*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000059, memory referenced
Arg2: 000000000000000d, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff800026e1741, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
SYSTEM_MANUFACTURER: System manufacturer
SYSTEM_PRODUCT_NAME: System Product Name
SYSTEM_SKU: To Be Filled By O.E.M.
SYSTEM_VERSION: System Version
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 0704
BIOS_DATE: 06/11/2010
BASEBOARD_MANUFACTURER: ASUSTeK Computer INC.
BASEBOARD_PRODUCT: M4A78LT-M-LE
BASEBOARD_VERSION: Rev X.0x
DUMP_TYPE: 2
BUGCHECK_P1: 59
BUGCHECK_P2: d
BUGCHECK_P3: 1
BUGCHECK_P4: fffff800026e1741
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800029060e8
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff80002906280
GetUlongPtrFromAddress: unable to read from fffff80002906408
GetPointerFromAddress: unable to read from fffff800029060a8
0000000000000059
CURRENT_IRQL: d
FAULTING_IP:
nt!KiSecondaryClockInterrupt+131
fffff800`026e1741 fa cli
CPU_COUNT: 2
CPU_MHZ: bc5
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 10
CPU_MODEL: 6
CPU_STEPPING: 3
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: RiotClientUxRe
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 12-07-2019 22:01:57.0156
ANALYSIS_VERSION: 10.0.18362.1 x86fre
TRAP_FRAME: fffff880069eca90 -- (.trap 0xfffff880069eca90)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=36c178ef42909000 rbx=0000000000000000 rcx=0000000000000011
rdx=0000000000015949 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800026e1741 rsp=fffff880069ecc20 rbp=fffff880069ecca0
r8=0000000000019af5 r9=0000000000000000 r10=fffffa8004a52760
r11=0000000000200246 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
nt!KiSecondaryClockInterrupt+0x131:
fffff800`026e1741 fa cli
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800026d4be9 to fffff800026d5640
STACK_TEXT:
fffff880`069ec948 fffff800`026d4be9 : 00000000`0000000a 00000000`00000059 00000000`0000000d 00000000`00000001 : nt!KeBugCheckEx
fffff880`069ec950 fffff800`026d3860 : 00000000`00000000 fffff800`02613b7f 00000000`00000000 00000000`00000100 : nt!KiBugCheckDispatch+0x69
fffff880`069eca90 fffff800`026e1741 : 00000000`00000100 fffff880`069ecca0 00000000`0c979400 00000000`ff111111 : nt!KiPageFault+0x260
fffff880`069ecc20 00000000`6786bb5b : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSecondaryClockInterrupt+0x131
00000000`0461e6b4 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x6786bb5b
THREAD_SHA1_HASH_MOD_FUNC: d0655a5790ff24111a396e0921e13ae235853a64
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 64a6c966c86a2ed164d9aafd72b2bc2bc54d31c0
THREAD_SHA1_HASH_MOD: d084f7dfa548ce4e51810e4fd5914176ebc66791
FOLLOWUP_IP:
nt!KiSecondaryClockInterrupt+131
fffff800`026e1741 fa cli
FAULT_INSTR_CODE: 8b4851fa
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!KiSecondaryClockInterrupt+131
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4ce7951a
IMAGE_VERSION: 6.1.7601.17514
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: X64_0xA_nt!KiSecondaryClockInterrupt+131
BUCKET_ID: X64_0xA_nt!KiSecondaryClockInterrupt+131
PRIMARY_PROBLEM_CLASS: X64_0xA_nt!KiSecondaryClockInterrupt+131
TARGET_TIME: 2019-12-07T18:50:52.000Z
OSBUILD: 7601
OSSERVICEPACK: 1000
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 7
OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2010-11-20 12:30:02
BUILDDATESTAMP_STR: 101119-1850
BUILDLAB_STR: win7sp1_rtm
BUILDOSVER_STR: 6.1.7601.17514.amd64fre.win7sp1_rtm.101119-1850
ANALYSIS_SESSION_ELAPSED_TIME: 692
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:x64_0xa_nt!kisecondaryclockinterrupt+131
FAILURE_ID_HASH: {1863e8ad-5ce5-7a98-4b16-beab4c9ec4a2}
Followup: MachineOwner
---------