BSOD UNEXPECTED_KERNEL_MODE_TRAP Memory Manager detected instances of page corruption Windows 10 Error

anodam.gogle

Reputable
Aug 18, 2018
3
0
4,510
Hello,

First of all, please read entire post.

I built my own PC 10 months ago and from beginning I had problems with memory. My PC didn't displayed anything on screen until I connected my USB Keyboard (?). One of my two memory sticks wasn't recognized (they are in kit) in BIOS and Windows. It somehow detected correctly after a few restarts.

It ran fine, but I discovered that my boot up times were extremely long for an SSD (around 30 seconds in Last BIOS Time in Task Manager), so I updated the BIOS. Boot times have reduced significantly (currently 17 to 20 seconds in Last BIOS Time). I started to having a BSOD errors after some time after updating BIOS. Now I can't go back to my original version, because recently updates of my MOBO blocked it.

I though it may be faulty driver, so I formatted my drive and installed freshly downloaded Windows 10. After some time I started to having the same BSOD errors as my previous Windows installation even when I had installed only GPU driver. I tried many things from internet and reinstalled my Windows over 5 times but it keep coming back. I don't remember if there were the same error codes as now. I'm getting randomly BSODed 2 times a day and even more. Strange thing is that, it seems like I don't get BSOD when my PC is idling with some light programs running in background. It can even last a night. But when I'm doing some intensive things like Steam Backup, watching YouTube it can BSOD me even several times in a row (it rarely blues screens when gaming).

After some time I have done overclocking on CPU and memory and it started getting me BSODed so I cleared my CMOS, but I don't think that's related, because once I got blue screened after installing fresh Windows without OC. Now I can't go back to the place before overclocking, because I'm getting error that says it failed when trying to go back to recovery point.

My temperatures are fine.
Unfortunately, I can't get another memory stick to test if this solves problem.
Recently I have found a screw laying around on GPU or Motherboard. It probably was a culprit that I felt electricity through my case. (maybe it shorted something?)
Windows Explorer takes up to 13% CPU usage when aggressively moving mouse on Desktop.
Sometimes my audio freezes for half a second and it sounds similar to freeze during BSOD.
When BSOD occur, it nearly every time freezes at 100% and I must do manual reboot. Mini dump is generating anyway.

Things that I have tried:

*running memtest86 through night (3 and half passes) twice without errors
*running Windows Diagnostic Memory tool
*updating all drivers and Windows
*updating BIOS to the newest version (7A37v1G)
*reinstalling Windows a couple of times
*swapping memory sticks, one in each slot
*running driver verifer (I couldn't even boot to Windows, I used recovery point to being able to boot again)
*enabling Small memory dump (256 KB)
*disabling fast boot
*disabling Link State Power Management
*clearing CMOS
*holding power button for about 20 seconds with PSU turned off to drain power
*installing the newest Windows 10 with all updates

Things that I haven't tried:

*using HDD with Windows 10 or other Windows and seeing if I get blue screen
*using another memory sticks (unable)
*running memtest86 on a single memory stick

My PC specifications:

CPU: AMD Ryzen 3 1200
Motherboard: MSI B350M MORTAR
Memory: Crucial Ballistix Sport LT, 2x8GB, 2400MHz, CL16 RED
Storage: SSD Western Digital Green 240GB SATA3
HDD 1TB SEAGATE Barracuda 3,5 7200rpm 64MB (old version)
Video Card: Gainward GeForce GTX 1060 6GB GDDR5
Case: MODECOM OBERON 2F
Power Supply: Thermaltake TR2 450W Japan Cap (80 Plus Bronze)

Note that my Memory isn't listed on compatibility list of my Motherboard. Is it possible to RMA memory sticks and get back my money?

