Solved 0XA IRQL_NOT_LESS_OR_EQUAL BSOD please help

  • Hi there and welcome to PC Help Forum (PCHF), a more effective way to get the Tech Support you need!
    We have Experts in all areas of Tech, including Malware Removal, Crash Fixing and BSOD's , Microsoft Windows, Computer DIY and PC Hardware, Networking, Gaming, Tablets and iPads, General and Specific Software Support and so much more.

    Why not Click Here To Sign Up and start enjoying great FREE Tech Support.

    This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.
Welcome to our Community
Wanting to join the rest of our members? Feel free to sign up today.
Sign up
Status
Not open for further replies.

BlueTBM

PCHF Member
PCHF Member
Aug 17, 2018
13
0
38
this didnt happen too long ago i was watching some good old fashioned Youtube as you do then it my pc stopped suddently and then bsod happened and showed the irql issue. heres the dmp below

analyze it if you can it would mean the world to me if you could help me with this



https://www.dropbox.com/s/mv2my68hudvvmr2/090218-28578-01.dmp?dl=0

i also h

also my rams the same brand 4gig of corsair vengeance lpx 2400 speed same timing same model

just had another recent crash got more dmps
https://www.dropbox.com/sh/ia10k0jjfm0ic68/AADQabXEV5Q8RYTi1-ZK5T8Xa?dl=0
 
Last edited:

Malnutrition

Malnurished Mod
Moderator
Security Team
Jul 22, 2016
3,182
540
Sysnative Tool.

1. Download the Sysnative BSOD Dump + System File Collection App - save to Documents folder -
2. Run the app - Double-click on the downloaded EXE file
Output = new folder created in Documents + a zipped version -- SysnativeFileCollectionApp + SysnativeFileCollectionApp.zip
3. Upload the SysnativeFileCollectionApp.zip file for review.

Speccy Scan.


  • Please go here and download Speccy.
  • Install and run the program.
  • Upon Completion:
  • Hit File
  • Publish Snap Shot
  • A link will appear, post that link.



Code:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffff9f886ec5d9f8, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8029e4da9e9, address which referenced memory

Debugging Details:
------------------

TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2

READ_ADDRESS: unable to get nt!MmSpecialPoolStart
unable to get nt!MmSpecialPoolEnd
unable to get nt!MmPagedPoolEnd
unable to get nt!MmNonPagedPoolStart
unable to get nt!MmSizeOfNonPagedPoolInBytes
ffff9f886ec5d9f8

CURRENT_IRQL:  2

FAULTING_IP:
nt!MiIdentifyPfn+349
fffff802`9e4da9e9 4c8b38          mov     r15,qword ptr [rax]

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  AV

PROCESS_NAME:  svchost.exe

TRAP_FRAME:  fffff68473428e00 -- (.trap 0xfffff68473428e00)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff9f886ec5d9f8 rbx=0000000000000000 rcx=9f886ec5d9f80460
rdx=0a00000000000160 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8029e4da9e9 rsp=fffff68473428f90 rbp=fffff68473429019
r8=9f886ec5d9f80460  r9=000000000021c99d r10=022000000020778c
r11=0000000071f40c46 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!MiIdentifyPfn+0x349:
fffff802`9e4da9e9 4c8b38          mov     r15,qword ptr [rax] ds:ffff9f88`6ec5d9f8=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff8029e647869 to fffff8029e636ca0

STACK_TEXT: 
fffff684`73428cb8 fffff802`9e647869 : 00000000`0000000a ffff9f88`6ec5d9f8 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff684`73428cc0 fffff802`9e6444e5 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000200 : nt!KiBugCheckDispatch+0x69
fffff684`73428e00 fffff802`9e4da9e9 : ffff9f8c`6e774000 00000000`00000000 ffff9f8c`6e774000 00000000`00000001 : nt!KiPageFault+0x425
fffff684`73428f90 fffff802`9e4da64e : ffff9f8c`6e7740c0 00000000`00000000 00000000`00000000 fffff684`73429178 : nt!MiIdentifyPfn+0x349
fffff684`73429080 fffff802`9e9699da : 00000000`00000000 ffff9f8c`6e775320 fffff684`73429178 fffff684`42506650 : nt!MiIdentifyPfnWrapper+0x3e
fffff684`734290b0 fffff802`9e9676b4 : 00000000`00000001 ffff8b88`6ac9f740 fffff684`73429294 ffff9f8c`6e774000 : nt!PfpPfnPrioRequest+0xda
fffff684`73429130 fffff802`9e9657c8 : 00000000`00000000 ffff9f8c`7186da80 00000000`00000000 fffffff6`00000005 : nt!PfQuerySuperfetchInformation+0x2d4
fffff684`73429260 fffff802`9e9654db : 00000000`00000018 000001c5`db9b7800 00000000`00000000 000001c5`db9d2000 : nt!ExpQuerySystemInformation+0x1d8
fffff684`73429ac0 fffff802`9e647343 : 00000000`00020028 000001c4`da928150 000001c4`da9282e0 00000000`00000000 : nt!NtQuerySystemInformation+0x2b
fffff684`73429b00 00007fff`c8dca574 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000075`08a79db8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7fff`c8dca574


