK_P3: 0 BUGCHECK_P4: 1 CPU_COUNT: 4 CPU_MHZ: 6a0 CPU_VENDOR: GenuineIntel CPU_FAMILY: 6 CPU_MODEL: 45 CPU_STEPPING: 1 CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init) CUSTOMER_CRASH_COUNT: 2 DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT BUGCHECK_STR: 0x5 PROCESS_NAME: audiodg.exe CURRENT_IRQL: 2 ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5 ANALYSIS_SESSION_TIME: 06-17-2019 20:49:02.0621 ANALYSIS_VERSION: 10.0.18869.1002 amd64fre DPC_STACK_BASE: FFFFF80000BA2FB0 LOCK_ADDRESS: fffff80003286240 -- (!locks fffff80003286240) Cannot get _ERESOURCE type Resource @ nt!PiEngineLock (0xfffff80003286240) Available 1 total locks PNP_TRIAGE_DATA: Lock address : 0xfffff80003286240 Thread Count : 0 Thread address: 0x0000000000000000 Thread wait : 0x0 LAST_CONTROL_TRANSFER: from fffff80003058602 to fffff800030a9ba0 STACK_TEXT: fffff800`00ba1cc8 fffff800`03058602 : 00000000`00000005 fffffa80`042ce9b0 fffffa80`05d11370 00000000`00000000 : nt!KeBugCheckEx fffff800`00ba1cd0 fffff800`03301127 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeStackAttachProcess+0x52 fffff800`00ba1d50 fffff800`033014bf : 00000000`00000000 fffff8a0`00000000 fffff8a0`00001910 00000000`00000000 : nt!ObpDecrementHandleCount+0x177 fffff800`00ba1dd0 fffff800`033011e4 : 00000000`00000e48 fffffa80`05d11370 fffff8a0`00001910 00000000`00000e48 : nt!ObpCloseHandleTableEntry+0xaf fffff800`00ba1e60 fffff800`030b7bd3 : fffffa80`05d7ba00 fffff800`00ba1f30 fffff800`0336b230 fffff800`032f776a : nt!ObpCloseHandle+0x94 fffff800`00ba1eb0 fffff800`030ad3b0 : fffff800`03344da3 fffffa80`04e9e060 fffff800`0336b230 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 fffff800`00ba2048 fffff800`03344da3 : fffffa80`04e9e060 fffff800`0336b230 00000000`00000000 00000000`00000000 : nt!KiServiceLinkage fffff800`00ba2050 fffff800`0334eaa8 : fffffa80`04e9e060 00000000`00000001 fffffa80`04e9d6e0 00000000`00000000 : nt!PiGetDeviceRegistryProperty+0xab fffff800`00ba21b0 fffff800`03343ac0 : fffffa80`04e9e060 fffffa80`04e9e060 00000000`00000000 00000000`00000000 : nt!IoGetDeviceProperty+0xbc fffff800`00ba2290 fffff800`03354f81 : 00000000`ffff0000 fffffa80`05086440 fffff880`01482110 fffffa80`05b713f0 : nt!IopOpenOrCreateDeviceRegistryKey+0x14c fffff800`00ba2450 fffff880`014c7152 : fffffa80`04a3fd50 fffff800`00ba25e0 fffffa80`05f48a78 00000000`000007ff : nt!IoOpenDeviceRegistryKey+0x11 fffff800`00ba2490 fffff880`01432b34 : fffff800`00ba25e0 fffff800`00ba25b8 fffffa80`05b6d1a0 fffff880`014dd21d : ndis!NdisOpenConfiguration+0xb2 fffff800`00ba24d0 fffff880`0512a94f : fffffa80`00000000 fffff800`00ba25e0 fffff880`05339c28 00000000`00000000 : ndis!NdisOpenConfigurationEx+0xa4 fffff800`00ba2540 fffffa80`00000000 : fffff800`00ba25e0 fffff880`05339c28 00000000`00000000 00000000`001801a9 : netr28x+0x4b94f fffff800`00ba2548 fffff800`00ba25e0 : fffff880`05339c28 00000000`00000000 00000000`001801a9 fffffa80`05b6d1a0 : 0xfffffa80`00000000 fffff800`00ba2550 fffff880`05339c28 : 00000000`00000000 00000000`001801a9 fffffa80`05b6d1a0 fffffa80`00000000 : 0xfffff800`00ba25e0 fffff800`00ba2558 00000000`00000000 : 00000000`001801a9 fffffa80`05b6d1a0 fffffa80`00000000 fffff880`05136e2e : netr28x+0x25ac28 THREAD_SHA1_HASH_MOD_FUNC: 1764d353450a941fbc74295279ec02651c3d9814 THREAD_SHA1_HASH_MOD_FUNC_OFFSET: bdc70d393af014c177e84e60c668cc911acaf71f THREAD_SHA1_HASH_MOD: 9a9dca34541ae91666e3989df373f06b6e683623 FOLLOWUP_IP: netr28x+4b94f fffff880`0512a94f ?? ??? SYMBOL_STACK_INDEX: d SYMBOL_NAME: netr28x+4b94f FOLLOWUP_NAME: MachineOwner MODULE_NAME: netr28x IMAGE_NAME: netr28x.sys DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a STACK_COMMAND: .thread ; .cxr ; kb FAILURE_BUCKET_ID: X64_0x5_netr28x+4b94f BUCKET_ID: X64_0x5_netr28x+4b94f PRIMARY_PROBLEM_CLASS: X64_0x5_netr28x+4b94f TARGET_TIME: 2019-04-27T20:53:09.000Z OSBUILD: 7601 OSSERVICEPACK: 1000 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 7 OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 2019-03-21 04:38:47 BUILDDATESTAMP_STR: 190320-1700 BUILDLAB_STR: win7sp1_ldr_escrow BUILDOSVER_STR: 6.1.7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700 ANALYSIS_SESSION_ELAPSED_TIME: 89c ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:x64_0x5_netr28x+4b94f FAILURE_ID_HASH: {43753b0b-e234-1a01-8468-7eed644d41ea} Followup: MachineOwner --------- INVALID_PROCESS_ATTACH_ATTEMPT (5) Arguments: Arg1: fffffa80042b49b0 Arg2: fffffa8004ee55f0 Arg3: 0000000000000000 Arg4: 0000000000000001 Debugging Details: ------------------ GetUlongPtrFromAddress: unable to read from fffff800032b0300 KEY_VALUES_STRING: 1 Key : Analysis.CPU.Sec Value: 2 Key : Analysis.Elapsed.Sec Value: 2 Key : Analysis.Memory.CommitPeak.Mb Value: 62 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700 SYSTEM_MANUFACTURER: Hewlett-Packard SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC SYSTEM_SKU: J4T62EA#AB8 SYSTEM_VERSION: 0991100000000000000600087 BIOS_VENDOR: Insyde BIOS_VERSION: F.43 BIOS_DATE: 12/19/2017 BASEBOARD_MANUFACTURER: Hewlett-Packard BASEBOARD_PRODUCT: 2211 BASEBOARD_VERSION: 86.56 DUMP_TYPE: 2 BUGCHECK_P1: fffffa80042b49b0 BUGCHECK_P2: fffffa8004ee55f0 BUGCHECK_P3: 0 BUGCHECK_P4: 1 CPU_COUNT: 4 CPU_MHZ: 6a0 CPU_VENDOR: GenuineIntel CPU_FAMILY: 6 CPU_MODEL: 45 CPU_STEPPING: 1 CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init) CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT BUGCHECK_STR: 0x5 PROCESS_NAME: PointBlank.exe CURRENT_IRQL: 2 ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5 ANALYSIS_SESSION_TIME: 06-17-2019 20:48:58.0829 ANALYSIS_VERSION: 10.0.18869.1002 amd64fre DPC_STACK_BASE: FFFFF8000441FFB0 LOCK_ADDRESS: fffff80003283240 -- (!locks fffff80003283240) Cannot get _ERESOURCE type Resource @ nt!PiEngineLock (0xfffff80003283240) Available 1 total locks PNP_TRIAGE_DATA: Lock address : 0xfffff80003283240 Thread Count : 0 Thread address: 0x0000000000000000 Thread wait : 0x0 LAST_CONTROL_TRANSFER: from fffff80003055602 to fffff800030a6ba0 STACK_TEXT: fffff800`0441ecc8 fffff800`03055602 : 00000000`00000005 fffffa80`042b49b0 fffffa80`04ee55f0 00000000`00000000 : nt!KeBugCheckEx fffff800`0441ecd0 fffff800`032fe127 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeStackAttachProcess+0x52 fffff800`0441ed50 fffff800`032fe4bf : 00000000`00000000 fffff8a0`00000000 fffff8a0`00001910 00000000`00000000 : nt!ObpDecrementHandleCount+0x177 fffff800`0441edd0 fffff800`032fe1e4 : 00000000`00000a80 fffffa80`04ee55f0 fffff8a0`00001910 00000000`00000a80 : nt!ObpCloseHandleTableEntry+0xaf fffff800`0441ee60 fffff800`030b4bd3 : fffffa80`0861e940 fffff800`0441ef30 fffff800`03368230 fffff800`032f476a : nt!ObpCloseHandle+0x94 fffff800`0441eeb0 fffff800`030aa3b0 : fffff800`03341da3 fffffa80`04d31a10 fffff800`03368230 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 fffff800`0441f048 fffff800`03341da3 : fffffa80`04d31a10 fffff800`03368230 00000000`00000000 00000000`00000000 : nt!KiServiceLinkage fffff800`0441f050 fffff800`0334baa8 : fffffa80`04d31a10 00000000`00000001 fffffa80`04d2d740 00000000`00000000 : nt!PiGetDeviceRegistryProperty+0xab fffff800`0441f1b0 fffff800`03340ac0 : fffffa80`04d31a10 fffffa80`04d31a10 00000000`00000000 00000000`00000000 : nt!IoGetDeviceProperty+0xbc fffff800`0441f290 fffff800`03351f81 : 00000000`ffff0000 fffffa80`046a8bd0 fffff880`014c6110 fffffa80`05a70cf0 : nt!IopOpenOrCreateDeviceRegistryKey+0x14c fffff800`0441f450 fffff880`0150b152 : fffffa80`07393890 fffff800`0441f5e0 00000000`0000001f 00000000`000007ff : nt!IoOpenDeviceRegistryKey+0x11 fffff800`0441f490 fffff880`01476b34 : fffff800`0441f5e0 fffff800`0441f5b8 fffffa80`05a6f1a0 fffff800`035f7be3 : ndis!NdisOpenConfiguration+0xb2 fffff800`0441f4d0 fffff880`04e7694f : fffffa80`00000000 fffff800`0441f5e0 fffff880`05085c28 00000000`00000000 : ndis!NdisOpenConfigurationEx+0xa4 fffff800`0441f540 fffffa80`00000000 : fffff800`0441f5e0 fffff880`05085c28 00000000`00000000 00000000`001801a9 : netr28x+0x4b94f fffff800`0441f548 fffff800`0441f5e0 : fffff880`05085c28 00000000`00000000 00000000`001801a9 fffffa80`05a6f1a0 : 0xfffffa80`00000000 fffff800`0441f550 fffff880`05085c28 : 00000000`00000000 00000000`001801a9 fffffa80`05a6f1a0 00000000`00000000 : 0xfffff800`0441f5e0 fffff800`0441f558 00000000`00000000 : 00000000`001801a9 fffffa80`05a6f1a0 00000000`00000000 fffffa80`0452e670 : netr28x+0x25ac28 THREAD_SHA1_HASH_MOD_FUNC: 1764d353450a941fbc74295279ec02651c3d9814 THREAD_SHA1_HASH_MOD_FUNC_OFFSET: bdc70d393af014c177e84e60c668cc911acaf71f THREAD_SHA1_HASH_MOD: 9a9dca34541ae91666e3989df373f06b6e683623 FOLLOWUP_IP: netr28x+4b94f fffff880`04e7694f ?? ??? SYMBOL_STACK_INDEX: d SYMBOL_NAME: netr28x+4b94f FOLLOWUP_NAME: MachineOwner MODULE_NAME: netr28x IMAGE_NAME: netr28x.sys DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a STACK_COMMAND: .thread ; .cxr ; kb FAILURE_BUCKET_ID: X64_0x5_netr28x+4b94f BUCKET_ID: X64_0x5_netr28x+4b94f PRIMARY_PROBLEM_CLASS: X64_0x5_netr28x+4b94f TARGET_TIME: 2019-04-21T09:57:22.000Z OSBUILD: 7601 OSSERVICEPACK: 1000 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 7 OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 2019-03-21 04:38:47 BUILDDATESTAMP_STR: 190320-1700 BUILDLAB_STR: win7sp1_ldr_escrow BUILDOSVER_STR: 6.1.7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700 ANALYSIS_SESSION_ELAPSED_TIME: 8dc ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:x64_0x5_netr28x+4b94f FAILURE_ID_HASH: {43753b0b-e234-1a01-8468-7eed644d41ea} Followup: MachineOwner --------- IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: fffff8a000f95c5c, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000000, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: fffff8000334077c, address which referenced memory Debugging Details: ------------------ GetUlongPtrFromAddress: unable to read from fffff800032f7300 KEY_VALUES_STRING: 1 Key : Analysis.CPU.Sec Value: 1 Key : Analysis.Elapsed.Sec Value: 2 Key : Analysis.Memory.CommitPeak.Mb Value: 62 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700 SYSTEM_MANUFACTURER: Hewlett-Packard SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC SYSTEM_SKU: J4T62EA#AB8 SYSTEM_VERSION: 0991100000000000000600087 BIOS_VENDOR: Insyde BIOS_VERSION: F.43 BIOS_DATE: 12/19/2017 BASEBOARD_MANUFACTURER: Hewlett-Packard BASEBOARD_PRODUCT: 2211 BASEBOARD_VERSION: 86.56 DUMP_TYPE: 2 BUGCHECK_P1: fffff8a000f95c5c BUGCHECK_P2: 2 BUGCHECK_P3: 0 BUGCHECK_P4: fffff8000334077c READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800032f7100 Unable to get MmSystemRangeStart GetUlongPtrFromAddress: unable to read from fffff800032f72f0 GetUlongPtrFromAddress: unable to read from fffff800032f74a8 GetPointerFromAddress: unable to read from fffff800032f70d8 fffff8a000f95c5c Paged pool CURRENT_IRQL: 2 FAULTING_IP: nt!CmpFindValueByNameFromCache+12c fffff800`0334077c 41f6401001 test byte ptr [r8+10h],1 CPU_COUNT: 4 CPU_MHZ: 6a0 CPU_VENDOR: GenuineIntel CPU_FAMILY: 6 CPU_MODEL: 45 CPU_STEPPING: 1 CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init) CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT BUGCHECK_STR: 0xA PROCESS_NAME: System ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5 ANALYSIS_SESSION_TIME: 06-17-2019 20:48:55.0594 ANALYSIS_VERSION: 10.0.18869.1002 amd64fre DPC_STACK_BASE: FFFFF80000BA2FB0 TRAP_FRAME: fffff80000ba1d00 -- (.trap 0xfffff80000ba1d00) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000c64c48 rbx=0000000000000000 rcx=fffff80000ba1fa1 rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000 rip=fffff8000334077c rsp=fffff80000ba1e90 rbp=fffff80000ba2360 r8=fffff8a000f95c4c r9=000000000000ffff r10=fffffa8005aaacfc r11=fffff8a0018b9b46 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl zr na po nc nt!CmpFindValueByNameFromCache+0x12c: fffff800`0334077c 41f6401001 test byte ptr [r8+10h],1 ds:fffff8a0`00f95c5c=01 Resetting default scope LAST_CONTROL_TRANSFER: from fffff800030fbf69 to fffff800030edba0 STACK_TEXT: fffff800`00ba1bb8 fffff800`030fbf69 : 00000000`0000000a fffff8a0`00f95c5c 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx fffff800`00ba1bc0 fffff800`030f9d88 : 00000000`00000000 fffff8a0`00f95c5c fffffa80`05191000 fffff8a0`00024010 : nt!KiBugCheckDispatch+0x69 fffff800`00ba1d00 fffff800`0334077c : fffff8a0`00024010 fffff8a0`00024010 fffff8a0`00048c80 00000000`00000000 : nt!KiPageFault+0x448 fffff800`00ba1e90 fffff800`03323c38 : fffff8a0`15bf1de8 fffff800`00ba2188 fffff800`00ba1fd0 fffff800`00ba1fb8 : nt!CmpFindValueByNameFromCache+0x12c fffff800`00ba1f60 fffff800`035061e7 : fffff8a0`15bf1de8 01d4f7b8`449491c9 fffff8a0`15bf1de8 00000000`00000000 : nt!CmpCompareNewValueDataAgainstKCBCache+0x78 fffff800`00ba2000 fffff800`0332b531 : fffff8a0`1f297040 fffff800`00ba2188 fffffa80`00000004 fffff800`00ba2580 : nt!CmSetValueKey+0x6a7 fffff800`00ba2140 fffff800`030fbbd3 : ffffffff`80000cc8 00000000`00000002 fffffa80`00000000 fffff800`00000004 : nt!NtSetValueKey+0x349 fffff800`00ba2270 fffff800`030f13b0 : fffff800`034422a2 fffff800`00ba25b8 fffff880`01514152 00000000`c0000001 : nt!KiSystemServiceCopyEnd+0x13 fffff800`00ba2478 fffff800`034422a2 : fffff800`00ba25b8 fffff880`01514152 00000000`c0000001 fffff800`00ba25e0 : nt!KiServiceLinkage fffff800`00ba2480 fffff880`0151bd96 : 00000000`00000004 fffffa80`05aaacf0 00000100`00000000 00000000`000007ff : nt!RtlWriteRegistryValue+0x62 fffff800`00ba24e0 fffff880`0514a98d : fffff800`00ba25e0 fffff880`05359c28 00000000`00000000 00000000`00000000 : ndis!NdisWriteConfiguration+0x156 fffff800`00ba2540 fffff800`00ba25e0 : fffff880`05359c28 00000000`00000000 00000000`00000000 fffffa80`001801a9 : netr28x+0x4b98d fffff800`00ba2548 fffff880`05359c28 : 00000000`00000000 00000000`00000000 fffffa80`001801a9 fffffa80`05b411a0 : 0xfffff800`00ba25e0 fffff800`00ba2550 00000000`00000000 : 00000000`00000000 fffffa80`001801a9 fffffa80`05b411a0 00000000`00000000 : netr28x+0x25ac28 THREAD_SHA1_HASH_MOD_FUNC: 935105e89958188e75032d802c31088ef212f1d5 THREAD_SHA1_HASH_MOD_FUNC_OFFSET: d6275099b99a3ef75c037e31f081aba5025e8f89 THREAD_SHA1_HASH_MOD: 7921e317582c7f98a7f13cfbcd3c02a86fdcafec FOLLOWUP_IP: netr28x+4b98d fffff880`0514a98d ?? ??? SYMBOL_STACK_INDEX: b SYMBOL_NAME: netr28x+4b98d FOLLOWUP_NAME: MachineOwner MODULE_NAME: netr28x IMAGE_NAME: netr28x.sys DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a STACK_COMMAND: .thread ; .cxr ; kb FAILURE_BUCKET_ID: X64_0xA_netr28x+4b98d BUCKET_ID: X64_0xA_netr28x+4b98d PRIMARY_PROBLEM_CLASS: X64_0xA_netr28x+4b98d TARGET_TIME: 2019-04-20T20:33:09.000Z OSBUILD: 7601 OSSERVICEPACK: 1000 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 7 OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 2019-03-21 04:38:47 BUILDDATESTAMP_STR: 190320-1700 BUILDLAB_STR: win7sp1_ldr_escrow BUILDOSVER_STR: 6.1.7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700 ANALYSIS_SESSION_ELAPSED_TIME: 7e6 ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:x64_0xa_netr28x+4b98d FAILURE_ID_HASH: {a6eb3f60-a5c3-0bd6-051c-41bf4427925d} Followup: MachineOwner --------- INVALID_PROCESS_ATTACH_ATTEMPT (5) Arguments: Arg1: fffffa80042d09b0 Arg2: fffffa80075e8060 Arg3: 0000000000000000 Arg4: 0000000000000001 Debugging Details: ------------------ GetUlongPtrFromAddress: unable to read from fffff800032af300 KEY_VALUES_STRING: 1 Key : Analysis.CPU.Sec Value: 2 Key : Analysis.Elapsed.Sec Value: 2 Key : Analysis.Memory.CommitPeak.Mb Value: 62 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700 SYSTEM_MANUFACTURER: Hewlett-Packard SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC SYSTEM_SKU: J4T62EA#AB8 SYSTEM_VERSION: 0991100000000000000600087 BIOS_VENDOR: Insyde BIOS_VERSION: F.43 BIOS_DATE: 12/19/2017 BASEBOARD_MANUFACTURER: Hewlett-Packard BASEBOARD_PRODUCT: 2211 BASEBOARD_VERSION: 86.56 DUMP_TYPE: 2 BUGCHECK_P1: fffffa80042d09b0 BUGCHECK_P2: fffffa80075e8060 BUGCHECK_P3: 0 BUGCHECK_P4: 1 CPU_COUNT: 4 CPU_MHZ: 6a0 CPU_VENDOR: GenuineIntel CPU_FAMILY: 6 CPU_MODEL: 45 CPU_STEPPING: 1 CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init) CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT BUGCHECK_STR: 0x5 PROCESS_NAME: audiodg.exe CURRENT_IRQL: 2 ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5 ANALYSIS_SESSION_TIME: 06-17-2019 20:48:52.0836 ANALYSIS_VERSION: 10.0.18869.1002 amd64fre DPC_STACK_BASE: FFFFF8000441FFB0 LOCK_ADDRESS: fffff80003282240 -- (!locks fffff80003282240) Cannot get _ERESOURCE type Resource @ nt!PiEngineLock (0xfffff80003282240) Available 1 total locks PNP_TRIAGE_DATA: Lock address : 0xfffff80003282240 Thread Count : 0 Thread address: 0x0000000000000000 Thread wait : 0x0 LAST_CONTROL_TRANSFER: from fffff800030545f2 to fffff800030a5ba0 STACK_TEXT: fffff800`0441ecc8 fffff800`030545f2 : 00000000`00000005 fffffa80`042d09b0 fffffa80`075e8060 00000000`00000000 : nt!KeBugCheckEx fffff800`0441ecd0 fffff800`032fd127 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeStackAttachProcess+0x52 fffff800`0441ed50 fffff800`032fd4bf : 00000000`00000000 fffff8a0`00000000 fffff8a0`00001910 00000000`00000000 : nt!ObpDecrementHandleCount+0x177 fffff800`0441edd0 fffff800`032fd1e4 : 00000000`000007c8 fffffa80`075e8060 fffff8a0`00001910 00000000`000007c8 : nt!ObpCloseHandleTableEntry+0xaf fffff800`0441ee60 fffff800`030b3bd3 : fffffa80`044dab50 fffff800`0441ef30 fffff800`03367200 fffff800`032f376a : nt!ObpCloseHandle+0x94 fffff800`0441eeb0 fffff800`030a93b0 : fffff800`03340d73 fffffa80`04ddc060 fffff800`03367200 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 fffff800`0441f048 fffff800`03340d73 : fffffa80`04ddc060 fffff800`03367200 00000000`00000000 00000000`00000000 : nt!KiServiceLinkage fffff800`0441f050 fffff800`0334aa78 : fffffa80`04ddc060 00000000`00000001 fffffa80`04dd96e0 00000000`00000000 : nt!PiGetDeviceRegistryProperty+0xab fffff800`0441f1b0 fffff800`0333fa90 : fffffa80`04ddc060 fffffa80`04ddc060 00000000`00000000 00000000`00000000 : nt!IoGetDeviceProperty+0xbc fffff800`0441f290 fffff800`03350f51 : 00000000`ffff0000 fffffa80`05a69770 fffff880`014e7110 fffffa80`05ca3270 : nt!IopOpenOrCreateDeviceRegistryKey+0x14c fffff800`0441f450 fffff880`0152c152 : fffffa80`071bfdc0 fffff800`0441f5e0 00000000`0000001f 00000000`000007ff : nt!IoOpenDeviceRegistryKey+0x11 fffff800`0441f490 fffff880`01497b34 : fffff800`0441f5e0 fffff800`0441f5b8 fffffa80`05c0a1a0 fffff880`0646eab0 : ndis!NdisOpenConfiguration+0xb2 fffff800`0441f4d0 fffff880`04f0c94f : fffffa80`00000000 fffff800`0441f5e0 fffff880`0511bc28 00000000`00000000 : ndis!NdisOpenConfigurationEx+0xa4 fffff800`0441f540 fffffa80`00000000 : fffff800`0441f5e0 fffff880`0511bc28 00000000`00000000 fffffa80`001801a9 : netr28x+0x4b94f fffff800`0441f548 fffff800`0441f5e0 : fffff880`0511bc28 00000000`00000000 fffffa80`001801a9 fffffa80`05c0a1a0 : 0xfffffa80`00000000 fffff800`0441f550 fffff880`0511bc28 : 00000000`00000000 fffffa80`001801a9 fffffa80`05c0a1a0 00000000`00000000 : 0xfffff800`0441f5e0 fffff800`0441f558 00000000`00000000 : fffffa80`001801a9 fffffa80`05c0a1a0 00000000`00000000 fffff880`00e5028c : netr28x+0x25ac28 THREAD_SHA1_HASH_MOD_FUNC: 1764d353450a941fbc74295279ec02651c3d9814 THREAD_SHA1_HASH_MOD_FUNC_OFFSET: bdc70d393af014c177e84e60c668cc911acaf71f THREAD_SHA1_HASH_MOD: 9a9dca34541ae91666e3989df373f06b6e683623 FOLLOWUP_IP: netr28x+4b94f fffff880`04f0c94f ?? ??? SYMBOL_STACK_INDEX: d SYMBOL_NAME: netr28x+4b94f FOLLOWUP_NAME: MachineOwner MODULE_NAME: netr28x IMAGE_NAME: netr28x.sys DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a STACK_COMMAND: .thread ; .cxr ; kb FAILURE_BUCKET_ID: X64_0x5_netr28x+4b94f BUCKET_ID: X64_0x5_netr28x+4b94f PRIMARY_PROBLEM_CLASS: X64_0x5_netr28x+4b94f TARGET_TIME: 2019-04-11T15:07:27.000Z OSBUILD: 7601 OSSERVICEPACK: 1000 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 7 OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 2019-03-06 05:38:53 BUILDDATESTAMP_STR: 190305-1700 BUILDLAB_STR: win7sp1_ldr_escrow BUILDOSVER_STR: 6.1.7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700 ANALYSIS_SESSION_ELAPSED_TIME: 8c6 ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:x64_0x5_netr28x+4b94f FAILURE_ID_HASH: {43753b0b-e234-1a01-8468-7eed644d41ea} Followup: MachineOwner INVALID_PROCESS_ATTACH_ATTEMPT (5) Arguments: Arg1: fffffa80042b59b0 Arg2: fffffa8004c74b00 Arg3: 0000000000000001 Arg4: 0000000000000001 Debugging Details: ------------------ GetUlongPtrFromAddress: unable to read from fffff800030f3300 KEY_VALUES_STRING: 1 Key : Analysis.CPU.Sec Value: 2 Key : Analysis.Elapsed.Sec Value: 2 Key : Analysis.Memory.CommitPeak.Mb Value: 62 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700 SYSTEM_MANUFACTURER: Hewlett-Packard SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC SYSTEM_SKU: J4T62EA#AB8 SYSTEM_VERSION: 0991100000000000000600087 BIOS_VENDOR: Insyde BIOS_VERSION: F.43 BIOS_DATE: 12/19/2017 BASEBOARD_MANUFACTURER: Hewlett-Packard BASEBOARD_PRODUCT: 2211 BASEBOARD_VERSION: 86.56 DUMP_TYPE: 2 BUGCHECK_P1: fffffa80042b59b0 BUGCHECK_P2: fffffa8004c74b00 BUGCHECK_P3: 1 BUGCHECK_P4: 1 CPU_COUNT: 4 CPU_MHZ: 6a0 CPU_VENDOR: GenuineIntel CPU_FAMILY: 6 CPU_MODEL: 45 CPU_STEPPING: 1 CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init) CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT BUGCHECK_STR: 0x5 PROCESS_NAME: chrome.exe CURRENT_IRQL: 2 ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5 ANALYSIS_SESSION_TIME: 06-17-2019 20:48:49.0152 ANALYSIS_VERSION: 10.0.18869.1002 amd64fre DPC_STACK_BASE: FFFFF80000BA2FB0 LOCK_ADDRESS: fffff800030c6240 -- (!locks fffff800030c6240) Cannot get _ERESOURCE type Resource @ nt!PiEngineLock (0xfffff800030c6240) Available 1 total locks PNP_TRIAGE_DATA: Lock address : 0xfffff800030c6240 Thread Count : 0 Thread address: 0x0000000000000000 Thread wait : 0x0 LAST_CONTROL_TRANSFER: from fffff80002e985f2 to fffff80002ee9ba0 STACK_TEXT: fffff800`00ba1cc8 fffff800`02e985f2 : 00000000`00000005 fffffa80`042b59b0 fffffa80`04c74b00 00000000`00000001 : nt!KeBugCheckEx fffff800`00ba1cd0 fffff800`03141127 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeStackAttachProcess+0x52 fffff800`00ba1d50 fffff800`031414bf : 00000000`00000000 fffff8a0`00000000 fffff8a0`00001910 00000000`00000000 : nt!ObpDecrementHandleCount+0x177 fffff800`00ba1dd0 fffff800`031411e4 : 00000000`000008e4 fffffa80`04c74b00 fffff8a0`00001910 00000000`000008e4 : nt!ObpCloseHandleTableEntry+0xaf fffff800`00ba1e60 fffff800`02ef7bd3 : fffffa80`076a6b50 fffff800`00ba1f30 fffff800`031ab200 fffff800`0313776a : nt!ObpCloseHandle+0x94 fffff800`00ba1eb0 fffff800`02eed3b0 : fffff800`03184d73 fffffa80`04e1e060 fffff800`031ab200 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 fffff800`00ba2048 fffff800`03184d73 : fffffa80`04e1e060 fffff800`031ab200 00000000`00000000 00000000`00000000 : nt!KiServiceLinkage fffff800`00ba2050 fffff800`0318ea78 : fffffa80`04e1e060 00000000`00000001 fffffa80`04e1d6e0 00000000`00000000 : nt!PiGetDeviceRegistryProperty+0xab fffff800`00ba21b0 fffff800`03183a90 : fffffa80`04e1e060 fffffa80`04e1e060 00000000`00000000 00000000`00000000 : nt!IoGetDeviceProperty+0xbc fffff800`00ba2290 fffff800`03194f51 : 00000000`ffff0000 fffffa80`07df09f0 fffff880`01480110 fffffa80`05cfe910 : nt!IopOpenOrCreateDeviceRegistryKey+0x14c fffff800`00ba2450 fffff880`014c5152 : fffffa80`080038e0 fffff800`00ba25e0 fffffa80`0700aa78 00000000`000007ff : nt!IoOpenDeviceRegistryKey+0x11 fffff800`00ba2490 fffff880`01430b34 : fffff800`00ba25e0 fffff800`00ba25b8 fffffa80`055e31a0 fffff880`014db21d : ndis!NdisOpenConfiguration+0xb2 fffff800`00ba24d0 fffff880`04e5194f : 00000000`00000000 fffff800`00ba25e0 fffff880`05060c28 00000000`00000000 : ndis!NdisOpenConfigurationEx+0xa4 fffff800`00ba2540 00000000`00000000 : fffff800`00ba25e0 fffff880`05060c28 00000000`00000000 fffffa80`001801a9 : netr28x+0x4b94f THREAD_SHA1_HASH_MOD_FUNC: ae5746727567d6f3e980a5bab83b7524a5dc9ee8 THREAD_SHA1_HASH_MOD_FUNC_OFFSET: a4491f04e0c588cecd320ea5c66c026862f569ea THREAD_SHA1_HASH_MOD: 34d7ba38146ecb972065c22fa7203d72f73eccb4 FOLLOWUP_IP: netr28x+4b94f fffff880`04e5194f ?? ??? SYMBOL_STACK_INDEX: d SYMBOL_NAME: netr28x+4b94f FOLLOWUP_NAME: MachineOwner MODULE_NAME: netr28x IMAGE_NAME: netr28x.sys DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a STACK_COMMAND: .thread ; .cxr ; kb FAILURE_BUCKET_ID: X64_0x5_netr28x+4b94f BUCKET_ID: X64_0x5_netr28x+4b94f PRIMARY_PROBLEM_CLASS: X64_0x5_netr28x+4b94f TARGET_TIME: 2019-04-11T14:09:37.000Z OSBUILD: 7601 OSSERVICEPACK: 1000 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 7 OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 2019-03-06 05:38:53 BUILDDATESTAMP_STR: 190305-1700 BUILDLAB_STR: win7sp1_ldr_escrow BUILDOSVER_STR: 6.1.7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700 ANALYSIS_SESSION_ELAPSED_TIME: 941 ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:x64_0x5_netr28x+4b94f FAILURE_ID_HASH: {43753b0b-e234-1a01-8468-7eed644d41ea} Followup: MachineOwner --------- IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: fffff8a002085398, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000001, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: fffff80003ae56fd, address which referenced memory Debugging Details: ------------------ GetUlongPtrFromAddress: unable to read from fffff80003ab1300 KEY_VALUES_STRING: 1 Key : Analysis.CPU.Sec Value: 1 Key : Analysis.Elapsed.Sec Value: 1 Key : Analysis.Memory.CommitPeak.Mb Value: 62 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700 SYSTEM_MANUFACTURER: Hewlett-Packard SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC SYSTEM_SKU: J4T62EA#AB8 SYSTEM_VERSION: 0991100000000000000600087 BIOS_VENDOR: Insyde BIOS_VERSION: F.43 BIOS_DATE: 12/19/2017 BASEBOARD_MANUFACTURER: Hewlett-Packard BASEBOARD_PRODUCT: 2211 BASEBOARD_VERSION: 86.56 DUMP_TYPE: 2 BUGCHECK_P1: fffff8a002085398 