Stop Error Dump File Analysis - Dump file analysed: 091219-33718-01.dmp] on 15/09/19

Analysed using Microsoft (R) Windows Debugger Version 10.0.18362.1 X86 and PCT Analyser V5 (Copyright 2019)

Click on each button to view the relevant information

General Tips for Stop Errors (BSOD)

Firstly, you can follow the Microsoft online Blue Screen wizard here.

Hardware Diagnostic / Testing Tools

What are Stop Errors?

Firstly, it is worth clarifying that a BSOD is only attributed to Windows, for example, where Windows has a Blue Screen, Linux actually has something known as a System Panic. However, you’ll find Linux is much less prone to them.

Microsoft defines a blue screen very well:

“When Microsoft Windows encounters a condition that compromises safe system operation, the system halts. This condition is called a bug check. It is also commonly referred to as a system crash, a kernel error, a Stop error, or BSOD. A hardware device, its driver, or related software might have caused this error.”

In simple terms – it’s when Windows has detected a problem that could have caused damage or corruption to the operating system, or your computer itself, and therefore needed to STOP.

That’s why technically it’s called a stop error, stop code, or a bug check. They are more indicative of a fatal system crash. For the purpose of standardisation, we will call this a bug check (Bugcheck = BSOD).

So, there are some important considerations to take before continuing:

Summary

BugCheck A ----- IRQL_NOT_LESS_OR_EQUAL

Probably caused by : ntkrnlmp.exe ( nt!KiUpdateTimeAssist+3b )

Arg1: fffff80730c2d090, memory referenced

Arg2: 00000000000000ff, IRQL

Arg3: 0000000000000000, bitfield :

Arg4: fffff807287d3e3b, address which referenced memory

PROCESS_NAME: System

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe -----> Windows NT operating system kernel


Bugcheck Description:

IRQL_NOT_LESS_OR_EQUAL

"This indicates that Microsoft Windows or a kernel-mode driver accessed paged memory at an invalid address while at a raised interrupt request level (IRQL). This is typically either a bad pointer or a pageability problem. P1 is the address that could not be referenced."

About your bugcheck / typical cause:

"Bug check 0xA is usually caused by kernel mode device drivers using improper addresses. This is either a bad memory pointer or a pageability problem with the device driver code. Examine the third party drivers . Check the System Log in Event Viewer for additional error messages that might help pinpoint the device or driver that is causing the error. For more information, see Open Event Viewer. Look for critical errors in the system log that occurred in the same time window as the blue screen."

System Information

This includes BIOS, Motherboard, Processor, and Memory. Not all dump files will contain hardware information, and therefore this will not always be complete

BIOS Information

No data

Mainboard Information

No Data

Processor Information

No data

Memory Information

Slot Size Speed Part Number
Memory Slot 1 No Data
Memory Slot 2 No Data
Memory Slot 3 No Data
Memory Slot 4 No Data

Loaded Modules

To disable third party modules, use Autoruns (Microsoft Program)

Modules are listed from OLDEST to NEWEST - typically out of drivers should be looked at first. Total Modules Loaded = Total 10
1- ModuleName Column1 2- Time Stamp 3- Company 4- Description
VerifierExt.sys 08/11/1983 Microsoft DV Driver Verifier Extension (in third party modules so that it is highlighted in report)
t_mouse.sys 03/12/2012 iBall iBall Mouse Driver
amdgpio3.sys 14/03/2016 AMD AMD GPIO Controller Driver
nvhda64v.sys 15/12/2017 NVIDIA NVIDIA Audio HDMI Driver (nForce Chip)
nvlddmkm.sys 23/03/2018 NVIDIA NVIDIA Video Drivers
AMDRyzenMasterDriver.sys 18/10/2018 AMD Ryzen Master Driver
rt640x64.sys 10/05/2019 Realtek Realtek Audio Driver
amdgpio2.sys 17/05/2019 AMD AMD GPIO Controller Driver
amdpsp.sys 19/06/2019 AMD AMD Chipset Driver
AMDPCIDev.sys 24/07/2019 AMD AMD Ryzen OC Utility

Column1 Dump File

Microsoft (R) Windows Debugger Version 10.0.18362.1 X86

Copyright (c) Microsoft Corporation. All rights reserved.

Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: srv*

Executable search path is:

Windows 10 Kernel Version 18362 MP (12 procs) Free x64

Product: WinNt, suite: TerminalServer SingleUserTS

Machine Name:

Kernel base = 0xfffff807`286bf000 PsLoadedModuleList = 0xfffff807`28b05490

Debug session time: Thu Sep 5 15:58:41.349 2019 (UTC + 1:00)

System Uptime: 0 days 0:02:26.082

Loading Kernel Symbols

...............................................................

................................................................

..............................................

Loading User Symbols

Loading unloaded module list

......

For analysis of this file, run !analyze -v

*******************************************************************************

* *

* Bugcheck Analysis *

* *

*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck A, {fffff80730c2d090, ff, 0, fffff807287d3e3b}

Probably caused by : ntkrnlmp.exe ( nt!KiUpdateTimeAssist+3b )

Followup: MachineOwner

---------

*******************************************************************************

* *

* Bugcheck Analysis *

* *

*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)

An attempt was made to access a pageable (or completely invalid) address at an

interrupt request level (IRQL) that is too high. This is usually

caused by drivers using improper addresses.

If a kernel debugger is available get the stack backtrace.

Arguments:

Arg1: fffff80730c2d090, memory referenced

Arg2: 00000000000000ff, IRQL

Arg3: 0000000000000000, bitfield :

Arg4: fffff807287d3e3b, address which referenced memory

Debugging Details:

------------------

KEY_VALUES_STRING: 1

PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1

DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 10.0.18362.295 (WinBuild.160101.0800)

DUMP_FILE_ATTRIBUTES: 0x8

Kernel Generated Triage Dump

DUMP_TYPE: 2

BUGCHECK_P1: fffff80730c2d090

BUGCHECK_P2: ff

BUGCHECK_P3: 0

BUGCHECK_P4: fffff807287d3e3b

READ_ADDRESS: fffff80728c303b8: Unable to get MiVisibleState

Unable to get NonPagedPoolStart

Unable to get NonPagedPoolEnd

Unable to get PagedPoolStart

Unable to get PagedPoolEnd

fffff80730c2d090

CURRENT_IRQL: 0

FAULTING_IP:

nt!KiUpdateTimeAssist+3b

fffff807`287d3e3b 4c8b154e924508 mov r10,qword ptr [fffff807`30c2d090]

CPU_COUNT: c

CPU_MHZ: e09

CPU_VENDOR: AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 8

CPU_STEPPING: 2

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT

BUGCHECK_STR: AV

PROCESS_NAME: System

ANALYSIS_SESSION_HOST: DESKTOP-CL34DUR

ANALYSIS_SESSION_TIME: 09-15-2019 16:11:05.0586

ANALYSIS_VERSION: 10.0.18362.1 x86fre

TRAP_FRAME: ffffc5810f837580 -- (.trap 0xffffc5810f837580)

NOTE: The trap frame does not contain all registers.

Some register values may be zeroed or incorrect.

rax=0000000000004f1a rbx=0000000000000000 rcx=0000000000000000

rdx=0000000000004f1b rsi=0000000000000000 rdi=0000000000000000

rip=fffff807287d3e3b rsp=ffffc5810f837710 rbp=ffffa307cf522050

r8=ffffc5810f837790 r9=0000000000000000 r10=fffff807287b92a0

r11=0000000000000000 r12=0000000000000000 r13=0000000000000000

r14=0000000000000000 r15=0000000000000000

iopl=0 nv up di pl zr na po nc

nt!KiUpdateTimeAssist+0x3b:

fffff807`287d3e3b 4c8b154e924508 mov r10,qword ptr [fffff807`30c2d090] ds:fffff807`30c2d090=????????????????