Mini Dumps:
FIRST:

Crash Dump Analysis provided by OSR Open Systems Resources, Inc. (http://www.osr.com)
Online Crash Dump Analysis Service
See http://www.osronline.com for more information
Windows 8 Kernel Version 17134 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Machine Name:
Kernel base = 0xfffff803`e9615000 PsLoadedModuleList = 0xfffff803`e99c3170
Debug session time: Wed Aug 22 04:23:02.640 2018 (UTC - 4:00)
System Uptime: 0 days 0:11:17.637
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

UNEXPECTED_KERNEL_MODE_TRAP_M (1000007f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault). The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
use .trap on that value
Else
.trap on the appropriate frame will show where the trap was taken
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: fffff803ebc6ce70
Arg3: fffff803ebc56fb0
Arg4: fffff803e97c0941

Debugging Details:
------------------

TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2

BUGCHECK_STR: 0x7f_8

DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT

PROCESS_NAME: System

CURRENT_IRQL: 2

BAD_PAGES_DETECTED: 79d9

LAST_CONTROL_TRANSFER: from fffff803e96cfc1a to fffff803e97c0941

STACK_TEXT:
fffff803`ebc56fb0 fffff803`e96cfc1a : ffff9288`44cda020 fffff80b`ca02d878 00000000`00000000 fffff80b`ca020a2e : nt!KiIsrLinkage+0x10
fffff803`ebc57140 fffff80b`ca01516f : fffff803`ebc571e0 00000000`00000000 00000000`00000028 fffff80b`cc01f140 : nt!KeAcquireSpinLockRaiseToDpc+0x1a
fffff803`ebc57170 fffff80b`ca02e1d4 : 00000000`00000000 ffff9288`44cda020 00040022`00080004 00000000`00000000 : Wdf01000!FxNonPagedObject::Lock+0x1f
fffff803`ebc571a0 fffff80b`ca04a26b : ffff9288`41aa3df0 ffff9288`400ae4b0 00000000`00000000 fffff80b`cc01ef7c : Wdf01000!FxIoQueue::RequestCancelable+0x54
fffff803`ebc571e0 fffff80b`cc01da64 : ffff9288`44cda020 ffff9288`41aa3df0 00000000`00000000 ffff9288`41aa3df0 : Wdf01000!imp_WdfRequestMarkCancelableEx+0x6b
fffff803`ebc57230 fffff80b`cc01c688 : 00006d77`bb325fd8 ffff9288`41aa3df0 00000000`00000000 00000000`00000000 : USBXHCI!Bulk_RetrieveNextStage+0x2d8
fffff803`ebc572b0 fffff80b`cc01c5c0 : ffff9288`41aa3df0 00006d77`be55c500 00000000`00000000 00000000`00000000 : USBXHCI!Bulk_MappingLoop+0x80
fffff803`ebc57300 fffff80b`cc01f941 : ffff9288`41aa3df0 ffff9288`41aa3d00 00006d77`be55c500 00000000`00000000 : USBXHCI!Bulk_MapTransfers+0x78
fffff803`ebc57350 fffff80b`ca0a6ce1 : fffff803`ebc573e0 ffff9288`41aa3df0 00006d77`be55c5e8 00000000`00000000 : USBXHCI!Bulk_WdfEvtIoQueueReadyNotification+0xa1
fffff803`ebc57380 fffff80b`ca0a713a : 00000000`00000000 ffff9288`41aa3a10 fffff803`ebc574f8 00000000`00000000 : Wdf01000!FxIoQueueIoResume::Invoke+0x3d
