F5F Stay Refreshed Software Operating Systems Issue with PC crashing and confusion over dump files.

Issue with PC crashing and confusion over dump files.

Issue with PC crashing and confusion over dump files.

E
entech
Member
210
12-10-2025, 10:55 AM
#1
Hi,
I had many crashes and reinstalled Windows. Still had crashes... So I checked Memtest 86 and had errors on my RAM.
Changed the RAM. Tested it without errors.
But now I still have randoms crashed, mostly playing Alan Wake 2, but not only. Please help me identify what's causing the issue?
I have a fresh install of Windows and installed most important new drivers (chipset, GPU). Others are automatic Win update drivers.
Thank you so much for your help !!!
Spoiler:
MINIDUMP 1
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffffffffffff88, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8034aa6d673, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1765
Key : Analysis.Elapsed.mSec
Value: 2708
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 140
Key : Analysis.Init.Elapsed.mSec
Value: 3223
Key : Analysis.Memory.CommitPeak.Mb
Value: 95
Key : Bugcheck.Code.LegacyAPI
Value: 0xa
Key : Failure.Bucket
Value: AV_nt!KiSwapThread
Key : Failure.Hash
Value: {3a5eca23-a992-0c0e-a0ce-d48add0d8eda}
Key : WER.OS.Branch
Value: ni_release
Key : WER.OS.Version
Value: 10.0.22621.1
BUGCHECK_CODE: a
BUGCHECK_P1: ffffffffffffff88
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff8034aa6d673
FILE_IN_CAB: 120323-14468-01.dmp
WRITE_ADDRESS: fffff8034b51d470: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffffffffffff88
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: AlanWake2.exe
TRAP_FRAME: ffffd98311403310 -- (.trap 0xffffd98311403310)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000001e357e3000 rbx=0000000000000000 rcx=ffffd98311403460
rdx=000000000000001e rsi=0000000000000000 rdi=0000000000000000
rip=fffff8034aa6d673 rsp=ffffd983114034a0 rbp=0000000000000000
r8=0000000000000000 r9=00000000000000e6 r10=00000632002080e6
r11=ffffd983092d1b00 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!KiSwapThread+0xae3:
fffff803`4aa6d673 48895d88 mov qword ptr [rbp-78h],rbx ss:0018:ffffffff`ffffff88=????????????????
Resetting default scope
STACK_TEXT:
ffffd983`114031c8 fffff803`4ac2bfa9 : 00000000`0000000a ffffffff`ffffff88 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffffd983`114031d0 fffff803`4ac27634 : ffff8f80`3dde6180 fffff803`4ac200b7 ffffa38d`e00840c0 ffffa38d`dd0a1900 : nt!KiBugCheckDispatch+0x69
ffffd983`11403310 fffff803`4aa6d673 : ffff8f80`3e14c180 00000000`00000000 ffffa38d`c4fa1040 00000000`00000000 : nt!KiPageFault+0x474
ffffd983`114034a0 fffff803`4aa6f827 : ffff3ee8`3f53a9f5 00000000`00000000 ffffa38d`d9b64480 00000000`00000000 : nt!KiSwapThread+0xae3
ffffd983`114035f0 fffff803`4aa71746 : ffff8f80`00000000 00000000`00000001 00000000`00000000 00000000`00000000 : nt!KiCommitThreadWait+0x137
ffffd983`114036a0 fffff803`4af3f82c : ffffa38d`e00840c0 ffffa38d`dfd97e60 00000000`00000000 00000000`00000001 : nt!KeWaitForSingleObject+0x256
ffffd983`11403a40 fffff803`4af3f71e : ffffa38d`dd0a1080 00000000`00000000 00000000`00000000 ffffa38d`dfd97e60 : nt!ObWaitForSingleObject+0xcc
ffffd983`11403aa0 fffff803`4ac2b6e8 : ffffa38d`dd0a1080 00000000`00000098 00000000`00000000 00000000`00000000 : nt!NtWaitForSingleObject+0x3e
ffffd983`11403ae0 00007ffa`a320f3f4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000001e`366ff608 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`a320f3f4
SYMBOL_NAME: nt!KiSwapThread+ae3
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.22621.2715
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: ae3
FAILURE_BUCKET_ID: AV_nt!KiSwapThread
OS_VERSION: 10.0.22621.1
BUILDLAB_STR: ni_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {3a5eca23-a992-0c0e-a0ce-d48add0d8eda}
Followup: MachineOwner
---------
Spoiler:
MINIDUMP 2
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffffffffffff88, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8011fe6d673, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2765
Key : Analysis.Elapsed.mSec
Value: 3114
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 265
Key : Analysis.Init.Elapsed.mSec
