Çözüldü Windows 7 mavi ekran hatası

Bu konu çözüldü olarak işaretlenmiştir. Çözülmediğini düşünüyorsanız konuyu rapor edebilirsiniz.
İşletim sistemi
Windows 7

Bestty

Kilopat
Katılım
16 Kasım 2020
Mesajlar
5.855
Çözümler
80
Yer
Tardis
Daha fazla  
Cinsiyet
Erkek
Yaklaşık 2 hafta önce tecrübesiz bir şekilde Valorant oyununu kuramadığım için Windows'u bozdum ve bilgisayarcıya götürdüm. Bilgisayarcı içindeki bölünmüş 500GB SSD'yi birleştirip Windows 7'yi tekrar kurdu ve üstüne format attı.

O vakitten beridir arada bir bilgisayar mavi ekran veriyor. Alt tarafta trash yazıyor ve 100'e kadar artıyor sonunda yeniden başlatıp ekteki yazıyı gösteriyor. Tahminimce SSD temizleniyor. Bugün oynarken hatayı verdi açıldı internete girdim tekrar verdi. Anlaşılan döngüye girdi herhangi bir zorlamaya gelmiyor.

Konuya hakim değilim anladığım kadarıyla anlattım. İnşallah anlamışsınızdır.
 

Dosya Ekleri

  • 20201116_194253.jpg
    20201116_194253.jpg
    298,8 KB · Görüntüleme: 101
  • 20201116_194327.jpg
    20201116_194327.jpg
    275,4 KB · Görüntüleme: 44
  • 20201116_194357.jpg
    20201116_194357.jpg
    304,1 KB · Görüntüleme: 47
Son düzenleyen: Moderatör:
Çözüm
Dahili USB 3.0 desteği bile olmayan bir işletim sisteminden (ki bütün mavi ekranlarınız USB 3.0 sürücünüzden kaynaklı) en kısa zamanda Windows 10'a geçmenizi öneririm. Sisteminiz tarihi eser değil ve söylediğinize göre SSD'niz var, geçmemeniz için bir sebep yok.

Yok, ben geçemeyeceğim derseniz aşağıdakileri yapın:
Ama ben yazılım kaldır, sürücü ekle diye uğraşacağıma Windows 10'a geçer, Windows Update'den tüm sürücüleri alır, kafam rahat bir şekilde kullanırım.

Kod:
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8800d066850, The address that the exception occurred at
Arg3: fffff88003be75a8, Exception Record Address
Arg4: fffff88003be6e00, Context Record Address

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1734

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 21241

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 74

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: win7sp1_ldr

    Key  : WER.OS.Timestamp
    Value: 2016-03-25T06:00:00Z

    Key  : WER.OS.Version
    Value: 7.1.7601.23403


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff8800d066850

BUGCHECK_P3: fffff88003be75a8

BUGCHECK_P4: fffff88003be6e00

EXCEPTION_RECORD:  fffff88003be75a8 -- (.exr 0xfffff88003be75a8)
ExceptionAddress: fffff8800d066850 (iusb3xhc+0x000000000004f850)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000101700162
Attempt to read from address 0000000101700162

CONTEXT:  fffff88003be6e00 -- (.cxr 0xfffff88003be6e00)
rax=fffff8800d097018 rbx=0000000101700112 rcx=fffff8800d0971e0
rdx=0000000101700112 rsi=fffffa800d1fe1b0 rdi=0000000101700112
rip=fffff8800d066850 rsp=fffff88003be77e0 rbp=fffffa800c3f7a00
r8=fffffa80116d2720  r9=0000000000000000 r10=fffffa800c3f7a00
r11=fffff88003be7938 r12=0000000000000001 r13=fffff8800d097018
r14=0000000000000001 r15=0000000101700112
iopl=0         nv up ei ng nz ac pe cy
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010293
iusb3xhc+0x4f850:
fffff880`0d066850 488b4350        mov     rax,qword ptr [rbx+50h] ds:002b:00000001`01700162=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: fffff800030480e8: Unable to get Flags value from nt!KdVersionBlock
fffff800030480e8: Unable to get Flags value from nt!KdVersionBlock
fffff800030480e8: Unable to get Flags value from nt!KdVersionBlock
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff800031072e8
GetUlongPtrFromAddress: unable to read from fffff80003107498
0000000101700162

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000101700162

EXCEPTION_STR:  0xc0000005

STACK_TEXT:
fffff880`03be77e0 fffffa80`0a516920     : 00000000`00000060 00000000`00000001 00000000`000007ff fffffa80`0c3f7a58 : iusb3xhc+0x4f850
fffff880`03be77e8 00000000`00000060     : 00000000`00000001 00000000`000007ff fffffa80`0c3f7a58 00000000`00000000 : 0xfffffa80`0a516920
fffff880`03be77f0 00000000`00000001     : 00000000`000007ff fffffa80`0c3f7a58 00000000`00000000 fffff880`0d086b00 : 0x60
fffff880`03be77f8 00000000`000007ff     : fffffa80`0c3f7a58 00000000`00000000 fffff880`0d086b00 fffff880`0d097018 : 0x1
fffff880`03be7800 fffffa80`0c3f7a58     : 00000000`00000000 fffff880`0d086b00 fffff880`0d097018 fffffa80`116d2720 : 0x7ff
fffff880`03be7808 00000000`00000000     : fffff880`0d086b00 fffff880`0d097018 fffffa80`116d2720 fffff880`0d074e19 : 0xfffffa80`0c3f7a58


SYMBOL_NAME:  iusb3xhc+4f850

MODULE_NAME: iusb3xhc

IMAGE_NAME:  iusb3xhc.sys

STACK_COMMAND:  .cxr 0xfffff88003be6e00 ; kb

FAILURE_BUCKET_ID:  0x7E_iusb3xhc+4f850

OS_VERSION:  7.1.7601.23403

BUILDLAB_STR:  win7sp1_ldr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 7

FAILURE_ID_HASH:  {b7cde346-ebd9-272e-95fc-bfa95a7acb11}

Followup:     MachineOwner
---------

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff88006709850, The address that the exception occurred at
Arg3: fffff880039165a8, Exception Record Address
Arg4: fffff88003915e00, Context Record Address

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1546

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 11904

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 73

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: win7sp1_ldr

    Key  : WER.OS.Timestamp
    Value: 2016-03-25T06:00:00Z

    Key  : WER.OS.Version
    Value: 7.1.7601.23403


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff88006709850

BUGCHECK_P3: fffff880039165a8

BUGCHECK_P4: fffff88003915e00

EXCEPTION_RECORD:  fffff880039165a8 -- (.exr 0xfffff880039165a8)
ExceptionAddress: fffff88006709850 (iusb3xhc+0x000000000004f850)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000101700162
Attempt to read from address 0000000101700162

CONTEXT:  fffff88003915e00 -- (.cxr 0xfffff88003915e00)
rax=fffff8800673a018 rbx=0000000101700112 rcx=fffff8800673a1e0
rdx=0000000101700112 rsi=fffffa8007e451b0 rdi=0000000101700112
rip=fffff88006709850 rsp=fffff880039167e0 rbp=fffffa8007007410
r8=fffffa8007e43b20  r9=0000000000000000 r10=fffffa8007007410
r11=fffff88003916938 r12=0000000000000002 r13=fffff8800673a018
r14=0000000000000001 r15=0000000101700112
iopl=0         nv up ei ng nz ac pe cy
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010293
iusb3xhc+0x4f850:
fffff880`06709850 488b4350        mov     rax,qword ptr [rbx+50h] ds:002b:00000001`01700162=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: fffff800030060e8: Unable to get Flags value from nt!KdVersionBlock
fffff800030060e8: Unable to get Flags value from nt!KdVersionBlock
fffff800030060e8: Unable to get Flags value from nt!KdVersionBlock
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff800030c52e8
GetUlongPtrFromAddress: unable to read from fffff800030c5498
0000000101700162

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000101700162

EXCEPTION_STR:  0xc0000005

STACK_TEXT:
fffff880`039167e0 fffffa80`0bb30eb0     : 00000000`00000060 00000000`00000001 00000000`000007ff fffffa80`07007468 : iusb3xhc+0x4f850
fffff880`039167e8 00000000`00000060     : 00000000`00000001 00000000`000007ff fffffa80`07007468 00000000`00000000 : 0xfffffa80`0bb30eb0
fffff880`039167f0 00000000`00000001     : 00000000`000007ff fffffa80`07007468 00000000`00000000 fffff880`06729b00 : 0x60
fffff880`039167f8 00000000`000007ff     : fffffa80`07007468 00000000`00000000 fffff880`06729b00 fffff880`0673a018 : 0x1
fffff880`03916800 fffffa80`07007468     : 00000000`00000000 fffff880`06729b00 fffff880`0673a018 fffffa80`07e43b20 : 0x7ff
fffff880`03916808 00000000`00000000     : fffff880`06729b00 fffff880`0673a018 fffffa80`07e43b20 fffff880`06717e19 : 0xfffffa80`07007468


SYMBOL_NAME:  iusb3xhc+4f850

MODULE_NAME: iusb3xhc

IMAGE_NAME:  iusb3xhc.sys

STACK_COMMAND:  .cxr 0xfffff88003915e00 ; kb

FAILURE_BUCKET_ID:  0x7E_iusb3xhc+4f850

OS_VERSION:  7.1.7601.23403

BUILDLAB_STR:  win7sp1_ldr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 7

FAILURE_ID_HASH:  {b7cde346-ebd9-272e-95fc-bfa95a7acb11}

Followup:     MachineOwner
---------

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff88004a7c850, The address that the exception occurred at
Arg3: fffff88003ef6598, Exception Record Address
Arg4: fffff88003ef5df0, Context Record Address

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 2171

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 17111

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 74

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: win7sp1_ldr

    Key  : WER.OS.Timestamp
    Value: 2016-03-25T06:00:00Z

    Key  : WER.OS.Version
    Value: 7.1.7601.23403


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff88004a7c850

BUGCHECK_P3: fffff88003ef6598

BUGCHECK_P4: fffff88003ef5df0

EXCEPTION_RECORD:  fffff88003ef6598 -- (.exr 0xfffff88003ef6598)
ExceptionAddress: fffff88004a7c850 (iusb3xhc+0x000000000004f850)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000101700162
Attempt to read from address 0000000101700162

CONTEXT:  fffff88003ef5df0 -- (.cxr 0xfffff88003ef5df0)
rax=fffff88004aad018 rbx=0000000101700112 rcx=fffff88004aad1e0
rdx=0000000101700112 rsi=fffffa8007e221b0 rdi=0000000101700112
rip=fffff88004a7c850 rsp=fffff88003ef67d0 rbp=fffffa8007e22ba0
r8=fffffa8007e04b20  r9=0000000000000000 r10=fffffa8007e22ba0
r11=fffff88003ef6928 r12=0000000000000001 r13=fffff88004aad018
r14=0000000000000001 r15=0000000101700112
iopl=0         nv up ei ng nz ac pe cy
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010293
iusb3xhc+0x4f850:
fffff880`04a7c850 488b4350        mov     rax,qword ptr [rbx+50h] ds:002b:00000001`01700162=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: fffff80002ffa0e8: Unable to get Flags value from nt!KdVersionBlock
fffff80002ffa0e8: Unable to get Flags value from nt!KdVersionBlock
fffff80002ffa0e8: Unable to get Flags value from nt!KdVersionBlock
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff800030b92e8
GetUlongPtrFromAddress: unable to read from fffff800030b9498
0000000101700162

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000101700162

EXCEPTION_STR:  0xc0000005

STACK_TEXT:
fffff880`03ef67d0 fffffa80`0caef000     : 00000000`00000060 00000000`00000001 00000000`000007ff fffffa80`07e22bf8 : iusb3xhc+0x4f850
fffff880`03ef67d8 00000000`00000060     : 00000000`00000001 00000000`000007ff fffffa80`07e22bf8 00000000`00000000 : 0xfffffa80`0caef000
fffff880`03ef67e0 00000000`00000001     : 00000000`000007ff fffffa80`07e22bf8 00000000`00000000 fffff880`04a9cb00 : 0x60
fffff880`03ef67e8 00000000`000007ff     : fffffa80`07e22bf8 00000000`00000000 fffff880`04a9cb00 fffff880`04aad018 : 0x1
fffff880`03ef67f0 fffffa80`07e22bf8     : 00000000`00000000 fffff880`04a9cb00 fffff880`04aad018 fffffa80`07e04b20 : 0x7ff
fffff880`03ef67f8 00000000`00000000     : fffff880`04a9cb00 fffff880`04aad018 fffffa80`07e04b20 fffff880`04a8ae19 : 0xfffffa80`07e22bf8


