Windows 10 Mavi Ekran hatası ve oyunlardan atma problemi

t_cinar

Kilopat
Katılım
10 Temmuz 2014
Mesajlar
23
Daha fazla  
Cinsiyet
Erkek
Sıcaklık değerlerinde herhangi bir sıkıntı yokken oyunlar birden kapanıyor ve ara ara mavi ekran hatası alıyorum.
Durdurma Kodu: DRIVER IRQL NOT LESS OR EQUAL
Minidump dosyası: HATA.rar
Yardımlarınız için teşekkürler.
 
Hatalar incelendiğinde USB sürücüleri ve RAM hatası vermiş. Ayrıca Chrome da hata vermiş. BIOS güncellemelerini yapıp temiz bir format atın. XMP açıksa kapatın ve Memtest86 ile bir test yapın sonucu paylaşın.
 
Ağ sürücülerini güvenli mod ile kaldırıp tekrar yükleyin.

VoiceMeeter, MSI Afterburner yazılımlarını kaldır.
Kod:
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000008, value 0 = read operation, 1 = write operation
Arg4: 0000000000000000, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

DUMP_TYPE:  2

BUGCHECK_P1: 0

BUGCHECK_P2: 2

BUGCHECK_P3: 8

BUGCHECK_P4: 0

READ_ADDRESS: fffff8015fd733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
 0000000000000000

CURRENT_IRQL:  2

FAULTING_IP:
+0
00000000`00000000 ??              ???

PROCESS_NAME:  chrome.exe

CPU_COUNT: 8

CPU_MHZ: fa8

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 5e

CPU_STEPPING: 3

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  AV

ANALYSIS_SESSION_HOST:  DESKTOP-BKJR0DQ

ANALYSIS_SESSION_TIME:  03-06-2020 14:49:20.0257

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

TRAP_FRAME:  ffffef8451047560 -- (.trap 0xffffef8451047560)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000c6e8832000 rbx=0000000000000000 rcx=00000000c0000102
rdx=00000000000000c6 rsi=0000000000000000 rdi=0000000000000000
rip=0000000000000000 rsp=ffffef84510476f0 rbp=0000000000000000
 r8=0000000000000000  r9=000000010000032c r10=ffffd8803d915180
r11=ffffb1837d01f080 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
00000000`00000000 ??              ???
Resetting default scope

IP_IN_FREE_BLOCK: 0

LAST_CONTROL_TRANSFER:  from fffff8015f9d41e9 to fffff8015f9c2380

FAILED_INSTRUCTION_ADDRESS:
+0
00000000`00000000 ??              ???

STACK_TEXT: 
ffffef84`51047418 fffff801`5f9d41e9 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000008 : nt!KeBugCheckEx
ffffef84`51047420 fffff801`5f9d052b : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffef84`51047560 00000000`00000000 : 00000000`00000000 00000000`00000000 43f00000`00000000 00000000`00000000 : nt!KiPageFault+0x46b


THREAD_SHA1_HASH_MOD_FUNC:  bf99962f16aee8a6a536cfcc5454c0cd4db15ac9

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  497aaf2f8d4f907c0c9bce6ce025c930b885e2b8

THREAD_SHA1_HASH_MOD:  2a7ca9d3ab5386d53fea7498e1d81b9c4a4c036b

FOLLOWUP_IP:
nt!KiPageFault+46b
fffff801`5f9d052b 33c0            xor     eax,eax

FAULT_INSTR_CODE:  ffb0c033

SYMBOL_STACK_INDEX:  2

SYMBOL_NAME:  nt!KiPageFault+46b

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  0

IMAGE_VERSION:  10.0.18362.693

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  46b

FAILURE_BUCKET_ID:  AV_CODE_AV_NULL_IP_nt!KiPageFault

BUCKET_ID:  AV_CODE_AV_NULL_IP_nt!KiPageFault

PRIMARY_PROBLEM_CLASS:  AV_CODE_AV_NULL_IP_nt!KiPageFault

TARGET_TIME:  2020-03-05T12:06:06.000Z

OSBUILD:  18362

OSSERVICEPACK:  693

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  unknown_date

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  1303

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:av_code_av_null_ip_nt!kipagefault

FAILURE_ID_HASH:  {4ce35ff9-c5cf-d66d-0323-0f05e33f6692}

Followup:     MachineOwner
---------
ATTEMPTED_WRITE_TO_READONLY_MEMORY (be)
An attempt was made to write to readonly memory.  The guilty driver is on the
stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: fffff90002454fa8, Virtual address for the attempted write.
Arg2: 8a00000000200021, PTE contents.
Arg3: ffffbc01482176c0, (reserved)
Arg4: 000000000000000a, (reserved)

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

DUMP_TYPE:  2

BUGCHECK_P1: fffff90002454fa8

BUGCHECK_P2: 8a00000000200021

BUGCHECK_P3: ffffbc01482176c0

BUGCHECK_P4: a

CPU_COUNT: 8

CPU_MHZ: fa8

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 5e

CPU_STEPPING: 3

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  0xBE

PROCESS_NAME:  System

CURRENT_IRQL:  2

ANALYSIS_SESSION_HOST:  DESKTOP-BKJR0DQ

ANALYSIS_SESSION_TIME:  03-06-2020 14:49:16.0057

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

TRAP_FRAME:  ffffbc01482176c0 -- (.trap 0xffffbc01482176c0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffbc0148217828 rbx=0000000000000000 rcx=fffff90002454f90
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80161657502 rsp=ffffbc0148217850 rbp=fffff80161a6a380
 r8=0000000080000000  r9=0000000000000003 r10=00000000000c1c53
r11=ffffe5899561c000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!MiLockNestedPageAtDpcInline+0xe:
fffff801`61657502 f0480fba69183f  lock bts qword ptr [rcx+18h],3Fh ds:fffff900`02454fa8=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff801618001e7 to fffff801617c2380

STACK_TEXT: 
ffffbc01`482174d8 fffff801`618001e7 : 00000000`000000be fffff900`02454fa8 8a000000`00200021 ffffbc01`482176c0 : nt!KeBugCheckEx
ffffbc01`482174e0 fffff801`616c92fa : 8a000000`00200021 00000000`00000003 ffffbc01`48217620 00000000`00000000 : nt!MiRaisedIrqlFault+0x19e437
ffffbc01`48217520 fffff801`617d0420 : 00000000`00040202 fffff801`61721a84 00000048`0412017e ffffe589`95513080 : nt!MmAccessFault+0x48a
ffffbc01`482176c0 fffff801`61657502 : 00000000`00000000 00000000`00000000 fffff900`00000000 02000000`00000000 : nt!KiPageFault+0x360
ffffbc01`48217850 fffff801`616d9efc : fffff900`00000000 fffff801`61a6a380 00000000`00000000 ffff9c4d`20447050 : nt!MiLockNestedPageAtDpcInline+0xe
ffffbc01`48217880 fffff801`6175ee4d : e589a2f1`bf3004d0 00000000`00000001 00000000`00000000 fffff900`0567e640 : nt!MiRestoreTransitionPte+0x18c
ffffbc01`482178f0 fffff801`618db1e8 : 00000000`00000000 fffff900`05678670 fffff801`00000000 00000000`00000000 : nt!MiRemoveLowestPriorityStandbyPage+0x1bd
ffffbc01`48217990 fffff801`618db3f3 : fffff801`61a6a380 00000000`00000000 fffff801`00000000 00000000`00000206 : nt!MiPruneStandbyPages+0x250
ffffbc01`48217a20 fffff801`616f43c5 : ffffe589`a93ca040 fffff801`618db360 ffffe589`9547c520 fffff801`61a6c020 : nt!MiRebalanceZeroFreeLists+0x93
ffffbc01`48217a70 fffff801`6166bce5 : ffffe589`a93ca040 00000000`00000080 ffffe589`954b0040 28614c2e`00000001 : nt!ExpWorkerThread+0x105
ffffbc01`48217b10 fffff801`617c99ca : ffffd100`6fb43180 ffffe589`a93ca040 fffff801`6166bc90 637d0a0a`3b292861 : nt!PspSystemThreadStartup+0x55
ffffbc01`48217b60 00000000`00000000 : ffffbc01`48218000 ffffbc01`48211000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x2a


THREAD_SHA1_HASH_MOD_FUNC:  5554ee5f6880683562b6941626d7551fcb7a2f59

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  ff3954ede0aab373441df887cc46f40ca9d1197f

THREAD_SHA1_HASH_MOD:  dc844b1b94baa204d070855e43bbbd27eee98b94

FOLLOWUP_IP:
nt!MiRaisedIrqlFault+19e437
fffff801`618001e7 cc              int     3