Value: 102869
Key : Analysis.Memory.CommitPeak.Mb
Value: 96
Key : Bugcheck.Code.LegacyAPI
Value: 0xa
Key : Failure.Bucket
Value: AV_nt!KiSwapThread
Key : Failure.Hash
Value: {3a5eca23-a992-0c0e-a0ce-d48add0d8eda}
Key : WER.OS.Branch
Value: ni_release
Key : WER.OS.Version
Value: 10.0.22621.1
BUGCHECK_CODE: a
BUGCHECK_P1: ffffffffffffff88
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff8011fe6d673
FILE_IN_CAB: 120323-14375-01.dmp
WRITE_ADDRESS: fffff8012091d470: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffffffffffff88
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: AlanWake2.exe
TRAP_FRAME: ffffb60502dd2310 -- (.trap 0xffffb60502dd2310)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000f512304000 rbx=0000000000000000 rcx=ffffb60502dd2460
rdx=00000000000000f5 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8011fe6d673 rsp=ffffb60502dd24a0 rbp=0000000000000000
r8=0000000000000000 r9=00000000000000e6 r10=00000632002080e6
r11=ffffb604fa93ab00 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!KiSwapThread+0xae3:
fffff801`1fe6d673 48895d88 mov qword ptr [rbp-78h],rbx ss:0018:ffffffff`ffffff88=????????????????
Resetting default scope
STACK_TEXT:
ffffb605`02dd21c8 fffff801`2002bfa9 : 00000000`0000000a ffffffff`ffffff88 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffffb605`02dd21d0 fffff801`20027634 : ffffdf80`d5468180 fffff801`200200b7 ffffa182`4efe6140 ffffa182`4d851900 : nt!KiBugCheckDispatch+0x69
ffffb605`02dd2310 fffff801`1fe6d673 : ffffdf80`d55db180 00000000`00000000 ffffa182`33b97040 00000000`00000000 : nt!KiPageFault+0x474
ffffb605`02dd24a0 fffff801`1fe6f827 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSwapThread+0xae3
ffffb605`02dd25f0 fffff801`1fe71746 : ffffdf80`00000000 00000000`00000001 00000000`00000000 00000000`00000000 : nt!KiCommitThreadWait+0x137
ffffb605`02dd26a0 fffff801`2033f82c : ffffa182`4efe6140 ffffa182`4fe27260 00000000`00000000 00000000`00000001 : nt!KeWaitForSingleObject+0x256
ffffb605`02dd2a40 fffff801`2033f71e : ffffa182`4d851080 00000000`00000000 00000000`00000000 ffffa182`4fe27260 : nt!ObWaitForSingleObject+0xcc
ffffb605`02dd2aa0 fffff801`2002b6e8 : ffffa182`4d851080 00000000`00000069 00000000`00000000 00000000`00000000 : nt!NtWaitForSingleObject+0x3e
ffffb605`02dd2ae0 00007ff9`8ec6f3f4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000f5`136ff948 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`8ec6f3f4
SYMBOL_NAME: nt!KiSwapThread+ae3
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.22621.2715
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: ae3
FAILURE_BUCKET_ID: AV_nt!KiSwapThread
OS_VERSION: 10.0.22621.1
BUILDLAB_STR: ni_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {3a5eca23-a992-0c0e-a0ce-d48add0d8eda}
Followup: MachineOwner
---------
Spoiler:
MINIDUMP 3
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffe08100007ed0, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff804498e5ed5, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1811
Key : Analysis.Elapsed.mSec
Value: 2037
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 281
Key : Analysis.Init.Elapsed.mSec
Value: 1758
Key : Analysis.Memory.CommitPeak.Mb
Value: 93
Key : Bugcheck.Code.LegacyAPI
Value: 0xa
Key : Failure.Bucket
Value: AV_nt!KiSignalThread
Key : Failure.Hash
Value: {ccc5a220-9cd7-c96e-a6ff-4f1c2d163978}
Key : WER.OS.Branch
Value: ni_release
Key : WER.OS.Version
Value: 10.0.22621.1
BUGCHECK_CODE: a
BUGCHECK_P1: ffffe08100007ed0
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff804498e5ed5
FILE_IN_CAB: 120323-14484-01.dmp
WRITE_ADDRESS: fffff8044a31d470: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffe08100007ed0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: AlanWake2.exe
TRAP_FRAME: ffffdf8b1c221820 -- (.trap 0xffffdf8b1c221820)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000001
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff804498e5ed5 rsp=ffffdf8b1c2219b0 rbp=ffffe081b9681180
r8=0000000000000000 r9=ffffbf03dedae1c0 r10=ffffffffffffffff
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!KiSignalThread+0xf5:
fffff804`498e5ed5 f0480fbaafd07e000000 lock bts qword ptr [rdi+7ED0h],0 ds:00000000`00007ed0=????????????????
