P
PikachuGameREAL
Sometimes my pc blue screens after opening a game or my headphones make a crackling noise and cut out. This has been happening ever since I built my pc in December. I also have issues with my headphones as they keep cutting out randomly (Hyperx Cloudx Flight Wireless).
Dump: Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (24 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff800`76400000 PsLoadedModuleList = 0xfffff800`7702a2f0
Debug session time: Sat Jan 16 22:35:17.619 2021 (UTC - 5:00)
System Uptime: 0 days 0:02:45.222
Loading Kernel Symbols
...............................................................
................................................................
................................................................
...........
Loading User Symbols
Loading unloaded module list
.............
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff800`767f5780 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffd486`44244f80=000000000000000a
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000040, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8007fa3ec43, address which referenced memory
Debugging Details:
------------------
Page 4258c1 not present in the dump file. Type ".hh dbgerr004" for details
Page 4258c1 not present in the dump file. Type ".hh dbgerr004" for details
Page 4258c1 not present in the dump file. Type ".hh dbgerr004" for details
Page 4258c1 not present in the dump file. Type ".hh dbgerr004" for details
Page 4258c1 not present in the dump file. Type ".hh dbgerr004" for details
Page 4258c1 not present in the dump file. Type ".hh dbgerr004" for details
Page 4258c1 not present in the dump file. Type ".hh dbgerr004" for details
Page 4258c1 not present in the dump file. Type ".hh dbgerr004" for details
Page 4258c1 not present in the dump file. Type ".hh dbgerr004" for details
Page 4258c1 not present in the dump file. Type ".hh dbgerr004" for details
Page 4258c1 not present in the dump file. Type ".hh dbgerr004" for details
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3702
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on JJSPC
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 4886
Key : Analysis.Memory.CommitPeak.Mb
Value: 94
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: d1
BUGCHECK_P1: 40
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8007fa3ec43
READ_ADDRESS: 0000000000000040
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
PROCESS_NAME: System
TRAP_FRAME: ffffd486442450c0 -- (.trap 0xffffd486442450c0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffff8f006dbce180
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8007fa3ec43 rsp=ffffd48644245250 rbp=0000000000000000
r8=ffffb207b08df5b0 r9=0000000000000004 r10=fffff800766e7ee0
r11=ffff7efe27800000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
xboxgip!gipHandleHello+0x283:
fffff800`7fa3ec43 488b4d40 mov rcx,qword ptr [rbp+40h] ss:0018:00000000`00000040=????????????????
Resetting default scope
STACK_TEXT:
ffffd486`44244f78 fffff800`76807769 : 00000000`0000000a 00000000`00000040 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffd486`44244f80 fffff800`76803a69 : 00000000`00000000 fffff800`7b7b20ea 00000000`00000000 00000000`00000005 : nt!KiBugCheckDispatch+0x69
ffffd486`442450c0 fffff800`7fa3ec43 : 00000000`00000000 fffff800`7fa67b68 ffffb207`00000008 01900030`a183a59e : nt!KiPageFault+0x469
ffffd486`44245250 fffff800`7fa42dff : 00000000`00000004 ffffd486`44245360 fffff800`7fa67b68 ffffb207`b08df5ac : xboxgip!gipHandleHello+0x283
ffffd486`442452e0 fffff800`7fa284bc : ffffb207`9b742ab0 ffffb207`9b742ab0 ffffb207`00000021 00000000`00000005 : xboxgip!gipProcessPacket+0x823
ffffd486`442453a0 fffff800`7664885e : ffffb207`b08df050 ffffd486`00000021 ffffb207`b08df5d1 ffffb207`b08df4cb : xboxgip!gipUsbReadComplete+0x19c
ffffd486`44245410 fffff800`76648727 : 00000000`00000001 00000000`00000000 ffffb207`9b7bd8c0 00000000`00000002 : nt!IopfCompleteRequest+0x11e
ffffd486`44245500 fffff800`7b7b811a : 00000000`00000000 ffffb207`9b73dd70 ffffb207`b08df050 fffff800`7b7bbf0a : nt!IofCompleteRequest+0x17
ffffd486`44245530 fffff800`7b7b7eb1 : ffffb207`9bb9a102 ffffb207`9bb9a1c8 ffffb207`b08df050 00000000`00000000 : Wdf01000!FxRequest::CompleteInternal+0x23a [minkernel\wdf\framework\shared\core\fxrequest.cpp @ 869]
ffffd486`442455c0 fffff800`7fa04e3e : 00000000`00000051 ffffb207`a9023570 ffffb207`9bb9a1c8 00000000`00000043 : Wdf01000!imp_WdfRequestCompleteWithInformation+0xa1 [minkernel\wdf\framework\shared\core\fxrequestapi.cpp @ 571]