SYMBOL_NAME:  iusb3xhc+4f850

MODULE_NAME: iusb3xhc

IMAGE_NAME:  iusb3xhc.sys

STACK_COMMAND:  .cxr 0xfffff88003ef5df0 ; kb

FAILURE_BUCKET_ID:  0x7E_iusb3xhc+4f850

OS_VERSION:  7.1.7601.23403

BUILDLAB_STR:  win7sp1_ldr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 7

FAILURE_ID_HASH:  {b7cde346-ebd9-272e-95fc-bfa95a7acb11}

Followup:     MachineOwner
---------

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8800476a850, The address that the exception occurred at
Arg3: fffff88008e2c598, Exception Record Address
Arg4: fffff88008e2bdf0, Context Record Address

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1483

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 8068

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 73

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: win7sp1_ldr

    Key  : WER.OS.Timestamp
    Value: 2016-03-25T06:00:00Z

    Key  : WER.OS.Version
    Value: 7.1.7601.23403


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff8800476a850

BUGCHECK_P3: fffff88008e2c598

BUGCHECK_P4: fffff88008e2bdf0

EXCEPTION_RECORD:  fffff88008e2c598 -- (.exr 0xfffff88008e2c598)
ExceptionAddress: fffff8800476a850 (iusb3xhc+0x000000000004f850)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000101700162
Attempt to read from address 0000000101700162

CONTEXT:  fffff88008e2bdf0 -- (.cxr 0xfffff88008e2bdf0)
rax=fffff8800479b018 rbx=0000000101700112 rcx=fffff8800479b1e0
rdx=0000000101700112 rsi=fffffa8007bd01b0 rdi=0000000101700112
rip=fffff8800476a850 rsp=fffff88008e2c7d0 rbp=fffffa800c5ba7c0
r8=fffffa800ad4bb20  r9=0000000000000000 r10=fffffa800c5ba7c0
r11=fffff88008e2c928 r12=0000000000000001 r13=fffff8800479b018
r14=0000000000000001 r15=0000000101700112
iopl=0         nv up ei ng nz ac pe cy
cs=0010  ss=0000  ds=002b  es=002b  fs=0053  gs=002b             efl=00010293
iusb3xhc+0x4f850:
fffff880`0476a850 488b4350        mov     rax,qword ptr [rbx+50h] ds:002b:00000001`01700162=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: fffff800030000e8: Unable to get Flags value from nt!KdVersionBlock
fffff800030000e8: Unable to get Flags value from nt!KdVersionBlock
fffff800030000e8: Unable to get Flags value from nt!KdVersionBlock
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff800030bf2e8
GetUlongPtrFromAddress: unable to read from fffff800030bf498
0000000101700162

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000101700162

EXCEPTION_STR:  0xc0000005

STACK_TEXT:
fffff880`08e2c7d0 fffffa80`07d064e0     : 00000000`00000060 00000000`00000001 00000000`000007ff fffffa80`0c5ba818 : iusb3xhc+0x4f850
fffff880`08e2c7d8 00000000`00000060     : 00000000`00000001 00000000`000007ff fffffa80`0c5ba818 00000000`00000000 : 0xfffffa80`07d064e0
fffff880`08e2c7e0 00000000`00000001     : 00000000`000007ff fffffa80`0c5ba818 00000000`00000000 fffff880`0478ab00 : 0x60
fffff880`08e2c7e8 00000000`000007ff     : fffffa80`0c5ba818 00000000`00000000 fffff880`0478ab00 fffff880`0479b018 : 0x1
fffff880`08e2c7f0 fffffa80`0c5ba818     : 00000000`00000000 fffff880`0478ab00 fffff880`0479b018 fffffa80`0ad4bb20 : 0x7ff
fffff880`08e2c7f8 00000000`00000000     : fffff880`0478ab00 fffff880`0479b018 fffffa80`0ad4bb20 fffff880`04778e19 : 0xfffffa80`0c5ba818


SYMBOL_NAME:  iusb3xhc+4f850

MODULE_NAME: iusb3xhc

IMAGE_NAME:  iusb3xhc.sys

STACK_COMMAND:  .cxr 0xfffff88008e2bdf0 ; kb

FAILURE_BUCKET_ID:  0x7E_iusb3xhc+4f850

OS_VERSION:  7.1.7601.23403

BUILDLAB_STR:  win7sp1_ldr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 7

FAILURE_ID_HASH:  {b7cde346-ebd9-272e-95fc-bfa95a7acb11}

Followup:     MachineOwner
---------

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8800484f850, The address that the exception occurred at
Arg3: fffff880037fc3a8, Exception Record Address
Arg4: fffff880037fbc00, Context Record Address

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1562

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 21283

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 74

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: win7sp1_ldr

    Key  : WER.OS.Timestamp
    Value: 2016-03-25T06:00:00Z

    Key  : WER.OS.Version
    Value: 7.1.7601.23403


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff8800484f850

BUGCHECK_P3: fffff880037fc3a8

BUGCHECK_P4: fffff880037fbc00

EXCEPTION_RECORD:  fffff880037fc3a8 -- (.exr 0xfffff880037fc3a8)
ExceptionAddress: fffff8800484f850 (iusb3xhc+0x000000000004f850)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000101700162
Attempt to read from address 0000000101700162

CONTEXT:  fffff880037fbc00 -- (.cxr 0xfffff880037fbc00)
rax=fffff88004880018 rbx=0000000101700112 rcx=fffff880048801e0
rdx=0000000101700112 rsi=fffffa8007b8d1b0 rdi=0000000101700112
rip=fffff8800484f850 rsp=fffff880037fc5e0 rbp=fffffa800b42d860
r8=fffffa800b18e460  r9=0000000000000000 r10=fffffa800b42d860
r11=fffff880037fc738 r12=0000000000000003 r13=fffff88004880018
r14=0000000000000001 r15=0000000101700112
iopl=0         nv up ei ng nz ac pe cy
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010293
iusb3xhc+0x4f850:
fffff880`0484f850 488b4350        mov     rax,qword ptr [rbx+50h] ds:002b:00000001`01700162=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: fffff800030480e8: Unable to get Flags value from nt!KdVersionBlock
fffff800030480e8: Unable to get Flags value from nt!KdVersionBlock
fffff800030480e8: Unable to get Flags value from nt!KdVersionBlock
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff800031072e8
GetUlongPtrFromAddress: unable to read from fffff80003107498
0000000101700162

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000101700162

EXCEPTION_STR:  0xc0000005

STACK_TEXT:
fffff880`037fc5e0 fffffa80`10e992e0     : 00000000`00000060 00000000`00000001 00000000`000007ff fffffa80`0b42d8b8 : iusb3xhc+0x4f850
fffff880`037fc5e8 00000000`00000060     : 00000000`00000001 00000000`000007ff fffffa80`0b42d8b8 00000000`00000000 : 0xfffffa80`10e992e0
fffff880`037fc5f0 00000000`00000001     : 00000000`000007ff fffffa80`0b42d8b8 00000000`00000000 fffff880`0486fb00 : 0x60
fffff880`037fc5f8 00000000`000007ff     : fffffa80`0b42d8b8 00000000`00000000 fffff880`0486fb00 fffff880`04880018 : 0x1
fffff880`037fc600 fffffa80`0b42d8b8     : 00000000`00000000 fffff880`0486fb00 fffff880`04880018 fffffa80`0b18e460 : 0x7ff
fffff880`037fc608 00000000`00000000     : fffff880`0486fb00 fffff880`04880018 fffffa80`0b18e460 fffff880`0485de19 : 0xfffffa80`0b42d8b8


SYMBOL_NAME:  iusb3xhc+4f850

MODULE_NAME: iusb3xhc

IMAGE_NAME:  iusb3xhc.sys

STACK_COMMAND:  .cxr 0xfffff880037fbc00 ; kb

FAILURE_BUCKET_ID:  0x7E_iusb3xhc+4f850

OS_VERSION:  7.1.7601.23403

BUILDLAB_STR:  win7sp1_ldr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 7

FAILURE_ID_HASH:  {b7cde346-ebd9-272e-95fc-bfa95a7acb11}

Followup:     MachineOwner
---------

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8800434a850, The address that the exception occurred at
Arg3: fffff880037d93a8, Exception Record Address
Arg4: fffff880037d8c00, Context Record Address

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1812

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 20528

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 74

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: win7sp1_ldr

    Key  : WER.OS.Timestamp
    Value: 2016-03-25T06:00:00Z

    Key  : WER.OS.Version
    Value: 7.1.7601.23403


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff8800434a850

BUGCHECK_P3: fffff880037d93a8

BUGCHECK_P4: fffff880037d8c00

EXCEPTION_RECORD:  fffff880037d93a8 -- (.exr 0xfffff880037d93a8)
ExceptionAddress: fffff8800434a850 (iusb3xhc+0x000000000004f850)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000101700162
Attempt to read from address 0000000101700162

CONTEXT:  fffff880037d8c00 -- (.cxr 0xfffff880037d8c00)
rax=fffff8800437b018 rbx=0000000101700112 rcx=fffff8800437b1e0
rdx=0000000101700112 rsi=fffffa8007e0b1b0 rdi=0000000101700112
rip=fffff8800434a850 rsp=fffff880037d95e0 rbp=fffffa800ac44010
r8=fffffa800b45db20  r9=0000000000000000 r10=fffffa800ac44010
r11=fffff880037d9738 r12=0000000000000002 r13=fffff8800437b018
r14=0000000000000001 r15=0000000101700112
iopl=0         nv up ei ng nz ac pe cy
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010293
iusb3xhc+0x4f850:
fffff880`0434a850 488b4350        mov     rax,qword ptr [rbx+50h] ds:002b:00000001`01700162=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: fffff80002ff40e8: Unable to get Flags value from nt!KdVersionBlock
fffff80002ff40e8: Unable to get Flags value from nt!KdVersionBlock
fffff80002ff40e8: Unable to get Flags value from nt!KdVersionBlock
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff800030b32e8
GetUlongPtrFromAddress: unable to read from fffff800030b3498
0000000101700162

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000101700162

EXCEPTION_STR:  0xc0000005

STACK_TEXT:
fffff880`037d95e0 fffffa80`0db4eea0     : 00000000`00000060 00000000`00000001 00000000`000007ff fffffa80`0ac44068 : iusb3xhc+0x4f850
fffff880`037d95e8 00000000`00000060     : 00000000`00000001 00000000`000007ff fffffa80`0ac44068 00000000`00000000 : 0xfffffa80`0db4eea0
fffff880`037d95f0 00000000`00000001     : 00000000`000007ff fffffa80`0ac44068 00000000`00000000 fffff880`0436ab00 : 0x60
fffff880`037d95f8 00000000`000007ff     : fffffa80`0ac44068 00000000`00000000 fffff880`0436ab00 fffff880`0437b018 : 0x1
fffff880`037d9600 fffffa80`0ac44068     : 00000000`00000000 fffff880`0436ab00 fffff880`0437b018 fffffa80`0b45db20 : 0x7ff
fffff880`037d9608 00000000`00000000     : fffff880`0436ab00 fffff880`0437b018 fffffa80`0b45db20 fffff880`04358e19 : 0xfffffa80`0ac44068


SYMBOL_NAME:  iusb3xhc+4f850

MODULE_NAME: iusb3xhc

IMAGE_NAME:  iusb3xhc.sys

STACK_COMMAND:  .cxr 0xfffff880037d8c00 ; kb

FAILURE_BUCKET_ID:  0x7E_iusb3xhc+4f850

OS_VERSION:  7.1.7601.23403

BUILDLAB_STR:  win7sp1_ldr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 7

FAILURE_ID_HASH:  {b7cde346-ebd9-272e-95fc-bfa95a7acb11}

Followup:     MachineOwner
---------

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff88004574850, The address that the exception occurred at
Arg3: fffff880037ee3a8, Exception Record Address
Arg4: fffff880037edc00, Context Record Address

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1687

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 8388

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 73

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: win7sp1_ldr

    Key  : WER.OS.Timestamp
    Value: 2016-03-25T06:00:00Z

    Key  : WER.OS.Version
    Value: 7.1.7601.23403


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff88004574850

BUGCHECK_P3: fffff880037ee3a8

BUGCHECK_P4: fffff880037edc00

EXCEPTION_RECORD:  fffff880037ee3a8 -- (.exr 0xfffff880037ee3a8)
ExceptionAddress: fffff88004574850 (iusb3xhc+0x000000000004f850)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000101700162
Attempt to read from address 0000000101700162

