Password reset and notification emails are now sending correctly.
If you recently requested a password reset, please check your inbox (and spam folder just in case).
You can now reset your password and log in as normal.
Welcome back to PCHF, and thank you for your patience during our migration process!
β The PCHF Team
Welcome to PC Help Forum!
Youβre viewing our community as a guest.
That means you can browse posts, but canβt yet reply or start new topics.
Join us today β it's completely free!
As a member, you'll be able to:
β Get personalized tech support from trusted volunteers
π¦ Work one-on-one with our Malware Removal Specialists
this didnt happen too long ago i was watching some good old fashioned Youtube as you do then it my pc stopped suddently and then bsod happened and showed the irql issue. heres the dmp below
analyze it if you can it would mean the world to me if you could help me with this
Download the Sysnative BSOD Dump + System File Collection App - save to Documents folder -
Run the app - Double-click on the downloaded EXE file
Output = new folder created in Documents + a zipped version β SysnativeFileCollectionApp + SysnativeFileCollectionApp.zip
Upload the SysnativeFileCollectionApp.zip file for review.
Speccy Scan.
[ul]
[li]Please go here and download Speccy.[/li][li]Install and run the program.[/li][li]Upon Completion:[/li][li]Hit File[/li][li]Publish Snap Shot[/li][li]A link will appear, post that link.[/li][/ul]
Code:
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffff9f886ec5d9f8, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8029e4da9e9, address which referenced memory
Debugging Details:
------------------
TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2
READ_ADDRESS: unable to get nt!MmSpecialPoolStart
unable to get nt!MmSpecialPoolEnd
unable to get nt!MmPagedPoolEnd
unable to get nt!MmNonPagedPoolStart
unable to get nt!MmSizeOfNonPagedPoolInBytes
ffff9f886ec5d9f8
CURRENT_IRQL: 2
FAULTING_IP:
nt!MiIdentifyPfn+349
fffff802`9e4da9e9 4c8b38 mov r15,qword ptr [rax]
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: svchost.exe
TRAP_FRAME: fffff68473428e00 -- (.trap 0xfffff68473428e00)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff9f886ec5d9f8 rbx=0000000000000000 rcx=9f886ec5d9f80460
rdx=0a00000000000160 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8029e4da9e9 rsp=fffff68473428f90 rbp=fffff68473429019
r8=9f886ec5d9f80460 r9=000000000021c99d r10=022000000020778c
r11=0000000071f40c46 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!MiIdentifyPfn+0x349:
fffff802`9e4da9e9 4c8b38 mov r15,qword ptr [rax] ds:ffff9f88`6ec5d9f8=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8029e647869 to fffff8029e636ca0
STACK_TEXT:
fffff684`73428cb8 fffff802`9e647869 : 00000000`0000000a ffff9f88`6ec5d9f8 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff684`73428cc0 fffff802`9e6444e5 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000200 : nt!KiBugCheckDispatch+0x69
fffff684`73428e00 fffff802`9e4da9e9 : ffff9f8c`6e774000 00000000`00000000 ffff9f8c`6e774000 00000000`00000001 : nt!KiPageFault+0x425
fffff684`73428f90 fffff802`9e4da64e : ffff9f8c`6e7740c0 00000000`00000000 00000000`00000000 fffff684`73429178 : nt!MiIdentifyPfn+0x349
fffff684`73429080 fffff802`9e9699da : 00000000`00000000 ffff9f8c`6e775320 fffff684`73429178 fffff684`42506650 : nt!MiIdentifyPfnWrapper+0x3e
fffff684`734290b0 fffff802`9e9676b4 : 00000000`00000001 ffff8b88`6ac9f740 fffff684`73429294 ffff9f8c`6e774000 : nt!PfpPfnPrioRequest+0xda
fffff684`73429130 fffff802`9e9657c8 : 00000000`00000000 ffff9f8c`7186da80 00000000`00000000 fffffff6`00000005 : nt!PfQuerySuperfetchInformation+0x2d4
fffff684`73429260 fffff802`9e9654db : 00000000`00000018 000001c5`db9b7800 00000000`00000000 000001c5`db9d2000 : nt!ExpQuerySystemInformation+0x1d8
fffff684`73429ac0 fffff802`9e647343 : 00000000`00020028 000001c4`da928150 000001c4`da9282e0 00000000`00000000 : nt!NtQuerySystemInformation+0x2b
fffff684`73429b00 00007fff`c8dca574 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000075`08a79db8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7fff`c8dca574
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiIdentifyPfn+349
fffff802`9e4da9e9 4c8b38 mov r15,qword ptr [rax]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!MiIdentifyPfn+349
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 5b63c7b5
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_AV_nt!MiIdentifyPfn+349
BUCKET_ID: X64_AV_nt!MiIdentifyPfn+349
Followup: MachineOwner
Download the Sysnative BSOD Dump + System File Collection App - save to Documents folder -
Run the app - Double-click on the downloaded EXE file
Output = new folder created in Documents + a zipped version β SysnativeFileCollectionApp + SysnativeFileCollectionApp.zip
Upload the SysnativeFileCollectionApp.zip file for review.
