Windows 10 Mavi Ekran Hatası ntoskrnl.exe - nvlddmkm.sys

1delifisek

Centipat
Katılım
5 Mart 2020
Mesajlar
7
Yer
Malatya
Daha fazla  
Cinsiyet
Erkek
Meslek
Director of Academy Computing
Merhabalar, bütün secenekleri denedim ama temiz kurulumdan 1 hafta sonra aynı sorunlarla karşılaşıyorum, sorunun yazılımsal mı, donanımsal mı olduğunu çözemedim.
Minidump klasörü ve AIDA64 HTML raporu aşagıdaki baglantıya bıraktım, şimdiden yardımlarınız için teşekkür ediyorum.

Minidump: 05.03.2020 (minidump).rar

AIDA64 HTML raporu: Report.htm
 
Son düzenleyen: Moderatör:
Benzer sorunu, HD630'un driver'ı sorunlu olduğu için ekran kartı geçişi(Nvidia optimus Tech) sırasında mavi ekran alıyordum. Tümleşik ve ayrık ekran kartının driverlarını kaldırıp, son sürüm yerine en kararlı sürümü kurup tekrar deneyin.

Denedim sonuç aynı.
 
IObit araçları kullanıyorsan da ondan, tekrar temiz kurulum yap bu araçları kullanma.

Memtest86 testi yap.
Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.
Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.

Kod:
UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault).  The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
        use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
        use .trap on that value
Else
        .trap on the appropriate frame will show where the trap was taken
        (on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: fffff80737220e50
Arg3: fffff80737218fc0
Arg4: fffff807339d00d0

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  Micro-Star International Co., Ltd.

SYSTEM_PRODUCT_NAME:  GL62 6QD

SYSTEM_SKU:  Default string

SYSTEM_VERSION:  REV:1.0

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  E16J6IMS.10C

BIOS_DATE:  01/17/2018

BASEBOARD_MANUFACTURER:  Micro-Star International Co., Ltd.

BASEBOARD_PRODUCT:  MS-16J6

BASEBOARD_VERSION:  REV:1.0

DUMP_TYPE:  2

BUGCHECK_P1: 8

BUGCHECK_P2: fffff80737220e50

BUGCHECK_P3: fffff80737218fc0

BUGCHECK_P4: fffff807339d00d0

BUGCHECK_STR:  0x7f_8

TRAP_FRAME:  fffff80737218fc0 -- (.trap 0xfffff80737218fc0)
Unable to read trap frame at fffff807`37218fc0

CPU_COUNT: 8

CPU_MHZ: a20

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 5e

CPU_STEPPING: 3

CPU_MICROCODE: 6,5e,3,0 (F,M,S,R)  SIG: CC'00000000 (cache) CC'00000000 (init)

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  System

CURRENT_IRQL:  9

ANALYSIS_SESSION_HOST:  DESKTOP-BKJR0DQ

ANALYSIS_SESSION_TIME:  03-06-2020 14:39:43.0699

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

LAST_CONTROL_TRANSFER:  from fffff807339d41e9 to fffff807339c2380

STACK_TEXT: 
fffff807`37220d08 fffff807`339d41e9 : 00000000`0000007f 00000000`00000008 fffff807`37220e50 fffff807`37218fc0 : nt!KeBugCheckEx
fffff807`37220d10 fffff807`339cf045 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff807`37220e50 fffff807`339d00d0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0x2c5
fffff807`37218fc0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x10


THREAD_SHA1_HASH_MOD_FUNC:  6109c38a4ebf4817fe9dd816c5033a788d283436

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  9637f56d38454a892f1792c3b2ff84e9951b3a5c

THREAD_SHA1_HASH_MOD:  d084f7dfa548ce4e51810e4fd5914176ebc66791

FOLLOWUP_IP:
nt!KiDoubleFaultAbort+2c5
fffff807`339cf045 90              nop

FAULT_INSTR_CODE:  6666c390

SYMBOL_STACK_INDEX:  2

SYMBOL_NAME:  nt!KiDoubleFaultAbort+2c5

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  0

IMAGE_VERSION:  10.0.18362.693

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  2c5

FAILURE_BUCKET_ID:  0x7f_8_nt!KiDoubleFaultAbort

BUCKET_ID:  0x7f_8_nt!KiDoubleFaultAbort

PRIMARY_PROBLEM_CLASS:  0x7f_8_nt!KiDoubleFaultAbort

TARGET_TIME:  2020-03-05T21:20:51.000Z

OSBUILD:  18362

OSSERVICEPACK:  693

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  unknown_date

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  10d75

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x7f_8_nt!kidoublefaultabort

FAILURE_ID_HASH:  {d1f8395a-8c58-45da-6ebf-e8bb4aad2fc5}

Followup:     MachineOwner
---------


IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 00000000000000ab, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80749cbc9de, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  Micro-Star International Co., Ltd.

SYSTEM_PRODUCT_NAME:  GL62 6QD

SYSTEM_SKU:  Default string

SYSTEM_VERSION:  REV:1.0

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  E16J6IMS.10C

BIOS_DATE:  01/17/2018

BASEBOARD_MANUFACTURER:  Micro-Star International Co., Ltd.

BASEBOARD_PRODUCT:  MS-16J6

BASEBOARD_VERSION:  REV:1.0

DUMP_TYPE:  2

BUGCHECK_P1: ab

BUGCHECK_P2: ff

BUGCHECK_P3: 0

BUGCHECK_P4: fffff80749cbc9de

READ_ADDRESS: fffff8074a1733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
 00000000000000ab

CURRENT_IRQL:  0

FAULTING_IP:
nt!KeResumeClockTimerFromIdle+be
fffff807`49cbc9de 488b9c24a8000000 mov     rbx,qword ptr [rsp+0A8h]

CPU_COUNT: 8

CPU_MHZ: a20

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 5e

CPU_STEPPING: 3

CPU_MICROCODE: 6,5e,3,0 (F,M,S,R)  SIG: CC'00000000 (cache) CC'00000000 (init)

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  AV

PROCESS_NAME:  System

ANALYSIS_SESSION_HOST:  DESKTOP-BKJR0DQ

ANALYSIS_SESSION_TIME:  03-06-2020 14:39:46.0617

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

TRAP_FRAME:  fffff8074f8084b0 -- (.trap 0xfffff8074f8084b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff807467f8180 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80749cbc9de rsp=fffff8074f808640 rbp=ffff828b7885a000
 r8=0000000000000000  r9=0000000000000000 r10=fffff80749c3b8c0
r11=fffff8074f8086d8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up di pl zr na po nc
nt!KeResumeClockTimerFromIdle+0xbe:
fffff807`49cbc9de 488b9c24a8000000 mov     rbx,qword ptr [rsp+0A8h] ss:0018:fffff807`4f8086e8=0000011693277510
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80749dd41e9 to fffff80749dc2380

STACK_TEXT: 
fffff807`4f808368 fffff807`49dd41e9 : 00000000`0000000a 00000000`000000ab 00000000`000000ff 00000000`00000000 : nt!KeBugCheckEx
fffff807`4f808370 fffff807`49dd052b : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff807`4f8084b0 fffff807`49cbc9de : 00000073`b1f3d8bc 00000000`00000000 00000001`0844aca9 00000000`00000000 : nt!KiPageFault+0x46b
fffff807`4f808640 fffff807`49cbb848 : 00000116`93277510 00000116`93277510 00000000`00000000 00000000`00000000 : nt!KeResumeClockTimerFromIdle+0xbe
fffff807`4f8086e0 fffff807`49cbadee : 00000000`00000003 00000000`00000002 fffff807`4f808b00 00000000`00000000 : nt!PpmIdleExecuteTransition+0x8b8
fffff807`4f808a00 fffff807`49dc5e88 : 00000000`00000000 fffff807`467f8180 ffff828b`7c678080 00000000`0000053c : nt!PoIdle+0x36e
fffff807`4f808b60 00000000`00000000 : fffff807`4f809000 fffff807`4f802000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x48


THREAD_SHA1_HASH_MOD_FUNC:  265ed53bd9c125495215da171187a25d1b58fde0

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  eac139e29ba02833c82c0ceaba1baa811c0ebcac

THREAD_SHA1_HASH_MOD:  30a3e915496deaace47137d5b90c3ecc03746bf6

FOLLOWUP_IP:
nt!KeResumeClockTimerFromIdle+be
fffff807`49cbc9de 488b9c24a8000000 mov     rbx,qword ptr [rsp+0A8h]

FAULT_INSTR_CODE:  249c8b48

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  nt!KeResumeClockTimerFromIdle+be

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  0

IMAGE_VERSION:  10.0.18362.693

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  be

FAILURE_BUCKET_ID:  AV_nt!KeResumeClockTimerFromIdle

BUCKET_ID:  AV_nt!KeResumeClockTimerFromIdle

PRIMARY_PROBLEM_CLASS:  AV_nt!KeResumeClockTimerFromIdle

TARGET_TIME:  2020-03-05T17:47:13.000Z

OSBUILD:  18362

OSSERVICEPACK:  693

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  unknown_date

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  850d

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:av_nt!keresumeclocktimerfromidle

FAILURE_ID_HASH:  {1bbba434-0e97-4e3e-a4c6-3ba138262364}

Followup:     MachineOwner
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 00000000002c0018, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff801646c1ffe, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

DUMP_TYPE:  2

BUGCHECK_P1: 2c0018

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff801646c1ffe

READ_ADDRESS: fffff80164b733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
 00000000002c0018

CURRENT_IRQL:  2

FAULTING_IP:
nt!KiTimerWaitTest+ce
fffff801`646c1ffe 488b4e18        mov     rcx,qword ptr [rsi+18h]

CPU_COUNT: 8

CPU_MHZ: a20

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 5e

CPU_STEPPING: 3

CPU_MICROCODE: 6,5e,3,0 (F,M,S,R)  SIG: CC'00000000 (cache) CC'00000000 (init)

BLACKBOXNTFS: 1 (!blackboxntfs)


CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  AV

PROCESS_NAME:  System

ANALYSIS_SESSION_HOST:  DESKTOP-BKJR0DQ

ANALYSIS_SESSION_TIME:  03-06-2020 14:39:48.0936

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

TRAP_FRAME:  fffff8016b208600 -- (.trap 0xfffff8016b208600)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000c2872c88 rbx=0000000000000000 rcx=00000000ffc2872c
rdx=ffffc20cf70ef468 rsi=0000000000000000 rdi=0000000000000000
rip=fffff801646c1ffe rsp=fffff8016b208790 rbp=0000000000000008
 r8=ffffc20cf70ef4a8  r9=0000000000000000 r10=fffff80162366800
r11=0000000000000003 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe cy
nt!KiTimerWaitTest+0xce:
fffff801`646c1ffe 488b4e18        mov     rcx,qword ptr [rsi+18h] ds:00000000`00000018=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff801647d41e9 to fffff801647c2380

STACK_TEXT: 
fffff801`6b2084b8 fffff801`647d41e9 : 00000000`0000000a 00000000`002c0018 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff801`6b2084c0 fffff801`647d052b : ffffffff`ffffffff fffff801`647893a8 ffffc20c`00000002 fffff801`6b2087f8 : nt!KiBugCheckDispatch+0x69
fffff801`6b208600 fffff801`646c1ffe : ffffc20c`f306b188 00000000`00000000 ffffc20c`f306b250 ffffc20c`f306b180 : nt!KiPageFault+0x46b
fffff801`6b208790 fffff801`646c1cc2 : ffffc20c`f70ef468 00000000`00000000 00000000`00000000 000032c9`00000002 : nt!KiTimerWaitTest+0xce
fffff801`6b208840 fffff801`646c0ab9 : 00000000`00000014 00000000`00989680 00000000`0000007d 00000000`00000095 : nt!KiProcessExpiredTimerList+0xd2
fffff801`6b208930 fffff801`647c5ec4 : 00000000`00000000 fffff801`62363180 fffff801`64b91400 ffffc20c`f31b8140 : nt!KiRetireDpcList+0x4e9
fffff801`6b208b60 00000000`00000000 : fffff801`6b209000 fffff801`6b202000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x84


THREAD_SHA1_HASH_MOD_FUNC:  7417776dc1ced3b28cfd6ad1f6d3803dd01aca0a

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  f7c15922d5d0a48a4a4f975cdfe2104dcc8a64ff

THREAD_SHA1_HASH_MOD:  30a3e915496deaace47137d5b90c3ecc03746bf6

FOLLOWUP_IP:
nt!KiTimerWaitTest+ce
fffff801`646c1ffe 488b4e18        mov     rcx,qword ptr [rsi+18h]

FAULT_INSTR_CODE:  184e8b48

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  nt!KiTimerWaitTest+ce

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  0

IMAGE_VERSION:  10.0.18362.693

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  ce

FAILURE_BUCKET_ID:  AV_nt!KiTimerWaitTest

BUCKET_ID:  AV_nt!KiTimerWaitTest

PRIMARY_PROBLEM_CLASS:  AV_nt!KiTimerWaitTest

TARGET_TIME:  2020-03-04T15:12:19.000Z

OSBUILD:  18362

OSSERVICEPACK:  693

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  unknown_date

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  31df

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:av_nt!kitimerwaittest

FAILURE_ID_HASH:  {8c029a8d-9f29-4bde-2664-6010a6365158}

Followup:     MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff8046bc27c28, memory referenced
Arg2: 0000000000000006, IRQL
Arg3: 0000000000000001, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80467a2cbb2, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  Micro-Star International Co., Ltd.

SYSTEM_PRODUCT_NAME:  GL62 6QD

SYSTEM_SKU:  Default string

SYSTEM_VERSION:  REV:1.0

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  E16J6IMS.107

BIOS_DATE:  06/03/2016

BASEBOARD_MANUFACTURER:  Micro-Star International Co., Ltd.

BASEBOARD_PRODUCT:  MS-16J6

BASEBOARD_VERSION:  REV:1.0

DUMP_TYPE:  2

BUGCHECK_P1: fffff8046bc27c28

BUGCHECK_P2: 6

BUGCHECK_P3: 1

BUGCHECK_P4: fffff80467a2cbb2

WRITE_ADDRESS: fffff80467f733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
 fffff8046bc27c28

CURRENT_IRQL:  6

FAULTING_IP:
nt!KeInitializeEnumerationContext+2
fffff804`67a2cbb2 66894110        mov     word ptr [rcx+10h],ax

CPU_COUNT: 8

CPU_MHZ: a20

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 5e

CPU_STEPPING: 3

CPU_MICROCODE: 6,5e,3,0 (F,M,S,R)  SIG: CC'00000000 (cache) CC'00000000 (init)

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  AV

PROCESS_NAME:  System

ANALYSIS_SESSION_HOST:  DESKTOP-BKJR0DQ

ANALYSIS_SESSION_TIME:  03-06-2020 14:39:51.0489

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

TRAP_FRAME:  fffff8046bc179d0 -- (.trap 0xfffff8046bc179d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffff8046bc27c18
rdx=fffff8046bc17cf0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80467a2cbb2 rsp=fffff8046bc17b68 rbp=0000000000000000
 r8=0000000000000862  r9=0000000000000062 r10=fffff80467a2cbb0
r11=fffff8046bc17b60 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!KeInitializeEnumerationContext+0x2:
fffff804`67a2cbb2 66894110        mov     word ptr [rcx+10h],ax ds:fffff804`6bc27c28=????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80467bd41e9 to fffff80467bc2380

STACK_TEXT: 
fffff804`6bc17888 fffff804`67bd41e9 : 00000000`0000000a fffff804`6bc27c28 00000000`00000006 00000000`00000001 : nt!KeBugCheckEx
fffff804`6bc17890 fffff804`67bd052b : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff804`6bc179d0 fffff804`67a2cbb2 : fffff804`684b902c 00000000`00000000 00000000`000000a8 00000000`00000200 : nt!KiPageFault+0x46b
fffff804`6bc17b68 fffff804`684b902c : 00000000`00000000 00000000`000000a8 00000000`00000200 00000000`00000000 : nt!KeInitializeEnumerationContext+0x2
fffff804`6bc17b70 fffff804`684b8d97 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : hal!HalpInterruptSendIpi+0x278
fffff804`6bc17df0 fffff804`67a2cee5 : 00000000`00000062 ffffe101`a7ff6280 fffff804`6bc17ed0 fffff804`67ac155b : hal!HalRequestIpiSpecifyVector+0x67
fffff804`6bc17e40 fffff804`67a2cde2 : fffff804`69c02d10 00000000`00006202 ffffe101`a7ff6280 00000000`00000008 : nt!KiIntRedirectQueueRequestOnProcessor+0x71
fffff804`6bc17f40 fffff804`67bc3b9f : fffff804`6bc08a50 fffff804`6bc08a50 fffff804`6bc08a50 ffffe101`a7ff6280 : nt!KiCallInterruptServiceRoutine+0x212
fffff804`6bc17f90 fffff804`67bc3e67 : 00000000`00000000 fffff804`62d71180 fffff804`6bc08b00 00000000`00000001 : nt!KiInterruptSubDispatch+0x11f
fffff804`6bc089d0 fffff804`67bc5e8e : 00000000`00000000 fffff804`62d71180 ffffbc04`76d91080 00000000`00000c56 : nt!KiInterruptDispatch+0x37
fffff804`6bc08b60 00000000`00000000 : fffff804`6bc09000 fffff804`6bc02000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x4e


THREAD_SHA1_HASH_MOD_FUNC:  6603e4c04448daf1b319693abce1a0094f73421d

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  c3f23474dd0086dac79e2d0310f7e1fc7cdeea65

THREAD_SHA1_HASH_MOD:  414b44878b84a44a2e53a4859d23c29d8b1a5f07

FOLLOWUP_IP:
nt!KeInitializeEnumerationContext+2
fffff804`67a2cbb2 66894110        mov     word ptr [rcx+10h],ax

FAULT_INSTR_CODE:  10418966

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  nt!KeInitializeEnumerationContext+2

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  0

IMAGE_VERSION:  10.0.18362.693

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  2

FAILURE_BUCKET_ID:  AV_nt!KeInitializeEnumerationContext

BUCKET_ID:  AV_nt!KeInitializeEnumerationContext

PRIMARY_PROBLEM_CLASS:  AV_nt!KeInitializeEnumerationContext

TARGET_TIME:  2020-03-04T15:18:19.000Z

OSBUILD:  18362

OSSERVICEPACK:  693

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  unknown_date

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  51cf

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:av_nt!keinitializeenumerationcontext

FAILURE_ID_HASH:  {e8942f90-bdd6-79ce-ede0-3460bf7671b7}

Followup:     MachineOwner
---------


KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff807522bbd7b, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  Micro-Star International Co., Ltd.

SYSTEM_PRODUCT_NAME:  GL62 6QD

SYSTEM_SKU:  Default string

SYSTEM_VERSION:  REV:1.0

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  E16J6IMS.107

BIOS_DATE:  06/03/2016

BASEBOARD_MANUFACTURER:  Micro-Star International Co., Ltd.

BASEBOARD_PRODUCT:  MS-16J6

BASEBOARD_VERSION:  REV:1.0

DUMP_TYPE:  2

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff807522bbd7b

BUGCHECK_P3: 0

BUGCHECK_P4: ffffffffffffffff

READ_ADDRESS: fffff807527733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
 ffffffffffffffff

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP:
nt!PpmIdlePrepare+16b
fffff807`522bbd7b 488b86c85d0000  mov     rax,qword ptr [rsi+5DC8h]

EXCEPTION_PARAMETER2:  ffffffffffffffff

BUGCHECK_STR:  0x1E_c0000005_R

CPU_COUNT: 8

CPU_MHZ: a20

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 5e

CPU_STEPPING: 3

CPU_MICROCODE: 6,5e,3,0 (F,M,S,R)  SIG: CC'00000000 (cache) CC'00000000 (init)

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  2

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  System

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-BKJR0DQ

ANALYSIS_SESSION_TIME:  03-06-2020 14:39:53.0839

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

LAST_CONTROL_TRANSFER:  from fffff807524a695e to fffff807523c2380

STACK_TEXT: 
fffff807`56e1e138 fffff807`524a695e : 00000000`0000001e ffffffff`c0000005 fffff807`522bbd7b 00000000`00000000 : nt!KeBugCheckEx
fffff807`56e1e140 fffff807`523cb1af : fffff807`52711000 fffff807`52200000 0005e3bc`00ab7000 00000000`0010001f : nt!KiFatalExceptionHandler+0x22
fffff807`56e1e180 fffff807`522fa2d5 : 00000000`00000000 00000000`00000000 fffff807`56e1e6f0 00007fff`ffff0000 : nt!RtlpExecuteHandlerForException+0xf
fffff807`56e1e1b0 fffff807`522fe86e : fffff807`56e085d8 fffff807`56e1ee30 fffff807`56e085d8 ffff9f83`faaad000 : nt!RtlDispatchException+0x4a5
fffff807`56e1e900 fffff807`523c3202 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x16e
fffff807`56e1efb0 fffff807`523c31d0 : fffff807`523d4316 fffff807`56e08690 ffff9f83`f3f13000 00000000`00000000 : nt!KxExceptionDispatchOnExceptionStack+0x12
fffff807`56e08498 fffff807`523d4316 : fffff807`56e08690 ffff9f83`f3f13000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatchOnExceptionStackContinue
fffff807`56e084a0 fffff807`523d00a2 : 00000000`00000000 fffff807`5bc4a9e0 00000000`00002300 ffff9f83`f3b37010 : nt!KiExceptionDispatch+0x116
fffff807`56e08680 fffff807`522bbd7b : 00000000`0000eb48 00000000`00989680 ffff9f83`faaad000 00000000`556c1d8f : nt!KiGeneralProtectionFault+0x322
fffff807`56e08810 fffff807`522bac66 : 00000000`00000003 00000000`00000002 00000000`00000001 00000000`00000000 : nt!PpmIdlePrepare+0x16b
fffff807`56e08a00 fffff807`523c5e88 : 00000000`00000000 fffff807`4df0b180 ffff9f83`fa80e080 00000000`00000690 : nt!PoIdle+0x1e6
fffff807`56e08b60 00000000`00000000 : fffff807`56e09000 fffff807`56e02000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x48


THREAD_SHA1_HASH_MOD_FUNC:  8bcff7dfb5b7e7de7072fa9fdb8e61b576f4a5d9

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  a0c586af5da1afadc8ebd7136b428fbe96dd9c4a

THREAD_SHA1_HASH_MOD:  dc844b1b94baa204d070855e43bbbd27eee98b94

FOLLOWUP_IP:
nt!PpmIdlePrepare+16b
fffff807`522bbd7b 488b86c85d0000  mov     rax,qword ptr [rsi+5DC8h]

FAULT_INSTR_CODE:  c8868b48

SYMBOL_STACK_INDEX:  9

SYMBOL_NAME:  nt!PpmIdlePrepare+16b

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  0

IMAGE_VERSION:  10.0.18362.693

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  16b

FAILURE_BUCKET_ID:  0x1E_c0000005_R_nt!PpmIdlePrepare

BUCKET_ID:  0x1E_c0000005_R_nt!PpmIdlePrepare

PRIMARY_PROBLEM_CLASS:  0x1E_c0000005_R_nt!PpmIdlePrepare

TARGET_TIME:  2020-03-04T15:16:26.000Z

OSBUILD:  18362

OSSERVICEPACK:  693

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  unknown_date

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  431d

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x1e_c0000005_r_nt!ppmidleprepare

FAILURE_ID_HASH:  {e4b956cd-2b80-303f-b41f-aa0eaf18f843}

Followup:     MachineOwner
---------
 
IObit araçları kullanıyorsan da ondan, tekrar temiz kurulum yap bu araçları kullanma.

Memtest86 testi yap.
Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.
Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.

Kod:
UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault). The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
use .trap on that value
Else
.trap on the appropriate frame will show where the trap was taken
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: fffff80737220e50
Arg3: fffff80737218fc0
Arg4: fffff807339d00d0

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1

DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER: Micro-Star International Co., Ltd.

SYSTEM_PRODUCT_NAME: GL62 6QD

SYSTEM_SKU: Default string

SYSTEM_VERSION: REV:1.0

BIOS_VENDOR: American Megatrends Inc.

BIOS_VERSION: E16J6IMS.10C

BIOS_DATE: 01/17/2018

BASEBOARD_MANUFACTURER: Micro-Star International Co., Ltd.

BASEBOARD_PRODUCT: MS-16J6

BASEBOARD_VERSION: REV:1.0

DUMP_TYPE: 2

BUGCHECK_P1: 8

BUGCHECK_P2: fffff80737220e50

BUGCHECK_P3: fffff80737218fc0

BUGCHECK_P4: fffff807339d00d0

BUGCHECK_STR: 0x7f_8

TRAP_FRAME: fffff80737218fc0 -- (.trap 0xfffff80737218fc0)
Unable to read trap frame at fffff807`37218fc0

CPU_COUNT: 8

CPU_MHZ: a20

CPU_VENDOR: GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 5e

CPU_STEPPING: 3

CPU_MICROCODE: 6,5e,3,0 (F,M,S,R) SIG: CC'00000000 (cache) CC'00000000 (init)

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT

PROCESS_NAME: System

CURRENT_IRQL: 9

ANALYSIS_SESSION_HOST: DESKTOP-BKJR0DQ

ANALYSIS_SESSION_TIME: 03-06-2020 14:39:43.0699

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

LAST_CONTROL_TRANSFER: from fffff807339d41e9 to fffff807339c2380

STACK_TEXT:
fffff807`37220d08 fffff807`339d41e9 : 00000000`0000007f 00000000`00000008 fffff807`37220e50 fffff807`37218fc0 : nt!KeBugCheckEx
fffff807`37220d10 fffff807`339cf045 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff807`37220e50 fffff807`339d00d0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0x2c5
fffff807`37218fc0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x10

THREAD_SHA1_HASH_MOD_FUNC: 6109c38a4ebf4817fe9dd816c5033a788d283436

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 9637f56d38454a892f1792c3b2ff84e9951b3a5c

THREAD_SHA1_HASH_MOD: d084f7dfa548ce4e51810e4fd5914176ebc66791

FOLLOWUP_IP:
nt!KiDoubleFaultAbort+2c5
fffff807`339cf045 90 nop

FAULT_INSTR_CODE: 6666c390

SYMBOL_STACK_INDEX: 2

SYMBOL_NAME: nt!KiDoubleFaultAbort+2c5

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP: 0

IMAGE_VERSION: 10.0.18362.693

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 2c5

FAILURE_BUCKET_ID: 0x7f_8_nt!KiDoubleFaultAbort

BUCKET_ID: 0x7f_8_nt!KiDoubleFaultAbort

PRIMARY_PROBLEM_CLASS: 0x7f_8_nt!KiDoubleFaultAbort

TARGET_TIME: 2020-03-05T21:20:51.000Z

OSBUILD: 18362

OSSERVICEPACK: 693

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: unknown_date

BUILDDATESTAMP_STR: 190318-1202

BUILDLAB_STR: 19h1_release

BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME: 10d75

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:0x7f_8_nt!kidoublefaultabort

FAILURE_ID_HASH: {d1f8395a-8c58-45da-6ebf-e8bb4aad2fc5}

Followup: MachineOwner
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 00000000000000ab, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80749cbc9de, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1

DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER: Micro-Star International Co., Ltd.

SYSTEM_PRODUCT_NAME: GL62 6QD

SYSTEM_SKU: Default string

SYSTEM_VERSION: REV:1.0

BIOS_VENDOR: American Megatrends Inc.

BIOS_VERSION: E16J6IMS.10C

BIOS_DATE: 01/17/2018

BASEBOARD_MANUFACTURER: Micro-Star International Co., Ltd.

BASEBOARD_PRODUCT: MS-16J6

BASEBOARD_VERSION: REV:1.0

DUMP_TYPE: 2

BUGCHECK_P1: ab

BUGCHECK_P2: ff

BUGCHECK_P3: 0

BUGCHECK_P4: fffff80749cbc9de

READ_ADDRESS: fffff8074a1733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
00000000000000ab

CURRENT_IRQL: 0

FAULTING_IP:
nt!KeResumeClockTimerFromIdle+be
fffff807`49cbc9de 488b9c24a8000000 mov rbx,qword ptr [rsp+0A8h]

CPU_COUNT: 8

CPU_MHZ: a20

CPU_VENDOR: GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 5e

CPU_STEPPING: 3

CPU_MICROCODE: 6,5e,3,0 (F,M,S,R) SIG: CC'00000000 (cache) CC'00000000 (init)

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT

BUGCHECK_STR: AV

PROCESS_NAME: System

ANALYSIS_SESSION_HOST: DESKTOP-BKJR0DQ

ANALYSIS_SESSION_TIME: 03-06-2020 14:39:46.0617

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

TRAP_FRAME: fffff8074f8084b0 -- (.trap 0xfffff8074f8084b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff807467f8180 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80749cbc9de rsp=fffff8074f808640 rbp=ffff828b7885a000
r8=0000000000000000 r9=0000000000000000 r10=fffff80749c3b8c0
r11=fffff8074f8086d8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di pl zr na po nc
nt!KeResumeClockTimerFromIdle+0xbe:
fffff807`49cbc9de 488b9c24a8000000 mov rbx,qword ptr [rsp+0A8h] ss:0018:fffff807`4f8086e8=0000011693277510
Resetting default scope

LAST_CONTROL_TRANSFER: from fffff80749dd41e9 to fffff80749dc2380

STACK_TEXT:
fffff807`4f808368 fffff807`49dd41e9 : 00000000`0000000a 00000000`000000ab 00000000`000000ff 00000000`00000000 : nt!KeBugCheckEx
fffff807`4f808370 fffff807`49dd052b : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff807`4f8084b0 fffff807`49cbc9de : 00000073`b1f3d8bc 00000000`00000000 00000001`0844aca9 00000000`00000000 : nt!KiPageFault+0x46b
fffff807`4f808640 fffff807`49cbb848 : 00000116`93277510 00000116`93277510 00000000`00000000 00000000`00000000 : nt!KeResumeClockTimerFromIdle+0xbe
fffff807`4f8086e0 fffff807`49cbadee : 00000000`00000003 00000000`00000002 fffff807`4f808b00 00000000`00000000 : nt!PpmIdleExecuteTransition+0x8b8
fffff807`4f808a00 fffff807`49dc5e88 : 00000000`00000000 fffff807`467f8180 ffff828b`7c678080 00000000`0000053c : nt!PoIdle+0x36e
fffff807`4f808b60 00000000`00000000 : fffff807`4f809000 fffff807`4f802000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x48

THREAD_SHA1_HASH_MOD_FUNC: 265ed53bd9c125495215da171187a25d1b58fde0

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: eac139e29ba02833c82c0ceaba1baa811c0ebcac

THREAD_SHA1_HASH_MOD: 30a3e915496deaace47137d5b90c3ecc03746bf6

FOLLOWUP_IP:
nt!KeResumeClockTimerFromIdle+be
fffff807`49cbc9de 488b9c24a8000000 mov rbx,qword ptr [rsp+0A8h]

FAULT_INSTR_CODE: 249c8b48

SYMBOL_STACK_INDEX: 3

SYMBOL_NAME: nt!KeResumeClockTimerFromIdle+be

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP: 0

IMAGE_VERSION: 10.0.18362.693

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: be

FAILURE_BUCKET_ID: AV_nt!KeResumeClockTimerFromIdle

BUCKET_ID: AV_nt!KeResumeClockTimerFromIdle

PRIMARY_PROBLEM_CLASS: AV_nt!KeResumeClockTimerFromIdle

TARGET_TIME: 2020-03-05T17:47:13.000Z

OSBUILD: 18362

OSSERVICEPACK: 693

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: unknown_date

BUILDDATESTAMP_STR: 190318-1202

BUILDLAB_STR: 19h1_release

BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME: 850d

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:av_nt!keresumeclocktimerfromidle

FAILURE_ID_HASH: {1bbba434-0e97-4e3e-a4c6-3ba138262364}

Followup: MachineOwner
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 00000000002c0018, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff801646c1ffe, address which referenced memory

Debugging Details:
------------------

KEY_VALUES_STRING: 1

PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1

DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202

DUMP_TYPE: 2

BUGCHECK_P1: 2c0018

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff801646c1ffe

READ_ADDRESS: fffff80164b733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
00000000002c0018

CURRENT_IRQL: 2

FAULTING_IP:
nt!KiTimerWaitTest+ce
fffff801`646c1ffe 488b4e18 mov rcx,qword ptr [rsi+18h]

CPU_COUNT: 8

CPU_MHZ: a20

CPU_VENDOR: GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 5e

CPU_STEPPING: 3

CPU_MICROCODE: 6,5e,3,0 (F,M,S,R) SIG: CC'00000000 (cache) CC'00000000 (init)

BLACKBOXNTFS: 1 (!blackboxntfs)

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT

BUGCHECK_STR: AV

PROCESS_NAME: System

ANALYSIS_SESSION_HOST: DESKTOP-BKJR0DQ

ANALYSIS_SESSION_TIME: 03-06-2020 14:39:48.0936

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

TRAP_FRAME: fffff8016b208600 -- (.trap 0xfffff8016b208600)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000c2872c88 rbx=0000000000000000 rcx=00000000ffc2872c
rdx=ffffc20cf70ef468 rsi=0000000000000000 rdi=0000000000000000
rip=fffff801646c1ffe rsp=fffff8016b208790 rbp=0000000000000008
r8=ffffc20cf70ef4a8 r9=0000000000000000 r10=fffff80162366800
r11=0000000000000003 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe cy
nt!KiTimerWaitTest+0xce:
fffff801`646c1ffe 488b4e18 mov rcx,qword ptr [rsi+18h] ds:00000000`00000018=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER: from fffff801647d41e9 to fffff801647c2380

STACK_TEXT:
fffff801`6b2084b8 fffff801`647d41e9 : 00000000`0000000a 00000000`002c0018 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff801`6b2084c0 fffff801`647d052b : ffffffff`ffffffff fffff801`647893a8 ffffc20c`00000002 fffff801`6b2087f8 : nt!KiBugCheckDispatch+0x69
fffff801`6b208600 fffff801`646c1ffe : ffffc20c`f306b188 00000000`00000000 ffffc20c`f306b250 ffffc20c`f306b180 : nt!KiPageFault+0x46b
fffff801`6b208790 fffff801`646c1cc2 : ffffc20c`f70ef468 00000000`00000000 00000000`00000000 000032c9`00000002 : nt!KiTimerWaitTest+0xce
fffff801`6b208840 fffff801`646c0ab9 : 00000000`00000014 00000000`00989680 00000000`0000007d 00000000`00000095 : nt!KiProcessExpiredTimerList+0xd2
fffff801`6b208930 fffff801`647c5ec4 : 00000000`00000000 fffff801`62363180 fffff801`64b91400 ffffc20c`f31b8140 : nt!KiRetireDpcList+0x4e9
fffff801`6b208b60 00000000`00000000 : fffff801`6b209000 fffff801`6b202000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x84

THREAD_SHA1_HASH_MOD_FUNC: 7417776dc1ced3b28cfd6ad1f6d3803dd01aca0a

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: f7c15922d5d0a48a4a4f975cdfe2104dcc8a64ff

THREAD_SHA1_HASH_MOD: 30a3e915496deaace47137d5b90c3ecc03746bf6

FOLLOWUP_IP:
nt!KiTimerWaitTest+ce
fffff801`646c1ffe 488b4e18 mov rcx,qword ptr [rsi+18h]

FAULT_INSTR_CODE: 184e8b48

SYMBOL_STACK_INDEX: 3

SYMBOL_NAME: nt!KiTimerWaitTest+ce

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP: 0

IMAGE_VERSION: 10.0.18362.693

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: ce

FAILURE_BUCKET_ID: AV_nt!KiTimerWaitTest

BUCKET_ID: AV_nt!KiTimerWaitTest

PRIMARY_PROBLEM_CLASS: AV_nt!KiTimerWaitTest

TARGET_TIME: 2020-03-04T15:12:19.000Z

OSBUILD: 18362

OSSERVICEPACK: 693

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: unknown_date

BUILDDATESTAMP_STR: 190318-1202

BUILDLAB_STR: 19h1_release

BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME: 31df

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:av_nt!kitimerwaittest

FAILURE_ID_HASH: {8c029a8d-9f29-4bde-2664-6010a6365158}

Followup: MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff8046bc27c28, memory referenced
Arg2: 0000000000000006, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80467a2cbb2, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1

DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER: Micro-Star International Co., Ltd.

SYSTEM_PRODUCT_NAME: GL62 6QD

SYSTEM_SKU: Default string

SYSTEM_VERSION: REV:1.0

BIOS_VENDOR: American Megatrends Inc.

BIOS_VERSION: E16J6IMS.107

BIOS_DATE: 06/03/2016

BASEBOARD_MANUFACTURER: Micro-Star International Co., Ltd.

BASEBOARD_PRODUCT: MS-16J6

BASEBOARD_VERSION: REV:1.0

DUMP_TYPE: 2

BUGCHECK_P1: fffff8046bc27c28

BUGCHECK_P2: 6

BUGCHECK_P3: 1

BUGCHECK_P4: fffff80467a2cbb2

WRITE_ADDRESS: fffff80467f733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8046bc27c28

CURRENT_IRQL: 6

FAULTING_IP:
nt!KeInitializeEnumerationContext+2
fffff804`67a2cbb2 66894110 mov word ptr [rcx+10h],ax

CPU_COUNT: 8

CPU_MHZ: a20

CPU_VENDOR: GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 5e

CPU_STEPPING: 3

CPU_MICROCODE: 6,5e,3,0 (F,M,S,R) SIG: CC'00000000 (cache) CC'00000000 (init)

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT

BUGCHECK_STR: AV

PROCESS_NAME: System

ANALYSIS_SESSION_HOST: DESKTOP-BKJR0DQ

ANALYSIS_SESSION_TIME: 03-06-2020 14:39:51.0489

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

TRAP_FRAME: fffff8046bc179d0 -- (.trap 0xfffff8046bc179d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffff8046bc27c18
rdx=fffff8046bc17cf0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80467a2cbb2 rsp=fffff8046bc17b68 rbp=0000000000000000
r8=0000000000000862 r9=0000000000000062 r10=fffff80467a2cbb0
r11=fffff8046bc17b60 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!KeInitializeEnumerationContext+0x2:
fffff804`67a2cbb2 66894110 mov word ptr [rcx+10h],ax ds:fffff804`6bc27c28=????
Resetting default scope

LAST_CONTROL_TRANSFER: from fffff80467bd41e9 to fffff80467bc2380

STACK_TEXT:
fffff804`6bc17888 fffff804`67bd41e9 : 00000000`0000000a fffff804`6bc27c28 00000000`00000006 00000000`00000001 : nt!KeBugCheckEx
fffff804`6bc17890 fffff804`67bd052b : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff804`6bc179d0 fffff804`67a2cbb2 : fffff804`684b902c 00000000`00000000 00000000`000000a8 00000000`00000200 : nt!KiPageFault+0x46b
fffff804`6bc17b68 fffff804`684b902c : 00000000`00000000 00000000`000000a8 00000000`00000200 00000000`00000000 : nt!KeInitializeEnumerationContext+0x2
fffff804`6bc17b70 fffff804`684b8d97 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : hal!HalpInterruptSendIpi+0x278
fffff804`6bc17df0 fffff804`67a2cee5 : 00000000`00000062 ffffe101`a7ff6280 fffff804`6bc17ed0 fffff804`67ac155b : hal!HalRequestIpiSpecifyVector+0x67
fffff804`6bc17e40 fffff804`67a2cde2 : fffff804`69c02d10 00000000`00006202 ffffe101`a7ff6280 00000000`00000008 : nt!KiIntRedirectQueueRequestOnProcessor+0x71
fffff804`6bc17f40 fffff804`67bc3b9f : fffff804`6bc08a50 fffff804`6bc08a50 fffff804`6bc08a50 ffffe101`a7ff6280 : nt!KiCallInterruptServiceRoutine+0x212
fffff804`6bc17f90 fffff804`67bc3e67 : 00000000`00000000 fffff804`62d71180 fffff804`6bc08b00 00000000`00000001 : nt!KiInterruptSubDispatch+0x11f
fffff804`6bc089d0 fffff804`67bc5e8e : 00000000`00000000 fffff804`62d71180 ffffbc04`76d91080 00000000`00000c56 : nt!KiInterruptDispatch+0x37
fffff804`6bc08b60 00000000`00000000 : fffff804`6bc09000 fffff804`6bc02000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x4e

THREAD_SHA1_HASH_MOD_FUNC: 6603e4c04448daf1b319693abce1a0094f73421d

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: c3f23474dd0086dac79e2d0310f7e1fc7cdeea65

THREAD_SHA1_HASH_MOD: 414b44878b84a44a2e53a4859d23c29d8b1a5f07

FOLLOWUP_IP:
nt!KeInitializeEnumerationContext+2
fffff804`67a2cbb2 66894110 mov word ptr [rcx+10h],ax

FAULT_INSTR_CODE: 10418966

SYMBOL_STACK_INDEX: 3

SYMBOL_NAME: nt!KeInitializeEnumerationContext+2

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP: 0

IMAGE_VERSION: 10.0.18362.693

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 2

FAILURE_BUCKET_ID: AV_nt!KeInitializeEnumerationContext

BUCKET_ID: AV_nt!KeInitializeEnumerationContext

PRIMARY_PROBLEM_CLASS: AV_nt!KeInitializeEnumerationContext

TARGET_TIME: 2020-03-04T15:18:19.000Z

OSBUILD: 18362

OSSERVICEPACK: 693

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: unknown_date

BUILDDATESTAMP_STR: 190318-1202

BUILDLAB_STR: 19h1_release

BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME: 51cf

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:av_nt!keinitializeenumerationcontext

FAILURE_ID_HASH: {e8942f90-bdd6-79ce-ede0-3460bf7671b7}

Followup: MachineOwner
---------

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff807522bbd7b, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1

DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER: Micro-Star International Co., Ltd.

SYSTEM_PRODUCT_NAME: GL62 6QD

SYSTEM_SKU: Default string

SYSTEM_VERSION: REV:1.0

BIOS_VENDOR: American Megatrends Inc.

BIOS_VERSION: E16J6IMS.107

BIOS_DATE: 06/03/2016

BASEBOARD_MANUFACTURER: Micro-Star International Co., Ltd.

BASEBOARD_PRODUCT: MS-16J6

BASEBOARD_VERSION: REV:1.0

DUMP_TYPE: 2

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff807522bbd7b

BUGCHECK_P3: 0

BUGCHECK_P4: ffffffffffffffff

READ_ADDRESS: fffff807527733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
ffffffffffffffff

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP:
nt!PpmIdlePrepare+16b
fffff807`522bbd7b 488b86c85d0000 mov rax,qword ptr [rsi+5DC8h]

EXCEPTION_PARAMETER2: ffffffffffffffff

BUGCHECK_STR: 0x1E_c0000005_R

CPU_COUNT: 8

CPU_MHZ: a20

CPU_VENDOR: GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 5e

CPU_STEPPING: 3

CPU_MICROCODE: 6,5e,3,0 (F,M,S,R) SIG: CC'00000000 (cache) CC'00000000 (init)

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 2

DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT

PROCESS_NAME: System

CURRENT_IRQL: 0

ANALYSIS_SESSION_HOST: DESKTOP-BKJR0DQ

ANALYSIS_SESSION_TIME: 03-06-2020 14:39:53.0839

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

LAST_CONTROL_TRANSFER: from fffff807524a695e to fffff807523c2380

STACK_TEXT:
fffff807`56e1e138 fffff807`524a695e : 00000000`0000001e ffffffff`c0000005 fffff807`522bbd7b 00000000`00000000 : nt!KeBugCheckEx
fffff807`56e1e140 fffff807`523cb1af : fffff807`52711000 fffff807`52200000 0005e3bc`00ab7000 00000000`0010001f : nt!KiFatalExceptionHandler+0x22
fffff807`56e1e180 fffff807`522fa2d5 : 00000000`00000000 00000000`00000000 fffff807`56e1e6f0 00007fff`ffff0000 : nt!RtlpExecuteHandlerForException+0xf
fffff807`56e1e1b0 fffff807`522fe86e : fffff807`56e085d8 fffff807`56e1ee30 fffff807`56e085d8 ffff9f83`faaad000 : nt!RtlDispatchException+0x4a5
fffff807`56e1e900 fffff807`523c3202 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x16e
fffff807`56e1efb0 fffff807`523c31d0 : fffff807`523d4316 fffff807`56e08690 ffff9f83`f3f13000 00000000`00000000 : nt!KxExceptionDispatchOnExceptionStack+0x12
fffff807`56e08498 fffff807`523d4316 : fffff807`56e08690 ffff9f83`f3f13000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatchOnExceptionStackContinue
fffff807`56e084a0 fffff807`523d00a2 : 00000000`00000000 fffff807`5bc4a9e0 00000000`00002300 ffff9f83`f3b37010 : nt!KiExceptionDispatch+0x116
fffff807`56e08680 fffff807`522bbd7b : 00000000`0000eb48 00000000`00989680 ffff9f83`faaad000 00000000`556c1d8f : nt!KiGeneralProtectionFault+0x322
fffff807`56e08810 fffff807`522bac66 : 00000000`00000003 00000000`00000002 00000000`00000001 00000000`00000000 : nt!PpmIdlePrepare+0x16b
fffff807`56e08a00 fffff807`523c5e88 : 00000000`00000000 fffff807`4df0b180 ffff9f83`fa80e080 00000000`00000690 : nt!PoIdle+0x1e6
fffff807`56e08b60 00000000`00000000 : fffff807`56e09000 fffff807`56e02000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x48

THREAD_SHA1_HASH_MOD_FUNC: 8bcff7dfb5b7e7de7072fa9fdb8e61b576f4a5d9

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: a0c586af5da1afadc8ebd7136b428fbe96dd9c4a

THREAD_SHA1_HASH_MOD: dc844b1b94baa204d070855e43bbbd27eee98b94

FOLLOWUP_IP:
nt!PpmIdlePrepare+16b
fffff807`522bbd7b 488b86c85d0000 mov rax,qword ptr [rsi+5DC8h]

FAULT_INSTR_CODE: c8868b48

SYMBOL_STACK_INDEX: 9

SYMBOL_NAME: nt!PpmIdlePrepare+16b

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP: 0

IMAGE_VERSION: 10.0.18362.693

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 16b

FAILURE_BUCKET_ID: 0x1E_c0000005_R_nt!PpmIdlePrepare

BUCKET_ID: 0x1E_c0000005_R_nt!PpmIdlePrepare

PRIMARY_PROBLEM_CLASS: 0x1E_c0000005_R_nt!PpmIdlePrepare

TARGET_TIME: 2020-03-04T15:16:26.000Z

OSBUILD: 18362

OSSERVICEPACK: 693

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: unknown_date

BUILDDATESTAMP_STR: 190318-1202

BUILDLAB_STR: 19h1_release

BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME: 431d

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:0x1e_c0000005_r_nt!ppmidleprepare

FAILURE_ID_HASH: {e4b956cd-2b80-303f-b41f-aa0eaf18f843}

Followup: MachineOwner
---------

Memtest86 testinde herhangi bir şey çıkmadı temiz kurulum yapıp tekrar deneyeceğim.
IObit araçları kullanıyorsan da ondan, tekrar temiz kurulum yap bu araçları kullanma.

Memtest86 testi yap.
Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.
Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.

Kod:
UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind.
that the kernel isn't allowed to have/catch (bound trap) or that.
is always instant death (double fault). The first number in the.
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these.
traps are. Here is a *portion* of those codes:
If kv shows a taskGate.
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe.
use .trap on that value.
Else.
.trap on the appropriate frame will show where the trap was taken.
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif.
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT.
Arg2: fffff80737220e50.
Arg3: fffff80737218fc0.
Arg4: fffff807339d00d0.

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys.

KEY_VALUES_STRING: 1.

PROCESSES_ANALYSIS: 1.

SERVICE_ANALYSIS: 1.

STACKHASH_ANALYSIS: 1.

TIMELINE_ANALYSIS: 1.

DUMP_CLASS: 1.

DUMP_QUALIFIER: 400.

BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202.

SYSTEM_MANUFACTURER: Micro-Star International Co., Ltd.

SYSTEM_PRODUCT_NAME: GL62 6QD.

SYSTEM_SKU: Default string.

SYSTEM_VERSION: REV:1.0.

BIOS_VENDOR: American Megatrends Inc.

BIOS_VERSION: E16J6IMS.10C.

BIOS_DATE: 01/17/2018.

BASEBOARD_MANUFACTURER: Micro-Star International Co., Ltd.

BASEBOARD_PRODUCT: MS-16J6.

BASEBOARD_VERSION: REV:1.0.

DUMP_TYPE: 2.

BUGCHECK_P1: 8.

BUGCHECK_P2: fffff80737220e50.

BUGCHECK_P3: fffff80737218fc0.

BUGCHECK_P4: fffff807339d00d0.

BUGCHECK_STR: 0x7f_8.

TRAP_FRAME: fffff80737218fc0 -- (.trap 0xfffff80737218fc0)
Unable to read trap frame at fffff807`37218fc0.

CPU_COUNT: 8.

CPU_MHZ: a20.

CPU_VENDOR: GenuineIntel.

CPU_FAMILY: 6.

CPU_MODEL: 5e.

CPU_STEPPING: 3.

CPU_MICROCODE: 6,5e,3,0 (F,M,S,R) SIG: CC'00000000 (cache) CC'00000000 (init)

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1.

CUSTOMER_CRASH_COUNT: 1.

DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT.

PROCESS_NAME: System.

CURRENT_IRQL: 9.

ANALYSIS_SESSION_HOST: DESKTOP-BKJR0DQ.

ANALYSIS_SESSION_TIME: 03-06-2020 14:39:43.0699.

ANALYSIS_VERSION: 10.0.18362.1 amd64fre.

LAST_CONTROL_TRANSFER: from fffff807339d41e9 to fffff807339c2380.

STACK_TEXT:
fffff807`37220d08 fffff807`339d41e9 : 00000000`0000007f 00000000`00000008 fffff807`37220e50 fffff807`37218fc0 : nt!KeBugCheckEx.
fffff807`37220d10 fffff807`339cf045 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69.
fffff807`37220e50 fffff807`339d00d0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0x2c5.
fffff807`37218fc0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x10.

THREAD_SHA1_HASH_MOD_FUNC: 6109c38a4ebf4817fe9dd816c5033a788d283436.

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 9637f56d38454a892f1792c3b2ff84e9951b3a5c.

THREAD_SHA1_HASH_MOD: d084f7dfa548ce4e51810e4fd5914176ebc66791.

FOLLOWUP_IP:
nt!KiDoubleFaultAbort+2c5.
fffff807`339cf045 90 nop.

FAULT_INSTR_CODE: 6666c390.

SYMBOL_STACK_INDEX: 2.

SYMBOL_NAME: nt!KiDoubleFaultAbort+2c5.

FOLLOWUP_NAME: MachineOwner.

MODULE_NAME: nt.

IMAGE_NAME: ntkrnlmp.exe.

DEBUG_FLR_IMAGE_TIMESTAMP: 0.

IMAGE_VERSION: 10.0.18362.693.

STACK_COMMAND: .thread ; .cxr ; kb.

BUCKET_ID_FUNC_OFFSET: 2c5.

FAILURE_BUCKET_ID: 0x7f_8_nt!KiDoubleFaultAbort.

BUCKET_ID: 0x7f_8_nt!KiDoubleFaultAbort.

PRIMARY_PROBLEM_CLASS: 0x7f_8_nt!KiDoubleFaultAbort.

TARGET_TIME: 2020-03-05T21:20:51.000Z.

OSBUILD: 18362.

OSSERVICEPACK: 693.

SERVICEPACK_NUMBER: 0.

OS_REVISION: 0.

SUITE_MASK: 272.

PRODUCT_TYPE: 1.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS.

OS_LOCALE:

USER_LCID: 0.

OSBUILD_TIMESTAMP: unknown_date.

BUILDDATESTAMP_STR: 190318-1202.

BUILDLAB_STR: 19h1_release.

BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202.

ANALYSIS_SESSION_ELAPSED_TIME: 10d75.

ANALYSIS_SOURCE: KM.

FAILURE_ID_HASH_STRING: km:0x7f_8_nt!kidoublefaultabort.

FAILURE_ID_HASH: {d1f8395a-8c58-45da-6ebf-e8bb4aad2fc5}

Followup: MachineOwner.
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an.
interrupt request level (IRQL) that is too high. This is usually.
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 00000000000000ab, memory referenced.
Arg2: 00000000000000ff, IRQL.
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation.
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80749cbc9de, address which referenced memory.

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys.

KEY_VALUES_STRING: 1.

PROCESSES_ANALYSIS: 1.

SERVICE_ANALYSIS: 1.

STACKHASH_ANALYSIS: 1.

TIMELINE_ANALYSIS: 1.

DUMP_CLASS: 1.

DUMP_QUALIFIER: 400.

BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202.

SYSTEM_MANUFACTURER: Micro-Star International Co., Ltd.

SYSTEM_PRODUCT_NAME: GL62 6QD.

SYSTEM_SKU: Default string.

SYSTEM_VERSION: REV:1.0.

BIOS_VENDOR: American Megatrends Inc.

BIOS_VERSION: E16J6IMS.10C.

BIOS_DATE: 01/17/2018.

BASEBOARD_MANUFACTURER: Micro-Star International Co., Ltd.

BASEBOARD_PRODUCT: MS-16J6.

BASEBOARD_VERSION: REV:1.0.

DUMP_TYPE: 2.

BUGCHECK_P1: ab.

BUGCHECK_P2: ff.

BUGCHECK_P3: 0.

BUGCHECK_P4: fffff80749cbc9de.

READ_ADDRESS: fffff8074a1733b8: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
00000000000000ab.

CURRENT_IRQL: 0.

FAULTING_IP:
nt!KeResumeClockTimerFromIdle+be.
fffff807`49cbc9de 488b9c24a8000000 mov rbx,qword ptr [rsp+0A8h]

CPU_COUNT: 8.

CPU_MHZ: a20.

CPU_VENDOR: GenuineIntel.

CPU_FAMILY: 6.

CPU_MODEL: 5e.

CPU_STEPPING: 3.

CPU_MICROCODE: 6,5e,3,0 (F,M,S,R) SIG: CC'00000000 (cache) CC'00000000 (init)

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1.

CUSTOMER_CRASH_COUNT: 1.

DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT.

BUGCHECK_STR: AV.

PROCESS_NAME: System.

ANALYSIS_SESSION_HOST: DESKTOP-BKJR0DQ.

ANALYSIS_SESSION_TIME: 03-06-2020 14:39:46.0617.

ANALYSIS_VERSION: 10.0.18362.1 amd64fre.

TRAP_FRAME: fffff8074f8084b0 -- (.trap 0xfffff8074f8084b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff807467f8180 rbx=0000000000000000 rcx=0000000000000000.
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000.
rip=fffff80749cbc9de rsp=fffff8074f808640 rbp=ffff828b7885a000.
r8=0000000000000000 r9=0000000000000000 r10=fffff80749c3b8c0.
r11=fffff8074f8086d8 r12=0000000000000000 r13=0000000000000000.
r14=0000000000000000 r15=0000000000000000.
iopl=0 nv up di pl zr na po nc.
nt!KeResumeClockTimerFromIdle+0xbe:
fffff807`49cbc9de 488b9c24a8000000 mov rbx,qword ptr [rsp+0A8h] ss:0018:fffff807`4f8086e8=0000011693277510.
Resetting default scope.

LAST_CONTROL_TRANSFER: from fffff80749dd41e9 to fffff80749dc2380.

STACK_TEXT:
fffff807`4f808368 fffff807`49dd41e9 : 00000000`0000000a 00000000`000000ab 00000000`000000ff 00000000`00000000 : nt!KeBugCheckEx.
fffff807`4f808370 fffff807`49dd052b : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69.
fffff807`4f8084b0 fffff807`49cbc9de : 00000073`b1f3d8bc 00000000`00000000 00000001`0844aca9 00000000`00000000 : nt!KiPageFault+0x46b.
fffff807`4f808640 fffff807`49cbb848 : 00000116`93277510 00000116`93277510 00000000`00000000 00000000`00000000 : nt!KeResumeClockTimerFromIdle+0xbe.
fffff807`4f8086e0 fffff807`49cbadee : 00000000`00000003 00000000`00000002 fffff807`4f808b00 00000000`00000000 : nt!PpmIdleExecuteTransition+0x8b8.
fffff807`4f808a00 fffff807`49dc5e88 : 00000000`00000000 fffff807`467f8180 ffff828b`7c678080 00000000`0000053c : nt!PoIdle+0x36e.
fffff807`4f808b60 00000000`00000000 : fffff807`4f809000 fffff807`4f802000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x48.

THREAD_SHA1_HASH_MOD_FUNC: 265ed53bd9c125495215da171187a25d1b58fde0.

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: eac139e29ba02833c82c0ceaba1baa811c0ebcac.

THREAD_SHA1_HASH_MOD: 30a3e915496deaace47137d5b90c3ecc03746bf6.

FOLLOWUP_IP:
nt!KeResumeClockTimerFromIdle+be.
fffff807`49cbc9de 488b9c24a8000000 mov rbx,qword ptr [rsp+0A8h]

FAULT_INSTR_CODE: 249c8b48.

SYMBOL_STACK_INDEX: 3.

SYMBOL_NAME: nt!KeResumeClockTimerFromIdle+be.

FOLLOWUP_NAME: MachineOwner.

MODULE_NAME: nt.

IMAGE_NAME: ntkrnlmp.exe.

DEBUG_FLR_IMAGE_TIMESTAMP: 0.

IMAGE_VERSION: 10.0.18362.693.

STACK_COMMAND: .thread ; .cxr ; kb.

BUCKET_ID_FUNC_OFFSET: be.

FAILURE_BUCKET_ID: AV_nt!KeResumeClockTimerFromIdle.

BUCKET_ID: AV_nt!KeResumeClockTimerFromIdle.

PRIMARY_PROBLEM_CLASS: AV_nt!KeResumeClockTimerFromIdle.

TARGET_TIME: 2020-03-05T17:47:13.000Z.

OSBUILD: 18362.

OSSERVICEPACK: 693.

SERVICEPACK_NUMBER: 0.

OS_REVISION: 0.

SUITE_MASK: 272.

PRODUCT_TYPE: 1.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS.

OS_LOCALE:

USER_LCID: 0.

OSBUILD_TIMESTAMP: unknown_date.

BUILDDATESTAMP_STR: 190318-1202.

BUILDLAB_STR: 19h1_release.

BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202.

ANALYSIS_SESSION_ELAPSED_TIME: 850d.

ANALYSIS_SOURCE: KM.

FAILURE_ID_HASH_STRING: km:av_nt!keresumeclocktimerfromidle.

FAILURE_ID_HASH: {1bbba434-0e97-4e3e-a4c6-3ba138262364}

Followup: MachineOwner.
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an.
interrupt request level (IRQL) that is too high. This is usually.
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 00000000002c0018, memory referenced.
Arg2: 0000000000000002, IRQL.
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation.
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff801646c1ffe, address which referenced memory.

Debugging Details:
------------------

KEY_VALUES_STRING: 1.

PROCESSES_ANALYSIS: 1.

SERVICE_ANALYSIS: 1.

STACKHASH_ANALYSIS: 1.

TIMELINE_ANALYSIS: 1.

DUMP_CLASS: 1.

DUMP_QUALIFIER: 400.

BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202.

DUMP_TYPE: 2.

BUGCHECK_P1: 2c0018.

BUGCHECK_P2: 2.

BUGCHECK_P3: 0.

BUGCHECK_P4: fffff801646c1ffe.

READ_ADDRESS: fffff80164b733b8: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
00000000002c0018.

CURRENT_IRQL: 2.

FAULTING_IP:
nt!KiTimerWaitTest+ce.
fffff801`646c1ffe 488b4e18 mov rcx,qword ptr [rsi+18h]

CPU_COUNT: 8.

CPU_MHZ: a20.

CPU_VENDOR: GenuineIntel.

CPU_FAMILY: 6.

CPU_MODEL: 5e.

CPU_STEPPING: 3.

CPU_MICROCODE: 6,5e,3,0 (F,M,S,R) SIG: CC'00000000 (cache) CC'00000000 (init)

BLACKBOXNTFS: 1 (!blackboxntfs)

CUSTOMER_CRASH_COUNT: 1.

DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT.

BUGCHECK_STR: AV.

PROCESS_NAME: System.

ANALYSIS_SESSION_HOST: DESKTOP-BKJR0DQ.

ANALYSIS_SESSION_TIME: 03-06-2020 14:39:48.0936.

ANALYSIS_VERSION: 10.0.18362.1 amd64fre.

TRAP_FRAME: fffff8016b208600 -- (.trap 0xfffff8016b208600)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000c2872c88 rbx=0000000000000000 rcx=00000000ffc2872c.
rdx=ffffc20cf70ef468 rsi=0000000000000000 rdi=0000000000000000.
rip=fffff801646c1ffe rsp=fffff8016b208790 rbp=0000000000000008.
r8=ffffc20cf70ef4a8 r9=0000000000000000 r10=fffff80162366800.
r11=0000000000000003 r12=0000000000000000 r13=0000000000000000.
r14=0000000000000000 r15=0000000000000000.
iopl=0 nv up ei pl nz na pe cy.
nt!KiTimerWaitTest+0xce:
fffff801`646c1ffe 488b4e18 mov rcx,qword ptr [rsi+18h] ds:00000000`00000018=????????????????
Resetting default scope.

LAST_CONTROL_TRANSFER: from fffff801647d41e9 to fffff801647c2380.

STACK_TEXT:
fffff801`6b2084b8 fffff801`647d41e9 : 00000000`0000000a 00000000`002c0018 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx.
fffff801`6b2084c0 fffff801`647d052b : ffffffff`ffffffff fffff801`647893a8 ffffc20c`00000002 fffff801`6b2087f8 : nt!KiBugCheckDispatch+0x69.
fffff801`6b208600 fffff801`646c1ffe : ffffc20c`f306b188 00000000`00000000 ffffc20c`f306b250 ffffc20c`f306b180 : nt!KiPageFault+0x46b.
fffff801`6b208790 fffff801`646c1cc2 : ffffc20c`f70ef468 00000000`00000000 00000000`00000000 000032c9`00000002 : nt!KiTimerWaitTest+0xce.
fffff801`6b208840 fffff801`646c0ab9 : 00000000`00000014 00000000`00989680 00000000`0000007d 00000000`00000095 : nt!KiProcessExpiredTimerList+0xd2.
fffff801`6b208930 fffff801`647c5ec4 : 00000000`00000000 fffff801`62363180 fffff801`64b91400 ffffc20c`f31b8140 : nt!KiRetireDpcList+0x4e9.
fffff801`6b208b60 00000000`00000000 : fffff801`6b209000 fffff801`6b202000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x84.

THREAD_SHA1_HASH_MOD_FUNC: 7417776dc1ced3b28cfd6ad1f6d3803dd01aca0a.

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: f7c15922d5d0a48a4a4f975cdfe2104dcc8a64ff.

THREAD_SHA1_HASH_MOD: 30a3e915496deaace47137d5b90c3ecc03746bf6.

FOLLOWUP_IP:
nt!KiTimerWaitTest+ce.
fffff801`646c1ffe 488b4e18 mov rcx,qword ptr [rsi+18h]

FAULT_INSTR_CODE: 184e8b48.

SYMBOL_STACK_INDEX: 3.

SYMBOL_NAME: nt!KiTimerWaitTest+ce.

FOLLOWUP_NAME: MachineOwner.

MODULE_NAME: nt.

IMAGE_NAME: ntkrnlmp.exe.

DEBUG_FLR_IMAGE_TIMESTAMP: 0.

IMAGE_VERSION: 10.0.18362.693.

STACK_COMMAND: .thread ; .cxr ; kb.

BUCKET_ID_FUNC_OFFSET: ce.

FAILURE_BUCKET_ID: AV_nt!KiTimerWaitTest.

BUCKET_ID: AV_nt!KiTimerWaitTest.

PRIMARY_PROBLEM_CLASS: AV_nt!KiTimerWaitTest.

TARGET_TIME: 2020-03-04T15:12:19.000Z.

OSBUILD: 18362.

OSSERVICEPACK: 693.

SERVICEPACK_NUMBER: 0.

OS_REVISION: 0.

SUITE_MASK: 272.

PRODUCT_TYPE: 1.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS.

OS_LOCALE:

USER_LCID: 0.

OSBUILD_TIMESTAMP: unknown_date.

BUILDDATESTAMP_STR: 190318-1202.

BUILDLAB_STR: 19h1_release.

BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202.

ANALYSIS_SESSION_ELAPSED_TIME: 31df.

ANALYSIS_SOURCE: KM.

FAILURE_ID_HASH_STRING: km:av_nt!kitimerwaittest.

FAILURE_ID_HASH: {8c029a8d-9f29-4bde-2664-6010a6365158}

Followup: MachineOwner.
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an.
interrupt request level (IRQL) that is too high. This is usually.
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff8046bc27c28, memory referenced.
Arg2: 0000000000000006, IRQL.
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation.
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80467a2cbb2, address which referenced memory.

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys.

KEY_VALUES_STRING: 1.

PROCESSES_ANALYSIS: 1.

SERVICE_ANALYSIS: 1.

STACKHASH_ANALYSIS: 1.

TIMELINE_ANALYSIS: 1.

DUMP_CLASS: 1.

DUMP_QUALIFIER: 400.

BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202.

SYSTEM_MANUFACTURER: Micro-Star International Co., Ltd.

SYSTEM_PRODUCT_NAME: GL62 6QD.

SYSTEM_SKU: Default string.

SYSTEM_VERSION: REV:1.0.

BIOS_VENDOR: American Megatrends Inc.

BIOS_VERSION: E16J6IMS.107.

BIOS_DATE: 06/03/2016.

BASEBOARD_MANUFACTURER: Micro-Star International Co., Ltd.

BASEBOARD_PRODUCT: MS-16J6.

BASEBOARD_VERSION: REV:1.0.

DUMP_TYPE: 2.

BUGCHECK_P1: fffff8046bc27c28.

BUGCHECK_P2: 6.

BUGCHECK_P3: 1.

BUGCHECK_P4: fffff80467a2cbb2.

WRITE_ADDRESS: fffff80467f733b8: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
fffff8046bc27c28.

CURRENT_IRQL: 6.

FAULTING_IP:
nt!KeInitializeEnumerationContext+2.
fffff804`67a2cbb2 66894110 mov word ptr [rcx+10h],ax.

CPU_COUNT: 8.

CPU_MHZ: a20.

CPU_VENDOR: GenuineIntel.

CPU_FAMILY: 6.

CPU_MODEL: 5e.

CPU_STEPPING: 3.

CPU_MICROCODE: 6,5e,3,0 (F,M,S,R) SIG: CC'00000000 (cache) CC'00000000 (init)

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1.

CUSTOMER_CRASH_COUNT: 1.

DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT.

BUGCHECK_STR: AV.

PROCESS_NAME: System.

ANALYSIS_SESSION_HOST: DESKTOP-BKJR0DQ.

ANALYSIS_SESSION_TIME: 03-06-2020 14:39:51.0489.

ANALYSIS_VERSION: 10.0.18362.1 amd64fre.

TRAP_FRAME: fffff8046bc179d0 -- (.trap 0xfffff8046bc179d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffff8046bc27c18.
rdx=fffff8046bc17cf0 rsi=0000000000000000 rdi=0000000000000000.
rip=fffff80467a2cbb2 rsp=fffff8046bc17b68 rbp=0000000000000000.
r8=0000000000000862 r9=0000000000000062 r10=fffff80467a2cbb0.
r11=fffff8046bc17b60 r12=0000000000000000 r13=0000000000000000.
r14=0000000000000000 r15=0000000000000000.
iopl=0 nv up ei pl zr na po nc.
nt!KeInitializeEnumerationContext+0x2:
fffff804`67a2cbb2 66894110 mov word ptr [rcx+10h],ax ds:fffff804`6bc27c28=????
Resetting default scope.

LAST_CONTROL_TRANSFER: from fffff80467bd41e9 to fffff80467bc2380.

STACK_TEXT:
fffff804`6bc17888 fffff804`67bd41e9 : 00000000`0000000a fffff804`6bc27c28 00000000`00000006 00000000`00000001 : nt!KeBugCheckEx.
fffff804`6bc17890 fffff804`67bd052b : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69.
fffff804`6bc179d0 fffff804`67a2cbb2 : fffff804`684b902c 00000000`00000000 00000000`000000a8 00000000`00000200 : nt!KiPageFault+0x46b.
fffff804`6bc17b68 fffff804`684b902c : 00000000`00000000 00000000`000000a8 00000000`00000200 00000000`00000000 : nt!KeInitializeEnumerationContext+0x2.
fffff804`6bc17b70 fffff804`684b8d97 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : hal!HalpInterruptSendIpi+0x278.
fffff804`6bc17df0 fffff804`67a2cee5 : 00000000`00000062 ffffe101`a7ff6280 fffff804`6bc17ed0 fffff804`67ac155b : hal!HalRequestIpiSpecifyVector+0x67.
fffff804`6bc17e40 fffff804`67a2cde2 : fffff804`69c02d10 00000000`00006202 ffffe101`a7ff6280 00000000`00000008 : nt!KiIntRedirectQueueRequestOnProcessor+0x71.
fffff804`6bc17f40 fffff804`67bc3b9f : fffff804`6bc08a50 fffff804`6bc08a50 fffff804`6bc08a50 ffffe101`a7ff6280 : nt!KiCallInterruptServiceRoutine+0x212.
fffff804`6bc17f90 fffff804`67bc3e67 : 00000000`00000000 fffff804`62d71180 fffff804`6bc08b00 00000000`00000001 : nt!KiInterruptSubDispatch+0x11f.
fffff804`6bc089d0 fffff804`67bc5e8e : 00000000`00000000 fffff804`62d71180 ffffbc04`76d91080 00000000`00000c56 : nt!KiInterruptDispatch+0x37.
fffff804`6bc08b60 00000000`00000000 : fffff804`6bc09000 fffff804`6bc02000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x4e.

THREAD_SHA1_HASH_MOD_FUNC: 6603e4c04448daf1b319693abce1a0094f73421d.

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: c3f23474dd0086dac79e2d0310f7e1fc7cdeea65.

THREAD_SHA1_HASH_MOD: 414b44878b84a44a2e53a4859d23c29d8b1a5f07.

FOLLOWUP_IP:
nt!KeInitializeEnumerationContext+2.
fffff804`67a2cbb2 66894110 mov word ptr [rcx+10h],ax.

FAULT_INSTR_CODE: 10418966.

SYMBOL_STACK_INDEX: 3.

SYMBOL_NAME: nt!KeInitializeEnumerationContext+2.

FOLLOWUP_NAME: MachineOwner.

MODULE_NAME: nt.

IMAGE_NAME: ntkrnlmp.exe.

DEBUG_FLR_IMAGE_TIMESTAMP: 0.

IMAGE_VERSION: 10.0.18362.693.

STACK_COMMAND: .thread ; .cxr ; kb.

BUCKET_ID_FUNC_OFFSET: 2.

FAILURE_BUCKET_ID: AV_nt!KeInitializeEnumerationContext.

BUCKET_ID: AV_nt!KeInitializeEnumerationContext.

PRIMARY_PROBLEM_CLASS: AV_nt!KeInitializeEnumerationContext.

TARGET_TIME: 2020-03-04T15:18:19.000Z.

OSBUILD: 18362.

OSSERVICEPACK: 693.

SERVICEPACK_NUMBER: 0.

OS_REVISION: 0.

SUITE_MASK: 272.

PRODUCT_TYPE: 1.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS.

OS_LOCALE:

USER_LCID: 0.

OSBUILD_TIMESTAMP: unknown_date.

BUILDDATESTAMP_STR: 190318-1202.

BUILDLAB_STR: 19h1_release.

BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202.

ANALYSIS_SESSION_ELAPSED_TIME: 51cf.

ANALYSIS_SOURCE: KM.

FAILURE_ID_HASH_STRING: km:av_nt!keinitializeenumerationcontext.

FAILURE_ID_HASH: {e8942f90-bdd6-79ce-ede0-3460bf7671b7}

Followup: MachineOwner.
---------

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints.
the driver/function that caused the problem. Always note this address.
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled.
Arg2: fffff807522bbd7b, The address that the exception occurred at.
Arg3: 0000000000000000, Parameter 0 of the exception.
Arg4: ffffffffffffffff, Parameter 1 of the exception.

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys.

KEY_VALUES_STRING: 1.

PROCESSES_ANALYSIS: 1.

SERVICE_ANALYSIS: 1.

STACKHASH_ANALYSIS: 1.

TIMELINE_ANALYSIS: 1.

DUMP_CLASS: 1.

DUMP_QUALIFIER: 400.

BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202.

SYSTEM_MANUFACTURER: Micro-Star International Co., Ltd.

SYSTEM_PRODUCT_NAME: GL62 6QD.

SYSTEM_SKU: Default string.

SYSTEM_VERSION: REV:1.0.

BIOS_VENDOR: American Megatrends Inc.

BIOS_VERSION: E16J6IMS.107.

BIOS_DATE: 06/03/2016.

BASEBOARD_MANUFACTURER: Micro-Star International Co., Ltd.

BASEBOARD_PRODUCT: MS-16J6.

BASEBOARD_VERSION: REV:1.0.

DUMP_TYPE: 2.

BUGCHECK_P1: ffffffffc0000005.

BUGCHECK_P2: fffff807522bbd7b.

BUGCHECK_P3: 0.

BUGCHECK_P4: ffffffffffffffff.

READ_ADDRESS: fffff807527733b8: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
ffffffffffffffff.

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP:
nt!PpmIdlePrepare+16b.
fffff807`522bbd7b 488b86c85d0000 mov rax,qword ptr [rsi+5DC8h]

EXCEPTION_PARAMETER2: ffffffffffffffff.

BUGCHECK_STR: 0x1E_c0000005_R.

CPU_COUNT: 8.

CPU_MHZ: a20.

CPU_VENDOR: GenuineIntel.

CPU_FAMILY: 6.

CPU_MODEL: 5e.

CPU_STEPPING: 3.

CPU_MICROCODE: 6,5e,3,0 (F,M,S,R) SIG: CC'00000000 (cache) CC'00000000 (init)

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1.

CUSTOMER_CRASH_COUNT: 2.

DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT.

PROCESS_NAME: System.

CURRENT_IRQL: 0.

ANALYSIS_SESSION_HOST: DESKTOP-BKJR0DQ.

ANALYSIS_SESSION_TIME: 03-06-2020 14:39:53.0839.

ANALYSIS_VERSION: 10.0.18362.1 amd64fre.

LAST_CONTROL_TRANSFER: from fffff807524a695e to fffff807523c2380.

STACK_TEXT:
fffff807`56e1e138 fffff807`524a695e : 00000000`0000001e ffffffff`c0000005 fffff807`522bbd7b 00000000`00000000 : nt!KeBugCheckEx.
fffff807`56e1e140 fffff807`523cb1af : fffff807`52711000 fffff807`52200000 0005e3bc`00ab7000 00000000`0010001f : nt!KiFatalExceptionHandler+0x22.
fffff807`56e1e180 fffff807`522fa2d5 : 00000000`00000000 00000000`00000000 fffff807`56e1e6f0 00007fff`ffff0000 : nt!RtlpExecuteHandlerForException+0xf.
fffff807`56e1e1b0 fffff807`522fe86e : fffff807`56e085d8 fffff807`56e1ee30 fffff807`56e085d8 ffff9f83`faaad000 : nt!RtlDispatchException+0x4a5.
fffff807`56e1e900 fffff807`523c3202 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x16e.
fffff807`56e1efb0 fffff807`523c31d0 : fffff807`523d4316 fffff807`56e08690 ffff9f83`f3f13000 00000000`00000000 : nt!KxExceptionDispatchOnExceptionStack+0x12.
fffff807`56e08498 fffff807`523d4316 : fffff807`56e08690 ffff9f83`f3f13000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatchOnExceptionStackContinue.
fffff807`56e084a0 fffff807`523d00a2 : 00000000`00000000 fffff807`5bc4a9e0 00000000`00002300 ffff9f83`f3b37010 : nt!KiExceptionDispatch+0x116.
fffff807`56e08680 fffff807`522bbd7b : 00000000`0000eb48 00000000`00989680 ffff9f83`faaad000 00000000`556c1d8f : nt!KiGeneralProtectionFault+0x322.
fffff807`56e08810 fffff807`522bac66 : 00000000`00000003 00000000`00000002 00000000`00000001 00000000`00000000 : nt!PpmIdlePrepare+0x16b.
fffff807`56e08a00 fffff807`523c5e88 : 00000000`00000000 fffff807`4df0b180 ffff9f83`fa80e080 00000000`00000690 : nt!PoIdle+0x1e6.
fffff807`56e08b60 00000000`00000000 : fffff807`56e09000 fffff807`56e02000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x48.

THREAD_SHA1_HASH_MOD_FUNC: 8bcff7dfb5b7e7de7072fa9fdb8e61b576f4a5d9.

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: a0c586af5da1afadc8ebd7136b428fbe96dd9c4a.

THREAD_SHA1_HASH_MOD: dc844b1b94baa204d070855e43bbbd27eee98b94.

FOLLOWUP_IP:
nt!PpmIdlePrepare+16b.
fffff807`522bbd7b 488b86c85d0000 mov rax,qword ptr [rsi+5DC8h]

FAULT_INSTR_CODE: c8868b48.

SYMBOL_STACK_INDEX: 9.

SYMBOL_NAME: nt!PpmIdlePrepare+16b.

FOLLOWUP_NAME: MachineOwner.

MODULE_NAME: nt.

IMAGE_NAME: ntkrnlmp.exe.

DEBUG_FLR_IMAGE_TIMESTAMP: 0.

IMAGE_VERSION: 10.0.18362.693.

STACK_COMMAND: .thread ; .cxr ; kb.

BUCKET_ID_FUNC_OFFSET: 16b.

FAILURE_BUCKET_ID: 0x1E_c0000005_R_nt!PpmIdlePrepare.

BUCKET_ID: 0x1E_c0000005_R_nt!PpmIdlePrepare.

PRIMARY_PROBLEM_CLASS: 0x1E_c0000005_R_nt!PpmIdlePrepare.

TARGET_TIME: 2020-03-04T15:16:26.000Z.

OSBUILD: 18362.

OSSERVICEPACK: 693.

SERVICEPACK_NUMBER: 0.

OS_REVISION: 0.

SUITE_MASK: 272.

PRODUCT_TYPE: 1.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS.

OS_LOCALE:

USER_LCID: 0.

OSBUILD_TIMESTAMP: unknown_date.

BUILDDATESTAMP_STR: 190318-1202.

BUILDLAB_STR: 19h1_release.

BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202.

ANALYSIS_SESSION_ELAPSED_TIME: 431d.

ANALYSIS_SOURCE: KM.

FAILURE_ID_HASH_STRING: km:0x1e_c0000005_r_nt!ppmidleprepare.

FAILURE_ID_HASH: {e4b956cd-2b80-303f-b41f-aa0eaf18f843}

Followup: MachineOwner.
---------

Temiz kurulum ve güncel driverları yükledim sonuç 4 gün dayanabildi.
Minidump: minidump.rar.
 
Son düzenleme:
Dragon Gaming Center yazılımını geçici bir süreliğine kaldır.

Bellek veya ekran kartı nedenli gibi DDU ile harici ekran kartı sürümünü biraz geriye çekip dener misin?

Kod:
INTERRUPT_EXCEPTION_NOT_HANDLED (3d)
Arguments:
Arg1: fffff80354c77cb8
Arg2: fffff80354c77500
Arg3: 0000000000000000
Arg4: 0000000000000000

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  Micro-Star International Co., Ltd.

SYSTEM_PRODUCT_NAME:  GL62 6QD

SYSTEM_SKU:  Default string

SYSTEM_VERSION:  REV:1.0

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  E16J6IMS.10C

BIOS_DATE:  01/17/2018

BASEBOARD_MANUFACTURER:  Micro-Star International Co., Ltd.

BASEBOARD_PRODUCT:  MS-16J6

BASEBOARD_VERSION:  REV:1.0

DUMP_TYPE:  2

BUGCHECK_P1: fffff80354c77cb8

BUGCHECK_P2: fffff80354c77500

BUGCHECK_P3: 0

BUGCHECK_P4: 0

CONTEXT:  fffff80354c77cb8 -- (.cxr 0xfffff80354c77cb8)
rax=0000000000000007 rbx=fffff803504be4d1 rcx=0000000000000001
rdx=fffff80354c77e90 rsi=ffffe28dd931c5b0 rdi=0000000000000000
rip=ffffe28dda54aaa0 rsp=0000000000000000 rbp=fffff803505d00a2
r8=00000000c0000000  r9=ffffe28dd94ae9b0 r10=0000000000000001
r11=00001f80018820a5 r12=00011df2e57f2baa r13=0001000000000000
r14=00011df200000000 r15=0000000000000000
iopl=0         nv up di pl nz na pe nc
cs=0000  ss=0000  ds=0000  es=f803  fs=ffff  gs=000b             efl=00000000
ffffe28d`da54aaa0 0100            add     dword ptr [rax],eax ds:00000000`00000007=????????
Resetting default scope

CPU_COUNT: 8

CPU_MHZ: a20

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 5e

CPU_STEPPING: 3

CPU_MICROCODE: 6,5e,3,0 (F,M,S,R)  SIG: CC'00000000 (cache) CC'00000000 (init)

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  0x3D

PROCESS_NAME:  System

CURRENT_IRQL:  7

ANALYSIS_SESSION_HOST:  DESKTOP-BKJR0DQ

ANALYSIS_SESSION_TIME:  03-10-2020 22:33:04.0695

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

LAST_CONTROL_TRANSFER:  from fffff803506aa745 to fffff803505c2380

STACK_TEXT:
fffff803`54c76d08 fffff803`506aa745 : 00000000`0000003d fffff803`54c77cb8 fffff803`54c77500 00000000`00000000 : nt!KeBugCheckEx
fffff803`54c76d10 fffff803`505cb1af : fffff803`50911000 fffff803`50400000 0005e3bc`00ab7000 00000000`0010001f : nt!KiInterruptHandler+0x21
fffff803`54c76d50 fffff803`504fa2d5 : 00000000`001c1184 00000000`00000000 fffff803`54c772c0 00007fff`ffff0000 : nt!RtlpExecuteHandlerForException+0xf
fffff803`54c76d80 fffff803`504fe86e : fffff803`54c77cb8 fffff803`54c77a00 fffff803`54c77cb8 ffffe28d`d65fea90 : nt!RtlDispatchException+0x4a5
fffff803`54c774d0 fffff803`505d431d : 00000000`00000286 ffff8286`e86bf090 00000000`00000000 00000000`00000026 : nt!KiDispatchException+0x16e
fffff803`54c77b80 fffff803`505d00a2 : ffffe28d`d931c5b0 00000000`00000000 00000000`c0000000 ffffe28d`d94ae9b0 : nt!KiExceptionDispatch+0x11d
fffff803`54c77d60 fffff803`506a8464 : fffff803`54c77fb0 00000000`00000f43 00000000`00000000 fffff803`504bffb1 : nt!KiGeneralProtectionFault+0x322
fffff803`54c77ef0 fffff803`505edd54 : ffffd181`616028c0 00000000`0000b201 ffffe28d`d65fea90 ffffd181`61602970 : nt!KiAcquireSpinLockInstrumented+0x6c
fffff803`54c77f40 fffff803`505c3b9f : fffff803`54c68a50 ffffd181`616028c0 00000000`0000055c ffffd181`616028c0 : nt!KiCallInterruptServiceRoutine+0x1c1184
fffff803`54c77f90 fffff803`505c3e67 : 00000000`00000002 fffff803`4d126180 fffff803`54c68b00 00000000`00000001 : nt!KiInterruptSubDispatch+0x11f
fffff803`54c689d0 fffff803`505c5e8e : 00000000`00000000 fffff803`4d126180 ffffe28d`d6ae2080 00000000`0000055c : nt!KiInterruptDispatch+0x37
fffff803`54c68b60 00000000`00000000 : fffff803`54c69000 fffff803`54c62000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x4e


THREAD_SHA1_HASH_MOD_FUNC:  b17463eea56ce072f756dd5279ed52741cb8fb16

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  582d72825231255423c84d20a50c78fbaef99215

THREAD_SHA1_HASH_MOD:  dc844b1b94baa204d070855e43bbbd27eee98b94

FOLLOWUP_IP:
nt!KiInterruptHandler+21
fffff803`506aa745 cc              int     3

FAULT_INSTR_CODE:  cccccccc

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!KiInterruptHandler+21

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  0

IMAGE_VERSION:  10.0.18362.693

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  21

FAILURE_BUCKET_ID:  0x3D_nt!KiInterruptHandler

BUCKET_ID:  0x3D_nt!KiInterruptHandler

PRIMARY_PROBLEM_CLASS:  0x3D_nt!KiInterruptHandler

TARGET_TIME:  2020-03-10T18:51:56.000Z

OSBUILD:  18362

OSSERVICEPACK:  693

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  unknown_date

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  ec04

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x3d_nt!kiinterrupthandler

FAILURE_ID_HASH:  {6f7644fa-fbe4-f01a-a2c3-1310421efccb}

Followup:     MachineOwner
---------
 
Dragon Gaming Center yazılımını geçici bir süreliğine kaldır.

Bellek veya ekran kartı nedenli gibi DDU ile harici ekran kartı sürümünü biraz geriye çekip dener misin?

Kod:
INTERRUPT_EXCEPTION_NOT_HANDLED (3d)
Arguments:
Arg1: fffff80354c77cb8
Arg2: fffff80354c77500
Arg3: 0000000000000000
Arg4: 0000000000000000

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1

DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER: Micro-Star International Co., Ltd.

SYSTEM_PRODUCT_NAME: GL62 6QD

SYSTEM_SKU: Default string

SYSTEM_VERSION: REV:1.0

BIOS_VENDOR: American Megatrends Inc.

BIOS_VERSION: E16J6IMS.10C

BIOS_DATE: 01/17/2018

BASEBOARD_MANUFACTURER: Micro-Star International Co., Ltd.

BASEBOARD_PRODUCT: MS-16J6

BASEBOARD_VERSION: REV:1.0

DUMP_TYPE: 2

BUGCHECK_P1: fffff80354c77cb8

BUGCHECK_P2: fffff80354c77500

BUGCHECK_P3: 0

BUGCHECK_P4: 0

CONTEXT: fffff80354c77cb8 -- (.cxr 0xfffff80354c77cb8)
rax=0000000000000007 rbx=fffff803504be4d1 rcx=0000000000000001
rdx=fffff80354c77e90 rsi=ffffe28dd931c5b0 rdi=0000000000000000
rip=ffffe28dda54aaa0 rsp=0000000000000000 rbp=fffff803505d00a2
r8=00000000c0000000 r9=ffffe28dd94ae9b0 r10=0000000000000001
r11=00001f80018820a5 r12=00011df2e57f2baa r13=0001000000000000
r14=00011df200000000 r15=0000000000000000
iopl=0 nv up di pl nz na pe nc
cs=0000 ss=0000 ds=0000 es=f803 fs=ffff gs=000b efl=00000000
ffffe28d`da54aaa0 0100 add dword ptr [rax],eax ds:00000000`00000007=????????
Resetting default scope

CPU_COUNT: 8

CPU_MHZ: a20

CPU_VENDOR: GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 5e

CPU_STEPPING: 3

CPU_MICROCODE: 6,5e,3,0 (F,M,S,R) SIG: CC'00000000 (cache) CC'00000000 (init)

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT

BUGCHECK_STR: 0x3D

PROCESS_NAME: System

CURRENT_IRQL: 7

ANALYSIS_SESSION_HOST: DESKTOP-BKJR0DQ

ANALYSIS_SESSION_TIME: 03-10-2020 22:33:04.0695

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

LAST_CONTROL_TRANSFER: from fffff803506aa745 to fffff803505c2380

STACK_TEXT:
fffff803`54c76d08 fffff803`506aa745 : 00000000`0000003d fffff803`54c77cb8 fffff803`54c77500 00000000`00000000 : nt!KeBugCheckEx
fffff803`54c76d10 fffff803`505cb1af : fffff803`50911000 fffff803`50400000 0005e3bc`00ab7000 00000000`0010001f : nt!KiInterruptHandler+0x21
fffff803`54c76d50 fffff803`504fa2d5 : 00000000`001c1184 00000000`00000000 fffff803`54c772c0 00007fff`ffff0000 : nt!RtlpExecuteHandlerForException+0xf
fffff803`54c76d80 fffff803`504fe86e : fffff803`54c77cb8 fffff803`54c77a00 fffff803`54c77cb8 ffffe28d`d65fea90 : nt!RtlDispatchException+0x4a5
fffff803`54c774d0 fffff803`505d431d : 00000000`00000286 ffff8286`e86bf090 00000000`00000000 00000000`00000026 : nt!KiDispatchException+0x16e
fffff803`54c77b80 fffff803`505d00a2 : ffffe28d`d931c5b0 00000000`00000000 00000000`c0000000 ffffe28d`d94ae9b0 : nt!KiExceptionDispatch+0x11d
fffff803`54c77d60 fffff803`506a8464 : fffff803`54c77fb0 00000000`00000f43 00000000`00000000 fffff803`504bffb1 : nt!KiGeneralProtectionFault+0x322
fffff803`54c77ef0 fffff803`505edd54 : ffffd181`616028c0 00000000`0000b201 ffffe28d`d65fea90 ffffd181`61602970 : nt!KiAcquireSpinLockInstrumented+0x6c
fffff803`54c77f40 fffff803`505c3b9f : fffff803`54c68a50 ffffd181`616028c0 00000000`0000055c ffffd181`616028c0 : nt!KiCallInterruptServiceRoutine+0x1c1184
fffff803`54c77f90 fffff803`505c3e67 : 00000000`00000002 fffff803`4d126180 fffff803`54c68b00 00000000`00000001 : nt!KiInterruptSubDispatch+0x11f
fffff803`54c689d0 fffff803`505c5e8e : 00000000`00000000 fffff803`4d126180 ffffe28d`d6ae2080 00000000`0000055c : nt!KiInterruptDispatch+0x37
fffff803`54c68b60 00000000`00000000 : fffff803`54c69000 fffff803`54c62000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x4e

THREAD_SHA1_HASH_MOD_FUNC: b17463eea56ce072f756dd5279ed52741cb8fb16

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 582d72825231255423c84d20a50c78fbaef99215

THREAD_SHA1_HASH_MOD: dc844b1b94baa204d070855e43bbbd27eee98b94

FOLLOWUP_IP:
nt!KiInterruptHandler+21
fffff803`506aa745 cc int 3

FAULT_INSTR_CODE: cccccccc

SYMBOL_STACK_INDEX: 1

SYMBOL_NAME: nt!KiInterruptHandler+21

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP: 0

IMAGE_VERSION: 10.0.18362.693

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 21

FAILURE_BUCKET_ID: 0x3D_nt!KiInterruptHandler

BUCKET_ID: 0x3D_nt!KiInterruptHandler

PRIMARY_PROBLEM_CLASS: 0x3D_nt!KiInterruptHandler

TARGET_TIME: 2020-03-10T18:51:56.000Z

OSBUILD: 18362

OSSERVICEPACK: 693

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: unknown_date

BUILDDATESTAMP_STR: 190318-1202

BUILDLAB_STR: 19h1_release

BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME: ec04

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:0x3d_nt!kiinterrupthandler

FAILURE_ID_HASH: {6f7644fa-fbe4-f01a-a2c3-1310421efccb}

Followup: MachineOwner
---------

Dragon Gamin Center kaldırdım. DDU ile erkan kartını geriye aldım bu sefer 5 gün hata vermedi tekrar başladı sanırım RAM'le alakalı artık servise göndereceğim son minidump dosyaları aşağıda size zahmet son bir defa bakabilir misiniz :D
minidump: minidump.rar
 
Intel Wi-Fi sürücüsünü kaldırıp güncel bir sürümü kurup dener misin?

Kod:
MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000061941, The subtype of the bugcheck.
Arg2: fffff8044eb0b5f0
Arg3: 0000000000000019
Arg4: fffff80447877c20

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

DUMP_TYPE:  2

BUGCHECK_P1: 61941

BUGCHECK_P2: fffff8044eb0b5f0

BUGCHECK_P3: 19

BUGCHECK_P4: fffff80447877c20

BUGCHECK_STR:  0x1a_61941

CPU_COUNT: 8

CPU_MHZ: a20

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 5e

CPU_STEPPING: 3

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  System

CURRENT_IRQL:  9

ANALYSIS_SESSION_HOST:  DESKTOP-BKJR0DQ

ANALYSIS_SESSION_TIME:  03-17-2020 23:46:48.0578

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

TRAP_FRAME:  fffff80447877c20 -- (.trap 0xfffff80447877c20)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffa20f18617010
rdx=000000000000000c rsi=0000000000000000 rdi=0000000000000000
rip=fffff8044eb0b5f0 rsp=fffff80447877db8 rbp=0000000000000000
 r8=000000007a80008a  r9=fffff80447877f18 r10=fffff80446eaf950
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
Netwtw04!nalCsrWriteReg:
fffff804`4eb0b5f0 83b93803000000  cmp     dword ptr [rcx+338h],0 ds:ffffa20f`18617348=????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80441a4288c to fffff804419c2380

STACK_TEXT: 
fffff804`47877a78 fffff804`41a4288c : 00000000`0000001a 00000000`00061941 fffff804`4eb0b5f0 00000000`00000019 : nt!KeBugCheckEx
fffff804`47877a80 fffff804`419d0420 : 00000000`00989680 fffff804`4aef9a6e 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x179a1c
fffff804`47877c20 fffff804`4eb0b5f0 : fffff804`4eaf6f60 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x360
fffff804`47877db8 fffff804`4eaf6f60 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : Netwtw04!nalCsrWriteReg
fffff804`47877dc0 fffff804`4eaf304d : ffffa20f`177fdcb0 fffff804`47877e78 fffff804`47877f18 fffff804`4eaf6e00 : Netwtw04!isrServiceRoutineIct+0x160
fffff804`47877e10 fffff804`4e893395 : 00000000`00000000 fffff804`47877ea4 fffff804`47877ed8 00000000`00000000 : Netwtw04!alonExInterruptServiceRoutine+0x4d
fffff804`47877e40 fffff804`46eaf9be : ffffa20f`186444a0 00000000`00000000 00000000`00000000 00000000`00000000 : Netwtw04!oscMsiIsr+0x25
fffff804`47877e70 fffff804`41857921 : 000000e0`bd09723a fffff804`42322f00 00000000`00000202 fffff804`422b84b7 : ndis!ndisMiniportMessageIsr+0x6e
fffff804`47877f10 fffff804`4182cc75 : fffff804`47868a50 00000000`00000000 fffff804`3fbce180 fffff804`4182cc75 : nt!KiInterruptMessageDispatch+0x11
fffff804`47877f40 fffff804`419c3b9f : fffff804`47868a50 ffffc601`1d7983c0 00000000`000002fc ffffc601`1d7983c0 : nt!KiCallInterruptServiceRoutine+0xa5
fffff804`47877f90 fffff804`419c3e67 : 00000000`00000002 fffff804`3fbce180 fffff804`47868b00 00000000`00000001 : nt!KiInterruptSubDispatch+0x11f
fffff804`478689d0 fffff804`419c5e8e : 00000000`00000000 fffff804`3fbce180 ffffa20f`14dbe040 00000000`000002fc : nt!KiInterruptDispatch+0x37
fffff804`47868b60 00000000`00000000 : fffff804`47869000 fffff804`47862000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x4e


THREAD_SHA1_HASH_MOD_FUNC:  9f49d512f3536c5da04cdd18c72205f333f38268

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  f444bea735da0d61facd4ae7973ea819d5c2b5af

THREAD_SHA1_HASH_MOD:  02f029b153a6a21002f97ddb90ef5e14359e1dee

FOLLOWUP_IP:
Netwtw04!isrServiceRoutineIct+160
fffff804`4eaf6f60 c60601          mov     byte ptr [rsi],1

FAULT_INSTR_CODE:  410106c6

SYMBOL_STACK_INDEX:  4

SYMBOL_NAME:  Netwtw04!isrServiceRoutineIct+160

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: Netwtw04

IMAGE_NAME:  Netwtw04.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  5b1a2e25

IMAGE_VERSION:  19.51.8.3

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  160

FAILURE_BUCKET_ID:  0x1a_61941_Netwtw04!isrServiceRoutineIct

BUCKET_ID:  0x1a_61941_Netwtw04!isrServiceRoutineIct

PRIMARY_PROBLEM_CLASS:  0x1a_61941_Netwtw04!isrServiceRoutineIct

TARGET_TIME:  2020-03-17T20:36:57.000Z

OSBUILD:  18362

OSSERVICEPACK:  720

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  unknown_date

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  3b79

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x1a_61941_netwtw04!isrserviceroutineict

FAILURE_ID_HASH:  {0c49764e-30e1-88a8-6f46-918018981d00}

Followup:     MachineOwner
---------
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 000000000000000d, IRQL
Arg3: 0000000000000008, value 0 = read operation, 1 = write operation
Arg4: 0000000000000000, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

DUMP_TYPE:  2

BUGCHECK_P1: 0

BUGCHECK_P2: d

BUGCHECK_P3: 8

BUGCHECK_P4: 0

READ_ADDRESS: fffff8076b9733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
 0000000000000000

CURRENT_IRQL:  d

FAULTING_IP:
+0
00000000`00000000 ??              ???

PROCESS_NAME:  System

CPU_COUNT: 8

CPU_MHZ: a20

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 5e

CPU_STEPPING: 3

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  AV

ANALYSIS_SESSION_HOST:  DESKTOP-BKJR0DQ

ANALYSIS_SESSION_TIME:  03-17-2020 23:46:44.0833

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

TRAP_FRAME:  fffff8076f677750 -- (.trap 0xfffff8076f677750)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8076f677928 rbx=0000000000000000 rcx=fffff8076f6779c0
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=0000000000000000 rsp=fffff8076f6778e8 rbp=fffff8076f6779e0
 r8=0000000000000008  r9=0000000000000000 r10=0000000574006d22
r11=fffff8076f677b68 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
00000000`00000000 ??              ???
Resetting default scope

IP_IN_FREE_BLOCK: 0

LAST_CONTROL_TRANSFER:  from fffff8076b5d41e9 to fffff8076b5c2380

FAILED_INSTRUCTION_ADDRESS:
+0
00000000`00000000 ??              ???

STACK_TEXT: 
fffff807`6f677608 fffff807`6b5d41e9 : 00000000`0000000a 00000000`00000000 00000000`0000000d 00000000`00000008 : nt!KeBugCheckEx
fffff807`6f677610 fffff807`6b5d052b : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff807`6f677750 00000000`00000000 : fffff807`00000002 fffff807`6f6779e0 00000000`00000000 fffff807`00000008 : nt!KiPageFault+0x46b


THREAD_SHA1_HASH_MOD_FUNC:  bf99962f16aee8a6a536cfcc5454c0cd4db15ac9

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  497aaf2f8d4f907c0c9bce6ce025c930b885e2b8

THREAD_SHA1_HASH_MOD:  2a7ca9d3ab5386d53fea7498e1d81b9c4a4c036b

FOLLOWUP_IP:
nt!KiPageFault+46b
fffff807`6b5d052b 33c0            xor     eax,eax

FAULT_INSTR_CODE:  ffb0c033

SYMBOL_STACK_INDEX:  2

SYMBOL_NAME:  nt!KiPageFault+46b

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  0

IMAGE_VERSION:  10.0.18362.720

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  46b

FAILURE_BUCKET_ID:  AV_CODE_AV_NULL_IP_nt!KiPageFault

BUCKET_ID:  AV_CODE_AV_NULL_IP_nt!KiPageFault

PRIMARY_PROBLEM_CLASS:  AV_CODE_AV_NULL_IP_nt!KiPageFault

TARGET_TIME:  2020-03-17T20:30:30.000Z

OSBUILD:  18362

OSSERVICEPACK:  720

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  unknown_date

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  f7fb

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:av_code_av_null_ip_nt!kipagefault

FAILURE_ID_HASH:  {4ce35ff9-c5cf-d66d-0323-0f05e33f6692}

Followup:     MachineOwner
---------


DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 00000000550b8658, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff804550b8658, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

DUMP_TYPE:  2

BUGCHECK_P1: 550b8658

BUGCHECK_P2: ff

BUGCHECK_P3: 0

BUGCHECK_P4: fffff804550b8658

READ_ADDRESS: fffff804545733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
 00000000550b8658

CURRENT_IRQL:  d

FAULTING_IP:
+0
fffff804`550b8658 ??              ???

CPU_COUNT: 8

CPU_MHZ: a20

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 5e

CPU_STEPPING: 3

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  AV

PROCESS_NAME:  System

ANALYSIS_SESSION_HOST:  DESKTOP-BKJR0DQ

ANALYSIS_SESSION_TIME:  03-17-2020 23:46:41.0069

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

TRAP_FRAME:  ffffb801ad47d9e0 -- (.trap 0xffffb801ad47d9e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff804550b8658 rsp=ffffb801ad47db70 rbp=ffffb70b7ae2fa00
 r8=0000000000000000  r9=0000000000000000 r10=fffff804540b84b0
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up di ng nz ac po cy
fffff804`550b8658 ??              ???
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff804541d41e9 to fffff804541c2380

STACK_TEXT: 
ffffb801`ad47d898 fffff804`541d41e9 : 00000000`0000000a 00000000`550b8658 00000000`000000ff 00000000`00000000 : nt!KeBugCheckEx
ffffb801`ad47d8a0 fffff804`541d052b : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffb801`ad47d9e0 fffff804`550b8658 : fffff780`00000320 ffffb801`ad620180 00000000`000025d1 00000000`000025d1 : nt!KiPageFault+0x46b
ffffb801`ad47db70 fffff780`00000320 : ffffb801`ad620180 00000000`000025d1 00000000`000025d1 ffffb801`ad47dc00 : 0xfffff804`550b8658
ffffb801`ad47db78 ffffb801`ad620180 : 00000000`000025d1 00000000`000025d1 ffffb801`ad47dc00 00010000`00000004 : 0xfffff780`00000320
ffffb801`ad47db80 00000000`000025d1 : 00000000`000025d1 ffffb801`ad47dc00 00010000`00000004 00000000`00000000 : 0xffffb801`ad620180
ffffb801`ad47db88 00000000`000025d1 : ffffb801`ad47dc00 00010000`00000004 00000000`00000000 00000000`00000000 : 0x25d1
ffffb801`ad47db90 ffffb801`ad47dc00 : 00010000`00000004 00000000`00000000 00000000`00000000 ffffb801`ad620180 : 0x25d1
ffffb801`ad47db98 00010000`00000004 : 00000000`00000000 00000000`00000000 ffffb801`ad620180 00000000`00000000 : 0xffffb801`ad47dc00
ffffb801`ad47dba0 00000000`00000000 : 00000000`00000000 ffffb801`ad620180 00000000`00000000 ffffc985`aa3e8010 : 0x00010000`00000004


THREAD_SHA1_HASH_MOD_FUNC:  bf99962f16aee8a6a536cfcc5454c0cd4db15ac9

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  497aaf2f8d4f907c0c9bce6ce025c930b885e2b8

THREAD_SHA1_HASH_MOD:  2a7ca9d3ab5386d53fea7498e1d81b9c4a4c036b

FOLLOWUP_IP:
nt!KiPageFault+46b
fffff804`541d052b 33c0            xor     eax,eax

FAULT_INSTR_CODE:  ffb0c033

SYMBOL_STACK_INDEX:  2

SYMBOL_NAME:  nt!KiPageFault+46b

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  0

IMAGE_VERSION:  10.0.18362.720

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  46b

FAILURE_BUCKET_ID:  AV_nt!KiPageFault

BUCKET_ID:  AV_nt!KiPageFault

PRIMARY_PROBLEM_CLASS:  AV_nt!KiPageFault

TARGET_TIME:  2020-03-17T19:27:37.000Z

OSBUILD:  18362

OSSERVICEPACK:  720

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  unknown_date

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  7794

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:av_nt!kipagefault

FAILURE_ID_HASH:  {ec3e2762-48ae-ffe9-5b16-fbcb853e8320}

Followup:     MachineOwner
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffaf88f34d9ca8, memory referenced
Arg2: 000000000000000d, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8073f6b847b, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

DUMP_TYPE:  2

BUGCHECK_P1: ffffaf88f34d9ca8

BUGCHECK_P2: d

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8073f6b847b

READ_ADDRESS: fffff8073f1733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
 ffffaf88f34d9ca8

CURRENT_IRQL:  d

FAULTING_IP:
hal!HalpTimerClockInterrupt+bb
fffff807`3f6b847b 65488b042518000000 mov   rax,qword ptr gs:[18h]

CPU_COUNT: 8

CPU_MHZ: a20

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 5e

CPU_STEPPING: 3

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  AV

PROCESS_NAME:  System

ANALYSIS_SESSION_HOST:  DESKTOP-BKJR0DQ

ANALYSIS_SESSION_TIME:  03-17-2020 23:46:37.0719

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

TRAP_FRAME:  ffffb781b3c7dda0 -- (.trap 0xffffb781b3c7dda0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000001 rbx=0000000000000000 rcx=0000000000000001
rdx=00000000000026a6 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8073f6b847b rsp=ffffb781b3c7df30 rbp=ffff8f895fa2fa50
 r8=8000000000000000  r9=0000000000000000 r10=fffff8073ec5a110
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
hal!HalpTimerClockInterrupt+0xbb:
fffff807`3f6b847b 65488b042518000000 mov   rax,qword ptr gs:[18h] gs:00000000`00000018=????????????????
Resetting default scope

EXCEPTION_RECORD:  ffffffff00000000 -- (.exr 0xffffffff00000000)
Cannot read Exception record @ ffffffff00000000

LAST_CONTROL_TRANSFER:  from fffff8073edd41e9 to fffff8073edc2380

STACK_TEXT: 
ffffb781`b3c7dc58 fffff807`3edd41e9 : 00000000`0000000a ffffaf88`f34d9ca8 00000000`0000000d 00000000`00000000 : nt!KeBugCheckEx
ffffb781`b3c7dc60 fffff807`3edd052b : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffb781`b3c7dda0 fffff807`3f6b847b : ffff8f89`5fa2f9d0 ffff8f89`5fa2fa50 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x46b
ffffb781`b3c7df30 fffff807`3ec2cc75 : 00000001`43ac0693 ffffa582`a9ea0500 ffffa582`a9ea05b0 ffff1df5`8bcfa926 : hal!HalpTimerClockInterrupt+0xbb
ffffb781`b3c7df60 fffff807`3edc3e1a : ffff8f89`5fa2fa50 ffffa582`a9ea0500 00000000`0000058e ffffa582`a9ea0500 : nt!KiCallInterruptServiceRoutine+0xa5
ffffb781`b3c7dfb0 fffff807`3edc4387 : 00000000`00000002 ffffb781`b3e20180 ffff8f89`5fa2fb00 00000000`00000001 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
ffff8f89`5fa2f9d0 fffff807`3edc5e8e : ffffffff`00000000 ffffb781`b3e20180 ffffa582`b4199080 00000000`0000058e : nt!KiInterruptDispatchNoLockNoEtw+0x37
ffff8f89`5fa2fb60 00000000`00000000 : ffff8f89`5fa30000 ffff8f89`5fa29000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x4e


THREAD_SHA1_HASH_MOD_FUNC:  a11d56c4c45ae078b69e48163eacd24bbffd6189

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  bf489360f13a309414f3283359439f6fddbc347b

THREAD_SHA1_HASH_MOD:  77b99fd8d0bba6459fea0474c255a54ffe46d91a

FOLLOWUP_IP:
nt!KiPageFault+46b
fffff807`3edd052b 33c0            xor     eax,eax

FAULT_INSTR_CODE:  ffb0c033

SYMBOL_STACK_INDEX:  2

SYMBOL_NAME:  nt!KiPageFault+46b

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  0

IMAGE_VERSION:  10.0.18362.720

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  46b

FAILURE_BUCKET_ID:  AV_nt!KiPageFault

BUCKET_ID:  AV_nt!KiPageFault

PRIMARY_PROBLEM_CLASS:  AV_nt!KiPageFault

TARGET_TIME:  2020-03-17T19:24:33.000Z

OSBUILD:  18362

OSSERVICEPACK:  720

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  unknown_date

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  2cf1

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:av_nt!kipagefault

FAILURE_ID_HASH:  {ec3e2762-48ae-ffe9-5b16-fbcb853e8320}

Followup:     MachineOwner
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000c18, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8043b4cc85b, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

DUMP_TYPE:  2

BUGCHECK_P1: c18

BUGCHECK_P2: ff

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8043b4cc85b

READ_ADDRESS: fffff8043b9733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
 0000000000000c18

CURRENT_IRQL:  0

FAULTING_IP:
nt!MiCompletePrivateZeroFault+83b
fffff804`3b4cc85b f04c217718      lock and qword ptr [rdi+18h],r14

CPU_COUNT: 8

CPU_MHZ: a20

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 5e

CPU_STEPPING: 3

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  AV

PROCESS_NAME:  System

ANALYSIS_SESSION_HOST:  DESKTOP-BKJR0DQ

ANALYSIS_SESSION_TIME:  03-17-2020 23:46:33.0964

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

TRAP_FRAME:  fffff80441c68470 -- (.trap 0xfffff80441c68470)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000001d9754f0 rbx=0000000000000000 rcx=fffff8043a047180
rdx=0000000000000c69 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8043b4cc85b rsp=fffff80441c68600 rbp=0000000000000000
 r8=0000000000000c69  r9=0000000000000000 r10=fffff8043beba320
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up di pl zr na po nc
nt!MiCompletePrivateZeroFault+0x83b:
fffff804`3b4cc85b f04c217718      lock and qword ptr [rdi+18h],r14 ds:00000000`00000018=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff8043b5d41e9 to fffff8043b5c2380

STACK_TEXT: 
fffff804`41c68328 fffff804`3b5d41e9 : 00000000`0000000a 00000000`00000c18 00000000`000000ff 00000000`00000000 : nt!KeBugCheckEx
fffff804`41c68330 fffff804`3b5d052b : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff804`41c68470 fffff804`3b4cc85b : 00000000`00000002 00000000`00000000 ffffad87`f1d6a700 fffff804`3a04cf08 : nt!KiPageFault+0x46b
fffff804`41c68600 00000000`00000003 : ffffad87`f1d4d1f0 ffffad87`ffffffff 00000000`00000002 00000000`00000002 : nt!MiCompletePrivateZeroFault+0x83b
fffff804`41c68750 ffffad87`f1d4d1f0 : ffffad87`ffffffff 00000000`00000002 00000000`00000002 ffffad87`f128de10 : 0x3
fffff804`41c68758 ffffad87`ffffffff : 00000000`00000002 00000000`00000002 ffffad87`f128de10 ffffad87`f1d4d0f0 : 0xffffad87`f1d4d1f0
fffff804`41c68760 00000000`00000002 : 00000000`00000002 ffffad87`f128de10 ffffad87`f1d4d0f0 00000000`00000000 : 0xffffad87`ffffffff
fffff804`41c68768 00000000`00000002 : ffffad87`f128de10 ffffad87`f1d4d0f0 00000000`00000000 00000000`00000001 : 0x2
fffff804`41c68770 ffffad87`f128de10 : ffffad87`f1d4d0f0 00000000`00000000 00000000`00000001 00000000`00000000 : 0x2
fffff804`41c68778 ffffad87`f1d4d0f0 : 00000000`00000000 00000000`00000001 00000000`00000000 00000000`1dae6012 : 0xffffad87`f128de10
fffff804`41c68780 00000000`00000000 : 00000000`00000001 00000000`00000000 00000000`1dae6012 00000000`00000000 : 0xffffad87`f1d4d0f0


THREAD_SHA1_HASH_MOD_FUNC:  4af5fe8e4fbf067bc3a818c3d040b34fa30997d5

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  88775f92330b96b0cdf29d06b4f801dc96064736

THREAD_SHA1_HASH_MOD:  d084f7dfa548ce4e51810e4fd5914176ebc66791

FOLLOWUP_IP:
nt!MiCompletePrivateZeroFault+83b
fffff804`3b4cc85b f04c217718      lock and qword ptr [rdi+18h],r14

FAULT_INSTR_CODE:  77214cf0

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  nt!MiCompletePrivateZeroFault+83b

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP:  0

IMAGE_VERSION:  10.0.18362.720

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  memory_corruption

BUCKET_ID_FUNC_OFFSET:  83b

FAILURE_BUCKET_ID:  AV_nt!MiCompletePrivateZeroFault

BUCKET_ID:  AV_nt!MiCompletePrivateZeroFault

PRIMARY_PROBLEM_CLASS:  AV_nt!MiCompletePrivateZeroFault

TARGET_TIME:  2020-03-17T13:13:59.000Z

OSBUILD:  18362

OSSERVICEPACK:  720

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  unknown_date

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  475a

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:av_nt!micompleteprivatezerofault

FAILURE_ID_HASH:  {da77f906-0950-e1c7-5aba-d57356ac6e7e}

Followup:     MachineOwner
---------
 
Uyarı! Bu konu 5 yıl önce açıldı.
Muhtemelen daha fazla tartışma gerekli değildir ki bu durumda yeni bir konu başlatmayı öneririz. Eğer yine de cevabınızın gerekli olduğunu düşünüyorsanız buna rağmen cevap verebilirsiniz.

Geri
Yukarı