CONTEXT:  fffff880037edc00 -- (.cxr 0xfffff880037edc00)
rax=fffff880045a5018 rbx=0000000101700112 rcx=fffff880045a51e0
rdx=0000000101700112 rsi=fffffa800af6b810 rdi=0000000101700112
rip=fffff88004574850 rsp=fffff880037ee5e0 rbp=fffffa800b9ce530
r8=fffffa800af8e9f0  r9=0000000000000000 r10=fffffa800b9ce530
r11=fffff880037ee738 r12=0000000000000001 r13=fffff880045a5018
r14=0000000000000001 r15=0000000101700112
iopl=0         nv up ei ng nz ac pe cy
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010293
iusb3xhc+0x4f850:
fffff880`04574850 488b4350        mov     rax,qword ptr [rbx+50h] ds:002b:00000001`01700162=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: fffff800030540e8: Unable to get Flags value from nt!KdVersionBlock
fffff800030540e8: Unable to get Flags value from nt!KdVersionBlock
fffff800030540e8: Unable to get Flags value from nt!KdVersionBlock
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff800031132e8
GetUlongPtrFromAddress: unable to read from fffff80003113498
0000000101700162

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000101700162

EXCEPTION_STR:  0xc0000005

STACK_TEXT:
fffff880`037ee5e0 fffffa80`0b9b5f90     : 00000000`00000060 00000000`00000001 00000000`000007ff fffffa80`0b9ce588 : iusb3xhc+0x4f850
fffff880`037ee5e8 00000000`00000060     : 00000000`00000001 00000000`000007ff fffffa80`0b9ce588 00000000`00000000 : 0xfffffa80`0b9b5f90
fffff880`037ee5f0 00000000`00000001     : 00000000`000007ff fffffa80`0b9ce588 00000000`00000000 fffff880`04594b00 : 0x60
fffff880`037ee5f8 00000000`000007ff     : fffffa80`0b9ce588 00000000`00000000 fffff880`04594b00 fffff880`045a5018 : 0x1
fffff880`037ee600 fffffa80`0b9ce588     : 00000000`00000000 fffff880`04594b00 fffff880`045a5018 fffffa80`0af8e9f0 : 0x7ff
fffff880`037ee608 00000000`00000000     : fffff880`04594b00 fffff880`045a5018 fffffa80`0af8e9f0 fffff880`04582e19 : 0xfffffa80`0b9ce588


SYMBOL_NAME:  iusb3xhc+4f850

MODULE_NAME: iusb3xhc

IMAGE_NAME:  iusb3xhc.sys

STACK_COMMAND:  .cxr 0xfffff880037edc00 ; kb

FAILURE_BUCKET_ID:  0x7E_iusb3xhc+4f850

OS_VERSION:  7.1.7601.23403

BUILDLAB_STR:  win7sp1_ldr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 7

FAILURE_ID_HASH:  {b7cde346-ebd9-272e-95fc-bfa95a7acb11}

Followup:     MachineOwner
---------

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff88004564850, The address that the exception occurred at
Arg3: fffff880039163a8, Exception Record Address
Arg4: fffff88003915c00, Context Record Address

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1514

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 19301

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 74

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: win7sp1_ldr

    Key  : WER.OS.Timestamp
    Value: 2016-03-25T06:00:00Z

    Key  : WER.OS.Version
    Value: 7.1.7601.23403


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff88004564850

BUGCHECK_P3: fffff880039163a8

BUGCHECK_P4: fffff88003915c00

EXCEPTION_RECORD:  fffff880039163a8 -- (.exr 0xfffff880039163a8)
ExceptionAddress: fffff88004564850 (iusb3xhc+0x000000000004f850)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000101700162
Attempt to read from address 0000000101700162

CONTEXT:  fffff88003915c00 -- (.cxr 0xfffff88003915c00)
rax=fffff88004595018 rbx=0000000101700112 rcx=fffff880045951e0
rdx=0000000101700112 rsi=fffffa8007e25810 rdi=0000000101700112
rip=fffff88004564850 rsp=fffff880039165e0 rbp=fffffa800bdfe7b0
r8=fffffa8007e09b20  r9=0000000000000000 r10=fffffa800bdfe7b0
r11=fffff88003916738 r12=0000000000000001 r13=fffff88004595018
r14=0000000000000001 r15=0000000101700112
iopl=0         nv up ei ng nz ac pe cy
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010293
iusb3xhc+0x4f850:
fffff880`04564850 488b4350        mov     rax,qword ptr [rbx+50h] ds:002b:00000001`01700162=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: fffff800030070e8: Unable to get Flags value from nt!KdVersionBlock
fffff800030070e8: Unable to get Flags value from nt!KdVersionBlock
fffff800030070e8: Unable to get Flags value from nt!KdVersionBlock
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff800030c62e8
GetUlongPtrFromAddress: unable to read from fffff800030c6498
0000000101700162

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000101700162

EXCEPTION_STR:  0xc0000005

STACK_TEXT:
fffff880`039165e0 fffffa80`0bd10690     : 00000000`00000060 00000000`00000001 00000000`000007ff fffffa80`0bdfe808 : iusb3xhc+0x4f850
fffff880`039165e8 00000000`00000060     : 00000000`00000001 00000000`000007ff fffffa80`0bdfe808 00000000`00000000 : 0xfffffa80`0bd10690
fffff880`039165f0 00000000`00000001     : 00000000`000007ff fffffa80`0bdfe808 00000000`00000000 fffff880`04584b00 : 0x60
fffff880`039165f8 00000000`000007ff     : fffffa80`0bdfe808 00000000`00000000 fffff880`04584b00 fffff880`04595018 : 0x1
fffff880`03916600 fffffa80`0bdfe808     : 00000000`00000000 fffff880`04584b00 fffff880`04595018 fffffa80`07e09b20 : 0x7ff
fffff880`03916608 00000000`00000000     : fffff880`04584b00 fffff880`04595018 fffffa80`07e09b20 fffff880`04572e19 : 0xfffffa80`0bdfe808


SYMBOL_NAME:  iusb3xhc+4f850

MODULE_NAME: iusb3xhc

IMAGE_NAME:  iusb3xhc.sys

STACK_COMMAND:  .cxr 0xfffff88003915c00 ; kb

FAILURE_BUCKET_ID:  0x7E_iusb3xhc+4f850

OS_VERSION:  7.1.7601.23403

BUILDLAB_STR:  win7sp1_ldr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 7

FAILURE_ID_HASH:  {b7cde346-ebd9-272e-95fc-bfa95a7acb11}

Followup:     MachineOwner
---------

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff88004b06850, The address that the exception occurred at
Arg3: fffff880037e75a8, Exception Record Address
Arg4: fffff880037e6e00, Context Record Address

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1561

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 9212

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 73

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: win7sp1_ldr

    Key  : WER.OS.Timestamp
    Value: 2016-03-25T06:00:00Z

    Key  : WER.OS.Version
    Value: 7.1.7601.23403


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff88004b06850

BUGCHECK_P3: fffff880037e75a8

BUGCHECK_P4: fffff880037e6e00

EXCEPTION_RECORD:  fffff880037e75a8 -- (.exr 0xfffff880037e75a8)
ExceptionAddress: fffff88004b06850 (iusb3xhc+0x000000000004f850)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000101700162
Attempt to read from address 0000000101700162

CONTEXT:  fffff880037e6e00 -- (.cxr 0xfffff880037e6e00)
rax=fffff88004b37018 rbx=0000000101700112 rcx=fffff88004b371e0
rdx=0000000101700112 rsi=fffffa800abc51b0 rdi=0000000101700112
rip=fffff88004b06850 rsp=fffff880037e77e0 rbp=fffffa800829de90
r8=fffffa800aa33b20  r9=0000000000000000 r10=fffffa800829de90
r11=fffff880037e7938 r12=0000000000000002 r13=fffff88004b37018
r14=0000000000000001 r15=0000000101700112
iopl=0         nv up ei ng nz ac pe cy
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010293
iusb3xhc+0x4f850:
fffff880`04b06850 488b4350        mov     rax,qword ptr [rbx+50h] ds:002b:00000001`01700162=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: fffff8000304f0e8: Unable to get Flags value from nt!KdVersionBlock
fffff8000304f0e8: Unable to get Flags value from nt!KdVersionBlock
fffff8000304f0e8: Unable to get Flags value from nt!KdVersionBlock
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff8000310e2e8
GetUlongPtrFromAddress: unable to read from fffff8000310e498
0000000101700162

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000101700162

EXCEPTION_STR:  0xc0000005

STACK_TEXT:
fffff880`037e77e0 fffffa80`0cbd61d0     : 00000000`00000060 00000000`00000001 00000000`000007ff fffffa80`0829dee8 : iusb3xhc+0x4f850
fffff880`037e77e8 00000000`00000060     : 00000000`00000001 00000000`000007ff fffffa80`0829dee8 00000000`00000000 : 0xfffffa80`0cbd61d0
fffff880`037e77f0 00000000`00000001     : 00000000`000007ff fffffa80`0829dee8 00000000`00000000 fffff880`04b26b00 : 0x60
fffff880`037e77f8 00000000`000007ff     : fffffa80`0829dee8 00000000`00000000 fffff880`04b26b00 fffff880`04b37018 : 0x1
fffff880`037e7800 fffffa80`0829dee8     : 00000000`00000000 fffff880`04b26b00 fffff880`04b37018 fffffa80`0aa33b20 : 0x7ff
fffff880`037e7808 00000000`00000000     : fffff880`04b26b00 fffff880`04b37018 fffffa80`0aa33b20 fffff880`04b14e19 : 0xfffffa80`0829dee8


SYMBOL_NAME:  iusb3xhc+4f850

MODULE_NAME: iusb3xhc

IMAGE_NAME:  iusb3xhc.sys

STACK_COMMAND:  .cxr 0xfffff880037e6e00 ; kb

FAILURE_BUCKET_ID:  0x7E_iusb3xhc+4f850

OS_VERSION:  7.1.7601.23403

BUILDLAB_STR:  win7sp1_ldr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 7

FAILURE_ID_HASH:  {b7cde346-ebd9-272e-95fc-bfa95a7acb11}

Followup:     MachineOwner
---------

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff88006691850, The address that the exception occurred at
Arg3: fffff880037ee3a8, Exception Record Address
Arg4: fffff880037edc00, Context Record Address

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1530

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 13744

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 73

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: win7sp1_ldr

    Key  : WER.OS.Timestamp
    Value: 2016-03-25T06:00:00Z

    Key  : WER.OS.Version
    Value: 7.1.7601.23403


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff88006691850

BUGCHECK_P3: fffff880037ee3a8

BUGCHECK_P4: fffff880037edc00

EXCEPTION_RECORD:  fffff880037ee3a8 -- (.exr 0xfffff880037ee3a8)
ExceptionAddress: fffff88006691850 (iusb3xhc+0x000000000004f850)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000101700162
Attempt to read from address 0000000101700162

CONTEXT:  fffff880037edc00 -- (.cxr 0xfffff880037edc00)
rax=fffff880066c2018 rbx=0000000101700112 rcx=fffff880066c21e0
rdx=0000000101700112 rsi=fffffa800b19c610 rdi=0000000101700112
rip=fffff88006691850 rsp=fffff880037ee5e0 rbp=fffffa800bd9ae90
r8=fffffa800a466b20  r9=0000000000000000 r10=fffffa800bd9ae90
r11=fffff880037ee738 r12=0000000000000001 r13=fffff880066c2018
r14=0000000000000001 r15=0000000101700112
iopl=0         nv up ei ng nz ac pe cy
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010293
iusb3xhc+0x4f850:
fffff880`06691850 488b4350        mov     rax,qword ptr [rbx+50h] ds:002b:00000001`01700162=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: fffff8000303f0e8: Unable to get Flags value from nt!KdVersionBlock
fffff8000303f0e8: Unable to get Flags value from nt!KdVersionBlock
fffff8000303f0e8: Unable to get Flags value from nt!KdVersionBlock
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff800030fe2e8
GetUlongPtrFromAddress: unable to read from fffff800030fe498
0000000101700162

