S
shivamsharda
i have tried everything nothing works. any help would be appreciated
thanks in advance
here is my memory dump
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000028, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff8015df44ffb, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3249
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-KIOBUEU
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 89269
Key : Analysis.Memory.CommitPeak.Mb
Value: 87
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: d1
BUGCHECK_P1: 28
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff8015df44ffb
WRITE_ADDRESS: 0000000000000028
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
PROCESS_NAME: System
TRAP_FRAME: fffff6833684f5d0 -- (.trap 0xfffff6833684f5d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffae87c0928560
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8015df44ffb rsp=fffff6833684f760 rbp=fffff6833684f8d0
r8=ffffae87bdab7520 r9=0000000000000000 r10=ffffae87bddc1440
r11=0000000000000003 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
ndis!ndisFreeConvertedPacket+0x23:
fffff801`5df44ffb 894228 mov dword ptr [rdx+28h],eax ds:00000000`00000028=????????
Resetting default scope
STACK_TEXT:
fffff683`3684f488 fffff801`5a207169 : 00000000`0000000a 00000000`00000028 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff683`3684f490 fffff801`5a203469 : 00000000`00000000 00000000`00000000 ffffae87`c1ddbce0 fffff801`63df4c3f : nt!KiBugCheckDispatch+0x69
fffff683`3684f5d0 fffff801`5df44ffb : ffffae87`c0928500 ffffae87`c0928500 ffffae87`c09285f8 fffff683`3684f848 : nt!KiPageFault+0x469
fffff683`3684f760 fffff801`5df457d5 : fffff683`3684f840 ffffae87`beef5700 00000000`00000001 ffffae87`bdd8c102 : ndis!ndisFreeConvertedPacket+0x23
fffff683`3684f790 fffff801`5df9425b : ffffae87`bdd8c1a0 fffff683`3684f840 fffff683`00000001 00000000`5a119401 : ndis!ndisXlateReturnPacketToNetBufferList+0x61
fffff683`3684f7d0 fffff801`5df729f6 : 00000000`00000001 ffffae87`b5948838 00000000`00000000 ffffae87`bdd8c1a0 : ndis!ndisIndicateXlatedPacketsToNdis5Protocols+0x157
fffff683`3684f980 fffff801`5df73c13 : ffffae87`bdd8c1a0 fffff683`3684fa01 fffff801`00000000 00000000`00000001 : ndis!ndisDoPeriodicReceivesIndication+0x2c2
fffff683`3684fa10 fffff801`5df27b0e : ffffae87`b5000302 ffffae87`b54e3800 fffff683`3684faa9 fffff801`5df06e00 : ndis!ndisPeriodicReceivesWorker+0x73
fffff683`3684fa40 fffff801`5a0a29a5 : ffffae87`b5773040 ffffae87`b5773040 fffff801`5df06ed0 00000000`00000001 : ndis!ndisReceiveWorkerThread+0x20c3e
fffff683`3684fb10 fffff801`5a1fc868 : fffff801`55db8180 ffffae87`b5773040 fffff801`5a0a2950 00000000`00000000 : nt!PspSystemThreadStartup+0x55
fffff683`3684fb60 00000000`00000000 : fffff683`36850000 fffff683`36849000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: ndis!ndisFreeConvertedPacket+23
MODULE_NAME: ndis
IMAGE_NAME: ndis.sys
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 23
FAILURE_BUCKET_ID: AV_ndis!ndisFreeConvertedPacket
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {850d3da5-6f96-3ce0-6c04-55d6535c8ae9}
Followup: MachineOwner
---------
1: kd> !blackboxbsd
Stream size mismatch (expected = 192, read = 176)
1: kd> !blackboxntfs
NTFS Blackbox Data
0 Slow I/O Timeout Records Found
0 Oplock Break Timeout Records Found
1: kd> .trap 0xfffff6833684f5d0
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffae87c0928560
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8015df44ffb rsp=fffff6833684f760 rbp=fffff6833684f8d0
r8=ffffae87bdab7520 r9=0000000000000000 r10=ffffae87bddc1440
r11=0000000000000003 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
ndis!ndisFreeConvertedPacket+0x23:
fffff801`5df44ffb 894228 mov dword ptr [rdx+28h],eax ds:00000000`00000028=????????
1: kd> .trap 0xfffff6833684f5d0
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffae87c0928560
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8015df44ffb rsp=fffff6833684f760 rbp=fffff6833684f8d0
r8=ffffae87bdab7520 r9=0000000000000000 r10=ffffae87bddc1440
r11=0000000000000003 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
ndis!ndisFreeConvertedPacket+0x23:
fffff801`5df44ffb 894228 mov dword ptr [rdx+28h],eax ds:00000000`00000028=????????