fffff803`ebc573b0 fffff80b`ca050a0f : ffff9288`41aa3a10 fffff803`ebc57489 ffff9288`41aa3ad0 ffff9288`44cda020 : Wdf01000!FxIoQueue::processReadyNotify+0x7e
fffff803`ebc57410 fffff80b`ca02095e : ffff9288`41aa3a10 00000000`00000002 00000000`00000000 ffff9288`41aa3a10 : Wdf01000!FxIoQueue::DispatchEvents+0x3543f
fffff803`ebc574f0 fffff80b`cc073ee4 : ffff9288`44c4bc68 ffff9288`44cda020 00000000`00000000 ffff9288`41945410 : Wdf01000!imp_WdfDeviceWdmDispatchIrpToIoQueue+0x62e
fffff803`ebc575d0 fffff80b`cc073398 : 00000000`00000000 00000000`00000009 ffff9288`44c4bc68 00000000`00000000 : ucx01000!UrbHandler_USBPORTStyle_Legacy_BulkOrInterruptTransfer+0x1e4
fffff803`ebc57680 fffff80b`cc065ac4 : 00006d77`c0160728 ffff9288`44943ab0 fffff803`ebc57740 00006d77`c0160728 : ucx01000!Urb_USBPORTStyle_ProcessURB+0x34c
fffff803`ebc576e0 fffff80b`ca01792d : ffff9288`3fe9f8d0 fffff80b`cc01c17c 00000000`0000000f ffff9288`44943ab0 : ucx01000!RootHub_Pdo_EvtInternalDeviceControlIrpPreprocessCallback+0x504
fffff803`ebc57770 fffff803`e962e199 : ffff9288`40cd3e40 00000000`00000000 00000000`00000000 ffff9288`41aa3e50 : Wdf01000!FxDevice::DispatchWithLock+0x5fd
fffff803`ebc57860 fffff80b`ca1e12b7 : ffff9288`44943ab0 fffff80b`ca0a5d73 fffff803`ebc57960 00000000`00000000 : nt!IofCallDriver+0x59
fffff803`ebc578a0 fffff80b`ca1e10b9 : ffff9288`3edd0010 00000000`00000007 ffff9288`44943f70 00000000`00000000 : ACPI!ACPIIrpDispatchDeviceControl+0x97
fffff803`ebc578e0 fffff803`e962e199 : 00000000`00000007 00000000`00000000 fffff803`ebc57a09 00000000`00000000 : ACPI!ACPIDispatchIrp+0xa9
fffff803`ebc57960 fffff80b`ce995aaa : fffff80b`ca08e701 fffff803`ebc57b01 ffff9288`41a6d701 fffff80b`ca08e720 : nt!IofCallDriver+0x59
fffff803`ebc579a0 fffff80b`ca01792d : ffff9288`41a6d720 00000000`00000000 ffff9288`41a6d020 00000000`00000002 : UsbHub3!HUBPDO_EvtDeviceWdmIrpPreprocess+0x102a
fffff803`ebc57a70 fffff803`e962e199 : ffff9288`41a663e0 00000000`00000000 ffff9288`41aa3a10 00000000`00000000 : Wdf01000!FxDevice::DispatchWithLock+0x5fd
fffff803`ebc57b60 fffff80b`ca1e12b7 : ffff9288`44943ab0 fffff803`e98ff306 00000000`00000000 ffff9288`41aa3a10 : nt!IofCallDriver+0x59
fffff803`ebc57ba0 fffff80b`ca1e10b9 : ffff9288`40f505e0 00000000`00000007 ffff9288`44943fb8 ffff9288`40120710 : ACPI!ACPIIrpDispatchDeviceControl+0x97
fffff803`ebc57be0 fffff803`e962e199 : 00000000`00000007 ffff9288`44943ab0 fffff803`ebc57d59 ffff9288`41a931b8 : ACPI!ACPIDispatchIrp+0xa9
fffff803`ebc57c60 fffff80b`ceaa1a5b : ffff9288`44c4bc68 ffff9288`44943ab0 00000000`00000001 00000000`00000000 : nt!IofCallDriver+0x59