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000101700162

EXCEPTION_STR:  0xc0000005

STACK_TEXT:
fffff880`037ee5e0 fffffa80`0bd566c0     : 00000000`00000060 00000000`00000001 00000000`000007ff fffffa80`0bd9aee8 : iusb3xhc+0x4f850
fffff880`037ee5e8 00000000`00000060     : 00000000`00000001 00000000`000007ff fffffa80`0bd9aee8 00000000`00000000 : 0xfffffa80`0bd566c0
fffff880`037ee5f0 00000000`00000001     : 00000000`000007ff fffffa80`0bd9aee8 00000000`00000000 fffff880`066b1b00 : 0x60
fffff880`037ee5f8 00000000`000007ff     : fffffa80`0bd9aee8 00000000`00000000 fffff880`066b1b00 fffff880`066c2018 : 0x1
fffff880`037ee600 fffffa80`0bd9aee8     : 00000000`00000000 fffff880`066b1b00 fffff880`066c2018 fffffa80`0a466b20 : 0x7ff
fffff880`037ee608 00000000`00000000     : fffff880`066b1b00 fffff880`066c2018 fffffa80`0a466b20 fffff880`0669fe19 : 0xfffffa80`0bd9aee8


SYMBOL_NAME:  iusb3xhc+4f850

MODULE_NAME: iusb3xhc

IMAGE_NAME:  iusb3xhc.sys

STACK_COMMAND:  .cxr 0xfffff880037edc00 ; kb

FAILURE_BUCKET_ID:  0x7E_iusb3xhc+4f850

OS_VERSION:  7.1.7601.23403

BUILDLAB_STR:  win7sp1_ldr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 7

FAILURE_ID_HASH:  {b7cde346-ebd9-272e-95fc-bfa95a7acb11}

Followup:     MachineOwner
---------

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff88005316850, The address that the exception occurred at
Arg3: fffff880037cb3a8, Exception Record Address
Arg4: fffff880037cac00, Context Record Address

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1515

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 9877

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 73

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: win7sp1_ldr

    Key  : WER.OS.Timestamp
    Value: 2016-03-25T06:00:00Z

    Key  : WER.OS.Version
    Value: 7.1.7601.23403


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff88005316850

BUGCHECK_P3: fffff880037cb3a8

BUGCHECK_P4: fffff880037cac00

EXCEPTION_RECORD:  fffff880037cb3a8 -- (.exr 0xfffff880037cb3a8)
ExceptionAddress: fffff88005316850 (iusb3xhc+0x000000000004f850)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000101700162
Attempt to read from address 0000000101700162

CONTEXT:  fffff880037cac00 -- (.cxr 0xfffff880037cac00)
rax=fffff88005347018 rbx=0000000101700112 rcx=fffff880053471e0
rdx=0000000101700112 rsi=fffffa8007fce1b0 rdi=0000000101700112
rip=fffff88005316850 rsp=fffff880037cb5e0 rbp=fffffa800bf42be0
r8=fffffa800b142840  r9=0000000000000000 r10=fffffa800bf42be0
r11=fffff880037cb738 r12=0000000000000001 r13=fffff88005347018
r14=0000000000000001 r15=0000000101700112
iopl=0         nv up ei ng nz ac pe cy
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010293
iusb3xhc+0x4f850:
fffff880`05316850 488b4350        mov     rax,qword ptr [rbx+50h] ds:002b:00000001`01700162=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: fffff80002ff30e8: Unable to get Flags value from nt!KdVersionBlock
fffff80002ff30e8: Unable to get Flags value from nt!KdVersionBlock
fffff80002ff30e8: Unable to get Flags value from nt!KdVersionBlock
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff800030b22e8
GetUlongPtrFromAddress: unable to read from fffff800030b2498
0000000101700162

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000101700162

EXCEPTION_STR:  0xc0000005

STACK_TEXT:
fffff880`037cb5e0 fffffa80`0bf11870     : 00000000`00000060 00000000`00000001 00000000`000007ff fffffa80`0bf42c38 : iusb3xhc+0x4f850
fffff880`037cb5e8 00000000`00000060     : 00000000`00000001 00000000`000007ff fffffa80`0bf42c38 00000000`00000000 : 0xfffffa80`0bf11870
fffff880`037cb5f0 00000000`00000001     : 00000000`000007ff fffffa80`0bf42c38 00000000`00000000 fffff880`05336b00 : 0x60
fffff880`037cb5f8 00000000`000007ff     : fffffa80`0bf42c38 00000000`00000000 fffff880`05336b00 fffff880`05347018 : 0x1
fffff880`037cb600 fffffa80`0bf42c38     : 00000000`00000000 fffff880`05336b00 fffff880`05347018 fffffa80`0b142840 : 0x7ff
fffff880`037cb608 00000000`00000000     : fffff880`05336b00 fffff880`05347018 fffffa80`0b142840 fffff880`05324e19 : 0xfffffa80`0bf42c38


SYMBOL_NAME:  iusb3xhc+4f850

MODULE_NAME: iusb3xhc

IMAGE_NAME:  iusb3xhc.sys

STACK_COMMAND:  .cxr 0xfffff880037cac00 ; kb

FAILURE_BUCKET_ID:  0x7E_iusb3xhc+4f850

OS_VERSION:  7.1.7601.23403

BUILDLAB_STR:  win7sp1_ldr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 7

FAILURE_ID_HASH:  {b7cde346-ebd9-272e-95fc-bfa95a7acb11}

Followup:     MachineOwner
---------

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff88004a8a850, The address that the exception occurred at
Arg3: fffff880037e03a8, Exception Record Address
Arg4: fffff880037dfc00, Context Record Address

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1577

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 8166

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 72

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: win7sp1_ldr

    Key  : WER.OS.Timestamp
    Value: 2016-03-25T06:00:00Z

    Key  : WER.OS.Version
    Value: 7.1.7601.23403


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff88004a8a850

BUGCHECK_P3: fffff880037e03a8

BUGCHECK_P4: fffff880037dfc00

EXCEPTION_RECORD:  fffff880037e03a8 -- (.exr 0xfffff880037e03a8)
ExceptionAddress: fffff88004a8a850 (iusb3xhc+0x000000000004f850)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000101700162
Attempt to read from address 0000000101700162

CONTEXT:  fffff880037dfc00 -- (.cxr 0xfffff880037dfc00)
rax=fffff88004abb018 rbx=0000000101700112 rcx=fffff88004abb1e0
rdx=0000000101700112 rsi=fffffa8007b881b0 rdi=0000000101700112
rip=fffff88004a8a850 rsp=fffff880037e05e0 rbp=fffffa8007bfbda0
r8=fffffa800b08bb20  r9=0000000000000000 r10=fffffa8007bfbda0
r11=fffff880037e0738 r12=0000000000000001 r13=fffff88004abb018
r14=0000000000000001 r15=0000000101700112
iopl=0         nv up ei ng nz ac pe cy
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010293
iusb3xhc+0x4f850:
fffff880`04a8a850 488b4350        mov     rax,qword ptr [rbx+50h] ds:002b:00000001`01700162=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: fffff80002ffa0e8: Unable to get Flags value from nt!KdVersionBlock
fffff80002ffa0e8: Unable to get Flags value from nt!KdVersionBlock
fffff80002ffa0e8: Unable to get Flags value from nt!KdVersionBlock
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff800030b92e8
GetUlongPtrFromAddress: unable to read from fffff800030b9498
0000000101700162

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000101700162

EXCEPTION_STR:  0xc0000005

STACK_TEXT:
fffff880`037e05e0 fffffa80`0be28510     : 00000000`00000060 00000000`00000001 00000000`000007ff fffffa80`07bfbdf8 : iusb3xhc+0x4f850
fffff880`037e05e8 00000000`00000060     : 00000000`00000001 00000000`000007ff fffffa80`07bfbdf8 00000000`00000000 : 0xfffffa80`0be28510
fffff880`037e05f0 00000000`00000001     : 00000000`000007ff fffffa80`07bfbdf8 00000000`00000000 fffff880`04aaab00 : 0x60
fffff880`037e05f8 00000000`000007ff     : fffffa80`07bfbdf8 00000000`00000000 fffff880`04aaab00 fffff880`04abb018 : 0x1
fffff880`037e0600 fffffa80`07bfbdf8     : 00000000`00000000 fffff880`04aaab00 fffff880`04abb018 fffffa80`0b08bb20 : 0x7ff
fffff880`037e0608 00000000`00000000     : fffff880`04aaab00 fffff880`04abb018 fffffa80`0b08bb20 fffff880`04a98e19 : 0xfffffa80`07bfbdf8


SYMBOL_NAME:  iusb3xhc+4f850

MODULE_NAME: iusb3xhc

IMAGE_NAME:  iusb3xhc.sys

STACK_COMMAND:  .cxr 0xfffff880037dfc00 ; kb

FAILURE_BUCKET_ID:  0x7E_iusb3xhc+4f850

OS_VERSION:  7.1.7601.23403

BUILDLAB_STR:  win7sp1_ldr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 7

FAILURE_ID_HASH:  {b7cde346-ebd9-272e-95fc-bfa95a7acb11}

Followup:     MachineOwner
---------

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff880032a2850, The address that the exception occurred at
Arg3: fffff8800390f3a8, Exception Record Address
Arg4: fffff8800390ec00, Context Record Address

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1827

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 19676

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 74

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: win7sp1_ldr

    Key  : WER.OS.Timestamp
    Value: 2016-03-25T06:00:00Z

    Key  : WER.OS.Version
    Value: 7.1.7601.23403


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff880032a2850

BUGCHECK_P3: fffff8800390f3a8

BUGCHECK_P4: fffff8800390ec00

EXCEPTION_RECORD:  fffff8800390f3a8 -- (.exr 0xfffff8800390f3a8)
ExceptionAddress: fffff880032a2850 (iusb3xhc+0x000000000004f850)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000101700162
Attempt to read from address 0000000101700162

CONTEXT:  fffff8800390ec00 -- (.cxr 0xfffff8800390ec00)
rax=fffff880032d3018 rbx=0000000101700112 rcx=fffff880032d31e0
rdx=0000000101700112 rsi=fffffa8007bc4810 rdi=0000000101700112
rip=fffff880032a2850 rsp=fffff8800390f5e0 rbp=fffffa800b3c77b0
r8=fffffa800abecb20  r9=0000000000000000 r10=fffffa800b3c77b0
r11=fffff8800390f738 r12=0000000000000001 r13=fffff880032d3018
r14=0000000000000001 r15=0000000101700112
iopl=0         nv up ei ng nz ac pe cy
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010293
iusb3xhc+0x4f850:
fffff880`032a2850 488b4350        mov     rax,qword ptr [rbx+50h] ds:002b:00000001`01700162=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: fffff8000303f0e8: Unable to get Flags value from nt!KdVersionBlock
fffff8000303f0e8: Unable to get Flags value from nt!KdVersionBlock
fffff8000303f0e8: Unable to get Flags value from nt!KdVersionBlock
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff800030fe2e8
GetUlongPtrFromAddress: unable to read from fffff800030fe498
0000000101700162

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000101700162

EXCEPTION_STR:  0xc0000005

STACK_TEXT:
fffff880`0390f5e0 fffffa80`0b384000     : 00000000`00000060 00000000`00000001 00000000`000007ff fffffa80`0b3c7808 : iusb3xhc+0x4f850
fffff880`0390f5e8 00000000`00000060     : 00000000`00000001 00000000`000007ff fffffa80`0b3c7808 00000000`00000000 : 0xfffffa80`0b384000
fffff880`0390f5f0 00000000`00000001     : 00000000`000007ff fffffa80`0b3c7808 00000000`00000000 fffff880`032c2b00 : 0x60
fffff880`0390f5f8 00000000`000007ff     : fffffa80`0b3c7808 00000000`00000000 fffff880`032c2b00 fffff880`032d3018 : 0x1
fffff880`0390f600 fffffa80`0b3c7808     : 00000000`00000000 fffff880`032c2b00 fffff880`032d3018 fffffa80`0abecb20 : 0x7ff
fffff880`0390f608 00000000`00000000     : fffff880`032c2b00 fffff880`032d3018 fffffa80`0abecb20 fffff880`032b0e19 : 0xfffffa80`0b3c7808


SYMBOL_NAME:  iusb3xhc+4f850

MODULE_NAME: iusb3xhc

IMAGE_NAME:  iusb3xhc.sys

STACK_COMMAND:  .cxr 0xfffff8800390ec00 ; kb

FAILURE_BUCKET_ID:  0x7E_iusb3xhc+4f850

OS_VERSION:  7.1.7601.23403

BUILDLAB_STR:  win7sp1_ldr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 7

FAILURE_ID_HASH:  {b7cde346-ebd9-272e-95fc-bfa95a7acb11}

Followup:     MachineOwner
---------
 
Formatları kendiniz atın. Döküm dosyalarınızı da paylaşın.

Ayrıca sistem özelliklerinizi de paylaşın. Parçalarınızı da kontrol edin, parça çalınması gibi bir durum olmuş olmasın.
 
Formatları kendiniz atın. Döküm dosyalarınızı da paylaşın.