Code:
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffff9f886ec5d9f8, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8029e4da9e9, address which referenced memory
Debugging Details:
------------------
TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2
READ_ADDRESS: unable to get nt!MmSpecialPoolStart
unable to get nt!MmSpecialPoolEnd
unable to get nt!MmPagedPoolEnd
unable to get nt!MmNonPagedPoolStart
unable to get nt!MmSizeOfNonPagedPoolInBytes
ffff9f886ec5d9f8
CURRENT_IRQL: 2
FAULTING_IP:
nt!MiIdentifyPfn+349
fffff802`9e4da9e9 4c8b38 mov r15,qword ptr [rax]
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: svchost.exe
TRAP_FRAME: fffff68473428e00 -- (.trap 0xfffff68473428e00)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff9f886ec5d9f8 rbx=0000000000000000 rcx=9f886ec5d9f80460
rdx=0a00000000000160 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8029e4da9e9 rsp=fffff68473428f90 rbp=fffff68473429019
r8=9f886ec5d9f80460 r9=000000000021c99d r10=022000000020778c
r11=0000000071f40c46 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!MiIdentifyPfn+0x349:
fffff802`9e4da9e9 4c8b38 mov r15,qword ptr [rax] ds:ffff9f88`6ec5d9f8=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8029e647869 to fffff8029e636ca0
STACK_TEXT:
fffff684`73428cb8 fffff802`9e647869 : 00000000`0000000a ffff9f88`6ec5d9f8 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff684`73428cc0 fffff802`9e6444e5 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000200 : nt!KiBugCheckDispatch+0x69
fffff684`73428e00 fffff802`9e4da9e9 : ffff9f8c`6e774000 00000000`00000000 ffff9f8c`6e774000 00000000`00000001 : nt!KiPageFault+0x425
fffff684`73428f90 fffff802`9e4da64e : ffff9f8c`6e7740c0 00000000`00000000 00000000`00000000 fffff684`73429178 : nt!MiIdentifyPfn+0x349
fffff684`73429080 fffff802`9e9699da : 00000000`00000000 ffff9f8c`6e775320 fffff684`73429178 fffff684`42506650 : nt!MiIdentifyPfnWrapper+0x3e
fffff684`734290b0 fffff802`9e9676b4 : 00000000`00000001 ffff8b88`6ac9f740 fffff684`73429294 ffff9f8c`6e774000 : nt!PfpPfnPrioRequest+0xda
fffff684`73429130 fffff802`9e9657c8 : 00000000`00000000 ffff9f8c`7186da80 00000000`00000000 fffffff6`00000005 : nt!PfQuerySuperfetchInformation+0x2d4
fffff684`73429260 fffff802`9e9654db : 00000000`00000018 000001c5`db9b7800 00000000`00000000 000001c5`db9d2000 : nt!ExpQuerySystemInformation+0x1d8
fffff684`73429ac0 fffff802`9e647343 : 00000000`00020028 000001c4`da928150 000001c4`da9282e0 00000000`00000000 : nt!NtQuerySystemInformation+0x2b
fffff684`73429b00 00007fff`c8dca574 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000075`08a79db8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7fff`c8dca574
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiIdentifyPfn+349
fffff802`9e4da9e9 4c8b38 mov r15,qword ptr [rax]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!MiIdentifyPfn+349
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 5b63c7b5
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_AV_nt!MiIdentifyPfn+349
BUCKET_ID: X64_AV_nt!MiIdentifyPfn+349
Followup: MachineOwner
as a reply to do i have found an online way to read.dmp so i dont have to install a bsod reader now that thats out of the way i dont know how to solve an issue from a .dmp i dont know anything about code rly so what does any of this mean for my pc a bit confused rn on what the .dmp tells me thanks for showing me how to read dumps
Run the app - Double-click on the downloaded EXE file
Output = new folder created in Documents + a zipped version β SysnativeFileCollectionApp + SysnativeFileCollectionApp.zip
Upload the SysnativeFileCollectionApp.zip file for review.