Resetting default scope
STACK_TEXT:
ffffdf8b`1c2216d8 fffff804`49a2bfa9 : 00000000`0000000a ffffe081`00007ed0 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffffdf8b`1c2216e0 fffff804`49a27634 : ffffbf03`e35f9080 00001f80`0092007a ffffcf8b`3ea64000 ffffcf8b`2b0e9b40 : nt!KiBugCheckDispatch+0x69
ffffdf8b`1c221820 fffff804`498e5ed5 : ffffe081`b9681180 ffffbf03`e3fc4ee8 00000000`00000000 ffffbf03`e3fc4ee0 : nt!KiPageFault+0x474
ffffdf8b`1c2219b0 fffff804`498e4b54 : ffffbf03`dedae080 00000000`00000000 00000000`00000000 0000007d`d3be4fe0 : nt!KiSignalThread+0xf5
ffffdf8b`1c2219f0 fffff804`49c97f51 : 00000000`00000000 00000000`00000001 00000000`00000000 00000000`00000000 : nt!KeReleaseSemaphoreEx+0x1a4
ffffdf8b`1c221a80 fffff804`49a2b6e8 : ffffbf03`e35f9080 00000000`00000005 00000000`00000000 00000436`4dc54d01 : nt!NtReleaseSemaphore+0xe1
ffffdf8b`1c221ae0 00007fff`628af4b4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000007d`d46ff978 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`628af4b4
SYMBOL_NAME: nt!KiSignalThread+f5
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.22621.2715
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: f5
FAILURE_BUCKET_ID: AV_nt!KiSignalThread
OS_VERSION: 10.0.22621.1
BUILDLAB_STR: ni_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {ccc5a220-9cd7-c96e-a6ff-4f1c2d163978}
Followup: MachineOwner
---------
Spoiler:
MINIDUMP 4
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffd400c0014730, Address of the trap frame for the exception that caused the BugCheck
Arg3: ffffd400c0014688, Address of the exception record for the exception that caused the BugCheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2468
Key : Analysis.Elapsed.mSec
Value: 3124
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 312
Key : Analysis.Init.Elapsed.mSec
Value: 1540
Key : Analysis.Memory.CommitPeak.Mb
Value: 95
Key : Bugcheck.Code.LegacyAPI
Value: 0x139
Key : FailFast.Name
Value: CORRUPT_LIST_ENTRY
Key : FailFast.Type
Value: 3
Key : Failure.Bucket
Value: 0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch
Key : Failure.Hash
Value: {3aede96a-54dd-40d6-d4cb-2a161a843851}
Key : WER.OS.Branch
Value: ni_release
Key : WER.OS.Version
Value: 10.0.22621.1
BUGCHECK_CODE: 139
BUGCHECK_P1: 3
BUGCHECK_P2: ffffd400c0014730
BUGCHECK_P3: ffffd400c0014688
BUGCHECK_P4: 0
FILE_IN_CAB: 120323-14515-01.dmp
TRAP_FRAME: ffffd400c0014730 -- (.trap 0xffffd400c0014730)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffae015abd7180 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffd7040f680080 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8062764a8a1 rsp=ffffd400c00148c0 rbp=ffffae015ad4c180
r8=ffffd70411add158 r9=7ffffffffffffffc r10=0000000000000002
r11=ffffd400c00149a8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac pe cy
nt!KiWakeQueueWaiter+0x164911:
fffff806`2764a8a1 cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: ffffd400c0014688 -- (.exr 0xffffd400c0014688)
ExceptionAddress: fffff8062764a8a1 (nt!KiWakeQueueWaiter+0x0000000000164911)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: steamwebhelper.exe
ERROR_CODE: (NTSTATUS) 0xc0000409 - Le syst me a d tect la saturation de la m moire tampon dans cette application. Cette saturation pourrait permettre un utilisateur mal intentionn de prendre le contr le de cette application.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000003
EXCEPTION_STR: 0xc0000409
STACK_TEXT:
