DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000008, value 0 = read operation, 1 = write operation
Arg4: 0000000000000000, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
DUMP_TYPE: 2
BUGCHECK_P1: 0
BUGCHECK_P2: 2
BUGCHECK_P3: 8
BUGCHECK_P4: 0
READ_ADDRESS: fffff8015fd733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
0000000000000000
CURRENT_IRQL: 2
FAULTING_IP:
+0
00000000`00000000 ?? ???
PROCESS_NAME: chrome.exe
CPU_COUNT: 8
CPU_MHZ: fa8
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 5e
CPU_STEPPING: 3
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
ANALYSIS_SESSION_HOST: DESKTOP-BKJR0DQ
ANALYSIS_SESSION_TIME: 03-06-2020 14:49:20.0257
ANALYSIS_VERSION: 10.0.18362.1 amd64fre
TRAP_FRAME: ffffef8451047560 -- (.trap 0xffffef8451047560)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000c6e8832000 rbx=0000000000000000 rcx=00000000c0000102
rdx=00000000000000c6 rsi=0000000000000000 rdi=0000000000000000
rip=0000000000000000 rsp=ffffef84510476f0 rbp=0000000000000000
r8=0000000000000000 r9=000000010000032c r10=ffffd8803d915180
r11=ffffb1837d01f080 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
00000000`00000000 ?? ???
Resetting default scope
IP_IN_FREE_BLOCK: 0
LAST_CONTROL_TRANSFER: from fffff8015f9d41e9 to fffff8015f9c2380
FAILED_INSTRUCTION_ADDRESS:
+0
00000000`00000000 ?? ???
STACK_TEXT:
ffffef84`51047418 fffff801`5f9d41e9 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000008 : nt!KeBugCheckEx
ffffef84`51047420 fffff801`5f9d052b : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffef84`51047560 00000000`00000000 : 00000000`00000000 00000000`00000000 43f00000`00000000 00000000`00000000 : nt!KiPageFault+0x46b
THREAD_SHA1_HASH_MOD_FUNC: bf99962f16aee8a6a536cfcc5454c0cd4db15ac9
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 497aaf2f8d4f907c0c9bce6ce025c930b885e2b8
THREAD_SHA1_HASH_MOD: 2a7ca9d3ab5386d53fea7498e1d81b9c4a4c036b
FOLLOWUP_IP:
nt!KiPageFault+46b
fffff801`5f9d052b 33c0 xor eax,eax
FAULT_INSTR_CODE: ffb0c033
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!KiPageFault+46b
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 0
IMAGE_VERSION: 10.0.18362.693
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 46b
FAILURE_BUCKET_ID: AV_CODE_AV_NULL_IP_nt!KiPageFault
BUCKET_ID: AV_CODE_AV_NULL_IP_nt!KiPageFault
PRIMARY_PROBLEM_CLASS: AV_CODE_AV_NULL_IP_nt!KiPageFault
TARGET_TIME: 2020-03-05T12:06:06.000Z
OSBUILD: 18362
OSSERVICEPACK: 693
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: unknown_date
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 1303
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_code_av_null_ip_nt!kipagefault
FAILURE_ID_HASH: {4ce35ff9-c5cf-d66d-0323-0f05e33f6692}
Followup: MachineOwner
---------
ATTEMPTED_WRITE_TO_READONLY_MEMORY (be)
An attempt was made to write to readonly memory. The guilty driver is on the
stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: fffff90002454fa8, Virtual address for the attempted write.
Arg2: 8a00000000200021, PTE contents.
Arg3: ffffbc01482176c0, (reserved)
Arg4: 000000000000000a, (reserved)
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
DUMP_TYPE: 2
BUGCHECK_P1: fffff90002454fa8
BUGCHECK_P2: 8a00000000200021
BUGCHECK_P3: ffffbc01482176c0
BUGCHECK_P4: a
CPU_COUNT: 8
CPU_MHZ: fa8
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 5e
CPU_STEPPING: 3
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: 0xBE
PROCESS_NAME: System
CURRENT_IRQL: 2
ANALYSIS_SESSION_HOST: DESKTOP-BKJR0DQ
ANALYSIS_SESSION_TIME: 03-06-2020 14:49:16.0057
ANALYSIS_VERSION: 10.0.18362.1 amd64fre
TRAP_FRAME: ffffbc01482176c0 -- (.trap 0xffffbc01482176c0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffbc0148217828 rbx=0000000000000000 rcx=fffff90002454f90
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80161657502 rsp=ffffbc0148217850 rbp=fffff80161a6a380
r8=0000000080000000 r9=0000000000000003 r10=00000000000c1c53
r11=ffffe5899561c000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!MiLockNestedPageAtDpcInline+0xe:
fffff801`61657502 f0480fba69183f lock bts qword ptr [rcx+18h],3Fh ds:fffff900`02454fa8=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff801618001e7 to fffff801617c2380
STACK_TEXT:
ffffbc01`482174d8 fffff801`618001e7 : 00000000`000000be fffff900`02454fa8 8a000000`00200021 ffffbc01`482176c0 : nt!KeBugCheckEx
ffffbc01`482174e0 fffff801`616c92fa : 8a000000`00200021 00000000`00000003 ffffbc01`48217620 00000000`00000000 : nt!MiRaisedIrqlFault+0x19e437
ffffbc01`48217520 fffff801`617d0420 : 00000000`00040202 fffff801`61721a84 00000048`0412017e ffffe589`95513080 : nt!MmAccessFault+0x48a
ffffbc01`482176c0 fffff801`61657502 : 00000000`00000000 00000000`00000000 fffff900`00000000 02000000`00000000 : nt!KiPageFault+0x360
ffffbc01`48217850 fffff801`616d9efc : fffff900`00000000 fffff801`61a6a380 00000000`00000000 ffff9c4d`20447050 : nt!MiLockNestedPageAtDpcInline+0xe
ffffbc01`48217880 fffff801`6175ee4d : e589a2f1`bf3004d0 00000000`00000001 00000000`00000000 fffff900`0567e640 : nt!MiRestoreTransitionPte+0x18c
ffffbc01`482178f0 fffff801`618db1e8 : 00000000`00000000 fffff900`05678670 fffff801`00000000 00000000`00000000 : nt!MiRemoveLowestPriorityStandbyPage+0x1bd
ffffbc01`48217990 fffff801`618db3f3 : fffff801`61a6a380 00000000`00000000 fffff801`00000000 00000000`00000206 : nt!MiPruneStandbyPages+0x250
ffffbc01`48217a20 fffff801`616f43c5 : ffffe589`a93ca040 fffff801`618db360 ffffe589`9547c520 fffff801`61a6c020 : nt!MiRebalanceZeroFreeLists+0x93
ffffbc01`48217a70 fffff801`6166bce5 : ffffe589`a93ca040 00000000`00000080 ffffe589`954b0040 28614c2e`00000001 : nt!ExpWorkerThread+0x105
ffffbc01`48217b10 fffff801`617c99ca : ffffd100`6fb43180 ffffe589`a93ca040 fffff801`6166bc90 637d0a0a`3b292861 : nt!PspSystemThreadStartup+0x55
ffffbc01`48217b60 00000000`00000000 : ffffbc01`48218000 ffffbc01`48211000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x2a
THREAD_SHA1_HASH_MOD_FUNC: 5554ee5f6880683562b6941626d7551fcb7a2f59
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: ff3954ede0aab373441df887cc46f40ca9d1197f
THREAD_SHA1_HASH_MOD: dc844b1b94baa204d070855e43bbbd27eee98b94
FOLLOWUP_IP:
nt!MiRaisedIrqlFault+19e437
fffff801`618001e7 cc int 3
FAULT_INSTR_CODE: cf8b48cc
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!MiRaisedIrqlFault+19e437
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 0
IMAGE_VERSION: 10.0.18362.693
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: memory_corruption
BUCKET_ID_FUNC_OFFSET: 19e437
FAILURE_BUCKET_ID: 0xBE_nt!MiRaisedIrqlFault
BUCKET_ID: 0xBE_nt!MiRaisedIrqlFault
PRIMARY_PROBLEM_CLASS: 0xBE_nt!MiRaisedIrqlFault
TARGET_TIME: 2020-03-05T15:45:25.000Z
OSBUILD: 18362
OSSERVICEPACK: 693
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: unknown_date
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 1cd0
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0xbe_nt!miraisedirqlfault
FAILURE_ID_HASH: {1c5b4d11-09e0-def3-d2d0-70a11d69b92d}
Followup: MachineOwner
---------
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8075796d92a, The address that the exception occurred at
Arg3: ffffe9085dfd7048, Parameter 0 of the exception
Arg4: fffff80758211930, Parameter 1 of the exception
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
DUMP_TYPE: 2
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff8075796d92a
BUGCHECK_P3: ffffe9085dfd7048
BUGCHECK_P4: fffff80758211930
WRITE_ADDRESS: fffff8074fd733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80758211930