BUGCHECK_P2: 2 BUGCHECK_P3: 1 BUGCHECK_P4: fffff80003ae56fd WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80003ab1100 Unable to get MmSystemRangeStart GetUlongPtrFromAddress: unable to read from fffff80003ab12f0 GetUlongPtrFromAddress: unable to read from fffff80003ab14a8 GetPointerFromAddress: unable to read from fffff80003ab10d8 fffff8a002085398 Paged pool CURRENT_IRQL: 2 FAULTING_IP: nt!HvpDoAllocateCell+101 fffff800`03ae56fd 89443d00 mov dword ptr [rbp+rdi],eax CPU_COUNT: 4 CPU_MHZ: 6a0 CPU_VENDOR: GenuineIntel CPU_FAMILY: 6 CPU_MODEL: 45 CPU_STEPPING: 1 CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init) CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT BUGCHECK_STR: 0xA PROCESS_NAME: System ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5 ANALYSIS_SESSION_TIME: 06-17-2019 20:48:46.0248 ANALYSIS_VERSION: 10.0.18869.1002 amd64fre TRAP_FRAME: fffff80004c1a950 -- (.trap 0xfffff80004c1a950) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000008 rbx=0000000000000000 rcx=0000000000000368 rdx=0000000000000002 rsi=0000000000000000 rdi=0000000000000000 rip=fffff80003ae56fd rsp=fffff80004c1aae0 rbp=0000000000000030 r8=fffff8a000024010 r9=0000000000000005 r10=fffff8a002085000 r11=0000000000000000 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl nz na pe nc nt!HvpDoAllocateCell+0x101: fffff800`03ae56fd 89443d00 mov dword ptr [rbp+rdi],eax ss:0018:00000000`00000030=???????? Resetting default scope LAST_CONTROL_TRANSFER: from fffff800038b5f69 to fffff800038a7ba0 STACK_TEXT: fffff800`04c1a808 fffff800`038b5f69 : 00000000`0000000a fffff8a0`02085398 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx fffff800`04c1a810 fffff800`038b3d88 : 00000000`00000001 fffff8a0`02085398 00000000`00000000 fffff8a0`00024010 : nt!KiBugCheckDispatch+0x69 fffff800`04c1a950 fffff800`03ae56fd : fffff8a0`00024010 fffff8a0`00024010 fffff8a0`0003b420 fffff800`00000000 : nt!KiPageFault+0x448 fffff800`04c1aae0 fffff800`03b27d1d : fffff8a0`00024010 00000000`00000000 00000000`00000000 00000000`ffffffff : nt!HvpDoAllocateCell+0x101 fffff800`04c1ab40 fffff800`03b27bad : 00000000`00000000 fffff8a0`018bcc30 00000000`00000008 fffff800`03b15d5c : nt!HvAllocateCell+0x55 fffff800`04c1ab70 fffff800`03ada4bf : fffff8a0`00024010 fffff8a0`00024010 fffff8a0`018ca640 fffff800`04c1ae18 : nt!CmpAddValueKeyNew+0x69 fffff800`04c1ac40 fffff800`03cc06e3 : 01d501ff`f5623883 fffff800`04c1aff0 fffff8a0`04468820 00000000`00000000 : nt!CmpSetValueKeyNew+0x77 fffff800`04c1ac90 fffff800`03ae5531 : fffff8a0`0506b140 fffff800`04c1ae18 fffffa80`00000004 fffff800`04c1b210 : nt!CmSetValueKey+0xba3 fffff800`04c1add0 fffff800`038b5bd3 : ffffffff`80000dc4 00000000`00000002 fffffa80`00000000 fffff800`00000004 : nt!NtSetValueKey+0x349 fffff800`04c1af00 fffff800`038ab3b0 : fffff800`03bfc2a2 fffff800`04c1b248 fffff880`01525152 fffffa80`00040001 : nt!KiSystemServiceCopyEnd+0x13 fffff800`04c1b108 fffff800`03bfc2a2 : fffff800`04c1b248 fffff880`01525152 fffffa80`00040001 fffff800`04c1b270 : nt!KiServiceLinkage fffff800`04c1b110 fffff880`0152cd96 : 00000000`00000004 fffffa80`0449b4e0 fffff880`0525c030 00000000`000007ff : nt!RtlWriteRegistryValue+0x62 fffff800`04c1b170 fffff880`050b698d : fffff800`04c1b270 fffff880`052c5c28 00000000`00000000 00000000`00000000 : ndis!NdisWriteConfiguration+0x156 fffff800`04c1b1d0 fffff800`04c1b270 : fffff880`052c5c28 00000000`00000000 00000000`00000000 fffff800`001801a9 : netr28x+0x4b98d fffff800`04c1b1d8 fffff880`052c5c28 : 00000000`00000000 00000000`00000000 fffff800`001801a9 fffffa80`05b7f1a0 : 0xfffff800`04c1b270 fffff800`04c1b1e0 00000000`00000000 : 00000000`00000000 fffff800`001801a9 fffffa80`05b7f1a0 fffff800`00000000 : netr28x+0x25ac28 THREAD_SHA1_HASH_MOD_FUNC: 80858fdf941bd645ff48b6997b30f63ac59926fb THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 394aafee51f76470053fa2102b9df0f0f7df42a3 THREAD_SHA1_HASH_MOD: 5d50876435db08b990ce5928fe5c90526c26b16c FOLLOWUP_IP: netr28x+4b98d fffff880`050b698d ?? ??? SYMBOL_STACK_INDEX: d SYMBOL_NAME: netr28x+4b98d FOLLOWUP_NAME: MachineOwner MODULE_NAME: netr28x IMAGE_NAME: netr28x.sys DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a STACK_COMMAND: .thread ; .cxr ; kb FAILURE_BUCKET_ID: X64_0xA_netr28x+4b98d BUCKET_ID: X64_0xA_netr28x+4b98d PRIMARY_PROBLEM_CLASS: X64_0xA_netr28x+4b98d TARGET_TIME: 2019-05-03T22:31:32.000Z OSBUILD: 7601 OSSERVICEPACK: 1000 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 7 OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 2019-03-21 04:38:47 BUILDDATESTAMP_STR: 190320-1700 BUILDLAB_STR: win7sp1_ldr_escrow BUILDOSVER_STR: 6.1.7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700 ANALYSIS_SESSION_ELAPSED_TIME: 7b0 ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:x64_0xa_netr28x+4b98d FAILURE_ID_HASH: {a6eb3f60-a5c3-0bd6-051c-41bf4427925d} Followup: MachineOwner --------- INVALID_PROCESS_ATTACH_ATTEMPT (5) Arguments: Arg1: fffffa80042cf9b0 Arg2: fffffa80045a46e0 Arg3: 0000000000000000 Arg4: 0000000000000001 Debugging Details: ------------------ GetUlongPtrFromAddress: unable to read from fffff800030fb300 KEY_VALUES_STRING: 1 Key : Analysis.CPU.Sec Value: 2 Key : Analysis.Elapsed.Sec Value: 2 Key : Analysis.Memory.CommitPeak.Mb Value: 62 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700 SYSTEM_MANUFACTURER: Hewlett-Packard SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC SYSTEM_SKU: J4T62EA#AB8 SYSTEM_VERSION: 0991100000000000000600087 BIOS_VENDOR: Insyde BIOS_VERSION: F.43 BIOS_DATE: 12/19/2017 BASEBOARD_MANUFACTURER: Hewlett-Packard BASEBOARD_PRODUCT: 2211 BASEBOARD_VERSION: 86.56 DUMP_TYPE: 2 BUGCHECK_P1: fffffa80042cf9b0 BUGCHECK_P2: fffffa80045a46e0 BUGCHECK_P3: 0 BUGCHECK_P4: 1 CPU_COUNT: 4 CPU_MHZ: 6a0 CPU_VENDOR: GenuineIntel CPU_FAMILY: 6 CPU_MODEL: 45 CPU_STEPPING: 1 CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init) CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT BUGCHECK_STR: 0x5 PROCESS_NAME: chrome.exe CURRENT_IRQL: 2 ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5 ANALYSIS_SESSION_TIME: 06-17-2019 20:48:24.0070 ANALYSIS_VERSION: 10.0.18869.1002 amd64fre DPC_STACK_BASE: FFFFF80000BA2FB0 LOCK_ADDRESS: fffff800030ce240 -- (!locks fffff800030ce240) Cannot get _ERESOURCE type Resource @ nt!PiEngineLock (0xfffff800030ce240) Available 1 total locks PNP_TRIAGE_DATA: Lock address : 0xfffff800030ce240 Thread Count : 0 Thread address: 0x0000000000000000 Thread wait : 0x0 LAST_CONTROL_TRANSFER: from fffff80002ea05f2 to fffff80002ef1ba0 STACK_TEXT: fffff800`00ba1cc8 fffff800`02ea05f2 : 00000000`00000005 fffffa80`042cf9b0 fffffa80`045a46e0 00000000`00000000 : nt!KeBugCheckEx fffff800`00ba1cd0 fffff800`03149127 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeStackAttachProcess+0x52 fffff800`00ba1d50 fffff800`031494bf : 00000000`00000000 fffff8a0`00000000 fffff8a0`00001910 00000000`00000000 : nt!ObpDecrementHandleCount+0x177 fffff800`00ba1dd0 fffff800`031491e4 : 00000000`00000b3c fffffa80`045a46e0 fffff8a0`00001910 00000000`00000b3c : nt!ObpCloseHandleTableEntry+0xaf fffff800`00ba1e60 fffff800`02effbd3 : fffffa80`04502060 fffff800`00ba1f30 fffff800`031b3200 fffff800`0313f76a : nt!ObpCloseHandle+0x94 fffff800`00ba1eb0 fffff800`02ef53b0 : fffff800`0318cd73 fffffa80`04ebd060 fffff800`031b3200 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 fffff800`00ba2048 fffff800`0318cd73 : fffffa80`04ebd060 fffff800`031b3200 00000000`00000000 00000000`00000000 : nt!KiServiceLinkage fffff800`00ba2050 fffff800`03196a78 : fffffa80`04ebd060 00000000`00000001 fffffa80`04eba6e0 00000000`00000000 : nt!PiGetDeviceRegistryProperty+0xab fffff800`00ba21b0 fffff800`0318ba90 : fffffa80`04ebd060 fffffa80`04ebd060 00000000`00000000 00000000`00000000 : nt!IoGetDeviceProperty+0xbc fffff800`00ba2290 fffff800`0319cf51 : 00000000`ffff0000 fffffa80`08470cb0 fffff880`0147f110 fffffa80`059fbe30 : nt!IopOpenOrCreateDeviceRegistryKey+0x14c fffff800`00ba2450 fffff880`014c4152 : fffffa80`0681f000 fffff800`00ba25e0 00000000`00000005 00000000`000007ff : nt!IoOpenDeviceRegistryKey+0x11 fffff800`00ba2490 fffff880`0142fb34 : fffff800`00ba25e0 fffff800`00ba25b8 fffffa80`05bf61a0 fffff800`02e262ea : ndis!NdisOpenConfiguration+0xb2 fffff800`00ba24d0 fffff880`0511d94f : 00000000`00000000 fffff800`00ba25e0 fffff880`0532cc28 00000000`00000000 : ndis!NdisOpenConfigurationEx+0xa4 fffff800`00ba2540 00000000`00000000 : fffff800`00ba25e0 fffff880`0532cc28 00000000`00000000 fffffa80`001801a9 : netr28x+0x4b94f THREAD_SHA1_HASH_MOD_FUNC: ae5746727567d6f3e980a5bab83b7524a5dc9ee8 THREAD_SHA1_HASH_MOD_FUNC_OFFSET: a4491f04e0c588cecd320ea5c66c026862f569ea THREAD_SHA1_HASH_MOD: 34d7ba38146ecb972065c22fa7203d72f73eccb4 FOLLOWUP_IP: netr28x+4b94f fffff880`0511d94f ?? ??? SYMBOL_STACK_INDEX: d SYMBOL_NAME: netr28x+4b94f FOLLOWUP_NAME: MachineOwner MODULE_NAME: netr28x IMAGE_NAME: netr28x.sys DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a STACK_COMMAND: .thread ; .cxr ; kb FAILURE_BUCKET_ID: X64_0x5_netr28x+4b94f BUCKET_ID: X64_0x5_netr28x+4b94f PRIMARY_PROBLEM_CLASS: X64_0x5_netr28x+4b94f TARGET_TIME: 2019-04-11T14:13:16.000Z OSBUILD: 7601 OSSERVICEPACK: 1000 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 7 OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 2019-03-06 05:38:53 BUILDDATESTAMP_STR: 190305-1700 BUILDLAB_STR: win7sp1_ldr_escrow BUILDOSVER_STR: 6.1.7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700 ANALYSIS_SESSION_ELAPSED_TIME: 851 ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:x64_0x5_netr28x+4b94f FAILURE_ID_HASH: {43753b0b-e234-1a01-8468-7eed644d41ea} Followup: MachineOwner --------- INVALID_PROCESS_ATTACH_ATTEMPT (5) Arguments: Arg1: fffffa80042ce9b0 Arg2: fffffa800b053b00 Arg3: 0000000000000000 Arg4: 0000000000000001 Debugging Details: ------------------ GetUlongPtrFromAddress: unable to read from fffff800032ed300 KEY_VALUES_STRING: 1 Key : Analysis.CPU.Sec Value: 1 Key : Analysis.Elapsed.Sec Value: 2 Key : Analysis.Memory.CommitPeak.Mb Value: 62 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700 SYSTEM_MANUFACTURER: Hewlett-Packard SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC SYSTEM_SKU: J4T62EA#AB8 SYSTEM_VERSION: 0991100000000000000600087 BIOS_VENDOR: Insyde BIOS_VERSION: F.43 BIOS_DATE: 12/19/2017 BASEBOARD_MANUFACTURER: Hewlett-Packard BASEBOARD_PRODUCT: 2211 BASEBOARD_VERSION: 86.56 DUMP_TYPE: 2 BUGCHECK_P1: fffffa80042ce9b0 BUGCHECK_P2: fffffa800b053b00 BUGCHECK_P3: 0 BUGCHECK_P4: 1 CPU_COUNT: 4 CPU_MHZ: 6a0 CPU_VENDOR: GenuineIntel CPU_FAMILY: 6 CPU_MODEL: 45 CPU_STEPPING: 1 CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init) CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT BUGCHECK_STR: 0x5 PROCESS_NAME: mcbuilder.exe CURRENT_IRQL: 2 ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5 ANALYSIS_SESSION_TIME: 06-17-2019 20:48:40.0990 ANALYSIS_VERSION: 10.0.18869.1002 amd64fre DPC_STACK_BASE: FFFFF80000BA2FB0 LOCK_ADDRESS: fffff800032c0240 -- (!locks fffff800032c0240) Cannot get _ERESOURCE type Resource @ nt!PiEngineLock (0xfffff800032c0240) Available 1 total locks PNP_TRIAGE_DATA: Lock address : 0xfffff800032c0240 Thread Count : 0 Thread address: 0x0000000000000000 Thread wait : 0x0 LAST_CONTROL_TRANSFER: from fffff800030925f2 to fffff800030e3ba0 STACK_TEXT: fffff800`00ba1cc8 fffff800`030925f2 : 00000000`00000005 fffffa80`042ce9b0 fffffa80`0b053b00 00000000`00000000 : nt!KeBugCheckEx fffff800`00ba1cd0 fffff800`0333b127 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeStackAttachProcess+0x52 fffff800`00ba1d50 fffff800`0333b4bf : 00000000`00000000 fffff8a0`00000000 fffff8a0`00001910 00000000`00000000 : nt!ObpDecrementHandleCount+0x177 fffff800`00ba1dd0 fffff800`0333b1e4 : 00000000`00000d0c fffffa80`0b053b00 fffff8a0`00001910 00000000`00000d0c : nt!ObpCloseHandleTableEntry+0xaf fffff800`00ba1e60 fffff800`030f1bd3 : fffffa80`0568b6e0 fffff800`00ba1f30 fffff800`033a5200 fffff800`0333176a : nt!ObpCloseHandle+0x94 fffff800`00ba1eb0 fffff800`030e73b0 : fffff800`0337ed73 fffffa80`04dc8060 fffff800`033a5200 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 fffff800`00ba2048 fffff800`0337ed73 : fffffa80`04dc8060 fffff800`033a5200 00000000`00000000 00000000`00000000 : nt!KiServiceLinkage fffff800`00ba2050 fffff800`03388a78 : fffffa80`04dc8060 00000000`00000001 fffffa80`04dc36e0 00000000`00000000 : nt!PiGetDeviceRegistryProperty+0xab fffff800`00ba21b0 fffff800`0337da90 : fffffa80`04dc8060 fffffa80`04dc8060 00000000`00000000 00000000`00000000 : nt!IoGetDeviceProperty+0xbc fffff800`00ba2290 fffff800`0338ef51 : 00000000`ffff0000 fffffa80`09035950 fffff880`014a0110 fffffa80`05adbd80 : nt!IopOpenOrCreateDeviceRegistryKey+0x14c fffff800`00ba2450 fffff880`014e5152 : fffffa80`00000000 fffff800`00ba25e0 00000000`00000000 00000000`000007ff : nt!IoOpenDeviceRegistryKey+0x11 fffff800`00ba2490 fffff880`01450b34 : fffff800`00ba25e0 fffff800`00ba25b8 fffffa80`05bc91a0 00000000`00000001 : ndis!NdisOpenConfiguration+0xb2 fffff800`00ba24d0 fffff880`056cc94f : 00000000`00000000 fffff800`00ba25e0 fffff880`058dbc28 00000000`00000000 : ndis!NdisOpenConfigurationEx+0xa4 fffff800`00ba2540 00000000`00000000 : fffff800`00ba25e0 fffff880`058dbc28 00000000`00000000 fffffa80`001801a9 : netr28x+0x4b94f THREAD_SHA1_HASH_MOD_FUNC: ae5746727567d6f3e980a5bab83b7524a5dc9ee8 THREAD_SHA1_HASH_MOD_FUNC_OFFSET: a4491f04e0c588cecd320ea5c66c026862f569ea THREAD_SHA1_HASH_MOD: 34d7ba38146ecb972065c22fa7203d72f73eccb4 FOLLOWUP_IP: netr28x+4b94f fffff880`056cc94f ?? ??? SYMBOL_STACK_INDEX: d SYMBOL_NAME: netr28x+4b94f FOLLOWUP_NAME: MachineOwner MODULE_NAME: netr28x IMAGE_NAME: netr28x.sys DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a STACK_COMMAND: .thread ; .cxr ; kb FAILURE_BUCKET_ID: X64_0x5_netr28x+4b94f BUCKET_ID: X64_0x5_netr28x+4b94f PRIMARY_PROBLEM_CLASS: X64_0x5_netr28x+4b94f TARGET_TIME: 2019-04-11T17:47:48.000Z OSBUILD: 7601 OSSERVICEPACK: 1000 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 7 OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 2019-03-06 05:38:53 BUILDDATESTAMP_STR: 190305-1700 BUILDLAB_STR: win7sp1_ldr_escrow BUILDOSVER_STR: 6.1.7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700 ANALYSIS_SESSION_ELAPSED_TIME: 7f5 ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:x64_0x5_netr28x+4b94f FAILURE_ID_HASH: {43753b0b-e234-1a01-8468-7eed644d41ea} Followup: MachineOwner --------- IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: fffff8a006be8c34, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000000, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: fffff80003afb730, address which referenced memory Debugging Details: ------------------ GetUlongPtrFromAddress: unable to read from fffff80003ab2300 KEY_VALUES_STRING: 1 Key : Analysis.CPU.Sec Value: 1 Key : Analysis.Elapsed.Sec Value: 1 Key : Analysis.Memory.CommitPeak.Mb Value: 62 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700 SYSTEM_MANUFACTURER: Hewlett-Packard SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC SYSTEM_SKU: J4T62EA#AB8 SYSTEM_VERSION: 0991100000000000000600087 BIOS_VENDOR: Insyde BIOS_VERSION: F.43 BIOS_DATE: 12/19/2017 BASEBOARD_MANUFACTURER: Hewlett-Packard BASEBOARD_PRODUCT: 2211 BASEBOARD_VERSION: 86.56 DUMP_TYPE: 2 BUGCHECK_P1: fffff8a006be8c34 BUGCHECK_P2: 2 BUGCHECK_P3: 0 BUGCHECK_P4: fffff80003afb730 READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80003ab2100 Unable to get MmSystemRangeStart GetUlongPtrFromAddress: unable to read from fffff80003ab22f0 GetUlongPtrFromAddress: unable to read from fffff80003ab24a8 GetPointerFromAddress: unable to read from fffff80003ab20d8 fffff8a006be8c34 Paged pool CURRENT_IRQL: 2 FAULTING_IP: nt!CmpFindValueByNameFromCache+e0 fffff800`03afb730 428b14b8 mov edx,dword ptr [rax+r15*4] CPU_COUNT: 4 CPU_MHZ: 6a0 CPU_VENDOR: GenuineIntel CPU_FAMILY: 6 CPU_MODEL: 45 CPU_STEPPING: 1 CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init) CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT BUGCHECK_STR: 0xA PROCESS_NAME: System ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5 ANALYSIS_SESSION_TIME: 06-17-2019 20:48:30.0482 ANALYSIS_VERSION: 10.0.18869.1002 amd64fre TRAP_FRAME: fffff80004c21990 -- (.trap 0xfffff80004c21990) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=fffff8a006be8c34 rbx=0000000000000000 rcx=0000000000000000 rdx=00000000ffffffff rsi=0000000000000000 rdi=0000000000000000 rip=fffff80003afb730 rsp=fffff80004c21b20 rbp=fffff80004c21ff0 r8=fffff8a00004ad40 r9=000000000000ffff r10=0000000000000001 r11=fffff80004c21dc8 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl zr na po nc nt!CmpFindValueByNameFromCache+0xe0: fffff800`03afb730 428b14b8 mov edx,dword ptr [rax+r15*4] ds:fffff8a0`06be8c34=???????? Resetting default scope LAST_CONTROL_TRANSFER: from fffff800038b6f69 to fffff800038a8ba0 STACK_TEXT: fffff800`04c21848 fffff800`038b6f69 : 00000000`0000000a fffff8a0`06be8c34 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx fffff800`04c21850 fffff800`038b4d88 : 00000000`00000000 fffff8a0`06be8c34 fffffa80`0a1a6000 fffff8a0`00024010 : nt!KiBugCheckDispatch+0x69 fffff800`04c21990 fffff800`03afb730 : fffff8a0`00024010 00000000`00c6ac30 fffff8a0`0004ad40 