ffffd400`c0014408 fffff806`2762bfa9 : 00000000`00000139 00000000`00000003 ffffd400`c0014730 ffffd400`c0014688 : nt!KeBugCheckEx
ffffd400`c0014410 fffff806`2762c532 : 00000000`00001020 00000000`00000008 00000000`00000000 00000000`000005a0 : nt!KiBugCheckDispatch+0x69
ffffd400`c0014550 fffff806`2762a306 : ffffd400`c0014a10 fffff806`278ed428 ffff8a82`ec5d2c80 ffffd704`10098d80 : nt!KiFastFailDispatch+0xb2
ffffd400`c0014730 fffff806`2764a8a1 : 00000000`00000000 00000001`00f800d0 00000000`00000000 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x346
ffffd400`c00148c0 fffff806`274e465b : ffffd704`1332b080 ffffd704`00000000 ffffd704`0f680080 00000000`00000000 : nt!KiWakeQueueWaiter+0x164911
ffffd400`c0014920 fffff806`278ec56b : 00000000`00000000 00000000`00000000 0000020e`a82720f8 00000000`00000001 : nt!AlpcpSignal+0x2db
ffffd400`c00149b0 fffff806`2762b6e8 : ffffd704`1332b080 ffffd400`c0014b60 00000096`672fe1c8 ffffd400`c0014a88 : nt!NtAlpcSendWaitReceivePort+0x23b
ffffd400`c0014a70 00007fff`d46d04e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000096`672fe1a8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`d46d04e4
SYMBOL_NAME: nt!KiFastFailDispatch+b2
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.22621.2715
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: b2
FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch
OS_VERSION: 10.0.22621.1
BUILDLAB_STR: ni_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {3aede96a-54dd-40d6-d4cb-2a161a843851}
Followup: MachineOwner
---------
E
entech
12-10-2025, 10:55 AM #1

Hi,
I had many crashes and reinstalled Windows. Still had crashes... So I checked Memtest 86 and had errors on my RAM.
Changed the RAM. Tested it without errors.
But now I still have randoms crashed, mostly playing Alan Wake 2, but not only. Please help me identify what's causing the issue?
I have a fresh install of Windows and installed most important new drivers (chipset, GPU). Others are automatic Win update drivers.
Thank you so much for your help !!!
Spoiler:
MINIDUMP 1
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffffffffffff88, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8034aa6d673, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1765
Key : Analysis.Elapsed.mSec
Value: 2708
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 140
Key : Analysis.Init.Elapsed.mSec
Value: 3223
Key : Analysis.Memory.CommitPeak.Mb
Value: 95
Key : Bugcheck.Code.LegacyAPI
Value: 0xa
Key : Failure.Bucket
Value: AV_nt!KiSwapThread
Key : Failure.Hash
Value: {3a5eca23-a992-0c0e-a0ce-d48add0d8eda}
Key : WER.OS.Branch
Value: ni_release
Key : WER.OS.Version
Value: 10.0.22621.1
BUGCHECK_CODE: a
BUGCHECK_P1: ffffffffffffff88
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff8034aa6d673
FILE_IN_CAB: 120323-14468-01.dmp
WRITE_ADDRESS: fffff8034b51d470: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffffffffffff88
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: AlanWake2.exe
TRAP_FRAME: ffffd98311403310 -- (.trap 0xffffd98311403310)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000001e357e3000 rbx=0000000000000000 rcx=ffffd98311403460
rdx=000000000000001e rsi=0000000000000000 rdi=0000000000000000
rip=fffff8034aa6d673 rsp=ffffd983114034a0 rbp=0000000000000000
r8=0000000000000000 r9=00000000000000e6 r10=00000632002080e6
r11=ffffd983092d1b00 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!KiSwapThread+0xae3:
fffff803`4aa6d673 48895d88 mov qword ptr [rbp-78h],rbx ss:0018:ffffffff`ffffff88=????????????????