ffffd486`44245620 fffff800`7fa04eeb : 00000000`00000000 ffffd486`44245740 00000000`0000000e ffffb207`9bb9a1c8 : dc1_controller!DccCompleteReceiveAgainstRequest+0xfe
ffffd486`44245680 fffff800`7fa0521b : ffffb207`9bb9a1c8 ffffd486`44245751 0000546b`cb747917 ffffb207`a183abce : dc1_controller!DccCompleteReceiveRequest+0x83
ffffd486`442456d0 fffff800`7fa0392e : ffffb207`9b7b8310 00000000`00000000 00000000`00000000 00000000`00000000 : dc1_controller!DccControlMessageResponse+0x30f
ffffd486`442457b0 fffff800`7fa0442f : ffffb207`9b7bbde0 00000000`000001c0 ffffb207`9b7b8310 fffff800`76644c4d : dc1_controller!DccIsoProcessReadRequests+0x21e
ffffd486`44245840 fffff800`7b7b471b : 00000000`00000000 ffff85cd`00000002 ffffd486`45195bd0 fffff800`7664447b : dc1_controller!DccIsoTimerFunc+0x4f
ffffd486`44245870 fffff800`7b7d014b : ffffd486`45195bd0 00000000`00000000 00000000`00000000 ffffb207`9b7b4218 : Wdf01000!FxTimer::TimerHandler+0x53 [minkernel\wdf\framework\shared\core\fxtimer.cpp @ 343]
ffffd486`442458a0 fffff800`76644f12 : ffffb207`9b7b41d8 ffff8f00`6dbce180 ffff8f00`6dbce180 ffffd486`00000002 : Wdf01000!FxTimer::_FxTimerDpcThunk+0x1b3bb [minkernel\wdf\framework\shared\core\fxtimer.cpp @ 392]
ffffd486`442458e0 fffff800`76606eed : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`000018b6 : nt!KiProcessExpiredTimerList+0x172
ffffd486`442459d0 fffff800`767f92ee : ffffffff`00000000 ffff8f00`6dbce180 ffff8f00`6dbd9640 ffffb207`9b553540 : nt!KiRetireDpcList+0x5dd
ffffd486`44245c60 00000000`00000000 : ffffd486`44246000 ffffd486`44240000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
SYMBOL_NAME: xboxgip!gipHandleHello+283
MODULE_NAME: xboxgip
IMAGE_NAME: xboxgip.sys
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 283
FAILURE_BUCKET_ID: AV_xboxgip!gipHandleHello
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {fbc68c8a-2faa-3f49-0535-8850d7f70ce4}
Followup: MachineOwner
---------
Continue reading...
Dump: Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (24 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff800`76400000 PsLoadedModuleList = 0xfffff800`7702a2f0
Debug session time: Sat Jan 16 22:35:17.619 2021 (UTC - 5:00)
System Uptime: 0 days 0:02:45.222
Loading Kernel Symbols
...............................................................
................................................................
................................................................
...........
Loading User Symbols
Loading unloaded module list
.............
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff800`767f5780 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffd486`44244f80=000000000000000a
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000040, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8007fa3ec43, address which referenced memory
Debugging Details:
------------------
Page 4258c1 not present in the dump file. Type ".hh dbgerr004" for details
Page 4258c1 not present in the dump file. Type ".hh dbgerr004" for details
Page 4258c1 not present in the dump file. Type ".hh dbgerr004" for details
Page 4258c1 not present in the dump file. Type ".hh dbgerr004" for details
Page 4258c1 not present in the dump file. Type ".hh dbgerr004" for details
Page 4258c1 not present in the dump file. Type ".hh dbgerr004" for details
Page 4258c1 not present in the dump file. Type ".hh dbgerr004" for details
Page 4258c1 not present in the dump file. Type ".hh dbgerr004" for details
Page 4258c1 not present in the dump file. Type ".hh dbgerr004" for details
Page 4258c1 not present in the dump file. Type ".hh dbgerr004" for details
Page 4258c1 not present in the dump file. Type ".hh dbgerr004" for details
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3702
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on JJSPC
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 4886
Key : Analysis.Memory.CommitPeak.Mb
Value: 94
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: d1
BUGCHECK_P1: 40
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8007fa3ec43
READ_ADDRESS: 0000000000000040
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
PROCESS_NAME: System
TRAP_FRAME: ffffd486442450c0 -- (.trap 0xffffd486442450c0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffff8f006dbce180
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8007fa3ec43 rsp=ffffd48644245250 rbp=0000000000000000
r8=ffffb207b08df5b0 r9=0000000000000004 r10=fffff800766e7ee0
r11=ffff7efe27800000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
xboxgip!gipHandleHello+0x283:
fffff800`7fa3ec43 488b4d40 mov rcx,qword ptr [rbp+40h] ss:0018:00000000`00000040=????????????????