FAULT_INSTR_CODE:  cf8b48cc

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!MiRaisedIrqlFault+19e437

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP:  0

IMAGE_VERSION:  10.0.18362.693

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  memory_corruption

BUCKET_ID_FUNC_OFFSET:  19e437

FAILURE_BUCKET_ID:  0xBE_nt!MiRaisedIrqlFault

BUCKET_ID:  0xBE_nt!MiRaisedIrqlFault

PRIMARY_PROBLEM_CLASS:  0xBE_nt!MiRaisedIrqlFault

TARGET_TIME:  2020-03-05T15:45:25.000Z

OSBUILD:  18362

OSSERVICEPACK:  693

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  unknown_date

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  1cd0

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0xbe_nt!miraisedirqlfault

FAILURE_ID_HASH:  {1c5b4d11-09e0-def3-d2d0-70a11d69b92d}

Followup:     MachineOwner
---------

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8075796d92a, The address that the exception occurred at
Arg3: ffffe9085dfd7048, Parameter 0 of the exception
Arg4: fffff80758211930, Parameter 1 of the exception

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

DUMP_TYPE:  2

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff8075796d92a

BUGCHECK_P3: ffffe9085dfd7048

BUGCHECK_P4: fffff80758211930

WRITE_ADDRESS: fffff8074fd733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
 fffff80758211930

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP:
tcpip!TcpUpdateTcbEstats+a094e
fffff807`5796d92a 488908          mov     qword ptr [rax],rcx

EXCEPTION_PARAMETER1:  ffffe9085dfd7048

EXCEPTION_PARAMETER2:  fffff80758211930

BUGCHECK_STR:  0x1E_c0000005

CPU_COUNT: 8

CPU_MHZ: fa8

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 5e

CPU_STEPPING: 3

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  System

CURRENT_IRQL:  2

ANALYSIS_SESSION_HOST:  DESKTOP-BKJR0DQ

ANALYSIS_SESSION_TIME:  03-06-2020 14:49:12.0743

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

BAD_STACK_POINTER:  fffff80758211088

LAST_CONTROL_TRANSFER:  from fffff8074faa6667 to fffff8074f9c1510

STACK_TEXT: 
fffff807`58211088 fffff807`4faa6667 : 00000000`0000001e ffffffff`c0000005 fffff807`5796d92a ffffe908`5dfd7048 : nt!KeBugCheckEx
fffff807`58211090 fffff807`4f9d9236 : fffff807`5796d92a fffff807`4f91657b ffffe908`5dfd7280 fffff807`58211930 : nt!KiFatalFilter+0x1f
fffff807`582110d0 fffff807`4f99c569 : fffff807`00000002 ffffe908`5dfd7fd0 ffffe908`5dfd2000 ffffe908`5dfd9000 : nt!KeExpandKernelStackAndCalloutInternal$filt$0+0x16
fffff807`58211110 fffff807`4f9ca33f : ffffe908`5dfd7fd0 fffff807`582116f0 00000000`00000000 00000000`0010001f : nt!_C_specific_handler+0xa9
fffff807`58211180 fffff807`4f8c2f15 : 00000000`00000000 00000000`00000000 fffff807`582116f0 00007fff`ffff0000 : nt!RtlpExecuteHandlerForException+0xf
fffff807`582111b0 fffff807`4f8c74ae : ffffe908`5dfd7048 fffff807`58211e30 ffffe908`5dfd7048 ffff9f8e`8d369bb0 : nt!RtlDispatchException+0x4a5
fffff807`58211900 fffff807`4f9c2392 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x16e
fffff807`58211fb0 fffff807`4f9c2360 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxExceptionDispatchOnExceptionStack+0x12
ffffe908`5dfd6f08 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatchOnExceptionStackContinue


THREAD_SHA1_HASH_MOD_FUNC:  807003e66859482870638b72b993eaa394e895d2

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  d1c6fea8880f54a80c34f15b65b52096254d6271

THREAD_SHA1_HASH_MOD:  9f457f347057f10e1df248e166a3e95e6570ecfe

FOLLOWUP_IP:
tcpip!TcpUpdateTcbEstats+a094e
fffff807`5796d92a 488908          mov     qword ptr [rax],rcx

FAULT_INSTR_CODE:  48088948

SYMBOL_NAME:  tcpip!TcpUpdateTcbEstats+a094e

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: tcpip

IMAGE_NAME:  tcpip.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  0

IMAGE_VERSION:  10.0.18362.628

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  a094e

FAILURE_BUCKET_ID:  0x1E_c0000005_STACKPTR_ERROR_tcpip!TcpUpdateTcbEstats

BUCKET_ID:  0x1E_c0000005_STACKPTR_ERROR_tcpip!TcpUpdateTcbEstats

PRIMARY_PROBLEM_CLASS:  0x1E_c0000005_STACKPTR_ERROR_tcpip!TcpUpdateTcbEstats

TARGET_TIME:  2020-03-04T20:20:17.000Z

OSBUILD:  18362

OSSERVICEPACK:  657

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  2005-04-23 04:40:32

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  3316

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x1e_c0000005_stackptr_error_tcpip!tcpupdatetcbestats

FAILURE_ID_HASH:  {9be197c9-77f2-d2e5-1a6c-ac645429614b}

Followup:     MachineOwner
---------
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8071013ab62, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

DUMP_TYPE:  2

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff8071013ab62

BUGCHECK_P3: 0

BUGCHECK_P4: ffffffffffffffff

READ_ADDRESS: fffff8070eb733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
 ffffffffffffffff

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP:
Wdf01000!FxDevice::DispatchWithLock+a2 [minkernel\wdf\framework\shared\core\fxdevice.cpp @ 1430]
fffff807`1013ab62 4e8b5c0610      mov     r11,qword ptr [rsi+r8+10h]

EXCEPTION_PARAMETER2:  ffffffffffffffff

BUGCHECK_STR:  0x1E_c0000005_R

CPU_COUNT: 8

CPU_MHZ: fa8

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 5e

CPU_STEPPING: 3

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  voicemeeterpro.exe

CURRENT_IRQL:  2

ANALYSIS_SESSION_HOST:  DESKTOP-BKJR0DQ

ANALYSIS_SESSION_TIME:  03-06-2020 14:49:09.0293

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

DPC_STACK_BASE:  FFFFFB805DC37FB0

LAST_CONTROL_TRANSFER:  from fffff8070e8a663e to fffff8070e7c1510

STACK_TEXT: 
fffffb80`5dc35bf8 fffff807`0e8a663e : 00000000`0000001e ffffffff`c0000005 fffff807`1013ab62 00000000`00000000 : nt!KeBugCheckEx
fffffb80`5dc35c00 fffff807`0e7ca33f : fffff807`0eb11000 fffff807`0e600000 0005e530`00ab6000 00000000`0010001f : nt!KiFatalExceptionHandler+0x22
fffffb80`5dc35c40 fffff807`0e6c2f15 : 00000000`00000000 00000000`00000000 fffffb80`5dc361b0 00007fff`ffff0000 : nt!RtlpExecuteHandlerForException+0xf
fffffb80`5dc35c70 fffff807`0e6c74ae : fffffb80`5dc36ba8 fffffb80`5dc368f0 fffffb80`5dc36ba8 ffff9803`7b121020 : nt!RtlDispatchException+0x4a5
fffffb80`5dc363c0 fffff807`0e7d351d : 00000000`00000000 fffff807`2a6a5b96 00000000`00000000 00000000`00000009 : nt!KiDispatchException+0x16e
fffffb80`5dc36a70 fffff807`0e7cf2a2 : 00000000`00001001 00000000`00000fff ffff9803`00000d4e 00000000`00000030 : nt!KiExceptionDispatch+0x11d
fffffb80`5dc36c50 fffff807`1013ab62 : ffff9803`7b527010 ffff9803`7b527010 fffff807`10148670 ffff9803`75b1f750 : nt!KiGeneralProtectionFault+0x322
fffffb80`5dc36de0 fffff807`0e631f79 : ffff9803`7b527010 ffff9803`75c0f6b0 ffff9803`8b8bfce0 ffff9803`75c0f6b0 : Wdf01000!FxDevice::DispatchWithLock+0xa2 [minkernel\wdf\framework\shared\core\fxdevice.cpp @ 1430]
fffffb80`5dc36e40 fffff807`102d14ad : ffff9803`75c0f6b0 ffff9803`7b527010 00000000`00086676 00000000`00000040 : nt!IofCallDriver+0x59
fffffb80`5dc36e80 fffff807`102d10d8 : ffff9803`71fd0bc0 00000000`00000007 ffff9803`7b5274d0 00000000`00000000 : ACPI!ACPIIrpDispatchDeviceControl+0xad
fffffb80`5dc36ec0 fffff807`0e631f79 : 00000000`00000007 ffff9803`7b527010 fffffb80`5dc37049 00000000`00000001 : ACPI!ACPIDispatchIrp+0xc8
fffffb80`5dc36f40 fffff807`2c401dc4 : 00000000`00000000 ffff9803`7b527010 fffffb80`5dc37049 00000000`00000001 : nt!IofCallDriver+0x59
fffffb80`5dc36f80 fffff807`2c4019b6 : 00000000`00000009 00000000`00000200 ffff9803`7b4739c8 fffff807`0e96f06d : usbccgp!DispatchPdoUrb+0x2b4
fffffb80`5dc370b0 fffff807`2c4012a8 : ffff9803`7b527010 ffff9803`7b4671b0 ffff9803`7b4671b8 fffff807`00000000 : usbccgp!DispatchPdoInternalDeviceControl+0x1c6
fffffb80`5dc37120 fffff807`0e631f79 : ffff9803`7b467060 00000000`00000001 00000000`00000000 fffffb80`00000000 : usbccgp!USBC_Dispatch+0x298
fffffb80`5dc371f0 fffff807`2c4413d0 : 00000000`00000000 fffffb80`5dc37330 00000000`00000000 fffff807`00000000 : nt!IofCallDriver+0x59
fffffb80`5dc37230 fffff807`2c4695df : ffff9803`00000000 ffff9803`7b565280 ffff9803`7b565280 fffff807`2c484000 : hidusb!HumInternalIoctl+0x3c0
fffffb80`5dc37520 fffff807`2c46a9ec : ffff9803`7b565280 fffffb80`5dc376e9 fffff807`2c47e1e0 00000000`00000009 : HIDCLASS!HidpSubmitInterruptRead+0x1af
fffffb80`5dc375a0 fffff807`0e6477d9 : ffff9803`7b527010 ffff9803`7b527010 fffffb80`5dc37601 ffff9803`7b527400 : HIDCLASS!HidpInterruptReadComplete+0x57c
fffffb80`5dc37640 fffff807`0e6476a7 : ffff9803`817c4010 fffff807`2a638f00 00000000`00000001 00000000`00000001 : nt!IopfCompleteRequest+0x119
fffffb80`5dc37750 fffff807`101383fd : 00000000`00000000 ffff9803`7d5e0020 00000000`00000002 fffff807`2a629700 : nt!IofCompleteRequest+0x17
fffffb80`5dc37780 fffff807`10137ecb : ffff9803`7d5e0102 fffffb80`5dc378a1 ffff9803`7b527010 00000000`00000000 : Wdf01000!FxRequest::CompleteInternal+0x22d [minkernel\wdf\framework\shared\core\fxrequest.cpp @ 869]
fffffb80`5dc37810 fffff807`2a637e80 : 00000000`ffffff02 ffff9803`7d5e0020 ffff9803`7b46e4b0 ffff9803`7b46e4b0 : Wdf01000!imp_WdfRequestComplete+0x8b [minkernel\wdf\framework\shared\core\fxrequestapi.cpp @ 436]
fffffb80`5dc37870 fffff807`2a635cf4 : ffff9803`7d5e01c0 ffff9803`7b46e510 ffff9803`7d5e0250 fffffb80`5dc37b48 : USBXHCI!Bulk_Transfer_CompleteCancelable+0x19c
fffffb80`5dc378d0 fffff807`2a634460 : 00000001`00000000 00000000`00000000 ffff9803`7fcc2400 fffff807`1021208d : USBXHCI!Bulk_ProcessTransferEventWithED1+0x464
fffffb80`5dc37990 fffff807`2a6298d3 : ffff9803`7b17d7c0 ffffd680`95e05f10 00000000`01400180 fffffb80`5dc37ac0 : USBXHCI!Bulk_EP_TransferEventHandler+0x10
fffffb80`5dc379c0 fffff807`2a61ba4f : 00000000`0000002b fffffb80`5dc37ab1 ffff9803`75e7d010 fffff807`2a6034b9 : USBXHCI!TR_TransferEventHandler+0x17
fffffb80`5dc379f0 fffff807`2a63c2be : fffffb80`5dc37b48 fffffb80`5dc37b18 00000000`00000000 fffffb80`5dc37b20 : USBXHCI!Endpoint_TransferEventHandler+0x167
fffffb80`5dc37a70 fffff807`2a61ea3c : ffff9803`75811ab0 fffffb80`5dc37b69 00000000`00000001 ffff9803`75f91300 : USBXHCI!UsbDevice_TransferEventHandler+0xa6
fffffb80`5dc37ad0 fffff807`2a61f55c : ffff9803`723ffe48 ffff9803`71f59040 00000000`00000010 ffff9803`758118b0 : USBXHCI!Interrupter_DeferredWorkProcessor+0x578
fffffb80`5dc37bd0 fffff807`101326ad : 00000000`00000f44 00000000`00400a02 00000000`00000000 fffffb80`5dc37c90 : USBXHCI!Interrupter_WdfEvtInterruptDpc+0xc
fffffb80`5dc37c00 fffff807`0e66ae95 : ffffd680`95e02f80 ffff9803`7200f000 ffffd680`95e05f90 ffffd680`00000002 : Wdf01000!FxInterrupt::_InterruptDpcThunk+0x9d [minkernel\wdf\framework\shared\irphandlers\pnp\km\interruptobjectkm.cpp @ 410]
fffffb80`5dc37c40 fffff807`0e66a4ef : ffffd680`95e00180 00000000`00000000 00000000`00000002 00000000`00000004 : nt!KiExecuteAllDpcs+0x305
fffffb80`5dc37d80 fffff807`0e7c8555 : 00000000`00000000 ffffd680`95e00180 ffffd680`96393780 00000000`00000000 : nt!KiRetireDpcList+0x1ef
fffffb80`5dc37fb0 fffff807`0e7c8340 : 00000000`00000000 fffff807`0f0b92cb 00000000`06e2f940 00000000`06d2fda0 : nt!KxRetireDpcList+0x5
fffffb80`60de79c0 fffff807`0e7c7bf5 : 00000000`00000000 fffff807`0e7c3071 00000000`00000000 fffffb80`60de7a80 : nt!KiDispatchInterruptContinue
fffffb80`60de79f0 fffff807`0e7c3071 : 00000000`00000000 fffffb80`60de7a80 ffffd680`96393780 00000000`0103bce0 : nt!KiDpcInterruptBypass+0x25
fffffb80`60de7a00 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatch+0xb1


THREAD_SHA1_HASH_MOD_FUNC:  8bce4d95c2a018454cba752eb1ace33c984dc79e

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  58be9476b324e3d4bfa064d64f8fa3ea9296ab16

THREAD_SHA1_HASH_MOD:  f8ed7e0778976230dc3d683d9350c73515435761

FOLLOWUP_IP:
hidusb!HumInternalIoctl+3c0
fffff807`2c4413d0 8bd8            mov     ebx,eax

FAULT_INSTR_CODE:  8840d88b

SYMBOL_STACK_INDEX:  10

SYMBOL_NAME:  hidusb!HumInternalIoctl+3c0

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: hidusb

IMAGE_NAME:  hidusb.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  7b9189fe

IMAGE_VERSION:  10.0.18362.175

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  3c0

FAILURE_BUCKET_ID:  0x1E_c0000005_R_hidusb!HumInternalIoctl

BUCKET_ID:  0x1E_c0000005_R_hidusb!HumInternalIoctl

PRIMARY_PROBLEM_CLASS:  0x1E_c0000005_R_hidusb!HumInternalIoctl

TARGET_TIME:  2020-03-02T11:04:21.000Z

OSBUILD:  18362

OSSERVICEPACK:  657

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  2005-04-23 04:40:32

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  39ab

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x1e_c0000005_r_hidusb!huminternalioctl

FAILURE_ID_HASH:  {1db1b3ef-c820-f961-4df4-46999018d214}

Followup:     MachineOwner
---------

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: fffff60e15c2f6b0, Address of the trap frame for the exception that caused the bugcheck
Arg3: fffff60e15c2f608, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

DUMP_TYPE:  2

BUGCHECK_P1: 3

BUGCHECK_P2: fffff60e15c2f6b0

BUGCHECK_P3: fffff60e15c2f608

BUGCHECK_P4: 0

TRAP_FRAME:  fffff60e15c2f6b0 -- (.trap 0xfffff60e15c2f6b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffa88c8fcb73e8 rbx=0000000000000000 rcx=0000000000000003
rdx=000000000000082f rsi=0000000000000000 rdi=0000000000000000
rip=fffff8046206bb54 rsp=fffff60e15c2f840 rbp=ffffa88c96e84500
 r8=000000000000082f  r9=000000000000002f r10=fffff80462ab7aa0
r11=fffff60e15c2f740 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po cy
nt!KiProcessExpiredTimerList+0x234:
fffff804`6206bb54 cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  fffff60e15c2f608 -- (.exr 0xfffff60e15c2f608)
ExceptionAddress: fffff8046206bb54 (nt!KiProcessExpiredTimerList+0x0000000000000234)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

CPU_COUNT: 8

CPU_MHZ: fa8

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 5e

CPU_STEPPING: 3

CUSTOMER_CRASH_COUNT:  1

BUGCHECK_STR:  0x139

PROCESS_NAME:  System

CURRENT_IRQL:  2

DEFAULT_BUCKET_ID:  FAIL_FAST_CORRUPT_LIST_ENTRY

ERROR_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>

EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000003

ANALYSIS_SESSION_HOST:  DESKTOP-BKJR0DQ

ANALYSIS_SESSION_TIME:  03-06-2020 14:49:05.0295

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

LAST_CONTROL_TRANSFER:  from fffff804621d33e9 to fffff804621c1510

STACK_TEXT: 
fffff60e`15c2f388 fffff804`621d33e9 : 00000000`00000139 00000000`00000003 fffff60e`15c2f6b0 fffff60e`15c2f608 : nt!KeBugCheckEx
fffff60e`15c2f390 fffff804`621d3810 : ffffa88c`9da89de0 00000000`00000000 ffffa88c`9a6f7080 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff60e`15c2f4d0 fffff804`621d1ba5 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xd0
fffff60e`15c2f6b0 fffff804`6206bb54 : ffffa88c`96e84440 ffffa88c`8e8541f0 00000001`00000002 ffffa88c`8a2b7010 : nt!KiRaiseSecurityCheckFailure+0x325
fffff60e`15c2f840 fffff804`6206a7e9 : 00000000`0000001e 00000000`00989680 00000000`0062e214 00000000`0000002c : nt!KiProcessExpiredTimerList+0x234
fffff60e`15c2f930 fffff804`621c5054 : 00000000`00000000 ffff8001`d9c00180 ffff8001`d9c11240 ffffa88c`91747080 : nt!KiRetireDpcList+0x4e9
fffff60e`15c2fb60 00000000`00000000 : fffff60e`15c30000 fffff60e`15c29000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x84


THREAD_SHA1_HASH_MOD_FUNC:  a5119ebdc9ff71d34433e0daf4177502fc924f29

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  060f65eb7dbeac629aaa0950c72f0d4dec6c7f1c

THREAD_SHA1_HASH_MOD:  30a3e915496deaace47137d5b90c3ecc03746bf6

FOLLOWUP_IP:
nt!KiProcessExpiredTimerList+234
fffff804`6206bb54 cd29            int     29h

FAULT_INSTR_CODE:  8b4829cd

SYMBOL_STACK_INDEX:  4

SYMBOL_NAME:  nt!KiProcessExpiredTimerList+234

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4269a790

IMAGE_VERSION:  10.0.18362.657

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  234

FAILURE_BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiProcessExpiredTimerList

BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiProcessExpiredTimerList

PRIMARY_PROBLEM_CLASS:  0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiProcessExpiredTimerList

TARGET_TIME:  2020-03-01T16:30:30.000Z

OSBUILD:  18362

OSSERVICEPACK:  657

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  2005-04-23 04:40:32

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  1e62

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x139_3_corrupt_list_entry_ktimer_list_corruption_nt!kiprocessexpiredtimerlist

FAILURE_ID_HASH:  {9db7945b-255d-24a1-9f2c-82344e883ab8}

Followup:     MachineOwner
---------
 
Hatalar incelendiğinde USB sürücüleri ve RAM hatası vermiş. Ayrıca Chrome'da hata vermiş. BIOS güncellemelerini yapıp temiz bir format atın. XMP açıksa kapatın ve memtest86 ile bir test yapın sonucu paylaşın.

Öncelikle cevabınız için teşekkür ederim. Format atmak en son çarem. Dediğiniz gibi XMP kapatıp test sonucunu akşam yükleyeceğim.

Ağ sürücülerini güvenli mod ile kaldırıp tekrar yükleyin.

VoiceMeeter, MSI Afterburner yazılımlarını kaldır.
Kod:
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000008, value 0 = read operation, 1 = write operation
Arg4: 0000000000000000, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

DUMP_TYPE:  2

BUGCHECK_P1: 0

BUGCHECK_P2: 2

BUGCHECK_P3: 8

BUGCHECK_P4: 0

READ_ADDRESS: fffff8015fd733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
0000000000000000

CURRENT_IRQL:  2

FAULTING_IP:
+0
00000000`00000000 ??              ???

PROCESS_NAME:  chrome.exe

CPU_COUNT: 8

CPU_MHZ: fa8

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 5e

CPU_STEPPING: 3

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  AV

ANALYSIS_SESSION_HOST:  DESKTOP-BKJR0DQ

ANALYSIS_SESSION_TIME:  03-06-2020 14:49:20.0257

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

TRAP_FRAME:  ffffef8451047560 -- (.trap 0xffffef8451047560)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000c6e8832000 rbx=0000000000000000 rcx=00000000c0000102
rdx=00000000000000c6 rsi=0000000000000000 rdi=0000000000000000
rip=0000000000000000 rsp=ffffef84510476f0 rbp=0000000000000000
r8=0000000000000000  r9=000000010000032c r10=ffffd8803d915180
r11=ffffb1837d01f080 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
00000000`00000000 ??              ???
Resetting default scope

IP_IN_FREE_BLOCK: 0

LAST_CONTROL_TRANSFER:  from fffff8015f9d41e9 to fffff8015f9c2380

FAILED_INSTRUCTION_ADDRESS:
+0
00000000`00000000 ??              ???

STACK_TEXT:
ffffef84`51047418 fffff801`5f9d41e9 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000008 : nt!KeBugCheckEx
ffffef84`51047420 fffff801`5f9d052b : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffef84`51047560 00000000`00000000 : 00000000`00000000 00000000`00000000 43f00000`00000000 00000000`00000000 : nt!KiPageFault+0x46b


THREAD_SHA1_HASH_MOD_FUNC:  bf99962f16aee8a6a536cfcc5454c0cd4db15ac9

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  497aaf2f8d4f907c0c9bce6ce025c930b885e2b8

THREAD_SHA1_HASH_MOD:  2a7ca9d3ab5386d53fea7498e1d81b9c4a4c036b

FOLLOWUP_IP:
nt!KiPageFault+46b
fffff801`5f9d052b 33c0            xor     eax,eax

FAULT_INSTR_CODE:  ffb0c033

SYMBOL_STACK_INDEX:  2

SYMBOL_NAME:  nt!KiPageFault+46b

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  0

IMAGE_VERSION:  10.0.18362.693

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  46b

FAILURE_BUCKET_ID:  AV_CODE_AV_NULL_IP_nt!KiPageFault

BUCKET_ID:  AV_CODE_AV_NULL_IP_nt!KiPageFault

PRIMARY_PROBLEM_CLASS:  AV_CODE_AV_NULL_IP_nt!KiPageFault

TARGET_TIME:  2020-03-05T12:06:06.000Z

OSBUILD:  18362

OSSERVICEPACK:  693

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  unknown_date

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  1303

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:av_code_av_null_ip_nt!kipagefault

FAILURE_ID_HASH:  {4ce35ff9-c5cf-d66d-0323-0f05e33f6692}

Followup:     MachineOwner
---------
ATTEMPTED_WRITE_TO_READONLY_MEMORY (be)
An attempt was made to write to readonly memory.  The guilty driver is on the
stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: fffff90002454fa8, Virtual address for the attempted write.
Arg2: 8a00000000200021, PTE contents.
Arg3: ffffbc01482176c0, (reserved)
Arg4: 000000000000000a, (reserved)