Resetting default scope
STACK_TEXT:
ffffd983`114031c8 fffff803`4ac2bfa9 : 00000000`0000000a ffffffff`ffffff88 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffffd983`114031d0 fffff803`4ac27634 : ffff8f80`3dde6180 fffff803`4ac200b7 ffffa38d`e00840c0 ffffa38d`dd0a1900 : nt!KiBugCheckDispatch+0x69
ffffd983`11403310 fffff803`4aa6d673 : ffff8f80`3e14c180 00000000`00000000 ffffa38d`c4fa1040 00000000`00000000 : nt!KiPageFault+0x474
ffffd983`114034a0 fffff803`4aa6f827 : ffff3ee8`3f53a9f5 00000000`00000000 ffffa38d`d9b64480 00000000`00000000 : nt!KiSwapThread+0xae3
ffffd983`114035f0 fffff803`4aa71746 : ffff8f80`00000000 00000000`00000001 00000000`00000000 00000000`00000000 : nt!KiCommitThreadWait+0x137
ffffd983`114036a0 fffff803`4af3f82c : ffffa38d`e00840c0 ffffa38d`dfd97e60 00000000`00000000 00000000`00000001 : nt!KeWaitForSingleObject+0x256
ffffd983`11403a40 fffff803`4af3f71e : ffffa38d`dd0a1080 00000000`00000000 00000000`00000000 ffffa38d`dfd97e60 : nt!ObWaitForSingleObject+0xcc
ffffd983`11403aa0 fffff803`4ac2b6e8 : ffffa38d`dd0a1080 00000000`00000098 00000000`00000000 00000000`00000000 : nt!NtWaitForSingleObject+0x3e
ffffd983`11403ae0 00007ffa`a320f3f4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000001e`366ff608 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`a320f3f4
SYMBOL_NAME: nt!KiSwapThread+ae3
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.22621.2715
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: ae3
FAILURE_BUCKET_ID: AV_nt!KiSwapThread
OS_VERSION: 10.0.22621.1
BUILDLAB_STR: ni_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {3a5eca23-a992-0c0e-a0ce-d48add0d8eda}
Followup: MachineOwner
---------
Spoiler:
MINIDUMP 2
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffffffffffff88, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8011fe6d673, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2765
Key : Analysis.Elapsed.mSec
Value: 3114
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 265
Key : Analysis.Init.Elapsed.mSec
Value: 102869
Key : Analysis.Memory.CommitPeak.Mb
Value: 96
Key : Bugcheck.Code.LegacyAPI
Value: 0xa
Key : Failure.Bucket
Value: AV_nt!KiSwapThread
Key : Failure.Hash
Value: {3a5eca23-a992-0c0e-a0ce-d48add0d8eda}
Key : WER.OS.Branch
Value: ni_release
Key : WER.OS.Version
Value: 10.0.22621.1
BUGCHECK_CODE: a
BUGCHECK_P1: ffffffffffffff88
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff8011fe6d673
FILE_IN_CAB: 120323-14375-01.dmp
WRITE_ADDRESS: fffff8012091d470: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffffffffffff88
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: AlanWake2.exe
TRAP_FRAME: ffffb60502dd2310 -- (.trap 0xffffb60502dd2310)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000f512304000 rbx=0000000000000000 rcx=ffffb60502dd2460
rdx=00000000000000f5 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8011fe6d673 rsp=ffffb60502dd24a0 rbp=0000000000000000
r8=0000000000000000 r9=00000000000000e6 r10=00000632002080e6
r11=ffffb604fa93ab00 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!KiSwapThread+0xae3:
fffff801`1fe6d673 48895d88 mov qword ptr [rbp-78h],rbx ss:0018:ffffffff`ffffff88=????????????????
