Hi,
I had many crashes and reinstalled Windows. Still had crashes... So I checked Memtest 86 and had errors on my RAM.
Changed the RAM. Tested it without errors.
But now I still have randoms crashed, mostly playing Alan Wake 2, but not only. Please help me identify what's causing the issue?
I have a fresh install of Windows and installed most important new drivers (chipset, GPU). Others are automatic Win update drivers.
Thank you so much for your help !!!
I had many crashes and reinstalled Windows. Still had crashes... So I checked Memtest 86 and had errors on my RAM.
Changed the RAM. Tested it without errors.
But now I still have randoms crashed, mostly playing Alan Wake 2, but not only. Please help me identify what's causing the issue?
I have a fresh install of Windows and installed most important new drivers (chipset, GPU). Others are automatic Win update drivers.
Thank you so much for your help !!!
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffffffffffff88, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8034aa6d673, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1765
Key : Analysis.Elapsed.mSec
Value: 2708
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 140
Key : Analysis.Init.Elapsed.mSec
Value: 3223
Key : Analysis.Memory.CommitPeak.Mb
Value: 95
Key : Bugcheck.Code.LegacyAPI
Value: 0xa
Key : Failure.Bucket
Value: AV_nt!KiSwapThread
Key : Failure.Hash
Value: {3a5eca23-a992-0c0e-a0ce-d48add0d8eda}
Key : WER.OS.Branch
Value: ni_release
Key : WER.OS.Version
Value: 10.0.22621.1
BUGCHECK_CODE: a
BUGCHECK_P1: ffffffffffffff88
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff8034aa6d673
FILE_IN_CAB: 120323-14468-01.dmp
WRITE_ADDRESS: fffff8034b51d470: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffffffffffff88
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: AlanWake2.exe
TRAP_FRAME: ffffd98311403310 -- (.trap 0xffffd98311403310)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000001e357e3000 rbx=0000000000000000 rcx=ffffd98311403460
rdx=000000000000001e rsi=0000000000000000 rdi=0000000000000000
rip=fffff8034aa6d673 rsp=ffffd983114034a0 rbp=0000000000000000
r8=0000000000000000 r9=00000000000000e6 r10=00000632002080e6
r11=ffffd983092d1b00 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!KiSwapThread+0xae3:
fffff803`4aa6d673 48895d88 mov qword ptr [rbp-78h],rbx ss:0018:ffffffff`ffffff88=????????????????
Resetting default scope
STACK_TEXT:
ffffd983`114031c8 fffff803`4ac2bfa9 : 00000000`0000000a ffffffff`ffffff88 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffffd983`114031d0 fffff803`4ac27634 : ffff8f80`3dde6180 fffff803`4ac200b7 ffffa38d`e00840c0 ffffa38d`dd0a1900 : nt!KiBugCheckDispatch+0x69
ffffd983`11403310 fffff803`4aa6d673 : ffff8f80`3e14c180 00000000`00000000 ffffa38d`c4fa1040 00000000`00000000 : nt!KiPageFault+0x474
ffffd983`114034a0 fffff803`4aa6f827 : ffff3ee8`3f53a9f5 00000000`00000000 ffffa38d`d9b64480 00000000`00000000 : nt!KiSwapThread+0xae3
ffffd983`114035f0 fffff803`4aa71746 : ffff8f80`00000000 00000000`00000001 00000000`00000000 00000000`00000000 : nt!KiCommitThreadWait+0x137
ffffd983`114036a0 fffff803`4af3f82c : ffffa38d`e00840c0 ffffa38d`dfd97e60 00000000`00000000 00000000`00000001 : nt!KeWaitForSingleObject+0x256
ffffd983`11403a40 fffff803`4af3f71e : ffffa38d`dd0a1080 00000000`00000000 00000000`00000000 ffffa38d`dfd97e60 : nt!ObWaitForSingleObject+0xcc
ffffd983`11403aa0 fffff803`4ac2b6e8 : ffffa38d`dd0a1080 00000000`00000098 00000000`00000000 00000000`00000000 : nt!NtWaitForSingleObject+0x3e
ffffd983`11403ae0 00007ffa`a320f3f4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000001e`366ff608 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`a320f3f4
SYMBOL_NAME: nt!KiSwapThread+ae3
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.22621.2715
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: ae3
FAILURE_BUCKET_ID: AV_nt!KiSwapThread
OS_VERSION: 10.0.22621.1