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

DUMP_TYPE:  2

BUGCHECK_P1: fffff90002454fa8

BUGCHECK_P2: 8a00000000200021

BUGCHECK_P3: ffffbc01482176c0

BUGCHECK_P4: a

CPU_COUNT: 8

CPU_MHZ: fa8

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 5e

CPU_STEPPING: 3

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  0xBE

PROCESS_NAME:  System

CURRENT_IRQL:  2

ANALYSIS_SESSION_HOST:  DESKTOP-BKJR0DQ

ANALYSIS_SESSION_TIME:  03-06-2020 14:49:16.0057

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

TRAP_FRAME:  ffffbc01482176c0 -- (.trap 0xffffbc01482176c0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffbc0148217828 rbx=0000000000000000 rcx=fffff90002454f90
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80161657502 rsp=ffffbc0148217850 rbp=fffff80161a6a380
r8=0000000080000000  r9=0000000000000003 r10=00000000000c1c53
r11=ffffe5899561c000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!MiLockNestedPageAtDpcInline+0xe:
fffff801`61657502 f0480fba69183f  lock bts qword ptr [rcx+18h],3Fh ds:fffff900`02454fa8=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff801618001e7 to fffff801617c2380

STACK_TEXT:
ffffbc01`482174d8 fffff801`618001e7 : 00000000`000000be fffff900`02454fa8 8a000000`00200021 ffffbc01`482176c0 : nt!KeBugCheckEx
ffffbc01`482174e0 fffff801`616c92fa : 8a000000`00200021 00000000`00000003 ffffbc01`48217620 00000000`00000000 : nt!MiRaisedIrqlFault+0x19e437
ffffbc01`48217520 fffff801`617d0420 : 00000000`00040202 fffff801`61721a84 00000048`0412017e ffffe589`95513080 : nt!MmAccessFault+0x48a
ffffbc01`482176c0 fffff801`61657502 : 00000000`00000000 00000000`00000000 fffff900`00000000 02000000`00000000 : nt!KiPageFault+0x360
ffffbc01`48217850 fffff801`616d9efc : fffff900`00000000 fffff801`61a6a380 00000000`00000000 ffff9c4d`20447050 : nt!MiLockNestedPageAtDpcInline+0xe
ffffbc01`48217880 fffff801`6175ee4d : e589a2f1`bf3004d0 00000000`00000001 00000000`00000000 fffff900`0567e640 : nt!MiRestoreTransitionPte+0x18c
ffffbc01`482178f0 fffff801`618db1e8 : 00000000`00000000 fffff900`05678670 fffff801`00000000 00000000`00000000 : nt!MiRemoveLowestPriorityStandbyPage+0x1bd
ffffbc01`48217990 fffff801`618db3f3 : fffff801`61a6a380 00000000`00000000 fffff801`00000000 00000000`00000206 : nt!MiPruneStandbyPages+0x250
ffffbc01`48217a20 fffff801`616f43c5 : ffffe589`a93ca040 fffff801`618db360 ffffe589`9547c520 fffff801`61a6c020 : nt!MiRebalanceZeroFreeLists+0x93
ffffbc01`48217a70 fffff801`6166bce5 : ffffe589`a93ca040 00000000`00000080 ffffe589`954b0040 28614c2e`00000001 : nt!ExpWorkerThread+0x105
ffffbc01`48217b10 fffff801`617c99ca : ffffd100`6fb43180 ffffe589`a93ca040 fffff801`6166bc90 637d0a0a`3b292861 : nt!PspSystemThreadStartup+0x55
ffffbc01`48217b60 00000000`00000000 : ffffbc01`48218000 ffffbc01`48211000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x2a


THREAD_SHA1_HASH_MOD_FUNC:  5554ee5f6880683562b6941626d7551fcb7a2f59

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  ff3954ede0aab373441df887cc46f40ca9d1197f

THREAD_SHA1_HASH_MOD:  dc844b1b94baa204d070855e43bbbd27eee98b94

FOLLOWUP_IP:
nt!MiRaisedIrqlFault+19e437
fffff801`618001e7 cc              int     3

FAULT_INSTR_CODE:  cf8b48cc

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!MiRaisedIrqlFault+19e437

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP:  0

IMAGE_VERSION:  10.0.18362.693

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  memory_corruption

BUCKET_ID_FUNC_OFFSET:  19e437

FAILURE_BUCKET_ID:  0xBE_nt!MiRaisedIrqlFault

BUCKET_ID:  0xBE_nt!MiRaisedIrqlFault

PRIMARY_PROBLEM_CLASS:  0xBE_nt!MiRaisedIrqlFault

TARGET_TIME:  2020-03-05T15:45:25.000Z

OSBUILD:  18362

OSSERVICEPACK:  693

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  unknown_date

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  1cd0

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0xbe_nt!miraisedirqlfault

FAILURE_ID_HASH:  {1c5b4d11-09e0-def3-d2d0-70a11d69b92d}

Followup:     MachineOwner
---------

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8075796d92a, The address that the exception occurred at
Arg3: ffffe9085dfd7048, Parameter 0 of the exception
Arg4: fffff80758211930, Parameter 1 of the exception

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

DUMP_TYPE:  2

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff8075796d92a

BUGCHECK_P3: ffffe9085dfd7048

BUGCHECK_P4: fffff80758211930

WRITE_ADDRESS: fffff8074fd733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80758211930

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP:
tcpip!TcpUpdateTcbEstats+a094e
fffff807`5796d92a 488908          mov     qword ptr [rax],rcx

EXCEPTION_PARAMETER1:  ffffe9085dfd7048

EXCEPTION_PARAMETER2:  fffff80758211930

BUGCHECK_STR:  0x1E_c0000005

CPU_COUNT: 8

CPU_MHZ: fa8

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 5e

CPU_STEPPING: 3

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  System

CURRENT_IRQL:  2

ANALYSIS_SESSION_HOST:  DESKTOP-BKJR0DQ

ANALYSIS_SESSION_TIME:  03-06-2020 14:49:12.0743

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

BAD_STACK_POINTER:  fffff80758211088

LAST_CONTROL_TRANSFER:  from fffff8074faa6667 to fffff8074f9c1510

STACK_TEXT:
fffff807`58211088 fffff807`4faa6667 : 00000000`0000001e ffffffff`c0000005 fffff807`5796d92a ffffe908`5dfd7048 : nt!KeBugCheckEx
fffff807`58211090 fffff807`4f9d9236 : fffff807`5796d92a fffff807`4f91657b ffffe908`5dfd7280 fffff807`58211930 : nt!KiFatalFilter+0x1f
fffff807`582110d0 fffff807`4f99c569 : fffff807`00000002 ffffe908`5dfd7fd0 ffffe908`5dfd2000 ffffe908`5dfd9000 : nt!KeExpandKernelStackAndCalloutInternal$filt$0+0x16
fffff807`58211110 fffff807`4f9ca33f : ffffe908`5dfd7fd0 fffff807`582116f0 00000000`00000000 00000000`0010001f : nt!_C_specific_handler+0xa9
fffff807`58211180 fffff807`4f8c2f15 : 00000000`00000000 00000000`00000000 fffff807`582116f0 00007fff`ffff0000 : nt!RtlpExecuteHandlerForException+0xf
fffff807`582111b0 fffff807`4f8c74ae : ffffe908`5dfd7048 fffff807`58211e30 ffffe908`5dfd7048 ffff9f8e`8d369bb0 : nt!RtlDispatchException+0x4a5
fffff807`58211900 fffff807`4f9c2392 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x16e
fffff807`58211fb0 fffff807`4f9c2360 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxExceptionDispatchOnExceptionStack+0x12
ffffe908`5dfd6f08 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatchOnExceptionStackContinue


THREAD_SHA1_HASH_MOD_FUNC:  807003e66859482870638b72b993eaa394e895d2

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  d1c6fea8880f54a80c34f15b65b52096254d6271

THREAD_SHA1_HASH_MOD:  9f457f347057f10e1df248e166a3e95e6570ecfe

FOLLOWUP_IP:
tcpip!TcpUpdateTcbEstats+a094e
fffff807`5796d92a 488908          mov     qword ptr [rax],rcx

FAULT_INSTR_CODE:  48088948

SYMBOL_NAME:  tcpip!TcpUpdateTcbEstats+a094e

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: tcpip

IMAGE_NAME:  tcpip.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  0

IMAGE_VERSION:  10.0.18362.628

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  a094e

FAILURE_BUCKET_ID:  0x1E_c0000005_STACKPTR_ERROR_tcpip!TcpUpdateTcbEstats

BUCKET_ID:  0x1E_c0000005_STACKPTR_ERROR_tcpip!TcpUpdateTcbEstats

PRIMARY_PROBLEM_CLASS:  0x1E_c0000005_STACKPTR_ERROR_tcpip!TcpUpdateTcbEstats

TARGET_TIME:  2020-03-04T20:20:17.000Z

OSBUILD:  18362

OSSERVICEPACK:  657

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  2005-04-23 04:40:32

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  3316

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x1e_c0000005_stackptr_error_tcpip!tcpupdatetcbestats

FAILURE_ID_HASH:  {9be197c9-77f2-d2e5-1a6c-ac645429614b}

Followup:     MachineOwner
---------
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8071013ab62, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

DUMP_TYPE:  2

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff8071013ab62

BUGCHECK_P3: 0

BUGCHECK_P4: ffffffffffffffff

READ_ADDRESS: fffff8070eb733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
ffffffffffffffff

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP:
Wdf01000!FxDevice::DispatchWithLock+a2 [minkernel\wdf\framework\shared\core\fxdevice.cpp @ 1430]
fffff807`1013ab62 4e8b5c0610      mov     r11,qword ptr [rsi+r8+10h]

EXCEPTION_PARAMETER2:  ffffffffffffffff

BUGCHECK_STR:  0x1E_c0000005_R

CPU_COUNT: 8

CPU_MHZ: fa8

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 5e

CPU_STEPPING: 3

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  voicemeeterpro.exe

CURRENT_IRQL:  2

ANALYSIS_SESSION_HOST:  DESKTOP-BKJR0DQ

ANALYSIS_SESSION_TIME:  03-06-2020 14:49:09.0293

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

DPC_STACK_BASE:  FFFFFB805DC37FB0

LAST_CONTROL_TRANSFER:  from fffff8070e8a663e to fffff8070e7c1510

STACK_TEXT:
fffffb80`5dc35bf8 fffff807`0e8a663e : 00000000`0000001e ffffffff`c0000005 fffff807`1013ab62 00000000`00000000 : nt!KeBugCheckEx
fffffb80`5dc35c00 fffff807`0e7ca33f : fffff807`0eb11000 fffff807`0e600000 0005e530`00ab6000 00000000`0010001f : nt!KiFatalExceptionHandler+0x22
fffffb80`5dc35c40 fffff807`0e6c2f15 : 00000000`00000000 00000000`00000000 fffffb80`5dc361b0 00007fff`ffff0000 : nt!RtlpExecuteHandlerForException+0xf
fffffb80`5dc35c70 fffff807`0e6c74ae : fffffb80`5dc36ba8 fffffb80`5dc368f0 fffffb80`5dc36ba8 ffff9803`7b121020 : nt!RtlDispatchException+0x4a5
fffffb80`5dc363c0 fffff807`0e7d351d : 00000000`00000000 fffff807`2a6a5b96 00000000`00000000 00000000`00000009 : nt!KiDispatchException+0x16e
fffffb80`5dc36a70 fffff807`0e7cf2a2 : 00000000`00001001 00000000`00000fff ffff9803`00000d4e 00000000`00000030 : nt!KiExceptionDispatch+0x11d
fffffb80`5dc36c50 fffff807`1013ab62 : ffff9803`7b527010 ffff9803`7b527010 fffff807`10148670 ffff9803`75b1f750 : nt!KiGeneralProtectionFault+0x322
fffffb80`5dc36de0 fffff807`0e631f79 : ffff9803`7b527010 ffff9803`75c0f6b0 ffff9803`8b8bfce0 ffff9803`75c0f6b0 : Wdf01000!FxDevice::DispatchWithLock+0xa2 [minkernel\wdf\framework\shared\core\fxdevice.cpp @ 1430]
fffffb80`5dc36e40 fffff807`102d14ad : ffff9803`75c0f6b0 ffff9803`7b527010 00000000`00086676 00000000`00000040 : nt!IofCallDriver+0x59
fffffb80`5dc36e80 fffff807`102d10d8 : ffff9803`71fd0bc0 00000000`00000007 ffff9803`7b5274d0 00000000`00000000 : ACPI!ACPIIrpDispatchDeviceControl+0xad
fffffb80`5dc36ec0 fffff807`0e631f79 : 00000000`00000007 ffff9803`7b527010 fffffb80`5dc37049 00000000`00000001 : ACPI!ACPIDispatchIrp+0xc8
fffffb80`5dc36f40 fffff807`2c401dc4 : 00000000`00000000 ffff9803`7b527010 fffffb80`5dc37049 00000000`00000001 : nt!IofCallDriver+0x59
fffffb80`5dc36f80 fffff807`2c4019b6 : 00000000`00000009 00000000`00000200 ffff9803`7b4739c8 fffff807`0e96f06d : usbccgp!DispatchPdoUrb+0x2b4
fffffb80`5dc370b0 fffff807`2c4012a8 : ffff9803`7b527010 ffff9803`7b4671b0 ffff9803`7b4671b8 fffff807`00000000 : usbccgp!DispatchPdoInternalDeviceControl+0x1c6
fffffb80`5dc37120 fffff807`0e631f79 : ffff9803`7b467060 00000000`00000001 00000000`00000000 fffffb80`00000000 : usbccgp!USBC_Dispatch+0x298
fffffb80`5dc371f0 fffff807`2c4413d0 : 00000000`00000000 fffffb80`5dc37330 00000000`00000000 fffff807`00000000 : nt!IofCallDriver+0x59
fffffb80`5dc37230 fffff807`2c4695df : ffff9803`00000000 ffff9803`7b565280 ffff9803`7b565280 fffff807`2c484000 : hidusb!HumInternalIoctl+0x3c0
fffffb80`5dc37520 fffff807`2c46a9ec : ffff9803`7b565280 fffffb80`5dc376e9 fffff807`2c47e1e0 00000000`00000009 : HIDCLASS!HidpSubmitInterruptRead+0x1af
fffffb80`5dc375a0 fffff807`0e6477d9 : ffff9803`7b527010 ffff9803`7b527010 fffffb80`5dc37601 ffff9803`7b527400 : HIDCLASS!HidpInterruptReadComplete+0x57c
fffffb80`5dc37640 fffff807`0e6476a7 : ffff9803`817c4010 fffff807`2a638f00 00000000`00000001 00000000`00000001 : nt!IopfCompleteRequest+0x119
fffffb80`5dc37750 fffff807`101383fd : 00000000`00000000 ffff9803`7d5e0020 00000000`00000002 fffff807`2a629700 : nt!IofCompleteRequest+0x17
fffffb80`5dc37780 fffff807`10137ecb : ffff9803`7d5e0102 fffffb80`5dc378a1 ffff9803`7b527010 00000000`00000000 : Wdf01000!FxRequest::CompleteInternal+0x22d [minkernel\wdf\framework\shared\core\fxrequest.cpp @ 869]
fffffb80`5dc37810 fffff807`2a637e80 : 00000000`ffffff02 ffff9803`7d5e0020 ffff9803`7b46e4b0 ffff9803`7b46e4b0 : Wdf01000!imp_WdfRequestComplete+0x8b [minkernel\wdf\framework\shared\core\fxrequestapi.cpp @ 436]
fffffb80`5dc37870 fffff807`2a635cf4 : ffff9803`7d5e01c0 ffff9803`7b46e510 ffff9803`7d5e0250 fffffb80`5dc37b48 : USBXHCI!Bulk_Transfer_CompleteCancelable+0x19c
fffffb80`5dc378d0 fffff807`2a634460 : 00000001`00000000 00000000`00000000 ffff9803`7fcc2400 fffff807`1021208d : USBXHCI!Bulk_ProcessTransferEventWithED1+0x464
fffffb80`5dc37990 fffff807`2a6298d3 : ffff9803`7b17d7c0 ffffd680`95e05f10 00000000`01400180 fffffb80`5dc37ac0 : USBXHCI!Bulk_EP_TransferEventHandler+0x10
fffffb80`5dc379c0 fffff807`2a61ba4f : 00000000`0000002b fffffb80`5dc37ab1 ffff9803`75e7d010 fffff807`2a6034b9 : USBXHCI!TR_TransferEventHandler+0x17
fffffb80`5dc379f0 fffff807`2a63c2be : fffffb80`5dc37b48 fffffb80`5dc37b18 00000000`00000000 fffffb80`5dc37b20 : USBXHCI!Endpoint_TransferEventHandler+0x167
fffffb80`5dc37a70 fffff807`2a61ea3c : ffff9803`75811ab0 fffffb80`5dc37b69 00000000`00000001 ffff9803`75f91300 : USBXHCI!UsbDevice_TransferEventHandler+0xa6
fffffb80`5dc37ad0 fffff807`2a61f55c : ffff9803`723ffe48 ffff9803`71f59040 00000000`00000010 ffff9803`758118b0 : USBXHCI!Interrupter_DeferredWorkProcessor+0x578
fffffb80`5dc37bd0 fffff807`101326ad : 00000000`00000f44 00000000`00400a02 00000000`00000000 fffffb80`5dc37c90 : USBXHCI!Interrupter_WdfEvtInterruptDpc+0xc
fffffb80`5dc37c00 fffff807`0e66ae95 : ffffd680`95e02f80 ffff9803`7200f000 ffffd680`95e05f90 ffffd680`00000002 : Wdf01000!FxInterrupt::_InterruptDpcThunk+0x9d [minkernel\wdf\framework\shared\irphandlers\pnp\km\interruptobjectkm.cpp @ 410]
fffffb80`5dc37c40 fffff807`0e66a4ef : ffffd680`95e00180 00000000`00000000 00000000`00000002 00000000`00000004 : nt!KiExecuteAllDpcs+0x305
fffffb80`5dc37d80 fffff807`0e7c8555 : 00000000`00000000 ffffd680`95e00180 ffffd680`96393780 00000000`00000000 : nt!KiRetireDpcList+0x1ef
fffffb80`5dc37fb0 fffff807`0e7c8340 : 00000000`00000000 fffff807`0f0b92cb 00000000`06e2f940 00000000`06d2fda0 : nt!KxRetireDpcList+0x5
fffffb80`60de79c0 fffff807`0e7c7bf5 : 00000000`00000000 fffff807`0e7c3071 00000000`00000000 fffffb80`60de7a80 : nt!KiDispatchInterruptContinue
fffffb80`60de79f0 fffff807`0e7c3071 : 00000000`00000000 fffffb80`60de7a80 ffffd680`96393780 00000000`0103bce0 : nt!KiDpcInterruptBypass+0x25
fffffb80`60de7a00 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatch+0xb1