Ayrıca sistem özelliklerinizi de paylaşın. Parçalarınızı da kontrol edin, parça çalınması gibi bir durum olmuş olmasın.
Minidump dosyalarını bilgisayar başına geçince atacağım. Format atmayı bilmem. Dxdiag üzerinden baktım ram, ekran kartı, işlemci yerinde anakart olmazsa olmaz zaten başka parça eksiği de hissetmedim.
Kusura bakmayın hocam anca bilgisayar başın oturdum. Ne kadar doğru yaptım bilmiyorum minidump dosyaları linktedir.

 
Son düzenleme:
Dahili USB 3.0 desteği bile olmayan bir işletim sisteminden (ki bütün mavi ekranlarınız USB 3.0 sürücünüzden kaynaklı) en kısa zamanda Windows 10'a geçmenizi öneririm. Sisteminiz tarihi eser değil ve söylediğinize göre SSD'niz var, geçmemeniz için bir sebep yok.

Yok, ben geçemeyeceğim derseniz aşağıdakileri yapın:
Ama ben yazılım kaldır, sürücü ekle diye uğraşacağıma Windows 10'a geçer, Windows Update'den tüm sürücüleri alır, kafam rahat bir şekilde kullanırım.

Kod:
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8800d066850, The address that the exception occurred at
Arg3: fffff88003be75a8, Exception Record Address
Arg4: fffff88003be6e00, Context Record Address

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1734

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 21241

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 74

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: win7sp1_ldr

    Key  : WER.OS.Timestamp
    Value: 2016-03-25T06:00:00Z

    Key  : WER.OS.Version
    Value: 7.1.7601.23403


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff8800d066850

BUGCHECK_P3: fffff88003be75a8

BUGCHECK_P4: fffff88003be6e00

EXCEPTION_RECORD:  fffff88003be75a8 -- (.exr 0xfffff88003be75a8)
ExceptionAddress: fffff8800d066850 (iusb3xhc+0x000000000004f850)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000101700162
Attempt to read from address 0000000101700162

CONTEXT:  fffff88003be6e00 -- (.cxr 0xfffff88003be6e00)
rax=fffff8800d097018 rbx=0000000101700112 rcx=fffff8800d0971e0
rdx=0000000101700112 rsi=fffffa800d1fe1b0 rdi=0000000101700112
rip=fffff8800d066850 rsp=fffff88003be77e0 rbp=fffffa800c3f7a00
r8=fffffa80116d2720  r9=0000000000000000 r10=fffffa800c3f7a00
r11=fffff88003be7938 r12=0000000000000001 r13=fffff8800d097018
r14=0000000000000001 r15=0000000101700112
iopl=0         nv up ei ng nz ac pe cy
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010293
iusb3xhc+0x4f850:
fffff880`0d066850 488b4350        mov     rax,qword ptr [rbx+50h] ds:002b:00000001`01700162=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: fffff800030480e8: Unable to get Flags value from nt!KdVersionBlock
fffff800030480e8: Unable to get Flags value from nt!KdVersionBlock
fffff800030480e8: Unable to get Flags value from nt!KdVersionBlock
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff800031072e8
GetUlongPtrFromAddress: unable to read from fffff80003107498
0000000101700162

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000101700162

EXCEPTION_STR:  0xc0000005

STACK_TEXT:
fffff880`03be77e0 fffffa80`0a516920     : 00000000`00000060 00000000`00000001 00000000`000007ff fffffa80`0c3f7a58 : iusb3xhc+0x4f850
fffff880`03be77e8 00000000`00000060     : 00000000`00000001 00000000`000007ff fffffa80`0c3f7a58 00000000`00000000 : 0xfffffa80`0a516920
fffff880`03be77f0 00000000`00000001     : 00000000`000007ff fffffa80`0c3f7a58 00000000`00000000 fffff880`0d086b00 : 0x60
fffff880`03be77f8 00000000`000007ff     : fffffa80`0c3f7a58 00000000`00000000 fffff880`0d086b00 fffff880`0d097018 : 0x1
fffff880`03be7800 fffffa80`0c3f7a58     : 00000000`00000000 fffff880`0d086b00 fffff880`0d097018 fffffa80`116d2720 : 0x7ff
fffff880`03be7808 00000000`00000000     : fffff880`0d086b00 fffff880`0d097018 fffffa80`116d2720 fffff880`0d074e19 : 0xfffffa80`0c3f7a58


SYMBOL_NAME:  iusb3xhc+4f850

MODULE_NAME: iusb3xhc

IMAGE_NAME:  iusb3xhc.sys

STACK_COMMAND:  .cxr 0xfffff88003be6e00 ; kb

FAILURE_BUCKET_ID:  0x7E_iusb3xhc+4f850

OS_VERSION:  7.1.7601.23403

BUILDLAB_STR:  win7sp1_ldr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 7

FAILURE_ID_HASH:  {b7cde346-ebd9-272e-95fc-bfa95a7acb11}

Followup:     MachineOwner
---------

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff88006709850, The address that the exception occurred at
Arg3: fffff880039165a8, Exception Record Address
Arg4: fffff88003915e00, Context Record Address

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1546

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 11904

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 73

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: win7sp1_ldr

    Key  : WER.OS.Timestamp
    Value: 2016-03-25T06:00:00Z

    Key  : WER.OS.Version
    Value: 7.1.7601.23403


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff88006709850

BUGCHECK_P3: fffff880039165a8

BUGCHECK_P4: fffff88003915e00

EXCEPTION_RECORD:  fffff880039165a8 -- (.exr 0xfffff880039165a8)
ExceptionAddress: fffff88006709850 (iusb3xhc+0x000000000004f850)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000101700162
Attempt to read from address 0000000101700162

CONTEXT:  fffff88003915e00 -- (.cxr 0xfffff88003915e00)
rax=fffff8800673a018 rbx=0000000101700112 rcx=fffff8800673a1e0
rdx=0000000101700112 rsi=fffffa8007e451b0 rdi=0000000101700112
rip=fffff88006709850 rsp=fffff880039167e0 rbp=fffffa8007007410
r8=fffffa8007e43b20  r9=0000000000000000 r10=fffffa8007007410
r11=fffff88003916938 r12=0000000000000002 r13=fffff8800673a018
r14=0000000000000001 r15=0000000101700112
iopl=0         nv up ei ng nz ac pe cy
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010293
iusb3xhc+0x4f850:
fffff880`06709850 488b4350        mov     rax,qword ptr [rbx+50h] ds:002b:00000001`01700162=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: fffff800030060e8: Unable to get Flags value from nt!KdVersionBlock
fffff800030060e8: Unable to get Flags value from nt!KdVersionBlock
fffff800030060e8: Unable to get Flags value from nt!KdVersionBlock
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff800030c52e8
GetUlongPtrFromAddress: unable to read from fffff800030c5498
0000000101700162

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000101700162

EXCEPTION_STR:  0xc0000005

STACK_TEXT:
fffff880`039167e0 fffffa80`0bb30eb0     : 00000000`00000060 00000000`00000001 00000000`000007ff fffffa80`07007468 : iusb3xhc+0x4f850
fffff880`039167e8 00000000`00000060     : 00000000`00000001 00000000`000007ff fffffa80`07007468 00000000`00000000 : 0xfffffa80`0bb30eb0
fffff880`039167f0 00000000`00000001     : 00000000`000007ff fffffa80`07007468 00000000`00000000 fffff880`06729b00 : 0x60
fffff880`039167f8 00000000`000007ff     : fffffa80`07007468 00000000`00000000 fffff880`06729b00 fffff880`0673a018 : 0x1
fffff880`03916800 fffffa80`07007468     : 00000000`00000000 fffff880`06729b00 fffff880`0673a018 fffffa80`07e43b20 : 0x7ff
fffff880`03916808 00000000`00000000     : fffff880`06729b00 fffff880`0673a018 fffffa80`07e43b20 fffff880`06717e19 : 0xfffffa80`07007468


SYMBOL_NAME:  iusb3xhc+4f850

MODULE_NAME: iusb3xhc

IMAGE_NAME:  iusb3xhc.sys

STACK_COMMAND:  .cxr 0xfffff88003915e00 ; kb

FAILURE_BUCKET_ID:  0x7E_iusb3xhc+4f850

OS_VERSION:  7.1.7601.23403

BUILDLAB_STR:  win7sp1_ldr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 7

FAILURE_ID_HASH:  {b7cde346-ebd9-272e-95fc-bfa95a7acb11}

Followup:     MachineOwner
---------

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff88004a7c850, The address that the exception occurred at
Arg3: fffff88003ef6598, Exception Record Address
Arg4: fffff88003ef5df0, Context Record Address

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 2171

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 17111

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 74

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: win7sp1_ldr

    Key  : WER.OS.Timestamp
    Value: 2016-03-25T06:00:00Z

    Key  : WER.OS.Version
    Value: 7.1.7601.23403


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff88004a7c850

BUGCHECK_P3: fffff88003ef6598

BUGCHECK_P4: fffff88003ef5df0

EXCEPTION_RECORD:  fffff88003ef6598 -- (.exr 0xfffff88003ef6598)
ExceptionAddress: fffff88004a7c850 (iusb3xhc+0x000000000004f850)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000101700162
Attempt to read from address 0000000101700162

CONTEXT:  fffff88003ef5df0 -- (.cxr 0xfffff88003ef5df0)
rax=fffff88004aad018 rbx=0000000101700112 rcx=fffff88004aad1e0
rdx=0000000101700112 rsi=fffffa8007e221b0 rdi=0000000101700112
rip=fffff88004a7c850 rsp=fffff88003ef67d0 rbp=fffffa8007e22ba0
r8=fffffa8007e04b20  r9=0000000000000000 r10=fffffa8007e22ba0
r11=fffff88003ef6928 r12=0000000000000001 r13=fffff88004aad018
r14=0000000000000001 r15=0000000101700112
iopl=0         nv up ei ng nz ac pe cy
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010293
iusb3xhc+0x4f850:
fffff880`04a7c850 488b4350        mov     rax,qword ptr [rbx+50h] ds:002b:00000001`01700162=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: fffff80002ffa0e8: Unable to get Flags value from nt!KdVersionBlock
fffff80002ffa0e8: Unable to get Flags value from nt!KdVersionBlock
fffff80002ffa0e8: Unable to get Flags value from nt!KdVersionBlock
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff800030b92e8
GetUlongPtrFromAddress: unable to read from fffff800030b9498
0000000101700162

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000101700162

EXCEPTION_STR:  0xc0000005

STACK_TEXT:
fffff880`03ef67d0 fffffa80`0caef000     : 00000000`00000060 00000000`00000001 00000000`000007ff fffffa80`07e22bf8 : iusb3xhc+0x4f850
fffff880`03ef67d8 00000000`00000060     : 00000000`00000001 00000000`000007ff fffffa80`07e22bf8 00000000`00000000 : 0xfffffa80`0caef000
fffff880`03ef67e0 00000000`00000001     : 00000000`000007ff fffffa80`07e22bf8 00000000`00000000 fffff880`04a9cb00 : 0x60
fffff880`03ef67e8 00000000`000007ff     : fffffa80`07e22bf8 00000000`00000000 fffff880`04a9cb00 fffff880`04aad018 : 0x1
fffff880`03ef67f0 fffffa80`07e22bf8     : 00000000`00000000 fffff880`04a9cb00 fffff880`04aad018 fffffa80`07e04b20 : 0x7ff
fffff880`03ef67f8 00000000`00000000     : fffff880`04a9cb00 fffff880`04aad018 fffffa80`07e04b20 fffff880`04a8ae19 : 0xfffffa80`07e22bf8


SYMBOL_NAME:  iusb3xhc+4f850

MODULE_NAME: iusb3xhc

IMAGE_NAME:  iusb3xhc.sys

STACK_COMMAND:  .cxr 0xfffff88003ef5df0 ; kb

FAILURE_BUCKET_ID:  0x7E_iusb3xhc+4f850

OS_VERSION:  7.1.7601.23403

BUILDLAB_STR:  win7sp1_ldr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 7

FAILURE_ID_HASH:  {b7cde346-ebd9-272e-95fc-bfa95a7acb11}

Followup:     MachineOwner
---------

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8800476a850, The address that the exception occurred at
Arg3: fffff88008e2c598, Exception Record Address
Arg4: fffff88008e2bdf0, Context Record Address

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1483

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 8068

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 73

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: win7sp1_ldr

    Key  : WER.OS.Timestamp
    Value: 2016-03-25T06:00:00Z

    Key  : WER.OS.Version
    Value: 7.1.7601.23403


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff8800476a850

BUGCHECK_P3: fffff88008e2c598

BUGCHECK_P4: fffff88008e2bdf0

EXCEPTION_RECORD:  fffff88008e2c598 -- (.exr 0xfffff88008e2c598)
ExceptionAddress: fffff8800476a850 (iusb3xhc+0x000000000004f850)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000101700162
Attempt to read from address 0000000101700162