BUILDLAB_STR: ni_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {3a5eca23-a992-0c0e-a0ce-d48add0d8eda}
Followup: MachineOwner
---------
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffffffffffff88, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8034aa6d673, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1765
Key : Analysis.Elapsed.mSec
Value: 2708
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 140
Key : Analysis.Init.Elapsed.mSec
Value: 3223
Key : Analysis.Memory.CommitPeak.Mb
Value: 95
Key : Bugcheck.Code.LegacyAPI
Value: 0xa
Key : Failure.Bucket
Value: AV_nt!KiSwapThread
Key : Failure.Hash
Value: {3a5eca23-a992-0c0e-a0ce-d48add0d8eda}
Key : WER.OS.Branch
Value: ni_release
Key : WER.OS.Version
Value: 10.0.22621.1
BUGCHECK_CODE: a
BUGCHECK_P1: ffffffffffffff88
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff8034aa6d673
FILE_IN_CAB: 120323-14468-01.dmp
WRITE_ADDRESS: fffff8034b51d470: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffffffffffff88
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: AlanWake2.exe
TRAP_FRAME: ffffd98311403310 -- (.trap 0xffffd98311403310)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000001e357e3000 rbx=0000000000000000 rcx=ffffd98311403460
rdx=000000000000001e rsi=0000000000000000 rdi=0000000000000000
rip=fffff8034aa6d673 rsp=ffffd983114034a0 rbp=0000000000000000
r8=0000000000000000 r9=00000000000000e6 r10=00000632002080e6
r11=ffffd983092d1b00 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!KiSwapThread+0xae3:
fffff803`4aa6d673 48895d88 mov qword ptr [rbp-78h],rbx ss:0018:ffffffff`ffffff88=????????????????
Resetting default scope
STACK_TEXT:
ffffd983`114031c8 fffff803`4ac2bfa9 : 00000000`0000000a ffffffff`ffffff88 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffffd983`114031d0 fffff803`4ac27634 : ffff8f80`3dde6180 fffff803`4ac200b7 ffffa38d`e00840c0 ffffa38d`dd0a1900 : nt!KiBugCheckDispatch+0x69
ffffd983`11403310 fffff803`4aa6d673 : ffff8f80`3e14c180 00000000`00000000 ffffa38d`c4fa1040 00000000`00000000 : nt!KiPageFault+0x474
ffffd983`114034a0 fffff803`4aa6f827 : ffff3ee8`3f53a9f5 00000000`00000000 ffffa38d`d9b64480 00000000`00000000 : nt!KiSwapThread+0xae3
ffffd983`114035f0 fffff803`4aa71746 : ffff8f80`00000000 00000000`00000001 00000000`00000000 00000000`00000000 : nt!KiCommitThreadWait+0x137
ffffd983`114036a0 fffff803`4af3f82c : ffffa38d`e00840c0 ffffa38d`dfd97e60 00000000`00000000 00000000`00000001 : nt!KeWaitForSingleObject+0x256
ffffd983`11403a40 fffff803`4af3f71e : ffffa38d`dd0a1080 00000000`00000000 00000000`00000000 ffffa38d`dfd97e60 : nt!ObWaitForSingleObject+0xcc
ffffd983`11403aa0 fffff803`4ac2b6e8 : ffffa38d`dd0a1080 00000000`00000098 00000000`00000000 00000000`00000000 : nt!NtWaitForSingleObject+0x3e
ffffd983`11403ae0 00007ffa`a320f3f4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000001e`366ff608 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`a320f3f4
SYMBOL_NAME: nt!KiSwapThread+ae3
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.22621.2715
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: ae3
FAILURE_BUCKET_ID: AV_nt!KiSwapThread
OS_VERSION: 10.0.22621.1
BUILDLAB_STR: ni_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {3a5eca23-a992-0c0e-a0ce-d48add0d8eda}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffffffffffff88, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8011fe6d673, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2765
Key : Analysis.Elapsed.mSec
Value: 3114
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 265
Key : Analysis.Init.Elapsed.mSec
Value: 102869
Key : Analysis.Memory.CommitPeak.Mb
Value: 96
Key : Bugcheck.Code.LegacyAPI
Value: 0xa
Key : Failure.Bucket
Value: AV_nt!KiSwapThread
Key : Failure.Hash
Value: {3a5eca23-a992-0c0e-a0ce-d48add0d8eda}
Key : WER.OS.Branch
Value: ni_release
Key : WER.OS.Version
Value: 10.0.22621.1
BUGCHECK_CODE: a
BUGCHECK_P1: ffffffffffffff88