00000000`00000000 : nt!KiPageFault+0x448 fffff800`04c21b20 fffff800`03adec38 : fffff8a0`0e0d74a8 fffff800`04c21e18 fffff800`04c21c60 fffff800`04c21c48 : nt!CmpFindValueByNameFromCache+0xe0 fffff800`04c21bf0 fffff800`03cc11e7 : fffff8a0`0e0d74a8 01d50684`f67b3cde fffff8a0`0e0d74a8 00000000`00000000 : nt!CmpCompareNewValueDataAgainstKCBCache+0x78 fffff800`04c21c90 fffff800`03ae6531 : fffff8a0`01c5f710 fffff800`04c21e18 fffffa80`00000004 fffff800`04c22210 : nt!CmSetValueKey+0x6a7 fffff800`04c21dd0 fffff800`038b6bd3 : ffffffff`80002788 00000000`00000002 fffffa80`00000000 fffff800`00000004 : nt!NtSetValueKey+0x349 fffff800`04c21f00 fffff800`038ac3b0 : fffff800`03bfd2a2 fffff800`04c22248 fffff880`017a5152 00000000`c0000001 : nt!KiSystemServiceCopyEnd+0x13 fffff800`04c22108 fffff800`03bfd2a2 : fffff800`04c22248 fffff880`017a5152 00000000`c0000001 fffff800`04c22270 : nt!KiServiceLinkage fffff800`04c22110 fffff880`017acd96 : 00000000`00000004 fffffa80`09b31af0 00000100`00000000 00000000`000007ff : nt!RtlWriteRegistryValue+0x62 fffff800`04c22170 fffff880`056a498d : fffff800`04c22270 fffff880`058b3c28 00000000`00000000 00000000`00000000 : ndis!NdisWriteConfiguration+0x156 fffff800`04c221d0 fffff800`04c22270 : fffff880`058b3c28 00000000`00000000 00000000`00000000 00000000`001801a9 : netr28x+0x4b98d fffff800`04c221d8 fffff880`058b3c28 : 00000000`00000000 00000000`00000000 00000000`001801a9 fffffa80`05b821a0 : 0xfffff800`04c22270 fffff800`04c221e0 00000000`00000000 : 00000000`00000000 00000000`001801a9 fffffa80`05b821a0 00000000`00000000 : netr28x+0x25ac28 THREAD_SHA1_HASH_MOD_FUNC: 935105e89958188e75032d802c31088ef212f1d5 THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 050e790aab7ddac4bfe73c42f1350165ef3ea549 THREAD_SHA1_HASH_MOD: 7921e317582c7f98a7f13cfbcd3c02a86fdcafec FOLLOWUP_IP: netr28x+4b98d fffff880`056a498d ?? ??? SYMBOL_STACK_INDEX: b SYMBOL_NAME: netr28x+4b98d FOLLOWUP_NAME: MachineOwner MODULE_NAME: netr28x IMAGE_NAME: netr28x.sys DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a STACK_COMMAND: .thread ; .cxr ; kb FAILURE_BUCKET_ID: X64_0xA_netr28x+4b98d BUCKET_ID: X64_0xA_netr28x+4b98d PRIMARY_PROBLEM_CLASS: X64_0xA_netr28x+4b98d TARGET_TIME: 2019-05-09T16:33:41.000Z OSBUILD: 7601 OSSERVICEPACK: 1000 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 7 OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 2019-03-21 04:38:47 BUILDDATESTAMP_STR: 190320-1700 BUILDLAB_STR: win7sp1_ldr_escrow BUILDOSVER_STR: 6.1.7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700 ANALYSIS_SESSION_ELAPSED_TIME: 716 ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:x64_0xa_netr28x+4b98d FAILURE_ID_HASH: {a6eb3f60-a5c3-0bd6-051c-41bf4427925d} Followup: MachineOwner --------- INVALID_PROCESS_ATTACH_ATTEMPT (5) Arguments: Arg1: fffffa80042b59b0 Arg2: fffffa80048376b0 Arg3: 0000000000000000 Arg4: 0000000000000001 Debugging Details: ------------------ GetUlongPtrFromAddress: unable to read from fffff8000309f300 KEY_VALUES_STRING: 1 Key : Analysis.CPU.Sec Value: 1 Key : Analysis.Elapsed.Sec Value: 1 Key : Analysis.Memory.CommitPeak.Mb Value: 62 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700 SYSTEM_MANUFACTURER: Hewlett-Packard SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC SYSTEM_SKU: J4T62EA#AB8 SYSTEM_VERSION: 0991100000000000000600087 BIOS_VENDOR: Insyde BIOS_VERSION: F.43 BIOS_DATE: 12/19/2017 BASEBOARD_MANUFACTURER: Hewlett-Packard BASEBOARD_PRODUCT: 2211 BASEBOARD_VERSION: 86.56 DUMP_TYPE: 2 BUGCHECK_P1: fffffa80042b59b0 BUGCHECK_P2: fffffa80048376b0 BUGCHECK_P3: 0 BUGCHECK_P4: 1 CPU_COUNT: 4 CPU_MHZ: 6a0 CPU_VENDOR: GenuineIntel CPU_FAMILY: 6 CPU_MODEL: 45 CPU_STEPPING: 1 CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init) CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT BUGCHECK_STR: 0x5 PROCESS_NAME: PointBlank.exe CURRENT_IRQL: 2 ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5 ANALYSIS_SESSION_TIME: 06-17-2019 21:16:16.0171 ANALYSIS_VERSION: 10.0.18869.1002 amd64fre DPC_STACK_BASE: FFFFF80000BA2FB0 LOCK_ADDRESS: fffff80003072240 -- (!locks fffff80003072240) Cannot get _ERESOURCE type Resource @ nt!PiEngineLock (0xfffff80003072240) Available 1 total locks PNP_TRIAGE_DATA: Lock address : 0xfffff80003072240 Thread Count : 0 Thread address: 0x0000000000000000 Thread wait : 0x0 LAST_CONTROL_TRANSFER: from fffff80002e445f2 to fffff80002e95ba0 STACK_TEXT: fffff800`00ba1cc8 fffff800`02e445f2 : 00000000`00000005 fffffa80`042b59b0 fffffa80`048376b0 00000000`00000000 : nt!KeBugCheckEx fffff800`00ba1cd0 fffff800`030ed127 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeStackAttachProcess+0x52 fffff800`00ba1d50 fffff800`030ed4bf : 00000000`00000000 fffff8a0`00000000 fffff8a0`00001910 00000000`00000000 : nt!ObpDecrementHandleCount+0x177 fffff800`00ba1dd0 fffff800`030ed1e4 : 00000000`00000c9c fffffa80`048376b0 fffff8a0`00001910 00000000`00000c9c : nt!ObpCloseHandleTableEntry+0xaf fffff800`00ba1e60 fffff800`02ea3bd3 : fffffa80`04988060 fffff800`00ba1f30 fffff800`03157200 fffff800`030e376a : nt!ObpCloseHandle+0x94 fffff800`00ba1eb0 fffff800`02e993b0 : fffff800`03130d73 fffffa80`04e7d060 fffff800`03157200 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 fffff800`00ba2048 fffff800`03130d73 : fffffa80`04e7d060 fffff800`03157200 00000000`00000000 00000000`00000000 : nt!KiServiceLinkage fffff800`00ba2050 fffff800`0313aa78 : fffffa80`04e7d060 00000000`00000001 fffffa80`04e386e0 00000000`00000000 : nt!PiGetDeviceRegistryProperty+0xab fffff800`00ba21b0 fffff800`0312fa90 : fffffa80`04e7d060 fffffa80`04e7d060 00000000`00000000 00000000`00000000 : nt!IoGetDeviceProperty+0xbc fffff800`00ba2290 fffff800`03140f51 : 00000000`ffff0000 fffffa80`08033990 fffff880`014d7110 fffffa80`05bfaf70 : nt!IopOpenOrCreateDeviceRegistryKey+0x14c fffff800`00ba2450 fffff880`0151c152 : fffffa80`049479f0 fffff800`00ba25e0 fffffa80`06f64a78 00000000`000007ff : nt!IoOpenDeviceRegistryKey+0x11 fffff800`00ba2490 fffff880`01487b34 : fffff800`00ba25e0 fffff800`00ba25b8 fffffa80`05bf91a0 fffff880`0153221d : ndis!NdisOpenConfiguration+0xb2 fffff800`00ba24d0 fffff880`04eff94f : fffffa80`00000000 fffff800`00ba25e0 fffff880`0510ec28 00000000`00000000 : ndis!NdisOpenConfigurationEx+0xa4 fffff800`00ba2540 fffffa80`00000000 : fffff800`00ba25e0 fffff880`0510ec28 00000000`00000000 00000000`001801a9 : netr28x+0x4b94f fffff800`00ba2548 fffff800`00ba25e0 : fffff880`0510ec28 00000000`00000000 00000000`001801a9 fffffa80`05bf91a0 : 0xfffffa80`00000000 fffff800`00ba2550 fffff880`0510ec28 : 00000000`00000000 00000000`001801a9 fffffa80`05bf91a0 fffffa80`00000000 : 0xfffff800`00ba25e0 fffff800`00ba2558 00000000`00000000 : 00000000`001801a9 fffffa80`05bf91a0 fffffa80`00000000 fffff880`04f0be2e : netr28x+0x25ac28 THREAD_SHA1_HASH_MOD_FUNC: 1764d353450a941fbc74295279ec02651c3d9814 THREAD_SHA1_HASH_MOD_FUNC_OFFSET: bdc70d393af014c177e84e60c668cc911acaf71f THREAD_SHA1_HASH_MOD: 9a9dca34541ae91666e3989df373f06b6e683623 FOLLOWUP_IP: netr28x+4b94f fffff880`04eff94f ?? ??? SYMBOL_STACK_INDEX: d SYMBOL_NAME: netr28x+4b94f FOLLOWUP_NAME: MachineOwner MODULE_NAME: netr28x IMAGE_NAME: netr28x.sys DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a STACK_COMMAND: .thread ; .cxr ; kb FAILURE_BUCKET_ID: X64_0x5_netr28x+4b94f BUCKET_ID: X64_0x5_netr28x+4b94f PRIMARY_PROBLEM_CLASS: X64_0x5_netr28x+4b94f TARGET_TIME: 2019-04-11T14:53:19.000Z OSBUILD: 7601 OSSERVICEPACK: 1000 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 7 OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 2019-03-06 05:38:53 BUILDDATESTAMP_STR: 190305-1700 BUILDLAB_STR: win7sp1_ldr_escrow BUILDOSVER_STR: 6.1.7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700 ANALYSIS_SESSION_ELAPSED_TIME: 7ca ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:x64_0x5_netr28x+4b94f FAILURE_ID_HASH: {43753b0b-e234-1a01-8468-7eed644d41ea} Followup: MachineOwner --------- IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: fffff8a000e8ee98, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000001, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: fffff800032e66fd, address which referenced memory Debugging Details: ------------------ GetUlongPtrFromAddress: unable to read from fffff800032b2300 KEY_VALUES_STRING: 1 Key : Analysis.CPU.Sec Value: 1 Key : Analysis.Elapsed.Sec Value: 1 Key : Analysis.Memory.CommitPeak.Mb Value: 62 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700 SYSTEM_MANUFACTURER: Hewlett-Packard SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC SYSTEM_SKU: J4T62EA#AB8 SYSTEM_VERSION: 0991100000000000000600087 BIOS_VENDOR: Insyde BIOS_VERSION: F.43 BIOS_DATE: 12/19/2017 BASEBOARD_MANUFACTURER: Hewlett-Packard BASEBOARD_PRODUCT: 2211 BASEBOARD_VERSION: 86.56 DUMP_TYPE: 2 BUGCHECK_P1: fffff8a000e8ee98 BUGCHECK_P2: 2 BUGCHECK_P3: 1 BUGCHECK_P4: fffff800032e66fd WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800032b2100 Unable to get MmSystemRangeStart GetUlongPtrFromAddress: unable to read from fffff800032b22f0 GetUlongPtrFromAddress: unable to read from fffff800032b24a8 GetPointerFromAddress: unable to read from fffff800032b20d8 fffff8a000e8ee98 Paged pool CURRENT_IRQL: 2 FAULTING_IP: nt!HvpDoAllocateCell+101 fffff800`032e66fd 89443d00 mov dword ptr [rbp+rdi],eax CPU_COUNT: 4 CPU_MHZ: 6a0 CPU_VENDOR: GenuineIntel CPU_FAMILY: 6 CPU_MODEL: 45 CPU_STEPPING: 1 CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init) CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT BUGCHECK_STR: 0xA PROCESS_NAME: System ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5 ANALYSIS_SESSION_TIME: 06-17-2019 21:16:26.0291 ANALYSIS_VERSION: 10.0.18869.1002 amd64fre TRAP_FRAME: fffff80004418950 -- (.trap 0xfffff80004418950) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000020 rbx=0000000000000000 rcx=0000000000002e68 rdx=0000000000000006 rsi=0000000000000000 rdi=0000000000000000 rip=fffff800032e66fd rsp=fffff80004418ae0 rbp=0000000000000030 r8=fffff8a000024010 r9=0000000000000005 r10=fffff8a000e8c000 r11=0000000000000000 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl nz na pe nc nt!HvpDoAllocateCell+0x101: fffff800`032e66fd 89443d00 mov dword ptr [rbp+rdi],eax ss:0018:00000000`00000030=???????? Resetting default scope LAST_CONTROL_TRANSFER: from fffff800030b6f69 to fffff800030a8ba0 STACK_TEXT: fffff800`04418808 fffff800`030b6f69 : 00000000`0000000a fffff8a0`00e8ee98 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx fffff800`04418810 fffff800`030b4d88 : 00000000`00000001 fffff8a0`00e8ee98 00000000`00000000 fffff8a0`00024010 : nt!KiBugCheckDispatch+0x69 fffff800`04418950 fffff800`032e66fd : fffff8a0`00024010 fffff8a0`00024010 fffff8a0`0004b9a0 fffff800`00000000 : nt!KiPageFault+0x448 fffff800`04418ae0 fffff800`03328d1d : fffff8a0`00024010 00000000`00000000 00000000`00000000 00000000`ffffffff : nt!HvpDoAllocateCell+0x101 fffff800`04418b40 fffff800`03328bad : 00000000`00000000 fffff8a0`00ff0c30 00000000`00000008 fffff800`03316d5c : nt!HvAllocateCell+0x55 fffff800`04418b70 fffff800`032db4bf : fffff8a0`00024010 fffff8a0`00024010 fffff8a0`00ffe640 fffff800`04418e18 : nt!CmpAddValueKeyNew+0x69 fffff800`04418c40 fffff800`034c16e3 : 01d4fd21`140179ca fffff800`04418ff0 fffff8a0`050bd948 00000000`00000000 : nt!CmpSetValueKeyNew+0x77 fffff800`04418c90 fffff800`032e6531 : fffff8a0`0df75fa0 fffff800`04418e18 fffffa80`00000004 fffff800`04419210 : nt!CmSetValueKey+0xba3 fffff800`04418dd0 fffff800`030b6bd3 : ffffffff`80000ab0 00000000`00000002 fffffa80`00000000 fffff800`00000004 : nt!NtSetValueKey+0x349 fffff800`04418f00 fffff800`030ac3b0 : fffff800`033fd2a2 fffff800`04419248 fffff880`014a9152 fffffa80`051e12f0 : nt!KiSystemServiceCopyEnd+0x13 fffff800`04419108 fffff800`033fd2a2 : fffff800`04419248 fffff880`014a9152 fffffa80`051e12f0 fffff800`04419270 : nt!KiServiceLinkage fffff800`04419110 fffff880`014b0d96 : 00000000`00000004 fffffa80`0855a220 00000000`ffffffff 00000000`000007ff : nt!RtlWriteRegistryValue+0x62 fffff800`04419170 fffff880`04eef98d : fffff800`04419270 fffff880`050fec28 00000000`00000000 00000000`00000000 : ndis!NdisWriteConfiguration+0x156 fffff800`044191d0 fffff800`04419270 : fffff880`050fec28 00000000`00000000 00000000`00000000 fffff800`001801a9 : netr28x+0x4b98d fffff800`044191d8 fffff880`050fec28 : 00000000`00000000 00000000`00000000 fffff800`001801a9 fffffa80`05be11a0 : 0xfffff800`04419270 fffff800`044191e0 00000000`00000000 : 00000000`00000000 fffff800`001801a9 fffffa80`05be11a0 fffff800`00000000 : netr28x+0x25ac28 THREAD_SHA1_HASH_MOD_FUNC: 80858fdf941bd645ff48b6997b30f63ac59926fb THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 394aafee51f76470053fa2102b9df0f0f7df42a3 THREAD_SHA1_HASH_MOD: 5d50876435db08b990ce5928fe5c90526c26b16c FOLLOWUP_IP: netr28x+4b98d fffff880`04eef98d ?? ??? SYMBOL_STACK_INDEX: d SYMBOL_NAME: netr28x+4b98d FOLLOWUP_NAME: MachineOwner MODULE_NAME: netr28x IMAGE_NAME: netr28x.sys DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a STACK_COMMAND: .thread ; .cxr ; kb FAILURE_BUCKET_ID: X64_0xA_netr28x+4b98d BUCKET_ID: X64_0xA_netr28x+4b98d PRIMARY_PROBLEM_CLASS: X64_0xA_netr28x+4b98d TARGET_TIME: 2019-04-27T17:46:01.000Z OSBUILD: 7601 OSSERVICEPACK: 1000 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 7 OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 2019-03-21 04:38:47 BUILDDATESTAMP_STR: 190320-1700 BUILDLAB_STR: win7sp1_ldr_escrow BUILDOSVER_STR: 6.1.7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700 ANALYSIS_SESSION_ELAPSED_TIME: 720 ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:x64_0xa_netr28x+4b98d FAILURE_ID_HASH: {a6eb3f60-a5c3-0bd6-051c-41bf4427925d} Followup: MachineOwner --------- IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: fffff8a000b0b260, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000001, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: fffff800032d1738, address which referenced memory Debugging Details: ------------------ GetUlongPtrFromAddress: unable to read from fffff8000329d300 KEY_VALUES_STRING: 1 Key : Analysis.CPU.Sec Value: 1 Key : Analysis.Elapsed.Sec Value: 1 Key : Analysis.Memory.CommitPeak.Mb Value: 62 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700 SYSTEM_MANUFACTURER: Hewlett-Packard SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC SYSTEM_SKU: J4T62EA#AB8 SYSTEM_VERSION: 0991100000000000000600087 BIOS_VENDOR: Insyde BIOS_VERSION: F.43 BIOS_DATE: 12/19/2017 BASEBOARD_MANUFACTURER: Hewlett-Packard BASEBOARD_PRODUCT: 2211 BASEBOARD_VERSION: 86.56 DUMP_TYPE: 2 BUGCHECK_P1: fffff8a000b0b260 BUGCHECK_P2: 2 BUGCHECK_P3: 1 BUGCHECK_P4: fffff800032d1738 WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff8000329d100 Unable to get MmSystemRangeStart GetUlongPtrFromAddress: unable to read from fffff8000329d2f0 GetUlongPtrFromAddress: unable to read from fffff8000329d4a8 GetPointerFromAddress: unable to read from fffff8000329d0d8 fffff8a000b0b260 Paged pool CURRENT_IRQL: 2 FAULTING_IP: nt!HvpDoAllocateCell+13c fffff800`032d1738 8907 mov dword ptr [rdi],eax CPU_COUNT: 4 CPU_MHZ: 6a0 CPU_VENDOR: GenuineIntel CPU_FAMILY: 6 CPU_MODEL: 45 CPU_STEPPING: 1 CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init) CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT BUGCHECK_STR: 0xA PROCESS_NAME: System ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5 ANALYSIS_SESSION_TIME: 06-17-2019 21:16:23.0541 ANALYSIS_VERSION: 10.0.18869.1002 amd64fre TRAP_FRAME: fffff80000b9b950 -- (.trap 0xfffff80000b9b950) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=00000000ffffffd0 rbx=0000000000000000 rcx=000000000000000c rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000 rip=fffff800032d1738 rsp=fffff80000b9bae0 rbp=0000000000000030 r8=fffff8a0000512e0 r9=0000000000000005 r10=000000000000023b r11=0000000000000000 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na pe cy nt!HvpDoAllocateCell+0x13c: fffff800`032d1738 8907 mov dword ptr [rdi],eax ds:00000000`00000000=???????? Resetting default scope LAST_CONTROL_TRANSFER: from fffff800030a1f69 to fffff80003093ba0 STACK_TEXT: fffff800`00b9b808 fffff800`030a1f69 : 00000000`0000000a fffff8a0`00b0b260 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx fffff800`00b9b810 fffff800`0309fd88 : 00000000`00000001 fffff8a0`00b0b260 00000000`00000000 fffff8a0`00024010 : nt!KiBugCheckDispatch+0x69 fffff800`00b9b950 fffff800`032d1738 : fffff8a0`00024010 fffff8a0`00024010 fffff8a0`000512e0 fffff800`00000000 : nt!KiPageFault+0x448 fffff800`00b9bae0 fffff800`03313d0d : fffff8a0`00024010 00000000`00000000 00000000`00000000 00000000`ffffffff : nt!HvpDoAllocateCell+0x13c fffff800`00b9bb40 fffff800`03313b9d : 00000000`00000000 fffff8a0`00f38c30 00000000`00000008 fffff800`03301d5c : nt!HvAllocateCell+0x55 fffff800`00b9bb70 fffff800`032c64bf : fffff8a0`00024010 fffff8a0`00024010 fffff8a0`00f46640 fffff800`00b9be18 : nt!CmpAddValueKeyNew+0x69 fffff800`00b9bc40 fffff800`034ac6a3 : 01d4f07a`dd071b78 fffff800`00b9bff0 fffff8a0`04a444a8 00000000`00000000 : nt!CmpSetValueKeyNew+0x77 fffff800`00b9bc90 fffff800`032d1531 : fffff8a0`09c3f770 fffff800`00b9be18 fffffa80`00000004 fffff800`00b9c210 : nt!CmSetValueKey+0xba3 fffff800`00b9bdd0 fffff800`030a1bd3 : ffffffff`80000b54 00000000`00000002 