STACK_COMMAND:  kb

FOLLOWUP_IP:
nt!MiIdentifyPfn+349
fffff802`9e4da9e9 4c8b38          mov     r15,qword ptr [rax]

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  nt!MiIdentifyPfn+349

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP:  5b63c7b5

IMAGE_NAME:  memory_corruption

FAILURE_BUCKET_ID:  X64_AV_nt!MiIdentifyPfn+349

BUCKET_ID:  X64_AV_nt!MiIdentifyPfn+349

Followup: MachineOwner
 
Last edited:

BlueTBM

PCHF Member
PCHF Member
Aug 17, 2018
13
0
38
Sysnative Tool.

1. Download the Sysnative BSOD Dump + System File Collection App - save to Documents folder -
2. Run the app - Double-click on the downloaded EXE file
Output = new folder created in Documents + a zipped version -- SysnativeFileCollectionApp + SysnativeFileCollectionApp.zip
3. Upload the SysnativeFileCollectionApp.zip file for review.


Code:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffff9f886ec5d9f8, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8029e4da9e9, address which referenced memory

Debugging Details:
------------------

TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2

READ_ADDRESS: unable to get nt!MmSpecialPoolStart
unable to get nt!MmSpecialPoolEnd
unable to get nt!MmPagedPoolEnd
unable to get nt!MmNonPagedPoolStart
unable to get nt!MmSizeOfNonPagedPoolInBytes
ffff9f886ec5d9f8

CURRENT_IRQL:  2

FAULTING_IP:
nt!MiIdentifyPfn+349
fffff802`9e4da9e9 4c8b38          mov     r15,qword ptr [rax]

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  AV

PROCESS_NAME:  svchost.exe

TRAP_FRAME:  fffff68473428e00 -- (.trap 0xfffff68473428e00)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff9f886ec5d9f8 rbx=0000000000000000 rcx=9f886ec5d9f80460
rdx=0a00000000000160 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8029e4da9e9 rsp=fffff68473428f90 rbp=fffff68473429019
r8=9f886ec5d9f80460  r9=000000000021c99d r10=022000000020778c
r11=0000000071f40c46 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!MiIdentifyPfn+0x349:
fffff802`9e4da9e9 4c8b38          mov     r15,qword ptr [rax] ds:ffff9f88`6ec5d9f8=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff8029e647869 to fffff8029e636ca0

STACK_TEXT: 
fffff684`73428cb8 fffff802`9e647869 : 00000000`0000000a ffff9f88`6ec5d9f8 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff684`73428cc0 fffff802`9e6444e5 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000200 : nt!KiBugCheckDispatch+0x69
fffff684`73428e00 fffff802`9e4da9e9 : ffff9f8c`6e774000 00000000`00000000 ffff9f8c`6e774000 00000000`00000001 : nt!KiPageFault+0x425
fffff684`73428f90 fffff802`9e4da64e : ffff9f8c`6e7740c0 00000000`00000000 00000000`00000000 fffff684`73429178 : nt!MiIdentifyPfn+0x349
fffff684`73429080 fffff802`9e9699da : 00000000`00000000 ffff9f8c`6e775320 fffff684`73429178 fffff684`42506650 : nt!MiIdentifyPfnWrapper+0x3e
fffff684`734290b0 fffff802`9e9676b4 : 00000000`00000001 ffff8b88`6ac9f740 fffff684`73429294 ffff9f8c`6e774000 : nt!PfpPfnPrioRequest+0xda
fffff684`73429130 fffff802`9e9657c8 : 00000000`00000000 ffff9f8c`7186da80 00000000`00000000 fffffff6`00000005 : nt!PfQuerySuperfetchInformation+0x2d4
fffff684`73429260 fffff802`9e9654db : 00000000`00000018 000001c5`db9b7800 00000000`00000000 000001c5`db9d2000 : nt!ExpQuerySystemInformation+0x1d8
fffff684`73429ac0 fffff802`9e647343 : 00000000`00020028 000001c4`da928150 000001c4`da9282e0 00000000`00000000 : nt!NtQuerySystemInformation+0x2b
fffff684`73429b00 00007fff`c8dca574 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000075`08a79db8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7fff`c8dca574