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff8011fe6d673
FILE_IN_CAB: 120323-14375-01.dmp
WRITE_ADDRESS: fffff8012091d470: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffffffffffff88
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: AlanWake2.exe
TRAP_FRAME: ffffb60502dd2310 -- (.trap 0xffffb60502dd2310)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000f512304000 rbx=0000000000000000 rcx=ffffb60502dd2460
rdx=00000000000000f5 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8011fe6d673 rsp=ffffb60502dd24a0 rbp=0000000000000000
r8=0000000000000000 r9=00000000000000e6 r10=00000632002080e6
r11=ffffb604fa93ab00 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!KiSwapThread+0xae3:
fffff801`1fe6d673 48895d88 mov qword ptr [rbp-78h],rbx ss:0018:ffffffff`ffffff88=????????????????
Resetting default scope
STACK_TEXT:
ffffb605`02dd21c8 fffff801`2002bfa9 : 00000000`0000000a ffffffff`ffffff88 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffffb605`02dd21d0 fffff801`20027634 : ffffdf80`d5468180 fffff801`200200b7 ffffa182`4efe6140 ffffa182`4d851900 : nt!KiBugCheckDispatch+0x69
ffffb605`02dd2310 fffff801`1fe6d673 : ffffdf80`d55db180 00000000`00000000 ffffa182`33b97040 00000000`00000000 : nt!KiPageFault+0x474
ffffb605`02dd24a0 fffff801`1fe6f827 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSwapThread+0xae3
ffffb605`02dd25f0 fffff801`1fe71746 : ffffdf80`00000000 00000000`00000001 00000000`00000000 00000000`00000000 : nt!KiCommitThreadWait+0x137
ffffb605`02dd26a0 fffff801`2033f82c : ffffa182`4efe6140 ffffa182`4fe27260 00000000`00000000 00000000`00000001 : nt!KeWaitForSingleObject+0x256
ffffb605`02dd2a40 fffff801`2033f71e : ffffa182`4d851080 00000000`00000000 00000000`00000000 ffffa182`4fe27260 : nt!ObWaitForSingleObject+0xcc
ffffb605`02dd2aa0 fffff801`2002b6e8 : ffffa182`4d851080 00000000`00000069 00000000`00000000 00000000`00000000 : nt!NtWaitForSingleObject+0x3e
ffffb605`02dd2ae0 00007ff9`8ec6f3f4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000f5`136ff948 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`8ec6f3f4
SYMBOL_NAME: nt!KiSwapThread+ae3
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.22621.2715
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: ae3
FAILURE_BUCKET_ID: AV_nt!KiSwapThread
OS_VERSION: 10.0.22621.1
BUILDLAB_STR: ni_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {3a5eca23-a992-0c0e-a0ce-d48add0d8eda}
Followup: MachineOwner
---------
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffffffffffff88, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8011fe6d673, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2765
Key : Analysis.Elapsed.mSec
Value: 3114
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 265
Key : Analysis.Init.Elapsed.mSec
Value: 102869
Key : Analysis.Memory.CommitPeak.Mb
Value: 96
Key : Bugcheck.Code.LegacyAPI
Value: 0xa
Key : Failure.Bucket
Value: AV_nt!KiSwapThread
Key : Failure.Hash
Value: {3a5eca23-a992-0c0e-a0ce-d48add0d8eda}
Key : WER.OS.Branch
Value: ni_release
Key : WER.OS.Version
Value: 10.0.22621.1
BUGCHECK_CODE: a
BUGCHECK_P1: ffffffffffffff88
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff8011fe6d673
FILE_IN_CAB: 120323-14375-01.dmp
WRITE_ADDRESS: fffff8012091d470: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffffffffffff88
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: AlanWake2.exe
TRAP_FRAME: ffffb60502dd2310 -- (.trap 0xffffb60502dd2310)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000f512304000 rbx=0000000000000000 rcx=ffffb60502dd2460
rdx=00000000000000f5 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8011fe6d673 rsp=ffffb60502dd24a0 rbp=0000000000000000
r8=0000000000000000 r9=00000000000000e6 r10=00000632002080e6
r11=ffffb604fa93ab00 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!KiSwapThread+0xae3:
fffff801`1fe6d673 48895d88 mov qword ptr [rbp-78h],rbx ss:0018:ffffffff`ffffff88=????????????????