fffffa80`00000000 fffff800`00000004 : nt!NtSetValueKey+0x349 fffff800`00b9bf00 fffff800`030973b0 : fffff800`033e8272 fffff800`00b9c248 fffff880`0151b152 fffffa80`074a45f0 : nt!KiSystemServiceCopyEnd+0x13 fffff800`00b9c108 fffff800`033e8272 : fffff800`00b9c248 fffff880`0151b152 fffffa80`074a45f0 fffff800`00b9c270 : nt!KiServiceLinkage fffff800`00b9c110 fffff880`01522d96 : 00000000`00000004 fffffa80`05970b70 fffff800`03210800 00000000`000007ff : nt!RtlWriteRegistryValue+0x62 fffff800`00b9c170 fffff880`04eef98d : fffff800`00b9c270 fffff880`050fec28 00000000`00000000 00000000`00000000 : ndis!NdisWriteConfiguration+0x156 fffff800`00b9c1d0 fffff800`00b9c270 : fffff880`050fec28 00000000`00000000 00000000`00000000 fffffa80`001801a9 : netr28x+0x4b98d fffff800`00b9c1d8 fffff880`050fec28 : 00000000`00000000 00000000`00000000 fffffa80`001801a9 fffffa80`05b741a0 : 0xfffff800`00b9c270 fffff800`00b9c1e0 00000000`00000000 : 00000000`00000000 fffffa80`001801a9 fffffa80`05b741a0 00000000`00000000 : netr28x+0x25ac28 THREAD_SHA1_HASH_MOD_FUNC: 80858fdf941bd645ff48b6997b30f63ac59926fb THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 60ef2d8b5c8aa9ab3d61fd3d0f87c6db127d6016 THREAD_SHA1_HASH_MOD: 5d50876435db08b990ce5928fe5c90526c26b16c FOLLOWUP_IP: netr28x+4b98d fffff880`04eef98d ?? ??? SYMBOL_STACK_INDEX: d SYMBOL_NAME: netr28x+4b98d FOLLOWUP_NAME: MachineOwner MODULE_NAME: netr28x IMAGE_NAME: netr28x.sys DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a STACK_COMMAND: .thread ; .cxr ; kb FAILURE_BUCKET_ID: X64_0xA_netr28x+4b98d BUCKET_ID: X64_0xA_netr28x+4b98d PRIMARY_PROBLEM_CLASS: X64_0xA_netr28x+4b98d TARGET_TIME: 2019-04-11T15:25:58.000Z OSBUILD: 7601 OSSERVICEPACK: 1000 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 7 OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 2019-03-06 05:38:53 BUILDDATESTAMP_STR: 190305-1700 BUILDLAB_STR: win7sp1_ldr_escrow BUILDOSVER_STR: 6.1.7601.24387.amd64fre.win7sp1_ldr_escrow.190305-1700 ANALYSIS_SESSION_ELAPSED_TIME: 7b6 ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:x64_0xa_netr28x+4b98d FAILURE_ID_HASH: {a6eb3f60-a5c3-0bd6-051c-41bf4427925d} Followup: MachineOwner --------- IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: fffff8a0067d0004, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000000, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: fffff800032dccfe, address which referenced memory Debugging Details: ------------------ GetUlongPtrFromAddress: unable to read from fffff800032a8300 KEY_VALUES_STRING: 1 Key : Analysis.CPU.Sec Value: 1 Key : Analysis.Elapsed.Sec Value: 1 Key : Analysis.Memory.CommitPeak.Mb Value: 62 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700 SYSTEM_MANUFACTURER: Hewlett-Packard SYSTEM_PRODUCT_NAME: HP 250 G3 Notebook PC SYSTEM_SKU: J4T62EA#AB8 SYSTEM_VERSION: 0991100000000000000600087 BIOS_VENDOR: Insyde BIOS_VERSION: F.43 BIOS_DATE: 12/19/2017 BASEBOARD_MANUFACTURER: Hewlett-Packard BASEBOARD_PRODUCT: 2211 BASEBOARD_VERSION: 86.56 DUMP_TYPE: 2 BUGCHECK_P1: fffff8a0067d0004 BUGCHECK_P2: 2 BUGCHECK_P3: 0 BUGCHECK_P4: fffff800032dccfe READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800032a8100 Unable to get MmSystemRangeStart GetUlongPtrFromAddress: unable to read from fffff800032a82f0 GetUlongPtrFromAddress: unable to read from fffff800032a84a8 GetPointerFromAddress: unable to read from fffff800032a80d8 fffff8a0067d0004 Paged pool CURRENT_IRQL: 2 FAULTING_IP: nt!HvpScanForFreeCellInViewWindow+16a fffff800`032dccfe 8b4804 mov ecx,dword ptr [rax+4] CPU_COUNT: 4 CPU_MHZ: 6a0 CPU_VENDOR: GenuineIntel CPU_FAMILY: 6 CPU_MODEL: 45 CPU_STEPPING: 1 CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init) CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT BUGCHECK_STR: 0xA PROCESS_NAME: System ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5 ANALYSIS_SESSION_TIME: 06-17-2019 21:16:21.0060 ANALYSIS_VERSION: 10.0.18869.1002 amd64fre TRAP_FRAME: fffff80004421860 -- (.trap 0xfffff80004421860) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=fffff8a0067d0000 rbx=0000000000000000 rcx=0000000000000000 rdx=0000000000683000 rsi=0000000000000000 rdi=0000000000000000 rip=fffff800032dccfe rsp=fffff800044219f0 rbp=0000000000000683 r8=0000000000000083 r9=0000000000000000 r10=fffff8000300b000 r11=0000000000000006 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na po nc nt!HvpScanForFreeCellInViewWindow+0x16a: fffff800`032dccfe 8b4804 mov ecx,dword ptr [rax+4] ds:fffff8a0`067d0004=00683000 Resetting default scope LAST_CONTROL_TRANSFER: from fffff800030acf69 to fffff8000309eba0 STACK_TEXT: fffff800`04421718 fffff800`030acf69 : 00000000`0000000a fffff8a0`067d0004 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx fffff800`04421720 fffff800`030aad88 : 00000000`00000000 fffff8a0`067d0004 fffff800`031ff100 00000000`00000000 : nt!KiBugCheckDispatch+0x69 fffff800`04421860 fffff800`032dccfe : 00000000`00000000 00000000`003fe000 00000000`00001000 00000000`00000000 : nt!KiPageFault+0x448 fffff800`044219f0 fffff800`032dcb0a : fffff800`00683000 fffff800`00000011 00000000`00000030 fffff800`00000000 : nt!HvpScanForFreeCellInViewWindow+0x16a fffff800`04421a70 fffff800`032dc66e : 00000000`00000030 fffff800`00000005 ffffffff`00000030 fffff800`00000000 : nt!HvpFindFreeCell+0x1ba fffff800`04421ae0 fffff800`0331ed1d : fffff8a0`00024010 00000000`00000000 00000000`00000000 00000000`ffffffff : nt!HvpDoAllocateCell+0x72 fffff800`04421b40 fffff800`0331ebad : 00000000`00000000 fffff8a0`061e8c30 00000000`00000008 fffff800`0330cd5c : nt!HvAllocateCell+0x55 fffff800`04421b70 fffff800`032d14bf : fffff8a0`00024010 fffff8a0`00024010 fffff8a0`061f6640 fffff800`04421e18 : nt!CmpAddValueKeyNew+0x69 fffff800`04421c40 fffff800`034b76e3 : 01d4f848`5814f677 fffff800`04421ff0 fffff8a0`02c84b98 00000000`00000000 : nt!CmpSetValueKeyNew+0x77 fffff800`04421c90 fffff800`032dc531 : fffff8a0`04cbac70 fffff800`04421e18 fffffa80`00000004 fffff800`04422210 : nt!CmSetValueKey+0xba3 fffff800`04421dd0 fffff800`030acbd3 : ffffffff`80000de8 00000000`00000002 fffffa80`00000000 fffff800`00000004 : nt!NtSetValueKey+0x349 fffff800`04421f00 fffff800`030a23b0 : fffff800`033f32a2 fffff800`04422248 fffff880`01725152 fffffa80`00000000 : nt!KiSystemServiceCopyEnd+0x13 fffff800`04422108 fffff800`033f32a2 : fffff800`04422248 fffff880`01725152 fffffa80`00000000 fffff800`04422270 : nt!KiServiceLinkage fffff800`04422110 fffff880`0172cd96 : 00000000`00000004 fffffa80`05d89cd0 fffff800`04422200 00000000`000007ff : nt!RtlWriteRegistryValue+0x62 fffff800`04422170 fffff880`0510f98d : fffff800`04422270 fffff880`0531ec28 00000000`00000000 00000000`00000000 : ndis!NdisWriteConfiguration+0x156 fffff800`044221d0 fffff800`04422270 : fffff880`0531ec28 00000000`00000000 00000000`00000000 fffff880`001801a9 : netr28x+0x4b98d fffff800`044221d8 fffff880`0531ec28 : 00000000`00000000 00000000`00000000 fffff880`001801a9 fffffa80`05b701a0 : 0xfffff800`04422270 fffff800`044221e0 00000000`00000000 : 00000000`00000000 fffff880`001801a9 fffffa80`05b701a0 0000000e`00000000 : netr28x+0x25ac28 THREAD_SHA1_HASH_MOD_FUNC: a2c5409ed52347576830e095aabe2e20325151e5 THREAD_SHA1_HASH_MOD_FUNC_OFFSET: cf883ff24fbd42e0f8dd5b2bf40fd2071e6cd531 THREAD_SHA1_HASH_MOD: 56bd18a7fabf3c16adac1e3911e9aab0524685a1 FOLLOWUP_IP: netr28x+4b98d fffff880`0510f98d ?? ??? SYMBOL_STACK_INDEX: f SYMBOL_NAME: netr28x+4b98d FOLLOWUP_NAME: MachineOwner MODULE_NAME: netr28x IMAGE_NAME: netr28x.sys DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a STACK_COMMAND: .thread ; .cxr ; kb FAILURE_BUCKET_ID: X64_0xA_netr28x+4b98d BUCKET_ID: X64_0xA_netr28x+4b98d PRIMARY_PROBLEM_CLASS: X64_0xA_netr28x+4b98d TARGET_TIME: 2019-04-21T13:44:29.000Z OSBUILD: 7601 OSSERVICEPACK: 1000 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 7 OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 2019-03-21 04:38:47 BUILDDATESTAMP_STR: 190320-1700 BUILDLAB_STR: win7sp1_ldr_escrow BUILDOSVER_STR: 6.1.7601.24408.amd64fre.win7sp1_ldr_escrow.190320-1700 ANALYSIS_SESSION_ELAPSED_TIME: 704 ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:x64_0xa_netr28x+4b98d FAILURE_ID_HASH: {a6eb3f60-a5c3-0bd6-051c-41bf4427925d} Followup: MachineOwner --------- 0: kd> lmvm netr28x start end module name fffff880`050c4000 fffff880`0532e000 netr28x T (no symbols) Loaded symbol image file: netr28x.sys Image path: \SystemRoot\system32\DRIVERS\netr28x.sys Image name: netr28x.sys Timestamp: Mon Apr 20 03:22:50 2015 (5534D37A) CheckSum: 0026BF4B ImageSize: 0026A000 Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4 Information from resource tables: