BSODs after a Fresh Windows Install


  1. Posts : 33
    Windows 10
       #1

    BSODs after a Fresh Windows Install


    After doing a fresh install of Windows, I've had 2 BSODs. The BSODs that I'm experiencing are far inbetween, one in Dec 2nd and one today in the morning. I've attached the dump files along with the v2 files. Windows ver is 20H2 19042.685

    PC-(2020-12-26_12-52-01).zip - Google Drive

    120220-17328-01 (1).dmp - Google Drive
    Google Drive: Sign-in
      My Computers


  2. Posts : 5,330
    Windows 11 Pro 64-bit
       #2

    Running the Windows Memory Diagnostic tool could be useful as well to exclude any kind of problem affecting the physical memory modules.
      My Computer


  3. Posts : 33
    Windows 10
    Thread Starter
       #3

    FreeBooter said:
    Running the Windows Memory Diagnostic tool could be useful as well to exclude any kind of problem affecting the physical memory modules.
    Ran the test and didn't detect any errors
      My Computers


  4. Posts : 5,330
    Windows 11 Pro 64-bit
       #4

    Install latest version of device drivers.
      My Computer


  5. Posts : 33
    Windows 10
    Thread Starter
       #5

    FreeBooter said:
    Install latest version of device drivers.
    Windows are up to date, but there are optional drivers updates available.

    Is there any drivers that seem to be the suspect of the BSOD crashes?
      My Computers


  6. Posts : 5,330
    Windows 11 Pro 64-bit
       #6

    ConwayNews said:
    Windows are up to date, but there are optional drivers updates available.

    Is there any drivers that seem to be the suspect of the BSOD crashes?

    The tcpip.sys blue screen of death has something to do with the TCP/IP driver. You should visit network manufacturer website to install latest version of the driver.
      My Computer


  7. Posts : 33
    Windows 10
    Thread Starter
       #7

    FreeBooter said:
    The tcpip.sys blue screen of death has something to do with the TCP/IP driver. You should visit network manufacturer website to install latest version of the driver.
    The BSOD were related to KERNEL_SECURITY_CHECK_FAILURE (ntkrnlmp.exe) and MEMORY_MANAGEMENT (ntoskrnl.exe) from the program whocrashed. I'm pretty sure my network drivers are up to date. I installed them from the manufacturer's website when I did my fresh install of Windows.
      My Computers


  8. Posts : 5,330
    Windows 11 Pro 64-bit
       #8

    Why ask for help when you think you can debug BSOD error.

    Code:
    Microsoft (R) Windows Debugger Version 10.0.18362.1 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [D:\Downloads\120220-17328-01 (1).dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    
    ************* Path validation summary **************
    Response                         Time (ms)     Location
    Deferred                                       symsrv*symsrv.dll*D:\Symbols*http://msdl.microsoft.com/download/symbols
    Symbol search path is: symsrv*symsrv.dll*D:\Symbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 10 Kernel Version 19041 MP (12 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 19041.1.amd64fre.vb_release.191206-1406
    Machine Name:
    Kernel base = 0xfffff800`10400000 PsLoadedModuleList = 0xfffff800`1102a3b0
    Debug session time: Tue Dec  1 20:29:13.963 2020 (UTC + 3:00)
    System Uptime: 2 days 14:09:38.928
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ................................................................
    ..............
    Loading User Symbols
    Loading unloaded module list
    ..................................................
    For analysis of this file, run !analyze -v
    Processing initial command '!analyze -v;r;kv;lmtn;lmtsmn;.bugcheck'
    8: kd> !analyze -v;r;kv;lmtn;lmtsmn;.bugcheck
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    MEMORY_MANAGEMENT (1a)
        # Any other values for parameter 1 must be individually examined.
    Arguments:
    Arg1: 0000000000061941, The subtype of the bugcheck.
    Arg2: ffff8200c145e050
    Arg3: 000000000000000b
    Arg4: ffffd80c68696750
    
    Debugging Details:
    ------------------
    
    
    KEY_VALUES_STRING: 1
    
    
    PROCESSES_ANALYSIS: 1
    
    SERVICE_ANALYSIS: 1
    
    STACKHASH_ANALYSIS: 1
    
    TIMELINE_ANALYSIS: 1
    
    
    DUMP_CLASS: 1
    
    DUMP_QUALIFIER: 400
    
    BUILD_VERSION_STRING:  19041.1.amd64fre.vb_release.191206-1406
    
    SYSTEM_MANUFACTURER:  Micro-Star International Co., Ltd.
    
    SYSTEM_PRODUCT_NAME:  GP73 Leopard 8RE
    
    SYSTEM_SKU:  17C5.1
    
    SYSTEM_VERSION:  REV:1.0
    
    BIOS_VENDOR:  American Megatrends Inc.
    
    BIOS_VERSION:  E17C5IMS.10F
    
    BIOS_DATE:  05/20/2019
    
    BASEBOARD_MANUFACTURER:  Micro-Star International Co., Ltd.
    
    BASEBOARD_PRODUCT:  MS-17C5
    
    BASEBOARD_VERSION:  REV:1.0
    
    DUMP_TYPE:  2
    
    BUGCHECK_P1: 61941
    
    BUGCHECK_P2: ffff8200c145e050
    
    BUGCHECK_P3: b
    
    BUGCHECK_P4: ffffd80c68696750
    
    BUGCHECK_STR:  0x1a_61941
    
    CPU_COUNT: c
    
    CPU_MHZ: 8a0
    
    CPU_VENDOR:  GenuineIntel
    
    CPU_FAMILY: 6
    
    CPU_MODEL: 9e
    
    CPU_STEPPING: a
    
    CPU_MICROCODE: 6,9e,a,0 (F,M,S,R)  SIG: B4'00000000 (cache) B4'00000000 (init)
    
    BLACKBOXBSD: 1 (!blackboxbsd)
    
    
    BLACKBOXNTFS: 1 (!blackboxntfs)
    
    
    BLACKBOXPNP: 1 (!blackboxpnp)
    
    
    BLACKBOXWINLOGON: 1
    
    DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT
    
    PROCESS_NAME:  svchost.exe
    
    CURRENT_IRQL:  2
    
    ANALYSIS_SESSION_HOST:  EMRE
    
    ANALYSIS_SESSION_TIME:  12-26-2020 23:01:30.0047
    
    ANALYSIS_VERSION: 10.0.18362.1 amd64fre
    
    TRAP_FRAME:  ffffd80c68696750 -- (.trap 0xffffd80c68696750)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=ffff8200c145e000 rbx=0000000000000000 rcx=0000000000000801
    rdx=fffff6fb7dbed000 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff80016cf170d rsp=ffffd80c686968e0 rbp=ffffd80c686969e0
     r8=0000007ffffffff8  r9=fffff6fb60803050 r10=0000000000000001
    r11=fffff6fb7dbed000 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei ng nz na pe nc
    tcpip!UdpSendMessagesOnPath+0x1bd:
    fffff800`16cf170d c6405000        mov     byte ptr [rax+50h],0 ds:ffff8200`c145e050=??
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff8001087452e to fffff800107f5210
    
    STACK_TEXT:  
    ffffd80c`686965a8 fffff800`1087452e : 00000000`0000001a 00000000`00061941 ffff8200`c145e050 00000000`0000000b : nt!KeBugCheckEx
    ffffd80c`686965b0 fffff800`1080335e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x18a48e
    ffffd80c`68696750 fffff800`16cf170d : 00000000`00003500 ffffc10c`00000001 ffffd80c`686969e0 ffffc10c`88e921f0 : nt!KiPageFault+0x35e
    ffffd80c`686968e0 fffff800`16cf0ecc : 00000000`00000000 fffff800`107f0b9f 0008e513`0000ffff 00000000`000003ff : tcpip!UdpSendMessagesOnPath+0x1bd
    ffffd80c`68696d80 fffff800`16cf0c15 : ffffc10c`97fe0c01 fffff800`16cf0c00 ffffd80c`68697200 ffffd80c`68697200 : tcpip!UdpSendMessages+0x29c
    ffffd80c`686970f0 fffff800`1060d468 : ffffd80c`68697350 ffffc10c`99f8e930 00000000`00000000 00000000`00000008 : tcpip!UdpTlProviderSendMessagesCalloutRoutine+0x15
    ffffd80c`68697120 fffff800`1060d3dd : fffff800`16cf0c00 ffffd80c`68697200 00000000`00000000 ffff9400`00b1bc24 : nt!KeExpandKernelStackAndCalloutInternal+0x78
    ffffd80c`68697190 fffff800`16d4233b : 00000000`00000103 00000000`00000000 00000000`00000000 fffff800`2a3720c0 : nt!KeExpandKernelStackAndCalloutEx+0x1d
    ffffd80c`686971d0 fffff800`2a38d899 : ffffd80c`68697540 ffffd80c`68697a80 ffffc10c`97fe0c70 ffffd80c`68697a80 : tcpip!UdpTlProviderSendMessages+0x7b
    ffffd80c`68697250 fffff800`2a371fb5 : ffff8200`ba19e180 ffff940f`00000000 00000000`00000000 ffff940f`00000000 : afd!AfdFastDatagramSend+0x659
    ffffd80c`68697440 fffff800`10ac1b92 : 00000000`00000000 00000000`000120d3 ffffd80c`68697a80 ffffc10c`a3f47ce0 : afd!AfdFastIoDeviceControl+0x1825
    ffffd80c`686977e0 fffff800`10ac17f6 : 00000000`00000001 00000000`0000064c 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0x382
    ffffd80c`68697920 fffff800`10806bb5 : ffffc10c`00000000 000000db`00000001 00000228`239f4cc0 ffffd80c`68697a80 : nt!NtDeviceIoControlFile+0x56
    ffffd80c`68697990 00007ffc`7e44be84 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
    000000db`d65ff118 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`7e44be84
    
    
    THREAD_SHA1_HASH_MOD_FUNC:  d6d55036eacf7ccaa0bdd1fc824cd7c265faf4d4
    
    THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  447b798cbbd89f35a7628295510be01920669e56
    
    THREAD_SHA1_HASH_MOD:  8dcaadc195f697726bbf60d61fec682ba4d04c2b
    
    FOLLOWUP_IP: 
    tcpip!UdpSendMessagesOnPath+1bd
    fffff800`16cf170d c6405000        mov     byte ptr [rax+50h],0
    
    FAULT_INSTR_CODE:  5040c6
    
    SYMBOL_STACK_INDEX:  3
    
    SYMBOL_NAME:  tcpip!UdpSendMessagesOnPath+1bd
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: tcpip
    
    IMAGE_NAME:  tcpip.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  0
    
    IMAGE_VERSION:  10.0.19041.631
    
    STACK_COMMAND:  .thread ; .cxr ; kb
    
    BUCKET_ID_FUNC_OFFSET:  1bd
    
    FAILURE_BUCKET_ID:  0x1a_61941_tcpip!UdpSendMessagesOnPath
    
    BUCKET_ID:  0x1a_61941_tcpip!UdpSendMessagesOnPath
    
    PRIMARY_PROBLEM_CLASS:  0x1a_61941_tcpip!UdpSendMessagesOnPath
    
    TARGET_TIME:  2020-12-01T17:29:13.000Z
    
    OSBUILD:  19041
    
    OSSERVICEPACK:  630
    
    SERVICEPACK_NUMBER: 0
    
    OS_REVISION: 0
    
    SUITE_MASK:  784
    
    PRODUCT_TYPE:  1
    
    OSPLATFORM_TYPE:  x64
    
    OSNAME:  Windows 10
    
    OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS Personal
    
    OS_LOCALE:  
    