Resetting default scope
STACK_TEXT:
ffffb605`02dd21c8 fffff801`2002bfa9 : 00000000`0000000a ffffffff`ffffff88 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffffb605`02dd21d0 fffff801`20027634 : ffffdf80`d5468180 fffff801`200200b7 ffffa182`4efe6140 ffffa182`4d851900 : nt!KiBugCheckDispatch+0x69
ffffb605`02dd2310 fffff801`1fe6d673 : ffffdf80`d55db180 00000000`00000000 ffffa182`33b97040 00000000`00000000 : nt!KiPageFault+0x474
ffffb605`02dd24a0 fffff801`1fe6f827 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSwapThread+0xae3
ffffb605`02dd25f0 fffff801`1fe71746 : ffffdf80`00000000 00000000`00000001 00000000`00000000 00000000`00000000 : nt!KiCommitThreadWait+0x137
ffffb605`02dd26a0 fffff801`2033f82c : ffffa182`4efe6140 ffffa182`4fe27260 00000000`00000000 00000000`00000001 : nt!KeWaitForSingleObject+0x256
ffffb605`02dd2a40 fffff801`2033f71e : ffffa182`4d851080 00000000`00000000 00000000`00000000 ffffa182`4fe27260 : nt!ObWaitForSingleObject+0xcc
ffffb605`02dd2aa0 fffff801`2002b6e8 : ffffa182`4d851080 00000000`00000069 00000000`00000000 00000000`00000000 : nt!NtWaitForSingleObject+0x3e
ffffb605`02dd2ae0 00007ff9`8ec6f3f4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000f5`136ff948 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`8ec6f3f4
SYMBOL_NAME: nt!KiSwapThread+ae3
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.22621.2715
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: ae3
FAILURE_BUCKET_ID: AV_nt!KiSwapThread
OS_VERSION: 10.0.22621.1
BUILDLAB_STR: ni_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {3a5eca23-a992-0c0e-a0ce-d48add0d8eda}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffe08100007ed0, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff804498e5ed5, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1811
Key : Analysis.Elapsed.mSec
Value: 2037
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 281
Key : Analysis.Init.Elapsed.mSec
Value: 1758
Key : Analysis.Memory.CommitPeak.Mb
Value: 93
Key : Bugcheck.Code.LegacyAPI
Value: 0xa
Key : Failure.Bucket
Value: AV_nt!KiSignalThread
Key : Failure.Hash
Value: {ccc5a220-9cd7-c96e-a6ff-4f1c2d163978}
Key : WER.OS.Branch
Value: ni_release
Key : WER.OS.Version
Value: 10.0.22621.1
BUGCHECK_CODE: a
BUGCHECK_P1: ffffe08100007ed0
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff804498e5ed5
FILE_IN_CAB: 120323-14484-01.dmp
WRITE_ADDRESS: fffff8044a31d470: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffe08100007ed0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: AlanWake2.exe
TRAP_FRAME: ffffdf8b1c221820 -- (.trap 0xffffdf8b1c221820)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000001
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff804498e5ed5 rsp=ffffdf8b1c2219b0 rbp=ffffe081b9681180
r8=0000000000000000 r9=ffffbf03dedae1c0 r10=ffffffffffffffff
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!KiSignalThread+0xf5:
fffff804`498e5ed5 f0480fbaafd07e000000 lock bts qword ptr [rdi+7ED0h],0 ds:00000000`00007ed0=????????????????