fffff803`ebc57ca0 fffff80b`ceaa17a6 : fffff803`e85e7b40 ffff9288`44943ab0 fffff80b`ceab44a8 00000000`00000000 : usbccgp!DispatchPdoUrb+0x24b
fffff803`ebc57dc0 fffff80b`ceaa165a : ffff9288`44943ab0 ffff9288`41a931b0 ffff9288`41a931b8 00000000`0000000f : usbccgp!DispatchPdoInternalDeviceControl+0x86
fffff803`ebc57e20 fffff803`e962e199 : ffff9288`41a93060 fffff80b`ca014f01 00000000`00000000 00000000`00000000 : usbccgp!USBC_Dispatch+0x64a
fffff803`ebc57ee0 fffff80b`cfdf03ef : 00000000`00000005 fffff803`ebc57fd9 ffff9288`41a8a190 ffff9288`41a8a190 : nt!IofCallDriver+0x59
fffff803`ebc57f20 00000000`00000005 : fffff803`ebc57fd9 ffff9288`41a8a190 ffff9288`41a8a190 ffff9288`00000020 : ew_usbenumfilter+0x3ef
fffff803`ebc57f28 fffff803`ebc57fd9 : ffff9288`41a8a190 ffff9288`41a8a190 ffff9288`00000020 fffff80b`ca076435 : 0x5
fffff803`ebc57f30 ffff9288`41a8a190 : ffff9288`41a8a190 ffff9288`00000020 fffff80b`ca076435 ffff9288`41abfc20 : 0xfffff803`ebc57fd9
fffff803`ebc57f38 ffff9288`41a8a190 : ffff9288`00000020 fffff80b`ca076435 ffff9288`41abfc20 fffff803`e962e199 : 0xffff9288`41a8a190
fffff803`ebc57f40 ffff9288`00000020 : fffff80b`ca076435 ffff9288`41abfc20 fffff803`e962e199 00000000`00000005 : 0xffff9288`41a8a190
fffff803`ebc57f48 fffff80b`ca076435 : ffff9288`41abfc20 fffff803`e962e199 00000000`00000005 fffff803`ebc57fd9 : 0xffff9288`00000020
fffff803`ebc57f50 00000000`00000002 : ffff9288`41abfc20 00000000`00000001 00000000`00000001 fffff80b`ca014866 : Wdf01000!FxRequestBuffer::GetBufferLength+0xb1
fffff803`ebc57f80 ffff9288`41abfc20 : 00000000`00000001 00000000`00000001 fffff80b`ca014866 ffff9288`40d36000 : 0x2
fffff803`ebc57f88 00000000`00000001 : 00000000`00000001 fffff80b`ca014866 ffff9288`40d36000 00000000`00000001 : 0xffff9288`41abfc20
fffff803`ebc57f90 00000000`00000001 : fffff80b`ca014866 ffff9288`40d36000 00000000`00000001 fffff803`ebc58060 : 0x1
fffff803`ebc57f98 fffff80b`ca014866 : ffff9288`40d36000 00000000`00000001 fffff803`ebc58060 fffff803`ebc57fd9 : 0x1
fffff803`ebc57fa0 fffff80b`ce935430 : ffff9288`400ff320 ffff9288`40d36020 ffff9288`41abfc20 00000000`00000000 : Wdf01000!imp_WdfRequestSend+0x156
fffff803`ebc58040 ffff9288`400ff320 : ffff9288`40d36020 ffff9288`41abfc20 00000000`00000000 00000001`00000010 : ew_jubusenum+0x5430
fffff803`ebc58048 ffff9288`40d36020 : ffff9288`41abfc20 00000000`00000000 00000001`00000010 00000000`00000000 : 0xffff9288`400ff320
fffff803`ebc58050 ffff9288`41abfc20 : 00000000`00000000 00000001`00000010 00000000`00000000 00006d77`bf36a608 : 0xffff9288`40d36020
fffff803`ebc58058 00000000`00000000 : 00000001`00000010 00000000`00000000 00006d77`bf36a608 00006d77`be5403d8 : 0xffff9288`41abfc20