Resetting default scope
STACK_TEXT:
ffffd486`44244f78 fffff800`76807769 : 00000000`0000000a 00000000`00000040 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffd486`44244f80 fffff800`76803a69 : 00000000`00000000 fffff800`7b7b20ea 00000000`00000000 00000000`00000005 : nt!KiBugCheckDispatch+0x69
ffffd486`442450c0 fffff800`7fa3ec43 : 00000000`00000000 fffff800`7fa67b68 ffffb207`00000008 01900030`a183a59e : nt!KiPageFault+0x469
ffffd486`44245250 fffff800`7fa42dff : 00000000`00000004 ffffd486`44245360 fffff800`7fa67b68 ffffb207`b08df5ac : xboxgip!gipHandleHello+0x283
ffffd486`442452e0 fffff800`7fa284bc : ffffb207`9b742ab0 ffffb207`9b742ab0 ffffb207`00000021 00000000`00000005 : xboxgip!gipProcessPacket+0x823
ffffd486`442453a0 fffff800`7664885e : ffffb207`b08df050 ffffd486`00000021 ffffb207`b08df5d1 ffffb207`b08df4cb : xboxgip!gipUsbReadComplete+0x19c
ffffd486`44245410 fffff800`76648727 : 00000000`00000001 00000000`00000000 ffffb207`9b7bd8c0 00000000`00000002 : nt!IopfCompleteRequest+0x11e
ffffd486`44245500 fffff800`7b7b811a : 00000000`00000000 ffffb207`9b73dd70 ffffb207`b08df050 fffff800`7b7bbf0a : nt!IofCompleteRequest+0x17
ffffd486`44245530 fffff800`7b7b7eb1 : ffffb207`9bb9a102 ffffb207`9bb9a1c8 ffffb207`b08df050 00000000`00000000 : Wdf01000!FxRequest::CompleteInternal+0x23a [minkernel\wdf\framework\shared\core\fxrequest.cpp @ 869]
ffffd486`442455c0 fffff800`7fa04e3e : 00000000`00000051 ffffb207`a9023570 ffffb207`9bb9a1c8 00000000`00000043 : Wdf01000!imp_WdfRequestCompleteWithInformation+0xa1 [minkernel\wdf\framework\shared\core\fxrequestapi.cpp @ 571]
ffffd486`44245620 fffff800`7fa04eeb : 00000000`00000000 ffffd486`44245740 00000000`0000000e ffffb207`9bb9a1c8 : dc1_controller!DccCompleteReceiveAgainstRequest+0xfe
ffffd486`44245680 fffff800`7fa0521b : ffffb207`9bb9a1c8 ffffd486`44245751 0000546b`cb747917 ffffb207`a183abce : dc1_controller!DccCompleteReceiveRequest+0x83
ffffd486`442456d0 fffff800`7fa0392e : ffffb207`9b7b8310 00000000`00000000 00000000`00000000 00000000`00000000 : dc1_controller!DccControlMessageResponse+0x30f
ffffd486`442457b0 fffff800`7fa0442f : ffffb207`9b7bbde0 00000000`000001c0 ffffb207`9b7b8310 fffff800`76644c4d : dc1_controller!DccIsoProcessReadRequests+0x21e
ffffd486`44245840 fffff800`7b7b471b : 00000000`00000000 ffff85cd`00000002 ffffd486`45195bd0 fffff800`7664447b : dc1_controller!DccIsoTimerFunc+0x4f
ffffd486`44245870 fffff800`7b7d014b : ffffd486`45195bd0 00000000`00000000 00000000`00000000 ffffb207`9b7b4218 : Wdf01000!FxTimer::TimerHandler+0x53 [minkernel\wdf\framework\shared\core\fxtimer.cpp @ 343]
ffffd486`442458a0 fffff800`76644f12 : ffffb207`9b7b41d8 ffff8f00`6dbce180 ffff8f00`6dbce180 ffffd486`00000002 : Wdf01000!FxTimer::_FxTimerDpcThunk+0x1b3bb [minkernel\wdf\framework\shared\core\fxtimer.cpp @ 392]
ffffd486`442458e0 fffff800`76606eed : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`000018b6 : nt!KiProcessExpiredTimerList+0x172
ffffd486`442459d0 fffff800`767f92ee : ffffffff`00000000 ffff8f00`6dbce180 ffff8f00`6dbd9640 ffffb207`9b553540 : nt!KiRetireDpcList+0x5dd
ffffd486`44245c60 00000000`00000000 : ffffd486`44246000 ffffd486`44240000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
SYMBOL_NAME: xboxgip!gipHandleHello+283
MODULE_NAME: xboxgip
IMAGE_NAME: xboxgip.sys
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 283
FAILURE_BUCKET_ID: AV_xboxgip!gipHandleHello
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {fbc68c8a-2faa-3f49-0535-8850d7f70ce4}
Followup: MachineOwner
---------
Continue reading...