Resetting default scope
STACK_TEXT:
ffffdf8b`1c2216d8 fffff804`49a2bfa9 : 00000000`0000000a ffffe081`00007ed0 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffffdf8b`1c2216e0 fffff804`49a27634 : ffffbf03`e35f9080 00001f80`0092007a ffffcf8b`3ea64000 ffffcf8b`2b0e9b40 : nt!KiBugCheckDispatch+0x69
ffffdf8b`1c221820 fffff804`498e5ed5 : ffffe081`b9681180 ffffbf03`e3fc4ee8 00000000`00000000 ffffbf03`e3fc4ee0 : nt!KiPageFault+0x474
ffffdf8b`1c2219b0 fffff804`498e4b54 : ffffbf03`dedae080 00000000`00000000 00000000`00000000 0000007d`d3be4fe0 : nt!KiSignalThread+0xf5
ffffdf8b`1c2219f0 fffff804`49c97f51 : 00000000`00000000 00000000`00000001 00000000`00000000 00000000`00000000 : nt!KeReleaseSemaphoreEx+0x1a4
ffffdf8b`1c221a80 fffff804`49a2b6e8 : ffffbf03`e35f9080 00000000`00000005 00000000`00000000 00000436`4dc54d01 : nt!NtReleaseSemaphore+0xe1
ffffdf8b`1c221ae0 00007fff`628af4b4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000007d`d46ff978 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`628af4b4
SYMBOL_NAME: nt!KiSignalThread+f5
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.22621.2715
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: f5
FAILURE_BUCKET_ID: AV_nt!KiSignalThread
OS_VERSION: 10.0.22621.1
BUILDLAB_STR: ni_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {ccc5a220-9cd7-c96e-a6ff-4f1c2d163978}
Followup: MachineOwner
---------
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffe08100007ed0, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff804498e5ed5, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1811
Key : Analysis.Elapsed.mSec
Value: 2037
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 281
Key : Analysis.Init.Elapsed.mSec
Value: 1758
Key : Analysis.Memory.CommitPeak.Mb
Value: 93
Key : Bugcheck.Code.LegacyAPI
Value: 0xa
Key : Failure.Bucket
Value: AV_nt!KiSignalThread
Key : Failure.Hash
Value: {ccc5a220-9cd7-c96e-a6ff-4f1c2d163978}
Key : WER.OS.Branch
Value: ni_release
Key : WER.OS.Version
Value: 10.0.22621.1
BUGCHECK_CODE: a
BUGCHECK_P1: ffffe08100007ed0
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff804498e5ed5
FILE_IN_CAB: 120323-14484-01.dmp
WRITE_ADDRESS: fffff8044a31d470: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffe08100007ed0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: AlanWake2.exe
TRAP_FRAME: ffffdf8b1c221820 -- (.trap 0xffffdf8b1c221820)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000001
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff804498e5ed5 rsp=ffffdf8b1c2219b0 rbp=ffffe081b9681180
r8=0000000000000000 r9=ffffbf03dedae1c0 r10=ffffffffffffffff
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!KiSignalThread+0xf5:
fffff804`498e5ed5 f0480fbaafd07e000000 lock bts qword ptr [rdi+7ED0h],0 ds:00000000`00007ed0=????????????????