STACK_COMMAND: kb

SYMBOL_NAME: PAGE_NOT_ZERO

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: Unknown_Module

IMAGE_NAME: Unknown_Image

DEBUG_FLR_IMAGE_TIMESTAMP: 0

BUCKET_ID: PAGE_NOT_ZERO

Followup: MachineOwner
---------

*** Memory manager detected 31193 instance(s) of page corruption, target is likely to have memory corruption.

SECOND:

Crash Dump Analysis provided by OSR Open Systems Resources, Inc. (http://www.osr.com)
Online Crash Dump Analysis Service
See http://www.osronline.com for more information
Windows 8 Kernel Version 17134 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Machine Name:
Kernel base = 0xfffff800`f7613000 PsLoadedModuleList = 0xfffff800`f79c1170
Debug session time: Wed Aug 22 03:41:54.686 2018 (UTC - 4:00)
System Uptime: 0 days 15:04:18.684
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

UNEXPECTED_KERNEL_MODE_TRAP_M (1000007f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault). The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
use .trap on that value
Else
.trap on the appropriate frame will show where the trap was taken
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: ffffb90015bc9f70
Arg3: ffffeb80fd023fe0
Arg4: fffff800f7f6a4e0

Debugging Details:
------------------

TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2

BUGCHECK_STR: 0x7f_8

DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT

PROCESS_NAME: System

CURRENT_IRQL: 5

BAD_PAGES_DETECTED: 8c7f

LAST_CONTROL_TRANSFER: from fffff800f77bd5b4 to fffff800f7f6a4e0

STACK_TEXT:
ffffeb80`fd023fe0 fffff800`f77bd5b4 : 00010038`00010008 00000400`00000178 00000000`00000000 00000008`00000005 : hal!HalPerformEndOfInterrupt+0x10
ffffeb80`fd024010 fffff800`f771e80b : 00000000`00000000 ffffdb89`683e4350 00040022`00080004 00000000`00000000 : nt!KiInterruptDispatch+0x44
ffffeb80`fd0241a0 fffff80c`9a61f8da : 00000000`00000000 ffffdb89`6124b8a8 00000000`00000000 00000000`00220003 : nt!KeReleaseSpinLock+0x3b
ffffeb80`fd0241d0 fffff80c`9a62ef7c : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : USBXHCI!TR_AcquireDoubleBuffer+0x76
ffffeb80`fd024200 fffff80c`9a62d909 : ffffdb89`6813fe60 ffffdb89`6813fe60 ffffdb89`683e4350 ffffdb89`6813fe60 : USBXHCI!Bulk_TransferData_DetermineTransferMechanism+0x6c
ffffeb80`fd024230 fffff80c`9a62c688 : 00002476`97c1bca8 ffffdb89`6813fe60 00000000`00000000 00000000`00000000 : USBXHCI!Bulk_RetrieveNextStage+0x17d
ffffeb80`fd0242b0 fffff80c`9a62c5c0 : ffffdb89`6813fe60 00002476`97ec0500 00000000`00000000 00000000`00000000 : USBXHCI!Bulk_MappingLoop+0x80
ffffeb80`fd024300 fffff80c`9a62f941 : ffffdb89`6813fe60 ffffdb89`6813fe00 00002476`97ec0500 00000000`00000000 : USBXHCI!Bulk_MapTransfers+0x78
ffffeb80`fd024350 fffff80c`983b6ce1 : ffffeb80`fd0243e0 ffffdb89`6813fe60 00002476`97ec0578 00000000`00000000 : USBXHCI!Bulk_WdfEvtIoQueueReadyNotification+0xa1
ffffeb80`fd024380 fffff80c`983b713a : 00000000`00000000 ffffdb89`6813fa80 ffffeb80`fd0244f8 00000000`00000000 : Wdf01000!FxIoQueueIoResume::Invoke+0x3d
ffffeb80`fd0243b0 fffff80c`98360a0f : ffffdb89`6813fa80 ffffeb80`fd024489 ffffdb89`6813fb40 ffffdb89`683e4350 : Wdf01000!FxIoQueue::processReadyNotify+0x7e