THREAD_SHA1_HASH_MOD_FUNC:  8bce4d95c2a018454cba752eb1ace33c984dc79e

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  58be9476b324e3d4bfa064d64f8fa3ea9296ab16

THREAD_SHA1_HASH_MOD:  f8ed7e0778976230dc3d683d9350c73515435761

FOLLOWUP_IP:
hidusb!HumInternalIoctl+3c0
fffff807`2c4413d0 8bd8            mov     ebx,eax

FAULT_INSTR_CODE:  8840d88b

SYMBOL_STACK_INDEX:  10

SYMBOL_NAME:  hidusb!HumInternalIoctl+3c0

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: hidusb

IMAGE_NAME:  hidusb.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  7b9189fe

IMAGE_VERSION:  10.0.18362.175

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  3c0

FAILURE_BUCKET_ID:  0x1E_c0000005_R_hidusb!HumInternalIoctl

BUCKET_ID:  0x1E_c0000005_R_hidusb!HumInternalIoctl

PRIMARY_PROBLEM_CLASS:  0x1E_c0000005_R_hidusb!HumInternalIoctl

TARGET_TIME:  2020-03-02T11:04:21.000Z

OSBUILD:  18362

OSSERVICEPACK:  657

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  2005-04-23 04:40:32

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  39ab

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x1e_c0000005_r_hidusb!huminternalioctl

FAILURE_ID_HASH:  {1db1b3ef-c820-f961-4df4-46999018d214}

Followup:     MachineOwner
---------

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: fffff60e15c2f6b0, Address of the trap frame for the exception that caused the bugcheck
Arg3: fffff60e15c2f608, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

DUMP_TYPE:  2

BUGCHECK_P1: 3

BUGCHECK_P2: fffff60e15c2f6b0

BUGCHECK_P3: fffff60e15c2f608

BUGCHECK_P4: 0

TRAP_FRAME:  fffff60e15c2f6b0 -- (.trap 0xfffff60e15c2f6b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffa88c8fcb73e8 rbx=0000000000000000 rcx=0000000000000003
rdx=000000000000082f rsi=0000000000000000 rdi=0000000000000000
rip=fffff8046206bb54 rsp=fffff60e15c2f840 rbp=ffffa88c96e84500
r8=000000000000082f  r9=000000000000002f r10=fffff80462ab7aa0
r11=fffff60e15c2f740 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po cy
nt!KiProcessExpiredTimerList+0x234:
fffff804`6206bb54 cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  fffff60e15c2f608 -- (.exr 0xfffff60e15c2f608)
ExceptionAddress: fffff8046206bb54 (nt!KiProcessExpiredTimerList+0x0000000000000234)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

CPU_COUNT: 8

CPU_MHZ: fa8

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 5e

CPU_STEPPING: 3

CUSTOMER_CRASH_COUNT:  1

BUGCHECK_STR:  0x139

PROCESS_NAME:  System

CURRENT_IRQL:  2

DEFAULT_BUCKET_ID:  FAIL_FAST_CORRUPT_LIST_ENTRY

ERROR_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>

EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000003

ANALYSIS_SESSION_HOST:  DESKTOP-BKJR0DQ

ANALYSIS_SESSION_TIME:  03-06-2020 14:49:05.0295

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

LAST_CONTROL_TRANSFER:  from fffff804621d33e9 to fffff804621c1510

STACK_TEXT:
fffff60e`15c2f388 fffff804`621d33e9 : 00000000`00000139 00000000`00000003 fffff60e`15c2f6b0 fffff60e`15c2f608 : nt!KeBugCheckEx
fffff60e`15c2f390 fffff804`621d3810 : ffffa88c`9da89de0 00000000`00000000 ffffa88c`9a6f7080 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff60e`15c2f4d0 fffff804`621d1ba5 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xd0
fffff60e`15c2f6b0 fffff804`6206bb54 : ffffa88c`96e84440 ffffa88c`8e8541f0 00000001`00000002 ffffa88c`8a2b7010 : nt!KiRaiseSecurityCheckFailure+0x325
fffff60e`15c2f840 fffff804`6206a7e9 : 00000000`0000001e 00000000`00989680 00000000`0062e214 00000000`0000002c : nt!KiProcessExpiredTimerList+0x234
fffff60e`15c2f930 fffff804`621c5054 : 00000000`00000000 ffff8001`d9c00180 ffff8001`d9c11240 ffffa88c`91747080 : nt!KiRetireDpcList+0x4e9
fffff60e`15c2fb60 00000000`00000000 : fffff60e`15c30000 fffff60e`15c29000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x84


THREAD_SHA1_HASH_MOD_FUNC:  a5119ebdc9ff71d34433e0daf4177502fc924f29

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  060f65eb7dbeac629aaa0950c72f0d4dec6c7f1c

THREAD_SHA1_HASH_MOD:  30a3e915496deaace47137d5b90c3ecc03746bf6

FOLLOWUP_IP:
nt!KiProcessExpiredTimerList+234
fffff804`6206bb54 cd29            int     29h

FAULT_INSTR_CODE:  8b4829cd

SYMBOL_STACK_INDEX:  4

SYMBOL_NAME:  nt!KiProcessExpiredTimerList+234

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4269a790

IMAGE_VERSION:  10.0.18362.657

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  234

FAILURE_BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiProcessExpiredTimerList

BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiProcessExpiredTimerList

PRIMARY_PROBLEM_CLASS:  0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiProcessExpiredTimerList

TARGET_TIME:  2020-03-01T16:30:30.000Z

OSBUILD:  18362

OSSERVICEPACK:  657

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  2005-04-23 04:40:32

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  1e62

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x139_3_corrupt_list_entry_ktimer_list_corruption_nt!kiprocessexpiredtimerlist

FAILURE_ID_HASH:  {9db7945b-255d-24a1-9f2c-82344e883ab8}

Followup:     MachineOwner
---------

VoiceMeeter kesin kullanmam gerek bir program temiz bir şekilde kaldırıp tekrar kuracağım. Ağ sürücülerini de tekrar yükleyip sonucu paylaşacağım. Teşekkürler.
Format attıktan yaklaşık 1 hafta sonra tekrar mavi ekran hatası aldım. Minidump dosyasını yüklüyorum, yardımcı olan herkese teşekkürler.
Link: Hata.rar
 
Son düzenleme:
USB üzerinden ne takıyorsun bu cihaza?

Memtest86 testi yapar mısın?
Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.

Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.