    USER_LCID:  0
    
    OSBUILD_TIMESTAMP:  2023-08-28 01:21:11
    
    BUILDDATESTAMP_STR:  191206-1406
    
    BUILDLAB_STR:  vb_release
    
    BUILDOSVER_STR:  10.0.19041.1.amd64fre.vb_release.191206-1406
    
    ANALYSIS_SESSION_ELAPSED_TIME:  3491
    
    ANALYSIS_SOURCE:  KM
    
    FAILURE_ID_HASH_STRING:  km:0x1a_61941_tcpip!udpsendmessagesonpath
    
    FAILURE_ID_HASH:  {ad6e6b39-48a8-de63-3860-76df6de9979b}
    
    Followup:     MachineOwner
    ---------
    
    rax=0000000000000009 rbx=000000000000000b rcx=000000000000001a
    rdx=0000000000061941 rsi=0000000000000000 rdi=ffff8200c145e050
    rip=fffff800107f5210 rsp=ffffd80c686965a8 rbp=ffffd80c686967d0
     r8=ffff8200c145e050  r9=000000000000000b r10=0000000000000001
    r11=ffffd80c68696748 r12=0000000000000000 r13=ffffc10c952ef5f0
    r14=ffffd80c68696750 r15=ffffc10ca3f47310
    iopl=0         nv up ei pl zr na po nc
    cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00040246
    nt!KeBugCheckEx:
    fffff800`107f5210 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:ffffd80c`686965b0=000000000000001a
     # Child-SP          RetAddr           : Args to Child                                                           : Call Site
    00 ffffd80c`686965a8 fffff800`1087452e : 00000000`0000001a 00000000`00061941 ffff8200`c145e050 00000000`0000000b : nt!KeBugCheckEx
    01 ffffd80c`686965b0 fffff800`1080335e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x18a48e
    02 ffffd80c`68696750 fffff800`16cf170d : 00000000`00003500 ffffc10c`00000001 ffffd80c`686969e0 ffffc10c`88e921f0 : nt!KiPageFault+0x35e (TrapFrame @ ffffd80c`68696750)
    03 ffffd80c`686968e0 fffff800`16cf0ecc : 00000000`00000000 fffff800`107f0b9f 0008e513`0000ffff 00000000`000003ff : tcpip!UdpSendMessagesOnPath+0x1bd
    04 ffffd80c`68696d80 fffff800`16cf0c15 : ffffc10c`97fe0c01 fffff800`16cf0c00 ffffd80c`68697200 ffffd80c`68697200 : tcpip!UdpSendMessages+0x29c
    05 ffffd80c`686970f0 fffff800`1060d468 : ffffd80c`68697350 ffffc10c`99f8e930 00000000`00000000 00000000`00000008 : tcpip!UdpTlProviderSendMessagesCalloutRoutine+0x15
    06 ffffd80c`68697120 fffff800`1060d3dd : fffff800`16cf0c00 ffffd80c`68697200 00000000`00000000 ffff9400`00b1bc24 : nt!KeExpandKernelStackAndCalloutInternal+0x78
    07 ffffd80c`68697190 fffff800`16d4233b : 00000000`00000103 00000000`00000000 00000000`00000000 fffff800`2a3720c0 : nt!KeExpandKernelStackAndCalloutEx+0x1d
    08 ffffd80c`686971d0 fffff800`2a38d899 : ffffd80c`68697540 ffffd80c`68697a80 ffffc10c`97fe0c70 ffffd80c`68697a80 : tcpip!UdpTlProviderSendMessages+0x7b
    09 ffffd80c`68697250 fffff800`2a371fb5 : ffff8200`ba19e180 ffff940f`00000000 00000000`00000000 ffff940f`00000000 : afd!AfdFastDatagramSend+0x659
    0a ffffd80c`68697440 fffff800`10ac1b92 : 00000000`00000000 00000000`000120d3 ffffd80c`68697a80 ffffc10c`a3f47ce0 : afd!AfdFastIoDeviceControl+0x1825
    0b ffffd80c`686977e0 fffff800`10ac17f6 : 00000000`00000001 00000000`0000064c 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0x382
    0c ffffd80c`68697920 fffff800`10806bb5 : ffffc10c`00000000 000000db`00000001 00000228`239f4cc0 ffffd80c`68697a80 : nt!NtDeviceIoControlFile+0x56
    0d ffffd80c`68697990 00007ffc`7e44be84 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25 (TrapFrame @ ffffd80c`68697a00)
    0e 000000db`d65ff118 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`7e44be84
      My Computer


  9. Posts : 33
    Windows 10
    Thread Starter
       #9

    FreeBooter said:
    Why ask for help when you think you can debug BSOD error.

    Code:
    Microsoft (R) Windows Debugger Version 10.0.18362.1 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [D:\Downloads\120220-17328-01 (1).dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    
    ************* Path validation summary **************
    Response                         Time (ms)     Location
    Deferred                                       symsrv*symsrv.dll*D:\Symbols*http://msdl.microsoft.com/download/symbols
    Symbol search path is: symsrv*symsrv.dll*D:\Symbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 10 Kernel Version 19041 MP (12 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 19041.1.amd64fre.vb_release.191206-1406
    Machine Name:
    Kernel base = 0xfffff800`10400000 PsLoadedModuleList = 0xfffff800`1102a3b0
    Debug session time: Tue Dec  1 20:29:13.963 2020 (UTC + 3:00)
    System Uptime: 2 days 14:09:38.928
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ................................................................
    ..............
    Loading User Symbols
    Loading unloaded module list
    ..................................................
    For analysis of this file, run !analyze -v
    Processing initial command '!analyze -v;r;kv;lmtn;lmtsmn;.bugcheck'
    8: kd> !analyze -v;r;kv;lmtn;lmtsmn;.bugcheck
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    MEMORY_MANAGEMENT (1a)
        # Any other values for parameter 1 must be individually examined.
    Arguments:
    Arg1: 0000000000061941, The subtype of the bugcheck.
    Arg2: ffff8200c145e050
    Arg3: 000000000000000b
    Arg4: ffffd80c68696750
    