STACK_COMMAND:  kb

FOLLOWUP_IP:
nt!MiIdentifyPfn+349
fffff802`9e4da9e9 4c8b38          mov     r15,qword ptr [rax]

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  nt!MiIdentifyPfn+349

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP:  5b63c7b5

IMAGE_NAME:  memory_corruption

FAILURE_BUCKET_ID:  X64_AV_nt!MiIdentifyPfn+349

BUCKET_ID:  X64_AV_nt!MiIdentifyPfn+349

Followup: MachineOwner
as a reply to do i have found an online way to read.dmp so i dont have to install a bsod reader now that thats out of the way i dont know how to solve an issue from a .dmp i dont know anything about code rly so what does any of this mean for my pc a bit confused rn on what the .dmp tells me thanks for showing me how to read dumps :)
 

Malnutrition

Malnurished Mod
Moderator
Security Team
Jul 22, 2016
3,182
540
Please run the program I linked you to, this will give me the information I need to help you.
 

Malnutrition

Malnurished Mod
Moderator
Security Team
Jul 22, 2016
3,182
540
2. Run the app - Double-click on the downloaded EXE file
Output = new folder created in Documents + a zipped version -- SysnativeFileCollectionApp + SysnativeFileCollectionApp.zip
3. Upload the SysnativeFileCollectionApp.zip file for review.
 

BlueTBM

PCHF Member
PCHF Member
Aug 17, 2018
13
0
38
2. Run the app - Double-click on the downloaded EXE file
Output = new folder created in Documents + a zipped version -- SysnativeFileCollectionApp + SysnativeFileCollectionApp.zip
3. Upload the SysnativeFileCollectionApp.zip file for review.
hows it going?
 

Malnutrition

Malnurished Mod
Moderator
Security Team
Jul 22, 2016
3,182
540
Can you please provide the other requested information so I can have a look at your temprature and couple other items the other scan does not cover.

Speccy Scan.



  • Please go here and download Speccy.
  • Install and run the program.
  • Upon Completion:
  • Hit File
  • Publish Snap Shot
  • A link will appear, post that link.
 

BlueTBM

PCHF Member
PCHF Member
Aug 17, 2018
13
0
38

Malnutrition

Malnurished Mod
Moderator
Security Team
Jul 22, 2016
3,182
540
While I am looking over the information I'd advise you tidy up the machine a bit.

MiniToolBox Scan


Please download MINITOOLBOX and run it.

Checkmark following boxes:



Flush DNS
Reset FF proxy Settings
Reset Ie Proxy Settings
Report IE Proxy Settings
Report FF Proxy Settings
List content of Hosts
List IP configuration
List Winsock Entries
List last 10 Event Viewer log
List Installed Programs
List Users, Partitions and Memory size
List Devices (problems only)



Click Go post the result.

Clean up temp files and reduce startup load with CCleaner.


Note: This tool will clean your browsing history as well.




  • Download CCleaner from here.
  • After install Click Options.
  • Go to monitoring.
  • Uncheck All Monitoring items.
  • Go to advanced -- Click close program after cleaning.
  • Go to settings -- click run ccleaner when the computer starts.
  • Now that you have ccleaner installed and set-up:
  • Open the program.
  • Go to Tools
  • Go to Startup
  • Now double click each item. To Disable.
  • Leave only your antivirus enabled.
  • Then disable All items in your scheduled task as well.
  • Unless they are related to windows defender.Or your antivirus.
  • Reboot the machine.

Adware Cleaner Scan.

Please download AdwCleaner by Xplode onto your desktop.

  • Close all open programs and internet browsers.
  • Double click on adwcleaner.exe to run the tool.
  • Click on Scan button.
  • When the scan has finished click on Clean button.
  • Your computer will be rebooted automatically. A text file will open after the restart.
  • Please post the contents of that logfile with your next reply.
  • You can find the logfile at C:\AdwCleaner[S1].txt as well.
 
  • Like
Reactions: BlueTBM

Malnutrition

Malnurished Mod
Moderator
Security Team
Jul 22, 2016
3,182
540
Id like you to complete these steps as it is the first thing that we will try to resolve your issue. If you have a new crash then upload any new dump files for review.
 