CONTEXT:  fffff88008e2bdf0 -- (.cxr 0xfffff88008e2bdf0)
rax=fffff8800479b018 rbx=0000000101700112 rcx=fffff8800479b1e0
rdx=0000000101700112 rsi=fffffa8007bd01b0 rdi=0000000101700112
rip=fffff8800476a850 rsp=fffff88008e2c7d0 rbp=fffffa800c5ba7c0
r8=fffffa800ad4bb20  r9=0000000000000000 r10=fffffa800c5ba7c0
r11=fffff88008e2c928 r12=0000000000000001 r13=fffff8800479b018
r14=0000000000000001 r15=0000000101700112
iopl=0         nv up ei ng nz ac pe cy
cs=0010  ss=0000  ds=002b  es=002b  fs=0053  gs=002b             efl=00010293
iusb3xhc+0x4f850:
fffff880`0476a850 488b4350        mov     rax,qword ptr [rbx+50h] ds:002b:00000001`01700162=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: fffff800030000e8: Unable to get Flags value from nt!KdVersionBlock
fffff800030000e8: Unable to get Flags value from nt!KdVersionBlock
fffff800030000e8: Unable to get Flags value from nt!KdVersionBlock
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff800030bf2e8
GetUlongPtrFromAddress: unable to read from fffff800030bf498
0000000101700162

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000101700162

EXCEPTION_STR:  0xc0000005

STACK_TEXT:
fffff880`08e2c7d0 fffffa80`07d064e0     : 00000000`00000060 00000000`00000001 00000000`000007ff fffffa80`0c5ba818 : iusb3xhc+0x4f850
fffff880`08e2c7d8 00000000`00000060     : 00000000`00000001 00000000`000007ff fffffa80`0c5ba818 00000000`00000000 : 0xfffffa80`07d064e0
fffff880`08e2c7e0 00000000`00000001     : 00000000`000007ff fffffa80`0c5ba818 00000000`00000000 fffff880`0478ab00 : 0x60
fffff880`08e2c7e8 00000000`000007ff     : fffffa80`0c5ba818 00000000`00000000 fffff880`0478ab00 fffff880`0479b018 : 0x1
fffff880`08e2c7f0 fffffa80`0c5ba818     : 00000000`00000000 fffff880`0478ab00 fffff880`0479b018 fffffa80`0ad4bb20 : 0x7ff
fffff880`08e2c7f8 00000000`00000000     : fffff880`0478ab00 fffff880`0479b018 fffffa80`0ad4bb20 fffff880`04778e19 : 0xfffffa80`0c5ba818


SYMBOL_NAME:  iusb3xhc+4f850

MODULE_NAME: iusb3xhc

IMAGE_NAME:  iusb3xhc.sys

STACK_COMMAND:  .cxr 0xfffff88008e2bdf0 ; kb

FAILURE_BUCKET_ID:  0x7E_iusb3xhc+4f850

OS_VERSION:  7.1.7601.23403

BUILDLAB_STR:  win7sp1_ldr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 7

FAILURE_ID_HASH:  {b7cde346-ebd9-272e-95fc-bfa95a7acb11}

Followup:     MachineOwner
---------

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8800484f850, The address that the exception occurred at
Arg3: fffff880037fc3a8, Exception Record Address
Arg4: fffff880037fbc00, Context Record Address

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1562

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 21283

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 74

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: win7sp1_ldr

    Key  : WER.OS.Timestamp
    Value: 2016-03-25T06:00:00Z

    Key  : WER.OS.Version
    Value: 7.1.7601.23403


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff8800484f850

BUGCHECK_P3: fffff880037fc3a8

BUGCHECK_P4: fffff880037fbc00

EXCEPTION_RECORD:  fffff880037fc3a8 -- (.exr 0xfffff880037fc3a8)
ExceptionAddress: fffff8800484f850 (iusb3xhc+0x000000000004f850)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000101700162
Attempt to read from address 0000000101700162

CONTEXT:  fffff880037fbc00 -- (.cxr 0xfffff880037fbc00)
rax=fffff88004880018 rbx=0000000101700112 rcx=fffff880048801e0
rdx=0000000101700112 rsi=fffffa8007b8d1b0 rdi=0000000101700112
rip=fffff8800484f850 rsp=fffff880037fc5e0 rbp=fffffa800b42d860
r8=fffffa800b18e460  r9=0000000000000000 r10=fffffa800b42d860
r11=fffff880037fc738 r12=0000000000000003 r13=fffff88004880018
r14=0000000000000001 r15=0000000101700112
iopl=0         nv up ei ng nz ac pe cy
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010293
iusb3xhc+0x4f850:
fffff880`0484f850 488b4350        mov     rax,qword ptr [rbx+50h] ds:002b:00000001`01700162=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: fffff800030480e8: Unable to get Flags value from nt!KdVersionBlock
fffff800030480e8: Unable to get Flags value from nt!KdVersionBlock
fffff800030480e8: Unable to get Flags value from nt!KdVersionBlock
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff800031072e8
GetUlongPtrFromAddress: unable to read from fffff80003107498
0000000101700162

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000101700162

EXCEPTION_STR:  0xc0000005

STACK_TEXT:
fffff880`037fc5e0 fffffa80`10e992e0     : 00000000`00000060 00000000`00000001 00000000`000007ff fffffa80`0b42d8b8 : iusb3xhc+0x4f850
fffff880`037fc5e8 00000000`00000060     : 00000000`00000001 00000000`000007ff fffffa80`0b42d8b8 00000000`00000000 : 0xfffffa80`10e992e0
fffff880`037fc5f0 00000000`00000001     : 00000000`000007ff fffffa80`0b42d8b8 00000000`00000000 fffff880`0486fb00 : 0x60
fffff880`037fc5f8 00000000`000007ff     : fffffa80`0b42d8b8 00000000`00000000 fffff880`0486fb00 fffff880`04880018 : 0x1
fffff880`037fc600 fffffa80`0b42d8b8     : 00000000`00000000 fffff880`0486fb00 fffff880`04880018 fffffa80`0b18e460 : 0x7ff
fffff880`037fc608 00000000`00000000     : fffff880`0486fb00 fffff880`04880018 fffffa80`0b18e460 fffff880`0485de19 : 0xfffffa80`0b42d8b8


SYMBOL_NAME:  iusb3xhc+4f850

MODULE_NAME: iusb3xhc

IMAGE_NAME:  iusb3xhc.sys

STACK_COMMAND:  .cxr 0xfffff880037fbc00 ; kb

FAILURE_BUCKET_ID:  0x7E_iusb3xhc+4f850

OS_VERSION:  7.1.7601.23403

BUILDLAB_STR:  win7sp1_ldr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 7

FAILURE_ID_HASH:  {b7cde346-ebd9-272e-95fc-bfa95a7acb11}

Followup:     MachineOwner
---------

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8800434a850, The address that the exception occurred at
Arg3: fffff880037d93a8, Exception Record Address
Arg4: fffff880037d8c00, Context Record Address

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1812

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 20528

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 74

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: win7sp1_ldr

    Key  : WER.OS.Timestamp
    Value: 2016-03-25T06:00:00Z

    Key  : WER.OS.Version
    Value: 7.1.7601.23403


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff8800434a850

BUGCHECK_P3: fffff880037d93a8

BUGCHECK_P4: fffff880037d8c00

EXCEPTION_RECORD:  fffff880037d93a8 -- (.exr 0xfffff880037d93a8)
ExceptionAddress: fffff8800434a850 (iusb3xhc+0x000000000004f850)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000101700162
Attempt to read from address 0000000101700162

CONTEXT:  fffff880037d8c00 -- (.cxr 0xfffff880037d8c00)
rax=fffff8800437b018 rbx=0000000101700112 rcx=fffff8800437b1e0
rdx=0000000101700112 rsi=fffffa8007e0b1b0 rdi=0000000101700112
rip=fffff8800434a850 rsp=fffff880037d95e0 rbp=fffffa800ac44010
r8=fffffa800b45db20  r9=0000000000000000 r10=fffffa800ac44010
r11=fffff880037d9738 r12=0000000000000002 r13=fffff8800437b018
r14=0000000000000001 r15=0000000101700112
iopl=0         nv up ei ng nz ac pe cy
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010293
iusb3xhc+0x4f850:
fffff880`0434a850 488b4350        mov     rax,qword ptr [rbx+50h] ds:002b:00000001`01700162=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: fffff80002ff40e8: Unable to get Flags value from nt!KdVersionBlock
fffff80002ff40e8: Unable to get Flags value from nt!KdVersionBlock
fffff80002ff40e8: Unable to get Flags value from nt!KdVersionBlock
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff800030b32e8
GetUlongPtrFromAddress: unable to read from fffff800030b3498
0000000101700162

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000101700162

EXCEPTION_STR:  0xc0000005

STACK_TEXT:
fffff880`037d95e0 fffffa80`0db4eea0     : 00000000`00000060 00000000`00000001 00000000`000007ff fffffa80`0ac44068 : iusb3xhc+0x4f850
fffff880`037d95e8 00000000`00000060     : 00000000`00000001 00000000`000007ff fffffa80`0ac44068 00000000`00000000 : 0xfffffa80`0db4eea0
fffff880`037d95f0 00000000`00000001     : 00000000`000007ff fffffa80`0ac44068 00000000`00000000 fffff880`0436ab00 : 0x60
fffff880`037d95f8 00000000`000007ff     : fffffa80`0ac44068 00000000`00000000 fffff880`0436ab00 fffff880`0437b018 : 0x1
fffff880`037d9600 fffffa80`0ac44068     : 00000000`00000000 fffff880`0436ab00 fffff880`0437b018 fffffa80`0b45db20 : 0x7ff
fffff880`037d9608 00000000`00000000     : fffff880`0436ab00 fffff880`0437b018 fffffa80`0b45db20 fffff880`04358e19 : 0xfffffa80`0ac44068


SYMBOL_NAME:  iusb3xhc+4f850

MODULE_NAME: iusb3xhc

IMAGE_NAME:  iusb3xhc.sys

STACK_COMMAND:  .cxr 0xfffff880037d8c00 ; kb

FAILURE_BUCKET_ID:  0x7E_iusb3xhc+4f850

OS_VERSION:  7.1.7601.23403

BUILDLAB_STR:  win7sp1_ldr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 7

FAILURE_ID_HASH:  {b7cde346-ebd9-272e-95fc-bfa95a7acb11}

Followup:     MachineOwner
---------

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff88004574850, The address that the exception occurred at
Arg3: fffff880037ee3a8, Exception Record Address
Arg4: fffff880037edc00, Context Record Address

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1687

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 8388

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 73

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: win7sp1_ldr

    Key  : WER.OS.Timestamp
    Value: 2016-03-25T06:00:00Z

    Key  : WER.OS.Version
    Value: 7.1.7601.23403


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff88004574850

BUGCHECK_P3: fffff880037ee3a8

BUGCHECK_P4: fffff880037edc00

EXCEPTION_RECORD:  fffff880037ee3a8 -- (.exr 0xfffff880037ee3a8)
ExceptionAddress: fffff88004574850 (iusb3xhc+0x000000000004f850)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000101700162
Attempt to read from address 0000000101700162

CONTEXT:  fffff880037edc00 -- (.cxr 0xfffff880037edc00)
rax=fffff880045a5018 rbx=0000000101700112 rcx=fffff880045a51e0
rdx=0000000101700112 rsi=fffffa800af6b810 rdi=0000000101700112
rip=fffff88004574850 rsp=fffff880037ee5e0 rbp=fffffa800b9ce530
r8=fffffa800af8e9f0  r9=0000000000000000 r10=fffffa800b9ce530
r11=fffff880037ee738 r12=0000000000000001 r13=fffff880045a5018
r14=0000000000000001 r15=0000000101700112
iopl=0         nv up ei ng nz ac pe cy
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010293
iusb3xhc+0x4f850:
fffff880`04574850 488b4350        mov     rax,qword ptr [rbx+50h] ds:002b:00000001`01700162=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: fffff800030540e8: Unable to get Flags value from nt!KdVersionBlock
fffff800030540e8: Unable to get Flags value from nt!KdVersionBlock
fffff800030540e8: Unable to get Flags value from nt!KdVersionBlock
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff800031132e8
GetUlongPtrFromAddress: unable to read from fffff80003113498
0000000101700162