    Debugging Details:
    ------------------
    
    
    KEY_VALUES_STRING: 1
    
    
    PROCESSES_ANALYSIS: 1
    
    SERVICE_ANALYSIS: 1
    
    STACKHASH_ANALYSIS: 1
    
    TIMELINE_ANALYSIS: 1
    
    
    DUMP_CLASS: 1
    
    DUMP_QUALIFIER: 400
    
    BUILD_VERSION_STRING:  19041.1.amd64fre.vb_release.191206-1406
    
    SYSTEM_MANUFACTURER:  Micro-Star International Co., Ltd.
    
    SYSTEM_PRODUCT_NAME:  GP73 Leopard 8RE
    
    SYSTEM_SKU:  17C5.1
    
    SYSTEM_VERSION:  REV:1.0
    
    BIOS_VENDOR:  American Megatrends Inc.
    
    BIOS_VERSION:  E17C5IMS.10F
    
    BIOS_DATE:  05/20/2019
    
    BASEBOARD_MANUFACTURER:  Micro-Star International Co., Ltd.
    
    BASEBOARD_PRODUCT:  MS-17C5
    
    BASEBOARD_VERSION:  REV:1.0
    
    DUMP_TYPE:  2
    
    BUGCHECK_P1: 61941
    
    BUGCHECK_P2: ffff8200c145e050
    
    BUGCHECK_P3: b
    
    BUGCHECK_P4: ffffd80c68696750
    
    BUGCHECK_STR:  0x1a_61941
    
    CPU_COUNT: c
    
    CPU_MHZ: 8a0
    
    CPU_VENDOR:  GenuineIntel
    
    CPU_FAMILY: 6
    
    CPU_MODEL: 9e
    
    CPU_STEPPING: a
    
    CPU_MICROCODE: 6,9e,a,0 (F,M,S,R)  SIG: B4'00000000 (cache) B4'00000000 (init)
    
    BLACKBOXBSD: 1 (!blackboxbsd)
    
    
    BLACKBOXNTFS: 1 (!blackboxntfs)
    
    
    BLACKBOXPNP: 1 (!blackboxpnp)
    
    
    BLACKBOXWINLOGON: 1
    
    DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT
    
    PROCESS_NAME:  svchost.exe
    
    CURRENT_IRQL:  2
    
    ANALYSIS_SESSION_HOST:  EMRE
    
    ANALYSIS_SESSION_TIME:  12-26-2020 23:01:30.0047
    
    ANALYSIS_VERSION: 10.0.18362.1 amd64fre
    
    TRAP_FRAME:  ffffd80c68696750 -- (.trap 0xffffd80c68696750)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=ffff8200c145e000 rbx=0000000000000000 rcx=0000000000000801
    rdx=fffff6fb7dbed000 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff80016cf170d rsp=ffffd80c686968e0 rbp=ffffd80c686969e0
     r8=0000007ffffffff8  r9=fffff6fb60803050 r10=0000000000000001
    r11=fffff6fb7dbed000 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei ng nz na pe nc
    tcpip!UdpSendMessagesOnPath+0x1bd:
    fffff800`16cf170d c6405000        mov     byte ptr [rax+50h],0 ds:ffff8200`c145e050=??
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff8001087452e to fffff800107f5210
    