Continue reading...
thanks in advance
here is my memory dump
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000028, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff8015df44ffb, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3249
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-KIOBUEU
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 89269
Key : Analysis.Memory.CommitPeak.Mb
Value: 87
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: d1
BUGCHECK_P1: 28
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff8015df44ffb
WRITE_ADDRESS: 0000000000000028
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
PROCESS_NAME: System
TRAP_FRAME: fffff6833684f5d0 -- (.trap 0xfffff6833684f5d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffae87c0928560
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8015df44ffb rsp=fffff6833684f760 rbp=fffff6833684f8d0
r8=ffffae87bdab7520 r9=0000000000000000 r10=ffffae87bddc1440
r11=0000000000000003 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
ndis!ndisFreeConvertedPacket+0x23:
fffff801`5df44ffb 894228 mov dword ptr [rdx+28h],eax ds:00000000`00000028=????????
Resetting default scope
STACK_TEXT:
fffff683`3684f488 fffff801`5a207169 : 00000000`0000000a 00000000`00000028 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff683`3684f490 fffff801`5a203469 : 00000000`00000000 00000000`00000000 ffffae87`c1ddbce0 fffff801`63df4c3f : nt!KiBugCheckDispatch+0x69
fffff683`3684f5d0 fffff801`5df44ffb : ffffae87`c0928500 ffffae87`c0928500 ffffae87`c09285f8 fffff683`3684f848 : nt!KiPageFault+0x469
fffff683`3684f760 fffff801`5df457d5 : fffff683`3684f840 ffffae87`beef5700 00000000`00000001 ffffae87`bdd8c102 : ndis!ndisFreeConvertedPacket+0x23
fffff683`3684f790 fffff801`5df9425b : ffffae87`bdd8c1a0 fffff683`3684f840 fffff683`00000001 00000000`5a119401 : ndis!ndisXlateReturnPacketToNetBufferList+0x61
fffff683`3684f7d0 fffff801`5df729f6 : 00000000`00000001 ffffae87`b5948838 00000000`00000000 ffffae87`bdd8c1a0 : ndis!ndisIndicateXlatedPacketsToNdis5Protocols+0x157
fffff683`3684f980 fffff801`5df73c13 : ffffae87`bdd8c1a0 fffff683`3684fa01 fffff801`00000000 00000000`00000001 : ndis!ndisDoPeriodicReceivesIndication+0x2c2
fffff683`3684fa10 fffff801`5df27b0e : ffffae87`b5000302 ffffae87`b54e3800 fffff683`3684faa9 fffff801`5df06e00 : ndis!ndisPeriodicReceivesWorker+0x73
fffff683`3684fa40 fffff801`5a0a29a5 : ffffae87`b5773040 ffffae87`b5773040 fffff801`5df06ed0 00000000`00000001 : ndis!ndisReceiveWorkerThread+0x20c3e
fffff683`3684fb10 fffff801`5a1fc868 : fffff801`55db8180 ffffae87`b5773040 fffff801`5a0a2950 00000000`00000000 : nt!PspSystemThreadStartup+0x55
fffff683`3684fb60 00000000`00000000 : fffff683`36850000 fffff683`36849000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: ndis!ndisFreeConvertedPacket+23
MODULE_NAME: ndis
IMAGE_NAME: ndis.sys
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 23
FAILURE_BUCKET_ID: AV_ndis!ndisFreeConvertedPacket
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {850d3da5-6f96-3ce0-6c04-55d6535c8ae9}
Followup: MachineOwner
---------
1: kd> !blackboxbsd
Stream size mismatch (expected = 192, read = 176)
1: kd> !blackboxntfs
NTFS Blackbox Data
0 Slow I/O Timeout Records Found
0 Oplock Break Timeout Records Found
1: kd> .trap 0xfffff6833684f5d0
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffae87c0928560
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8015df44ffb rsp=fffff6833684f760 rbp=fffff6833684f8d0
r8=ffffae87bdab7520 r9=0000000000000000 r10=ffffae87bddc1440
r11=0000000000000003 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
ndis!ndisFreeConvertedPacket+0x23:
fffff801`5df44ffb 894228 mov dword ptr [rdx+28h],eax ds:00000000`00000028=????????
1: kd> .trap 0xfffff6833684f5d0
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffae87c0928560
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8015df44ffb rsp=fffff6833684f760 rbp=fffff6833684f8d0
r8=ffffae87bdab7520 r9=0000000000000000 r10=ffffae87bddc1440
r11=0000000000000003 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
ndis!ndisFreeConvertedPacket+0x23:
fffff801`5df44ffb 894228 mov dword ptr [rdx+28h],eax ds:00000000`00000028=????????
Continue reading...