Resetting default scope

LAST_CONTROL_TRANSFER: from fffff80728890ae9 to fffff8072887ecc0

STACK_TEXT:

ffffc581`0f837438 fffff807`28890ae9 : 00000000`0000000a fffff807`30c2d090 00000000`000000ff 00000000`00000000 : nt!KeBugCheckEx

ffffc581`0f837440 fffff807`2888ce2b : 00000000`00000000 00000000`00000000 ffff63de`aea24390 ffffb481`f435bfa0 : nt!KiBugCheckDispatch+0x69

ffffc581`0f837580 fffff807`287d3e3b : ffffa307`cd6adf00 ffffb481`f34dbf08 00000000`00000000 fffff807`286e1e0f : nt!KiPageFault+0x46b

ffffc581`0f837710 fffff807`286e1ae6 : 00000000`000033ac ffffb481`f34d6180 00000000`00000000 00000000`00000000 : nt!KiUpdateTimeAssist+0x3b

ffffc581`0f837740 fffff807`286e08c8 : 0000008a`1a8ec9f9 0000008a`1a8ec9f9 ffffa307`cf522050 00000000`00000000 : nt!KeResumeClockTimerFromIdle+0x146

ffffc581`0f8377e0 fffff807`286dfe6e : 00000000`00000003 00000000`00000002 ffffa307`cf522140 00000000`00000008 : nt!PpmIdleExecuteTransition+0x8b8

ffffc581`0f837b00 fffff807`288827c8 : ffffffff`00000000 ffffb481`f34d6180 ffffa307`d9cce080 00000000`0000096c : nt!PoIdle+0x36e

ffffc581`0f837c60 00000000`00000000 : ffffc581`0f838000 ffffc581`0f832000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x48

THREAD_SHA1_HASH_MOD_FUNC: bfb8b83f8b28d71a930f3df65ca913223edec756

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 09880435c6927e014ea2416e488fe738afe2f920

THREAD_SHA1_HASH_MOD: cb5f414824c2521bcc505eaa03e92fa10922dad8

FOLLOWUP_IP:

nt!KiUpdateTimeAssist+3b

fffff807`287d3e3b 4c8b154e924508 mov r10,qword ptr [fffff807`30c2d090]

FAULT_INSTR_CODE: 4e158b4c

SYMBOL_STACK_INDEX: 3

SYMBOL_NAME: nt!KiUpdateTimeAssist+3b

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP: 35707659

IMAGE_VERSION: 10.0.18362.295

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 3b

FAILURE_BUCKET_ID: AV_nt!KiUpdateTimeAssist

BUCKET_ID: AV_nt!KiUpdateTimeAssist

PRIMARY_PROBLEM_CLASS: AV_nt!KiUpdateTimeAssist

TARGET_TIME: 2019-09-05T14:58:41.000Z

OSBUILD: 18362

OSSERVICEPACK: 295

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 1998-05-30 22:12:57

BUILDDATESTAMP_STR: 160101.0800

BUILDLAB_STR: WinBuild

BUILDOSVER_STR: 10.0.18362.295

ANALYSIS_SESSION_ELAPSED_TIME: 18bb

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:av_nt!kiupdatetimeassist

FAILURE_ID_HASH: {25f2caeb-a2f6-95ed-c6eb-58e550e2fb51}

Followup: MachineOwner

---------

@ win32kfull.sys aab2b60c

@ win32kbase.sys ccb9be6e

@ cdd.dll e63e8bf3

@ E:\WinDBG\Debuggers\x86\sym\win32k.pdb\6481EC65B6915B3085536FB3A16A81D11\win32k.pdb 7b83186f