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000101700162

EXCEPTION_STR:  0xc0000005

STACK_TEXT:
fffff880`037ee5e0 fffffa80`0b9b5f90     : 00000000`00000060 00000000`00000001 00000000`000007ff fffffa80`0b9ce588 : iusb3xhc+0x4f850
fffff880`037ee5e8 00000000`00000060     : 00000000`00000001 00000000`000007ff fffffa80`0b9ce588 00000000`00000000 : 0xfffffa80`0b9b5f90
fffff880`037ee5f0 00000000`00000001     : 00000000`000007ff fffffa80`0b9ce588 00000000`00000000 fffff880`04594b00 : 0x60
fffff880`037ee5f8 00000000`000007ff     : fffffa80`0b9ce588 00000000`00000000 fffff880`04594b00 fffff880`045a5018 : 0x1
fffff880`037ee600 fffffa80`0b9ce588     : 00000000`00000000 fffff880`04594b00 fffff880`045a5018 fffffa80`0af8e9f0 : 0x7ff
fffff880`037ee608 00000000`00000000     : fffff880`04594b00 fffff880`045a5018 fffffa80`0af8e9f0 fffff880`04582e19 : 0xfffffa80`0b9ce588


SYMBOL_NAME:  iusb3xhc+4f850

MODULE_NAME: iusb3xhc

IMAGE_NAME:  iusb3xhc.sys

STACK_COMMAND:  .cxr 0xfffff880037edc00 ; kb

FAILURE_BUCKET_ID:  0x7E_iusb3xhc+4f850

OS_VERSION:  7.1.7601.23403

BUILDLAB_STR:  win7sp1_ldr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 7

FAILURE_ID_HASH:  {b7cde346-ebd9-272e-95fc-bfa95a7acb11}

Followup:     MachineOwner
---------

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff88004564850, The address that the exception occurred at
Arg3: fffff880039163a8, Exception Record Address
Arg4: fffff88003915c00, Context Record Address

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1514

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 19301

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 74

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: win7sp1_ldr

    Key  : WER.OS.Timestamp
    Value: 2016-03-25T06:00:00Z

    Key  : WER.OS.Version
    Value: 7.1.7601.23403


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff88004564850

BUGCHECK_P3: fffff880039163a8

BUGCHECK_P4: fffff88003915c00

EXCEPTION_RECORD:  fffff880039163a8 -- (.exr 0xfffff880039163a8)
ExceptionAddress: fffff88004564850 (iusb3xhc+0x000000000004f850)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000101700162
Attempt to read from address 0000000101700162

CONTEXT:  fffff88003915c00 -- (.cxr 0xfffff88003915c00)
rax=fffff88004595018 rbx=0000000101700112 rcx=fffff880045951e0
rdx=0000000101700112 rsi=fffffa8007e25810 rdi=0000000101700112
rip=fffff88004564850 rsp=fffff880039165e0 rbp=fffffa800bdfe7b0
r8=fffffa8007e09b20  r9=0000000000000000 r10=fffffa800bdfe7b0
r11=fffff88003916738 r12=0000000000000001 r13=fffff88004595018
r14=0000000000000001 r15=0000000101700112
iopl=0         nv up ei ng nz ac pe cy
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010293
iusb3xhc+0x4f850:
fffff880`04564850 488b4350        mov     rax,qword ptr [rbx+50h] ds:002b:00000001`01700162=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: fffff800030070e8: Unable to get Flags value from nt!KdVersionBlock
fffff800030070e8: Unable to get Flags value from nt!KdVersionBlock
fffff800030070e8: Unable to get Flags value from nt!KdVersionBlock
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff800030c62e8
GetUlongPtrFromAddress: unable to read from fffff800030c6498
0000000101700162

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000101700162

EXCEPTION_STR:  0xc0000005

STACK_TEXT:
fffff880`039165e0 fffffa80`0bd10690     : 00000000`00000060 00000000`00000001 00000000`000007ff fffffa80`0bdfe808 : iusb3xhc+0x4f850
fffff880`039165e8 00000000`00000060     : 00000000`00000001 00000000`000007ff fffffa80`0bdfe808 00000000`00000000 : 0xfffffa80`0bd10690
fffff880`039165f0 00000000`00000001     : 00000000`000007ff fffffa80`0bdfe808 00000000`00000000 fffff880`04584b00 : 0x60
fffff880`039165f8 00000000`000007ff     : fffffa80`0bdfe808 00000000`00000000 fffff880`04584b00 fffff880`04595018 : 0x1
fffff880`03916600 fffffa80`0bdfe808     : 00000000`00000000 fffff880`04584b00 fffff880`04595018 fffffa80`07e09b20 : 0x7ff
fffff880`03916608 00000000`00000000     : fffff880`04584b00 fffff880`04595018 fffffa80`07e09b20 fffff880`04572e19 : 0xfffffa80`0bdfe808


SYMBOL_NAME:  iusb3xhc+4f850

MODULE_NAME: iusb3xhc

IMAGE_NAME:  iusb3xhc.sys

STACK_COMMAND:  .cxr 0xfffff88003915c00 ; kb

FAILURE_BUCKET_ID:  0x7E_iusb3xhc+4f850

OS_VERSION:  7.1.7601.23403

BUILDLAB_STR:  win7sp1_ldr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 7

FAILURE_ID_HASH:  {b7cde346-ebd9-272e-95fc-bfa95a7acb11}

Followup:     MachineOwner
---------

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff88004b06850, The address that the exception occurred at
Arg3: fffff880037e75a8, Exception Record Address
Arg4: fffff880037e6e00, Context Record Address

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1561

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 9212

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 73

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: win7sp1_ldr

    Key  : WER.OS.Timestamp
    Value: 2016-03-25T06:00:00Z

    Key  : WER.OS.Version
    Value: 7.1.7601.23403


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff88004b06850

BUGCHECK_P3: fffff880037e75a8

BUGCHECK_P4: fffff880037e6e00

EXCEPTION_RECORD:  fffff880037e75a8 -- (.exr 0xfffff880037e75a8)
ExceptionAddress: fffff88004b06850 (iusb3xhc+0x000000000004f850)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000101700162
Attempt to read from address 0000000101700162

CONTEXT:  fffff880037e6e00 -- (.cxr 0xfffff880037e6e00)
rax=fffff88004b37018 rbx=0000000101700112 rcx=fffff88004b371e0
rdx=0000000101700112 rsi=fffffa800abc51b0 rdi=0000000101700112
rip=fffff88004b06850 rsp=fffff880037e77e0 rbp=fffffa800829de90
r8=fffffa800aa33b20  r9=0000000000000000 r10=fffffa800829de90
r11=fffff880037e7938 r12=0000000000000002 r13=fffff88004b37018
r14=0000000000000001 r15=0000000101700112
iopl=0         nv up ei ng nz ac pe cy
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010293
iusb3xhc+0x4f850:
fffff880`04b06850 488b4350        mov     rax,qword ptr [rbx+50h] ds:002b:00000001`01700162=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: fffff8000304f0e8: Unable to get Flags value from nt!KdVersionBlock
fffff8000304f0e8: Unable to get Flags value from nt!KdVersionBlock
fffff8000304f0e8: Unable to get Flags value from nt!KdVersionBlock
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff8000310e2e8
GetUlongPtrFromAddress: unable to read from fffff8000310e498
0000000101700162

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000101700162

EXCEPTION_STR:  0xc0000005

STACK_TEXT:
fffff880`037e77e0 fffffa80`0cbd61d0     : 00000000`00000060 00000000`00000001 00000000`000007ff fffffa80`0829dee8 : iusb3xhc+0x4f850
fffff880`037e77e8 00000000`00000060     : 00000000`00000001 00000000`000007ff fffffa80`0829dee8 00000000`00000000 : 0xfffffa80`0cbd61d0
fffff880`037e77f0 00000000`00000001     : 00000000`000007ff fffffa80`0829dee8 00000000`00000000 fffff880`04b26b00 : 0x60
fffff880`037e77f8 00000000`000007ff     : fffffa80`0829dee8 00000000`00000000 fffff880`04b26b00 fffff880`04b37018 : 0x1
fffff880`037e7800 fffffa80`0829dee8     : 00000000`00000000 fffff880`04b26b00 fffff880`04b37018 fffffa80`0aa33b20 : 0x7ff
fffff880`037e7808 00000000`00000000     : fffff880`04b26b00 fffff880`04b37018 fffffa80`0aa33b20 fffff880`04b14e19 : 0xfffffa80`0829dee8


SYMBOL_NAME:  iusb3xhc+4f850

MODULE_NAME: iusb3xhc

IMAGE_NAME:  iusb3xhc.sys

STACK_COMMAND:  .cxr 0xfffff880037e6e00 ; kb

FAILURE_BUCKET_ID:  0x7E_iusb3xhc+4f850

OS_VERSION:  7.1.7601.23403

BUILDLAB_STR:  win7sp1_ldr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 7

FAILURE_ID_HASH:  {b7cde346-ebd9-272e-95fc-bfa95a7acb11}

Followup:     MachineOwner
---------

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff88006691850, The address that the exception occurred at
Arg3: fffff880037ee3a8, Exception Record Address
Arg4: fffff880037edc00, Context Record Address

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1530

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 13744

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 73

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: win7sp1_ldr

    Key  : WER.OS.Timestamp
    Value: 2016-03-25T06:00:00Z

    Key  : WER.OS.Version
    Value: 7.1.7601.23403


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff88006691850

BUGCHECK_P3: fffff880037ee3a8

BUGCHECK_P4: fffff880037edc00

EXCEPTION_RECORD:  fffff880037ee3a8 -- (.exr 0xfffff880037ee3a8)
ExceptionAddress: fffff88006691850 (iusb3xhc+0x000000000004f850)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000101700162
Attempt to read from address 0000000101700162

CONTEXT:  fffff880037edc00 -- (.cxr 0xfffff880037edc00)
rax=fffff880066c2018 rbx=0000000101700112 rcx=fffff880066c21e0
rdx=0000000101700112 rsi=fffffa800b19c610 rdi=0000000101700112
rip=fffff88006691850 rsp=fffff880037ee5e0 rbp=fffffa800bd9ae90
r8=fffffa800a466b20  r9=0000000000000000 r10=fffffa800bd9ae90
r11=fffff880037ee738 r12=0000000000000001 r13=fffff880066c2018
r14=0000000000000001 r15=0000000101700112
iopl=0         nv up ei ng nz ac pe cy
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010293
iusb3xhc+0x4f850:
fffff880`06691850 488b4350        mov     rax,qword ptr [rbx+50h] ds:002b:00000001`01700162=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: fffff8000303f0e8: Unable to get Flags value from nt!KdVersionBlock
fffff8000303f0e8: Unable to get Flags value from nt!KdVersionBlock
fffff8000303f0e8: Unable to get Flags value from nt!KdVersionBlock
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff800030fe2e8
GetUlongPtrFromAddress: unable to read from fffff800030fe498
0000000101700162

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000101700162

EXCEPTION_STR:  0xc0000005

STACK_TEXT:
fffff880`037ee5e0 fffffa80`0bd566c0     : 00000000`00000060 00000000`00000001 00000000`000007ff fffffa80`0bd9aee8 : iusb3xhc+0x4f850
fffff880`037ee5e8 00000000`00000060     : 00000000`00000001 00000000`000007ff fffffa80`0bd9aee8 00000000`00000000 : 0xfffffa80`0bd566c0
fffff880`037ee5f0 00000000`00000001     : 00000000`000007ff fffffa80`0bd9aee8 00000000`00000000 fffff880`066b1b00 : 0x60
fffff880`037ee5f8 00000000`000007ff     : fffffa80`0bd9aee8 00000000`00000000 fffff880`066b1b00 fffff880`066c2018 : 0x1
fffff880`037ee600 fffffa80`0bd9aee8     : 00000000`00000000 fffff880`066b1b00 fffff880`066c2018 fffffa80`0a466b20 : 0x7ff
fffff880`037ee608 00000000`00000000     : fffff880`066b1b00 fffff880`066c2018 fffffa80`0a466b20 fffff880`0669fe19 : 0xfffffa80`0bd9aee8


SYMBOL_NAME:  iusb3xhc+4f850

MODULE_NAME: iusb3xhc

IMAGE_NAME:  iusb3xhc.sys

STACK_COMMAND:  .cxr 0xfffff880037edc00 ; kb

FAILURE_BUCKET_ID:  0x7E_iusb3xhc+4f850

OS_VERSION:  7.1.7601.23403

BUILDLAB_STR:  win7sp1_ldr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 7