ffffeb80`fd024410 fffff80c`9833095e : ffffdb89`6813fa80 00000000`00000002 00000000`00000000 ffffdb89`6813fa80 : Wdf01000!FxIoQueue::DispatchEvents+0x3543f
ffffeb80`fd0244f0 fffff80c`9a683ee4 : ffffdb89`6124b8a8 ffffdb89`683e4350 00000000`00000000 ffffdb89`6849d050 : Wdf01000!imp_WdfDeviceWdmDispatchIrpToIoQueue+0x62e
ffffeb80`fd0245d0 fffff80c`9a683398 : 00000000`00000000 00000000`00000009 ffffdb89`6124b8a8 00000000`00000000 : ucx01000!UrbHandler_USBPORTStyle_Legacy_BulkOrInterruptTransfer+0x1e4
ffffeb80`fd024680 fffff80c`9a675ac4 : 00002476`9d0e5a08 ffffdb89`6212a010 ffffeb80`fd024740 00002476`9d0e5a08 : ucx01000!Urb_USBPORTStyle_ProcessURB+0x34c
ffffeb80`fd0246e0 fffff80c`9832792d : ffffdb89`62f1a5f0 fffff80c`9a62c17c 00000000`0000000f ffffdb89`6212a010 : ucx01000!RootHub_Pdo_EvtInternalDeviceControlIrpPreprocessCallback+0x504
ffffeb80`fd024770 fffff800`f762c199 : ffffdb89`63d415e0 00000000`00000000 00000000`00000000 ffffdb89`6813fec0 : Wdf01000!FxDevice::DispatchWithLock+0x5fd
ffffeb80`fd024860 fffff80c`984f12b7 : ffffdb89`6212a010 fffff80c`983b5d73 ffffeb80`fd024960 00000000`00000000 : nt!IofCallDriver+0x59
ffffeb80`fd0248a0 fffff80c`984f10b9 : ffffdb89`61bd2b80 00000000`00000007 ffffdb89`6212a4d0 00000000`00000000 : ACPI!ACPIIrpDispatchDeviceControl+0x97
ffffeb80`fd0248e0 fffff800`f762c199 : 00000000`00000007 00000000`00000000 ffffeb80`fd024a09 00000000`00000000 : ACPI!ACPIDispatchIrp+0xa9
ffffeb80`fd024960 fffff80c`9c795aaa : fffff80c`9839e701 ffffeb80`fd024b01 ffffdb89`62f2e001 fffff80c`9839e720 : nt!IofCallDriver+0x59
ffffeb80`fd0249a0 fffff80c`9832792d : ffffdb89`62f2e060 00000000`00000000 ffffdb89`689bc250 00000000`00000002 : UsbHub3!HUBPDO_EvtDeviceWdmIrpPreprocess+0x102a
ffffeb80`fd024a70 fffff800`f762c199 : ffffdb89`624cb550 00000000`00000000 ffffdb89`6813fa80 00000000`00000000 : Wdf01000!FxDevice::DispatchWithLock+0x5fd
ffffeb80`fd024b60 fffff80c`984f12b7 : ffffdb89`6212a010 fffff800`f78fd306 00000000`00000000 ffffdb89`6813fa80 : nt!IofCallDriver+0x59
ffffeb80`fd024ba0 fffff80c`984f10b9 : ffffdb89`61ccec40 00000000`00000007 ffffdb89`6212a518 ffffdb89`62f4c710 : ACPI!ACPIIrpDispatchDeviceControl+0x97
ffffeb80`fd024be0 fffff800`f762c199 : 00000000`00000007 ffffdb89`6212a010 ffffeb80`fd024d59 ffffdb89`64c0fa28 : ACPI!ACPIDispatchIrp+0xa9
ffffeb80`fd024c60 fffff80c`9c8a1a5b : ffffdb89`6124b8a8 ffffdb89`6212a010 00000000`00000001 00000000`00000000 : nt!IofCallDriver+0x59
ffffeb80`fd024ca0 fffff80c`9c8a17a6 : ffffb900`15bc0b40 ffffdb89`6212a010 fffff80c`9c8b44a8 00000000`00000000 : usbccgp!DispatchPdoUrb+0x24b
ffffeb80`fd024dc0 fffff80c`9c8a165a : ffffdb89`6212a010 ffffdb89`64c0fa20 ffffdb89`64c0fa28 00000000`0000000f : usbccgp!DispatchPdoInternalDeviceControl+0x86
ffffeb80`fd024e20 fffff800`f762c199 : ffffdb89`64c0f8d0 fffff80c`98324f01 00000000`00000000 00000000`00000000 : usbccgp!USBC_Dispatch+0x64a
ffffeb80`fd024ee0 fffff80c`9dbf03ef : 00000000`00000005 ffffeb80`fd024fd9 ffffdb89`694ea190 00001f80`00bc0280 : nt!IofCallDriver+0x59