@ dxgkrnl.sys 3a1abc64

@ watchdog.sys 21474799

@ BasicDisplay.sys 4e6e05e1

@ BasicRender.sys 82a93228

@ Npfs.SYS b03ecfd3

@ Msfs.SYS 91fe0ff4

@ tdx.sys 0a1f3dc4

@ TDI.SYS 894065a0

@ netbt.sys 113d2a22

@ afunix.sys 9d6c12c4

@ afd.sys b88dd13e

@ vwififlt.sys 39396289

@ pacer.sys e7276bde

@ netbios.sys b37fd2e9

@ rdbss.sys bce0ed0a

@ csc.sys b2d84c51

@ nsiproxy.sys 528da18a

@ npsvctrig.sys 0e7ac006

@ E:\WinDBG\Debuggers\x86\sym\mssmbios.pdb\7CE0C1D2DD53B809A668DE8F5F91012E1\mssmbios.pdb e6dc521d

@ gpuenergydrv.sys 0cc24294

@ dfsc.sys fabe3f7d

@ bam.sys 22198778

@ ahcache.sys a8473be2

@ Vid.sys bde3e73c

@ winhvr.sys 5eb9ff62

@ CompositeBus.sys f050d616

@ kdnic.sys 1ff5f7f5

@ umbus.sys 3104a4ad

@ USBXHCI.SYS 951b0a79

@ ucx01000.sys 04268533

@ crashdmp.sys 2985cb13

@ cdrom.sys 9f6b0b7b

@ filecrypt.sys 4ead73c1

@ tbs.sys 965bac31

@ Null.SYS e822087b

@ Beep.SYS 528ec21a

@ AgileVpn.sys a96aff6d

@ rasl2tp.sys a7aa404e

@ raspptp.sys 54893590

@ raspppoe.sys 053a7d72

@ ndiswan.sys fb43c10d

@ WSDPrint.sys fce23e82

@ WSDScan.sys ed66a961

@ WdNisDrv.sys db1d2c05

@ dxgmms2.sys 25617a1c

@ cldflt.sys 0cf2c7cf

@ winquic.sys d60f7863

@ srvnet.sys 220ab43d

@ srv2.sys fbb27001

@ rspndr.sys ed98d1ee

@ wanarp.sys 1bd57cfb

@ nwifi.sys be919ea8

@ ndisuio.sys 38fd20ee

@ HTTP.sys aac6df8e

@ bowser.sys d37f2e35

@ mpsdrv.sys 7d5af2f0

@ mrxsmb.sys bacc3e1c

@ mrxsmb20.sys 2a968ecc

@ AMDRyzenMasterDriver.sys 5bc8105a

@ mmcss.sys 3ee4136d

@ rt640x64.sys 5cd53d6b

@ peauth.sys 54b328cc

@ Ndu.sys 23725908

@ tcpipreg.sys 3451b629

@ rassstp.sys 6ec6a1e5

@ NDProxy.sys 193fe713

@ ks.sys 1f5fe6fb

@ AMDPCIDev.sys 5d3848ec

@ serial.sys b6549b39

@ serenum.sys 0b8b1db3

@ amdppm.sys dd8872d0

@ amdgpio2.sys 5cde452f

@ msgpioclx.sys 764cde46

@ wmiacpi.sys af7efce5

@ amdgpio3.sys 56e69038

@ NdisVirtualBus.sys d217410a

@ swenum.sys c4d73525

@ rdpbus.sys 4e9899f8

@ UsbHub3.sys d4267d67

@ USBD.SYS cd63ce9d

@ nvhda64v.sys 5a338527

@ ksthunk.sys 15502221

@ t_mouse.sys 50bc4472

@ hidusb.sys 7b9189fe

@ HIDCLASS.SYS d4d0dee6

@ HIDPARSE.SYS 0d56f932

@ mouhid.sys a140c187

@ mouclass.sys 4a22ffb8

@ usbccgp.sys 5d2af1d1

@ kbdhid.sys 4cf68ca7

@ kbdclass.sys 0b474226