Resetting default scope
STACK_TEXT:
ffffdf8b`1c2216d8 fffff804`49a2bfa9 : 00000000`0000000a ffffe081`00007ed0 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffffdf8b`1c2216e0 fffff804`49a27634 : ffffbf03`e35f9080 00001f80`0092007a ffffcf8b`3ea64000 ffffcf8b`2b0e9b40 : nt!KiBugCheckDispatch+0x69
ffffdf8b`1c221820 fffff804`498e5ed5 : ffffe081`b9681180 ffffbf03`e3fc4ee8 00000000`00000000 ffffbf03`e3fc4ee0 : nt!KiPageFault+0x474
ffffdf8b`1c2219b0 fffff804`498e4b54 : ffffbf03`dedae080 00000000`00000000 00000000`00000000 0000007d`d3be4fe0 : nt!KiSignalThread+0xf5
ffffdf8b`1c2219f0 fffff804`49c97f51 : 00000000`00000000 00000000`00000001 00000000`00000000 00000000`00000000 : nt!KeReleaseSemaphoreEx+0x1a4
ffffdf8b`1c221a80 fffff804`49a2b6e8 : ffffbf03`e35f9080 00000000`00000005 00000000`00000000 00000436`4dc54d01 : nt!NtReleaseSemaphore+0xe1
ffffdf8b`1c221ae0 00007fff`628af4b4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000007d`d46ff978 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`628af4b4
SYMBOL_NAME: nt!KiSignalThread+f5
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.22621.2715
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: f5
FAILURE_BUCKET_ID: AV_nt!KiSignalThread
OS_VERSION: 10.0.22621.1
BUILDLAB_STR: ni_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {ccc5a220-9cd7-c96e-a6ff-4f1c2d163978}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffd400c0014730, Address of the trap frame for the exception that caused the BugCheck
Arg3: ffffd400c0014688, Address of the exception record for the exception that caused the BugCheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2468
Key : Analysis.Elapsed.mSec
Value: 3124
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 312
Key : Analysis.Init.Elapsed.mSec
Value: 1540
Key : Analysis.Memory.CommitPeak.Mb
Value: 95
Key : Bugcheck.Code.LegacyAPI
Value: 0x139
Key : FailFast.Name
Value: CORRUPT_LIST_ENTRY
Key : FailFast.Type
Value: 3
Key : Failure.Bucket
Value: 0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch
Key : Failure.Hash
Value: {3aede96a-54dd-40d6-d4cb-2a161a843851}
Key : WER.OS.Branch
Value: ni_release
Key : WER.OS.Version
Value: 10.0.22621.1
BUGCHECK_CODE: 139
BUGCHECK_P1: 3
BUGCHECK_P2: ffffd400c0014730
BUGCHECK_P3: ffffd400c0014688
BUGCHECK_P4: 0
FILE_IN_CAB: 120323-14515-01.dmp
TRAP_FRAME: ffffd400c0014730 -- (.trap 0xffffd400c0014730)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffae015abd7180 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffd7040f680080 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8062764a8a1 rsp=ffffd400c00148c0 rbp=ffffae015ad4c180
r8=ffffd70411add158 r9=7ffffffffffffffc r10=0000000000000002
r11=ffffd400c00149a8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac pe cy
nt!KiWakeQueueWaiter+0x164911:
fffff806`2764a8a1 cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: ffffd400c0014688 -- (.exr 0xffffd400c0014688)
ExceptionAddress: fffff8062764a8a1 (nt!KiWakeQueueWaiter+0x0000000000164911)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: steamwebhelper.exe
ERROR_CODE: (NTSTATUS) 0xc0000409 - Le syst me a d tect la saturation de la m moire tampon dans cette application. Cette saturation pourrait permettre un utilisateur mal intentionn de prendre le contr le de cette application.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000003
EXCEPTION_STR: 0xc0000409
STACK_TEXT:
ffffd400`c0014408 fffff806`2762bfa9 : 00000000`00000139 00000000`00000003 ffffd400`c0014730 ffffd400`c0014688 : nt!KeBugCheckEx
ffffd400`c0014410 fffff806`2762c532 : 00000000`00001020 00000000`00000008 00000000`00000000 00000000`000005a0 : nt!KiBugCheckDispatch+0x69
ffffd400`c0014550 fffff806`2762a306 : ffffd400`c0014a10 fffff806`278ed428 ffff8a82`ec5d2c80 ffffd704`10098d80 : nt!KiFastFailDispatch+0xb2
ffffd400`c0014730 fffff806`2764a8a1 : 00000000`00000000 00000001`00f800d0 00000000`00000000 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x346
ffffd400`c00148c0 fffff806`274e465b : ffffd704`1332b080 ffffd704`00000000 ffffd704`0f680080 00000000`00000000 : nt!KiWakeQueueWaiter+0x164911
ffffd400`c0014920 fffff806`278ec56b : 00000000`00000000 00000000`00000000 0000020e`a82720f8 00000000`00000001 : nt!AlpcpSignal+0x2db