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
tcpip!TcpUpdateTcbEstats+a094e
fffff807`5796d92a 488908 mov qword ptr [rax],rcx
EXCEPTION_PARAMETER1: ffffe9085dfd7048
EXCEPTION_PARAMETER2: fffff80758211930
BUGCHECK_STR: 0x1E_c0000005
CPU_COUNT: 8
CPU_MHZ: fa8
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 5e
CPU_STEPPING: 3
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 2
ANALYSIS_SESSION_HOST: DESKTOP-BKJR0DQ
ANALYSIS_SESSION_TIME: 03-06-2020 14:49:12.0743
ANALYSIS_VERSION: 10.0.18362.1 amd64fre
BAD_STACK_POINTER: fffff80758211088
LAST_CONTROL_TRANSFER: from fffff8074faa6667 to fffff8074f9c1510
STACK_TEXT:
fffff807`58211088 fffff807`4faa6667 : 00000000`0000001e ffffffff`c0000005 fffff807`5796d92a ffffe908`5dfd7048 : nt!KeBugCheckEx
fffff807`58211090 fffff807`4f9d9236 : fffff807`5796d92a fffff807`4f91657b ffffe908`5dfd7280 fffff807`58211930 : nt!KiFatalFilter+0x1f
fffff807`582110d0 fffff807`4f99c569 : fffff807`00000002 ffffe908`5dfd7fd0 ffffe908`5dfd2000 ffffe908`5dfd9000 : nt!KeExpandKernelStackAndCalloutInternal$filt$0+0x16
fffff807`58211110 fffff807`4f9ca33f : ffffe908`5dfd7fd0 fffff807`582116f0 00000000`00000000 00000000`0010001f : nt!_C_specific_handler+0xa9
fffff807`58211180 fffff807`4f8c2f15 : 00000000`00000000 00000000`00000000 fffff807`582116f0 00007fff`ffff0000 : nt!RtlpExecuteHandlerForException+0xf
fffff807`582111b0 fffff807`4f8c74ae : ffffe908`5dfd7048 fffff807`58211e30 ffffe908`5dfd7048 ffff9f8e`8d369bb0 : nt!RtlDispatchException+0x4a5
fffff807`58211900 fffff807`4f9c2392 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x16e
fffff807`58211fb0 fffff807`4f9c2360 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxExceptionDispatchOnExceptionStack+0x12
ffffe908`5dfd6f08 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatchOnExceptionStackContinue
THREAD_SHA1_HASH_MOD_FUNC: 807003e66859482870638b72b993eaa394e895d2
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: d1c6fea8880f54a80c34f15b65b52096254d6271
THREAD_SHA1_HASH_MOD: 9f457f347057f10e1df248e166a3e95e6570ecfe
FOLLOWUP_IP:
tcpip!TcpUpdateTcbEstats+a094e
fffff807`5796d92a 488908 mov qword ptr [rax],rcx
FAULT_INSTR_CODE: 48088948
SYMBOL_NAME: tcpip!TcpUpdateTcbEstats+a094e
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: tcpip
IMAGE_NAME: tcpip.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 0
IMAGE_VERSION: 10.0.18362.628
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: a094e
FAILURE_BUCKET_ID: 0x1E_c0000005_STACKPTR_ERROR_tcpip!TcpUpdateTcbEstats
BUCKET_ID: 0x1E_c0000005_STACKPTR_ERROR_tcpip!TcpUpdateTcbEstats
PRIMARY_PROBLEM_CLASS: 0x1E_c0000005_STACKPTR_ERROR_tcpip!TcpUpdateTcbEstats
TARGET_TIME: 2020-03-04T20:20:17.000Z
OSBUILD: 18362
OSSERVICEPACK: 657
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2005-04-23 04:40:32
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 3316
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x1e_c0000005_stackptr_error_tcpip!tcpupdatetcbestats
FAILURE_ID_HASH: {9be197c9-77f2-d2e5-1a6c-ac645429614b}
Followup: MachineOwner
---------
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8071013ab62, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
DUMP_TYPE: 2
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff8071013ab62
BUGCHECK_P3: 0
BUGCHECK_P4: ffffffffffffffff
READ_ADDRESS: fffff8070eb733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
ffffffffffffffff
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
Wdf01000!FxDevice::DispatchWithLock+a2 [minkernel\wdf\framework\shared\core\fxdevice.cpp @ 1430]
fffff807`1013ab62 4e8b5c0610 mov r11,qword ptr [rsi+r8+10h]
EXCEPTION_PARAMETER2: ffffffffffffffff
BUGCHECK_STR: 0x1E_c0000005_R
CPU_COUNT: 8
CPU_MHZ: fa8
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 5e
CPU_STEPPING: 3
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: voicemeeterpro.exe
CURRENT_IRQL: 2
ANALYSIS_SESSION_HOST: DESKTOP-BKJR0DQ
ANALYSIS_SESSION_TIME: 03-06-2020 14:49:09.0293
ANALYSIS_VERSION: 10.0.18362.1 amd64fre
DPC_STACK_BASE: FFFFFB805DC37FB0
LAST_CONTROL_TRANSFER: from fffff8070e8a663e to fffff8070e7c1510
STACK_TEXT:
fffffb80`5dc35bf8 fffff807`0e8a663e : 00000000`0000001e ffffffff`c0000005 fffff807`1013ab62 00000000`00000000 : nt!KeBugCheckEx
fffffb80`5dc35c00 fffff807`0e7ca33f : fffff807`0eb11000 fffff807`0e600000 0005e530`00ab6000 00000000`0010001f : nt!KiFatalExceptionHandler+0x22
fffffb80`5dc35c40 fffff807`0e6c2f15 : 00000000`00000000 00000000`00000000 fffffb80`5dc361b0 00007fff`ffff0000 : nt!RtlpExecuteHandlerForException+0xf
fffffb80`5dc35c70 fffff807`0e6c74ae : fffffb80`5dc36ba8 fffffb80`5dc368f0 fffffb80`5dc36ba8 ffff9803`7b121020 : nt!RtlDispatchException+0x4a5
fffffb80`5dc363c0 fffff807`0e7d351d : 00000000`00000000 fffff807`2a6a5b96 00000000`00000000 00000000`00000009 : nt!KiDispatchException+0x16e
fffffb80`5dc36a70 fffff807`0e7cf2a2 : 00000000`00001001 00000000`00000fff ffff9803`00000d4e 00000000`00000030 : nt!KiExceptionDispatch+0x11d
fffffb80`5dc36c50 fffff807`1013ab62 : ffff9803`7b527010 ffff9803`7b527010 fffff807`10148670 ffff9803`75b1f750 : nt!KiGeneralProtectionFault+0x322
fffffb80`5dc36de0 fffff807`0e631f79 : ffff9803`7b527010 ffff9803`75c0f6b0 ffff9803`8b8bfce0 ffff9803`75c0f6b0 : Wdf01000!FxDevice::DispatchWithLock+0xa2 [minkernel\wdf\framework\shared\core\fxdevice.cpp @ 1430]
fffffb80`5dc36e40 fffff807`102d14ad : ffff9803`75c0f6b0 ffff9803`7b527010 00000000`00086676 00000000`00000040 : nt!IofCallDriver+0x59
fffffb80`5dc36e80 fffff807`102d10d8 : ffff9803`71fd0bc0 00000000`00000007 ffff9803`7b5274d0 00000000`00000000 : ACPI!ACPIIrpDispatchDeviceControl+0xad
fffffb80`5dc36ec0 fffff807`0e631f79 : 00000000`00000007 ffff9803`7b527010 fffffb80`5dc37049 00000000`00000001 : ACPI!ACPIDispatchIrp+0xc8
fffffb80`5dc36f40 fffff807`2c401dc4 : 00000000`00000000 ffff9803`7b527010 fffffb80`5dc37049 00000000`00000001 : nt!IofCallDriver+0x59
fffffb80`5dc36f80 fffff807`2c4019b6 : 00000000`00000009 00000000`00000200 ffff9803`7b4739c8 fffff807`0e96f06d : usbccgp!DispatchPdoUrb+0x2b4
fffffb80`5dc370b0 fffff807`2c4012a8 : ffff9803`7b527010 ffff9803`7b4671b0 ffff9803`7b4671b8 fffff807`00000000 : usbccgp!DispatchPdoInternalDeviceControl+0x1c6
fffffb80`5dc37120 fffff807`0e631f79 : ffff9803`7b467060 00000000`00000001 00000000`00000000 fffffb80`00000000 : usbccgp!USBC_Dispatch+0x298
fffffb80`5dc371f0 fffff807`2c4413d0 : 00000000`00000000 fffffb80`5dc37330 00000000`00000000 fffff807`00000000 : nt!IofCallDriver+0x59
fffffb80`5dc37230 fffff807`2c4695df : ffff9803`00000000 ffff9803`7b565280 ffff9803`7b565280 fffff807`2c484000 : hidusb!HumInternalIoctl+0x3c0
fffffb80`5dc37520 fffff807`2c46a9ec : ffff9803`7b565280 fffffb80`5dc376e9 fffff807`2c47e1e0 00000000`00000009 : HIDCLASS!HidpSubmitInterruptRead+0x1af
fffffb80`5dc375a0 fffff807`0e6477d9 : ffff9803`7b527010 ffff9803`7b527010 fffffb80`5dc37601 ffff9803`7b527400 : HIDCLASS!HidpInterruptReadComplete+0x57c
fffffb80`5dc37640 fffff807`0e6476a7 : ffff9803`817c4010 fffff807`2a638f00 00000000`00000001 00000000`00000001 : nt!IopfCompleteRequest+0x119
fffffb80`5dc37750 fffff807`101383fd : 00000000`00000000 ffff9803`7d5e0020 00000000`00000002 fffff807`2a629700 : nt!IofCompleteRequest+0x17
fffffb80`5dc37780 fffff807`10137ecb : ffff9803`7d5e0102 fffffb80`5dc378a1 ffff9803`7b527010 00000000`00000000 : Wdf01000!FxRequest::CompleteInternal+0x22d [minkernel\wdf\framework\shared\core\fxrequest.cpp @ 869]
fffffb80`5dc37810 fffff807`2a637e80 : 00000000`ffffff02 ffff9803`7d5e0020 ffff9803`7b46e4b0 ffff9803`7b46e4b0 : Wdf01000!imp_WdfRequestComplete+0x8b [minkernel\wdf\framework\shared\core\fxrequestapi.cpp @ 436]
fffffb80`5dc37870 fffff807`2a635cf4 : ffff9803`7d5e01c0 ffff9803`7b46e510 ffff9803`7d5e0250 fffffb80`5dc37b48 : USBXHCI!Bulk_Transfer_CompleteCancelable+0x19c
fffffb80`5dc378d0 fffff807`2a634460 : 00000001`00000000 00000000`00000000 ffff9803`7fcc2400 fffff807`1021208d : USBXHCI!Bulk_ProcessTransferEventWithED1+0x464
fffffb80`5dc37990 fffff807`2a6298d3 : ffff9803`7b17d7c0 ffffd680`95e05f10 00000000`01400180 fffffb80`5dc37ac0 : USBXHCI!Bulk_EP_TransferEventHandler+0x10
fffffb80`5dc379c0 fffff807`2a61ba4f : 00000000`0000002b fffffb80`5dc37ab1 ffff9803`75e7d010 fffff807`2a6034b9 : USBXHCI!TR_TransferEventHandler+0x17
fffffb80`5dc379f0 fffff807`2a63c2be : fffffb80`5dc37b48 fffffb80`5dc37b18 00000000`00000000 fffffb80`5dc37b20 : USBXHCI!Endpoint_TransferEventHandler+0x167
fffffb80`5dc37a70 fffff807`2a61ea3c : ffff9803`75811ab0 fffffb80`5dc37b69 00000000`00000001 ffff9803`75f91300 : USBXHCI!UsbDevice_TransferEventHandler+0xa6
fffffb80`5dc37ad0 fffff807`2a61f55c : ffff9803`723ffe48 ffff9803`71f59040 00000000`00000010 ffff9803`758118b0 : USBXHCI!Interrupter_DeferredWorkProcessor+0x578
fffffb80`5dc37bd0 fffff807`101326ad : 00000000`00000f44 00000000`00400a02 00000000`00000000 fffffb80`5dc37c90 : USBXHCI!Interrupter_WdfEvtInterruptDpc+0xc
fffffb80`5dc37c00 fffff807`0e66ae95 : ffffd680`95e02f80 ffff9803`7200f000 ffffd680`95e05f90 ffffd680`00000002 : Wdf01000!FxInterrupt::_InterruptDpcThunk+0x9d [minkernel\wdf\framework\shared\irphandlers\pnp\km\interruptobjectkm.cpp @ 410]
fffffb80`5dc37c40 fffff807`0e66a4ef : ffffd680`95e00180 00000000`00000000 00000000`00000002 00000000`00000004 : nt!KiExecuteAllDpcs+0x305
fffffb80`5dc37d80 fffff807`0e7c8555 : 00000000`00000000 ffffd680`95e00180 ffffd680`96393780 00000000`00000000 : nt!KiRetireDpcList+0x1ef
fffffb80`5dc37fb0 fffff807`0e7c8340 : 00000000`00000000 fffff807`0f0b92cb 00000000`06e2f940 00000000`06d2fda0 : nt!KxRetireDpcList+0x5
fffffb80`60de79c0 fffff807`0e7c7bf5 : 00000000`00000000 fffff807`0e7c3071 00000000`00000000 fffffb80`60de7a80 : nt!KiDispatchInterruptContinue
fffffb80`60de79f0 fffff807`0e7c3071 : 00000000`00000000 fffffb80`60de7a80 ffffd680`96393780 00000000`0103bce0 : nt!KiDpcInterruptBypass+0x25
fffffb80`60de7a00 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatch+0xb1
THREAD_SHA1_HASH_MOD_FUNC: 8bce4d95c2a018454cba752eb1ace33c984dc79e
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 58be9476b324e3d4bfa064d64f8fa3ea9296ab16
THREAD_SHA1_HASH_MOD: f8ed7e0778976230dc3d683d9350c73515435761
FOLLOWUP_IP:
hidusb!HumInternalIoctl+3c0
fffff807`2c4413d0 8bd8 mov ebx,eax
FAULT_INSTR_CODE: 8840d88b
SYMBOL_STACK_INDEX: 10
SYMBOL_NAME: hidusb!HumInternalIoctl+3c0
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: hidusb
IMAGE_NAME: hidusb.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 7b9189fe
IMAGE_VERSION: 10.0.18362.175
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 3c0
FAILURE_BUCKET_ID: 0x1E_c0000005_R_hidusb!HumInternalIoctl
BUCKET_ID: 0x1E_c0000005_R_hidusb!HumInternalIoctl
PRIMARY_PROBLEM_CLASS: 0x1E_c0000005_R_hidusb!HumInternalIoctl
TARGET_TIME: 2020-03-02T11:04:21.000Z
OSBUILD: 18362
OSSERVICEPACK: 657
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2005-04-23 04:40:32
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 39ab
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x1e_c0000005_r_hidusb!huminternalioctl
FAILURE_ID_HASH: {1db1b3ef-c820-f961-4df4-46999018d214}
Followup: MachineOwner
---------
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: fffff60e15c2f6b0, Address of the trap frame for the exception that caused the bugcheck
Arg3: fffff60e15c2f608, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
DUMP_TYPE: 2
BUGCHECK_P1: 3
BUGCHECK_P2: fffff60e15c2f6b0
BUGCHECK_P3: fffff60e15c2f608
BUGCHECK_P4: 0
TRAP_FRAME: fffff60e15c2f6b0 -- (.trap 0xfffff60e15c2f6b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffa88c8fcb73e8 rbx=0000000000000000 rcx=0000000000000003
rdx=000000000000082f rsi=0000000000000000 rdi=0000000000000000
rip=fffff8046206bb54 rsp=fffff60e15c2f840 rbp=ffffa88c96e84500
r8=000000000000082f r9=000000000000002f r10=fffff80462ab7aa0
r11=fffff60e15c2f740 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po cy
nt!KiProcessExpiredTimerList+0x234:
fffff804`6206bb54 cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: fffff60e15c2f608 -- (.exr 0xfffff60e15c2f608)
ExceptionAddress: fffff8046206bb54 (nt!KiProcessExpiredTimerList+0x0000000000000234)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
CPU_COUNT: 8
CPU_MHZ: fa8
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 5e
CPU_STEPPING: 3
CUSTOMER_CRASH_COUNT: 1
BUGCHECK_STR: 0x139
PROCESS_NAME: System
CURRENT_IRQL: 2
DEFAULT_BUCKET_ID: FAIL_FAST_CORRUPT_LIST_ENTRY
ERROR_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>
EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000003
ANALYSIS_SESSION_HOST: DESKTOP-BKJR0DQ
ANALYSIS_SESSION_TIME: 03-06-2020 14:49:05.0295
ANALYSIS_VERSION: 10.0.18362.1 amd64fre
LAST_CONTROL_TRANSFER: from fffff804621d33e9 to fffff804621c1510
STACK_TEXT:
fffff60e`15c2f388 fffff804`621d33e9 : 00000000`00000139 00000000`00000003 fffff60e`15c2f6b0 fffff60e`15c2f608 : nt!KeBugCheckEx
fffff60e`15c2f390 fffff804`621d3810 : ffffa88c`9da89de0 00000000`00000000 ffffa88c`9a6f7080 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff60e`15c2f4d0 fffff804`621d1ba5 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xd0
fffff60e`15c2f6b0 fffff804`6206bb54 : ffffa88c`96e84440 ffffa88c`8e8541f0 00000001`00000002 ffffa88c`8a2b7010 : nt!KiRaiseSecurityCheckFailure+0x325
fffff60e`15c2f840 fffff804`6206a7e9 : 00000000`0000001e 00000000`00989680 00000000`0062e214 00000000`0000002c : nt!KiProcessExpiredTimerList+0x234
fffff60e`15c2f930 fffff804`621c5054 : 00000000`00000000 ffff8001`d9c00180 ffff8001`d9c11240 ffffa88c`91747080 : nt!KiRetireDpcList+0x4e9
fffff60e`15c2fb60 00000000`00000000 : fffff60e`15c30000 fffff60e`15c29000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x84
THREAD_SHA1_HASH_MOD_FUNC: a5119ebdc9ff71d34433e0daf4177502fc924f29
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 060f65eb7dbeac629aaa0950c72f0d4dec6c7f1c
THREAD_SHA1_HASH_MOD: 30a3e915496deaace47137d5b90c3ecc03746bf6
FOLLOWUP_IP:
nt!KiProcessExpiredTimerList+234
fffff804`6206bb54 cd29 int 29h
FAULT_INSTR_CODE: 8b4829cd
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: nt!KiProcessExpiredTimerList+234
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4269a790
IMAGE_VERSION: 10.0.18362.657
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 234
FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiProcessExpiredTimerList
BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiProcessExpiredTimerList
PRIMARY_PROBLEM_CLASS: 0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiProcessExpiredTimerList
TARGET_TIME: 2020-03-01T16:30:30.000Z
OSBUILD: 18362
OSSERVICEPACK: 657
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2005-04-23 04:40:32
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 1e62
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x139_3_corrupt_list_entry_ktimer_list_corruption_nt!kiprocessexpiredtimerlist
FAILURE_ID_HASH: {9db7945b-255d-24a1-9f2c-82344e883ab8}
Followup: MachineOwner
---------
Hatalar incelendiğinde USB sürücüleri ve RAM hatası vermiş. Ayrıca Chrome'da hata vermiş. BIOS güncellemelerini yapıp temiz bir format atın. XMP açıksa kapatın ve memtest86 ile bir test yapın sonucu paylaşın.
Ağ sürücülerini güvenli mod ile kaldırıp tekrar yükleyin.
Windows 10 Güvenli Mod Nasıl Açılır?
Adım adım Windows 10 işletim sisteminin nasıl güvenli mod'da açılacağını açıklıyoruz. Güvenli mod, yıllardır aramızda ve çeşitli sorunlarda kullanıcılarınwww.technopat.net
VoiceMeeter, MSI Afterburner yazılımlarını kaldır.
Kod:DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If kernel debugger is available get stack backtrace. Arguments: Arg1: 0000000000000000, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000008, value 0 = read operation, 1 = write operation Arg4: 0000000000000000, address which referenced memory Debugging Details: ------------------ KEY_VALUES_STRING: 1 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202 DUMP_TYPE: 2 BUGCHECK_P1: 0 BUGCHECK_P2: 2 BUGCHECK_P3: 8 BUGCHECK_P4: 0 READ_ADDRESS: fffff8015fd733b8: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd 0000000000000000 CURRENT_IRQL: 2 FAULTING_IP: +0 00000000`00000000 ?? ??? PROCESS_NAME: chrome.exe CPU_COUNT: 8 CPU_MHZ: fa8 CPU_VENDOR: GenuineIntel CPU_FAMILY: 6 CPU_MODEL: 5e CPU_STEPPING: 3 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT BUGCHECK_STR: AV ANALYSIS_SESSION_HOST: DESKTOP-BKJR0DQ ANALYSIS_SESSION_TIME: 03-06-2020 14:49:20.0257 ANALYSIS_VERSION: 10.0.18362.1 amd64fre TRAP_FRAME: ffffef8451047560 -- (.trap 0xffffef8451047560) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=000000c6e8832000 rbx=0000000000000000 rcx=00000000c0000102 rdx=00000000000000c6 rsi=0000000000000000 rdi=0000000000000000 rip=0000000000000000 rsp=ffffef84510476f0 rbp=0000000000000000 r8=0000000000000000 r9=000000010000032c r10=ffffd8803d915180 r11=ffffb1837d01f080 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na pe nc 00000000`00000000 ?? ??? Resetting default scope IP_IN_FREE_BLOCK: 0 LAST_CONTROL_TRANSFER: from fffff8015f9d41e9 to fffff8015f9c2380 FAILED_INSTRUCTION_ADDRESS: +0 00000000`00000000 ?? ??? STACK_TEXT: ffffef84`51047418 fffff801`5f9d41e9 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000008 : nt!KeBugCheckEx ffffef84`51047420 fffff801`5f9d052b : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69 ffffef84`51047560 00000000`00000000 : 00000000`00000000 00000000`00000000 43f00000`00000000 00000000`00000000 : nt!KiPageFault+0x46b THREAD_SHA1_HASH_MOD_FUNC: bf99962f16aee8a6a536cfcc5454c0cd4db15ac9 THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 497aaf2f8d4f907c0c9bce6ce025c930b885e2b8 THREAD_SHA1_HASH_MOD: 2a7ca9d3ab5386d53fea7498e1d81b9c4a4c036b FOLLOWUP_IP: nt!KiPageFault+46b fffff801`5f9d052b 33c0 xor eax,eax FAULT_INSTR_CODE: ffb0c033 SYMBOL_STACK_INDEX: 2 SYMBOL_NAME: nt!KiPageFault+46b FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe DEBUG_FLR_IMAGE_TIMESTAMP: 0 IMAGE_VERSION: 10.0.18362.693 STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: 46b FAILURE_BUCKET_ID: AV_CODE_AV_NULL_IP_nt!KiPageFault BUCKET_ID: AV_CODE_AV_NULL_IP_nt!KiPageFault PRIMARY_PROBLEM_CLASS: AV_CODE_AV_NULL_IP_nt!KiPageFault TARGET_TIME: 2020-03-05T12:06:06.000Z OSBUILD: 18362 OSSERVICEPACK: 693 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 10 OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: unknown_date BUILDDATESTAMP_STR: 190318-1202 BUILDLAB_STR: 19h1_release BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202 ANALYSIS_SESSION_ELAPSED_TIME: 1303 ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:av_code_av_null_ip_nt!kipagefault FAILURE_ID_HASH: {4ce35ff9-c5cf-d66d-0323-0f05e33f6692} Followup: MachineOwner --------- ATTEMPTED_WRITE_TO_READONLY_MEMORY (be) An attempt was made to write to readonly memory. The guilty driver is on the stack trace (and is typically the current instruction pointer). When possible, the guilty driver's name (Unicode string) is printed on the bugcheck screen and saved in KiBugCheckDriver. Arguments: Arg1: fffff90002454fa8, Virtual address for the attempted write. Arg2: 8a00000000200021, PTE contents. Arg3: ffffbc01482176c0, (reserved) Arg4: 000000000000000a, (reserved) Debugging Details: ------------------ *** WARNING: Unable to verify timestamp for win32k.sys KEY_VALUES_STRING: 1 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202 DUMP_TYPE: 2 BUGCHECK_P1: fffff90002454fa8 BUGCHECK_P2: 8a00000000200021 BUGCHECK_P3: ffffbc01482176c0 BUGCHECK_P4: a CPU_COUNT: 8 CPU_MHZ: fa8 CPU_VENDOR: GenuineIntel CPU_FAMILY: 6 CPU_MODEL: 5e CPU_STEPPING: 3 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT BUGCHECK_STR: 0xBE PROCESS_NAME: System CURRENT_IRQL: 2 ANALYSIS_SESSION_HOST: DESKTOP-BKJR0DQ ANALYSIS_SESSION_TIME: 03-06-2020 14:49:16.0057 ANALYSIS_VERSION: 10.0.18362.1 amd64fre TRAP_FRAME: ffffbc01482176c0 -- (.trap 0xffffbc01482176c0) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=ffffbc0148217828 rbx=0000000000000000 rcx=fffff90002454f90 rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000 rip=fffff80161657502 rsp=ffffbc0148217850 rbp=fffff80161a6a380 r8=0000000080000000 r9=0000000000000003 r10=00000000000c1c53 r11=ffffe5899561c000 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl zr na po nc nt!MiLockNestedPageAtDpcInline+0xe: fffff801`61657502 f0480fba69183f lock bts qword ptr [rcx+18h],3Fh ds:fffff900`02454fa8=???????????????? Resetting default scope LAST_CONTROL_TRANSFER: from fffff801618001e7 to fffff801617c2380 STACK_TEXT: ffffbc01`482174d8 fffff801`618001e7 : 00000000`000000be fffff900`02454fa8 8a000000`00200021 ffffbc01`482176c0 : nt!KeBugCheckEx ffffbc01`482174e0 fffff801`616c92fa : 8a000000`00200021 00000000`00000003 ffffbc01`48217620 00000000`00000000 : nt!MiRaisedIrqlFault+0x19e437 ffffbc01`48217520 fffff801`617d0420 : 00000000`00040202 fffff801`61721a84 00000048`0412017e ffffe589`95513080 : nt!MmAccessFault+0x48a ffffbc01`482176c0 fffff801`61657502 : 00000000`00000000 00000000`00000000 fffff900`00000000 02000000`00000000 : nt!KiPageFault+0x360 ffffbc01`48217850 fffff801`616d9efc : fffff900`00000000 fffff801`61a6a380 00000000`00000000 ffff9c4d`20447050 : nt!MiLockNestedPageAtDpcInline+0xe ffffbc01`48217880 fffff801`6175ee4d : e589a2f1`bf3004d0 00000000`00000001 00000000`00000000 fffff900`0567e640 : nt!MiRestoreTransitionPte+0x18c ffffbc01`482178f0 fffff801`618db1e8 : 00000000`00000000 fffff900`05678670 fffff801`00000000 00000000`00000000 : nt!MiRemoveLowestPriorityStandbyPage+0x1bd ffffbc01`48217990 fffff801`618db3f3 : fffff801`61a6a380 00000000`00000000 fffff801`00000000 00000000`00000206 : nt!MiPruneStandbyPages+0x250 ffffbc01`48217a20 fffff801`616f43c5 : ffffe589`a93ca040 fffff801`618db360 ffffe589`9547c520 fffff801`61a6c020 : nt!MiRebalanceZeroFreeLists+0x93 ffffbc01`48217a70 fffff801`6166bce5 : ffffe589`a93ca040 00000000`00000080 ffffe589`954b0040 28614c2e`00000001 : nt!ExpWorkerThread+0x105 ffffbc01`48217b10 fffff801`617c99ca : ffffd100`6fb43180 ffffe589`a93ca040 fffff801`6166bc90 637d0a0a`3b292861 : nt!PspSystemThreadStartup+0x55 ffffbc01`48217b60 00000000`00000000 : ffffbc01`48218000 ffffbc01`48211000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x2a THREAD_SHA1_HASH_MOD_FUNC: 5554ee5f6880683562b6941626d7551fcb7a2f59 THREAD_SHA1_HASH_MOD_FUNC_OFFSET: ff3954ede0aab373441df887cc46f40ca9d1197f THREAD_SHA1_HASH_MOD: dc844b1b94baa204d070855e43bbbd27eee98b94 FOLLOWUP_IP: nt!MiRaisedIrqlFault+19e437 fffff801`618001e7 cc int 3 FAULT_INSTR_CODE: cf8b48cc SYMBOL_STACK_INDEX: 1 SYMBOL_NAME: nt!MiRaisedIrqlFault+19e437 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt DEBUG_FLR_IMAGE_TIMESTAMP: 0 IMAGE_VERSION: 10.0.18362.693 STACK_COMMAND: .thread ; .cxr ; kb IMAGE_NAME: memory_corruption BUCKET_ID_FUNC_OFFSET: 19e437 FAILURE_BUCKET_ID: 0xBE_nt!MiRaisedIrqlFault BUCKET_ID: 0xBE_nt!MiRaisedIrqlFault PRIMARY_PROBLEM_CLASS: 0xBE_nt!MiRaisedIrqlFault TARGET_TIME: 2020-03-05T15:45:25.000Z OSBUILD: 18362 OSSERVICEPACK: 693 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 10 OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: unknown_date BUILDDATESTAMP_STR: 190318-1202 BUILDLAB_STR: 19h1_release BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202 ANALYSIS_SESSION_ELAPSED_TIME: 1cd0 ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:0xbe_nt!miraisedirqlfault FAILURE_ID_HASH: {1c5b4d11-09e0-def3-d2d0-70a11d69b92d} Followup: MachineOwner --------- KMODE_EXCEPTION_NOT_HANDLED (1e) This is a very common bugcheck. Usually the exception address pinpoints the driver/function that caused the problem. Always note this address as well as the link date of the driver/image that contains this address. Arguments: Arg1: ffffffffc0000005, The exception code that was not handled Arg2: fffff8075796d92a, The address that the exception occurred at Arg3: ffffe9085dfd7048, Parameter 0 of the exception Arg4: fffff80758211930, Parameter 1 of the exception Debugging Details: ------------------ *** WARNING: Unable to verify timestamp for win32k.sys KEY_VALUES_STRING: 1 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202 DUMP_TYPE: 2 BUGCHECK_P1: ffffffffc0000005 BUGCHECK_P2: fffff8075796d92a BUGCHECK_P3: ffffe9085dfd7048 BUGCHECK_P4: fffff80758211930 WRITE_ADDRESS: fffff8074fd733b8: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd fffff80758211930 EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text> FAULTING_IP: tcpip!TcpUpdateTcbEstats+a094e fffff807`5796d92a 488908 mov qword ptr [rax],rcx EXCEPTION_PARAMETER1: ffffe9085dfd7048 EXCEPTION_PARAMETER2: fffff80758211930 BUGCHECK_STR: 0x1E_c0000005 CPU_COUNT: 8 CPU_MHZ: fa8 CPU_VENDOR: GenuineIntel CPU_FAMILY: 6 CPU_MODEL: 5e CPU_STEPPING: 3 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT PROCESS_NAME: System CURRENT_IRQL: 2 ANALYSIS_SESSION_HOST: DESKTOP-BKJR0DQ ANALYSIS_SESSION_TIME: 03-06-2020 14:49:12.0743 ANALYSIS_VERSION: 10.0.18362.1 amd64fre BAD_STACK_POINTER: fffff80758211088 LAST_CONTROL_TRANSFER: from fffff8074faa6667 to fffff8074f9c1510 STACK_TEXT: fffff807`58211088 fffff807`4faa6667 : 00000000`0000001e ffffffff`c0000005 fffff807`5796d92a ffffe908`5dfd7048 : nt!KeBugCheckEx fffff807`58211090 fffff807`4f9d9236 : fffff807`5796d92a fffff807`4f91657b ffffe908`5dfd7280 fffff807`58211930 : nt!KiFatalFilter+0x1f fffff807`582110d0 fffff807`4f99c569 : fffff807`00000002 ffffe908`5dfd7fd0 ffffe908`5dfd2000 ffffe908`5dfd9000 : nt!KeExpandKernelStackAndCalloutInternal$filt$0+0x16 fffff807`58211110 fffff807`4f9ca33f : ffffe908`5dfd7fd0 fffff807`582116f0 00000000`00000000 00000000`0010001f : nt!_C_specific_handler+0xa9 fffff807`58211180 fffff807`4f8c2f15 : 00000000`00000000 00000000`00000000 fffff807`582116f0 00007fff`ffff0000 : nt!RtlpExecuteHandlerForException+0xf fffff807`582111b0 fffff807`4f8c74ae : ffffe908`5dfd7048 fffff807`58211e30 ffffe908`5dfd7048 ffff9f8e`8d369bb0 : nt!RtlDispatchException+0x4a5 fffff807`58211900 fffff807`4f9c2392 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x16e fffff807`58211fb0 fffff807`4f9c2360 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxExceptionDispatchOnExceptionStack+0x12 ffffe908`5dfd6f08 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatchOnExceptionStackContinue THREAD_SHA1_HASH_MOD_FUNC: 807003e66859482870638b72b993eaa394e895d2 THREAD_SHA1_HASH_MOD_FUNC_OFFSET: d1c6fea8880f54a80c34f15b65b52096254d6271 THREAD_SHA1_HASH_MOD: 9f457f347057f10e1df248e166a3e95e6570ecfe FOLLOWUP_IP: tcpip!TcpUpdateTcbEstats+a094e fffff807`5796d92a 488908 mov qword ptr [rax],rcx FAULT_INSTR_CODE: 48088948 SYMBOL_NAME: tcpip!TcpUpdateTcbEstats+a094e FOLLOWUP_NAME: MachineOwner MODULE_NAME: tcpip IMAGE_NAME: tcpip.sys DEBUG_FLR_IMAGE_TIMESTAMP: 0 IMAGE_VERSION: 10.0.18362.628 STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: a094e FAILURE_BUCKET_ID: 0x1E_c0000005_STACKPTR_ERROR_tcpip!TcpUpdateTcbEstats BUCKET_ID: 0x1E_c0000005_STACKPTR_ERROR_tcpip!TcpUpdateTcbEstats PRIMARY_PROBLEM_CLASS: 0x1E_c0000005_STACKPTR_ERROR_tcpip!TcpUpdateTcbEstats TARGET_TIME: 2020-03-04T20:20:17.000Z OSBUILD: 18362 OSSERVICEPACK: 657 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 10 OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 2005-04-23 04:40:32 BUILDDATESTAMP_STR: 190318-1202 BUILDLAB_STR: 19h1_release BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202 ANALYSIS_SESSION_ELAPSED_TIME: 3316 ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:0x1e_c0000005_stackptr_error_tcpip!tcpupdatetcbestats FAILURE_ID_HASH: {9be197c9-77f2-d2e5-1a6c-ac645429614b} Followup: MachineOwner --------- KMODE_EXCEPTION_NOT_HANDLED (1e) This is a very common bugcheck. Usually the exception address pinpoints the driver/function that caused the problem. Always note this address as well as the link date of the driver/image that contains this address. Arguments: Arg1: ffffffffc0000005, The exception code that was not handled Arg2: fffff8071013ab62, The address that the exception occurred at Arg3: 0000000000000000, Parameter 0 of the exception Arg4: ffffffffffffffff, Parameter 1 of the exception Debugging Details: ------------------ KEY_VALUES_STRING: 1 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202 DUMP_TYPE: 2 BUGCHECK_P1: ffffffffc0000005 BUGCHECK_P2: fffff8071013ab62 BUGCHECK_P3: 0 BUGCHECK_P4: ffffffffffffffff READ_ADDRESS: fffff8070eb733b8: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd ffffffffffffffff EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text> FAULTING_IP: Wdf01000!FxDevice::DispatchWithLock+a2 [minkernel\wdf\framework\shared\core\fxdevice.cpp @ 1430] fffff807`1013ab62 4e8b5c0610 mov r11,qword ptr [rsi+r8+10h] EXCEPTION_PARAMETER2: ffffffffffffffff BUGCHECK_STR: 0x1E_c0000005_R CPU_COUNT: 8 CPU_MHZ: fa8 CPU_VENDOR: GenuineIntel CPU_FAMILY: 6 CPU_MODEL: 5e CPU_STEPPING: 3 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT PROCESS_NAME: voicemeeterpro.exe CURRENT_IRQL: 2 ANALYSIS_SESSION_HOST: DESKTOP-BKJR0DQ ANALYSIS_SESSION_TIME: 03-06-2020 14:49:09.0293 ANALYSIS_VERSION: 10.0.18362.1 amd64fre DPC_STACK_BASE: FFFFFB805DC37FB0 LAST_CONTROL_TRANSFER: from fffff8070e8a663e to fffff8070e7c1510 STACK_TEXT: fffffb80`5dc35bf8 fffff807`0e8a663e : 00000000`0000001e ffffffff`c0000005 fffff807`1013ab62 00000000`00000000 : nt!KeBugCheckEx fffffb80`5dc35c00 fffff807`0e7ca33f : fffff807`0eb11000 fffff807`0e600000 0005e530`00ab6000 00000000`0010001f : nt!KiFatalExceptionHandler+0x22 fffffb80`5dc35c40 fffff807`0e6c2f15 : 00000000`00000000 00000000`00000000 fffffb80`5dc361b0 00007fff`ffff0000 : nt!RtlpExecuteHandlerForException+0xf fffffb80`5dc35c70 fffff807`0e6c74ae : fffffb80`5dc36ba8 fffffb80`5dc368f0 fffffb80`5dc36ba8 ffff9803`7b121020 : nt!RtlDispatchException+0x4a5 fffffb80`5dc363c0 fffff807`0e7d351d : 00000000`00000000 fffff807`2a6a5b96 00000000`00000000 00000000`00000009 : nt!KiDispatchException+0x16e fffffb80`5dc36a70 fffff807`0e7cf2a2 : 00000000`00001001 00000000`00000fff ffff9803`00000d4e 00000000`00000030 : nt!KiExceptionDispatch+0x11d fffffb80`5dc36c50 fffff807`1013ab62 : ffff9803`7b527010 ffff9803`7b527010 fffff807`10148670 ffff9803`75b1f750 : nt!KiGeneralProtectionFault+0x322 fffffb80`5dc36de0 fffff807`0e631f79 : ffff9803`7b527010 ffff9803`75c0f6b0 ffff9803`8b8bfce0 ffff9803`75c0f6b0 : Wdf01000!FxDevice::DispatchWithLock+0xa2 [minkernel\wdf\framework\shared\core\fxdevice.cpp @ 1430] fffffb80`5dc36e40 fffff807`102d14ad : ffff9803`75c0f6b0 ffff9803`7b527010 00000000`00086676 00000000`00000040 : nt!IofCallDriver+0x59 fffffb80`5dc36e80 fffff807`102d10d8 : ffff9803`71fd0bc0 00000000`00000007 ffff9803`7b5274d0 00000000`00000000 : ACPI!ACPIIrpDispatchDeviceControl+0xad fffffb80`5dc36ec0 fffff807`0e631f79 : 00000000`00000007 ffff9803`7b527010 fffffb80`5dc37049 00000000`00000001 : ACPI!ACPIDispatchIrp+0xc8 fffffb80`5dc36f40 fffff807`2c401dc4 : 00000000`00000000 ffff9803`7b527010 fffffb80`5dc37049 00000000`00000001 : nt!IofCallDriver+0x59 fffffb80`5dc36f80 fffff807`2c4019b6 : 00000000`00000009 00000000`00000200 ffff9803`7b4739c8 fffff807`0e96f06d : usbccgp!DispatchPdoUrb+0x2b4 fffffb80`5dc370b0 fffff807`2c4012a8 : ffff9803`7b527010 ffff9803`7b4671b0 ffff9803`7b4671b8 fffff807`00000000 : usbccgp!DispatchPdoInternalDeviceControl+0x1c6 fffffb80`5dc37120 fffff807`0e631f79 : ffff9803`7b467060 00000000`00000001 00000000`00000000 fffffb80`00000000 : usbccgp!USBC_Dispatch+0x298 fffffb80`5dc371f0 fffff807`2c4413d0 : 00000000`00000000 fffffb80`5dc37330 00000000`00000000 fffff807`00000000 : nt!IofCallDriver+0x59 fffffb80`5dc37230 fffff807`2c4695df : ffff9803`00000000 ffff9803`7b565280 ffff9803`7b565280 fffff807`2c484000 : hidusb!HumInternalIoctl+0x3c0 fffffb80`5dc37520 fffff807`2c46a9ec : ffff9803`7b565280 fffffb80`5dc376e9 fffff807`2c47e1e0 00000000`00000009 : HIDCLASS!HidpSubmitInterruptRead+0x1af fffffb80`5dc375a0 fffff807`0e6477d9 : ffff9803`7b527010 ffff9803`7b527010 fffffb80`5dc37601 ffff9803`7b527400 : HIDCLASS!HidpInterruptReadComplete+0x57c fffffb80`5dc37640 fffff807`0e6476a7 : ffff9803`817c4010 fffff807`2a638f00 00000000`00000001 00000000`00000001 : nt!IopfCompleteRequest+0x119 fffffb80`5dc37750 fffff807`101383fd : 00000000`00000000 ffff9803`7d5e0020 00000000`00000002 fffff807`2a629700 : nt!IofCompleteRequest+0x17 fffffb80`5dc37780 fffff807`10137ecb : ffff9803`7d5e0102 fffffb80`5dc378a1 ffff9803`7b527010 00000000`00000000 : Wdf01000!FxRequest::CompleteInternal+0x22d [minkernel\wdf\framework\shared\core\fxrequest.cpp @ 869] fffffb80`5dc37810 fffff807`2a637e80 : 00000000`ffffff02 ffff9803`7d5e0020 ffff9803`7b46e4b0 ffff9803`7b46e4b0 : Wdf01000!imp_WdfRequestComplete+0x8b [minkernel\wdf\framework\shared\core\fxrequestapi.cpp @ 436] fffffb80`5dc37870 fffff807`2a635cf4 : ffff9803`7d5e01c0 ffff9803`7b46e510 ffff9803`7d5e0250 fffffb80`5dc37b48 : USBXHCI!Bulk_Transfer_CompleteCancelable+0x19c fffffb80`5dc378d0 fffff807`2a634460 : 00000001`00000000 00000000`00000000 ffff9803`7fcc2400 fffff807`1021208d : USBXHCI!Bulk_ProcessTransferEventWithED1+0x464 fffffb80`5dc37990 fffff807`2a6298d3 : ffff9803`7b17d7c0 ffffd680`95e05f10 00000000`01400180 fffffb80`5dc37ac0 : USBXHCI!Bulk_EP_TransferEventHandler+0x10 fffffb80`5dc379c0 fffff807`2a61ba4f : 00000000`0000002b fffffb80`5dc37ab1 ffff9803`75e7d010 fffff807`2a6034b9 : USBXHCI!TR_TransferEventHandler+0x17 fffffb80`5dc379f0 fffff807`2a63c2be : fffffb80`5dc37b48 fffffb80`5dc37b18 00000000`00000000 fffffb80`5dc37b20 : USBXHCI!Endpoint_TransferEventHandler+0x167 fffffb80`5dc37a70 fffff807`2a61ea3c : ffff9803`75811ab0 fffffb80`5dc37b69 00000000`00000001 ffff9803`75f91300 : USBXHCI!UsbDevice_TransferEventHandler+0xa6 fffffb80`5dc37ad0 fffff807`2a61f55c : ffff9803`723ffe48 ffff9803`71f59040 00000000`00000010 ffff9803`758118b0 : USBXHCI!Interrupter_DeferredWorkProcessor+0x578 fffffb80`5dc37bd0 fffff807`101326ad : 00000000`00000f44 00000000`00400a02 00000000`00000000 fffffb80`5dc37c90 : USBXHCI!Interrupter_WdfEvtInterruptDpc+0xc fffffb80`5dc37c00 fffff807`0e66ae95 : ffffd680`95e02f80 ffff9803`7200f000 ffffd680`95e05f90 ffffd680`00000002 : Wdf01000!FxInterrupt::_InterruptDpcThunk+0x9d [minkernel\wdf\framework\shared\irphandlers\pnp\km\interruptobjectkm.cpp @ 410] fffffb80`5dc37c40 fffff807`0e66a4ef : ffffd680`95e00180 00000000`00000000 00000000`00000002 00000000`00000004 : nt!KiExecuteAllDpcs+0x305 fffffb80`5dc37d80 fffff807`0e7c8555 : 00000000`00000000 ffffd680`95e00180 ffffd680`96393780 00000000`00000000 : nt!KiRetireDpcList+0x1ef fffffb80`5dc37fb0 fffff807`0e7c8340 : 00000000`00000000 fffff807`0f0b92cb 00000000`06e2f940 00000000`06d2fda0 : nt!KxRetireDpcList+0x5 fffffb80`60de79c0 fffff807`0e7c7bf5 : 00000000`00000000 fffff807`0e7c3071 00000000`00000000 fffffb80`60de7a80 : nt!KiDispatchInterruptContinue fffffb80`60de79f0 fffff807`0e7c3071 : 00000000`00000000 fffffb80`60de7a80 ffffd680`96393780 00000000`0103bce0 : nt!KiDpcInterruptBypass+0x25 fffffb80`60de7a00 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatch+0xb1 THREAD_SHA1_HASH_MOD_FUNC: 8bce4d95c2a018454cba752eb1ace33c984dc79e THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 58be9476b324e3d4bfa064d64f8fa3ea9296ab16 THREAD_SHA1_HASH_MOD: f8ed7e0778976230dc3d683d9350c73515435761 FOLLOWUP_IP: hidusb!HumInternalIoctl+3c0 fffff807`2c4413d0 8bd8 mov ebx,eax FAULT_INSTR_CODE: 8840d88b SYMBOL_STACK_INDEX: 10 SYMBOL_NAME: hidusb!HumInternalIoctl+3c0 FOLLOWUP_NAME: MachineOwner MODULE_NAME: hidusb IMAGE_NAME: hidusb.sys DEBUG_FLR_IMAGE_TIMESTAMP: 7b9189fe IMAGE_VERSION: 10.0.18362.175 STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: 3c0 FAILURE_BUCKET_ID: 0x1E_c0000005_R_hidusb!HumInternalIoctl BUCKET_ID: 0x1E_c0000005_R_hidusb!HumInternalIoctl PRIMARY_PROBLEM_CLASS: 0x1E_c0000005_R_hidusb!HumInternalIoctl TARGET_TIME: 2020-03-02T11:04:21.000Z OSBUILD: 18362 OSSERVICEPACK: 657 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 10 OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 2005-04-23 04:40:32 BUILDDATESTAMP_STR: 190318-1202 BUILDLAB_STR: 19h1_release BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202 ANALYSIS_SESSION_ELAPSED_TIME: 39ab ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:0x1e_c0000005_r_hidusb!huminternalioctl FAILURE_ID_HASH: {1db1b3ef-c820-f961-4df4-46999018d214} Followup: MachineOwner --------- KERNEL_SECURITY_CHECK_FAILURE (139) A kernel component has corrupted a critical data structure. The corruption could potentially allow a malicious user to gain control of this machine. Arguments: Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove). Arg2: fffff60e15c2f6b0, Address of the trap frame for the exception that caused the bugcheck Arg3: fffff60e15c2f608, Address of the exception record for the exception that caused the bugcheck Arg4: 0000000000000000, Reserved Debugging Details: ------------------ *** WARNING: Unable to verify timestamp for win32k.sys KEY_VALUES_STRING: 1 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202 DUMP_TYPE: 2 BUGCHECK_P1: 3 BUGCHECK_P2: fffff60e15c2f6b0 BUGCHECK_P3: fffff60e15c2f608 BUGCHECK_P4: 0 TRAP_FRAME: fffff60e15c2f6b0 -- (.trap 0xfffff60e15c2f6b0) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=ffffa88c8fcb73e8 rbx=0000000000000000 rcx=0000000000000003 rdx=000000000000082f rsi=0000000000000000 rdi=0000000000000000 rip=fffff8046206bb54 rsp=fffff60e15c2f840 rbp=ffffa88c96e84500 r8=000000000000082f r9=000000000000002f r10=fffff80462ab7aa0 r11=fffff60e15c2f740 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na po cy nt!KiProcessExpiredTimerList+0x234: fffff804`6206bb54 cd29 int 29h Resetting default scope EXCEPTION_RECORD: fffff60e15c2f608 -- (.exr 0xfffff60e15c2f608) ExceptionAddress: fffff8046206bb54 (nt!KiProcessExpiredTimerList+0x0000000000000234) ExceptionCode: c0000409 (Security check failure or stack buffer overrun) ExceptionFlags: 00000001 NumberParameters: 1 Parameter[0]: 0000000000000003 Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY CPU_COUNT: 8 CPU_MHZ: fa8 CPU_VENDOR: GenuineIntel CPU_FAMILY: 6 CPU_MODEL: 5e CPU_STEPPING: 3 CUSTOMER_CRASH_COUNT: 1 BUGCHECK_STR: 0x139 PROCESS_NAME: System CURRENT_IRQL: 2 DEFAULT_BUCKET_ID: FAIL_FAST_CORRUPT_LIST_ENTRY ERROR_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text> EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text> EXCEPTION_CODE_STR: c0000409 EXCEPTION_PARAMETER1: 0000000000000003 ANALYSIS_SESSION_HOST: DESKTOP-BKJR0DQ ANALYSIS_SESSION_TIME: 03-06-2020 14:49:05.0295 ANALYSIS_VERSION: 10.0.18362.1 amd64fre LAST_CONTROL_TRANSFER: from fffff804621d33e9 to fffff804621c1510 STACK_TEXT: fffff60e`15c2f388 fffff804`621d33e9 : 00000000`00000139 00000000`00000003 fffff60e`15c2f6b0 fffff60e`15c2f608 : nt!KeBugCheckEx fffff60e`15c2f390 fffff804`621d3810 : ffffa88c`9da89de0 00000000`00000000 ffffa88c`9a6f7080 00000000`00000000 : nt!KiBugCheckDispatch+0x69 fffff60e`15c2f4d0 fffff804`621d1ba5 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xd0 fffff60e`15c2f6b0 fffff804`6206bb54 : ffffa88c`96e84440 ffffa88c`8e8541f0 00000001`00000002 ffffa88c`8a2b7010 : nt!KiRaiseSecurityCheckFailure+0x325 fffff60e`15c2f840 fffff804`6206a7e9 : 00000000`0000001e 00000000`00989680 00000000`0062e214 00000000`0000002c : nt!KiProcessExpiredTimerList+0x234 fffff60e`15c2f930 fffff804`621c5054 : 00000000`00000000 ffff8001`d9c00180 ffff8001`d9c11240 ffffa88c`91747080 : nt!KiRetireDpcList+0x4e9 fffff60e`15c2fb60 00000000`00000000 : fffff60e`15c30000 fffff60e`15c29000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x84 THREAD_SHA1_HASH_MOD_FUNC: a5119ebdc9ff71d34433e0daf4177502fc924f29 THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 060f65eb7dbeac629aaa0950c72f0d4dec6c7f1c THREAD_SHA1_HASH_MOD: 30a3e915496deaace47137d5b90c3ecc03746bf6 FOLLOWUP_IP: nt!KiProcessExpiredTimerList+234 fffff804`6206bb54 cd29 int 29h FAULT_INSTR_CODE: 8b4829cd SYMBOL_STACK_INDEX: 4 SYMBOL_NAME: nt!KiProcessExpiredTimerList+234 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe DEBUG_FLR_IMAGE_TIMESTAMP: 4269a790 IMAGE_VERSION: 10.0.18362.657 STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: 234 FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiProcessExpiredTimerList BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiProcessExpiredTimerList PRIMARY_PROBLEM_CLASS: 0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiProcessExpiredTimerList TARGET_TIME: 2020-03-01T16:30:30.000Z OSBUILD: 18362 OSSERVICEPACK: 657 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 10 OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 2005-04-23 04:40:32 BUILDDATESTAMP_STR: 190318-1202 BUILDLAB_STR: 19h1_release BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202 ANALYSIS_SESSION_ELAPSED_TIME: 1e62 ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:0x139_3_corrupt_list_entry_ktimer_list_corruption_nt!kiprocessexpiredtimerlist FAILURE_ID_HASH: {9db7945b-255d-24a1-9f2c-82344e883ab8} Followup: MachineOwner ---------
UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault). The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
use .trap on that value
Else
.trap on the appropriate frame will show where the trap was taken
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: ffffa881ebe0b090
Arg3: 00000000e023784f
Arg4: fffff80184831fba
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
SYSTEM_MANUFACTURER: MSI
SYSTEM_PRODUCT_NAME: MS-7A68
SYSTEM_SKU: Default string
SYSTEM_VERSION: 1.0
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 1.70
BIOS_DATE: 07/03/2018
BASEBOARD_MANUFACTURER: MSI
BASEBOARD_PRODUCT: Z270 TOMAHAWK (MS-7A68)
BASEBOARD_VERSION: 1.0
DUMP_TYPE: 2
BUGCHECK_P1: 8
BUGCHECK_P2: ffffa881ebe0b090
BUGCHECK_P3: e023784f
BUGCHECK_P4: fffff80184831fba
BUGCHECK_STR: 0x7f_8
TRAP_FRAME: ffffa881ebe0b090 -- (.trap 0xffffa881ebe0b090)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000009 rbx=0000000000000000 rcx=ffff8386a0bdd960
rdx=0000000000000002 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80184831fba rsp=00000000e023784f rbp=ffff8386a9edf690
r8=0000000000000000 r9=0000000000000000 r10=0000000000000000
r11=0000000000000001 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
USBXHCI!Isoch_TransferUrb_Initialize+0x122:
fffff801`84831fba e801c7fdff call USBXHCI!Controller_GetFrameNumber (fffff801`8480e6c0)
Resetting default scope
CPU_COUNT: 8
CPU_MHZ: fa8
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 5e
CPU_STEPPING: 3
CPU_MICROCODE: 6,5e,3,0 (F,M,S,R) SIG: C6'00000000 (cache) C6'00000000 (init)
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: ModernWarfare.exe
CURRENT_IRQL: 2
ANALYSIS_SESSION_HOST: DESKTOP-BKJR0DQ
ANALYSIS_SESSION_TIME: 03-18-2020 16:13:39.0061
ANALYSIS_VERSION: 10.0.18362.1 amd64fre
BAD_STACK_POINTER: 00000000e023784f