@ HdAudio.sys 9f3a3dc3

@ dump_storport.sys 5cc3d020

@ dump_storahci.sys 381e77bb

@ dump_dumpfve.sys 4bedf38a

@ monitor.sys 93f54fb5

@ luafv.sys 08a8e82a

@ wcifs.sys 616ec3aa

@ storqosflt.sys d77c69c8

@ mslldp.sys 15c3108a

@ nvlddmkm.sys 5ab5877e

@ HDAudBus.sys aecd2958

@ portcls.sys d4f15bf0

@ drmk.sys a3e06fb0

@ lltdio.sys 707e9308

@ ndistapi.sys 690d0d05

@ hal.dll 4e924194

@ E:\WinDBG\Debuggers\x86\sym\ntkrnlmp.pdb\11BC9A513F1140CA359ECDF50F0122C11\ntkrnlmp.pdb 35707659

@ kdcom.dll 5a75d524

@ mcupdate.dll f9972f7b

@ werkernel.sys 958e14b2

@ ksecdd.sys a35f28f6

@ msrpc.sys 8e1a4f15

@ tm.sys 2adb549a

@ CLFS.SYS 296cbb1a

@ PSHED.dll b21f9dda

@ BOOTVID.dll 0f301604

@ clipsp.sys 5c90178f

@ FLTMGR.SYS 801a5f11

@ cmimcext.sys c7f022b4

@ ntosext.sys bac877d8

@ CI.dll 8d6fde01

@ cng.sys 5444b5a1

@ VerifierExt.sys 1a0e4e4f

@ Wdf01000.sys 116a658a

@ WDFLDR.SYS 3b396780

@ SleepStudyHelper.sys ba6e2346

@ WppRecorder.sys 34a54231

@ acpiex.sys 2b91edb2

@ mssecflt.sys 3517dbfe

@ SgrmAgent.sys f851a195

@ ACPI.sys 26fd2214

@ WMILIB.SYS 59021e3d

@ intelpep.sys 8a1b7970

@ WindowsTrustedRT.sys cb95ce3d

@ WindowsTrustedRTProxy.sys 514e3023

@ pcw.sys 6b731527

@ msisadrv.sys 5e470a0e

@ pci.sys 79450d16

@ vdrvroot.sys 0101bcc6

@ pdc.sys 87c34d95

@ CEA.sys f3811107

@ partmgr.sys 89c96ad1

@ spaceport.sys dc82b965

@ volmgr.sys 211cef76

@ volmgrx.sys d6f366b7

@ mountmgr.sys 242db05f

@ storahci.sys 381e77bb

@ storport.sys a692ce5b

@ EhStorClass.sys 526cc202

@ fileinfo.sys 24bbed20

@ Wof.sys 3cb75347

@ WdFilter.sys e9cc4eb5

@ Fs_Rec.sys 49e932ba

@ ndis.sys a6d0fb1e

@ NETIO.SYS e3375155

@ ksecpkg.sys e1e129d5

@ Ntfs.sys d9a3ce82

@ amdpsp.sys 5d0a4a77

@ tcpip.sys 61ae2576

@ fwpkclnt.sys 58c1e6ed

@ wfplwfs.sys 60902cbb

@ fvevol.sys d4b5a2e7

@ volume.sys a4e9fdfa

@ volsnap.sys 1876f533

@ rdyboost.sys f450ceb3

@ mup.sys 565e0311

@ iorate.sys 18d52dda

@ disk.sys 384fefed

@ CLASSPNP.SYS 09ed6e49

sysinfo: could not find necessary interfaces.

sysinfo: note that mssmbios.sys must be loaded (XPSP2+).

sysinfo: could not find necessary interfaces.

sysinfo: note that mssmbios.sys must be loaded (XPSP2+).

Additional Commands

No additional commands run in this instance