    STACK_TEXT:  
    ffffd80c`686965a8 fffff800`1087452e : 00000000`0000001a 00000000`00061941 ffff8200`c145e050 00000000`0000000b : nt!KeBugCheckEx
    ffffd80c`686965b0 fffff800`1080335e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x18a48e
    ffffd80c`68696750 fffff800`16cf170d : 00000000`00003500 ffffc10c`00000001 ffffd80c`686969e0 ffffc10c`88e921f0 : nt!KiPageFault+0x35e
    ffffd80c`686968e0 fffff800`16cf0ecc : 00000000`00000000 fffff800`107f0b9f 0008e513`0000ffff 00000000`000003ff : tcpip!UdpSendMessagesOnPath+0x1bd
    ffffd80c`68696d80 fffff800`16cf0c15 : ffffc10c`97fe0c01 fffff800`16cf0c00 ffffd80c`68697200 ffffd80c`68697200 : tcpip!UdpSendMessages+0x29c
    ffffd80c`686970f0 fffff800`1060d468 : ffffd80c`68697350 ffffc10c`99f8e930 00000000`00000000 00000000`00000008 : tcpip!UdpTlProviderSendMessagesCalloutRoutine+0x15
    ffffd80c`68697120 fffff800`1060d3dd : fffff800`16cf0c00 ffffd80c`68697200 00000000`00000000 ffff9400`00b1bc24 : nt!KeExpandKernelStackAndCalloutInternal+0x78
    ffffd80c`68697190 fffff800`16d4233b : 00000000`00000103 00000000`00000000 00000000`00000000 fffff800`2a3720c0 : nt!KeExpandKernelStackAndCalloutEx+0x1d
    ffffd80c`686971d0 fffff800`2a38d899 : ffffd80c`68697540 ffffd80c`68697a80 ffffc10c`97fe0c70 ffffd80c`68697a80 : tcpip!UdpTlProviderSendMessages+0x7b
    ffffd80c`68697250 fffff800`2a371fb5 : ffff8200`ba19e180 ffff940f`00000000 00000000`00000000 ffff940f`00000000 : afd!AfdFastDatagramSend+0x659
    ffffd80c`68697440 fffff800`10ac1b92 : 00000000`00000000 00000000`000120d3 ffffd80c`68697a80 ffffc10c`a3f47ce0 : afd!AfdFastIoDeviceControl+0x1825
    ffffd80c`686977e0 fffff800`10ac17f6 : 00000000`00000001 00000000`0000064c 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0x382
    ffffd80c`68697920 fffff800`10806bb5 : ffffc10c`00000000 000000db`00000001 00000228`239f4cc0 ffffd80c`68697a80 : nt!NtDeviceIoControlFile+0x56
    ffffd80c`68697990 00007ffc`7e44be84 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
    000000db`d65ff118 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`7e44be84
    
    
    THREAD_SHA1_HASH_MOD_FUNC:  d6d55036eacf7ccaa0bdd1fc824cd7c265faf4d4
    
    THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  447b798cbbd89f35a7628295510be01920669e56
    
    THREAD_SHA1_HASH_MOD:  8dcaadc195f697726bbf60d61fec682ba4d04c2b
    
    FOLLOWUP_IP: 
    tcpip!UdpSendMessagesOnPath+1bd
    fffff800`16cf170d c6405000        mov     byte ptr [rax+50h],0
    
    FAULT_INSTR_CODE:  5040c6
    
    SYMBOL_STACK_INDEX:  3
    
    SYMBOL_NAME:  tcpip!UdpSendMessagesOnPath+1bd
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: tcpip
    
    IMAGE_NAME:  tcpip.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  0
    
    IMAGE_VERSION:  10.0.19041.631
    
    STACK_COMMAND:  .thread ; .cxr ; kb
    
    BUCKET_ID_FUNC_OFFSET:  1bd
    
    FAILURE_BUCKET_ID:  0x1a_61941_tcpip!UdpSendMessagesOnPath
    
    BUCKET_ID:  0x1a_61941_tcpip!UdpSendMessagesOnPath
    
    PRIMARY_PROBLEM_CLASS:  0x1a_61941_tcpip!UdpSendMessagesOnPath
    
    TARGET_TIME:  2020-12-01T17:29:13.000Z
    
    OSBUILD:  19041
    
    OSSERVICEPACK:  630
    
    SERVICEPACK_NUMBER: 0
    
    OS_REVISION: 0
    
    SUITE_MASK:  784
    
    PRODUCT_TYPE:  1
    
    OSPLATFORM_TYPE:  x64
    
    OSNAME:  Windows 10
    
    OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS Personal
    
    OS_LOCALE:  
    