Kod:
UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault).  The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
        use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
        use .trap on that value
Else
        .trap on the appropriate frame will show where the trap was taken
        (on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: ffffa881ebe0b090
Arg3: 00000000e023784f
Arg4: fffff80184831fba

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  MSI

SYSTEM_PRODUCT_NAME:  MS-7A68

SYSTEM_SKU:  Default string

SYSTEM_VERSION:  1.0

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  1.70

BIOS_DATE:  07/03/2018

BASEBOARD_MANUFACTURER:  MSI

BASEBOARD_PRODUCT:  Z270 TOMAHAWK (MS-7A68)

BASEBOARD_VERSION:  1.0

DUMP_TYPE:  2

BUGCHECK_P1: 8

BUGCHECK_P2: ffffa881ebe0b090

BUGCHECK_P3: e023784f

BUGCHECK_P4: fffff80184831fba

BUGCHECK_STR:  0x7f_8

TRAP_FRAME:  ffffa881ebe0b090 -- (.trap 0xffffa881ebe0b090)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000009 rbx=0000000000000000 rcx=ffff8386a0bdd960
rdx=0000000000000002 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80184831fba rsp=00000000e023784f rbp=ffff8386a9edf690
 r8=0000000000000000  r9=0000000000000000 r10=0000000000000000
r11=0000000000000001 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
USBXHCI!Isoch_TransferUrb_Initialize+0x122:
fffff801`84831fba e801c7fdff      call    USBXHCI!Controller_GetFrameNumber (fffff801`8480e6c0)
Resetting default scope

CPU_COUNT: 8

CPU_MHZ: fa8

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 5e

CPU_STEPPING: 3

CPU_MICROCODE: 6,5e,3,0 (F,M,S,R)  SIG: C6'00000000 (cache) C6'00000000 (init)

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  ModernWarfare.exe

CURRENT_IRQL:  2

ANALYSIS_SESSION_HOST:  DESKTOP-BKJR0DQ

ANALYSIS_SESSION_TIME:  03-18-2020 16:13:39.0061

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

BAD_STACK_POINTER:  00000000e023784f

UNALIGNED_STACK_POINTER:  00000000e023784f

LAST_CONTROL_TRANSFER:  from fffff801671d41e9 to fffff801671c2380

STACK_TEXT: 
ffffa881`ebe0af48 fffff801`671d41e9 : 00000000`0000007f 00000000`00000008 ffffa881`ebe0b090 00000000`e023784f : nt!KeBugCheckEx
ffffa881`ebe0af50 fffff801`671cf045 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffa881`ebe0b090 fffff801`84831fba : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0x2c5
00000000`e023784f 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : USBXHCI!Isoch_TransferUrb_Initialize+0x122


THREAD_SHA1_HASH_MOD_FUNC:  b4fd67d3913a3c3e5139e97a8e01c1ea5f13d31f

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  63208fa8e192fb073badf5657e29e9a33f336a69

THREAD_SHA1_HASH_MOD:  d0b8d0e314cf97ce749783c2f2ecf22742f8b6fb

FOLLOWUP_IP:
USBXHCI!Isoch_TransferUrb_Initialize+122
fffff801`84831fba e801c7fdff      call    USBXHCI!Controller_GetFrameNumber (fffff801`8480e6c0)

FAULT_INSTR_CODE:  fdc701e8

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  USBXHCI!Isoch_TransferUrb_Initialize+122

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: USBXHCI

IMAGE_NAME:  USBXHCI.SYS

DEBUG_FLR_IMAGE_TIMESTAMP:  0

IMAGE_VERSION:  10.0.18362.693

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  122

FAILURE_BUCKET_ID:  0x7f_8_STACKPTR_ERROR_USBXHCI!Isoch_TransferUrb_Initialize

BUCKET_ID:  0x7f_8_STACKPTR_ERROR_USBXHCI!Isoch_TransferUrb_Initialize

PRIMARY_PROBLEM_CLASS:  0x7f_8_STACKPTR_ERROR_USBXHCI!Isoch_TransferUrb_Initialize

TARGET_TIME:  2020-03-18T12:53:49.000Z

OSBUILD:  18362

OSSERVICEPACK:  720

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  unknown_date

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  5927

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x7f_8_stackptr_error_usbxhci!isoch_transferurb_initialize

FAILURE_ID_HASH:  {34e5a3d1-40cd-bde5-193a-53aa37b7730d}

Followup:     MachineOwner
---------
 
USB üzerinden ne takıyorsun bu cihaza?

Memtest86 testi yapar mısın?
Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.

Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.

Kod:
UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault).  The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
        use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
        use .trap on that value
Else
        .trap on the appropriate frame will show where the trap was taken
        (on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: ffffa881ebe0b090
Arg3: 00000000e023784f
Arg4: fffff80184831fba

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  MSI

SYSTEM_PRODUCT_NAME:  MS-7A68

SYSTEM_SKU:  Default string

SYSTEM_VERSION:  1.0

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  1.70

BIOS_DATE:  07/03/2018

BASEBOARD_MANUFACTURER:  MSI

BASEBOARD_PRODUCT:  Z270 TOMAHAWK (MS-7A68)

BASEBOARD_VERSION:  1.0

DUMP_TYPE:  2

BUGCHECK_P1: 8

BUGCHECK_P2: ffffa881ebe0b090

BUGCHECK_P3: e023784f

BUGCHECK_P4: fffff80184831fba

BUGCHECK_STR:  0x7f_8

TRAP_FRAME:  ffffa881ebe0b090 -- (.trap 0xffffa881ebe0b090)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000009 rbx=0000000000000000 rcx=ffff8386a0bdd960
rdx=0000000000000002 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80184831fba rsp=00000000e023784f rbp=ffff8386a9edf690
r8=0000000000000000  r9=0000000000000000 r10=0000000000000000
r11=0000000000000001 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
USBXHCI!Isoch_TransferUrb_Initialize+0x122:
fffff801`84831fba e801c7fdff      call    USBXHCI!Controller_GetFrameNumber (fffff801`8480e6c0)
Resetting default scope

CPU_COUNT: 8

CPU_MHZ: fa8

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 5e

CPU_STEPPING: 3

CPU_MICROCODE: 6,5e,3,0 (F,M,S,R)  SIG: C6'00000000 (cache) C6'00000000 (init)

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  ModernWarfare.exe

CURRENT_IRQL:  2

ANALYSIS_SESSION_HOST:  DESKTOP-BKJR0DQ

ANALYSIS_SESSION_TIME:  03-18-2020 16:13:39.0061

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

BAD_STACK_POINTER:  00000000e023784f

UNALIGNED_STACK_POINTER:  00000000e023784f

LAST_CONTROL_TRANSFER:  from fffff801671d41e9 to fffff801671c2380

STACK_TEXT:
ffffa881`ebe0af48 fffff801`671d41e9 : 00000000`0000007f 00000000`00000008 ffffa881`ebe0b090 00000000`e023784f : nt!KeBugCheckEx
ffffa881`ebe0af50 fffff801`671cf045 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffa881`ebe0b090 fffff801`84831fba : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0x2c5
00000000`e023784f 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : USBXHCI!Isoch_TransferUrb_Initialize+0x122


THREAD_SHA1_HASH_MOD_FUNC:  b4fd67d3913a3c3e5139e97a8e01c1ea5f13d31f

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  63208fa8e192fb073badf5657e29e9a33f336a69

THREAD_SHA1_HASH_MOD:  d0b8d0e314cf97ce749783c2f2ecf22742f8b6fb

FOLLOWUP_IP:
USBXHCI!Isoch_TransferUrb_Initialize+122
fffff801`84831fba e801c7fdff      call    USBXHCI!Controller_GetFrameNumber (fffff801`8480e6c0)

FAULT_INSTR_CODE:  fdc701e8

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  USBXHCI!Isoch_TransferUrb_Initialize+122

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: USBXHCI

IMAGE_NAME:  USBXHCI.SYS

DEBUG_FLR_IMAGE_TIMESTAMP:  0

IMAGE_VERSION:  10.0.18362.693

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  122

FAILURE_BUCKET_ID:  0x7f_8_STACKPTR_ERROR_USBXHCI!Isoch_TransferUrb_Initialize

BUCKET_ID:  0x7f_8_STACKPTR_ERROR_USBXHCI!Isoch_TransferUrb_Initialize

PRIMARY_PROBLEM_CLASS:  0x7f_8_STACKPTR_ERROR_USBXHCI!Isoch_TransferUrb_Initialize

TARGET_TIME:  2020-03-18T12:53:49.000Z

OSBUILD:  18362

OSSERVICEPACK:  720

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  unknown_date

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  5927

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x7f_8_stackptr_error_usbxhci!isoch_transferurb_initialize

FAILURE_ID_HASH:  {34e5a3d1-40cd-bde5-193a-53aa37b7730d}

Followup:     MachineOwner
---------

Format atamdan önce memtest86 testi yapmıştım çok çok uzun sürmüştü ama hiç hata göstermemişti. USB girişlerinde; klavye, kablosuz mouse alıcısı ve kulaklık takılı.
 
Uyarı! Bu konu 6 yıl önce açıldı.
Muhtemelen daha fazla tartışma gerekli değildir ki bu durumda yeni bir konu başlatmayı öneririz. Eğer yine de cevabınızın gerekli olduğunu düşünüyorsanız buna rağmen cevap verebilirsiniz.

Technopat Haberler

Yeni konular

Yeni mesajlar

Geri
Yukarı