it happens minutes after turning on the pc or after hours of use, once or twice a week and sometimes not at all. I have the pc turned on every day in video games with the gpu at 99% and with good temperatures, I have a 1000w 80 plus gold power supply, a 1080 ti and a ryzen 3700x with a x370 mother with updated bios.
Path validation summary *
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 22000 MP (16 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 22000.1.amd64fre.co_release.210604-1628
Machine Name:
Kernel base = 0xfffff800
Debug session time: Thu Mar 31 11:21:41.986 2022 (UTC - 3:00)
System Uptime: 0 days 0:12:50.618
Loading Kernel Symbols
...............................................................
................................................................
................................................................
.........
Loading User Symbols
Loading unloaded module list
...........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff800
10: kd> !analyze -v
***
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000003eb8, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80044f146b8, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3186
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 25650
Key : Analysis.Init.CPU.mSec
Value: 562
Key : Analysis.Init.Elapsed.mSec
Value: 112371
Key : Analysis.Memory.CommitPeak.Mb
Value: 151
Key : WER.OS.Branch
Value: co_release
Key : WER.OS.Timestamp
Value: 2021-06-04T16:28:00Z
Key : WER.OS.Version
Value: 10.0.22000.1
FILE_IN_CAB: 033122-10921-01.dmp
BUGCHECK_CODE: a
BUGCHECK_P1: 3eb8
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff80044f146b8
READ_ADDRESS: fffff80045905450: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
0000000000003eb8
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: UninstallMonitor.exe
DEVICE_OBJECT: ffff930500000000
TRAP_FRAME: ffffc50a1c467da0 -- (.trap 0xffffc50a1c467da0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffc788bcddc2c8
rdx=0000000000000005 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80044f146b8 rsp=ffffc50a1c467f30 rbp=ffffc50a1c468030
r8=fffffb0000000000 r9=8000000000000000 r10=0000000000000008
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!MiFinishHardFault+0x5a8:
fffff800
Resetting default scope
STACK_TEXT:
ffffc50a
ffffc50a
ffffc50a
ffffc50a
ffffc50a
ffffc50a
ffffc50a
ffffc50a
ffffc50a
ffffc50a
ffffc50a
ffffc50a
ffffc50a
ffffc50a
ffffc50a
ffffc50a
ffffc50a
ffffc50a
ffffc50a
ffffc50a
ffffc50a
00000000
SYMBOL_NAME: nt!MiFinishHardFault+5a8
MODULE_NAME: nt
IMAGE_VERSION: 10.0.22000.556
STACK_COMMAND: .cxr; .ecxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 5a8
FAILURE_BUCKET_ID: AV_nt!MiFinishHardFault
OS_VERSION: 10.0.22000.1
BUILDLAB_STR: co_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {d767d215-4200-2446-1455-562c97a5882c}
Followup: MachineOwner
---------
I hope you can help me, thank you very much!
Path validation summary *
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 22000 MP (16 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 22000.1.amd64fre.co_release.210604-1628
Machine Name:
Kernel base = 0xfffff800
44c00000 PsLoadedModuleList = 0xfffff800
45829b90Debug session time: Thu Mar 31 11:21:41.986 2022 (UTC - 3:00)
System Uptime: 0 days 0:12:50.618
Loading Kernel Symbols
...............................................................
................................................................
................................................................
.........
Loading User Symbols
Loading unloaded module list
...........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff800
450164c0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffc50a
1c467c60=000000000000000a10: kd> !analyze -v
***
- *
- Bugcheck Analysis *
- *
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000003eb8, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80044f146b8, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3186
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 25650
Key : Analysis.Init.CPU.mSec
Value: 562
Key : Analysis.Init.Elapsed.mSec
Value: 112371
Key : Analysis.Memory.CommitPeak.Mb
Value: 151
Key : WER.OS.Branch
Value: co_release
Key : WER.OS.Timestamp
Value: 2021-06-04T16:28:00Z
Key : WER.OS.Version
Value: 10.0.22000.1