Run the app - Double-click on the downloaded EXE file
Output = new folder created in Documents + a zipped version β SysnativeFileCollectionApp + SysnativeFileCollectionApp.zip
Upload the SysnativeFileCollectionApp.zip file for review.
Can you please provide the other requested information so I can have a look at your temprature and couple other items the other scan does not cover.
Speccy Scan.
[ul]
[li]Please go here and download Speccy.[/li][li]Install and run the program.[/li][li]Upon Completion:[/li][li]Hit File[/li][li]Publish Snap Shot[/li][li]A link will appear, post that link.[/li][/ul]
Can you please provide the other requested information so I can have a look at your temprature and couple other items the other scan does not cover.
Speccy Scan.
[ul]
[li]Please go here and download Speccy.[/li][li]Install and run the program.[/li][li]Upon Completion:[/li][li]Hit File[/li][li]Publish Snap Shot[/li][li]A link will appear, post that link.[/li][/ul]
While I am looking over the information Iβd advise you tidy up the machine a bit.
MiniToolBox Scan
Please download MINITOOLBOX and run it.
Checkmark following boxes:
Flush DNS
Reset FF proxy Settings
Reset Ie Proxy Settings
Report IE Proxy Settings
Report FF Proxy Settings
List content of Hosts
List IP configuration
List Winsock Entries
List last 10 Event Viewer log
List Installed Programs
List Users, Partitions and Memory size
List Devices (problems only)
Click Go post the result.
Clean up temp files and reduce startup load with CCleaner.
Note: This tool will clean your browsing history as well.
[ul]
[li]Download CCleaner from here.[/li][li]After install Click Options.[/li][li]Go to monitoring.[/li][li]Uncheck All Monitoring items.[/li][li]Go to advanced β Click close program after cleaning.[/li][li]Go to settings β click run ccleaner when the computer starts.[/li][li]Now that you have ccleaner installed and set-up:[/li][li]Open the program.[/li][li]Go to Tools[/li][li]Go to Startup[/li][li]Now double click each item. To Disable.[/li][li]Leave only your antivirus enabled.[/li][li]Then disable All items in your scheduled task as well.[/li][li]Unless they are related to windows defender.Or your antivirus.[/li][li]Reboot the machine.[/li][/ul]
Adware Cleaner Scan.
Please download AdwCleaner by Xplode onto your desktop.
[ul]
[li]Close all open programs and internet browsers.[/li][li]Double click on adwcleaner.exe to run the tool.[/li][li]Click on Scan button.[/li][li]When the scan has finished click on Clean button.[/li][li]Your computer will be rebooted automatically. A text file will open after the restart.[/li][li]Please post the contents of that logfile with your next reply.[/li][li]You can find the logfile at C:\AdwCleaner[S1].txt as well.[/li][/ul]
We process personal data about users of our site, through the use of cookies and other technologies, to deliver our services, personalize advertising, and to analyze site activity. We may share certain information about our users with our advertising and analytics partners. For additional details, refer to our Privacy Policy.
By clicking "I AGREE" below, you agree to our Privacy Policy and our personal data processing and cookie practices as described therein. You also acknowledge that this forum may be hosted outside your country and you consent to the collection, storage, and processing of your data in the country where this forum is hosted.
Comment