Resetting default scope
STACK_TEXT:
ffffb605`02dd21c8 fffff801`2002bfa9 : 00000000`0000000a ffffffff`ffffff88 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffffb605`02dd21d0 fffff801`20027634 : ffffdf80`d5468180 fffff801`200200b7 ffffa182`4efe6140 ffffa182`4d851900 : nt!KiBugCheckDispatch+0x69
ffffb605`02dd2310 fffff801`1fe6d673 : ffffdf80`d55db180 00000000`00000000 ffffa182`33b97040 00000000`00000000 : nt!KiPageFault+0x474
ffffb605`02dd24a0 fffff801`1fe6f827 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSwapThread+0xae3
ffffb605`02dd25f0 fffff801`1fe71746 : ffffdf80`00000000 00000000`00000001 00000000`00000000 00000000`00000000 : nt!KiCommitThreadWait+0x137
ffffb605`02dd26a0 fffff801`2033f82c : ffffa182`4efe6140 ffffa182`4fe27260 00000000`00000000 00000000`00000001 : nt!KeWaitForSingleObject+0x256
ffffb605`02dd2a40 fffff801`2033f71e : ffffa182`4d851080 00000000`00000000 00000000`00000000 ffffa182`4fe27260 : nt!ObWaitForSingleObject+0xcc
ffffb605`02dd2aa0 fffff801`2002b6e8 : ffffa182`4d851080 00000000`00000069 00000000`00000000 00000000`00000000 : nt!NtWaitForSingleObject+0x3e
ffffb605`02dd2ae0 00007ff9`8ec6f3f4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000f5`136ff948 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`8ec6f3f4
SYMBOL_NAME: nt!KiSwapThread+ae3
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.22621.2715
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: ae3
FAILURE_BUCKET_ID: AV_nt!KiSwapThread
OS_VERSION: 10.0.22621.1
BUILDLAB_STR: ni_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {3a5eca23-a992-0c0e-a0ce-d48add0d8eda}
Followup: MachineOwner
---------
Spoiler:
MINIDUMP 3
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffe08100007ed0, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff804498e5ed5, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1811
Key : Analysis.Elapsed.mSec
Value: 2037
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 281
Key : Analysis.Init.Elapsed.mSec
Value: 1758
Key : Analysis.Memory.CommitPeak.Mb
Value: 93
Key : Bugcheck.Code.LegacyAPI
Value: 0xa
Key : Failure.Bucket
Value: AV_nt!KiSignalThread
Key : Failure.Hash
Value: {ccc5a220-9cd7-c96e-a6ff-4f1c2d163978}
Key : WER.OS.Branch
Value: ni_release
Key : WER.OS.Version
Value: 10.0.22621.1
BUGCHECK_CODE: a
BUGCHECK_P1: ffffe08100007ed0
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff804498e5ed5
FILE_IN_CAB: 120323-14484-01.dmp
WRITE_ADDRESS: fffff8044a31d470: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffe08100007ed0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: AlanWake2.exe
TRAP_FRAME: ffffdf8b1c221820 -- (.trap 0xffffdf8b1c221820)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000001
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff804498e5ed5 rsp=ffffdf8b1c2219b0 rbp=ffffe081b9681180
r8=0000000000000000 r9=ffffbf03dedae1c0 r10=ffffffffffffffff
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!KiSignalThread+0xf5:
fffff804`498e5ed5 f0480fbaafd07e000000 lock bts qword ptr [rdi+7ED0h],0 ds:00000000`00007ed0=????????????????
Resetting default scope
STACK_TEXT:
ffffdf8b`1c2216d8 fffff804`49a2bfa9 : 00000000`0000000a ffffe081`00007ed0 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffffdf8b`1c2216e0 fffff804`49a27634 : ffffbf03`e35f9080 00001f80`0092007a ffffcf8b`3ea64000 ffffcf8b`2b0e9b40 : nt!KiBugCheckDispatch+0x69
ffffdf8b`1c221820 fffff804`498e5ed5 : ffffe081`b9681180 ffffbf03`e3fc4ee8 00000000`00000000 ffffbf03`e3fc4ee0 : nt!KiPageFault+0x474
ffffdf8b`1c2219b0 fffff804`498e4b54 : ffffbf03`dedae080 00000000`00000000 00000000`00000000 0000007d`d3be4fe0 : nt!KiSignalThread+0xf5
ffffdf8b`1c2219f0 fffff804`49c97f51 : 00000000`00000000 00000000`00000001 00000000`00000000 00000000`00000000 : nt!KeReleaseSemaphoreEx+0x1a4
ffffdf8b`1c221a80 fffff804`49a2b6e8 : ffffbf03`e35f9080 00000000`00000005 00000000`00000000 00000436`4dc54d01 : nt!NtReleaseSemaphore+0xe1
ffffdf8b`1c221ae0 00007fff`628af4b4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000007d`d46ff978 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`628af4b4
SYMBOL_NAME: nt!KiSignalThread+f5
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.22621.2715
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: f5