ffffd400`c00149b0 fffff806`2762b6e8 : ffffd704`1332b080 ffffd400`c0014b60 00000096`672fe1c8 ffffd400`c0014a88 : nt!NtAlpcSendWaitReceivePort+0x23b
ffffd400`c0014a70 00007fff`d46d04e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000096`672fe1a8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`d46d04e4
SYMBOL_NAME: nt!KiFastFailDispatch+b2
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.22621.2715
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: b2
FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch
OS_VERSION: 10.0.22621.1
BUILDLAB_STR: ni_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {3aede96a-54dd-40d6-d4cb-2a161a843851}
Followup: MachineOwner
---------
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffd400c0014730, Address of the trap frame for the exception that caused the BugCheck
Arg3: ffffd400c0014688, Address of the exception record for the exception that caused the BugCheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2468
Key : Analysis.Elapsed.mSec
Value: 3124
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 312
Key : Analysis.Init.Elapsed.mSec
Value: 1540
Key : Analysis.Memory.CommitPeak.Mb
Value: 95
Key : Bugcheck.Code.LegacyAPI
Value: 0x139
Key : FailFast.Name
Value: CORRUPT_LIST_ENTRY
Key : FailFast.Type
Value: 3
Key : Failure.Bucket
Value: 0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch
Key : Failure.Hash
Value: {3aede96a-54dd-40d6-d4cb-2a161a843851}
Key : WER.OS.Branch
Value: ni_release
Key : WER.OS.Version
Value: 10.0.22621.1
BUGCHECK_CODE: 139
BUGCHECK_P1: 3
BUGCHECK_P2: ffffd400c0014730
BUGCHECK_P3: ffffd400c0014688
BUGCHECK_P4: 0
FILE_IN_CAB: 120323-14515-01.dmp
TRAP_FRAME: ffffd400c0014730 -- (.trap 0xffffd400c0014730)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffae015abd7180 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffd7040f680080 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8062764a8a1 rsp=ffffd400c00148c0 rbp=ffffae015ad4c180
r8=ffffd70411add158 r9=7ffffffffffffffc r10=0000000000000002
r11=ffffd400c00149a8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac pe cy
nt!KiWakeQueueWaiter+0x164911:
fffff806`2764a8a1 cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: ffffd400c0014688 -- (.exr 0xffffd400c0014688)
ExceptionAddress: fffff8062764a8a1 (nt!KiWakeQueueWaiter+0x0000000000164911)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: steamwebhelper.exe
ERROR_CODE: (NTSTATUS) 0xc0000409 - Le syst me a d tect la saturation de la m moire tampon dans cette application. Cette saturation pourrait permettre un utilisateur mal intentionn de prendre le contr le de cette application.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000003
EXCEPTION_STR: 0xc0000409
STACK_TEXT:
ffffd400`c0014408 fffff806`2762bfa9 : 00000000`00000139 00000000`00000003 ffffd400`c0014730 ffffd400`c0014688 : nt!KeBugCheckEx
ffffd400`c0014410 fffff806`2762c532 : 00000000`00001020 00000000`00000008 00000000`00000000 00000000`000005a0 : nt!KiBugCheckDispatch+0x69
ffffd400`c0014550 fffff806`2762a306 : ffffd400`c0014a10 fffff806`278ed428 ffff8a82`ec5d2c80 ffffd704`10098d80 : nt!KiFastFailDispatch+0xb2
ffffd400`c0014730 fffff806`2764a8a1 : 00000000`00000000 00000001`00f800d0 00000000`00000000 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x346
ffffd400`c00148c0 fffff806`274e465b : ffffd704`1332b080 ffffd704`00000000 ffffd704`0f680080 00000000`00000000 : nt!KiWakeQueueWaiter+0x164911
ffffd400`c0014920 fffff806`278ec56b : 00000000`00000000 00000000`00000000 0000020e`a82720f8 00000000`00000001 : nt!AlpcpSignal+0x2db
ffffd400`c00149b0 fffff806`2762b6e8 : ffffd704`1332b080 ffffd400`c0014b60 00000096`672fe1c8 ffffd400`c0014a88 : nt!NtAlpcSendWaitReceivePort+0x23b
ffffd400`c0014a70 00007fff`d46d04e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000096`672fe1a8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`d46d04e4
SYMBOL_NAME: nt!KiFastFailDispatch+b2
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.22621.2715
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: b2
FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch
OS_VERSION: 10.0.22621.1
BUILDLAB_STR: ni_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {3aede96a-54dd-40d6-d4cb-2a161a843851}
Followup: MachineOwner
---------