UNALIGNED_STACK_POINTER: 00000000e023784f
LAST_CONTROL_TRANSFER: from fffff801671d41e9 to fffff801671c2380
STACK_TEXT:
ffffa881`ebe0af48 fffff801`671d41e9 : 00000000`0000007f 00000000`00000008 ffffa881`ebe0b090 00000000`e023784f : nt!KeBugCheckEx
ffffa881`ebe0af50 fffff801`671cf045 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffa881`ebe0b090 fffff801`84831fba : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0x2c5
00000000`e023784f 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : USBXHCI!Isoch_TransferUrb_Initialize+0x122
THREAD_SHA1_HASH_MOD_FUNC: b4fd67d3913a3c3e5139e97a8e01c1ea5f13d31f
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 63208fa8e192fb073badf5657e29e9a33f336a69
THREAD_SHA1_HASH_MOD: d0b8d0e314cf97ce749783c2f2ecf22742f8b6fb
FOLLOWUP_IP:
USBXHCI!Isoch_TransferUrb_Initialize+122
fffff801`84831fba e801c7fdff call USBXHCI!Controller_GetFrameNumber (fffff801`8480e6c0)
FAULT_INSTR_CODE: fdc701e8
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: USBXHCI!Isoch_TransferUrb_Initialize+122
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: USBXHCI
IMAGE_NAME: USBXHCI.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 0
IMAGE_VERSION: 10.0.18362.693
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 122
FAILURE_BUCKET_ID: 0x7f_8_STACKPTR_ERROR_USBXHCI!Isoch_TransferUrb_Initialize
BUCKET_ID: 0x7f_8_STACKPTR_ERROR_USBXHCI!Isoch_TransferUrb_Initialize
PRIMARY_PROBLEM_CLASS: 0x7f_8_STACKPTR_ERROR_USBXHCI!Isoch_TransferUrb_Initialize
TARGET_TIME: 2020-03-18T12:53:49.000Z
OSBUILD: 18362
OSSERVICEPACK: 720
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: unknown_date
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 5927
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x7f_8_stackptr_error_usbxhci!isoch_transferurb_initialize
FAILURE_ID_HASH: {34e5a3d1-40cd-bde5-193a-53aa37b7730d}
Followup: MachineOwner
---------
Format atamdan önce memtest86 testi yapmıştım çok çok uzun sürmüştü ama hiç hata göstermemişti. USB girişlerinde; klavye, kablosuz mouse alıcısı ve kulaklık takılı.USB üzerinden ne takıyorsun bu cihaza?
Memtest86 testi yapar mısın?
Kod:UNEXPECTED_KERNEL_MODE_TRAP (7f) This means a trap occurred in kernel mode, and it's a trap of a kind that the kernel isn't allowed to have/catch (bound trap) or that is always instant death (double fault). The first number in the bugcheck params is the number of the trap (8 = double fault, etc) Consult an Intel x86 family manual to learn more about what these traps are. Here is a *portion* of those codes: If kv shows a taskGate use .tss on the part before the colon, then kv. Else if kv shows a trapframe use .trap on that value Else .trap on the appropriate frame will show where the trap was taken (on x86, this will be the ebp that goes with the procedure KiTrap) Endif kb will then show the corrected stack. Arguments: Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT Arg2: ffffa881ebe0b090 Arg3: 00000000e023784f Arg4: fffff80184831fba Debugging Details: ------------------ KEY_VALUES_STRING: 1 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202 SYSTEM_MANUFACTURER: MSI SYSTEM_PRODUCT_NAME: MS-7A68 SYSTEM_SKU: Default string SYSTEM_VERSION: 1.0 BIOS_VENDOR: American Megatrends Inc. BIOS_VERSION: 1.70 BIOS_DATE: 07/03/2018 BASEBOARD_MANUFACTURER: MSI BASEBOARD_PRODUCT: Z270 TOMAHAWK (MS-7A68) BASEBOARD_VERSION: 1.0 DUMP_TYPE: 2 BUGCHECK_P1: 8 BUGCHECK_P2: ffffa881ebe0b090 BUGCHECK_P3: e023784f BUGCHECK_P4: fffff80184831fba BUGCHECK_STR: 0x7f_8 TRAP_FRAME: ffffa881ebe0b090 -- (.trap 0xffffa881ebe0b090) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000009 rbx=0000000000000000 rcx=ffff8386a0bdd960 rdx=0000000000000002 rsi=0000000000000000 rdi=0000000000000000 rip=fffff80184831fba rsp=00000000e023784f rbp=ffff8386a9edf690 r8=0000000000000000 r9=0000000000000000 r10=0000000000000000 r11=0000000000000001 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl zr na po nc USBXHCI!Isoch_TransferUrb_Initialize+0x122: fffff801`84831fba e801c7fdff call USBXHCI!Controller_GetFrameNumber (fffff801`8480e6c0) Resetting default scope CPU_COUNT: 8 CPU_MHZ: fa8 CPU_VENDOR: GenuineIntel CPU_FAMILY: 6 CPU_MODEL: 5e CPU_STEPPING: 3 CPU_MICROCODE: 6,5e,3,0 (F,M,S,R) SIG: C6'00000000 (cache) C6'00000000 (init) BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT PROCESS_NAME: ModernWarfare.exe CURRENT_IRQL: 2 ANALYSIS_SESSION_HOST: DESKTOP-BKJR0DQ ANALYSIS_SESSION_TIME: 03-18-2020 16:13:39.0061 ANALYSIS_VERSION: 10.0.18362.1 amd64fre BAD_STACK_POINTER: 00000000e023784f UNALIGNED_STACK_POINTER: 00000000e023784f LAST_CONTROL_TRANSFER: from fffff801671d41e9 to fffff801671c2380 STACK_TEXT: ffffa881`ebe0af48 fffff801`671d41e9 : 00000000`0000007f 00000000`00000008 ffffa881`ebe0b090 00000000`e023784f : nt!KeBugCheckEx ffffa881`ebe0af50 fffff801`671cf045 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69 ffffa881`ebe0b090 fffff801`84831fba : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0x2c5 00000000`e023784f 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : USBXHCI!Isoch_TransferUrb_Initialize+0x122 THREAD_SHA1_HASH_MOD_FUNC: b4fd67d3913a3c3e5139e97a8e01c1ea5f13d31f THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 63208fa8e192fb073badf5657e29e9a33f336a69 THREAD_SHA1_HASH_MOD: d0b8d0e314cf97ce749783c2f2ecf22742f8b6fb FOLLOWUP_IP: USBXHCI!Isoch_TransferUrb_Initialize+122 fffff801`84831fba e801c7fdff call USBXHCI!Controller_GetFrameNumber (fffff801`8480e6c0) FAULT_INSTR_CODE: fdc701e8 SYMBOL_STACK_INDEX: 3 SYMBOL_NAME: USBXHCI!Isoch_TransferUrb_Initialize+122 FOLLOWUP_NAME: MachineOwner MODULE_NAME: USBXHCI IMAGE_NAME: USBXHCI.SYS DEBUG_FLR_IMAGE_TIMESTAMP: 0 IMAGE_VERSION: 10.0.18362.693 STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: 122 FAILURE_BUCKET_ID: 0x7f_8_STACKPTR_ERROR_USBXHCI!Isoch_TransferUrb_Initialize BUCKET_ID: 0x7f_8_STACKPTR_ERROR_USBXHCI!Isoch_TransferUrb_Initialize PRIMARY_PROBLEM_CLASS: 0x7f_8_STACKPTR_ERROR_USBXHCI!Isoch_TransferUrb_Initialize TARGET_TIME: 2020-03-18T12:53:49.000Z OSBUILD: 18362 OSSERVICEPACK: 720 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 10 OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: unknown_date BUILDDATESTAMP_STR: 190318-1202 BUILDLAB_STR: 19h1_release BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202 ANALYSIS_SESSION_ELAPSED_TIME: 5927 ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:0x7f_8_stackptr_error_usbxhci!isoch_transferurb_initialize FAILURE_ID_HASH: {34e5a3d1-40cd-bde5-193a-53aa37b7730d} Followup: MachineOwner ---------
Tabii ki bu test kısmında adımları takip edebileceğim bir kaynak var mı? Testin sonucunu nasıl paylayacağım?XMP'yi kapatıp sistemi test eder misin?
XMP açmadan ramleri 3200'e çekmem bi sıkıntı yaratır mı peki?XMP kaynaklı hatalar genelde testler ile çıkmıyor, sadece XMP kapatıp sistemi kullanmanız gerekiyor.