    USER_LCID:  0
    
    OSBUILD_TIMESTAMP:  2023-08-28 01:21:11
    
    BUILDDATESTAMP_STR:  191206-1406
    
    BUILDLAB_STR:  vb_release
    
    BUILDOSVER_STR:  10.0.19041.1.amd64fre.vb_release.191206-1406
    
    ANALYSIS_SESSION_ELAPSED_TIME:  3491
    
    ANALYSIS_SOURCE:  KM
    
    FAILURE_ID_HASH_STRING:  km:0x1a_61941_tcpip!udpsendmessagesonpath
    
    FAILURE_ID_HASH:  {ad6e6b39-48a8-de63-3860-76df6de9979b}
    
    Followup:     MachineOwner
    ---------
    
    rax=0000000000000009 rbx=000000000000000b rcx=000000000000001a
    rdx=0000000000061941 rsi=0000000000000000 rdi=ffff8200c145e050
    rip=fffff800107f5210 rsp=ffffd80c686965a8 rbp=ffffd80c686967d0
     r8=ffff8200c145e050  r9=000000000000000b r10=0000000000000001
    r11=ffffd80c68696748 r12=0000000000000000 r13=ffffc10c952ef5f0
    r14=ffffd80c68696750 r15=ffffc10ca3f47310
    iopl=0         nv up ei pl zr na po nc
    cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00040246
    nt!KeBugCheckEx:
    fffff800`107f5210 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:ffffd80c`686965b0=000000000000001a
     # Child-SP          RetAddr           : Args to Child                                                           : Call Site
    00 ffffd80c`686965a8 fffff800`1087452e : 00000000`0000001a 00000000`00061941 ffff8200`c145e050 00000000`0000000b : nt!KeBugCheckEx
    01 ffffd80c`686965b0 fffff800`1080335e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x18a48e
    02 ffffd80c`68696750 fffff800`16cf170d : 00000000`00003500 ffffc10c`00000001 ffffd80c`686969e0 ffffc10c`88e921f0 : nt!KiPageFault+0x35e (TrapFrame @ ffffd80c`68696750)
    03 ffffd80c`686968e0 fffff800`16cf0ecc : 00000000`00000000 fffff800`107f0b9f 0008e513`0000ffff 00000000`000003ff : tcpip!UdpSendMessagesOnPath+0x1bd
    04 ffffd80c`68696d80 fffff800`16cf0c15 : ffffc10c`97fe0c01 fffff800`16cf0c00 ffffd80c`68697200 ffffd80c`68697200 : tcpip!UdpSendMessages+0x29c
    05 ffffd80c`686970f0 fffff800`1060d468 : ffffd80c`68697350 ffffc10c`99f8e930 00000000`00000000 00000000`00000008 : tcpip!UdpTlProviderSendMessagesCalloutRoutine+0x15
    06 ffffd80c`68697120 fffff800`1060d3dd : fffff800`16cf0c00 ffffd80c`68697200 00000000`00000000 ffff9400`00b1bc24 : nt!KeExpandKernelStackAndCalloutInternal+0x78
    07 ffffd80c`68697190 fffff800`16d4233b : 00000000`00000103 00000000`00000000 00000000`00000000 fffff800`2a3720c0 : nt!KeExpandKernelStackAndCalloutEx+0x1d
    08 ffffd80c`686971d0 fffff800`2a38d899 : ffffd80c`68697540 ffffd80c`68697a80 ffffc10c`97fe0c70 ffffd80c`68697a80 : tcpip!UdpTlProviderSendMessages+0x7b
    09 ffffd80c`68697250 fffff800`2a371fb5 : ffff8200`ba19e180 ffff940f`00000000 00000000`00000000 ffff940f`00000000 : afd!AfdFastDatagramSend+0x659
    0a ffffd80c`68697440 fffff800`10ac1b92 : 00000000`00000000 00000000`000120d3 ffffd80c`68697a80 ffffc10c`a3f47ce0 : afd!AfdFastIoDeviceControl+0x1825
    0b ffffd80c`686977e0 fffff800`10ac17f6 : 00000000`00000001 00000000`0000064c 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0x382
    0c ffffd80c`68697920 fffff800`10806bb5 : ffffc10c`00000000 000000db`00000001 00000228`239f4cc0 ffffd80c`68697a80 : nt!NtDeviceIoControlFile+0x56
    0d ffffd80c`68697990 00007ffc`7e44be84 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25 (TrapFrame @ ffffd80c`68697a00)
    0e 000000db`d65ff118 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`7e44be84
    Oh I'm sorry man, didn't mean to come off that way. I was confused.

    Turns out that there is an update available on intel's website for the LAN drivers. The drivers on MSI's website are out of date. Just updated the LAN drivers.
      My Computers


 

  Related Discussions
Our Sites
Site Links
About Us
Windows 10 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 10" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd
All times are GMT -5. The time now is 22:08.
Find Us




Windows 10 Forums