FILE_IN_CAB: 033122-10921-01.dmp
BUGCHECK_CODE: a
BUGCHECK_P1: 3eb8
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff80044f146b8
READ_ADDRESS: fffff80045905450: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
0000000000003eb8
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: UninstallMonitor.exe
DEVICE_OBJECT: ffff930500000000
TRAP_FRAME: ffffc50a1c467da0 -- (.trap 0xffffc50a1c467da0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffc788bcddc2c8
rdx=0000000000000005 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80044f146b8 rsp=ffffc50a1c467f30 rbp=ffffc50a1c468030
r8=fffffb0000000000 r9=8000000000000000 r10=0000000000000008
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!MiFinishHardFault+0x5a8:
fffff800
44f146b8 483987b83e0000 cmp qword ptr [rdi+3EB8h],rax ds:00000000
00003eb8=????????????????Resetting default scope
STACK_TEXT:
ffffc50a
1c467c58 fffff800
450290a9 : 000000000000000a 00000000
00003eb8 0000000000000002 00000000
00000000 : nt!KeBugCheckExffffc50a
1c467c60 fffff800
45025200 : 0000000000000000 00000000
00000000 0000000000000000 00000000
00000000 : nt!KiBugCheckDispatch+0x69ffffc50a
1c467da0 fffff800
44f146b8 : 0000000000000002 ffff9305
a27ff2b0 ffff930599f939d0 ffffc788
bcddc040 : nt!KiPageFault+0x440ffffc50a
1c467f30 fffff800
44e757ea : 0000000000000000 00000000
00000000 ffff930599f939d0 fffff800
00000000 : nt!MiFinishHardFault+0x5a8ffffc50a
1c4680d0 fffff800
44e756fb : ffffc50a1c4682a8 00000000
00000001 ffff9305a7add078 00000000
00000000 : nt!MiPfCompleteInPageSupport+0x9effffc50a
1c4681b0 fffff800
44f1e640 : 00000000002b8000 00000000
00000000 0000000000000001 ffff9305
97b41738 : nt!MiPfCompletePrefetchIos+0x5bffffc50a
1c4681e0 fffff800
44e8e2e5 : 00000000002b8000 00000000
00040000 ffff8082656c0000 ffff9305
a7ad88a0 : nt!MmWaitForCacheManagerPrefetch+0x38ffffc50a
1c468220 fffff800
45302472 : 0000000000000000 00000000
00000000 0000000000000001 00000000
002b76b8 : nt!CcFetchDataForRead+0x135ffffc50a
1c468280 fffff800
44e8f7bf : 0000000000040000 00000000
00000000 0000000000000000 ffff9305
9d202001 : nt!CcMapAndCopyFromCache+0xf2ffffc50a
1c468330 fffff800
4763ba60 : ffffc78800000000 ffff9305
a7ad8a18 ffffc788002b76b8 ffffc788
a6faaa01 : nt!CcCopyReadEx+0x1bfffffc50a
1c468410 fffff800
47636774 : ffffc788a6faa990 ffffc50a
1c468650 0000000000000003 00000000
00000000 : Ntfs!NtfsCachedRead+0x17cffffc50a
1c468480 fffff800
47638067 : ffff930598aac798 ffff9305
9d202050 ffff930500000001 00000000
002b76b8 : Ntfs!NtfsCommonRead+0xe94ffffc50a
1c468620 fffff800
44e82555 : ffff9305995b8aa0 ffff9305
9d202050 0000000000000000 ffff9305
9d202480 : Ntfs!NtfsFsdRead+0x227ffffc50a
1c468710 fffff800
46997c75 : ffffc50a1c469000 ffffc50a
1c463000 0000000000000000 ffffc50a
1c4687f0 : nt!IofCallDriver+0x55ffffc50a
1c468750 fffff800
46995913 : ffffc50a1c4687e0 00000000
00000000 0000000000000000 00000000
00000000 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x2b5ffffc50a
1c4687c0 fffff800
44e82555 : ffff93059d202050 00000000
00000000 000000007fbc0008 00000000
00000000 : FLTMGR!FltpDispatch+0xa3ffffc50a
1c468820 fffff800
452f96f2 : ffffc50a1c4688c1 ffff9305
a8a935a0 ffffc50a1c4688c1 00000000
00000001 : nt!IofCallDriver+0x55ffffc50a
1c468860 fffff800
44eb98b4 : ffff930500000000 00000000
00000000 0000000000000000 ffff9305
9d2024c8 : nt!IopSynchronousServiceTail+0x1d2ffffc50a
1c468910 fffff800
4530e339 : ffff9305a8a935a0 00000000
00000000 0000000000000000 00000000
00000000 : nt!IopReadFile+0x4e4ffffc50a
1c4689f0 fffff800
45028a78 : ffff9305a2ceb080 ffffc50a
1c468b60 000000000756f0e8 ffffc50a
1c468a88 : nt!NtReadFile+0xc9ffffc50a
1c468a70 00000000
77df1cf3 : 0000000000000000 00000000
00000000 0000000000000000 00000000
00000000 : nt!KiSystemServiceCopyEnd+0x2800000000
0756f0c8 00000000
00000000 : 0000000000000000 00000000
00000000 0000000000000000 00000000
00000000 : 0x77df1cf3SYMBOL_NAME: nt!MiFinishHardFault+5a8
MODULE_NAME: nt
IMAGE_VERSION: 10.0.22000.556
STACK_COMMAND: .cxr; .ecxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 5a8
FAILURE_BUCKET_ID: AV_nt!MiFinishHardFault
OS_VERSION: 10.0.22000.1
BUILDLAB_STR: co_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {d767d215-4200-2446-1455-562c97a5882c}
Followup: MachineOwner
---------
I hope you can help me, thank you very much!