FAILURE_BUCKET_ID: AV_nt!KiSignalThread
OS_VERSION: 10.0.22621.1
BUILDLAB_STR: ni_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {ccc5a220-9cd7-c96e-a6ff-4f1c2d163978}
Followup: MachineOwner
---------
Spoiler:
MINIDUMP 4
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffd400c0014730, Address of the trap frame for the exception that caused the BugCheck
Arg3: ffffd400c0014688, Address of the exception record for the exception that caused the BugCheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2468
Key : Analysis.Elapsed.mSec
Value: 3124
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 312
Key : Analysis.Init.Elapsed.mSec
Value: 1540
Key : Analysis.Memory.CommitPeak.Mb
Value: 95
Key : Bugcheck.Code.LegacyAPI
Value: 0x139
Key : FailFast.Name
Value: CORRUPT_LIST_ENTRY
Key : FailFast.Type
Value: 3
Key : Failure.Bucket
Value: 0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch
Key : Failure.Hash
Value: {3aede96a-54dd-40d6-d4cb-2a161a843851}
Key : WER.OS.Branch
Value: ni_release
Key : WER.OS.Version
Value: 10.0.22621.1
BUGCHECK_CODE: 139
BUGCHECK_P1: 3
BUGCHECK_P2: ffffd400c0014730
BUGCHECK_P3: ffffd400c0014688
BUGCHECK_P4: 0
FILE_IN_CAB: 120323-14515-01.dmp
TRAP_FRAME: ffffd400c0014730 -- (.trap 0xffffd400c0014730)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffae015abd7180 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffd7040f680080 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8062764a8a1 rsp=ffffd400c00148c0 rbp=ffffae015ad4c180
r8=ffffd70411add158 r9=7ffffffffffffffc r10=0000000000000002
r11=ffffd400c00149a8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac pe cy
nt!KiWakeQueueWaiter+0x164911:
fffff806`2764a8a1 cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: ffffd400c0014688 -- (.exr 0xffffd400c0014688)
ExceptionAddress: fffff8062764a8a1 (nt!KiWakeQueueWaiter+0x0000000000164911)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: steamwebhelper.exe
ERROR_CODE: (NTSTATUS) 0xc0000409 - Le syst me a d tect la saturation de la m moire tampon dans cette application. Cette saturation pourrait permettre un utilisateur mal intentionn de prendre le contr le de cette application.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000003
EXCEPTION_STR: 0xc0000409
STACK_TEXT:
ffffd400`c0014408 fffff806`2762bfa9 : 00000000`00000139 00000000`00000003 ffffd400`c0014730 ffffd400`c0014688 : nt!KeBugCheckEx
ffffd400`c0014410 fffff806`2762c532 : 00000000`00001020 00000000`00000008 00000000`00000000 00000000`000005a0 : nt!KiBugCheckDispatch+0x69
ffffd400`c0014550 fffff806`2762a306 : ffffd400`c0014a10 fffff806`278ed428 ffff8a82`ec5d2c80 ffffd704`10098d80 : nt!KiFastFailDispatch+0xb2
ffffd400`c0014730 fffff806`2764a8a1 : 00000000`00000000 00000001`00f800d0 00000000`00000000 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x346
ffffd400`c00148c0 fffff806`274e465b : ffffd704`1332b080 ffffd704`00000000 ffffd704`0f680080 00000000`00000000 : nt!KiWakeQueueWaiter+0x164911
ffffd400`c0014920 fffff806`278ec56b : 00000000`00000000 00000000`00000000 0000020e`a82720f8 00000000`00000001 : nt!AlpcpSignal+0x2db
ffffd400`c00149b0 fffff806`2762b6e8 : ffffd704`1332b080 ffffd400`c0014b60 00000096`672fe1c8 ffffd400`c0014a88 : nt!NtAlpcSendWaitReceivePort+0x23b
ffffd400`c0014a70 00007fff`d46d04e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000096`672fe1a8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`d46d04e4
SYMBOL_NAME: nt!KiFastFailDispatch+b2
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.22621.2715
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: b2
FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch
OS_VERSION: 10.0.22621.1
BUILDLAB_STR: ni_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {3aede96a-54dd-40d6-d4cb-2a161a843851}
Followup: MachineOwner
---------

T
Tobuscus553
Junior Member
28
12-10-2025, 10:55 AM
#2
The dumps have been uploaded to a cloud service. You can access them via the provided link. Dump analysis extends far beyond a simple analyze -v...
T
Tobuscus553
12-10-2025, 10:55 AM #2

The dumps have been uploaded to a cloud service. You can access them via the provided link. Dump analysis extends far beyond a simple analyze -v...