ffffeb80`fd024f20 00000000`00000005 : ffffeb80`fd024fd9 ffffdb89`694ea190 00001f80`00bc0280 ffffdb89`00000020 : ew_usbenumfilter+0x3ef
ffffeb80`fd024f28 ffffeb80`fd024fd9 : ffffdb89`694ea190 00001f80`00bc0280 ffffdb89`00000020 fffff80c`98386435 : 0x5
ffffeb80`fd024f30 ffffdb89`694ea190 : 00001f80`00bc0280 ffffdb89`00000020 fffff80c`98386435 ffffdb89`68680d50 : 0xffffeb80`fd024fd9
ffffeb80`fd024f38 00001f80`00bc0280 : ffffdb89`00000020 fffff80c`98386435 ffffdb89`68680d50 fffff800`f762c199 : 0xffffdb89`694ea190
ffffeb80`fd024f40 ffffdb89`00000020 : fffff80c`98386435 ffffdb89`68680d50 fffff800`f762c199 00000000`00000005 : 0x1f80`00bc0280
ffffeb80`fd024f48 fffff80c`98386435 : ffffdb89`68680d50 fffff800`f762c199 00000000`00000005 ffffeb80`fd024fd9 : 0xffffdb89`00000020
ffffeb80`fd024f50 00000000`00000002 : ffffdb89`68680d50 00000000`00000001 00000000`00000001 fffff80c`98324866 : Wdf01000!FxRequestBuffer::GetBufferLength+0xb1
ffffeb80`fd024f80 ffffdb89`68680d50 : 00000000`00000001 00000000`00000001 fffff80c`98324866 ffffdb89`61c0d900 : 0x2
ffffeb80`fd024f88 00000000`00000001 : 00000000`00000001 fffff80c`98324866 ffffdb89`61c0d900 00000000`00000001 : 0xffffdb89`68680d50
ffffeb80`fd024f90 00000000`00000001 : fffff80c`98324866 ffffdb89`61c0d900 00000000`00000001 ffffeb80`fd025060 : 0x1
ffffeb80`fd024f98 fffff80c`98324866 : ffffdb89`61c0d900 00000000`00000001 ffffeb80`fd025060 ffffeb80`fd024fd9 : 0x1
ffffeb80`fd024fa0 fffff80c`9c735430 : ffffdb89`630b6570 ffffdb89`61c0d9d0 ffffdb89`68680d50 00000000`00000000 : Wdf01000!imp_WdfRequestSend+0x156
ffffeb80`fd025040 ffffdb89`630b6570 : ffffdb89`61c0d9d0 ffffdb89`68680d50 00000000`00000000 00000001`00000010 : ew_jubusenum+0x5430
ffffeb80`fd025048 ffffdb89`61c0d9d0 : ffffdb89`68680d50 00000000`00000000 00000001`00000010 00000000`00000000 : 0xffffdb89`630b6570
ffffeb80`fd025050 ffffdb89`68680d50 : 00000000`00000000 00000001`00000010 00000000`00000000 00002476`98145fd8 : 0xffffdb89`61c0d9d0
ffffeb80`fd025058 00000000`00000000 : 00000001`00000010 00000000`00000000 00002476`98145fd8 00002476`9797f2a8 : 0xffffdb89`68680d50


STACK_COMMAND: kb

SYMBOL_NAME: PAGE_NOT_ZERO

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: Unknown_Module

IMAGE_NAME: Unknown_Image

DEBUG_FLR_IMAGE_TIMESTAMP: 0

BUCKET_ID: PAGE_NOT_ZERO

Followup: MachineOwner
---------

*** Memory manager detected 35967 instance(s) of page corruption, target is likely to have memory corruption.

Best regards,

Anodam.
 
Solution
looks like the stack is messed up in some usb functions.
you would normally update the bios, the chipset driver, any usb 3 drivers from the motherboard vendor
then try to see if you have any old usb driver installed on a port for some device.
old is before april of 2012 for usb 2.x and april of 2013 for usb 3.x


looks like the stack is messed up in some usb functions.
you would normally update the bios, the chipset driver, any usb 3 drivers from the motherboard vendor
then try to see if you have any old usb driver installed on a port for some device.
old is before april of 2012 for usb 2.x and april of 2013 for usb 3.x


 
Solution