FAILURE_ID_HASH:  {b7cde346-ebd9-272e-95fc-bfa95a7acb11}

Followup:     MachineOwner
---------

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff88005316850, The address that the exception occurred at
Arg3: fffff880037cb3a8, Exception Record Address
Arg4: fffff880037cac00, Context Record Address

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1515

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 9877

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 73

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: win7sp1_ldr

    Key  : WER.OS.Timestamp
    Value: 2016-03-25T06:00:00Z

    Key  : WER.OS.Version
    Value: 7.1.7601.23403


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff88005316850

BUGCHECK_P3: fffff880037cb3a8

BUGCHECK_P4: fffff880037cac00

EXCEPTION_RECORD:  fffff880037cb3a8 -- (.exr 0xfffff880037cb3a8)
ExceptionAddress: fffff88005316850 (iusb3xhc+0x000000000004f850)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000101700162
Attempt to read from address 0000000101700162

CONTEXT:  fffff880037cac00 -- (.cxr 0xfffff880037cac00)
rax=fffff88005347018 rbx=0000000101700112 rcx=fffff880053471e0
rdx=0000000101700112 rsi=fffffa8007fce1b0 rdi=0000000101700112
rip=fffff88005316850 rsp=fffff880037cb5e0 rbp=fffffa800bf42be0
r8=fffffa800b142840  r9=0000000000000000 r10=fffffa800bf42be0
r11=fffff880037cb738 r12=0000000000000001 r13=fffff88005347018
r14=0000000000000001 r15=0000000101700112
iopl=0         nv up ei ng nz ac pe cy
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010293
iusb3xhc+0x4f850:
fffff880`05316850 488b4350        mov     rax,qword ptr [rbx+50h] ds:002b:00000001`01700162=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: fffff80002ff30e8: Unable to get Flags value from nt!KdVersionBlock
fffff80002ff30e8: Unable to get Flags value from nt!KdVersionBlock
fffff80002ff30e8: Unable to get Flags value from nt!KdVersionBlock
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff800030b22e8
GetUlongPtrFromAddress: unable to read from fffff800030b2498
0000000101700162

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000101700162

EXCEPTION_STR:  0xc0000005

STACK_TEXT:
fffff880`037cb5e0 fffffa80`0bf11870     : 00000000`00000060 00000000`00000001 00000000`000007ff fffffa80`0bf42c38 : iusb3xhc+0x4f850
fffff880`037cb5e8 00000000`00000060     : 00000000`00000001 00000000`000007ff fffffa80`0bf42c38 00000000`00000000 : 0xfffffa80`0bf11870
fffff880`037cb5f0 00000000`00000001     : 00000000`000007ff fffffa80`0bf42c38 00000000`00000000 fffff880`05336b00 : 0x60
fffff880`037cb5f8 00000000`000007ff     : fffffa80`0bf42c38 00000000`00000000 fffff880`05336b00 fffff880`05347018 : 0x1
fffff880`037cb600 fffffa80`0bf42c38     : 00000000`00000000 fffff880`05336b00 fffff880`05347018 fffffa80`0b142840 : 0x7ff
fffff880`037cb608 00000000`00000000     : fffff880`05336b00 fffff880`05347018 fffffa80`0b142840 fffff880`05324e19 : 0xfffffa80`0bf42c38


SYMBOL_NAME:  iusb3xhc+4f850

MODULE_NAME: iusb3xhc

IMAGE_NAME:  iusb3xhc.sys

STACK_COMMAND:  .cxr 0xfffff880037cac00 ; kb

FAILURE_BUCKET_ID:  0x7E_iusb3xhc+4f850

OS_VERSION:  7.1.7601.23403

BUILDLAB_STR:  win7sp1_ldr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 7

FAILURE_ID_HASH:  {b7cde346-ebd9-272e-95fc-bfa95a7acb11}

Followup:     MachineOwner
---------

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff88004a8a850, The address that the exception occurred at
Arg3: fffff880037e03a8, Exception Record Address
Arg4: fffff880037dfc00, Context Record Address

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1577

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 8166

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 72

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: win7sp1_ldr

    Key  : WER.OS.Timestamp
    Value: 2016-03-25T06:00:00Z

    Key  : WER.OS.Version
    Value: 7.1.7601.23403


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff88004a8a850

BUGCHECK_P3: fffff880037e03a8

BUGCHECK_P4: fffff880037dfc00

EXCEPTION_RECORD:  fffff880037e03a8 -- (.exr 0xfffff880037e03a8)
ExceptionAddress: fffff88004a8a850 (iusb3xhc+0x000000000004f850)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000101700162
Attempt to read from address 0000000101700162

CONTEXT:  fffff880037dfc00 -- (.cxr 0xfffff880037dfc00)
rax=fffff88004abb018 rbx=0000000101700112 rcx=fffff88004abb1e0
rdx=0000000101700112 rsi=fffffa8007b881b0 rdi=0000000101700112
rip=fffff88004a8a850 rsp=fffff880037e05e0 rbp=fffffa8007bfbda0
r8=fffffa800b08bb20  r9=0000000000000000 r10=fffffa8007bfbda0
r11=fffff880037e0738 r12=0000000000000001 r13=fffff88004abb018
r14=0000000000000001 r15=0000000101700112
iopl=0         nv up ei ng nz ac pe cy
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010293
iusb3xhc+0x4f850:
fffff880`04a8a850 488b4350        mov     rax,qword ptr [rbx+50h] ds:002b:00000001`01700162=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: fffff80002ffa0e8: Unable to get Flags value from nt!KdVersionBlock
fffff80002ffa0e8: Unable to get Flags value from nt!KdVersionBlock
fffff80002ffa0e8: Unable to get Flags value from nt!KdVersionBlock
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff800030b92e8
GetUlongPtrFromAddress: unable to read from fffff800030b9498
0000000101700162

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000101700162

EXCEPTION_STR:  0xc0000005

STACK_TEXT:
fffff880`037e05e0 fffffa80`0be28510     : 00000000`00000060 00000000`00000001 00000000`000007ff fffffa80`07bfbdf8 : iusb3xhc+0x4f850
fffff880`037e05e8 00000000`00000060     : 00000000`00000001 00000000`000007ff fffffa80`07bfbdf8 00000000`00000000 : 0xfffffa80`0be28510
fffff880`037e05f0 00000000`00000001     : 00000000`000007ff fffffa80`07bfbdf8 00000000`00000000 fffff880`04aaab00 : 0x60
fffff880`037e05f8 00000000`000007ff     : fffffa80`07bfbdf8 00000000`00000000 fffff880`04aaab00 fffff880`04abb018 : 0x1
fffff880`037e0600 fffffa80`07bfbdf8     : 00000000`00000000 fffff880`04aaab00 fffff880`04abb018 fffffa80`0b08bb20 : 0x7ff
fffff880`037e0608 00000000`00000000     : fffff880`04aaab00 fffff880`04abb018 fffffa80`0b08bb20 fffff880`04a98e19 : 0xfffffa80`07bfbdf8


SYMBOL_NAME:  iusb3xhc+4f850

MODULE_NAME: iusb3xhc

IMAGE_NAME:  iusb3xhc.sys

STACK_COMMAND:  .cxr 0xfffff880037dfc00 ; kb

FAILURE_BUCKET_ID:  0x7E_iusb3xhc+4f850

OS_VERSION:  7.1.7601.23403

BUILDLAB_STR:  win7sp1_ldr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 7

FAILURE_ID_HASH:  {b7cde346-ebd9-272e-95fc-bfa95a7acb11}

Followup:     MachineOwner
---------

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff880032a2850, The address that the exception occurred at
Arg3: fffff8800390f3a8, Exception Record Address
Arg4: fffff8800390ec00, Context Record Address

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1827

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 19676

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 74

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: win7sp1_ldr

    Key  : WER.OS.Timestamp
    Value: 2016-03-25T06:00:00Z

    Key  : WER.OS.Version
    Value: 7.1.7601.23403


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff880032a2850

BUGCHECK_P3: fffff8800390f3a8

BUGCHECK_P4: fffff8800390ec00

EXCEPTION_RECORD:  fffff8800390f3a8 -- (.exr 0xfffff8800390f3a8)
ExceptionAddress: fffff880032a2850 (iusb3xhc+0x000000000004f850)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000101700162
Attempt to read from address 0000000101700162

CONTEXT:  fffff8800390ec00 -- (.cxr 0xfffff8800390ec00)
rax=fffff880032d3018 rbx=0000000101700112 rcx=fffff880032d31e0
rdx=0000000101700112 rsi=fffffa8007bc4810 rdi=0000000101700112
rip=fffff880032a2850 rsp=fffff8800390f5e0 rbp=fffffa800b3c77b0
r8=fffffa800abecb20  r9=0000000000000000 r10=fffffa800b3c77b0
r11=fffff8800390f738 r12=0000000000000001 r13=fffff880032d3018
r14=0000000000000001 r15=0000000101700112
iopl=0         nv up ei ng nz ac pe cy
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010293
iusb3xhc+0x4f850:
fffff880`032a2850 488b4350        mov     rax,qword ptr [rbx+50h] ds:002b:00000001`01700162=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: fffff8000303f0e8: Unable to get Flags value from nt!KdVersionBlock
fffff8000303f0e8: Unable to get Flags value from nt!KdVersionBlock
fffff8000303f0e8: Unable to get Flags value from nt!KdVersionBlock
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff800030fe2e8
GetUlongPtrFromAddress: unable to read from fffff800030fe498
0000000101700162

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000101700162

EXCEPTION_STR:  0xc0000005

STACK_TEXT:
fffff880`0390f5e0 fffffa80`0b384000     : 00000000`00000060 00000000`00000001 00000000`000007ff fffffa80`0b3c7808 : iusb3xhc+0x4f850
fffff880`0390f5e8 00000000`00000060     : 00000000`00000001 00000000`000007ff fffffa80`0b3c7808 00000000`00000000 : 0xfffffa80`0b384000
fffff880`0390f5f0 00000000`00000001     : 00000000`000007ff fffffa80`0b3c7808 00000000`00000000 fffff880`032c2b00 : 0x60
fffff880`0390f5f8 00000000`000007ff     : fffffa80`0b3c7808 00000000`00000000 fffff880`032c2b00 fffff880`032d3018 : 0x1
fffff880`0390f600 fffffa80`0b3c7808     : 00000000`00000000 fffff880`032c2b00 fffff880`032d3018 fffffa80`0abecb20 : 0x7ff
fffff880`0390f608 00000000`00000000     : fffff880`032c2b00 fffff880`032d3018 fffffa80`0abecb20 fffff880`032b0e19 : 0xfffffa80`0b3c7808


SYMBOL_NAME:  iusb3xhc+4f850

MODULE_NAME: iusb3xhc

IMAGE_NAME:  iusb3xhc.sys

STACK_COMMAND:  .cxr 0xfffff8800390ec00 ; kb

FAILURE_BUCKET_ID:  0x7E_iusb3xhc+4f850

OS_VERSION:  7.1.7601.23403

BUILDLAB_STR:  win7sp1_ldr

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 7

FAILURE_ID_HASH:  {b7cde346-ebd9-272e-95fc-bfa95a7acb11}

Followup:     MachineOwner
---------
 
Son düzenleme:
Çözüm
Öncelikle teşekkürler dediklerini bizzat uygulayacağım. Bilgisayar kısmen babam tarafından kullanıldığı için iş uygulaması gereği en hafif sistem olan Windows 7 tercih ediyor. Şahsen Windows 10 tercihim fakat malum...
Anlamadığım nokta ise bu USB 3.0 sürücüsünü önemli yapan şey nedir? Belirli bir zaman önce de tanımlanmadığı için bilgisayar kafayı yemişti USB 3.0 yüzünden.
Şimdi bu DDU silme işlemi falan sonrası herhangi bir tıkanıklık yaşanmaz inşallah Windows silme suçum sonrası bu ☠️☠️
 
Bilgisayar kısmen babam tarafından kullanıldığı için iş uygulaması gereği en hafif sistem olan Windows 7 tercih ediyor. Şahsen Windows 10 tercihim fakat malum...
Babanızı ikna edebilirseniz ne ala. En azından 8.1'e geçin. Edemezseniz canınız sağ olsun.

Anlamadığım nokta ise bu USB 3.0 sürücüsünü önemli yapan şey nedir?
Bilgisayarınızda USB 3.0 girişlerinin olması en temel sebep. Windows 7 yerleşik olarak USB 3.0 desteklemeyince böyle sapıtıyor veya takılan cihazları tanımıyor.



Konuyu çözüldü olarak işaretlemişsiniz. Sorununuz çözüldü mü?
 

Yeni konular

Geri
Yukarı