BlueTBM

PCHF Member
PCHF Member
Aug 17, 2018
13
0
38
Id like you to complete these steps as it is the first thing that we will try to resolve your issue. If you have a new crash then upload any new dump files for review.
ive finished reinstalling my GPU driver so far there hasnt been any bsod's i will update you on it if there is
 

BlueTBM

PCHF Member
PCHF Member
Aug 17, 2018
13
0
38
Id like you to complete these steps as it is the first thing that we will try to resolve your issue. If you have a new crash then upload any new dump files for review.
so i recently got 2 new bsod's and im trying to reset my pc while keeping files but it says cant find recovery enviroment i have just made a usb drive with windows on so what do i do because im getting multiple different bsod's and its resorted to me needin to reset
 

BlueTBM

PCHF Member
PCHF Member
Aug 17, 2018
13
0
38
earlier i reinstalled my chipset and it presumably fixed the other bsod as it seems not entirely sure.
on the flipside i discovered another problem, so i recently got a crash for Overwatch when running it for a while
called SYSTEM_SERVICE_EXCEPTION
 

Attachments

Malnutrition

Malnurished Mod
Moderator
Security Team
Jul 22, 2016
3,182
540
https://www.ghacks.net/2017/04/06/what-is-runtime-broker-and-why-it-is-causing-high-cpu-load/


Code:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff801f9590cb9, Address of the instruction which caused the bugcheck
Arg3: fffffd8517b6a690, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2

OVERLAPPED_MODULE: Address regions for 'MSKSSRV' and 'USBSTOR.SYS' overlap

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at "0x%08lx" referenced memory at "0x%08lx". The memory could not be "%s".

FAULTING_IP:
nt!ExFreePoolWithTag+59
fffff801`f9590cb9 410fb747f2      movzx   eax,word ptr [r15-0Eh]

CONTEXT:  fffffd8517b6a690 -- (.cxr 0xfffffd8517b6a690)
rax=0000000000000000 rbx=ffff85c300000fb0 rcx=ffef85c30544ea00
rdx=0000000000000000 rsi=ffff85c3052a82a0 rdi=ffef85c30544ea00
rip=fffff801f9590cb9 rsp=fffffd8517b6b080 rbp=fffffd8517b6bb80
r8=fffffd8517b6b190  r9=0000000000000000 r10=7ffffffffffffffc
r11=fffffd8517b6b190 r12=0000000000000001 r13=00000000000003f0
r14=ffff85c3052a82a0 r15=ffef85c30544ea00
iopl=0         nv up ei pl nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010206
nt!ExFreePoolWithTag+0x59:
fffff801`f9590cb9 410fb747f2      movzx   eax,word ptr [r15-0Eh] ds:002b:ffef85c3`0544e9f2=????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  0x3B

PROCESS_NAME:  RuntimeBroker.

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from ffff85a2a2ccbedc to fffff801f9590cb9

STACK_TEXT: 
fffffd85`17b6b080 ffff85a2`a2ccbedc : ffff85c3`00000fb0 ffff85c3`00000fb0 fffffd85`17b6bb80 00000000`00000001 : nt!ExFreePoolWithTag+0x59
fffffd85`17b6b160 ffff85a2`a2feeafc : 00000000`00000000 ffef85c3`0544ea00 ffef85c3`0544ea00 ffff85c3`052a82a0 : win32kfull!Win32FreePoolImpl+0x4c
fffffd85`17b6b190 ffff85a2`a2c63d5a : ffff85c3`052a82a0 ffff85c3`052a82a0 00000000`00000000 00000000`00001cff : win32kbase!Win32FreePool+0x1c
fffffd85`17b6b1c0 fffff801`f945f343 : 00000000`00000001 0000024d`7645cb00 ffffd080`00007530 000000a1`00001cff : win32kfull!NtUserMsgWaitForMultipleObjectsEx+0x45a
fffffd85`17b6ba90 00007ff9`350e96e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
000000a1`3387fb88 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7ff9`350e96e4


FOLLOWUP_IP:
win32kfull!Win32FreePoolImpl+4c
ffff85a2`a2ccbedc 488b5c2440      mov     rbx,qword ptr [rsp+40h]

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  win32kfull!Win32FreePoolImpl+4c

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: win32kfull

IMAGE_NAME:  win32kfull.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  6226b1e0

STACK_COMMAND:  .cxr 0xfffffd8517b6a690 ; kb

FAILURE_BUCKET_ID:  X64_0x3B_win32kfull!Win32FreePoolImpl+4c

BUCKET_ID:  X64_0x3B_win32kfull!Win32FreePoolImpl+4c

Followup: MachineOwner
---------


Runtime Broker is a service called Time Broker, which can be disabled through editing the registry.
Right-click on the Start Menu Icon. Go to RUN and type regedit.exe and select OK.

Find the following entry:

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\TimeBroker] "Start"=dword:00000003

Change the 3 to a 4.

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\TimeBroker] "Start"=dword:00000004

4 is Disabled, 3 is Manual and 2 is Automatic startup.

Before editing, the original value was 3. Set to 4 to disable. Just change the 3 to a 4 through the MODIFY menu selection, exit regedit and reboot your system.
 
Status
Not open for further replies.